Featured content
The Identity And Access Management Playbook For 2017
Evolve Your IAM Strategy For Your Digital Business
New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...
Search Results
-
For Security & Risk Professionals
Report
Report Develop Identity And Access Management Metrics That Matter To The Business
Performance Management: The Identity And Access Management Playbook
Most security and risk (S&R) professionals struggle to ensure that identity and access management (IAM) remains a top business technology priority. S&R pros who succeed at nurturing their internal...
-
For Security & Risk Professionals
Report
Report Forrester's Customer IAM Security Maturity Assessment Model
Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...
-
For Security & Risk Professionals
Report
Report Improve Customer Account Security Without Compromising Experience
Password Policies, Notifications, And Attribute Immutability Are Key For Online Account Security
When customers fall victim to online account hijacking, it can be both upsetting and confusing. It can also cause them lasting damage financially and personally. Unfortunately, most digital...
-
For Security & Risk Professionals
Report
Report Five Best Practices To Alleviate Employee Password Burdens While Reducing Security Risks
Save Your Firm A Fistful Of Dollars With Effective Password Management
September 18, 2015 | Merritt Maxim, Jennie DuongAlthough security and risk (S&R) pros lament the problems posed by passwords, passwords remain the most common form of employee authentication for IT systems. Passwords frustrate both employees and...
-
For Security & Risk Professionals
Report
Report How To Get Away With Murder: Authentication Technologies That Will Help You Kill Passwords
S&R Pros Can Coexist With Customer And Employee Passwords Today While Plotting Their Demise In The Next 36 Months
As computing processing power continues to increase dramatically, it will soon become possible to break even the most complex passwords, making every firm on the planet vulnerable to devastating...
-
For Security & Risk Professionals
Report
Report Benchmark Your Employee Password Policies And Practices
The Good, The Bad, And The Ugly: S&R Pros Have No Choice But To Coexist With Passwords While Assessing Alternatives
September 9, 2015 | Merritt Maxim, Jennie DuongBoth employees and security and risk (S&R) professionals lament password problems, but for all their issues and rumored demise, passwords remain the most common form of user authentication for apps...
-
For Security & Risk Professionals
Report
Report Lessons Learned From Global Customer Data Breaches And Privacy Incidents Of 2013-14
Frustrated security and risk (S&R) professionals once wished for more media coverage of customer data breaches and privacy abuses to help them raise the importance of security with naive business...
-
For Security & Risk Professionals
Report
Report Brief: Washington Is Finally Jumping On The Government ID Bandwagon
Governmentwide Single Sign-On Would Usher In A Customer Experience Revolution
Although identity federation and trusted identity providers (IdPs) such as Experian, ID.me, PayPal, and Verizon Universal Identity Services (UIS) have been around for a long time, they have yet to...
-
For Security & Risk Professionals
Report
Report What You Need To Know About The FIDO Alliance And Its Impact On User Authentication
This Heavyweight Standards Body Is In A Race Against Time And Market Innovation For Enterprise Success
July 23, 2014 | Andras Cser, Eve MalerThe model for user authentication most online services have relied on heavily for decades — passwords, often with security questions for account recovery — is breaking down. The Fast...
-
For Security & Risk Professionals
Report
Report Brief: Q&A On The US National Strategy For Trusted Identities In Cyberspace
Without Clear Property Rights In Digital Identity, The NSTIC's Vision Will Fail
June 2, 2014 | Eve MalerMany private-sector entities and consumers would value consumer identity credentials that are more secure and trustworthy — and so would the US federal government. The government initiative...
-
For Security & Risk Professionals
Report
Report Quick Take: Stem The "Heartbleed"
How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs
April 11, 2014 | John Kindervag, Tyler ShieldsTo secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive...
-
For Security & Risk Professionals
Report
Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2
Three Generations Of Vendor Solutions Tackle Various Challenges
February 24, 2014 | Eve Maler, Andras CserPart 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Privileged Identity Management, Q1 2014
The Nine Providers That Matter Most And How They Stack Up
February 3, 2014 | Andras CserThe privileged identity management (PIM) market has matured significantly during the past three years, and it continues to play a significant role in protecting an organization's data and in...
-
For Security & Risk Professionals
Report
Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2
Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"
December 30, 2013 | Eve Maler, Andras CserIt's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same...
