Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
The Balanced IAM Metrics Scorecard
May 19, 2020
-
Sample Zero Trust Operational Metrics
March 24, 2020
-
Sample Zero Trust Tactical Metrics
March 24, 2020
Search Results
-
Report Develop Actionable Business-Centric Identity And Access Management Metrics
Performance Management: The Identity And Access Management Playbook
Many security and risk (S&R) professionals continue to struggle to sustain identity and access management (IAM) as a top business technology priority. S&R pros who succeed at nurturing their...
-
Report Craft Zero Trust Security Metrics That Matter
Performance Management: The Zero Trust Security Playbook
Forrester's Zero Trust (ZT) Model of information security demands that security teams eliminate the dangerous trust assumptions underpinning perimeter-based security architectures. When you embrace...
-
Report Forrester's 2019 Consumer Privacy Segmentation: Europe
Understand Consumer Privacy Preferences And Behaviors To Improve Engagement, Trust, And Experience
November 13, 2019 | Enza IannopolloIn this report, we explain how privacy professionals can apply Forrester's Consumer Privacy Segmentation to understand how privacy perspectives vary by geography across Europe. Armed with this...
-
Report The Business Case For Security Awareness And Training
How To Measure Changes In Security Behavior And Culture
Everyone has long recognized the importance of the human element to cybersecurity, yet we still see staff acting unwisely and inviting threat actors into our networks. It's clear that something...
-
Report Top Recommendations For Your Security Program, 2019
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Report Best Practices: Customer Call Center Authentication
Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...
Content Type
ApplyFilters
Methodology
Region
- Europe (5)
- North America (5)
Analyst
- Enza Iannopollo (10)
- Andras Cser (3)
- Claire O'Malley (2)
- Jeff Pollard (2)
- Jinan Budge (2)
- Merritt Maxim (2)
- Amy DeMartine (1)
- Joseph Blankenship (1)
- Paul McKay (1)
- Sean Ryan (1)
- Stephanie Balaouras (1)