14 results in Reports
Sort by:
Refine
  • Single Sign-On

Featured content

The Identity And Access Management Playbook For 2017

Evolve Your Identity Strategy For The Extended Enterprise

New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

Search Results

  • For Security & Risk Professionals

    Report

    Report The Okta IPO And The IDaaS Opportunity

    ForecastView Document

    Identity-as-a-service (IDaaS) vendor Okta recently moved into the spotlight with a successful IPO that raised $187 million of equity capital. The IPO filings gave investors and industry observers...

  • For Security & Risk Professionals

    Report

    Report Brief: Washington Is Finally Jumping On The Government ID Bandwagon

    Governmentwide Single Sign-On Would Usher In A Customer Experience Revolution

    Although identity federation and trusted identity providers (IdPs) such as Experian, ID.me, PayPal, and Verizon Universal Identity Services (UIS) have been around for a long time, they have yet to...

  • For Security & Risk Professionals

    Report

    Report What You Need To Know About The FIDO Alliance And Its Impact On User Authentication

    This Heavyweight Standards Body Is In A Race Against Time And Market Innovation For Enterprise Success
    July 23, 2014 | Andras Cser, Eve Maler

    The model for user authentication most online services have relied on heavily for decades — passwords, often with security questions for account recovery — is breaking down. The Fast Identity...

  • For Marketing Leadership Professionals

    Report

    Report Brief: Use Social Login For More Than Just Fast Registration

    A Guide To The True Benefits Of Implementing Social Login
    May 20, 2014 | Kim Celestre

    Social login, the ability to use Facebook, Twitter, or other social network credentials to register on websites, is becoming increasingly popular with buyers as they become more comfortable...

  • For Security & Risk Professionals

    Report

    Report Predictions 2014: Identity And Access Management

    Employee And Customer IAM Head For The Cloud
    January 7, 2014 | Andras Cser, Eve Maler

    Forrester predicts that in 2014, mobile and cloud adoption will continue to drive identity and access management (IAM) toward application programming interface (API) management. As...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2

    Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"
    December 30, 2013 | Eve Maler, Andras Cser

    It's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same time,...

  • For Security & Risk Professionals

    Report

    Report Brokered Cloud Identity Is Scaling New Heights

    Identity Hub Solutions Ease Integration Pain And Offer Flexibility
    October 16, 2013 | Eve Maler

    We're moving fast into a world of loosely coupled, cloud-based data centers. Cloud infrastructure models complicate the identity and access management (IAM) landscape — and represent significant...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Consumer-Facing Identity, Q4 2012 To Q1 2013

    March 22, 2013 | Andras Cser, Eve Maler

    The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. In fact, several vendors...

  • For Security & Risk Professionals

    Report

    Report The "Venn" Of Federated Identity

    Portable Identity Gives New Options To Companies, Consumers, And Clouds
    June 3, 2011 | Eve Maler

    Fast-moving cloud and consumer identity trends are driving shifts in how IT professionals control user access and provide personalized service to networked applications. As IT professionals move to...

  • For Security & Risk Professionals

    Report

    Report Enterprise Fraud Management Predictions: 2011 And Beyond

    You Must Invest In Commercial Solutions To Combat Sophisticated Fraud Rings
    December 8, 2010 | Andras Cser

    Forrester uncovered three major trends for 2011 that organizations and vendors alike must address to combat increasingly sophisticated fraud rings. First, fraud professionals should insist that...

  • For Security & Risk Professionals

    Report

    Report State Of Federation, Q2 2010

    Software-As-A-Service Adoption Drives Federated Access; Provisioning Still Lags
    June 18, 2010 | Andras Cser

    The wait is over. According to Forrester's recent security survey, adoption of identity federation jumped from less than 5% two years ago to more than 12% in 2009. Why? Because...

  • For Security & Risk Professionals

    Report

    Report Identity And Access Management Adoption In Europe: 2009

    Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise
    May 14, 2010 | Andras Cser, Bill Nagel

    Interest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...

  • For Security & Risk Professionals

    Report

    Report Forrester TechRadar™: Identity And Access Management, Q2 2008

    Market Seeks Solutions That Support Business And IT Flexibility And Compliance
    June 18, 2008 | Andras Cser

    Identity and access management (IAM) continues to be a fragmented field of disjointed technologies with difficult and expensive implementation cycles and even more costly efforts in the wake of bad...

  • For Security & Risk Professionals

    Report

    Report Topic Overview: Identity And Access Management

    April 14, 2008 | Andras Cser

    Identity and access management (IAM) is the entire aspect of maintaining a person's complete set of information, spanning multiple identities and establishing the relationship among these various...

Content categories

Refine your results

Date Range

Industry

Primary Role

Methodology

Region

Vendor

Analyst

Market Imperatives