Advanced Search
241 results in Reports
Sort by:
Refine
  • Identity & Access Management (IAM)

Featured content

The Identity And Access Management Playbook For 2017

Evolve Your IAM Strategy For Your Digital Business

New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

Search Results

  • For Security & Risk Professionals

    Report

    Report Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook
    April 3, 2017 | Andras Cser, Merritt Maxim

    Your strategic plan for identity and access management (IAM) must establish and explain the business need and value of IAM to both technology management and business leaders. It must also describe...

  • For Security & Risk Professionals

    Report

    Report The Top IAM Trends From The RSA Conference 2017

    March 24, 2017 | Andras Cser, Merritt Maxim

    Although maturing quickly and available in new virtualized and containerized forms, identity and access management (IAM) is undergoing fundamental changes in response to: 1) hybrid cloud access...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Biometric Authentication, Q1 2017

    Adoption Of User- And Mobile-Friendly Biometrics Will Kill The Password
    March 14, 2017 | Andras Cser, Alexander Spiliotes

    As users increasingly demand frictionless authentication everywhere, biometrics solutions have garnered significant attention for both authentication and fraud prevention — especially on mobile and...

  • For Security & Risk Professionals

    Report

    Report Mobile Application Authentication Trends And Best Practices

    The Right Authentication Method Can Make Or Break A Great Digital Experience
    March 2, 2017 | Andras Cser, Michael Facemire

    Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...

  • For CIO Professionals

    Report

    Report The Top Emerging Technologies For Digital Predators

    Tools And Technology: The CIO Digital Business Transformation Playbook
    March 1, 2017 | Nigel Fenwick, Ted Schadler

    CIOs must constantly evaluate an array of emerging technologies and determine where to incubate and where to increase investment. While the choices are as individual as the companies, the...

  • For Security & Risk Professionals

    Report

    Report The Best Of Website Experiences And Security Strength: US Online Retail Banks 2017

    Continuous Improvement: The Identity And Access Management Playbook
    February 14, 2017 | Andras Cser, Merritt Maxim

    In a race to meet customer acquisition and retention targets while reducing account takeover (ATO) fraud, financial service firms have strived to ensure that their sites are both secure and easy to...

  • For Customer Experience Professionals

    Report

    Report Digital Customer Experience Trends, 2017

    Landscape: The Digital Customer Experience Improvement Playbook
    February 7, 2017 | Allegra Burnette, Tony Costa

    In 2016's edition of this report about digital customer experience (CX) trends, Forrester identified the rise of conversational interfaces and concierge services. In this year's report, we examine...

  • For Security & Risk Professionals

    Report

    Report Making The Business Case For Identity And Access Management

    Business Case: The Identity And Access Management Playbook
    January 25, 2017 | Andras Cser, Merritt Maxim

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage users' access to sensitive applications and data without inhibiting business agility,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For Security & Risk Professionals

    Report

    Report Forrester's Risk-Driven Identity And Access Management Process Framework

    Process: The Identity And Access Management Playbook
    January 6, 2017 | Andras Cser

    Identity and access management (IAM) processes have always been convoluted. They affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Security And Risk, Q3 2015 To Q3 2016

    December 27, 2016 | Stephanie Balaouras, Claire O'Malley

    Forrester's security and risk (S&R) research team fields hundreds of inquiries from our clients every month. These inquiries help us keep track of which areas our clients find most challenging and...

  • For Security & Risk Professionals

    Report

    Report The Forrester Identity Management And Governance Maturity Model

    Assess Your Identity Management And Governance Maturity
    December 15, 2016 | Merritt Maxim

    Security and risk (S&R) leaders often struggle to understand the gaps and potential security vulnerabilities related to identity management tasks such as user provisioning, access certification,...

  • For Security & Risk Professionals

    Report

    Report Forrester's Customer IAM Security Maturity Assessment Model

    December 12, 2016 | Andras Cser, Merritt Maxim

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Symantec Injects New Life Into Its Consumer Security With LifeLock Acquisition

    Symantec Becomes One Of The Few Firms To Bridge Enterprise And Consumer Security And Privacy
    November 22, 2016 | Andras Cser, Jeff Pollard

    On November 21, Symantec announced its acquisition of LifeLock for $2.3 billion. This signals a significant reinvestment in Symantec's consumer security portfolio and an expansion into new consumer...

