Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Anatomy Of AML Programs
August 10, 2020
-
Major Components Of The ERFM Environment
July 21, 2020
-
Search Results
-
Report Build Your Identity And Access Management Roadmap
Roadmap: The Identity And Access Management Playbook
You must base your identity and access management (IAM) roadmap on a well-defined strategy that establishes and articulates the business need and value of IAM across your entire organization. Your...
-
Webinar Customer Identity And Access Management: What's Hot And What's Not
Based On The Forrester Wave™
November 17, 2020 | Andras CserIn this webinar, we review the evaluation criteria and results of Forrester's Q4 2020 customer identity and access management (CIAM) Wave. We look at scores of the evaluated solutions as well as...
-
Report The Future Of Identity And Access Management
Vision: The Identity And Access Management Playbook
Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...
-
Report Forrester's Identity And Access Management Maturity Assessment
Assessment: The Identity And Access Management Playbook
Forrester's IAM maturity assessment tool is designed to help S&R professionals identify gaps in their current IAM strategy across all major identity and access management (IAM) functional areas,...
-
Webinar Key Trends In Customer-Facing Identity And Access Management
September 30, 2020 | Andras CserThis webinar looks at the key trends in customer identity and access management (CIAM). We look at integration requirements outside of the traditional security arena and user profile management...
-
Report The Top Trends Shaping Anti-Money Laundering In 2020
Robotic Process Automation, Cryptocurrencies, Real-Time Detection, And KYC Processes Gain Importance
August 10, 2020 | Andras CserWith new real-time transactions gaining popularity and new legalized product markets (such as cannabis) emerging, anti-money-laundering (AML) regulations are getting tougher and more complex. This...
-
Webinar So You're Implementing Containers? Secure Them!
Technology leaders are jumping at the chance to implement containers, and security leaders are scrambling to figure out how to protect them. Join us for a fireside chat about key container security...
-
Report Best Practices For Container Security
Protecting Containerized Applications Requires Technical And Organizational Steps
Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...
-
Report Best Practices For eCommerce And Retail Fraud Management
Balancing Secure Customer Experiences With Fraud Management Efficiency
July 21, 2020 | Andras CsereCommerce and retail fraud management (ERFM) is a tightrope that forces security and risk (S&R) pros to balance the business need for frictionless customer experiences with fraud avoidance. This...
-
Report The Top Security Technology Trends To Watch, 2020
Ten Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top 10 security technologies to...
-
Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020
Forrester's Overview Of 24 CIAM Providers
June 24, 2020 | Andras CserYou can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...
-
Webinar Top Security Technologies To Watch, 2020
Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...
-
Report Use Privileged Identity Management Pricing Insight For Buyer Advantage
Understand Pricing Mechanics To Optimize Your PIM Procurement
Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...
-
Report Building A Customer-Obsessed IAM Team
Organization: The Identity And Access Management Playbook
For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides job descriptions and an...
-
Webinar Key Trends Impacting Anti-Money Laundering
June 3, 2020 | Andras CserWith increasing regulatory scrutiny and skyrocketing online enrollment and account applications, anti-money laundering (AML) has gained particular importance in the past two years. This webinar...
-
Report Assess Your Cloud Security Readiness
Leverage Forrester's Custom Tool To Assess Your Cloud Security Maturity Across Six Major Technology Competencies
May 29, 2020 | Andras CserAs firms migrate computing and data resources to the cloud, security remains a top concern and priority for both operational and compliance reasons. S&R professionals should use our custom tool, a...
-
Report The Forrester Wave™: Risk-Based Authentication, Q2 2020
The Seven Providers That Matter Most And How They Stack Up
May 27, 2020 | Andras CserIn our 33-criterion evaluation of risk-based authentication (RBA) providers, we identified the seven most significant ones — AppGate, IBM, Kount, LexisNexis Risk Solutions, OneSpan, RSA, and...
-
Report How A Least Privilege Model Can Reduce Dynamic Access Risks
Applying Zero Trust To Address Overprivileged Employee/Entity Access
Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either...
