Skip to main content
13 results in Everything
 

Sorry — your search returned 0 results, so we expanded the date range to "All".

Sort by:
Refine
  • North America
  • Andras Cser
  • Business Technographics

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report An S&R Pro's Guide To Security To, In, And From The Cloud

    Embrace Cloud As Part Of The Shift To Business Technology
    December 31, 2013 | Andras Cser, Stephanie Balaouras

    As organizations rapidly adopt cloud-based infrastructure, platform, and application services, cloud security continues to be a major concern. Now, security and risk professionals need to provide a...

  • Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2

    Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"
    December 30, 2013 | Eve Maler, Andras Cser

    It's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same time,...

  • Report Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption
    August 2, 2013 | Ed Ferrara, Andras Cser

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

  • Report Mobile Authentication: Is This My App? Is This My User?

    Strategy Deep Dive: The Mobile Security And Operations Playbook
    December 5, 2012 | Andras Cser, Chenxi Wang

    Mobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to...

  • Report Identity And Access Management: 2012 Budget And Planning Guide

    A Review Of Budgets, Spending Intentions, Technology Adoption, And Key Trends
    December 15, 2011 | Andras Cser, Eve Maler

    To help Forrester clients with their identity and access management (IAM) strategy for 2011, Forrester predicted four significant trends. So how'd we do? We got two right and two half right....

  • Report Your Data Protection Strategy Will Fail Without Strong Identity Context

    Protecting Information Consistently With Identity Context (PICWIC) Is A Must
    June 27, 2011 | Andras Cser

    According to Forrester survey data, "trusted" insiders and business partners, intentionally or unintentionally, are responsible for 43% of security breaches. The recent WikiLeaks breach illustrates...

  • Report Enterprise Single Sign-On: The Fast Lane To Identity And Access Management

    November 9, 2010 | Andras Cser

    Desktop or enterprise single sign-on (E-SSO) is a relatively easy way to provide end user convenience and to get started in identity and access management (IAM). The end user benefits of E-SSO are...

  • Report State Of Federation, Q2 2010

    Software-As-A-Service Adoption Drives Federated Access; Provisioning Still Lags
    June 18, 2010 | Andras Cser

    The wait is over. According to Forrester's recent security survey, adoption of identity federation jumped from less than 5% two years ago to more than 12% in 2009. Why? Because...