Featured content
The Identity And Access Management Playbook For 2017
Evolve Your IAM Strategy For Your Digital Business
New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...
Search Results
-
For Security & Risk Professionals
Report
Report Forrester's Risk-Driven Identity And Access Management Process Framework
Process: The Identity And Access Management Playbook
January 6, 2017 | Andras CserIdentity and access management (IAM) processes have always been convoluted. They affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to...
-
For Security & Risk Professionals
Report
Report Assess Your Active Directory Security
Assessment: The Identity And Access Management Playbook
August 5, 2016 | Merritt MaximSecurity leaders often struggle to understand the gaps and potential security vulnerabilities within their Active Directory (AD) environment and to track progress at reducing those threats. In...
-
For Security & Risk Professionals
Report
Report Vendor Landscape: Active Directory Security And Governance Solutions
Solutions To Help You Secure And Monitor Your Active Directory Infrastructure
Microsoft's Active Directory (AD) has evolved into the most widely used enterprise repository for digital identities. AD's growing importance also means it's a tempting target for hackers who...
-
For Security & Risk Professionals
Report
Report Raise The Security Bar With Human-Factor-Friendly Design Concepts
You Can Only Improve Security If You Care About Customer And Employee Experience
May 28, 2014 | Tyler ShieldsSecurity leaders must realize that human factors contribute to the success of a security control as much as the risk reduction of the security control itself. Security leaders who choose to ignore...
-
For Security & Risk Professionals
Report
Report Predictions 2014: Identity And Access Management
Employee And Customer IAM Head For The Cloud
January 7, 2014 | Andras Cser, Eve MalerForrester predicts that in 2014, mobile and cloud adoption will continue to drive identity and access management (IAM) toward application programming interface (API) management. As...
-
For Security & Risk Professionals
Report
Report Brokered Cloud Identity Is Scaling New Heights
Identity Hub Solutions Ease Integration Pain And Offer Flexibility
October 16, 2013 | Eve MalerWe're moving fast into a world of loosely coupled, cloud-based data centers. Cloud infrastructure models complicate the identity and access management (IAM) landscape — and represent...
-
For Security & Risk Professionals
Report
Report Simplify Identity And Access Management Processes To Reduce Costs, Increase Business Efficiency, And Make Users Happy
April 4, 2013 | Andras CserThis report outlines the process and procedures of Forrester's solution for security and risk (S&R) professionals looking to build their identity and access management (IAM) strategy. S&R...
-
For Security & Risk Professionals
Report
Report Inquiry Spotlight: Consumer-Facing Identity, Q4 2012 To Q1 2013
March 22, 2013 | Andras Cser, Eve MalerThe challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. In fact, several vendors...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Role Management And Access Recertification, Q3 2011
Aveksa And SailPoint Lead, With NetIQ, Oracle, And CA Technologies Following
August 23, 2011 | Andras CserRole management and access recertification has moved to center stage for security and risk (S&R) professionals, business, and auditors. It provides higher security because it provides a better...
-
For Security & Risk Professionals
Report
Report State Of Federation, Q2 2010
Software-As-A-Service Adoption Drives Federated Access; Provisioning Still Lags
June 18, 2010 | Andras CserThe wait is over. According to Forrester's recent security survey, adoption of identity federation jumped from less than 5% two years ago to more than 12% in 2009. Why? Because...
-
For Security & Risk Professionals
Report
Report Identity And Access Management Adoption In Europe: 2009
Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise
May 14, 2010 | Andras Cser, Bill NagelInterest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Identity And Access Management, Q4 2009
Oracle, CA, And IBM Lead, With Novell And Sun Microsystems Close Behind
November 3, 2009 | Andras CserIn Forrester's 79-criteria evaluation of identity and access management (IAM) vendors, we found that Oracle, CA, and IBM lead the pack because of a rich IAM portfolio (both organically developed...
