28 results in Reports
Sort by:
Refine
  • Strong Authentication

Featured content

The Identity And Access Management Playbook For 2017

Evolve Your Identity Strategy For The Extended Enterprise

New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

Search Results

  • For Security & Risk Professionals

    Report

    Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    August 18, 2017 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Risk-Based Authentication, Q3 2017

    ThreatMetrix Leads With Device Support And Flexible Case Management; Kount, IBM, And Easy Solutions Follow Closely Behind
    July 17, 2017 | Andras Cser

    In our 32-criteria evaluation of risk-based authentication (RBA) providers, we identified the eight most significant ones — CA Technologies, Easy Solutions, IBM, Kount, LexisNexis Risk Solutions,...

  • For Security & Risk Professionals

    Report

    Report Brief: Five Pitfalls To Avoid For A Pain-Free Two-Factor Authentication Deployment

    Communication, Training, And Documentation Are Essential For Success
    May 23, 2016 | Merritt Maxim, Andras Cser

    In this brief, we examine five pitfalls that security pros should take care to avoid when deploying a two-factor authentication solution. For each pitfall, we provide security pros with actionable...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Identity Verification Solutions

    Identity Verification Stops Customer Identity Theft And Fraud Without Affecting The Customer Experience Across Channels
    September 22, 2015 | Andras Cser, Merritt Maxim

    Because customers are spending more and more time online and engaging with you using digital channels, it's becoming much easier for criminals to commit fraud and identity theft. As your firm seeks...

  • For Security & Risk Professionals

    Report

    Report How To Get Away With Murder: Authentication Technologies That Will Help You Kill Passwords

    S&R Pros Can Coexist With Customer And Employee Passwords Today While Plotting Their Demise In The Next 36 Months
    September 14, 2015 | Andras Cser, Merritt Maxim

    As computing processing power continues to increase dramatically, it will soon become possible to break even the most complex passwords, making every firm on the planet vulnerable to devastating...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Voice Biometrics

    March 30, 2015 | Andras Cser, Heidi Shey

    While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...

  • For Security & Risk Professionals

    Report

    Report What You Need To Know About The FIDO Alliance And Its Impact On User Authentication

    This Heavyweight Standards Body Is In A Race Against Time And Market Innovation For Enterprise Success
    July 23, 2014 | Andras Cser, Eve Maler

    The model for user authentication most online services have relied on heavily for decades — passwords, often with security questions for account recovery — is breaking down. The Fast Identity...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Apple Positioned For Key Role In Secure Payment Processing, Fraud Prevention

    Touch ID, NFC, And iTunes Are Key Ingredients For A Payment Ecosystem Offering Superior Client-Side Fraud Management
    June 5, 2014 | Andras Cser

    On Monday, June 2, 2014, at their Worldwide Developer Conference, among a number of other things, Apple announced that it has opened up its fingerprint reader, Touch ID, to third-party...

  • For Security & Risk Professionals

    Report

    Report Brief: Q&A On The US National Strategy For Trusted Identities In Cyberspace

    Without Clear Property Rights In Digital Identity, The NSTIC's Vision Will Fail
    June 2, 2014 | Eve Maler

    Many private-sector entities and consumers would value consumer identity credentials that are more secure and trustworthy — and so would the US federal government. The government initiative known...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2

    Three Generations Of Vendor Solutions Tackle Various Challenges
    February 24, 2014 | Eve Maler, Andras Cser

    Part 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2

    Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"
    December 30, 2013 | Eve Maler, Andras Cser

    It's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same time,...

  • For Security & Risk Professionals

    Report

    Report The Forrester Customer Authentication Assessment Framework

    June 12, 2013 | Eve Maler, Andras Cser

    Forrester clients often face a hybrid challenge with customer-facing websites: optimizing both security and usability. The tightest security can be a usability disaster and the most user-friendly...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Consumer-Facing Identity, Q4 2012 To Q1 2013

    March 22, 2013 | Andras Cser, Eve Maler

    The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. In fact, several vendors...

