16 results in Reports
Sort by:
Refine
  • Digital Certificates & Public Key Infrastructures

Search Results

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q1 2016

    Road Map: The Data Security And Privacy Playbook
    February 22, 2016 | Stephanie Balaouras, John Kindervag

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

  • For Security & Risk Professionals

    Report

    Report Welcome To The New Era Of Encryption

    S&R Pros Must Use Encryption As The Technological Keystone Of Privacy
    September 10, 2015 | John Kindervag

    Talking about encryption is all the rage these days — from revelations about the National Security Agency's (NSA's) surveillance program to a new wave of movies and TV shows featuring hackers...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Use "Customer-Managed Keys" To Regain Control Of Your Data

    Your Digital Business Can Adopt Cloud Services Without Sacrificing Security Or Privacy
    February 10, 2015 | Tyler Shields, Heidi Shey

    On February 10, 2015, Box announced a new enterprise key management system for security of content stored in the Box cloud. This new key management offering adds support for external encryption,...

  • For Security & Risk Professionals

    Report

    Report Predictions 2015: Data Security And Privacy Are Competitive Differentiators

    Governments, Criminals, Tech Giants, Customers, And Enterprises Spar Over Protections And Rights
    November 12, 2014 | Heidi Shey, Nick Hayes

    Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

  • For Security & Risk Professionals

    Report

    Report Brief: Q&A On The US National Strategy For Trusted Identities In Cyberspace

    Without Clear Property Rights In Digital Identity, The NSTIC's Vision Will Fail
    June 2, 2014 | Eve Maler

    Many private-sector entities and consumers would value consumer identity credentials that are more secure and trustworthy — and so would the US federal government. The government initiative...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q2 2014

    Tools To Define, Dissect, And Defend Your Data
    April 22, 2014 | Stephanie Balaouras, John Kindervag

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2

    Three Generations Of Vendor Solutions Tackle Various Challenges
    February 24, 2014 | Eve Maler, Andras Cser

    Part 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the...

  • For Enterprise Architecture Professionals

    Report

    Report The Forrester Wave™: E-Signatures, Q2 2013

    April 29, 2013 | Craig Le Clair

    Electronic signatures are gaining momentum and becoming an increasingly popular topic of inquiries by Forrester clients. In retrospect, today's e-signature users will be seen as early adopters...

  • For Security & Risk Professionals

    Report

    Report Kill Your Data To Protect It From Cybercriminals

    July 12, 2012 | John Kindervag

    As cybercriminals have become more skillful and sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape...

  • For Security & Risk Professionals

    Report

    Report TechRadar™ For Security Pros: Strong Authentication, Q1 2012

    Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge
    February 3, 2012 | Eve Maler, Andras Cser

    The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...

  • For Security & Risk Professionals

    Report

    Report E-Signatures Q&A: Legalize It

    Minimize The Risks Of Eliminating External-Facing Paper-Based Processes
    December 2, 2009 | Bill Nagel

    Electronic signatures (e-signatures), with their roots in paperwork elimination initiatives, have been edging into greater prominence due to the greater regulatory, legal, and economic pressures...

  • For Security & Risk Professionals

    Report

    Report Case Study: For Avaya, Customers Are Not A Token Consideration

    A Plug-And-Go Smart Token Combines With PKI For Security And Auditability
    July 23, 2009 | Bill Nagel

    Rick Robinson at Avaya had a vision for a multifunctional second-factor authentication credential that would satisfy customer compliance requirements without significant adverse effects on his...

  • For Security & Risk Professionals

    Report

    Report Best Practices: Implementing Strong Authentication In Your Enterprise

    Kill Two Birds With One Token
    July 23, 2009 | Bill Nagel

    The adoption of strong multifactor authentication (MFA) is on the rise. It's often the first port of call on the journey to a fuller identity and access management implementation; MFA directly...

  • For Security & Risk Professionals

    Report

    Report Extending Mobile Identity Beyond Authentication

    Banks, Mobile Operators, And Vendors Team Up For SIM Card-Based Security
    April 11, 2008 | Bill Nagel

    With mobile phones reaching saturation levels in many countries, banks and other service providers are taking a second look at providing financial and commercial services over the mobile channel....

  • For Security & Risk Professionals

    Report

    Report Government eID Projects Need Private Sector Initiative And Support For Broader Success

    A Look At Europe's Experience With PKI-Enabled National ID Cards

    April 7, 2008 | Bill Nagel

    To date, at least 12 European countries have either developed or rolled out national electronic citizen IDs (eIDs) based on a government-created and -managed public key infrastructure (PKI) or are...