Featured content
The Identity And Access Management Playbook For 2017
Evolve Your IAM Strategy For Your Digital Business
New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...
Search Results
-
For Security & Risk Professionals
Report
Report Develop Identity And Access Management Metrics That Matter To The Business
Performance Management: The Identity And Access Management Playbook
Most security and risk (S&R) professionals struggle to ensure that identity and access management (IAM) remains a top business technology priority. S&R pros who succeed at nurturing their internal...
-
For Security & Risk Professionals
Report
Report Building A Customer-Obsessed IAM Team
Organization: The Identity And Access Management Playbook
For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides an overview of the skills and...
-
For Security & Risk Professionals
Report
Report Security Strength And Ease Benchmark: US Online Retailers 2017
Continuous Improvement: The Identity And Access Management Playbook
According to Forrester Data Online Retail Forecast, 2016 to 2021 (US), online retail sales have grown 15% year-over-year since 2015. As retailers expand their digital offerings and work to attract...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Customer Identity and Access Management, Q2 2017
Top Eight Providers That Matter Most And How They Stack Up
June 15, 2017 | Merritt MaximIn our 20-criteria evaluation of customer IAM (CIAM) providers, we identified the eight most significant ones — Auth0, ForgeRock, Gigya, Janrain, LoginRadius, Microsoft, Ping Identity, and...
-
For Security & Risk Professionals
Report
Report A Secure Blockchain Will Transform Security And Risk Management
Secure Payments, Cryptocurrencies, Anti-Money Laundering, Identity Verification Demand New, Distributed, And Tamper-Evident Transaction Databases
Secure blockchains will become the foundation for verifiable transactions — both business and operational — running the gamut from payments, financial transfers, and shipment tracking to identity...
-
For B2C Marketing Professionals
Report
Report Use Personal Identity And Data Management To Future-Proof Your Privacy Practices
Continuous Improvement: The Customer Trust And Privacy Playbook
May 23, 2017 | Fatemeh KhatiblooConsumers are leaving a growing digital footprint across channels and media, and they are aware that marketers use this data for financial gain. With growing concerns about data security and...
-
For Security & Risk Professionals
Report
Report Top Competencies To Look For In An IAM Systems Integrator
Cloud App Integration, Hosting, And Identity Management And Governance Skills Matter
Systems integrators (SIs) are a crucial part of identity and access management (IAM) deployments. SIs bring valuable deployment and integration experience, and their vital advice on business...
-
For Security & Risk Professionals
Report
Report Forrester Data Report: Identity And Access Management Software Forecast, 2016 To 2021 (Global)
ForecastView Document
Identity and access management (IAM) is one of the most important security functions ensuring that the right people have access to the right resources for the right reasons. In Q4 2016 and Q1 2017,...
-
For CIO Professionals
Report
Report Forrester Data: Identity And Access Management Software Forecast, 2016 To 2021 (Global)
ForecastView Spreadsheet
April 26, 2017 | Jennifer AdamsSecurity and risk professionals must protect corporate resources while giving secure access to a variety of users on a variety of devices. Identity and access management (IAM) software tools help...
-
For Security & Risk Professionals
Report
Report The Top Security Technology Trends To Watch, 2017
Tools And Technology: The S&R Practice Playbook
Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...
-
For Security & Risk Professionals
Report
Report Build Your Identity And Access Management Strategy
Strategic Plan: The Identity And Access Management Playbook
Your strategic plan for identity and access management (IAM) must establish and explain the business need and value of IAM to both technology management and business leaders. It must also describe...
-
For Security & Risk Professionals
Report
Report The Top IAM Trends From The RSA Conference 2017
Although maturing quickly and available in new virtualized and containerized forms, identity and access management (IAM) is undergoing fundamental changes in response to: 1) hybrid cloud access...
-
For Security & Risk Professionals
Report
Report TechRadar™: Biometric Authentication, Q1 2017
Adoption Of User- And Mobile-Friendly Biometrics Will Kill The Password
As users increasingly demand frictionless authentication everywhere, biometrics solutions have garnered significant attention for both authentication and fraud prevention — especially on mobile and...
-
For Security & Risk Professionals
Report
Report Mobile Application Authentication Trends And Best Practices
The Right Authentication Method Can Make Or Break A Great Digital Experience
Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...
-
For CIO Professionals
Report
Report The Top Emerging Technologies For Digital Predators
Tools And Technology: The CIO Digital Business Transformation Playbook
CIOs must constantly evaluate an array of emerging technologies and determine where to incubate and where to increase investment. While the choices are as individual as the companies, the...
-
For Security & Risk Professionals
Report
Report Security Strength And Ease Benchmark: US Online Retail Banking 2017
In a race to meet customer acquisition and retention targets while reducing account takeover (ATO) fraud, financial services firms have strived to ensure that their sites are both secure and easy...
-
For Customer Experience Professionals
Report
Report Digital Customer Experience Trends, 2017
Landscape: The Digital Customer Experience Improvement Playbook
In 2016's edition of this report about digital customer experience (CX) trends, Forrester identified the rise of conversational interfaces and concierge services. In this year's report, we examine...
-
For Security & Risk Professionals
Report
Report Making The Business Case For Identity And Access Management
Business Case: The Identity And Access Management Playbook
Security and risk (S&R) executives responsible for identity and access management (IAM) must manage users' access to sensitive applications and data without inhibiting business agility,...
-
For Security & Risk Professionals
Report
Report TechRadar™: Internet Of Things Security, Q1 2017
A Mix Of New And Existing Technologies Help Secure IoT Deployments
January 19, 2017 | Merritt MaximThis TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...
-
For Security & Risk Professionals
Report
Report Forrester's Risk-Driven Identity And Access Management Process Framework
Process: The Identity And Access Management Playbook
January 6, 2017 | Andras CserIdentity and access management (IAM) processes have always been convoluted. They affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to...
-
For Security & Risk Professionals
Report
Report Inquiry Spotlight: Security And Risk, Q3 2015 To Q3 2016
Forrester's security and risk (S&R) research team fields hundreds of inquiries from our clients every month. These inquiries help us keep track of which areas our clients find most challenging and...
-
For Security & Risk Professionals
Report
Report The Forrester Identity Management And Governance Maturity Model
Assess Your Identity Management And Governance Maturity
December 15, 2016 | Merritt MaximSecurity and risk (S&R) leaders often struggle to understand the gaps and potential security vulnerabilities related to identity management tasks such as user provisioning, access certification,...
-
For Security & Risk Professionals
Report
Report Forrester's Customer IAM Security Maturity Assessment Model
Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...
-
For Security & Risk Professionals
Report
Report Quick Take: Symantec Injects New Life Into Its Consumer Security With LifeLock Acquisition
Symantec Becomes One Of The Few Firms To Bridge Enterprise And Consumer Security And Privacy
On November 21, Symantec announced its acquisition of LifeLock for $2.3 billion. This signals a significant reinvestment in Symantec's consumer security portfolio and an expansion into new consumer...
-
For Security & Risk Professionals
Report
Report Top Trends Shaping IAM In 2017
Landscape: The Identity And Access Management Playbook
For today's digital businesses, identity and access management (IAM) involves far more than just provisioning and enforcing employee access to corporate resources. S&R pros must now govern access...
Content categories
- Reports (249)
- Playbooks (1)
- Events (23)
- Charts & Figures (620)
- Everything (893)
Refine your results
Date Range
- Past 7 days (1)
- Past 6 months (19)
- Past 12 months (37)
- Past 18 months (53)
Primary Role
- Security & Risk (184)
- CIO (17)
- Enterprise Architecture (12)
- Customer Insights (11)
- Application Development & Delivery (6)
- + Show All
- eBusiness & Channel Strategy (6)
- B2C Marketing (5)
- Infrastructure & Operations (3)
- B2B Marketing (1)
- Customer Experience (1)
- Sourcing & Vendor Management (1)
Methodology
- Business Technographics (37)
- Forrester Wave (13)
- TechRadar (12)
- Consumer Technographics (5)
- Vendor Landscape (5)
- + Show All
- ForecastView (2)
- Maturity Assessment (2)
- Maturity Model (2)
- Total Economic Impact (TEI) (2)
- Breakout Vendors (1)
Industry
- Financial Services (26)
- Public Sector (12)
- Consumer Electronics (10)
- Healthcare (7)
- Retail (4)
- + Show All
- Energy & Utilities (3)
- Manufacturing (1)
- Media & Entertainment (1)
- Travel (1)
Topics
- Authentication (69)
- Passwords (29)
- Strong Authentication (27)
- User Account Provisioning (22)
- Biometrics (21)
- + Show All
- Digital & Electronic Signatures (eSignatures) (16)
- Single Sign-On (13)
- Personal Identity & Data Management (9)
Market Imperatives
- Differentiate with digital (31)
- Excel at customer-obsessed marketing (15)
- Drive revenue with great customer experience (11)
- Build an insights-driven organization (9)
- Maximize the business value of technology (1)
Region
- North America (48)
- Europe (31)
- Asia Pacific (3)
- Africa (1)
Vendor
- Microsoft (8)
- IBM (7)
- Dell (6)
- Salesforce (6)
- Oracle (5)
- + Show All
- Wipro (5)
- Apple (4)
- CSC (4)
- Deloitte (4)
- Accenture (3)
- Amazon (3)
- Symantec (3)
- Adobe Systems (2)
- Facebook (2)
- SAP (2)
- BlackBerry (1)
- Box (1)
- Cisco Systems (1)
- EMC (1)
- Google (1)
- LinkedIn (1)
- Novell (1)
- PayPal (1)
- Tata Consultancy Services (TCS) (1)
- Verizon Communications (1)
Analyst
- Andras Cser (115)
- Merritt Maxim (50)
- Heidi Shey (16)
- Stephanie Balaouras (14)
- Fatemeh Khatibloo (11)
- + Show All
- Craig Le Clair (9)
- Chris Sherman (7)
- Brian Hopkins (5)
- Nick Hayes (5)
- Jeff Pollard (4)
- Enza Iannopollo (3)
- Frank E. Gillett (3)
- Martha Bennett (3)
- Alexander Spiliotes (2)
- David K. Johnson (2)
- Henry Peyret (2)
- Jennifer Adams (2)
- Joseph Blankenship (2)
- Laura Koetzle (2)
- Randy Heffner (2)
- Allegra Burnette (1)
- Amy DeMartine (1)
- Andrew Hogan (1)
- Benjamin Ensor (1)
- Christopher Andrews (1)
- Claire O'Malley (1)
- Ellen Carney (1)
- Gene Leganza (1)
- George Lawrie (1)
- James McCormick (1)
- Jeffrey S. Hammond (1)
- Joe Stanhope (1)
- John Brand (1)
- John R. Rymer (1)
- Josh Zelonis (1)
- Jost Hoppermann (1)
- Kelly Price (1)
- Michael Facemire (1)
- Michele Pelino (1)
- Nigel Fenwick (1)
- Oliwia Berdak (1)
- Richard Joyce (1)
- Rick Parrish (1)
- Shar VanBoskirk (1)
- Srividya Sridharan (1)
- Ted Schadler (1)
- Tony Costa (1)
- Zhi Ying Ng (1)
