13 results in Everything
 
Sort by:
Refine
  • Customer Experience Management
  • Security & Risk

Search Results

  • Report Building A Customer-Obsessed IAM Team

    Organization: The Identity And Access Management Playbook
    December 18, 2018 | Merritt Maxim, Andras Cser

    For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides an overview of the skills and...

  • Report The State Of Risk Management 2018

    Benchmarks: The Governance, Risk, And Compliance Playbook
    November 30, 2018 | Christopher McClean, Trevor Lyness

    Executives must take big bets on new technologies, business models, and emerging markets to stay ahead of the fast pace of competition. With so much at stake and so many public examples of...

  • Report Stop Bad Bots From Killing Customer Experience

    Strengthen Engagement And Budget By Securing Web Traffic
    September 6, 2018 | Amy DeMartine, Joseph Blankenship, Susan Bidel

    Automated internet traffic is on the rise, largely due to software programs called bots. Although some bots facilitate data sharing and customer engagement, many are tools that malicious attackers...

  • Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    July 20, 2018 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • Webinar Improve Security Without Compromising User Experience

    November 8, 2017 | Andras Cser, Alexander Spiliotes

    Security and risk pros are responsible for protecting customers from identity theft, fraud, privacy abuses, and other types of malicious activities; the pursuit of this responsibility, however,...

  • Report The IAM Market Will Surpass $13 Billion By 2021

    Customer-Facing IAM Leads Growth

    New digital business and customer engagement models have extended today's identity boundaries. In response, security pros must now manage identities and access across a variety of populations...

Content Type

Apply

Filters

Industry

Topics