  • For Security & Risk Professionals

    Report

    Report Mobile Authentication: Is This My App? Is This My User?

    Strategy Deep Dive: The Mobile Security And Operations Playbook
    December 5, 2012 | Andras Cser, Chenxi Wang

    Mobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Risk-Based Authentication, Q1 2012

    The Six Vendors That Matter Most And How They Stack Up
    February 15, 2012 | Eve Maler, Andras Cser

    In Forrester's 16-criteria evaluation of risk-based authentication vendors, we identified the six significant vendors in this category — CA Technologies, Entrust, iovation, RSA, Symantec, and...

  • For Security & Risk Professionals

    Report

    Report TechRadar™ For Security Pros: Strong Authentication, Q1 2012

    Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge
    February 3, 2012 | Eve Maler, Andras Cser

    The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...

  • For Security & Risk Professionals

    Report

    Report Atlas Shrugged: Security Pros Must Adjust To The New Realities Of A Post-RSA Breach World

    Plan Your Move To Risk-Based Authentication And Software-Based Tokens
    November 4, 2011 | Andras Cser

    The RSA breach presents IT security professionals with significant challenges regarding authentication and questions the security of the bulletproof hardware token hitherto thought to be...

  • For Security & Risk Professionals

    Report

    Report State Of Federation, Q2 2010

    Software-As-A-Service Adoption Drives Federated Access; Provisioning Still Lags
    June 18, 2010 | Andras Cser

    The wait is over. According to Forrester's recent security survey, adoption of identity federation jumped from less than 5% two years ago to more than 12% in 2009. Why? Because...

  • For Security & Risk Professionals

    Report

    Report Identity And Access Management Adoption In Europe: 2009

    Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise
    May 14, 2010 | Andras Cser, Bill Nagel

    Interest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...

  • For Security & Risk Professionals

    Report

    Report Shift Happened In The Strong Authentication Market In 2009

    Key Vendors Made Dramatic Moves And Are Looking At A Cloudy Future
    February 1, 2010 | Bill Nagel

    The strong authentication market is on the move — slowly but surely. Nearly half of the authentication vendors profiled in Forrester's July 2008 market overview have since changed hands. Even those...

  • For Security & Risk Professionals

    Report

    Report Case Study: Baker Tilly Virchow Krause Builds Trust With Strong Authentication

    Customer Data Is Accessible Yet Safe Whether Users Are Connected Or Not
    November 16, 2009 | Bill Nagel

    Matt Jennings at Baker Tilly Virchow Krause needed to overhaul the accounting and advisory firm's security processes and technologies to ensure ongoing regulatory compliance and customer...

  • For Security & Risk Professionals

    Report

    Report Case Study: For Avaya, Customers Are Not A Token Consideration

    A Plug-And-Go Smart Token Combines With PKI For Security And Auditability
    July 23, 2009 | Bill Nagel

    Rick Robinson at Avaya had a vision for a multifunctional second-factor authentication credential that would satisfy customer compliance requirements without significant adverse effects on his...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Identity And Access Management, Q4 2008

    October 6, 2008 | Andras Cser

    Identity and access management (IAM) continues to be a major topic of interest for security professionals. Between July 2007 and June 2008, Forrester's security and risk management team fielded...

  • For Security & Risk Professionals

    Report

    Report A US National ID Begins To Take Root

    WHTI, EDL, And REAL ID
    July 21, 2008 | Geoffrey Turner

    In the aftermath of the Al Qaeda attacks on 9/11, the US government realized that the lack of effective identity credentials for use in domestic air travel was a contributing factor in the attacks'...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Strong Authentication For Enterprises In 2008

    Securing The Doors To Your IT Environment
    July 16, 2008 | Bill Nagel

    Security professionals have long known that passwords are no longer sufficient to act as the sole means of gatekeeping access to enterprise network and data resources. Increasingly, they're putting...