253 results in Reports
Sort by:
Refine
  • Identity & Access Management (IAM)

Featured content

The Identity And Access Management Playbook For 2017

Evolve Your IAM Strategy For Your Digital Business

New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

Search Results

  • For Security & Risk Professionals

    Report

    Report Top Trends That Will Shape CIAM In 2018 And Beyond

    Landscape: The Identity And Access Management Playbook
    September 7, 2017 | Merritt Maxim, Andras Cser

    Digital businesses must manage, govern, and secure customers' access to systems and data without hurting the customer experience. Customer identity and access management (CIAM) is a compelling...

  • For Security & Risk Professionals

    Report

    Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    August 18, 2017 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • For Security & Risk Professionals

    Report

    Report The Okta IPO And The IDaaS Opportunity

    ForecastView Document
    August 10, 2017 | Jennifer Adams, Merritt Maxim

    Identity-as-a-service (IDaaS) vendor Okta recently moved into the spotlight with a successful IPO that raised $187 million of equity capital. The IPO filings gave investors and industry observers...

  • For Security & Risk Professionals

    Report

    Report The IAM Market Will Surpass $13 Billion By 2021

    Customer-Facing IAM Leads Growth
    July 24, 2017 | Merritt Maxim, Andras Cser

    New digital business and customer engagement models have extended today's identity boundaries. In response, security pros must now manage identities and access across a variety of populations...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Risk-Based Authentication, Q3 2017

    ThreatMetrix Leads With Device Support And Flexible Case Management; Kount, IBM, And Easy Solutions Follow Closely Behind
    July 17, 2017 | Andras Cser

    In our 32-criteria evaluation of risk-based authentication (RBA) providers, we identified the eight most significant ones — CA Technologies, Easy Solutions, IBM, Kount, LexisNexis Risk Solutions,...

  • For Security & Risk Professionals

    Report

    Report Develop Identity And Access Management Metrics That Matter To The Business

    Performance Management: The Identity And Access Management Playbook
    July 7, 2017 | Andras Cser, Merritt Maxim

    Most security and risk (S&R) professionals struggle to ensure that identity and access management (IAM) remains a top business technology priority. S&R pros who succeed at nurturing their internal...

  • For Security & Risk Professionals

    Report

    Report Building A Customer-Obsessed IAM Team

    Organization: The Identity And Access Management Playbook
    June 30, 2017 | Merritt Maxim, Andras Cser

    For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides an overview of the skills and...

  • For Security & Risk Professionals

    Report

    Report Security Strength And Ease Benchmark: US Online Retailers 2017

    Continuous Improvement: The Identity And Access Management Playbook
    June 15, 2017 | Andras Cser, Alexander Spiliotes

    According to Forrester Data Online Retail Forecast, 2016 to 2021 (US), online retail sales have grown 15% year-over-year since 2015. As retailers expand their digital offerings and work to attract...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Customer Identity and Access Management, Q2 2017

    Tools And Technology: The Identity And Access Management Playbook
    June 15, 2017 | Merritt Maxim

    In our 20-criteria evaluation of customer IAM (CIAM) providers, we identified the eight most significant ones — Auth0, ForgeRock, Gigya, Janrain, LoginRadius, Microsoft, Ping Identity, and...

  • For Security & Risk Professionals

    Report

    Report A Secure Blockchain Will Transform Security And Risk Management

    Secure Payments, Cryptocurrencies, Anti-Money Laundering, Identity Verification Demand New, Distributed, And Tamper-Evident Transaction Databases
    June 9, 2017 | Andras Cser, Martha Bennett

    Secure blockchains will become the foundation for verifiable transactions — both business and operational — running the gamut from payments, financial transfers, and shipment tracking to identity...

  • For B2C Marketing Professionals

    Report

    Report Use Personal Identity And Data Management To Future-Proof Your Privacy Practices

    Continuous Improvement: The Customer Trust And Privacy Playbook
    May 23, 2017 | Fatemeh Khatibloo

    Consumers are leaving a growing digital footprint across channels and media, and they are aware that marketers use this data for financial gain. With growing concerns about data security and...

