19 results in Everything
 
Sort by:
Refine
  • Secure customers, protect the brand
  • Security Operations & Program Governance
  • Andras Cser

Featured content

The Zero Trust Security Playbook For 2019

Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Report Now Tech: Managed IAM Services, Q4 2019

    Forrester's Overview Of 18 IAM Managed Security Services Providers
    December 2, 2019 | Merritt Maxim, Andras Cser, Sean Ryan

    You can use managed identity and access management (IAM) services providers to implement IAM faster based on prebuilt integrations and deployment models, adapt to rapidly evolving digital...

  • Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

    Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
    November 25, 2019 | Andras Cser, Sean Ryan

    With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...

  • Report Predictions 2020: Cybersecurity

    October 30, 2019 | Jeff Pollard, Andras Cser, Heidi Shey

    Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...

  • Report The Forrester Wave™: Anti-Money Laundering Solutions, Q3 2019

    The Eight Providers That Matter Most And How They Stack Up
    September 24, 2019 | Andras Cser

    In our 32-criterion evaluation of anti-money laundering (AML) solution providers, we identified the eight most significant ones — ACI, BAE Systems, Featurespace, Feedzai, FICO TONBELLER,...

  • Report Hybrid Cloud Security Best Practices

    Focus On The Five C's: Console, Configuration, Connectivity, Cloud Data, And Containers
    June 20, 2019 | Andras Cser

    Hybrid cloud security is a must for firms moving their critical data from on-premises to cloud workloads. This report, based on a small, 20-respondent panel survey, looks at cloud security best...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report Best Practices: Customer Call Center Authentication

    Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
    March 22, 2019 | Andras Cser, Merritt Maxim

    Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report Top Enterprise Fraud Management And Anti-Money-Laundering Trends

    Consortium, Third-Party, And Blockchain Data Integration Will Transform EFM And AML Solutions And Practices
    December 17, 2018 | Andras Cser

    While enterprise fraud management (EFM) and anti-money laundering (AML) are mature functions, regulatory pressures in Europe and advances in machine learning are rapidly and profoundly changing...

Content Type

Apply

Filters

Industry

Primary Role

Methodology

Vendor