9 results in Reports
 

Sorry — your search returned 0 results, so we expanded the date range to "All".

Sort by:
Refine
  • OAuth

Featured content

The Identity And Access Management Playbook For 2018

Evolve Your Identity Strategy For The Extended Enterprise

New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

Search Results

  • Report TechRadar™: Zero Trust Identity Standards, Q1 2016

    January 5, 2016 | Merritt Maxim, Andras Cser

    Security and risk (S&R) professionals must ensure that identity and access information flows seamlessly across system and business boundaries for B2B access, employee single sign-on into cloud...

  • Report TechRadar™: Zero Trust Identity Standards, Q3 2014

    Standards In The OAuth Orbit — And SCIM — Continue To Grow
    October 7, 2014 | Andras Cser

    The Zero Trust enterprise requires enterprise applications, identity stores, mobile apps, the Internet of Things, and other systems on-premises and in the cloud to generate and consume a variety of...

  • Report API Design, Part 4: Future-Proof And Secure Your APIs To Fit Your Usage Scenarios

    Data Ownership Guides Security; Versioning Strategy And Open-Ended Design Protect Your APIs' Futures
    August 21, 2013 | Randy Heffner

    To fully exploit the business opportunity available through application programming interfaces (APIs), your designers must consider each API's purpose and audience as they answer a wide range of...

  • Report Mobile Solution Architecture: User Authentication Is The Foundation Of Mobile Trust

    Start Small And Keep An Eye On The Breadth Of Your Future Mobile Scenarios
    April 12, 2013 | Randy Heffner

    User authentication is a key foundation of security for mobile apps — as it is for application security in general. Determining which authentication approach to use for your mobile solution...

  • Report API Management For Security Pros

    April 5, 2013 | Eve Maler, Jeffrey S. Hammond

    Security professionals increasingly must respond to the needs of business owners exploring web application programming interfaces (APIs) as a new channel for recognizing business value. APIs can...

  • Report TechRadar™ For Security Pros: Zero Trust Identity Standards, Q3 2012

    October 24, 2012 | Eve Maler, Andras Cser

    This report outlines Forrester's solution to help security and risk (S&R) leaders develop their road map of IAM processes using Forrester's TechRadar™ methodology. The extended enterprise requires...

  • Report OpenID Connect Heralds The "Identity Singularity"

    Prepare For Cloud Security Improvements, Along With A Tincture Of Disruption
    October 26, 2011 | Eve Maler

    Security professionals responsible for diverse types of access management across cloud services, devices, and populations have to pull off a neat trick: control access requests that routinely cross...

  • Report Protecting Enterprise APIs With A Light Touch

    By 2012, OAuth Will Be The Incumbent Cloud API Security Solution
    July 13, 2011 | Eve Maler

    Enterprises face a tension between the cloud-friendly software environment promoted by the Web, with its easy-to-use REST interface style and proliferation of lightweight services, and the security...

  • Report The "Venn" Of Federated Identity

    Portable Identity Gives New Options To Companies, Consumers, And Clouds
    June 3, 2011 | Eve Maler

    Fast-moving cloud and consumer identity trends are driving shifts in how IT professionals control user access and provide personalized service to networked applications. As IT professionals move to...

Content Type

Apply

Filters

Methodology

Region

Vendor

Market Imperatives