Advanced Search
156 results in Reports
Sort by:
Refine
  • Mobile Security

Featured content

The Mobile Security Playbook For 2016

Secure And Protect Mobile Moments

The mobile mind shift is an expectation that an individual can get what she wants in her immediate context and moment of need. This shift applies to your customers and your employees....

Search Results

  • For Security & Risk Professionals

    Report

    Report Mobile Application Authentication Trends And Best Practices

    The Right Authentication Method Can Make Or Break A Great Digital Experience
    March 2, 2017 | Andras Cser, Michael Facemire

    Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...

  • For Security & Risk Professionals

    Report

    Report Build A Cross-Functional Mobile Security Team

    Organization: The Mobile Security Playbook
    February 22, 2017 | Chris Sherman

    As security leaders look to support business engagement with customers, partners, and employees through mobile, they often discover gaps in team expertise. To better organize talent, security execs...

  • For Security & Risk Professionals

    Report

    Report Define A Compelling Strategy To Secure And Protect Mobile Moments

    Strategic Plan: The Mobile Security Playbook
    February 14, 2017 | Laura Koetzle, Chris Sherman

    This report helps security and risk (S&R) leaders develop comprehensive strategic mobile security plans to secure and protect both employees' and customers' mobile moments — without degrading the...

  • For Security & Risk Professionals

    Report

    Report Design Mobile Security Metrics With Mobile Moments In Mind

    Performance Management: The Mobile Security Playbook
    February 13, 2017 | Jeff Pollard

    Security leaders struggling to demonstrate business value need to incorporate mobile security metrics into their reports. As companies adopt the mobile mind shift, mobile security metrics are often...

  • For Security & Risk Professionals

    Report

    Report Secure And Protect Mobile Moments

    Executive Overview: The Mobile Security Playbook
    February 6, 2017 | Christopher McClean

    The mobile mind shift is an expectation that an individual can get what she wants in her immediate context and moment of need. This shift applies to your customers and your employees....

  • For Security & Risk Professionals

    Report

    Report Navigate The Future Of Mobile Security

    Vision: The Mobile Security Playbook
    February 6, 2017 | Stephanie Balaouras, Andras Cser

    The speed at which: 1) employees have adopted mobile applications and 2) DevOps methodologies are increasing application releases has forced security and risk (S&R) pros to revamp how they approach...

  • For Security & Risk Professionals

    Report

    Report Master The Mobile Security Landscape

    Landscape: The Mobile Security Playbook
    January 12, 2017 | Chris Sherman

    For security and risk (S&R) professionals who must empower a digital workforce while protecting the firm's data, the basic management functionality of mobile device management (MDM) solutions is...

  • For Security & Risk Professionals

    Report

    Report The State Of Enterprise Mobile Security: 2016 To 2017

    Benchmarks: The Mobile Security Playbook
    January 12, 2017 | Chris Sherman

    To increase the productivity of information workers, particularly customer-facing employees, security and risk (S&R) leaders must provide them with access to business apps, collaboration tools, and...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Security And Risk, Q3 2015 To Q3 2016

    December 27, 2016 | Stephanie Balaouras, Claire O'Malley

    Forrester's security and risk (S&R) research team fields hundreds of inquiries from our clients every month. These inquiries help us keep track of which areas our clients find most challenging and...

  • For Security & Risk Professionals

    Report

    Report Forrester's Customer IAM Security Maturity Assessment Model

    December 12, 2016 | Andras Cser, Merritt Maxim

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...

  • For B2B Marketing Professionals

    Report

    Report Global Business Technographics® Security Survey, 2016: Overview

    A Business Technographics Presentation
    December 6, 2016 | Tyler McDaniel, Brian Luu

    This report is our overview of security decision-makers’ adoption of network security and security operations technologies; adoption of sourcing solutions to protect public cloud deployments;...

  • For Security & Risk Professionals

    Report

    Report Assess The Maturity Of Your Mobile Security Program

    Assessment: The Mobile Security Playbook
    November 21, 2016 | Chris Sherman, Stephanie Balaouras

    When developing a mobile security strategy for today's digital business, security and risk (S&R) executives must consider both how they will enable a digital workforce that expects to work anytime...

  • For CIO Professionals

    Report

    Report Predictions 2017: Security And Skills Will Temper Growth Of IoT

    November 2, 2016 | Frank E. Gillett, Michele Pelino

    Interest in the internet of things (IoT) has hit a fever pitch: IoT was the No. 1 search topic not only among CIOs but across all Forrester clients over the past six months. But technologies and...

