29 results in Reports
Sort by:
Refine
  • Passwords

Featured content

The Identity And Access Management Playbook For 2017

Evolve Your IAM Strategy For Your Digital Business

New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

Search Results

  • For Security & Risk Professionals

    Report

    Report Develop Identity And Access Management Metrics That Matter To The Business

    Performance Management: The Identity And Access Management Playbook
    July 7, 2017 | Andras Cser, Merritt Maxim

    Most security and risk (S&R) professionals struggle to ensure that identity and access management (IAM) remains a top business technology priority. S&R pros who succeed at nurturing their internal...

  • For Security & Risk Professionals

    Report

    Report Forrester's Customer IAM Security Maturity Assessment Model

    December 12, 2016 | Andras Cser, Merritt Maxim

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...

  • For Security & Risk Professionals

    Report

    Report Improve Customer Account Security Without Compromising Experience

    Password Policies, Notifications, And Attribute Immutability Are Key For Online Account Security
    October 1, 2015 | Andras Cser, Merritt Maxim

    When customers fall victim to online account hijacking, it can be both upsetting and confusing. It can also cause them lasting damage financially and personally. Unfortunately, most digital...

  • For Security & Risk Professionals

    Report

    Report Five Best Practices To Alleviate Employee Password Burdens While Reducing Security Risks

    Save Your Firm A Fistful Of Dollars With Effective Password Management
    September 18, 2015 | Merritt Maxim, Jennie Duong

    Although security and risk (S&R) pros lament the problems posed by passwords, passwords remain the most common form of employee authentication for IT systems. Passwords frustrate both employees and...

  • For Security & Risk Professionals

    Report

    Report How To Get Away With Murder: Authentication Technologies That Will Help You Kill Passwords

    S&R Pros Can Coexist With Customer And Employee Passwords Today While Plotting Their Demise In The Next 36 Months
    September 14, 2015 | Andras Cser, Merritt Maxim

    As computing processing power continues to increase dramatically, it will soon become possible to break even the most complex passwords, making every firm on the planet vulnerable to devastating...

  • For Security & Risk Professionals

    Report

    Report Benchmark Your Employee Password Policies And Practices

    The Good, The Bad, And The Ugly: S&R Pros Have No Choice But To Coexist With Passwords While Assessing Alternatives
    September 9, 2015 | Merritt Maxim, Jennie Duong

    Both employees and security and risk (S&R) professionals lament password problems, but for all their issues and rumored demise, passwords remain the most common form of user authentication for apps...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From Global Customer Data Breaches And Privacy Incidents Of 2013-14

    November 14, 2014 | Stephanie Balaouras, Heidi Shey

    Frustrated security and risk (S&R) professionals once wished for more media coverage of customer data breaches and privacy abuses to help them raise the importance of security with naive business...

  • For Security & Risk Professionals

    Report

    Report Brief: Washington Is Finally Jumping On The Government ID Bandwagon

    Governmentwide Single Sign-On Would Usher In A Customer Experience Revolution
    October 27, 2014 | Andras Cser, Rick Parrish

    Although identity federation and trusted identity providers (IdPs) such as Experian, ID.me, PayPal, and Verizon Universal Identity Services (UIS) have been around for a long time, they have yet to...

  • For Security & Risk Professionals

    Report

    Report What You Need To Know About The FIDO Alliance And Its Impact On User Authentication

    This Heavyweight Standards Body Is In A Race Against Time And Market Innovation For Enterprise Success
    July 23, 2014 | Andras Cser, Eve Maler

    The model for user authentication most online services have relied on heavily for decades — passwords, often with security questions for account recovery — is breaking down. The Fast...