  • For Security & Risk Professionals

    Report

    Report Top Competencies To Look For In An IAM Systems Integrator

    Cloud App Integration, Hosting, And Identity Management And Governance Skills Matter
    May 15, 2017 | Andras Cser, Merritt Maxim

    Systems integrators (SIs) are a crucial part of identity and access management (IAM) deployments. SIs bring valuable deployment and integration experience, and their vital advice on business...

  • For Security & Risk Professionals

    Report

    Report Forrester Data Report: Identity And Access Management Software Forecast, 2016 To 2021 (Global)

    ForecastView Document
    April 26, 2017 | Jennifer Adams, Merritt Maxim

    Identity and access management (IAM) is one of the most important security functions ensuring that the right people have access to the right resources for the right reasons. In Q4 2016 and Q1 2017,...

  • For CIO Professionals

    Report

    Report Forrester Data: Identity And Access Management Software Forecast, 2016 To 2021 (Global)

    ForecastView Spreadsheet
    April 26, 2017 | Jennifer Adams

    Security and risk professionals must protect corporate resources while giving secure access to a variety of users on a variety of devices. Identity and access management (IAM) software tools help...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook
    April 26, 2017 | Merritt Maxim, Jeff Pollard

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook
    April 3, 2017 | Andras Cser, Merritt Maxim

    Your strategic plan for identity and access management (IAM) must establish and explain the business need and value of IAM to both technology management and business leaders. It must also describe...

  • For Security & Risk Professionals

    Report

    Report The Top IAM Trends From The RSA Conference 2017

    March 24, 2017 | Andras Cser, Merritt Maxim

    Although maturing quickly and available in new virtualized and containerized forms, identity and access management (IAM) is undergoing fundamental changes in response to: 1) hybrid cloud access...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Biometric Authentication, Q1 2017

    Adoption Of User- And Mobile-Friendly Biometrics Will Kill The Password
    March 14, 2017 | Andras Cser, Alexander Spiliotes

    As users increasingly demand frictionless authentication everywhere, biometrics solutions have garnered significant attention for both authentication and fraud prevention — especially on mobile and...

  • For Security & Risk Professionals

    Report

    Report Mobile Application Authentication Trends And Best Practices

    The Right Authentication Method Can Make Or Break A Great Digital Experience
    March 2, 2017 | Andras Cser, Michael Facemire

    Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...

  • For CIO Professionals

    Report

    Report The Top Emerging Technologies For Digital Predators

    Tools And Technology: The CIO Digital Business Transformation Playbook
    March 1, 2017 | Nigel Fenwick, Ted Schadler

    CIOs must constantly evaluate an array of emerging technologies and determine where to incubate and where to increase investment. While the choices are as individual as the companies, the...

  • For Security & Risk Professionals

    Report

    Report Security Strength And Ease Benchmark: US Online Retail Banking 2017

    February 14, 2017 | Andras Cser, Merritt Maxim

    In a race to meet customer acquisition and retention targets while reducing account takeover (ATO) fraud, financial services firms have strived to ensure that their sites are both secure and easy...

  • For Customer Experience Professionals

    Report

    Report Digital Customer Experience Trends, 2017

    Landscape: The Digital Customer Experience Improvement Playbook
    February 7, 2017 | Allegra Burnette, Tony Costa

    In 2016's edition of this report about digital customer experience (CX) trends, Forrester identified the rise of conversational interfaces and concierge services. In this year's report, we examine...

  • For Security & Risk Professionals

    Report

    Report Making The Business Case For Identity And Access Management

    Business Case: The Identity And Access Management Playbook
    January 25, 2017 | Andras Cser, Merritt Maxim

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage users' access to sensitive applications and data without inhibiting business agility,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For Security & Risk Professionals

    Report

    Report Forrester's Risk-Driven Identity And Access Management Process Framework

    Process: The Identity And Access Management Playbook
    January 6, 2017 | Andras Cser

    Identity and access management (IAM) processes have always been convoluted. They affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst