Advanced Search
64 results in Reports
Sort by:
Refine
  • Merritt Maxim

Search Results

  • For Security & Risk Professionals

    Report

    Report Top Competencies To Look For In An IAM Systems Integrator

    Cloud App Integration, Hosting, And Identity Management And Governance Skills Matter
    May 15, 2017 | Andras Cser, Merritt Maxim

    Systems integrators (SIs) are a crucial part of identity and access management (IAM) deployments. SIs bring valuable deployment and integration experience, and their vital advice on business...

  • For Security & Risk Professionals

    Report

    Report Forrester's Guide To Drone Security Risks

    S&R Pros Must Prepare Their Businesses Today For Rapid Drone Adoption
    April 27, 2017 | Merritt Maxim, Salvatore Schiano

    Drones are no longer just a buzzword or hip gadget for amateur hobbyists. Organizations are increasingly deploying drones in a wide range of applications from agriculture to law enforcement. But...

  • For Security & Risk Professionals

    Report

    Report Forrester Data Report: Identity And Access Management Software Forecast, 2016 To 2021 (Global)

    ForecastView Document
    April 26, 2017 | Jennifer Adams, Merritt Maxim

    Identity and access management (IAM) is one of the most important security functions ensuring that the right people have access to the right resources for the right reasons. In Q4 2016 and Q1 2017,...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook
    April 26, 2017 | Merritt Maxim, Jeff Pollard

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Best Practices For Minimizing Business Travel Risk

    Detailed Guides For Preventing Cybertheft, Espionage, And Physical Harm
    April 24, 2017 | Heidi Shey, Merritt Maxim

    Determined adversaries will stop at nothing to infiltrate your firm for its sensitive data, and employees who travel for business or take their devices on the road often become a vulnerability that...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Physical Security, Q1 2017

    New Technologies Emerging To Improve Physical Security
    April 17, 2017 | Merritt Maxim

    This TechRadar defines the use cases, business value, and outlook for the 14 most relevant and important technologies for physical security. This includes core technologies, such as converged...

  • For Security & Risk Professionals

    Report

    Report Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook
    April 3, 2017 | Andras Cser, Merritt Maxim

    Your strategic plan for identity and access management (IAM) must establish and explain the business need and value of IAM to both technology management and business leaders. It must also describe...

  • For Security & Risk Professionals

    Report

    Report The Top IAM Trends From The RSA Conference 2017

    March 24, 2017 | Andras Cser, Merritt Maxim

    Although maturing quickly and available in new virtualized and containerized forms, identity and access management (IAM) is undergoing fundamental changes in response to: 1) hybrid cloud access...

  • For Security & Risk Professionals

    Report

    Report Improve Physical Security And Customer Experience

    S&R Pros Must Develop Five Essential Capabilities In 2017
    March 9, 2017 | Merritt Maxim

    Every customer interaction plays a vital role in shaping that customer's confidence in your brand. While many businesses have heavily invested in optimizing the digital customer experience (CX),...

  • For Security & Risk Professionals

    Report

    Report Security Strength And Ease Benchmark: US Online Retail Banking 2017

    Continuous Improvement: The Identity And Access Management Playbook
    February 14, 2017 | Andras Cser, Merritt Maxim

    In a race to meet customer acquisition and retention targets while reducing account takeover (ATO) fraud, financial services firms have strived to ensure that their sites are both secure and easy...

  • For Security & Risk Professionals

    Report

    Report Making The Business Case For Identity And Access Management

    Business Case: The Identity And Access Management Playbook
    January 25, 2017 | Andras Cser, Merritt Maxim

    Security and risk (S&R) executives responsible for identity and access management (IAM) must manage users' access to sensitive applications and data without inhibiting business agility,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For Security & Risk Professionals

    Report

    Report The Forrester Identity Management And Governance Maturity Model

    Assess Your Identity Management And Governance Maturity
    December 15, 2016 | Merritt Maxim

    Security and risk (S&R) leaders often struggle to understand the gaps and potential security vulnerabilities related to identity management tasks such as user provisioning, access certification,...

