Advanced Search
66 results in Reports
Sort by:
Refine
  • Authentication

Featured content

The Identity And Access Management Playbook For 2017

Evolve Your IAM Strategy For Your Digital Business

New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

Search Results

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Biometric Authentication, Q1 2017

    Adoption Of User- And Mobile-Friendly Biometrics Will Kill The Password
    March 14, 2017 | Andras Cser, Alexander Spiliotes

    As users increasingly demand frictionless authentication everywhere, biometrics solutions have garnered significant attention for both authentication and fraud prevention — especially on mobile and...

  • For Security & Risk Professionals

    Report

    Report Mobile Application Authentication Trends And Best Practices

    The Right Authentication Method Can Make Or Break A Great Digital Experience
    March 2, 2017 | Andras Cser, Michael Facemire

    Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For Security & Risk Professionals

    Report

    Report Forrester's Risk-Driven Identity And Access Management Process Framework

    Process: The Identity And Access Management Playbook
    January 6, 2017 | Andras Cser

    Identity and access management (IAM) processes have always been convoluted. They affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to...

  • For Security & Risk Professionals

    Report

    Report Forrester's Customer IAM Security Maturity Assessment Model

    December 12, 2016 | Andras Cser, Merritt Maxim

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Behavioral Biometrics

    Security Pros Can Reduce Fraud Without Damaging Customers' Digital Experience
    October 4, 2016 | Andras Cser, Merritt Maxim

    Behavioral biometrics continuously monitors user behavior, such as typing speed, mouse movements, and touchscreen interactions, to build a baseline profile from which security and risk...

  • For Security & Risk Professionals

    Report

    Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    September 30, 2016 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • For CIO Professionals

    Report

    Report Don't Get Confused By The Blockchain Hype In Banking

    The Reality Of Blockchain In Banking And Banking Platform Vendors' Views On Blockchain Don't Always Align
    June 16, 2016 | Martha Bennett, Jost Hoppermann

    Blockchain technology promises to give rise to new opportunities and exciting business models as well as revolutionize a number of the most expensive and complex systems and processes in banking....

  • For Security & Risk Professionals

    Report

    Report Brief: Five Pitfalls To Avoid For A Pain-Free Two-Factor Authentication Deployment

    Communication, Training, And Documentation Are Essential For Success
    May 23, 2016 | Merritt Maxim, Andras Cser

    In this brief, we examine five pitfalls that security pros should take care to avoid when deploying a two-factor authentication solution. For each pitfall, we provide security pros with actionable...

  • For CIO Professionals

    Report

    Report Q&A: Forrester's Top Five Questions About Blockchain

    Most Of What You Wanted To Know About Blockchain But Were Afraid To Ask
    April 20, 2016 | Martha Bennett

    "Blockchain" continues to generate plenty of headlines in both the specialist and mainstream press. If these — and vendor publicity materials — were anything to go by, we're on the cusp of...

  • For eBusiness & Channel Strategy Professionals

    Report

    Report Disruption Is Brewing In Digital Investment, Security, And Identity

    The 2016 FinTech Finals Showcased The Next Frontier Of Disruption
    April 14, 2016 | Zhi Ying Ng

    Financial technology (fintech) is booming: In 2015, a record $4.5 billion poured into fintech startups in Asia Pacific (AP). These disruptors have caught the attention of savvy eBusiness executives...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Mobile Security, Q1 2016

    Tools And Technology: The Mobile Security Playbook
    March 28, 2016 | Chris Sherman

    Security and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...

  • For Security & Risk Professionals

    Report

    Report Brief: Don't Ignore FIDO

    Forrester's SWOT Analysis Of FIDO Reveals That Industrywide Adoption Is Likely
    March 11, 2016 | Andras Cser, Merritt Maxim

    Fast IDentity Online (FIDO) Alliance develops and promotes technical specifications for user authentication with the aim of ending reliance on passwords for everyday login. These specifications...

  • For Security & Risk Professionals

    Report

    Report Brief: Top 10 Fraud Management Trends S&R Pros Should Watch In 2016

    Biometric Authentication Is Set To Take Off
    January 4, 2016 | Andras Cser

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, consultations, and vendor briefings; research projects; and...

