Featured content
The Governance, Risk, And Compliance Playbook For 2021
Take On More Business Risk Using A World-Class GRC Program
Governance, risk, and compliance (GRC) programs give organizations the confidence to take the business risks that drive innovation and competitive advantage. Yet too many organizations lack...
Charts & Figures
-
TechRadar™: Zero Trust Identity Standards, Q3 '14
October 7, 2014
-
TechRadar™: Equilibrium Phase Technologies
October 7, 2014
-
TechRadar™: Survival Phase Technologies
October 7, 2014
Search Results
-
Report The Security Of Cryptocurrencies
Security Must Help Business Leaders Make Risk-Based Decisions On Cryptocurrency Adoption And Implementation
Many enterprises are considering the adoption of cryptocurrencies for payment. As a security and risk (S&R) professional, you're responsible for helping business leaders understand the legal and...
-
Report Q&A: Top 10 Questions To Ask Your Security Vendors About GDPR
Security Vendors Can Hurt As Much As Help Your Compliance
GDPR is in force, and security and risk professionals (S&R) are taking a hard look at just how prepared their security vendors are. GDPR compliance affects all partners in the value chain; to...
-
Report Predictions 2018: Be Ready To Face The Realities Behind The Blockchain Hype
The Visionaries Will Persevere, While Those Hoping For Quick Fixes Will Give Up
Blockchain technology may not possess the miraculous capabilities that press articles and those with software, books, or other agendas to sell have ascribed to it. But the potential is undeniable:...
-
Report Vendor Landscape: Anti-Money-Laundering Solutions, 2017
Digital Innovation And Stricter Regulations Reinvigorate The AML Market
March 29, 2017 | Andras Cser, Nick HayesDue to recent global terrorist attacks; corporate corruption; and worsening illicit markets such as drugs, guns, and human trafficking; governments realize the importance of countering criminal and...
-
Report Quick Take: 12 Lessons For Security & Risk Pros From The US OPM Breach
June 8, 2015 | Rick Holland, Andras Cser, Ed FerraraOn June 4, the United States Office of Personnel Management (OPM) disclosed a cybersecurity incident affecting at least 4 million individuals, whose personally identifiable information (PII) may...
-
Report Quick Take: Sony Breach — A Sad Tale Of Epic Failure That Could Have Been Avoided
Businesses Must Prepare For Politically And Socially Motivated Cyberattacks And Cyberespionage
December 18, 2014 | Rick Holland, Renee Murphy, Ed Ferrara. In this report, Forrester will summarize the currently available details and provide recommendations that S&R pros must consider to reinforce their cybersecurity programs and protect their...
-
Report TechRadar™: Zero Trust Identity Standards, Q3 2014
Standards In The OAuth Orbit — And SCIM — Continue To Grow
October 7, 2014 | Andras CserThe Zero Trust enterprise requires enterprise applications, identity stores, mobile apps, the Internet of Things, and other systems on-premises and in the cloud to generate and consume a variety of...
-
Report What You Need To Know About The FIDO Alliance And Its Impact On User Authentication
This Heavyweight Standards Body Is In A Race Against Time And Market Innovation For Enterprise Success
July 23, 2014 | Andras Cser, Eve MalerThe model for user authentication most online services have relied on heavily for decades — passwords, often with security questions for account recovery — is breaking down. The Fast Identity...
-
Report Twelve Recommendations For Your Security Program In 2014
Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy
February 5, 2014 | Andrew Rose, Stephanie Balaouras, John KindervagEvery winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current...
-
Report The 15 Most Important Questions To Ask Your Cloud Identity And Access Management Provider
April 5, 2013 | Andras CserDuring the past three years, cloud-based identity and access management (IAM) solutions have become a viable and cost-effective alternative to on-premises, commercial off-the-shelf (COTS), or...
-
Report TechRadar™ For Security Pros: Zero Trust Identity Standards, Q3 2012
October 24, 2012 | Eve Maler, Andras CserThis report outlines Forrester's solution to help security and risk (S&R) leaders develop their road map of IAM processes using Forrester's TechRadar™ methodology. The extended enterprise requires...
Content Type
ApplyFilters
Industry
- Financial Services (3)
- Media & Entertainment (1)
- Public Sector (1)
Primary Role
- Security & Risk (17)
- CIO (1)
Methodology
- TechRadar (8)
- Business Technographics (1)
- Predictions (1)
- Vendor Landscape (1)
Region
- North America (1)
Vendor
- Attivio (1)
- BAE Systems (1)
- FICO (1)
- Fiserv (1)
- SAS (1)
- Sony Electronics (1)