-
For Security & Risk Professionals
Report
Report The Forrester Customer Authentication Assessment Framework
June 12, 2013 | Eve Maler, Andras CserForrester clients often face a hybrid challenge with customer-facing websites: optimizing both security and usability. The tightest security can be a usability disaster and the most user-friendly...
-
For Security & Risk Professionals
Report
Report Simplify Identity And Access Management Processes To Reduce Costs, Increase Business Efficiency, And Make Users Happy
April 4, 2013 | Andras CserThis report outlines the process and procedures of Forrester's solution for security and risk (S&R) professionals looking to build their identity and access management (IAM) strategy. S&R...
-
For Security & Risk Professionals
Report
Report Inquiry Spotlight: Consumer-Facing Identity, Q4 2012 To Q1 2013
March 22, 2013 | Andras Cser, Eve MalerThe challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. In fact, several vendors...
-
For Security & Risk Professionals
Report
Report TechRadar™ For Security Pros: Strong Authentication, Q1 2012
Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge
February 3, 2012 | Eve Maler, Andras CserThe strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...
-
For Security & Risk Professionals
Report
Report Breaking Down Entropy And Passwords
Understanding The Fundamentals Of Effective Password Policies
October 11, 2011 | Chenxi WangProtecting access to information technology assets by using passwords is as old as the concept of IT security itself. Today, passwords remain a popular means of authentication. Each service guarded...
-
For Security & Risk Professionals
Report
Report The "Venn" Of Federated Identity
Portable Identity Gives New Options To Companies, Consumers, And Clouds
June 3, 2011 | Eve MalerFast-moving cloud and consumer identity trends are driving shifts in how IT professionals control user access and provide personalized service to networked applications. As IT professionals move to...
-
For Security & Risk Professionals
Report
Report Enterprise Fraud Management Predictions: 2011 And Beyond
You Must Invest In Commercial Solutions To Combat Sophisticated Fraud Rings
December 8, 2010 | Andras CserForrester uncovered three major trends for 2011 that organizations and vendors alike must address to combat increasingly sophisticated fraud rings. First, fraud professionals should insist that...
-
For Security & Risk Professionals
Report
Report Market Overview: Privileged Identity Management
Six New Features And Capabilities Redefine PIM Architecture
December 8, 2010 | Andras CserPrivileged identity management (PIM) is composed of password safes, sensitive entitlement management, and session recording and auditing. It's used primarily for managing system administrator...
-
For Security & Risk Professionals
Report
Report Case Study: A North American Energy Company Presents The Carrot, Not The Stick, Of PIM
March 11, 2010 | Andras CserA North American energy company recently faced a serious challenge — it could not successfully pass Federal Energy Regulatory Commission (FERC)/North American Electric Reliability Corporation...
-
For Security & Risk Professionals
Report
Report Shift Happened In The Strong Authentication Market In 2009
Key Vendors Made Dramatic Moves And Are Looking At A Cloudy Future
February 1, 2010 | Bill NagelThe strong authentication market is on the move — slowly but surely. Nearly half of the authentication vendors profiled in Forrester's July 2008 market overview have since changed hands. Even...
-
For Security & Risk Professionals
Report
Report Active Directory Q&A: Demand Rises
Directory Consolidation Saves On Administrative Costs, Eases Provisioning
August 11, 2009 | Andras CserFor the past 10 years, Active Directory (AD) has remained the backbone of identity infrastructures. Organizations continue to struggle with consolidating AD domains across the enterprise and...
- 1
- 2
Content categories
- Reports (29)
- Events (2)
- Charts & Figures (61)
- Everything (92)
Refine your results
Date Range
- Past 7 days (1)
- Past 6 months (1)
- Past 12 months (2)
- Past 18 months (2)
Methodology
- Business Technographics (3)
- Forrester Wave (1)
- TechRadar (1)
Industry
- Public Sector (2)
- Energy & Utilities (1)
- Healthcare (1)
- Retail (1)
Market Imperatives
- Drive revenue with great customer experience (2)
- Build an insights-driven organization (1)
- Differentiate with digital (1)
Region
- North America (6)
- Europe (4)
- Asia Pacific (1)
Vendor
- Dell (1)
- Salesforce (1)
Analyst
- Andras Cser (21)
- Merritt Maxim (6)
- Fatemeh Khatibloo (1)
- Heidi Shey (1)
- Rick Parrish (1)
- + Show All
- Stephanie Balaouras (1)