  • For Security & Risk Professionals

    Report

    Report Brief: Q&A On The US National Strategy For Trusted Identities In Cyberspace

    Without Clear Property Rights In Digital Identity, The NSTIC's Vision Will Fail
    June 2, 2014 | Eve Maler

    Many private-sector entities and consumers would value consumer identity credentials that are more secure and trustworthy — and so would the US federal government. The government initiative...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Stem The "Heartbleed"

    How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs
    April 11, 2014 | John Kindervag, Tyler Shields

    To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2

    Three Generations Of Vendor Solutions Tackle Various Challenges
    February 24, 2014 | Eve Maler, Andras Cser

    Part 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Privileged Identity Management, Q1 2014

    The Nine Providers That Matter Most And How They Stack Up
    February 3, 2014 | Andras Cser

    The privileged identity management (PIM) market has matured significantly during the past three years, and it continues to play a significant role in protecting an organization's data and in...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2

    Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"
    December 30, 2013 | Eve Maler, Andras Cser

    It's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same...

  • For Security & Risk Professionals

    Report

    Report The Forrester Customer Authentication Assessment Framework

    June 12, 2013 | Eve Maler, Andras Cser

    Forrester clients often face a hybrid challenge with customer-facing websites: optimizing both security and usability. The tightest security can be a usability disaster and the most user-friendly...

  • For Security & Risk Professionals

    Report

    Report Simplify Identity And Access Management Processes To Reduce Costs, Increase Business Efficiency, And Make Users Happy

    April 4, 2013 | Andras Cser

    This report outlines the process and procedures of Forrester's solution for security and risk (S&R) professionals looking to build their identity and access management (IAM) strategy. S&R...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Consumer-Facing Identity, Q4 2012 To Q1 2013

    March 22, 2013 | Andras Cser, Eve Maler

    The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. In fact, several vendors...

  • For Security & Risk Professionals

    Report

    Report TechRadar™ For Security Pros: Strong Authentication, Q1 2012

    Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge
    February 3, 2012 | Eve Maler, Andras Cser

    The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...

  • For Security & Risk Professionals

    Report

    Report Breaking Down Entropy And Passwords

    Understanding The Fundamentals Of Effective Password Policies
    October 11, 2011 | Chenxi Wang

    Protecting access to information technology assets by using passwords is as old as the concept of IT security itself. Today, passwords remain a popular means of authentication. Each service guarded...

  • For Security & Risk Professionals

    Report

    Report The "Venn" Of Federated Identity

    Portable Identity Gives New Options To Companies, Consumers, And Clouds
    June 3, 2011 | Eve Maler

    Fast-moving cloud and consumer identity trends are driving shifts in how IT professionals control user access and provide personalized service to networked applications. As IT professionals move to...

  • For Security & Risk Professionals

    Report

    Report Enterprise Fraud Management Predictions: 2011 And Beyond

    You Must Invest In Commercial Solutions To Combat Sophisticated Fraud Rings
    December 8, 2010 | Andras Cser

    Forrester uncovered three major trends for 2011 that organizations and vendors alike must address to combat increasingly sophisticated fraud rings. First, fraud professionals should insist that...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Privileged Identity Management

    Six New Features And Capabilities Redefine PIM Architecture
    December 8, 2010 | Andras Cser

    Privileged identity management (PIM) is composed of password safes, sensitive entitlement management, and session recording and auditing. It's used primarily for managing system administrator...

  • For Security & Risk Professionals

    Report

    Report Case Study: A North American Energy Company Presents The Carrot, Not The Stick, Of PIM

    March 11, 2010 | Andras Cser

    A North American energy company recently faced a serious challenge — it could not successfully pass Federal Energy Regulatory Commission (FERC)/North American Electric Reliability Corporation...

  • For Security & Risk Professionals

    Report

    Report Shift Happened In The Strong Authentication Market In 2009

    Key Vendors Made Dramatic Moves And Are Looking At A Cloudy Future
    February 1, 2010 | Bill Nagel

    The strong authentication market is on the move — slowly but surely. Nearly half of the authentication vendors profiled in Forrester's July 2008 market overview have since changed hands. Even...

  • For Security & Risk Professionals

    Report

    Report Active Directory Q&A: Demand Rises

    Directory Consolidation Saves On Administrative Costs, Eases Provisioning
    August 11, 2009 | Andras Cser

    For the past 10 years, Active Directory (AD) has remained the backbone of identity infrastructures. Organizations continue to struggle with consolidating AD domains across the enterprise and...