Featured content
The Identity And Access Management Playbook For 2021
Evolve Your IAM Strategy For Your Digital Business
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
Search Results
-
Report Predictions 2020: Cybersecurity
Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...
-
Report Best Practices: Phishing Prevention
Protect Against Email-Borne Threats With Forrester's Layered Approach
Attackers use phishing and other social engineering tactics to infiltrate corporate networks. Advances in malicious email protection can recognize and stop obvious phishing attempts, but...
-
Report The Top Security Technology Trends To Watch, 2019
Eight Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...
-
Report Protect Whistleblowers For Business Success
Continuous Improvement: The Governance, Risk, And Compliance Playbook
July 31, 2019 | Alla ValenteWhistleblowers are an essential safety valve in ethical corporate culture. They provide a mechanism for healthy corporate governance by exposing fraud and corruption and, more recently, revealing...
-
Report The Forrester Tech Tide™: Data Security And Privacy, Q3 2019
20 Technologies Underpin Data Security And Privacy
Data security and privacy is critical to firms' ability to win, serve, and retain their customers. To protect sensitive data, meet compliance, and continue to mature their practices for data...
-
Report Make Your Digital Transformation An Ethical One
An Ethical Transformation Series Report
To close the gap between customer expectations and your current capabilities, your organization, like many others, is probably undergoing a digital transformation. This transformation is critical...
-
Report Hybrid Cloud Security Best Practices
Focus On The Five C's: Console, Configuration, Connectivity, Cloud Data, And Containers
June 20, 2019 | Andras CserHybrid cloud security is a must for firms moving their critical data from on-premises to cloud workloads. This report, based on a small, 20-respondent panel survey, looks at cloud security best...
-
Report Security Outlook 2019: Modest Growth, But Some Sectors Will See Double-Digit Increases
ForecastView Document
June 18, 2019 | Jennifer AdamsHackers are creating new, more sophisticated malware daily. The shift of mission-critical data and applications to the cloud is changing the way companies protect their assets. How are security and...
-
Report The Forrester Wave™: Identity-As-A-Service (IDaaS) For Enterprise, Q2 2019
The 10 Providers That Matter Most And How They Stack Up
In our 37-criterion evaluation of providers of identity-as-a-service (IDaaS) for enterprise, we identified the 10 most significant ones — Google, IBM, Idaptive, Microsoft, Okta, OneLogin, OpenText,...
-
Report The Forrester Wave™: Enterprise Email Security, Q2 2019
The 12 Providers That Matter Most And How They Stack Up
May 16, 2019 | Joseph BlankenshipIn our 32-criterion evaluation of enterprise email content security providers, we identified the 12 most significant ones — Barracuda, Cisco, Clearswift, Forcepoint, Microsoft, Mimecast,...
-
Report Top Trends Shaping Identity Management And Governance, 2019
Cloud Deployment Models, Machine Learning, And Access Risk Models Will Transform Deployments
May 13, 2019 | Merritt MaximFor today's digital businesses, identity management and governance (IMG) involves more than just provisioning and enforcing employee access to corporate apps and data. Security pros must now govern...
-
Report Forrester Analytics: IAM Software Forecast, 2018 To 2023 (Global)
ForecastView Document
Identity and access management (IAM) software tools help digital businesses provide access to employees, partners, and customers without sacrificing security or user experience. This data-driven...
-
Report Improve Open Banking Customer Authentication Experiences With Biometrics
Improving Payment Security Must Not Sacrifice Customer Experience
May 10, 2019 | Paul McKayThe introduction of the second Payment Services Directive (PSD2) on January 13, 2018 revolutionized the European financial services industry. In 2019, financial services professionals will focus on...
-
Report Video: Protect Your Organization From Business Email Compromise (BEC) Attacks
Watch Our Video To Understand A Real-Life BEC Attack And How To Protect Against These Frauds And Scams
May 8, 2019 | Josh Zelonis, Andrew HoganAlongside other scams, fraudsters and cybercriminals use business email compromise (BEC) attacks to convince unwitting employees to wire money, grant access to payment accounts, or share sensitive...
Content Type
ApplyFilters
Industry
- Financial Services (16)
- Retail (6)
- Healthcare (4)
- Public Sector (3)
- Media & Entertainment (1)
Topics
- Customer Identity & Access Management (CIAM) (67)
- Passwords (51)
- Identity-As-A-Service (IDaaS) (44)
- Authentication (39)
- Risk-Based Authentication (RBA) (39)
- Single Sign-On (SSO) (36)
- Two-Factor Authentication (2FA) (36)
- Identity Verification (17)
- Personal Identity & Data Management (PIDM) (15)
- Strong Authentication (15)
- Identity & Access Governance (9)
- User Account Provisioning (4)
Methodology
- Forrester Tech Tide (60)
- Now Tech (27)
- Forrester Wave (18)
- ForecastView (15)
- Online Maturity Assessment (4)
- Maturity Assessment (3)
- Infographic (2)
- Predictions (1)
Region
- Europe (2)
Vendor
- Microsoft (36)
- Cisco (29)
- IBM (28)
- Google (22)
- Okta (22)
- Centrify (20)
- CyberArk (20)
- Micro Focus (20)
- Akamai (19)
- CA Technologies (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- Intel (19)
- Neustar (19)
- Oracle (19)
- Pitney Bowes (19)
- RSA (19)
- SailPoint (19)
- Salesforce (19)
- SAP (19)
- BlackBerry Cylance (10)
- CrowdStrike (10)
- Palo Alto Networks (10)
- OpenText (9)
- VMware (9)
- Accenture (6)
- Atos (6)
- Capgemini (6)
- Check Point (6)
- Cognizant (6)
- Deloitte (6)
- EY (6)
- FireEye (6)
- Infosys (6)
- KPMG (6)
- PwC (6)
- Tata Consultancy Services (TCS) (6)
- Wipro (6)
- Carbon Black (4)
- Proofpoint (4)
- ManageEngine (1)
- Symantec (1)
Analyst
- Andras Cser (54)
- Sean Ryan (28)
- Enza Iannopollo (14)
- Jennifer Adams (10)
- Heidi Shey (9)
- Merritt Maxim (8)
- Jeff Pollard (7)
- Paul McKay (7)
- Alla Valente (6)
- Joseph Blankenship (6)
- Chris Sherman (5)
- David Holmes (5)
- Claire O'Malley (4)
- Jinan Budge (2)
- Sandy Carielli (2)
- Amy DeMartine (1)
- Andrew Hogan (1)
- Brian Kime (1)
- Elsa Pikulik (1)
- Fatemeh Khatibloo (1)
- Jess Burn (1)
- Renee Murphy (1)
- Salvatore Schiano (1)