Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
Search Results
-
Webinar How To Secure And Govern Non-Human Identities
Wednesday, February 3, 2021, 1:00 p.m.-1:40 p.m. Eastern time (18:00-18:40 GMT) | Sean RyanDo you know how many software bots, physical robots, or internet of things (IoT) devices are connected to your network? How many of these devices store or interact with critical data? Such...
-
Webinar Privileged Identity Management Suites: The Essentials And The Differentiators
Based On The Forrester Wave™
Tuesday, January 19, 2021, 1:00 p.m.-1:40 p.m. Eastern time (18:00-18:40 GMT) | Sean Ryan, Elsa PikulikLearn about the essential capabilities inherent in privileged identity management (PIM) suites along with the differentiating features for addressing new use cases. Key takeaways: Learn about the...
-
Report How To Secure And Govern Non-Human Identities
Apply Zero Trust IAM Principles To Secure Software Bots, Physical Robots, And IoT Devices
January 6, 2021 | Sean Ryan, Chase CunninghamDo you know how many software bots, physical robots, or IoT devices are connected to your network? How many of these devices store or interact with critical data? Such nonhumans boost productivity...
-
Report Build Your Identity And Access Management Roadmap
Roadmap: The Identity And Access Management Playbook
You must base your identity and access management (IAM) roadmap on a well-defined strategy that establishes and articulates the business need and value of IAM across your entire organization. Your...
-
Report Build Your Identity And Access Management Strategy
Strategic Plan: The Identity And Access Management Playbook
Your identity and access management (IAM) strategy must establish and explain the business need and value of IAM to technology and business leaders. It must also describe the current state, define...
-
Report The Future Of Identity And Access Management
Vision: The Identity And Access Management Playbook
Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...
-
Report Forrester's Identity And Access Management Maturity Assessment
Assessment: The Identity And Access Management Playbook
Forrester's IAM maturity assessment tool is designed to help S&R professionals identify gaps in their current IAM strategy across all major identity and access management (IAM) functional areas,...
-
Webinar Reducing Security Software Costs Through Effective Negotiations
Security professionals procure large amounts of security software to secure their enterprises. The average organization has products from dozens of security vendors, all adding costs and...
-
Report Use Privileged Identity Management Pricing Insight For Buyer Advantage
Understand Pricing Mechanics To Optimize Your PIM Procurement
Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...
-
Report Building A Customer-Obsessed IAM Team
Organization: The Identity And Access Management Playbook
For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides job descriptions and an...
-
Report How A Least Privilege Model Can Reduce Dynamic Access Risks
Applying Zero Trust To Address Overprivileged Employee/Entity Access
Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either...
-
Report Develop Actionable Business-Centric Identity And Access Management Metrics
Performance Management: The Identity And Access Management Playbook
Many security and risk (S&R) professionals continue to struggle to sustain identity and access management (IAM) as a top business technology priority. S&R pros who succeed at nurturing their...
-
Report Top Recommendations For Your Security Program, 2020
Landscape: The S&R Practice Playbook
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Report Understand The State Of Identity And Access Management, 2020
Benchmarks: The Identity And Access Management Playbook
This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...
-
Report The Forrester Customer-Obsessed Identity And Access Management Operating Model
Continuous Improvement: The Identity And Access Management Playbook
Being customer obsessed creates advantage and resiliency in times of change or difficulty. This is especially true for customer identity and access management (CIAM): The security customer...
-
Webinar Top Recommendations For Your Security Program, 2020
Security and risk (S&R) pros will need to open the risk aperture to account for the impacts of externalities — those risks that are not under the direct control of the business....
-
Report Now Tech: Privileged Identity Management, Q2 2020
Forrester's Overview Of 17 Privileged Identity Management Providers
April 2, 2020 | Sean RyanYou can use PIM offerings to reduce exposure to the most damaging types of breaches, comply with a growing list of regulations, replace manual processes for oversight of privileged accounts, and...
-
Webinar Recapping The 2020 RSA Conference: Forrester’s Perspectives
The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week...
-
Report Optimize User Experience With Passwordless Authentication
Improve User Experience And Security And Lower The Cost Of Cross-Channel Authentication
With the evolution of numerical computing, the password has lost its ability to protect critical applications and data. This report looks at passwordless authentication, explaining how it can...
-
Report Using Zero Trust To Kill The Employee Password
Secure Workforce Access With Stronger Authentication Methods
Passwords are easy pickings for cybercriminals and the culprit behind many cyberattacks. Administrative costs and user productivity losses add insult to injury. So why are so many organizations...
-
Webinar Kill The Employee Password With Zero Trust
February 6, 2020 | Sean RyanPasswords are easy to hack and expensive to support. So why do so many organizations still rely on them for secure access? S&R pros need to ditch the password and adopt a Zero Trust approach to...
-
Report The Top Trends Shaping IAM In 2020
Landscape: The Identity And Access Management Playbook
Identity is a core building block of a robust Zero Trust security ecosystem and infrastructure. In this report, we look at the eight most important trends that will shape the identity and access...
-
Report Prepare For Decentralized Digital Identity: Security SWOT
Benefits Of Privacy And Centralization Get Hampered By Lack Of Trust, Early Fragmentation, And Growing Pains Of Wallet Management
Decentralized digital identity (DDID) is not just a technology buzzword: It promises a complete restructuring of the currently centralized physical and digital identity ecosystem into a...
-
Webinar Top Trends Shaping IAM In 2020
This webinar highlights the top trends influencing identity and access management (IAM) in 2020. We cover enterprise and customer IAM as well as access management and governance.Key...
-
Report Now Tech: Managed IAM Services, Q4 2019
Forrester's Overview Of 18 IAM Managed Security Services Providers
You can use managed identity and access management (IAM) services providers to implement IAM faster based on prebuilt integrations and deployment models, adapt to rapidly evolving digital...
- 1
- 2
Content Type
ApplyFilters
Industry
- Healthcare (2)
- Public Sector (2)
- Energy & Utilities (1)
- Financial Services (1)
- Manufacturing (1)
- Retail (1)
Topics
- Identity & Access Management (IAM) (26)
- Application Security (11)
- Information Security (10)
- Security Operations & Program Governance (4)
- Business & IT Alignment (3)
- Cloud Computing (3)
- Customer Experience Management (3)
- Measurement (3)
- Artificial Intelligence (AI) (2)
- Customer Relationship Management (CRM) (2)
- Data & Information Protection (2)
- Enterprise Architecture Domains & Practices (2)
- Financial Management (2)
- Governance Risk & Compliance (GRC) (2)
- Internet of Things (IoT) (2)
- Organization (2)
- Strategy Planning & Governance (2)
- Tech Sector Economics (2)
- Biometrics (1)
- Data Centers & Data Center Networking (1)
- Employee Experience (1)
- Enterprise Mobility (1)
- Networking (1)
- Pandemic (1)
- Sourcing Strategy & Execution (1)
- Systems Management (1)
- Telecommunications Services (1)
Methodology
- Forrester Tech Tide (1)
- Maturity Assessment (1)
- Now Tech (1)
- Online Maturity Assessment (1)
Vendor
- Centrify (2)
- CyberArk (2)
- IBM (2)
- Micro Focus (2)
- Accenture (1)
- Akamai (1)
- Atos (1)
- CA Technologies (1)
- Capgemini (1)
- Cisco (1)
- Cognizant (1)
- Deloitte (1)
- Equifax (1)
- Experian (1)
- EY (1)
- ForgeRock (1)
- Gemalto (1)
- Google (1)
- Infosys (1)
- Intel (1)
- KPMG (1)
- ManageEngine (1)
- Microsoft (1)
- Neustar (1)
- Okta (1)
- Oracle (1)
- Pitney Bowes (1)
- PwC (1)
- RSA (1)
- SailPoint (1)
- Salesforce (1)
- SAP (1)
- Symantec (1)
- Tata Consultancy Services (TCS) (1)
- Wipro (1)