-
For Enterprise Architecture Professionals
Report
Report EA: Incorporate Enterprise Role Management Into Your Architecture Strategy
July 15, 2009 | Henry PeyretAdoption of enterprise role management tools is increasing dramatically as a result of compliance and cost pressures. Enterprise role management tools simplify the provisioning and deprovisioning...
-
For Security & Risk Professionals
Report
Report IT Security's Critical Role During Layoffs
How To Safeguard Company Data In Difficult Times
July 2, 2009 | Andrew JaquithThe Gateway Recession of 2009 has brought the prospect of slowing sales and profits — and job losses. Although layoffs are never desirable, they are often necessary. Much of the...
-
For Security & Risk Professionals
Report
Report Market Overview: Enterprise Role Management
Access Recertification And Role Management Converge, Integrate With Provisioning
February 6, 2009 | Andras CserEnterprise role management, role mining, and access recertification help enterprises with maintaining segregation of duties, keeping up with regulatory compliance requirements, and automating...
-
For Security & Risk Professionals
Report
Report Inquiry Spotlight: Identity And Access Management, Q4 2008
October 6, 2008 | Andras CserIdentity and access management (IAM) continues to be a major topic of interest for security professionals. Between July 2007 and June 2008, Forrester's security and risk management team fielded...
-
For Security & Risk Professionals
Report
Report Best Practices: Enterprise Role Management
September 30, 2008 | Andras CserEnterprise role management plays a central role in efficiently managing access rights and enforcing access policies such as segregation of duties (SoD). The processes and tools related to role...
-
For Security & Risk Professionals
Report
Report Privileged User Management Market Overview
Centrally Managing System Administrator And Application Credentials
June 30, 2008 | Andras CserManaging privileged users' access to sensitive systems needs to be centralized, policy-driven, and automated: Manual paper- or spreadsheet-based solutions are insecure, expensive, don't scale, and...
-
For Security & Risk Professionals
Report
Report Forrester TechRadar™: Identity And Access Management, Q2 2008
Market Seeks Solutions That Support Business And IT Flexibility And Compliance
June 18, 2008 | Andras CserIdentity and access management (IAM) continues to be a fragmented field of disjointed technologies with difficult and expensive implementation cycles and even more costly efforts in the wake of bad...
-
For Security & Risk Professionals
Report
Report Topic Overview: Identity And Access Management
April 14, 2008 | Andras CserIdentity and access management (IAM) is the entire aspect of maintaining a person's complete set of information, spanning multiple identities and establishing the relationship among these various...
-
For Security & Risk Professionals
Report
Report User Account Provisioning For The Midmarket
Why Projects Fail And How To Achieve Success
August 20, 2007 | Andras CserSmaller enterprises (those with 1,000 to 5,000 employees) are an underserved market when it comes to user account provisioning. They are large enough to benefit from the efficiencies and controls...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: User Account Provisioning, Q1 2006
Sun Microsystems Leads In Our Product Evaluation
January 30, 2006 | Jonathan PennForrester evaluated leading user account provisioning vendors across 125 criteria and found that Sun Microsystems is a market leader for a reason — its product delivers superior provisioning...
Content categories
- Reports (22)
- Charts & Figures (28)
- Everything (50)
Refine your results
Date Range
- Past 12 months (2)
- Past 18 months (2)
Primary Role
- Security & Risk (21)
- Enterprise Architecture (1)
Methodology
- Forrester Wave (3)
- Business Technographics (2)
- TechRadar (1)
- Vendor Landscape (1)
Industry
Market Imperatives
Region
- Europe (3)
- North America (3)
Vendor
- Microsoft (3)
- IBM (2)
- Oracle (2)
- Box (1)
- Dell (1)
- + Show All
- Google (1)
- Novell (1)
- Salesforce (1)
- SAP (1)
Analyst
- Andras Cser (16)
- Merritt Maxim (2)
- Henry Peyret (1)
