Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Fraud Analyst Dashboard
August 5, 2011
-
The Wheels Of PICWIC
June 27, 2011
-
Search Results
-
Report Security Strength And Ease Benchmark: US Most-Visited Federal Government Websites, 2017
Only 33% of federal customers are confident that the government keeps their personal information secure, and almost 50% rate federal website ease of use as neutral or poor. In this report for S&R...
-
Report The Okta IPO And The IDaaS Opportunity
ForecastView Document
Identity-as-a-service (IDaaS) vendor Okta recently moved into the spotlight with a successful IPO that raised $187 million of equity capital. The IPO filings gave investors and industry observers...
-
Report Security Strength And Ease Benchmark: US Online Retailers 2017
Retailers' Customer Website Security Practices Need To Improve
According to Forrester Data Online Retail Forecast, 2016 to 2021 (US), online retail sales have grown 15% year-over-year since 2015. As retailers expand their digital offerings and work to attract...
-
Report Security Strength And Ease Benchmark: US Online Retail Banking 2017
In a race to meet customer acquisition and retention targets while reducing account takeover (ATO) fraud, financial services firms have strived to ensure that their sites are both secure and easy...
-
Workshop DIGITAL TRANSFORMATION 2016
Forum For Technology Management And Digital Business Leaders #FORRDigital
Your customers, your products, your business operations, and your competitors are fundamentally digital. Both business leaders and technology innovators must transform to a thoroughly digital...
-
Report Brief: Five Ways To Help Federal S&R Pros Boost Customer Experience
In response to a spate of devastating breaches, federal agencies plan to implement security enhancements like multifactor authentication. However, federal agencies are also dealing with a history...
-
Report Five Ways For Federal Agencies To Improve The User Experience And Digital Security
Customers neither like nor trust federal digital customer experience (CX), and the situation is about to get worse. In response to recent high-profile hacks, federal agencies are set to implement...
-
Report Quick Take: 12 Lessons For Security & Risk Pros From The US OPM Breach
June 8, 2015 | Rick Holland, Andras Cser, Ed FerraraOn June 4, the United States Office of Personnel Management (OPM) disclosed a cybersecurity incident affecting at least 4 million individuals, whose personally identifiable information (PII) may...
-
Report Prioritize Tokenization To Secure The Payment Chain
EMV Is Not A Panacea For Card Payment Vulnerabilities
April 27, 2015 | Andras Cser, Ed Ferrara, John KindervagIs the credit card as US consumers know it dead? With the recent massive credit card data breaches at retailers such as Target and Home Depot, the payment industry is ripe for change. In this...
-
Workshop Forrester's Forum For Technology Leaders
Lead Your Customer-Obsessed Technology Agenda
To win in the age of the customer, technology leaders must focus on fostering a culture of collaboration between your technology team and the rest of the organization and embracing key technologies...
-
Report Brief: Washington Is Finally Jumping On The Government ID Bandwagon
Governmentwide Single Sign-On Would Usher In A Customer Experience Revolution
Although identity federation and trusted identity providers (IdPs) such as Experian, ID.me, PayPal, and Verizon Universal Identity Services (UIS) have been around for a long time, they have yet to...
-
Report An S&R Pro's Guide To Security To, In, And From The Cloud
Embrace Cloud As Part Of The Shift To Business Technology
As organizations rapidly adopt cloud-based infrastructure, platform, and application services, cloud security continues to be a major concern. Now, security and risk professionals need to provide a...
-
Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2
Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"
December 30, 2013 | Eve Maler, Andras CserIt's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same time,...
-
Report Security's Cloud Revolution Is Upon Us
Understanding Information Security Amid Major Cloud Disruption
August 2, 2013 | Ed Ferrara, Andras CserA perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...
-
Report Mobile Authentication: Is This My App? Is This My User?
Strategy Deep Dive: The Mobile Security And Operations Playbook
December 5, 2012 | Andras Cser, Chenxi WangMobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to...
-
Webinar Hi, This Is Your Fraudster Calling! The 10 Commandments Of Telephone Fraud Management
March 30, 2012 | Andras CserWhile many companies successfully manage fraud on web and mobile channels, often they fall behind on the phone channel: Fraudsters can easily enroll in online account access, take over accounts,...