-
Report Video: The Five Pillars Of A Robust And Resilient CIAM Strategy
How Building An Identity Foundation Helps Drive Customer Trust And Loyalty
May 11, 2020 | Andras CserIn a world where online interactions not only augment but replace in-person interactions, robust and resilient customer identity and access management (CIAM) plays a critical role. To help guide...
-
Report Understand The State Of Identity And Access Management, 2020
Benchmarks: The Identity And Access Management Playbook
This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...
-
Report The Forrester Customer-Obsessed Identity And Access Management Operating Model
Continuous Improvement: The Identity And Access Management Playbook
Being customer obsessed creates advantage and resiliency in times of change or difficulty. This is especially true for customer identity and access management (CIAM): The security customer...
-
Webinar Recapping The 2020 RSA Conference: Forrester’s Perspectives
The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week...
-
Report The Top Trends Driving Cloud Workload Security In 2020
Market Consolidation, SaaS Offerings, And Remediation And DevOps Integration Are Reshaping The CWS Market
March 3, 2020 | Andras CserCloud workload security (CWS) solutions are deployed to detect, mitigate, and prevent cloud misconfigurations, configuration drift, identity and privilege proliferations, and vulnerabilities in...
-
Report Optimize User Experience With Passwordless Authentication
Improve User Experience And Security And Lower The Cost Of Cross-Channel Authentication
With the evolution of numerical computing, the password has lost its ability to protect critical applications and data. This report looks at passwordless authentication, explaining how it can...
-
Report Using Zero Trust To Kill The Employee Password
Secure Workforce Access With Stronger Authentication Methods
Passwords are easy pickings for cybercriminals and the culprit behind many cyberattacks. Administrative costs and user productivity losses add insult to injury. So why are so many organizations...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (14)
- Retail (11)
- Healthcare (4)
- Public Sector (4)
- Media & Entertainment (3)
- Energy & Utilities (2)
- Manufacturing (2)
Topics
- Identity & Access Management (IAM) (39)
- Information Security (22)
- Security Operations & Program Governance (21)
- Cloud Computing (19)
- Application Security (18)
- Governance Risk & Compliance (GRC) (18)
- Data & Information Protection (16)
- Measurement (16)
- Business & IT Alignment (9)
- Financial Management (8)
- Pandemic (5)
- eCommerce (4)
- Customer Experience Management (3)
- Tech Sector Economics (3)
- Architecture & Technology Strategy (2)
- Biometrics (2)
- Customer Relationship Management (CRM) (2)
- Employee Experience (2)
- Enterprise Architecture Domains & Practices (2)
- IT Process Automation (2)
- Organization (2)
- Application Management (1)
- Artificial Intelligence (AI) (1)
- Data Centers & Data Center Networking (1)
- Enterprise Mobility (1)
- Internet of Things (IoT) (1)
- Mobile Application Development (1)
- Networking (1)
- Packaged Solutions (1)
- Program & Project Management (1)
- Storage (1)
- Telecommunications Services (1)
Methodology
- Forrester Wave (7)
- Now Tech (7)
- Maturity Assessment (2)
- Online Maturity Assessment (2)
- Business Technographics (1)
- Forrester Tech Tide (1)
- Predictions (1)
Vendor
- Cisco (4)
- Microsoft (4)
- BAE Systems (3)
- FICO (3)
- IBM (3)
- SAS (3)
- Symantec (3)
- Google (2)
- Okta (2)
- Accenture (1)
- Akamai (1)
- Atos (1)
- CA Technologies (1)
- Capgemini (1)
- Centrify (1)
- Check Point (1)
- Cognizant (1)
- CyberArk (1)
- Deloitte (1)
- Equifax (1)
- Experian (1)
- EY (1)
- ForgeRock (1)
- Gemalto (1)
- Infosys (1)
- Intel (1)
- KPMG (1)
- Micro Focus (1)
- Neustar (1)
- OpenText (1)
- Oracle (1)
- Palo Alto Networks (1)
- Pitney Bowes (1)
- PwC (1)
- RSA (1)
- SailPoint (1)
- Salesforce (1)
- SAP (1)
- Tata Consultancy Services (TCS) (1)
- Wipro (1)