22 results in Reports
Sort by:
Refine
  • Biometrics

Featured content

The Identity And Access Management Playbook For 2017

Evolve Your IAM Strategy For Your Digital Business

New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

Search Results

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Risk-Based Authentication, Q3 2017

    ThreatMetrix Leads With Device Support And Flexible Case Management; Kount, IBM, And Easy Solutions Follow Closely Behind
    July 17, 2017 | Andras Cser

    In our 32-criteria evaluation of risk-based authentication (RBA) providers, we identified the eight most significant ones — CA Technologies, Easy Solutions, IBM, Kount, LexisNexis Risk Solutions,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Biometric Authentication, Q1 2017

    Adoption Of User- And Mobile-Friendly Biometrics Will Kill The Password
    March 14, 2017 | Andras Cser, Alexander Spiliotes

    As users increasingly demand frictionless authentication everywhere, biometrics solutions have garnered significant attention for both authentication and fraud prevention — especially on mobile and...

  • For Customer Experience Professionals

    Report

    Report Digital Customer Experience Trends, 2017

    Landscape: The Digital Customer Experience Improvement Playbook
    February 7, 2017 | Allegra Burnette, Tony Costa

    In 2016's edition of this report about digital customer experience (CX) trends, Forrester identified the rise of conversational interfaces and concierge services. In this year's report, we examine...

  • For Security & Risk Professionals

    Report

    Report Top Trends Shaping IAM In 2017

    Landscape: The Identity And Access Management Playbook
    November 21, 2016 | Merritt Maxim, Andras Cser

    For today's digital businesses, identity and access management (IAM) involves far more than just provisioning and enforcing employee access to corporate resources. S&R pros must now govern access...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Behavioral Biometrics

    Security Pros Can Reduce Fraud Without Damaging Customers' Digital Experience
    October 4, 2016 | Andras Cser, Merritt Maxim

    Behavioral biometrics continuously monitors user behavior, such as typing speed, mouse movements, and touchscreen interactions, to build a baseline profile from which security and risk...

  • For Security & Risk Professionals

    Report

    Report Brief: Top 10 Fraud Management Trends S&R Pros Should Watch In 2016

    Biometric Authentication Is Set To Take Off
    January 4, 2016 | Andras Cser

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, consultations, and vendor briefings; research projects; and...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Voice Biometrics

    March 30, 2015 | Andras Cser, Heidi Shey

    While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...

  • For eBusiness & Channel Strategy Professionals

    Report

    Report Brief: Disrupting Payments — Commerce Innovators Signal What Is To Come

    Key Themes From Finovate Fall And Money20/20 Center Around Redefining Digital Identity And Delivering Enhanced Commerce Value
    December 19, 2014 | Denee Carrington

    Digital and mobile technology is evolving rapidly and transforming the way consumers and businesses interact. Investors are actively targeting the payments space as hundreds of well-funded...

  • For eBusiness & Channel Strategy Professionals

    Report

    Report Predictions 2015: The Quest For Security Will Dominate The Payments Marketplace In The US

    November 17, 2014 | Denee Carrington

    The US consumer payments ecosystem has been slow to shift to digital payments. Millions of consumers and many large businesses have experienced the ramifications of this lag in the form of payment...

  • For Security & Risk Professionals

    Report

    Report Predictions 2015: Identity Management, Fraud Management, And Cybersecurity Converge

    Convergence Will Help S&R Pros Fight Cybercrime And Privacy Abuse Without Affecting Customer Experience And Business Agility
    November 12, 2014 | Andras Cser

    As firms exploit digital technologies both to create new sources of value for customers and to increase their operational agility, identity and access management (IAM) requires far more than just...

  • For Security & Risk Professionals

    Report

    Report Brief: Apple Pay Signals A Fundamental Shift In Secure Payments Technologies

    September 22, 2014 | Andras Cser, Denee Carrington

    During the past year, customers, US customers in particular, were rocked by revelations that hackers had stolen their credit and debit card numbers from trusted and respected retailers such as...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Apple Positioned For Key Role In Secure Payment Processing, Fraud Prevention

    Touch ID, NFC, And iTunes Are Key Ingredients For A Payment Ecosystem Offering Superior Client-Side Fraud Management
    June 5, 2014 | Andras Cser

    On Monday, June 2, 2014, at their Worldwide Developer Conference, among a number of other things, Apple announced that it has opened up its fingerprint reader, Touch ID, to third-party...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2

    Three Generations Of Vendor Solutions Tackle Various Challenges
    February 24, 2014 | Eve Maler, Andras Cser

    Part 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2

    Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"
    December 30, 2013 | Eve Maler, Andras Cser

    It's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Apple's iPhone 5S: The "S" Is For Security

    Biometrics Is Reborn On The Mobile Phone
    September 11, 2013 | Andras Cser, Eve Maler

    Biometrics has always held tremendous promise for better security, but it's never quite gained a solid foothold due to privacy concerns, cost of implementation, and availability of other substitute...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Consumer-Facing Identity, Q4 2012 To Q1 2013

    March 22, 2013 | Andras Cser, Eve Maler

    The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. In fact, several vendors...

  • For Security & Risk Professionals

    Report

    Report TechRadar™ For Security Pros: Strong Authentication, Q1 2012

    Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge
    February 3, 2012 | Eve Maler, Andras Cser

    The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...

  • For Security & Risk Professionals

    Report

    Report A US National ID Begins To Take Root

    WHTI, EDL, And REAL ID
    July 21, 2008 | Geoffrey Turner

    In the aftermath of the Al Qaeda attacks on 9/11, the US government realized that the lack of effective identity credentials for use in domestic air travel was a contributing factor in the attacks'...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Strong Authentication For Enterprises In 2008

    Securing The Doors To Your IT Environment
    July 16, 2008 | Bill Nagel

    Security professionals have long known that passwords are no longer sufficient to act as the sole means of gatekeeping access to enterprise network and data resources. Increasingly, they're putting...

  • For Security & Risk Professionals

    Report

    Report Biometrics: State Of The Art And Future Implications

    May 12, 2008 | Geoffrey Turner

    Biometrics has matured to the point where several technologies have been internationally standardized and incorporated into major international and national identity verification implementations...

  • For Security & Risk Professionals

    Report

    Report Biometrics: Beginning To Fulfill Its Promise

    February 26, 2008 | Geoffrey Turner, Bill Nagel

    Public uncertainty about biometrics' impact on privacy and civil liberties has long kept the technology from realizing its full potential. However, these concerns have stemmed primarily from an...

  • For Security & Risk Professionals

    Report

    Report What CISOs Can Learn From The US Government's E-Passport And HSPD-12 Initiatives

    February 6, 2007 | Geoffrey Turner

    As part of a United Nations standardization effort, the US and 14 other countries have begun issuing e-passports, which add contactless integrated circuit chips (ICs) containing biometric data on...