  • For Security & Risk Professionals

    Report

    Report Top Trends Shaping IAM In 2017

    Landscape: The Identity And Access Management Playbook
    November 21, 2016 | Merritt Maxim, Andras Cser

    For today's digital businesses, identity and access management (IAM) involves far more than just provisioning and enforcing employee access to corporate resources. S&R pros must now govern access...

  • For Security & Risk Professionals

    Report

    Report Breakout Vendors: Social Identity And Eligibility Verification (SIDEV)

    SIDEV Will Supplant Traditional Identity Verification Within 24 Months
    November 21, 2016 | Andras Cser, Merritt Maxim

    Traditional identity verification (IDV) solutions use information from customers' credit files to verify their identity online or on the phone. Social identity and eligibility verification (SIDEV)...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Identity And Access Management: 2016 To 2017

    Benchmarks: The Identity And Access Management Playbook
    November 17, 2016 | Merritt Maxim, Andras Cser

    This report provides a spending and technology adoption benchmark for security and risk (S&R) leaders responsible for developing their organization's identity and access management (IAM) strategy...

  • For Security & Risk Professionals

    Report

    Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    October 25, 2016 | Andras Cser, Merritt Maxim

    Identity and access management (IAM) technologies have become a critical component of today's BT agenda. Business leaders, CIOs, and CISOs use them to understand and engage with customers as well...

  • For Security & Risk Professionals

    Report

    Report Achieving Zero Trust Identity And Access Management

    Zero Trust IAM Unifies And Improves Access Control Across The Digital Business
    October 25, 2016 | Andras Cser, Merritt Maxim

    Increasingly, IAM has become a tool not just for security but also for business agility. As firms exploit digital technologies to create new sources of value for customers and to increase their...

  • For B2C Marketing Professionals

    Report

    Report The Strategic Role Of Identity Resolution

    Identity Is Context In The Age Of The Customer
    October 17, 2016 | Joe Stanhope

    The ability to accurately identify customers is the most basic prerequisite for marketing analytics, orchestration, and execution. And it's becoming more critical than ever for firms planning to...

  • For Enterprise Architecture Professionals

    Report

    Report Vendor Landscape: E-Signature, Q4 2016

    Acquisitions, Commoditization, And Growth Reshape The Market
    October 12, 2016 | Craig Le Clair

    Enterprise efforts to digitize transactional processes continue to drive the e-signature market. Mobile endpoints, rapid SaaS deployment, regulatory breakthroughs in Europe, and unforgiving digital...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Behavioral Biometrics

    Security Pros Can Reduce Fraud Without Damaging Customers' Digital Experience
    October 4, 2016 | Andras Cser, Merritt Maxim

    Behavioral biometrics continuously monitors user behavior, such as typing speed, mouse movements, and touchscreen interactions, to build a baseline profile from which security and risk...

  • For Security & Risk Professionals

    Report

    Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    September 30, 2016 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • For CIO Professionals

    Report

    Report The Top Emerging Technologies To Watch: 2017 To 2021

    Fifteen Technologies Will Help Your Business Become Customer-Obsessed
    September 12, 2016 | Brian Hopkins, Adam Silverman

    A new crop of emerging technology stands poised to unleash another cycle of raised consumer expectations, changing behaviors, and disruption. The stakes for CIOs are high — a wrong investment could...

  • For Security & Risk Professionals

    Report

    Report Q&A: 10 Questions To Ask Before Deploying Customer Identity And Access Management

    Gauge Customer Identity And Access Management (CIAM) Fit, And Drive Project Requirements
    September 7, 2016 | Merritt Maxim

    In this report, we examine a set of key evaluation questions for security and risk (S&R) professionals. Use these questions to assess the potential fit of a CIAM solution for your organization.

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst