Advanced Search
163 results in Reports
Sort by:
Refine
  • Andras Cser

Search Results

  • For Security & Risk Professionals

    Report

    Report Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook
    April 3, 2017 | Andras Cser, Merritt Maxim

    Your strategic plan for identity and access management (IAM) must establish and explain the business need and value of IAM to both technology management and business leaders. It must also describe...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Anti-Money-Laundering Solutions, 2017

    Digital Innovation And Stricter Regulations Reinvigorate The AML Market
    March 29, 2017 | Andras Cser, Nick Hayes

    Due to recent global terrorist attacks; corporate corruption; and worsening illicit markets such as drugs, guns, and human trafficking; governments realize the importance of countering criminal and...

  • For Security & Risk Professionals

    Report

    Report The Top IAM Trends From The RSA Conference 2017

    March 24, 2017 | Andras Cser, Merritt Maxim

    Although maturing quickly and available in new virtualized and containerized forms, identity and access management (IAM) is undergoing fundamental changes in response to: 1) hybrid cloud access...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Biometric Authentication, Q1 2017

    Adoption Of User- And Mobile-Friendly Biometrics Will Kill The Password
    March 14, 2017 | Andras Cser, Alexander Spiliotes

    As users increasingly demand frictionless authentication everywhere, biometrics solutions have garnered significant attention for both authentication and fraud prevention — especially on mobile and...

  • For Security & Risk Professionals

    Report

    Report Mobile Application Authentication Trends And Best Practices

    The Right Authentication Method Can Make Or Break A Great Digital Experience
    March 2, 2017 | Andras Cser, Michael Facemire

    Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...

  • For Security & Risk Professionals

    Report

    Report The Best Of Website Experiences And Security Strength: US Online Retail Banks 2017

    Continuous Improvement: The Identity And Access Management Playbook
    February 14, 2017 | Andras Cser, Merritt Maxim

    In a race to meet customer acquisition and retention targets while reducing account takeover (ATO) fraud, financial service firms have strived to ensure that their sites are both secure and easy to...

  • For Security & Risk Professionals

    Report

    Report Navigate The Future Of Mobile Security

    Vision: The Mobile Security Playbook
    February 6, 2017 | Stephanie Balaouras, Andras Cser

    The speed at which: 1) employees have adopted mobile applications and 2) DevOps methodologies are increasing application releases has forced security and risk (S&R) pros to revamp how they approach...

  • For Security & Risk Professionals

    Report

    Report Making The Business Case For Identity And Access Management

    Business Case: The Identity And Access Management Playbook
    January 25, 2017 | Andras Cser, Merritt Maxim

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage users' access to sensitive applications and data without inhibiting business agility,...

  • For Security & Risk Professionals

    Report

    Report Forrester's Risk-Driven Identity And Access Management Process Framework

    Process: The Identity And Access Management Playbook
    January 6, 2017 | Andras Cser

    Identity and access management (IAM) processes have always been convoluted. They affect many people (both customers and employees), systems, and teams, and this complexity makes it difficult to...

  • For Infrastructure & Operations Professionals

    Report

    Report Scoring Forrester's 2016 Cloud Predictions

    We Were Spot On For Most, Developing On Others, And Wrong On One
    December 22, 2016 | Lauren E. Nelson, Dave Bartoletti

    Every year, Forrester predicts what lies ahead for cloud in the year to come. In late 2015, we predicted the rise of hybrid cloud managers, the consolidation of cloud vendors, the movement of...

  • For Security & Risk Professionals

    Report

    Report Forrester's Customer IAM Security Maturity Assessment Model

    December 12, 2016 | Andras Cser, Merritt Maxim

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Symantec Injects New Life Into Its Consumer Security With LifeLock Acquisition

    Symantec Becomes One Of The Few Firms To Bridge Enterprise And Consumer Security And Privacy
    November 22, 2016 | Andras Cser, Jeff Pollard

    On November 21, Symantec announced its acquisition of LifeLock for $2.3 billion. This signals a significant reinvestment in Symantec's consumer security portfolio and an expansion into new consumer...

  • For Security & Risk Professionals

    Report

    Report Top Trends Shaping IAM In 2017

    Landscape: The Identity And Access Management Playbook
    November 21, 2016 | Merritt Maxim, Andras Cser

    For today's digital businesses, identity and access management (IAM) involves far more than just provisioning and enforcing employee access to corporate resources. S&R pros must now govern access...

