Featured content
The Identity And Access Management Playbook For 2017
Evolve Your IAM Strategy For Your Digital Business
New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...
Search Results
-
For Security & Risk Professionals
Report
Report Security Strength And Ease Benchmark: US Online Retailers 2017
Continuous Improvement: The Identity And Access Management Playbook
According to Forrester Data Online Retail Forecast, 2016 to 2021 (US), online retail sales have grown 15% year-over-year since 2015. As retailers expand their digital offerings and work to attract...
-
For Security & Risk Professionals
Report
Report A Secure Blockchain Will Transform Security And Risk Management
Secure Payments, Cryptocurrencies, Anti-Money Laundering, Identity Verification Demand New, Distributed, And Tamper-Evident Transaction Databases
Secure blockchains will become the foundation for verifiable transactions — both business and operational — running the gamut from payments, financial transfers, and shipment tracking to identity...
-
For Security & Risk Professionals
Report
Report The Top Security Technology Trends To Watch, 2017
Tools And Technology: The S&R Practice Playbook
Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...
-
For Security & Risk Professionals
Report
Report TechRadar™: Biometric Authentication, Q1 2017
Adoption Of User- And Mobile-Friendly Biometrics Will Kill The Password
As users increasingly demand frictionless authentication everywhere, biometrics solutions have garnered significant attention for both authentication and fraud prevention — especially on mobile and...
-
For Security & Risk Professionals
Report
Report Mobile Application Authentication Trends And Best Practices
The Right Authentication Method Can Make Or Break A Great Digital Experience
Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...
-
For Security & Risk Professionals
Report
Report TechRadar™: Internet Of Things Security, Q1 2017
A Mix Of New And Existing Technologies Help Secure IoT Deployments
January 19, 2017 | Merritt MaximThis TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...
-
For Security & Risk Professionals
Report
Report Forrester's Risk-Driven Identity And Access Management Process Framework
Process: The Identity And Access Management Playbook
January 6, 2017 | Andras CserIdentity and access management (IAM) processes have always been convoluted. They affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to...
-
For Security & Risk Professionals
Report
Report Forrester's Customer IAM Security Maturity Assessment Model
Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...
-
For Security & Risk Professionals
Report
Report Vendor Landscape: Behavioral Biometrics
Security Pros Can Reduce Fraud Without Damaging Customers' Digital Experience
Behavioral biometrics continuously monitors user behavior, such as typing speed, mouse movements, and touchscreen interactions, to build a baseline profile from which security and risk...
-
For Security & Risk Professionals
Report
Report Evolve Your IAM Strategy For Your Digital Business
Executive Overview: The Identity And Access Management Playbook
New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...
-
For CIO Professionals
Report
Report Don't Get Confused By The Blockchain Hype In Banking
The Reality Of Blockchain In Banking And Banking Platform Vendors' Views On Blockchain Don't Always Align
Blockchain technology promises to give rise to new opportunities and exciting business models as well as revolutionize a number of the most expensive and complex systems and processes in banking....
-
For Security & Risk Professionals
Report
Report Brief: Five Pitfalls To Avoid For A Pain-Free Two-Factor Authentication Deployment
Communication, Training, And Documentation Are Essential For Success
In this brief, we examine five pitfalls that security pros should take care to avoid when deploying a two-factor authentication solution. For each pitfall, we provide security pros with actionable...
-
For CIO Professionals
Report
Report Q&A: Forrester's Top Five Questions About Blockchain
Most Of What You Wanted To Know About Blockchain But Were Afraid To Ask
April 20, 2016 | Martha Bennett"Blockchain" continues to generate plenty of headlines in both the specialist and mainstream press. If these — and vendor publicity materials — were anything to go by, we're on the cusp of...
-
For eBusiness & Channel Strategy Professionals
Report
Report Disruption Is Brewing In Digital Investment, Security, And Identity
The 2016 FinTech Finals Showcased The Next Frontier Of Disruption
April 14, 2016 | Zhi Ying NgFinancial technology (fintech) is booming: In 2015, a record $4.5 billion poured into fintech startups in Asia Pacific (AP). These disruptors have caught the attention of savvy eBusiness executives...
-
For Security & Risk Professionals
Report
Report TechRadar™: Mobile Security, Q1 2016
Tools And Technology: The Mobile Security Playbook
March 28, 2016 | Chris ShermanSecurity and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...
-
For Security & Risk Professionals
Report
Report Brief: Don't Ignore FIDO
Forrester's SWOT Analysis Of FIDO Reveals That Industrywide Adoption Is Likely
Fast IDentity Online (FIDO) Alliance develops and promotes technical specifications for user authentication with the aim of ending reliance on passwords for everyday login. These specifications...
-
For Security & Risk Professionals
Report
Report Brief: Top 10 Fraud Management Trends S&R Pros Should Watch In 2016
Biometric Authentication Is Set To Take Off
January 4, 2016 | Andras CserEach year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, consultations, and vendor briefings; research projects; and...
