Skip to main content
16 results in Reports

Sorry — your search returned 0 results, so we expanded the date range to "All".

Sort by:
  • Digital Certificates & PKIs

Featured content



As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report TechRadar™: Data Security And Privacy, Q4 2017

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

  • Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • Report Welcome To The New Era Of Encryption

    S&R Pros Must Use Encryption As The Technological Keystone Of Privacy
    September 10, 2015 | John Kindervag

    Talking about encryption is all the rage these days — from revelations about the National Security Agency's (NSA's) surveillance program to a new wave of movies and TV shows featuring hackers and...

  • Report Quick Take: Use "Customer-Managed Keys" To Regain Control Of Your Data

    Your Digital Business Can Adopt Cloud Services Without Sacrificing Security Or Privacy
    February 10, 2015 | Tyler Shields, Heidi Shey

    On February 10, 2015, Box announced a new enterprise key management system for security of content stored in the Box cloud. This new key management offering adds support for external encryption,...

  • Report Predictions 2015: Data Security And Privacy Are Competitive Differentiators

    Governments, Criminals, Tech Giants, Customers, And Enterprises Spar Over Protections And Rights
    November 12, 2014 | Heidi Shey, Nick Hayes, Renee Murphy

    Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

  • Report Brief: Q&A On The US National Strategy For Trusted Identities In Cyberspace

    Without Clear Property Rights In Digital Identity, The NSTIC's Vision Will Fail
    June 2, 2014 | Eve Maler

    Many private-sector entities and consumers would value consumer identity credentials that are more secure and trustworthy — and so would the US federal government. The government initiative known...

  • Report TechRadar™: Data Security, Q2 2014

    Tools To Define, Dissect, And Defend Your Data
    April 22, 2014 | Stephanie Balaouras, John Kindervag, Heidi Shey

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...

  • Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2

    Three Generations Of Vendor Solutions Tackle Various Challenges
    February 24, 2014 | Eve Maler, Andras Cser

    Part 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the...

  • Report The Forrester Wave™: E-Signatures, Q2 2013

    April 29, 2013 | Craig Le Clair

    Electronic signatures are gaining momentum and becoming an increasingly popular topic of inquiries by Forrester clients. In retrospect, today's e-signature users will be seen as early adopters —...

  • Report Kill Your Data To Protect It From Cybercriminals

    July 12, 2012 | John Kindervag

    As cybercriminals have become more skillful and sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape...

  • Report TechRadar™ For Security Pros: Strong Authentication, Q1 2012

    Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge
    February 3, 2012 | Eve Maler, Andras Cser

    The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...

  • Report E-Signatures Q&A: Legalize It

    Minimize The Risks Of Eliminating External-Facing Paper-Based Processes
    December 2, 2009 | Bill Nagel

    Electronic signatures (e-signatures), with their roots in paperwork elimination initiatives, have been edging into greater prominence due to the greater regulatory, legal, and economic pressures...

  • Report Best Practices: Implementing Strong Authentication In Your Enterprise

    Kill Two Birds With One Token
    July 23, 2009 | Bill Nagel

    The adoption of strong multifactor authentication (MFA) is on the rise. It's often the first port of call on the journey to a fuller identity and access management implementation; MFA directly...

  • Report Case Study: For Avaya, Customers Are Not A Token Consideration

    A Plug-And-Go Smart Token Combines With PKI For Security And Auditability
    July 23, 2009 | Bill Nagel

    Rick Robinson at Avaya had a vision for a multifunctional second-factor authentication credential that would satisfy customer compliance requirements without significant adverse effects on his...

  • Report Extending Mobile Identity Beyond Authentication

    Banks, Mobile Operators, And Vendors Team Up For SIM Card-Based Security
    April 11, 2008 | Bill Nagel

    With mobile phones reaching saturation levels in many countries, banks and other service providers are taking a second look at providing financial and commercial services over the mobile channel....

  • Report Government eID Projects Need Private Sector Initiative And Support For Broader Success

    A Look At Europe's Experience With PKI-Enabled National ID Cards

    April 7, 2008 | Bill Nagel

    To date, at least 12 European countries have either developed or rolled out national electronic citizen IDs (eIDs) based on a government-created and -managed public key infrastructure (PKI) or are...

Content Type