Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Now Tech Large Vendors: Cloud Security Gateways, Q1 2021
January 26, 2021
-
Now Tech Midsize Vendors: Cloud Security Gateways, Q1 2021
January 26, 2021
-
Now Tech Market Presence Segments: Cloud Security Gateways, Q1 2021
January 26, 2021
Search Results
-
Report Best Practices And Trends: Voice Biometrics
Voice Biometrics Can Improve Security And Customer Experience
Voice biometrics offers improved account access security and user experience. Modern voice biometrics solutions resist replay attacks and have improved in accuracy and performance in the past five...
-
Report Now Tech: Cloud Security Gateways, Q1 2021
Forrester's Overview Of 16 Cloud Security Gateway Providers
January 26, 2021 | Andras CserYou can use cloud security gateway (CSG, also known as cloud access security broker or CASB) solutions to detect and protect against: 1) data loss, 2) excessive sensitive data access, and 3) use of...
-
Report The Top Trends Shaping Anti-Money Laundering In 2020
Robotic Process Automation, Cryptocurrencies, Real-Time Detection, And KYC Processes Gain Importance
August 10, 2020 | Andras CserWith new real-time transactions gaining popularity and new legalized product markets (such as cannabis) emerging, anti-money-laundering (AML) regulations are getting tougher and more complex. This...
-
Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020
Forrester's Overview Of 24 CIAM Providers
June 24, 2020 | Andras CserYou can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...
-
Report Use Privileged Identity Management Pricing Insight For Buyer Advantage
Understand Pricing Mechanics To Optimize Your PIM Procurement
Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...
-
Report Assess Your Cloud Security Readiness
Leverage Forrester's Custom Tool To Assess Your Cloud Security Maturity Across Six Major Technology Competencies
May 29, 2020 | Andras CserAs firms migrate computing and data resources to the cloud, security remains a top concern and priority for both operational and compliance reasons. S&R professionals should use our custom tool, a...
-
Report Develop Actionable Business-Centric Identity And Access Management Metrics
Performance Management: The Identity And Access Management Playbook
Many security and risk (S&R) professionals continue to struggle to sustain identity and access management (IAM) as a top business technology priority. S&R pros who succeed at nurturing their...
-
Report Understand The State Of Identity And Access Management, 2020
Benchmarks: The Identity And Access Management Playbook
This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...
-
Report New Tech: Decentralized Digital Identity (DDID), Q1 2020
Forrester's Landscape Overview Of 21 Providers
Today's digital identity frameworks are centralized, suffer from a lack of trust, aren't portable, and don't give consumers control. As the boundary between physical and digital interactions...
-
Report The Forrester Wave™: Anti-Money Laundering Solutions, Q3 2019
The Eight Providers That Matter Most And How They Stack Up
September 24, 2019 | Andras CserIn our 32-criterion evaluation of anti-money laundering (AML) solution providers, we identified the eight most significant ones — ACI, BAE Systems, Featurespace, Feedzai, FICO TONBELLER,...
-
Report Decentralized Digital Identity: A Primer For B2C Marketers
Why Bring-Your-Own-Identity Is A Trend To Watch
Your identity is more than the standard information on your driver's license or social security card. It also encompasses how you interact with brands, what you know, how you share elements of your...
-
Report Top Recommendations For Your Security Program, 2019
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Report Best Practices: Customer Call Center Authentication
Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...
Content Type
ApplyFilters
Industry
Primary Role
- Security & Risk (26)
- B2C Marketing (1)
- CIO (1)
Topics
- Return On Investment (ROI) (9)
- Metrics (4)
- Balanced Scorecard (1)
- Benchmarks (1)
Methodology
- Now Tech (12)
- Forrester Wave (3)
- Maturity Assessment (1)
- New Tech (1)
- Online Maturity Assessment (1)
Vendor
- BAE Systems (3)
- FICO (3)
- SAS (3)