  • For Security & Risk Professionals

    Report

    Report Improve Customer Account Security Without Compromising Experience

    Password Policies, Notifications, And Attribute Immutability Are Key For Online Account Security
    October 1, 2015 | Andras Cser, Merritt Maxim

    When customers fall victim to online account hijacking, it can be both upsetting and confusing. It can also cause them lasting damage financially and personally. Unfortunately, most digital...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Identity Verification Solutions

    Identity Verification Stops Customer Identity Theft And Fraud Without Affecting The Customer Experience Across Channels
    September 22, 2015 | Andras Cser, Merritt Maxim

    Because customers are spending more and more time online and engaging with you using digital channels, it's becoming much easier for criminals to commit fraud and identity theft. As your firm seeks...

  • For Security & Risk Professionals

    Report

    Report How To Get Away With Murder: Authentication Technologies That Will Help You Kill Passwords

    S&R Pros Can Coexist With Customer And Employee Passwords Today While Plotting Their Demise In The Next 36 Months
    September 14, 2015 | Andras Cser, Merritt Maxim

    As computing processing power continues to increase dramatically, it will soon become possible to break even the most complex passwords, making every firm on the planet vulnerable to devastating...

  • For Security & Risk Professionals

    Report

    Report Benchmark Your Employee Password Policies And Practices

    The Good, The Bad, And The Ugly: S&R Pros Have No Choice But To Coexist With Passwords While Assessing Alternatives
    September 9, 2015 | Merritt Maxim, Jennie Duong

    Both employees and security and risk (S&R) professionals lament password problems, but for all their issues and rumored demise, passwords remain the most common form of user authentication for apps...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Voice Biometrics

    March 30, 2015 | Andras Cser, Heidi Shey

    While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...

  • For Security & Risk Professionals

    Report

    Report Predictions 2015: Identity Management, Fraud Management, And Cybersecurity Converge

    Convergence Will Help S&R Pros Fight Cybercrime And Privacy Abuse Without Affecting Customer Experience And Business Agility
    November 12, 2014 | Andras Cser

    As firms exploit digital technologies both to create new sources of value for customers and to increase their operational agility, identity and access management (IAM) requires far more than just...

  • For Security & Risk Professionals

    Report

    Report Brief: Washington Is Finally Jumping On The Government ID Bandwagon

    Governmentwide Single Sign-On Would Usher In A Customer Experience Revolution
    October 27, 2014 | Andras Cser, Rick Parrish

    Although identity federation and trusted identity providers (IdPs) such as Experian, ID.me, PayPal, and Verizon Universal Identity Services (UIS) have been around for a long time, they have yet to...

  • For Application Development & Delivery Professionals

    Report

    Report How To Turn The USA EMV Retail Deadline Into Customer Advantage

    September 25, 2014 | George Lawrie

    In October 2015, responsibility for credit cardholder present fraud will shift from the issuer to retailers that have failed to implement chip and pin protection. Retailers with 75% of more of...

  • For Security & Risk Professionals

    Report

    Report Transform And Protect Your Customers' Mobile Moments With Seamless Authentication

    September 17, 2014 | Tyler Shields, Andras Cser

    Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers'...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Apple Positioned For Key Role In Secure Payment Processing, Fraud Prevention

    Touch ID, NFC, And iTunes Are Key Ingredients For A Payment Ecosystem Offering Superior Client-Side Fraud Management
    June 5, 2014 | Andras Cser

    On Monday, June 2, 2014, at their Worldwide Developer Conference, among a number of other things, Apple announced that it has opened up its fingerprint reader, Touch ID, to third-party...

  • For Security & Risk Professionals

    Report

    Report Five Security Priorities That Asia Pacific Firms Must Address In The Age Of The Customer

    June 2, 2014 | Manatosh Das

    Security and risk (S&R) leaders around the world face difficult challenges in 2014, but unique business and technology trends in Asia Pacific (AP) make some of these challenges more pronounced. For...