  • For Security & Risk Professionals

    Report

    Report Forrester's Customer IAM Security Maturity Assessment Model

    December 12, 2016 | Andras Cser, Merritt Maxim

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...

  • For Security & Risk Professionals

    Report

    Report Top Trends Shaping IAM In 2017

    Landscape: The Identity And Access Management Playbook
    November 21, 2016 | Merritt Maxim, Andras Cser

    For today's digital businesses, identity and access management (IAM) involves far more than just provisioning and enforcing employee access to corporate resources. S&R pros must now govern access...

  • For Security & Risk Professionals

    Report

    Report Breakout Vendors: Social Identity And Eligibility Verification (SIDEV)

    SIDEV Will Supplant Traditional Identity Verification Within 24 Months
    November 21, 2016 | Andras Cser, Merritt Maxim

    Traditional identity verification (IDV) solutions use information from customers' credit files to verify their identity online or on the phone. Social identity and eligibility verification (SIDEV)...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Identity And Access Management: 2016 To 2017

    Benchmarks: The Identity And Access Management Playbook
    November 17, 2016 | Merritt Maxim, Andras Cser

    This report provides a spending and technology adoption benchmark for security and risk (S&R) leaders responsible for developing their organization's identity and access management (IAM) strategy...

  • For CIO Professionals

    Report

    Report Predictions 2017: Security And Skills Will Temper Growth Of IoT

    November 2, 2016 | Frank E. Gillett, Michele Pelino

    Interest in the internet of things (IoT) has hit a fever pitch: IoT was the No. 1 search topic not only among CIOs but across all Forrester clients over the past six months. But technologies and...

  • For Security & Risk Professionals

    Report

    Report Predictions 2017: Cybersecurity Risks Intensify

    Landscape: The S&R Practice Playbook
    November 1, 2016 | Amy DeMartine, Jeff Pollard

    The connected world has arrived; we live and work in it. In this new reality, the next 12 months will see battles rage that will determine the amount of control individuals have over their own data...

  • For Security & Risk Professionals

    Report

    Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    October 25, 2016 | Andras Cser, Merritt Maxim

    Identity and access management (IAM) technologies have become a critical component of today's BT agenda. Business leaders, CIOs, and CISOs use them to understand and engage with customers as well...

  • For Security & Risk Professionals

    Report

    Report Achieving Zero Trust Identity And Access Management

    Zero Trust IAM Unifies And Improves Access Control Across The Digital Business
    October 25, 2016 | Andras Cser, Merritt Maxim

    Increasingly, IAM has become a tool not just for security but also for business agility. As firms exploit digital technologies to create new sources of value for customers and to increase their...

  • For Security & Risk Professionals

    Report

    Report The IoT Attack Surface Transcends The Digital-Physical Divide

    Security Leaders Must Prepare For High-Impact Attacks
    October 13, 2016 | Jeff Pollard, Merritt Maxim

    The internet of things (IoT) has evolved beyond a hyped buzzword into commercially available technologies that can significantly improve customer outcomes and deliver business benefits. However,...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Behavioral Biometrics

    Security Pros Can Reduce Fraud Without Damaging Customers' Digital Experience
    October 4, 2016 | Andras Cser, Merritt Maxim

    Behavioral biometrics continuously monitors user behavior, such as typing speed, mouse movements, and touchscreen interactions, to build a baseline profile from which security and risk...

  • For Security & Risk Professionals

    Report

    Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    September 30, 2016 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • For Security & Risk Professionals

    Report

    Report Q&A: 10 Questions To Ask Before Deploying Customer Identity And Access Management

    Gauge Customer Identity And Access Management (CIAM) Fit, And Drive Project Requirements
    September 7, 2016 | Merritt Maxim

    In this report, we examine a set of key evaluation questions for security and risk (S&R) professionals. Use these questions to assess the potential fit of a CIAM solution for your organization.

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor