17 results in Everything
 
Sort by:
Refine
  • Secure customers, protect the brand
  • Security Operations & Program Governance
  • Merritt Maxim

Featured content

The Zero Trust Security Playbook For 2019

Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Report Now Tech: Managed IAM Services, Q4 2019

    Forrester's Overview Of 18 IAM Managed Security Services Providers
    December 2, 2019 | Merritt Maxim, Andras Cser, Sean Ryan

    You can use managed identity and access management (IAM) services providers to implement IAM faster based on prebuilt integrations and deployment models, adapt to rapidly evolving digital...

  • Report Predictions 2020: Cybersecurity

    October 30, 2019 | Jeff Pollard, Andras Cser, Heidi Shey

    Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...

  • Forum Security & Risk 2019

    A New Hope
    September 12, 2019 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...

  • Webinar The Security And Privacy Implications Of Drones

    August 14, 2019 | Merritt Maxim, Salvatore Schiano

    Drones are no longer just airborne toys for amateur hobbyists. Organizations increasingly deploy drones in a wide range of applications, from agriculture to maintenance and inspection to law...

  • Report Top Trends Shaping Identity Management And Governance, 2019

    Cloud Deployment Models, Machine Learning, And Access Risk Models Will Transform Deployments
    May 13, 2019 | Merritt Maxim

    For today's digital businesses, identity management and governance (IMG) involves more than just provisioning and enforcing employee access to corporate apps and data. Security pros must now govern...

  • Report Protect Your Firm From Drones

    Security And Risk Pros Must Prepare Their Business For The Security, Privacy, And Compliance Risks of Drone Technology
    April 19, 2019 | Merritt Maxim, Salvatore Schiano

    Drones are no longer just airborne toys for amateur hobbyists. Organizations increasingly deploy drones in a wide range of applications, from agriculture, to maintenance and inspection, to law...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report Best Practices: Customer Call Center Authentication

    Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
    March 22, 2019 | Andras Cser, Merritt Maxim

    Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...

  • Report Now Tech: Crisis Communication And Mass Notification Solutions, Q4 2018

    Forrester's Overview Of 17 Crisis Communication And Mass Notification Providers
    December 18, 2018 | Merritt Maxim

    You can use crisis communication and mass notification solutions to improve your response to critical events and incidents that disrupt business, hamper employee productivity, or threaten physical...

  • Report Predictions 2019: Cybersecurity

    The US-China Trade War Will Revive Corporate Espionage Attacks Around The World
    November 5, 2018 | Amy DeMartine, Jeff Pollard, Heidi Shey

    The race to improve customer engagement compels companies to collect volumes of personal data, and this puts enormous pressure on security teams to protect customers from fraud, privacy abuses, and...

  • Report Securing The Internet Of Sports

    The Time Is Now To Address Sports-Related Cyberattacks
    July 10, 2018 | Merritt Maxim

    Connected technologies are transforming sports, from the individual consumer to professional athletes. Massive data collection and analysis allows individuals, teams, and leagues to monitor...