Featured content
The Identity And Access Management Playbook For 2021
Evolve Your IAM Strategy For Your Digital Business
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
Charts & Figures
-
-
Forrester Wave™: Risk-Based Authentication, Q2 2020
May 27, 2020
-
Search Results
-
Report Evolve Your IAM Strategy For Your Digital Business
Executive Overview: The Identity And Access Management Playbook
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
-
Playbook The Identity And Access Management Playbook For 2021
Evolve Your IAM Strategy For Your Digital Business
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
-
Report The Forrester Wave™: Risk-Based Authentication, Q2 2020
The Seven Providers That Matter Most And How They Stack Up
May 27, 2020 | Andras CserIn our 33-criterion evaluation of risk-based authentication (RBA) providers, we identified the seven most significant ones — AppGate, IBM, Kount, LexisNexis Risk Solutions, OneSpan, RSA, and...
-
Report Video: The Five Pillars Of A Robust And Resilient CIAM Strategy
How Building An Identity Foundation Helps Drive Customer Trust And Loyalty
May 11, 2020 | Andras CserIn a world where online interactions not only augment but replace in-person interactions, robust and resilient customer identity and access management (CIAM) plays a critical role. To help guide...
-
Report Optimize User Experience With Passwordless Authentication
Improve User Experience And Security And Lower The Cost Of Cross-Channel Authentication
With the evolution of numerical computing, the password has lost its ability to protect critical applications and data. This report looks at passwordless authentication, explaining how it can...
-
Report Using Zero Trust To Kill The Employee Password
Secure Workforce Access With Stronger Authentication Methods
Passwords are easy pickings for cybercriminals and the culprit behind many cyberattacks. Administrative costs and user productivity losses add insult to injury. So why are so many organizations...
-
Webinar Kill The Employee Password With Zero Trust
February 6, 2020 | Sean RyanPasswords are easy to hack and expensive to support. So why do so many organizations still rely on them for secure access? S&R pros need to ditch the password and adopt a Zero Trust approach to...
-
Report The Top Trends Shaping IAM In 2020
Landscape: The Identity And Access Management Playbook
Identity is a core building block of a robust Zero Trust security ecosystem and infrastructure. In this report, we look at the eight most important trends that will shape the identity and access...
-
Report Prepare For Decentralized Digital Identity: Security SWOT
Benefits Of Privacy And Centralization Get Hampered By Lack Of Trust, Early Fragmentation, And Growing Pains Of Wallet Management
Decentralized digital identity (DDID) is not just a technology buzzword: It promises a complete restructuring of the currently centralized physical and digital identity ecosystem into a...
-
Report Retailers, Use PSD2 To Drive Differentiation For Your Customers
Use The Strong Customer Authentication Delay To Optimize Your Response
The second Payment Services Directive (PSD2) is a mandatory regulation to which all merchants in the EEA — and other retailers who have customers in the EEA — must conform. Among other provisions,...
-
Report The Top Security Technology Trends To Watch, 2019
Eight Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...
-
Report The Forrester Wave™: Identity-As-A-Service (IDaaS) For Enterprise, Q2 2019
The 10 Providers That Matter Most And How They Stack Up
In our 37-criterion evaluation of providers of identity-as-a-service (IDaaS) for enterprise, we identified the 10 most significant ones — Google, IBM, Idaptive, Microsoft, Okta, OneLogin, OpenText,...
-
Report Forrester Analytics: IAM Software Forecast, 2018 To 2023 (Global)
ForecastView Document
Identity and access management (IAM) software tools help digital businesses provide access to employees, partners, and customers without sacrificing security or user experience. This data-driven...
-
Webinar Customer Call Centers: Dos And Don'ts
February 7, 2019 | Andras CserWhen we have the online channels (e.g., web, mobile app, etc.) all secured, fraudsters turn to the customer call center as an avenue to commit fraud. This webinar explains key types of fraud, best...
Content Type
ApplyFilters
Industry
- Financial Services (7)
- Retail (4)
- Media & Entertainment (1)
Primary Role
Methodology
- ForecastView (6)
- Forrester Wave (6)
Region
- Europe (3)
Analyst
- Andras Cser (13)
- Sean Ryan (5)
- Merritt Maxim (4)
- Paul McKay (2)
- Amy DeMartine (1)
- Enza Iannopollo (1)
- George Lawrie (1)
- Heidi Shey (1)
- Jacob Morgan (1)
- Jeff Pollard (1)
- Jennifer Adams (1)