Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
Search Results
-
Report Evolve Your IAM Strategy For Your Digital Business
Executive Overview: The Identity And Access Management Playbook
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Webinar Top Security Technologies To Watch, 2020
Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...
-
Report The Forrester Tech Tide™: Digital Physical Security And Employee Safety, Q2 2020
Seventeen Technologies Underpin Physical Security And Safety Initiatives
In a world of increasing physical threats ranging from extreme weather to workplace violence, firms are making the safety of their employees a top priority. To accelerate their physical security...
-
Webinar Recapping The 2020 RSA Conference: Forrester’s Perspectives
The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is rapidly becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by...
-
Webinar Predictions 2020: Cybersecurity
In 2020 and beyond, security and risk professionals will discover that cybersecurity decisions have broader societal implications than ever before. Our lives increasingly depend on technology to...
-
Report Now Tech: Managed IAM Services, Q4 2019
Forrester's Overview Of 18 IAM Managed Security Services Providers
You can use managed identity and access management (IAM) services providers to implement IAM faster based on prebuilt integrations and deployment models, adapt to rapidly evolving digital...
-
Report Predictions 2020: Cybersecurity
Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...
-
Webinar The Security And Privacy Implications Of Drones
Drones are no longer just airborne toys for amateur hobbyists. Organizations increasingly deploy drones in a wide range of applications, from agriculture to maintenance and inspection to law...
-
Report The Top Security Technology Trends To Watch, 2019
Eight Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...
-
Webinar Biometrics At The Crossroads: The Coming Privacy Versus Usability Battle
July 16, 2019 | Merritt MaximThe last few years have seen a growth in interest in using biometric technologies (including facial, finger, and voice) to drive authentication experiences while improving customer experience. But...
-
Report Making Smart Cities Safe And Secure
Building Secure And Resilient Digital Systems To Serve Citizens
The era of the connected city has arrived, as municipal leaders around the globe invest in new technologies to optimize existing services and improve overall citizen experience. But with these new...
-
Report The Forrester Wave™: Identity-As-A-Service (IDaaS) For Enterprise, Q2 2019
The 10 Providers That Matter Most And How They Stack Up
In our 37-criterion evaluation of providers of identity-as-a-service (IDaaS) for enterprise, we identified the 10 most significant ones — Google, IBM, Idaptive, Microsoft, Okta, OneLogin, OpenText,...
-
Report Top Trends Shaping Identity Management And Governance, 2019
Cloud Deployment Models, Machine Learning, And Access Risk Models Will Transform Deployments
May 13, 2019 | Merritt MaximFor today's digital businesses, identity management and governance (IMG) involves more than just provisioning and enforcing employee access to corporate apps and data. Security pros must now govern...
-
Report Forrester Analytics: IAM Software Forecast, 2018 To 2023 (Global)
ForecastView Document
Identity and access management (IAM) software tools help digital businesses provide access to employees, partners, and customers without sacrificing security or user experience. This data-driven...
-
Report Protect Your Firm From Drones
Security And Risk Pros Must Prepare Their Business For The Security, Privacy, And Compliance Risks of Drone Technology
Drones are no longer just airborne toys for amateur hobbyists. Organizations increasingly deploy drones in a wide range of applications, from agriculture, to maintenance and inspection, to law...
-
Report Top Recommendations For Your Security Program, 2019
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Report Best Practices: Customer Call Center Authentication
Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...
-
Report New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019
Forrester's Landscape Overview Of 21 Providers
A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems,...
-
Report The Security Of Cryptocurrencies
Security Must Help Business Leaders Make Risk-Based Decisions On Cryptocurrency Adoption And Implementation
Many enterprises are considering the adoption of cryptocurrencies for payment. As a security and risk (S&R) professional, you're responsible for helping business leaders understand the legal and...
Content Type
ApplyFilters
Industry
- Financial Services (5)
- Manufacturing (4)
- Public Sector (4)
- Energy & Utilities (2)
- Healthcare (2)
- Transportation & Logistics (2)
- Travel (2)
- Consumer Electronics (1)
- Media & Entertainment (1)
- Retail (1)
Topics
- Information Security (12)
- Security Operations & Program Governance (12)
- Identity & Access Management (IAM) (10)
- Data & Information Protection (7)
- Governance Risk & Compliance (GRC) (6)
- Application Security (4)
- Biometrics (3)
- Cloud Computing (3)
- Business & IT Alignment (2)
- Internet of Things (IoT) (2)
- Measurement (2)
- Networking (2)
- Application Management (1)
- Artificial Intelligence (AI) (1)
- Customer Experience Management (1)
- Customer Relationship Management (CRM) (1)
- eCommerce (1)
- Employee Experience (1)
- Enterprise Architecture Domains & Practices (1)
- Financial Management (1)
- Mobile Application Development (1)
- Pandemic (1)
- Program & Project Management (1)
Methodology
- ForecastView (1)
- Forrester Tech Tide (1)
- Forrester Wave (1)
- New Tech (1)
- Now Tech (1)
- Predictions (1)
Region
- North America (1)