Featured content
The Identity And Access Management Playbook For 2017
Evolve Your IAM Strategy For Your Digital Business
New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...
Search Results
-
For Security & Risk Professionals
Report
Report Evolve Your IAM Strategy For Your Digital Business
Executive Overview: The Identity And Access Management Playbook
New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...
-
For Security & Risk Professionals
Report
Report Brief: Five Pitfalls To Avoid For A Pain-Free Two-Factor Authentication Deployment
Communication, Training, And Documentation Are Essential For Success
In this brief, we examine five pitfalls that security pros should take care to avoid when deploying a two-factor authentication solution. For each pitfall, we provide security pros with actionable...
-
For Security & Risk Professionals
Report
Report Vendor Landscape: Identity Verification Solutions
Identity Verification Stops Customer Identity Theft And Fraud Without Affecting The Customer Experience Across Channels
Because customers are spending more and more time online and engaging with you using digital channels, it's becoming much easier for criminals to commit fraud and identity theft. As your firm seeks...
-
For Security & Risk Professionals
Report
Report How To Get Away With Murder: Authentication Technologies That Will Help You Kill Passwords
S&R Pros Can Coexist With Customer And Employee Passwords Today While Plotting Their Demise In The Next 36 Months
As computing processing power continues to increase dramatically, it will soon become possible to break even the most complex passwords, making every firm on the planet vulnerable to devastating...
-
For Security & Risk Professionals
Report
Report Market Overview: Voice Biometrics
While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...
-
For Security & Risk Professionals
Report
Report What You Need To Know About The FIDO Alliance And Its Impact On User Authentication
This Heavyweight Standards Body Is In A Race Against Time And Market Innovation For Enterprise Success
July 23, 2014 | Andras Cser, Eve MalerThe model for user authentication most online services have relied on heavily for decades — passwords, often with security questions for account recovery — is breaking down. The Fast...
-
For Security & Risk Professionals
Report
Report Quick Take: Apple Positioned For Key Role In Secure Payment Processing, Fraud Prevention
Touch ID, NFC, And iTunes Are Key Ingredients For A Payment Ecosystem Offering Superior Client-Side Fraud Management
June 5, 2014 | Andras CserOn Monday, June 2, 2014, at their Worldwide Developer Conference, among a number of other things, Apple announced that it has opened up its fingerprint reader, Touch ID, to third-party...
-
For Security & Risk Professionals
Report
Report Brief: Q&A On The US National Strategy For Trusted Identities In Cyberspace
Without Clear Property Rights In Digital Identity, The NSTIC's Vision Will Fail
June 2, 2014 | Eve MalerMany private-sector entities and consumers would value consumer identity credentials that are more secure and trustworthy — and so would the US federal government. The government initiative...
-
For Security & Risk Professionals
Report
Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2
Three Generations Of Vendor Solutions Tackle Various Challenges
February 24, 2014 | Eve Maler, Andras CserPart 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the...
-
For Security & Risk Professionals
Report
Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2
Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"
December 30, 2013 | Eve Maler, Andras CserIt's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same...
-
For Security & Risk Professionals
Report
Report The Forrester Customer Authentication Assessment Framework
June 12, 2013 | Eve Maler, Andras CserForrester clients often face a hybrid challenge with customer-facing websites: optimizing both security and usability. The tightest security can be a usability disaster and the most user-friendly...
-
For Security & Risk Professionals
Report
Report Inquiry Spotlight: Consumer-Facing Identity, Q4 2012 To Q1 2013
March 22, 2013 | Andras Cser, Eve MalerThe challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. In fact, several vendors...
-
For Security & Risk Professionals
Report
Report Mobile Authentication: Is This My App? Is This My User?
Strategy Deep Dive: The Mobile Security And Operations Playbook
December 5, 2012 | Andras Cser, Chenxi WangMobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Risk-Based Authentication, Q1 2012
The Six Vendors That Matter Most And How They Stack Up
February 15, 2012 | Eve Maler, Andras CserIn Forrester's 16-criteria evaluation of risk-based authentication vendors, we identified the six significant vendors in this category — CA Technologies, Entrust, iovation, RSA, Symantec, and...
-
For Security & Risk Professionals
Report
Report TechRadar™ For Security Pros: Strong Authentication, Q1 2012
Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge
February 3, 2012 | Eve Maler, Andras CserThe strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...
