Featured content
The Identity And Access Management Playbook For 2021
Evolve Your IAM Strategy For Your Digital Business
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
Search Results
-
Report Best Practices And Trends: Voice Biometrics
Voice Biometrics Can Improve Security And Customer Experience
Voice biometrics offers improved account access security and user experience. Modern voice biometrics solutions resist replay attacks and have improved in accuracy and performance in the past five...
-
Report How A Least Privilege Model Can Reduce Dynamic Access Risks
Applying Zero Trust To Address Overprivileged Employee/Entity Access
Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either...
-
Report Develop Actionable Business-Centric Identity And Access Management Metrics
Performance Management: The Identity And Access Management Playbook
Many security and risk (S&R) professionals continue to struggle to sustain identity and access management (IAM) as a top business technology priority. S&R pros who succeed at nurturing their...
-
Report Now Tech: Privileged Identity Management, Q2 2020
Forrester's Overview Of 17 Privileged Identity Management Providers
April 2, 2020 | Sean RyanYou can use PIM offerings to reduce exposure to the most damaging types of breaches, comply with a growing list of regulations, replace manual processes for oversight of privileged accounts, and...
-
Report Optimize User Experience With Passwordless Authentication
Improve User Experience And Security And Lower The Cost Of Cross-Channel Authentication
With the evolution of numerical computing, the password has lost its ability to protect critical applications and data. This report looks at passwordless authentication, explaining how it can...
-
Report Using Zero Trust To Kill The Employee Password
Secure Workforce Access With Stronger Authentication Methods
Passwords are easy pickings for cybercriminals and the culprit behind many cyberattacks. Administrative costs and user productivity losses add insult to injury. So why are so many organizations...
-
Report Prepare For Decentralized Digital Identity: Security SWOT
Benefits Of Privacy And Centralization Get Hampered By Lack Of Trust, Early Fragmentation, And Growing Pains Of Wallet Management
Decentralized digital identity (DDID) is not just a technology buzzword: It promises a complete restructuring of the currently centralized physical and digital identity ecosystem into a...
-
Report The Forrester Tech Tide™: Identity And Access Management, Q4 2019
Seventeen Technology Categories Underpin The IAM Market
Identity and access management (IAM) is increasingly critical to firms' ability to win, serve, and retain their customers. To accelerate their performance in IAM, companies are evaluating and...
-
Report Forrester Analytics: IAM Software Forecast, 2018 To 2023 (Global)
ForecastView Document
Identity and access management (IAM) software tools help digital businesses provide access to employees, partners, and customers without sacrificing security or user experience. This data-driven...
-
Report The Forrester Tech Tide™: Digital Workspace Tech For Employee App Enablement, Q2 2019
18 Technologies That Empower Employees With Access To Critical Productivity Apps
April 16, 2019 | Andrew HewittForrester's employee experience (EX) research is grounded in the idea that what makes employees happiest at work is their ability to get meaningful work done every day. Applications play a...
-
Report Best Practices: Customer Call Center Authentication
Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...
Content Type
ApplyFilters
Primary Role
Methodology
- Forrester Tech Tide (2)
- ForecastView (1)
Vendor
Analyst
- Andras Cser (9)
- Sean Ryan (8)
- Merritt Maxim (2)
- Andrew Hewitt (1)
- Jennifer Adams (1)