  • For Security & Risk Professionals

    Report

    Report Best Practices For Securing And Empowering A Mobile Workforce

    Road Map: The Mobile Security Playbook
    August 17, 2016 | Christian Kane, Chris Sherman

    Companies launch small bring-your-own-device (BYOD) deployments, but these programs often stall when they expand to include both a larger percentage of the workforce and more corporate apps and...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Mobile Fraud Management Solutions

    Enterprise Fraud Management Solutions Now Support Mobile-Specific Data Collection And Risk Scoring Models
    June 2, 2016 | Andras Cser

    As more and more commerce has shifted to mobile and mobile payment options have proliferated, fraudsters and other cybercriminals are also turning their attention to mobile. This report outlines...

  • For Infrastructure & Operations Professionals

    Report

    Report Improve Skills And Staffing For A Better Employee Tech Experience

    Organization: The Workforce Enablement Playbook
    April 4, 2016 | Michele Pelino, Christian Kane

    Deploying and supporting new technologies to help their company's increasingly mobile workforce has led infrastructure and operations (I&O) leaders to revisit skills and staffing. I&O organizations...

  • For Security & Risk Professionals

    Report

    Report Four Ways To Make Mobile Security A Competitive Differentiator

    Business Case: The Mobile Security Playbook

    Firms of all sizes in all industries now realize that mobile technology will transform how they interact with customers, and mobile channels are untenable without a robust security strategy. Still,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Mobile Security, Q1 2016

    Tools And Technology: The Mobile Security Playbook
    March 28, 2016 | Chris Sherman

    Security and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...

  • For Security & Risk Professionals

    Report

    Report It's Time To Level Up Your Mobile Application Security Program

    Processes: The Mobile Security Playbook
    March 25, 2016 | Chris Sherman

    Security leaders must balance the requirements of their digital workforce with the need to protect corporate data. This report helps security and risk (S&R) professionals better evaluate the...

  • For Security & Risk Professionals

    Report

    Report Q&A: Tackling Mobile Fraud Management

    A New Generation Of Fraud Management Tools Improves Risk Scoring
    March 22, 2016 | Andras Cser

    Consumers' adoption of mobile devices and firms' increased focus on delivering pleasing customer experiences on these devices mean that mobile wallets, eCommerce apps, and banking apps are...

  • For Security & Risk Professionals

    Report

    Report Address The Top 10 Nontechnical Security Risks In Mobile App Development

    Continuous Improvement: The Mobile Security Playbook
    January 20, 2016 | Tyler Shields, Jennie Duong

    Security is more than just purchasing the latest next-generation solution to the most recent threat of attack. Likewise, security in mobile application development doesn't mean simply conducting a...

  • For Enterprise Architecture Professionals

    Report

    Report Brief: Is Your Enterprise Ready To Support Offline Mobile Capabilities?

    September 23, 2015 | Pamela Heiligenthal

    Is your enterprise ready to support offline mobile capabilities? This is a hot requirement that enterprise architecture (EA) professionals need to get up to speed on in terms of breadth and depth....

  • For Application Development & Delivery Professionals

    Report

    Report The Forrester Wave™: Mobile Infrastructure Services, Q3 2015

    Ten Providers That Matter And How They Stack Up
    September 10, 2015 | Michael Facemire, Jeffrey S. Hammond

    In Forrester's 112-criteria evaluation of mobile infrastructure service vendors, we identified 10 significant software and service providers — AnyPresence, Appcelerator, IBM, Kinvey, Kony,...

  • For Security & Risk Professionals

    Report

    Report Quick Take: BlackBerry Acquires Good Technology, Buying Share In The EMM Market

    September 8, 2015 | Tyler Shields, Jennie Duong

    On September 4, BlackBerry announced a definitive agreement to acquire Good Technology for $425 million. This acquisition expands BlackBerry's mobile security offerings and eliminates one of its...

  • For Security & Risk Professionals

    Report

    Report Brief: Mind The App!

    Five Recommendations To Get Data Privacy Right When Collecting Customer Data Via Mobile Apps
    July 10, 2015 | Enza Iannopollo

    The mobile mind shift puts companies into customers' pockets, and mobile apps have become the one-stop shop for customer engagement — and done well, mobile apps delight both customers (who...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Market Imperatives

Region

Vendor

Analyst