  • For Security & Risk Professionals

    Report

    Report Breakout Vendors: Social Identity And Eligibility Verification (SIDEV)

    SIDEV Will Supplant Traditional Identity Verification Within 24 Months
    November 21, 2016 | Andras Cser, Merritt Maxim

    Traditional identity verification (IDV) solutions use information from customers' credit files to verify their identity online or on the phone. Social identity and eligibility verification (SIDEV)...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Identity And Access Management: 2016 To 2017

    Benchmarks: The Identity And Access Management Playbook
    November 17, 2016 | Merritt Maxim, Andras Cser

    This report provides a spending and technology adoption benchmark for security and risk (S&R) leaders responsible for developing their organization's identity and access management (IAM) strategy...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Cloud Security Gateways, Q4 2016

    The Eight Providers That Matter Most And How They Stack Up
    November 15, 2016 | Andras Cser

    In our 23-criteria evaluation of cloud security gateway (CSG) providers, we identified the eight most significant ones — Bitglass, Blue Coat/Symantec, CipherCloud, CloudLock/Cisco, Imperva,...

  • For Infrastructure & Operations Professionals

    Report

    Report Predictions 2017: Customer-Obsessed Enterprises Launch Cloud's Second Decade

    Ten Key Developments In Cloud Computing Shape The Industry In 2017
    November 2, 2016 | Dave Bartoletti, Lauren E. Nelson

    Cloud computing has been one of the most exciting and disruptive forces in the tech market in the past decade. The cloud market will accelerate faster in 2017 as enterprises around the world look...

  • For Security & Risk Professionals

    Report

    Report Predictions 2017: Cybersecurity Risks Intensify

    Landscape: The S&R Practice Playbook
    November 1, 2016 | Amy DeMartine, Jeff Pollard

    The connected world has arrived; we live and work in it. In this new reality, the next 12 months will see battles rage that will determine the amount of control individuals have over their own data...

  • For Security & Risk Professionals

    Report

    Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    October 25, 2016 | Andras Cser, Merritt Maxim

    Identity and access management (IAM) technologies have become a critical component of today's BT agenda. Business leaders, CIOs, and CISOs use them to understand and engage with customers as well...

  • For Security & Risk Professionals

    Report

    Report Achieving Zero Trust Identity And Access Management

    Zero Trust IAM Unifies And Improves Access Control Across The Digital Business
    October 25, 2016 | Andras Cser, Merritt Maxim

    Increasingly, IAM has become a tool not just for security but also for business agility. As firms exploit digital technologies to create new sources of value for customers and to increase their...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Poor Planning, Not An IoT Botnet, Disrupted The Internet

    Dyn Outage Underscores The Need To Plan For Failure
    October 24, 2016 | Jeff Pollard, Joseph Blankenship

    On October 21, internet users went through a real exercise in one way the internet could die. Critical infrastructure exists on the internet as well as in the real world, and this attack crippled...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Behavioral Biometrics

    Security Pros Can Reduce Fraud Without Damaging Customers' Digital Experience
    October 4, 2016 | Andras Cser, Merritt Maxim

    Behavioral biometrics continuously monitors user behavior, such as typing speed, mouse movements, and touchscreen interactions, to build a baseline profile from which security and risk...

  • For Security & Risk Professionals

    Report

    Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    September 30, 2016 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Lessons For Security And Risk Pros From The Yahoo Breach

    Don't Prioritize Corporate Damage Control Over Customers' Interests
    September 23, 2016 | Stephanie Balaouras, Jeff Pollard

    On Thursday, Yahoo announced that cybercriminals had compromised the personal information including names, email addresses, dates of birth, phone numbers, and, in some instances, security questions...

  • For Security & Risk Professionals

    Report

    Report Create Your Cloud Security Technology Strategy And Road Map

    Current Security Strategies And Road Maps Are Inadequate To Mitigate Cloud Risk
    September 14, 2016 | Andras Cser

    Cloud workloads are here, and as the CISO, it's your responsibility to protect them. To protect your sensitive data in the cloud from security breaches, privacy abuses, and other incidents, you...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor