108 results in Everything
 
Sort by:
Refine
  • Andras Cser

Search Results

  • Report Best Practices: Customer Call Center Authentication

    Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
    March 22, 2019 | Andras Cser, Merritt Maxim

    Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Now Tech: Payment Tokenization, Q1 2019

    Forrester's Overview Of 21 Payment Tokenization Providers
    March 7, 2019 | Andras Cser

    You can use payment tokenization (PT) solutions to: 1) reduce the risk of fraud from stolen personal account numbers (PANs); 2) reduce the scope of PCI DSS compliance and audits; and 3) increase...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report The Security Of Cryptocurrencies

    Security Must Help Business Leaders Make Risk-Based Decisions On Cryptocurrency Adoption And Implementation
    February 13, 2019 | Andras Cser, Heidi Shey, Jeff Pollard

    Many enterprises are considering the adoption of cryptocurrencies for payment. As a security and risk (S&R) professional, you're responsible for helping business leaders understand the legal and...

  • Webinar Customer Call Centers: Dos And Don'ts

    February 7, 2019 | Andras Cser

    When we have the online channels (e.g., web, mobile app, etc.) all secured, fraudsters turn to the customer call center as an avenue to commit fraud. This webinar explains key types of fraud, best...

  • Report New Tech: Blockchain Identity (BCI) Management, Q1 2019

    Forrester's Landscape Overview Of 22 Providers
    January 3, 2019 | Andras Cser, Martha Bennett

    A new crop of blockchain identity (BCI) technologies, and the solutions they power, stand poised to unleash new paradigms in identity verification (IDV) and access policy enforcement, leading to...

  • Report Top Trends Shaping IAM In 2019

    Landscape: The Identity And Access Management Playbook
    January 3, 2019 | Andras Cser, Merritt Maxim

    For today's digital businesses, identity and access management (IAM) involves more than just provisioning and enforcing employee access to corporate applications and data. Security and risk (S&R)...

  • Report Understand The State Of Identity And Access Management, 2018 To 2019

    Benchmarks: The Identity And Access Management Playbook
    December 19, 2018 | Merritt Maxim, Andras Cser

    This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...

  • Report Building A Customer-Obsessed IAM Team

    Organization: The Identity And Access Management Playbook
    December 18, 2018 | Merritt Maxim, Andras Cser

    For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides an overview of the skills and...

  • Report Top Enterprise Fraud Management And Anti-Money-Laundering Trends

    Consortium, Third-Party, And Blockchain Data Integration Will Transform EFM And AML Solutions And Practices
    December 17, 2018 | Andras Cser

    While enterprise fraud management (EFM) and anti-money laundering (AML) are mature functions, regulatory pressures in Europe and advances in machine learning are rapidly and profoundly changing...

  • Report The Forrester Wave™: Privileged Identity Management, Q4 2018

    The 11 Providers That Matter Most And How They Stack Up
    November 14, 2018 | Andras Cser

    In our 35-criterion evaluation of privileged identity management (PIM) providers, we identified the 11 most significant ones — BeyondTrust, Bomgar, CA Technologies, Centrify, CyberArk,...

  • Webinar Top Trends Affecting Enterprise Fraud Management

    October 25, 2018 | Andras Cser

    This webinar looks at the top trends that affect the market and best practices for enterprise fraud management. We navigate through the top seven to 10 trends and provide best practices...

  • Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    October 17, 2018 | Andras Cser, Merritt Maxim

    Identity and access management (IAM) capabilities have become critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, CIOs, and CISOs...

  • Report Best Practices: Customer And Employee Authentication

    Use Authentication To Reduce The Risk Of Data Breaches, Account Takeovers, And Fraud
    October 4, 2018 | Andras Cser, Merritt Maxim

    At their simplest, authentication solutions keep the bad guys out and let the good guys in. Security professionals use them to enforce user access policy and provide login and authorization...

  • Report Best Practices: Cloud Workload Security

    The Longer You Wait To Implement Cloud Workload Security, The Harder It Gets
    October 1, 2018 | Andras Cser

    Under increased pressure to move sensitive data to the cloud, security teams must comprehensively secure cloud workloads. Cloud workload security (CWS) solutions offer an automated and centralized...

  • Report The Forrester Wave™: Enterprise Fraud Management, Q3 2018

    The Seven Providers That Matter Most And How They Stack Up
    August 30, 2018 | Andras Cser

    In our 38-criteria evaluation of enterprise fraud management (EFM) providers, we identified the seven most significant ones — BAE Systems, Featurespace, FICO, Guardian Analytics, IBM, NICE...

  • Report Forrester's Identity And Access Management Maturity Assessment

    Assessment: The Identity And Access Management Playbook
    August 23, 2018 | Merritt Maxim, Andras Cser

    Security leaders often struggle to understand the gaps and potential security vulnerabilities related to the broad range of identity and access management (IAM) functional areas such as identity...

  • Report Now Tech: Authentication Management Solutions, Q3 2018

    Forrester's Overview Of 26 Authentication Management Providers
    August 7, 2018 | Andras Cser, Merritt Maxim

    You can use authentication management solutions to simplify and standardize credential processing for applications, reduce the operational costs of authentication, and improve the authentication...

  • Report Making The Business Case For Identity And Access Management

    Business Case: The Identity And Access Management Playbook
    August 2, 2018 | Andras Cser, Merritt Maxim

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage users' access to sensitive applications and data without inhibiting business agility,...

  • Blog Cisco Acquires Duo, Or How Should You Do Two-Factor Authentication (2FA)?

    August 2, 2018 | Andras Cser

    The National Institute of Standards and Technology (NIST) has not been recommending SMS OTP 2FA for a while precisely because of SMS inbox takeovers, MITM attacks, etc. From the license cost...

  • Report Develop Actionable Business-Centric Identity And Access Management Metrics

    Performance Management: The Identity And Access Management Playbook
    July 27, 2018 | Andras Cser, Merritt Maxim

    Year in and year out, many security and risk (S&R) professionals struggle to sustain identity and access management (IAM) as a top business technology priority. S&R pros who succeed at nurturing...

  • Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    July 20, 2018 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • Report Q&A: Top 10 Questions To Ask Your Security Vendors About GDPR

    Security Vendors Can Hurt As Much As Help Your Compliance

    GDPR is in force, and security and risk professionals (S&R) are taking a hard look at just how prepared their security vendors are. GDPR compliance affects all partners in the value chain; to...

Content Type

Apply

Filters

Primary Role

Region

Vendor