22 results in Reports
Sort by:
Refine
  • User Account Provisioning

Featured content

The Identity And Access Management Playbook For 2017

Evolve Your IAM Strategy For Your Digital Business

New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

Search Results

  • For Security & Risk Professionals

    Report

    Report Forrester's Risk-Driven Identity And Access Management Process Framework

    Process: The Identity And Access Management Playbook
    January 6, 2017 | Andras Cser

    Identity and access management (IAM) processes have always been convoluted. They affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to...

  • For Security & Risk Professionals

    Report

    Report Assess Your Active Directory Security

    Assessment: The Identity And Access Management Playbook
    August 5, 2016 | Merritt Maxim

    Security leaders often struggle to understand the gaps and potential security vulnerabilities within their Active Directory (AD) environment and to track progress at reducing those threats. In...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Active Directory Security And Governance Solutions

    Solutions To Help You Secure And Monitor Your Active Directory Infrastructure
    January 5, 2016 | Merritt Maxim, Andras Cser

    Microsoft's Active Directory (AD) has evolved into the most widely used enterprise repository for digital identities. AD's growing importance also means it's a tempting target for hackers who...

  • For Security & Risk Professionals

    Report

    Report Raise The Security Bar With Human-Factor-Friendly Design Concepts

    You Can Only Improve Security If You Care About Customer And Employee Experience
    May 28, 2014 | Tyler Shields

    Security leaders must realize that human factors contribute to the success of a security control as much as the risk reduction of the security control itself. Security leaders who choose to ignore...

  • For Security & Risk Professionals

    Report

    Report Predictions 2014: Identity And Access Management

    Employee And Customer IAM Head For The Cloud
    January 7, 2014 | Andras Cser, Eve Maler

    Forrester predicts that in 2014, mobile and cloud adoption will continue to drive identity and access management (IAM) toward application programming interface (API) management. As...

  • For Security & Risk Professionals

    Report

    Report Brokered Cloud Identity Is Scaling New Heights

    Identity Hub Solutions Ease Integration Pain And Offer Flexibility
    October 16, 2013 | Eve Maler

    We're moving fast into a world of loosely coupled, cloud-based data centers. Cloud infrastructure models complicate the identity and access management (IAM) landscape — and represent...

  • For Security & Risk Professionals

    Report

    Report Simplify Identity And Access Management Processes To Reduce Costs, Increase Business Efficiency, And Make Users Happy

    April 4, 2013 | Andras Cser

    This report outlines the process and procedures of Forrester's solution for security and risk (S&R) professionals looking to build their identity and access management (IAM) strategy. S&R...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Consumer-Facing Identity, Q4 2012 To Q1 2013

    March 22, 2013 | Andras Cser, Eve Maler

    The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. In fact, several vendors...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Role Management And Access Recertification, Q3 2011

    Aveksa And SailPoint Lead, With NetIQ, Oracle, And CA Technologies Following
    August 23, 2011 | Andras Cser

    Role management and access recertification has moved to center stage for security and risk (S&R) professionals, business, and auditors. It provides higher security because it provides a better...

  • For Security & Risk Professionals

    Report

    Report State Of Federation, Q2 2010

    Software-As-A-Service Adoption Drives Federated Access; Provisioning Still Lags
    June 18, 2010 | Andras Cser

    The wait is over. According to Forrester's recent security survey, adoption of identity federation jumped from less than 5% two years ago to more than 12% in 2009. Why? Because...

  • For Security & Risk Professionals

    Report

    Report Identity And Access Management Adoption In Europe: 2009

    Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise
    May 14, 2010 | Andras Cser, Bill Nagel

    Interest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Identity And Access Management, Q4 2009

    Oracle, CA, And IBM Lead, With Novell And Sun Microsystems Close Behind
    November 3, 2009 | Andras Cser

    In Forrester's 79-criteria evaluation of identity and access management (IAM) vendors, we found that Oracle, CA, and IBM lead the pack because of a rich IAM portfolio (both organically developed...

  • For Enterprise Architecture Professionals

    Report

    Report EA: Incorporate Enterprise Role Management Into Your Architecture Strategy

    July 15, 2009 | Henry Peyret

    Adoption of enterprise role management tools is increasing dramatically as a result of compliance and cost pressures. Enterprise role management tools simplify the provisioning and deprovisioning...

  • For Security & Risk Professionals

    Report

    Report IT Security's Critical Role During Layoffs

    How To Safeguard Company Data In Difficult Times
    July 2, 2009 | Andrew Jaquith

    The Gateway Recession of 2009 has brought the prospect of slowing sales and profits — and job losses. Although layoffs are never desirable, they are often necessary. Much of the...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Enterprise Role Management

    Access Recertification And Role Management Converge, Integrate With Provisioning
    February 6, 2009 | Andras Cser

    Enterprise role management, role mining, and access recertification help enterprises with maintaining segregation of duties, keeping up with regulatory compliance requirements, and automating...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Identity And Access Management, Q4 2008

    October 6, 2008 | Andras Cser

    Identity and access management (IAM) continues to be a major topic of interest for security professionals. Between July 2007 and June 2008, Forrester's security and risk management team fielded...

  • For Security & Risk Professionals

    Report

    Report Best Practices: Enterprise Role Management

    September 30, 2008 | Andras Cser

    Enterprise role management plays a central role in efficiently managing access rights and enforcing access policies such as segregation of duties (SoD). The processes and tools related to role...

  • For Security & Risk Professionals

    Report

    Report Privileged User Management Market Overview

    Centrally Managing System Administrator And Application Credentials
    June 30, 2008 | Andras Cser

    Managing privileged users' access to sensitive systems needs to be centralized, policy-driven, and automated: Manual paper- or spreadsheet-based solutions are insecure, expensive, don't scale, and...

  • For Security & Risk Professionals

    Report

    Report Forrester TechRadar™: Identity And Access Management, Q2 2008

    Market Seeks Solutions That Support Business And IT Flexibility And Compliance
    June 18, 2008 | Andras Cser

    Identity and access management (IAM) continues to be a fragmented field of disjointed technologies with difficult and expensive implementation cycles and even more costly efforts in the wake of bad...

  • For Security & Risk Professionals

    Report

    Report Topic Overview: Identity And Access Management

    April 14, 2008 | Andras Cser

    Identity and access management (IAM) is the entire aspect of maintaining a person's complete set of information, spanning multiple identities and establishing the relationship among these various...

  • For Security & Risk Professionals

    Report

    Report User Account Provisioning For The Midmarket

    Why Projects Fail And How To Achieve Success
    August 20, 2007 | Andras Cser

    Smaller enterprises (those with 1,000 to 5,000 employees) are an underserved market when it comes to user account provisioning. They are large enough to benefit from the efficiencies and controls...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: User Account Provisioning, Q1 2006

    Sun Microsystems Leads In Our Product Evaluation
    January 30, 2006 | Jonathan Penn

    Forrester evaluated leading user account provisioning vendors across 125 criteria and found that Sun Microsystems is a market leader for a reason — its product delivers superior provisioning...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Market Imperatives

Region

Vendor

Analyst