Featured content
The Identity And Access Management Playbook For 2021
Evolve Your IAM Strategy For Your Digital Business
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
Charts & Figures
-
-
Evaluated Vendors And Product Information
March 3, 2021
-
Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
March 3, 2021
Search Results
-
Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security
Wednesday, March 10, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Andras CserIn this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report Best Practices And Trends: Voice Biometrics
Voice Biometrics Can Improve Security And Customer Experience
Voice biometrics offers improved account access security and user experience. Modern voice biometrics solutions resist replay attacks and have improved in accuracy and performance in the past five...
-
Webinar How To Secure And Govern Non-Human Identities
February 3, 2021 | Sean RyanDo you know how many software bots, physical robots, or internet of things (IoT) devices are connected to your network? How many of these devices store or interact with critical data? Such...
-
Report Forrester Infographic: State Of Consumer Authentication 2020
January 27, 2021 | Andras CserCustomers' sentiment about consumer authentication plays a significant role in how S&R, marketing, and CX professionals select the authentication measures and technologies that provide adequate...
-
Webinar Privileged Identity Management Suites: The Essentials And The Differentiators
Based On The Forrester Wave™
Learn about the essential capabilities inherent in privileged identity management (PIM) suites along with the differentiating features for addressing new use cases. Key takeaways: Learn about the...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report Build Your Identity And Access Management Roadmap
Roadmap: The Identity And Access Management Playbook
You must base your identity and access management (IAM) roadmap on a well-defined strategy that establishes and articulates the business need and value of IAM across your entire organization. Your...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Report Evolve Your IAM Strategy For Your Digital Business
Executive Overview: The Identity And Access Management Playbook
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
-
Webinar Customer Identity And Access Management: What's Hot And What's Not
Based On The Forrester Wave™
November 17, 2020 | Andras CserIn this webinar, we review the evaluation criteria and results of Forrester's Q4 2020 customer identity and access management (CIAM) Wave. We look at scores of the evaluated solutions as well as...
-
Playbook The Identity And Access Management Playbook For 2021
Evolve Your IAM Strategy For Your Digital Business
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
-
Report Build Your Identity And Access Management Strategy
Strategic Plan: The Identity And Access Management Playbook
Your identity and access management (IAM) strategy must establish and explain the business need and value of IAM to technology and business leaders. It must also describe the current state, define...
-
Report The Future Of Identity And Access Management
Vision: The Identity And Access Management Playbook
Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...
-
Report Forrester's Identity And Access Management Maturity Assessment
Assessment: The Identity And Access Management Playbook
Forrester's IAM maturity assessment tool is designed to help S&R professionals identify gaps in their current IAM strategy across all major identity and access management (IAM) functional areas,...
-
Webinar Key Trends In Customer-Facing Identity And Access Management
September 30, 2020 | Andras CserThis webinar looks at the key trends in customer identity and access management (CIAM). We look at integration requirements outside of the traditional security arena and user profile management...
-
Report Now Tech: Enterprise Email Security Providers, Q3 2020
Forrester's Overview Of 33 Enterprise Email Security Providers
You can use enterprise email security to defend against email-borne attacks like phishing, safeguard sensitive data from theft or compromise, and protect your organization's brands. But to realize...
-
Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020
Forrester's Overview Of 24 CIAM Providers
June 24, 2020 | Andras CserYou can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...
-
Report Use Privileged Identity Management Pricing Insight For Buyer Advantage
Understand Pricing Mechanics To Optimize Your PIM Procurement
Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...
-
Report The Time For A Digital Signature Is Now
June 18, 2020 | Enza IannopolloThe COVID-19 pandemic has forced consumers, employees, and partners to dramatically change their digital habits and adopt new ones. These new behaviors are here to stay, and businesses are under...
-
Report Building A Customer-Obsessed IAM Team
Organization: The Identity And Access Management Playbook
For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides job descriptions and an...
-
Webinar Key Trends Impacting Anti-Money Laundering
June 3, 2020 | Andras CserWith increasing regulatory scrutiny and skyrocketing online enrollment and account applications, anti-money laundering (AML) has gained particular importance in the past two years. This webinar...
-
Report The Forrester Wave™: Risk-Based Authentication, Q2 2020
The Seven Providers That Matter Most And How They Stack Up
May 27, 2020 | Andras CserIn our 33-criterion evaluation of risk-based authentication (RBA) providers, we identified the seven most significant ones — AppGate, IBM, Kount, LexisNexis Risk Solutions, OneSpan, RSA, and...
-
Report How A Least Privilege Model Can Reduce Dynamic Access Risks
Applying Zero Trust To Address Overprivileged Employee/Entity Access
Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either...
-
Report Develop Actionable Business-Centric Identity And Access Management Metrics
Performance Management: The Identity And Access Management Playbook
Many security and risk (S&R) professionals continue to struggle to sustain identity and access management (IAM) as a top business technology priority. S&R pros who succeed at nurturing their...
Content Type
ApplyFilters
Industry
- Financial Services (12)
- Retail (4)
- Public Sector (3)
- Healthcare (2)
- Media & Entertainment (1)
Topics
- Customer Identity & Access Management (CIAM) (67)
- Passwords (55)
- Identity-As-A-Service (IDaaS) (44)
- Risk-Based Authentication (RBA) (39)
- Single Sign-On (SSO) (36)
- Two-Factor Authentication (2FA) (36)
- Authentication (35)
- Strong Authentication (15)
- Identity & Access Governance (9)
- Identity Verification (8)
- Personal Identity & Data Management (PIDM) (8)
- User Account Provisioning (4)
Methodology
- Forrester Tech Tide (60)
- Now Tech (20)
- Forrester Wave (18)
- ForecastView (15)
- Online Maturity Assessment (4)
- Maturity Assessment (3)
- Infographic (2)
- Predictions (1)
Region
- Europe (2)
Vendor
- Microsoft (36)
- Cisco (29)
- IBM (28)
- Google (22)
- Okta (22)
- Centrify (20)
- CyberArk (20)
- Micro Focus (20)
- Akamai (19)
- CA Technologies (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- Intel (19)
- Neustar (19)
- Oracle (19)
- Pitney Bowes (19)
- RSA (19)
- SailPoint (19)
- Salesforce (19)
- SAP (19)
- BlackBerry Cylance (10)
- CrowdStrike (10)
- Palo Alto Networks (10)
- OpenText (9)
- VMware (9)
- Accenture (6)
- Atos (6)
- Capgemini (6)
- Check Point (6)
- Cognizant (6)
- Deloitte (6)
- EY (6)
- FireEye (6)
- Infosys (6)
- KPMG (6)
- PwC (6)
- Tata Consultancy Services (TCS) (6)
- Wipro (6)
- Carbon Black (4)
- Proofpoint (4)
- ManageEngine (1)
- Symantec (1)
Analyst
- Andras Cser (50)
- Sean Ryan (27)
- Jennifer Adams (10)
- Merritt Maxim (10)
- Heidi Shey (7)
- Joseph Blankenship (7)
- Paul McKay (7)
- Enza Iannopollo (6)
- Alla Valente (5)
- Chris Sherman (5)
- Claire O'Malley (5)
- David Holmes (5)
- Jeff Pollard (4)
- Jinan Budge (3)
- Amy DeMartine (2)
- Andrew Hogan (1)
- Elsa Pikulik (1)
- Renee Murphy (1)
- Salvatore Schiano (1)