-
For Security & Risk Professionals
Report
Report Atlas Shrugged: Security Pros Must Adjust To The New Realities Of A Post-RSA Breach World
Plan Your Move To Risk-Based Authentication And Software-Based Tokens
November 4, 2011 | Andras CserThe RSA breach presents IT security professionals with significant challenges regarding authentication and questions the security of the bulletproof hardware token hitherto thought to be...
-
For Security & Risk Professionals
Report
Report State Of Federation, Q2 2010
Software-As-A-Service Adoption Drives Federated Access; Provisioning Still Lags
June 18, 2010 | Andras CserThe wait is over. According to Forrester's recent security survey, adoption of identity federation jumped from less than 5% two years ago to more than 12% in 2009. Why? Because...
-
For Security & Risk Professionals
Report
Report Identity And Access Management Adoption In Europe: 2009
Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise
May 14, 2010 | Andras Cser, Bill NagelInterest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...
-
For Security & Risk Professionals
Report
Report Shift Happened In The Strong Authentication Market In 2009
Key Vendors Made Dramatic Moves And Are Looking At A Cloudy Future
February 1, 2010 | Bill NagelThe strong authentication market is on the move — slowly but surely. Nearly half of the authentication vendors profiled in Forrester's July 2008 market overview have since changed hands. Even...
-
For Security & Risk Professionals
Report
Report Case Study: Baker Tilly Virchow Krause Builds Trust With Strong Authentication
Customer Data Is Accessible Yet Safe Whether Users Are Connected Or Not
November 16, 2009 | Bill NagelMatt Jennings at Baker Tilly Virchow Krause needed to overhaul the accounting and advisory firm's security processes and technologies to ensure ongoing regulatory compliance and customer...
-
For Security & Risk Professionals
Report
Report Case Study: For Avaya, Customers Are Not A Token Consideration
A Plug-And-Go Smart Token Combines With PKI For Security And Auditability
July 23, 2009 | Bill NagelRick Robinson at Avaya had a vision for a multifunctional second-factor authentication credential that would satisfy customer compliance requirements without significant adverse effects on his...
-
For Security & Risk Professionals
Report
Report Inquiry Spotlight: Identity And Access Management, Q4 2008
October 6, 2008 | Andras CserIdentity and access management (IAM) continues to be a major topic of interest for security professionals. Between July 2007 and June 2008, Forrester's security and risk management team fielded...
-
For Security & Risk Professionals
Report
Report A US National ID Begins To Take Root
WHTI, EDL, And REAL ID
July 21, 2008 | Geoffrey TurnerIn the aftermath of the Al Qaeda attacks on 9/11, the US government realized that the lack of effective identity credentials for use in domestic air travel was a contributing factor in the attacks'...
-
For Security & Risk Professionals
Report
Report Market Overview: Strong Authentication For Enterprises In 2008
Securing The Doors To Your IT Environment
July 16, 2008 | Bill NagelSecurity professionals have long known that passwords are no longer sufficient to act as the sole means of gatekeeping access to enterprise network and data resources. Increasingly, they're putting...
-
For Security & Risk Professionals
Report
Report Forrester TechRadar™: Identity And Access Management, Q2 2008
Market Seeks Solutions That Support Business And IT Flexibility And Compliance
June 18, 2008 | Andras CserIdentity and access management (IAM) continues to be a fragmented field of disjointed technologies with difficult and expensive implementation cycles and even more costly efforts in the wake of bad...
- 1
- 2
Content categories
- Reports (27)
- Events (2)
- Charts & Figures (38)
- Everything (67)
Refine your results
Date Range
- Past 12 months (1)
- Past 18 months (2)
Methodology
- Business Technographics (5)
- Forrester Wave (1)
- TechRadar (1)
- Vendor Landscape (1)
Industry
- Financial Services (3)
- Public Sector (2)
Market Imperatives
- Differentiate with digital (2)
- Drive revenue with great customer experience (2)
- Excel at customer-obsessed marketing (1)
Region
- North America (8)
- Europe (5)
Vendor
- Apple (1)
- Salesforce (1)
- Symantec (1)
Analyst
- Andras Cser (20)
- Merritt Maxim (4)
- Heidi Shey (1)
