Skip to main content
99 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Andras Cser

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security

    Wednesday, March 10, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Andras Cser

    In this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...

  • Report A Practical Guide To A Zero Trust Implementation

    Roadmap: The Zero Trust Security Playbook
    March 3, 2021 | Steve Turner, David Holmes, Chase Cunningham

    Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...

  • Report Now Tech: Enterprise Fraud Management, Q1 2021

    Forrester's Overview Of 37 Enterprise Fraud Management Providers
    March 2, 2021 | Andras Cser

    You can use enterprise fraud management (EFM) to catch and reduce fraud, lower customer friction and labor costs, automate transaction risk scoring, and improve business intelligence. But to...

  • Report Best Practices And Trends: Voice Biometrics

    Voice Biometrics Can Improve Security And Customer Experience
    February 10, 2021 | Andras Cser, Sean Ryan

    Voice biometrics offers improved account access security and user experience. Modern voice biometrics solutions resist replay attacks and have improved in accuracy and performance in the past five...

  • Report Forrester Infographic: State Of Consumer Authentication 2020

    January 27, 2021 | Andras Cser

    Customers' sentiment about consumer authentication plays a significant role in how S&R, marketing, and CX professionals select the authentication measures and technologies that provide adequate...

  • Report Now Tech: Cloud Security Gateways, Q1 2021

    Forrester's Overview Of 16 Cloud Security Gateway Providers
    January 26, 2021 | Andras Cser

    You can use cloud security gateway (CSG, also known as cloud access security broker or CASB) solutions to detect and protect against: 1) data loss, 2) excessive sensitive data access, and 3) use of...

  • Report Build Your Identity And Access Management Roadmap

    Roadmap: The Identity And Access Management Playbook
    December 30, 2020 | Sean Ryan, Andras Cser

    You must base your identity and access management (IAM) roadmap on a well-defined strategy that establishes and articulates the business need and value of IAM across your entire organization. Your...

  • Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    December 4, 2020 | Merritt Maxim, Andras Cser

    New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...

  • Webinar Customer Identity And Access Management: What's Hot And What's Not

    Based On The Forrester Wave™
    November 17, 2020 | Andras Cser

    In this webinar, we review the evaluation criteria and results of Forrester's Q4 2020 customer identity and access management (CIAM) Wave. We look at scores of the evaluated solutions as well as...

  • Report Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook
    October 27, 2020 | Andras Cser, Sean Ryan

    Your identity and access management (IAM) strategy must establish and explain the business need and value of IAM to technology and business leaders. It must also describe the current state, define...

  • Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    October 23, 2020 | Andras Cser, Sean Ryan

    Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...

  • Report Forrester's Identity And Access Management Maturity Assessment

    Assessment: The Identity And Access Management Playbook
    October 16, 2020 | Sean Ryan, Andras Cser

    Forrester's IAM maturity assessment tool is designed to help S&R professionals identify gaps in their current IAM strategy across all major identity and access management (IAM) functional areas,...

  • Webinar Key Trends In Customer-Facing Identity And Access Management

    September 30, 2020 | Andras Cser

    This webinar looks at the key trends in customer identity and access management (CIAM). We look at integration requirements outside of the traditional security arena and user profile management...

  • Report The Top Trends Shaping Anti-Money Laundering In 2020

    Robotic Process Automation, Cryptocurrencies, Real-Time Detection, And KYC Processes Gain Importance
    August 10, 2020 | Andras Cser

    With new real-time transactions gaining popularity and new legalized product markets (such as cannabis) emerging, anti-money-laundering (AML) regulations are getting tougher and more complex. This...

  • Webinar So You're Implementing Containers? Secure Them!

    July 28, 2020 | Sandy Carielli, Andras Cser

    Technology leaders are jumping at the chance to implement containers, and security leaders are scrambling to figure out how to protect them. Join us for a fireside chat about key container security...

  • Report Best Practices For Container Security

    Protecting Containerized Applications Requires Technical And Organizational Steps
    July 24, 2020 | Sandy Carielli, Andras Cser

    Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...

  • Report Best Practices For eCommerce And Retail Fraud Management

    Balancing Secure Customer Experiences With Fraud Management Efficiency
    July 21, 2020 | Andras Cser

    eCommerce and retail fraud management (ERFM) is a tightrope that forces security and risk (S&R) pros to balance the business need for frictionless customer experiences with fraud avoidance. This...

  • Report The Top Security Technology Trends To Watch, 2020

    Ten Security And Risk Technologies Will Disrupt Security And Risk Practices

    Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top 10 security technologies to...

  • Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020

    Forrester's Overview Of 24 CIAM Providers
    June 24, 2020 | Andras Cser

    You can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...

  • Webinar Top Security Technologies To Watch, 2020

    Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...

  • Report Use Privileged Identity Management Pricing Insight For Buyer Advantage

    Understand Pricing Mechanics To Optimize Your PIM Procurement
    June 18, 2020 | Sean Ryan, Andras Cser

    Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...

  • Report Building A Customer-Obsessed IAM Team

    Organization: The Identity And Access Management Playbook
    June 3, 2020 | Andras Cser, Sean Ryan

    For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides job descriptions and an...

  • Webinar Key Trends Impacting Anti-Money Laundering

    June 3, 2020 | Andras Cser

    With increasing regulatory scrutiny and skyrocketing online enrollment and account applications, anti-money laundering (AML) has gained particular importance in the past two years. This webinar...

  • Report Assess Your Cloud Security Readiness

    Leverage Forrester's Custom Tool To Assess Your Cloud Security Maturity Across Six Major Technology Competencies
    May 29, 2020 | Andras Cser

    As firms migrate computing and data resources to the cloud, security remains a top concern and priority for both operational and compliance reasons. S&R professionals should use our custom tool, a...

  • Report The Forrester Wave™: Risk-Based Authentication, Q2 2020

    The Seven Providers That Matter Most And How They Stack Up
    May 27, 2020 | Andras Cser

    In our 33-criterion evaluation of risk-based authentication (RBA) providers, we identified the seven most significant ones — AppGate, IBM, Kount, LexisNexis Risk Solutions, OneSpan, RSA, and...

Content Type

Apply

Filters