Skip to main content
64 results in Everything
 
Sort by:
Refine
  • Measurement
  • Secure customers, protect the brand

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Webinar Top Systemic Risks Of 2021

    Wednesday, March 24, 2021, 1:00 p.m.-2:00 p.m. Eastern time (17:00-18:00 GMT) | Renee Murphy, Alla Valente, Salvatore Schiano

    They originate as systemic risk events before becoming your current nightmare scenario. These external events impact your firm and your customers but are completely out of your control. Most firms...

  • Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021

    The 11 Providers That Matter Most And How They Stack Up
    March 3, 2021 | David Holmes

    In our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...

  • Report Best Practices And Trends: Voice Biometrics

    Voice Biometrics Can Improve Security And Customer Experience
    February 10, 2021 | Andras Cser, Sean Ryan

    Voice biometrics offers improved account access security and user experience. Modern voice biometrics solutions resist replay attacks and have improved in accuracy and performance in the past five...

  • Report The Top Systemic Risks, 2021

    Landscape: The Governance, Risk, And Compliance Playbook

    They originate as systemic risk events before becoming your current nightmare scenario. These external events impact your firm and your customers but are completely out of your control. Most firms...

  • Report Remove The Mystery From Security Metrics

    Performance Management: The S&R Practice Playbook
    February 5, 2021 | Jeff Pollard

    CISOs continue to have difficulty creating meaningful security metrics despite a decade of discussion. Without good metrics, the security organization can't participate in business conversations...

  • Report Rethink Supply Chain Risk And Strategy In An Uncertain World

    Strategic Plan: The Governance, Risk, And Compliance Playbook
    February 3, 2021 | Alla Valente, George Lawrie

    Continuously improving customer experience (CX) is critical for your enterprise. But the quality of CX depends on your supply chain's resilience in the face of mounting risks, especially with...

  • Report Now Tech: Cloud Security Gateways, Q1 2021

    Forrester's Overview Of 16 Cloud Security Gateway Providers
    January 26, 2021 | Andras Cser

    You can use cloud security gateway (CSG, also known as cloud access security broker or CASB) solutions to detect and protect against: 1) data loss, 2) excessive sensitive data access, and 3) use of...

  • Report The ROI Of Privacy

    Business Case: The Customer Trust And Privacy Playbook
    November 30, 2020 | Fatemeh Khatibloo, Reggie Lau

    Organizations have traditionally focused investment and resources on preventing data breaches, but consumers are growing more aware of privacy breaches and creepy experiences. B2C marketers must...

  • Report The Top Trends Shaping Anti-Money Laundering In 2020

    Robotic Process Automation, Cryptocurrencies, Real-Time Detection, And KYC Processes Gain Importance
    August 10, 2020 | Andras Cser

    With new real-time transactions gaining popularity and new legalized product markets (such as cannabis) emerging, anti-money-laundering (AML) regulations are getting tougher and more complex. This...

  • Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020

    Forrester's Overview Of 24 CIAM Providers
    June 24, 2020 | Andras Cser

    You can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...

  • Report Use Privileged Identity Management Pricing Insight For Buyer Advantage

    Understand Pricing Mechanics To Optimize Your PIM Procurement
    June 18, 2020 | Sean Ryan, Andras Cser

    Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...

  • Report Assess Your Cloud Security Readiness

    Leverage Forrester's Custom Tool To Assess Your Cloud Security Maturity Across Six Major Technology Competencies
    May 29, 2020 | Andras Cser

    As firms migrate computing and data resources to the cloud, security remains a top concern and priority for both operational and compliance reasons. S&R professionals should use our custom tool, a...

  • Report Understand The State Of Identity And Access Management, 2020

    Benchmarks: The Identity And Access Management Playbook
    April 21, 2020 | Sean Ryan, Andras Cser

    This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...

  • Report The State Of Data Security And Privacy, 2020

    Benchmarks: The Data Security And Privacy Playbook
    February 27, 2020 | Heidi Shey

    This data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...

  • Report Build The Business Case For GRC

    Business Case: The Governance, Risk, And Compliance Playbook
    January 7, 2020 | Alla Valente, Renee Murphy

    The business case for governance, risk management, and compliance (GRC) efforts too often relies on the fear of costly events or regulatory action. This report helps GRC leaders elevate the...

  • Report Forrester's 2019 Consumer Privacy Segmentation: Europe

    Understand Consumer Privacy Preferences And Behaviors To Improve Engagement, Trust, And Experience
    November 13, 2019 | Enza Iannopollo

    In this report, we explain how privacy professionals can apply Forrester's Consumer Privacy Segmentation to understand how privacy perspectives vary by geography across Europe. Armed with this...

  • Report The Forrester Wave™: Anti-Money Laundering Solutions, Q3 2019

    The Eight Providers That Matter Most And How They Stack Up
    September 24, 2019 | Andras Cser

    In our 32-criterion evaluation of anti-money laundering (AML) solution providers, we identified the eight most significant ones — ACI, BAE Systems, Featurespace, Feedzai, FICO TONBELLER,...

  • Report Decentralized Digital Identity: A Primer For B2C Marketers

    Why Bring-Your-Own-Identity Is A Trend To Watch

    Your identity is more than the standard information on your driver's license or social security card. It also encompasses how you interact with brands, what you know, how you share elements of your...

  • Report Top Recommendations For Your Security Program, 2019

    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report Best Practices: Customer Call Center Authentication

    Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
    March 22, 2019 | Andras Cser, Merritt Maxim

    Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...

Content Type

Apply

Filters

Industry

Primary Role

Region

Vendor