-
For Security & Risk Professionals
Report
Report Improve Customer Account Security Without Compromising Experience
Password Policies, Notifications, And Attribute Immutability Are Key For Online Account Security
When customers fall victim to online account hijacking, it can be both upsetting and confusing. It can also cause them lasting damage financially and personally. Unfortunately, most digital...
-
For Security & Risk Professionals
Report
Report Vendor Landscape: Identity Verification Solutions
Identity Verification Stops Customer Identity Theft And Fraud Without Affecting The Customer Experience Across Channels
Because customers are spending more and more time online and engaging with you using digital channels, it's becoming much easier for criminals to commit fraud and identity theft. As your firm seeks...
-
For Security & Risk Professionals
Report
Report How To Get Away With Murder: Authentication Technologies That Will Help You Kill Passwords
S&R Pros Can Coexist With Customer And Employee Passwords Today While Plotting Their Demise In The Next 36 Months
As computing processing power continues to increase dramatically, it will soon become possible to break even the most complex passwords, making every firm on the planet vulnerable to devastating...
-
For Security & Risk Professionals
Report
Report Benchmark Your Employee Password Policies And Practices
The Good, The Bad, And The Ugly: S&R Pros Have No Choice But To Coexist With Passwords While Assessing Alternatives
September 9, 2015 | Merritt Maxim, Jennie DuongBoth employees and security and risk (S&R) professionals lament password problems, but for all their issues and rumored demise, passwords remain the most common form of user authentication for apps...
-
For Security & Risk Professionals
Report
Report Market Overview: Voice Biometrics
While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...
-
For Security & Risk Professionals
Report
Report Predictions 2015: Identity Management, Fraud Management, And Cybersecurity Converge
Convergence Will Help S&R Pros Fight Cybercrime And Privacy Abuse Without Affecting Customer Experience And Business Agility
November 12, 2014 | Andras CserAs firms exploit digital technologies both to create new sources of value for customers and to increase their operational agility, identity and access management (IAM) requires far more than just...
-
For Security & Risk Professionals
Report
Report Brief: Washington Is Finally Jumping On The Government ID Bandwagon
Governmentwide Single Sign-On Would Usher In A Customer Experience Revolution
Although identity federation and trusted identity providers (IdPs) such as Experian, ID.me, PayPal, and Verizon Universal Identity Services (UIS) have been around for a long time, they have yet to...
-
For Application Development & Delivery Professionals
Report
Report How To Turn The USA EMV Retail Deadline Into Customer Advantage
September 25, 2014 | George LawrieIn October 2015, responsibility for credit cardholder present fraud will shift from the issuer to retailers that have failed to implement chip and pin protection. Retailers with 75% of more of...
Content categories
- Reports (69)
- Playbooks (1)
- Events (9)
- Charts & Figures (163)
- Everything (242)
Refine your results
Date Range
- Past 6 months (6)
- Past 12 months (10)
- Past 18 months (16)
Primary Role
- Security & Risk (58)
- eBusiness & Channel Strategy (3)
- Application Development & Delivery (2)
- CIO (2)
- B2C Marketing (1)
- + Show All
- Customer Insights (1)
- Enterprise Architecture (1)
Methodology
- Business Technographics (11)
- TechRadar (4)
- Forrester Wave (2)
- Vendor Landscape (2)
- Consumer Technographics (1)
- + Show All
- Maturity Assessment (1)
- Maturity Model (1)
Industry
- Financial Services (13)
- Public Sector (4)
- Consumer Electronics (2)
- Healthcare (2)
- Retail (2)
Market Imperatives
- Differentiate with digital (6)
- Drive revenue with great customer experience (4)
- Excel at customer-obsessed marketing (1)
Region
- North America (13)
- Europe (12)
- Asia Pacific (2)
- Africa (1)
Vendor
- Deloitte (2)
- Facebook (2)
- Salesforce (2)
- Adobe Systems (1)
- Apple (1)
- + Show All
- CSC (1)
- IBM (1)
- Symantec (1)
- Wipro (1)
Analyst
- Andras Cser (36)
- Merritt Maxim (12)
- Heidi Shey (5)
- Chris Sherman (4)
- Stephanie Balaouras (4)
- + Show All
- Fatemeh Khatibloo (3)
- Martha Bennett (3)
- Nick Hayes (3)
- Alexander Spiliotes (2)
- Amy DeMartine (1)
- Benjamin Ensor (1)
- Craig Le Clair (1)
- George Lawrie (1)
- Jeff Pollard (1)
- Joseph Blankenship (1)
- Josh Zelonis (1)
- Jost Hoppermann (1)
- Michael Facemire (1)
- Randy Heffner (1)
- Rick Parrish (1)
- Shar VanBoskirk (1)
- Zhi Ying Ng (1)
