Search Results
-
For Security & Risk Professionals
Report
Report TechRadar™: Internet Of Things Security, Q1 2017
A Mix Of New And Existing Technologies Help Secure IoT Deployments
January 19, 2017 | Merritt MaximThis TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...
-
For Security & Risk Professionals
Report
Report TechRadar™: Data Security, Q1 2016
Road Map: The Data Security And Privacy Playbook
February 22, 2016 | Stephanie Balaouras, John KindervagAs data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...
-
For Security & Risk Professionals
Report
Report Welcome To The New Era Of Encryption
S&R Pros Must Use Encryption As The Technological Keystone Of Privacy
September 10, 2015 | John KindervagTalking about encryption is all the rage these days — from revelations about the National Security Agency's (NSA's) surveillance program to a new wave of movies and TV shows featuring hackers...
-
For Security & Risk Professionals
Report
Report Quick Take: Use "Customer-Managed Keys" To Regain Control Of Your Data
Your Digital Business Can Adopt Cloud Services Without Sacrificing Security Or Privacy
February 10, 2015 | Tyler Shields, Heidi SheyOn February 10, 2015, Box announced a new enterprise key management system for security of content stored in the Box cloud. This new key management offering adds support for external encryption,...
-
For Security & Risk Professionals
Report
Report Predictions 2015: Data Security And Privacy Are Competitive Differentiators
Governments, Criminals, Tech Giants, Customers, And Enterprises Spar Over Protections And Rights
Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...
-
For Security & Risk Professionals
Report
Report Brief: Q&A On The US National Strategy For Trusted Identities In Cyberspace
Without Clear Property Rights In Digital Identity, The NSTIC's Vision Will Fail
June 2, 2014 | Eve MalerMany private-sector entities and consumers would value consumer identity credentials that are more secure and trustworthy — and so would the US federal government. The government initiative...
-
For Security & Risk Professionals
Report
Report TechRadar™: Data Security, Q2 2014
Tools To Define, Dissect, And Defend Your Data
April 22, 2014 | Stephanie Balaouras, John KindervagWe designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...
-
For Security & Risk Professionals
Report
Report Market Overview: Employee And Customer Authentication Solutions In 2013, Part 2 Of 2
Three Generations Of Vendor Solutions Tackle Various Challenges
February 24, 2014 | Eve Maler, Andras CserPart 1 of this report captured what you need to know about the seven important trends in the frothy authentication market, which spans three generations of technology. Part 2 dives into the...
-
For Enterprise Architecture Professionals
Report
Report The Forrester Wave™: E-Signatures, Q2 2013
April 29, 2013 | Craig Le ClairElectronic signatures are gaining momentum and becoming an increasingly popular topic of inquiries by Forrester clients. In retrospect, today's e-signature users will be seen as early adopters...
-
For Security & Risk Professionals
Report
Report Kill Your Data To Protect It From Cybercriminals
July 12, 2012 | John KindervagAs cybercriminals have become more skillful and sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape...
-
For Security & Risk Professionals
Report
Report TechRadar™ For Security Pros: Strong Authentication, Q1 2012
Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge
February 3, 2012 | Eve Maler, Andras CserThe strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...
-
For Security & Risk Professionals
Report
Report E-Signatures Q&A: Legalize It
Minimize The Risks Of Eliminating External-Facing Paper-Based Processes
December 2, 2009 | Bill NagelElectronic signatures (e-signatures), with their roots in paperwork elimination initiatives, have been edging into greater prominence due to the greater regulatory, legal, and economic pressures...
-
For Security & Risk Professionals
Report
Report Case Study: For Avaya, Customers Are Not A Token Consideration
A Plug-And-Go Smart Token Combines With PKI For Security And Auditability
July 23, 2009 | Bill NagelRick Robinson at Avaya had a vision for a multifunctional second-factor authentication credential that would satisfy customer compliance requirements without significant adverse effects on his...
-
For Security & Risk Professionals
Report
Report Best Practices: Implementing Strong Authentication In Your Enterprise
Kill Two Birds With One Token
July 23, 2009 | Bill NagelThe adoption of strong multifactor authentication (MFA) is on the rise. It's often the first port of call on the journey to a fuller identity and access management implementation; MFA directly...
-
For Security & Risk Professionals
Report
Report Extending Mobile Identity Beyond Authentication
Banks, Mobile Operators, And Vendors Team Up For SIM Card-Based Security
April 11, 2008 | Bill NagelWith mobile phones reaching saturation levels in many countries, banks and other service providers are taking a second look at providing financial and commercial services over the mobile channel....
-
For Security & Risk Professionals
Report
Report Government eID Projects Need Private Sector Initiative And Support For Broader Success
A Look At Europe's Experience With PKI-Enabled National ID Cards
April 7, 2008 | Bill NagelTo date, at least 12 European countries have either developed or rolled out national electronic citizen IDs (eIDs) based on a government-created and -managed public key infrastructure (PKI) or are...
Content categories
- Reports (16)
- Charts & Figures (59)
- Everything (75)
Refine your results
Date Range
- Past 6 months (1)
- Past 12 months (1)
- Past 18 months (2)
Primary Role
- Security & Risk (15)
- Enterprise Architecture (1)
Methodology
- Business Technographics (4)
- TechRadar (2)
- Forrester Wave (1)
Industry
- Public Sector (3)
- Financial Services (2)
- Healthcare (1)
Market Imperatives
Region
- North America (5)
- Europe (4)
Vendor
- Adobe Systems (1)
- Deloitte (1)
Analyst
- Heidi Shey (4)
- Andras Cser (2)
- Stephanie Balaouras (2)
- Craig Le Clair (1)
- Merritt Maxim (1)
- + Show All
- Nick Hayes (1)
- Renee Murphy (1)