-
Report Identity And Access Management: 2012 Budget And Planning Guide
A Review Of Budgets, Spending Intentions, Technology Adoption, And Key Trends
December 15, 2011 | Andras Cser, Eve MalerTo help Forrester clients with their identity and access management (IAM) strategy for 2011, Forrester predicted four significant trends. So how'd we do? We got two right and two half right....
-
Report Case Study: Online Retailer Uses New Fraud Detection Systems To Cut Fraud Loss Rates
August 5, 2011 | Andras CserA North American online retailer found that fraud losses ate at profits and affected the customer experience. The retailer's manual fraud management processes could not scale with the volume of its...
-
Report Your Data Protection Strategy Will Fail Without Strong Identity Context
Protecting Information Consistently With Identity Context (PICWIC) Is A Must
June 27, 2011 | Andras CserAccording to Forrester survey data, "trusted" insiders and business partners, intentionally or unintentionally, are responsible for 43% of security breaches. The recent WikiLeaks breach illustrates...
-
Report Enterprise Single Sign-On: The Fast Lane To Identity And Access Management
November 9, 2010 | Andras CserDesktop or enterprise single sign-on (E-SSO) is a relatively easy way to provide end user convenience and to get started in identity and access management (IAM). The end user benefits of E-SSO are...
-
Report Case Study: Improving Healthcare IT With Streamlined Access To Clinical Applications
How One Healthcare Provider Improved The End User Experience Of 1,500 Physicians
October 6, 2010 | Andras CserIn today's healthcare environment, physicians must access a wide array of IT applications to provide quality patient care. Because of the growing number of both on-premises and SaaS-based...
-
Report Case Study: A Leading Global Financial Institution Steps Up Its Campaign Against Fraud With Device Identification
August 27, 2010 | Andras CserWhen a global financial institution saw a large uptick in fraud in its commercial banking, it realized that transaction monitoring alone was insufficient. The bank needed to do more, but it was...
-
Report State Of Federation, Q2 2010
Software-As-A-Service Adoption Drives Federated Access; Provisioning Still Lags
June 18, 2010 | Andras CserThe wait is over. According to Forrester's recent security survey, adoption of identity federation jumped from less than 5% two years ago to more than 12% in 2009. Why? Because...
-
Report Case Study On Fraud Management: An eRetailer Reduces Order Reviews By 83%
April 9, 2010 | Andras CserFor online retailers, the cost of fraud is more than just lost revenue — detecting and preventing fraud can slow order fulfillment, harm brand images, and increase the number of fraud analysts...
-
Report Case Study: A North American Energy Company Presents The Carrot, Not The Stick, Of PIM
March 11, 2010 | Andras CserA North American energy company recently faced a serious challenge — it could not successfully pass Federal Energy Regulatory Commission (FERC)/North American Electric Reliability Corporation...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (7)
- Retail (5)
- Public Sector (4)
- Healthcare (3)
- Consumer Electronics (2)
- Energy & Utilities (1)
Primary Role
- Security & Risk (33)
- CIO (2)
- Customer Experience (1)
Topics
- Identity & Access Management (IAM) (22)
- Tech Sector Economics (11)
- Data & Information Protection (9)
- Governance Risk & Compliance (GRC) (8)
- eCommerce (7)
- Information Security (7)
- Security Operations & Program Governance (4)
- Cloud Computing (2)
- Customer Experience Management (2)
- Digital Marketing (2)
- Infrastructure Architectures (2)
- Measurement (2)
- Application Security (1)
- Biometrics (1)
- Consumer Mobility (1)
- Data Management (1)
- Enterprise Collaboration (1)
- Enterprise Mobility (1)
- IT Services (1)
- Mobile Application Development (1)
- Office Productivity (1)
- Packaged Solutions (1)
- Storage (1)
- User Experience (1)
Methodology
- Business Technographics (13)
- Consumer Technographics (2)
- ForecastView (1)
- Maturity Assessment (1)
Region
- United States (12)
- Canada (2)
Vendor
- Salesforce (5)
- Okta (1)
- Walmart (1)