22 results in Everything
 
Sort by:
Refine
  • Information Security
  • Andras Cser

Search Results

  • Report Hybrid Cloud Security Best Practices

    Focus On The Five C's: Console, Configuration, Connectivity, Cloud Data, And Containers
    June 20, 2019 | Andras Cser

    Hybrid cloud security is a must for firms moving their critical data from on-premises to cloud workloads. This report, based on a small, 20-respondent panel survey, looks at cloud security best...

  • Report The Forrester Wave™: Identity-As-A-Service (IDaaS) For Enterprise, Q2 2019

    Tools And Technology: The Identity And Access Management Playbook
    June 12, 2019 | Andras Cser, Merritt Maxim

    In our 37-criterion evaluation of providers of identity-as-a-service (IDaaS) for enterprise, we identified the 10 most significant ones — Google, IBM, Idaptive, Microsoft, Okta, OneLogin, OpenText,...

  • Report Forrester Analytics: IAM Software Forecast, 2018 To 2023 (Global)

    ForecastView Document

    Identity and access management (IAM) software tools help digital businesses provide access to employees, partners, and customers without sacrificing security or user experience. This data-driven...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

  • Report Best Practices: Customer And Employee Authentication

    Use Authentication To Reduce The Risk Of Data Breaches, Account Takeovers, And Fraud
    October 4, 2018 | Andras Cser, Merritt Maxim

    At their simplest, authentication solutions keep the bad guys out and let the good guys in. Security professionals use them to enforce user access policy and provide login and authorization...

  • Report Best Practices: Cloud Workload Security

    The Longer You Wait To Implement Cloud Workload Security, The Harder It Gets
    October 1, 2018 | Andras Cser

    Under increased pressure to move sensitive data to the cloud, security teams must comprehensively secure cloud workloads. Cloud workload security (CWS) solutions offer an automated and centralized...

  • Report Now Tech: Authentication Management Solutions, Q3 2018

    Forrester's Overview Of 26 Authentication Management Providers
    August 7, 2018 | Andras Cser, Merritt Maxim

    You can use authentication management solutions to simplify and standardize credential processing for applications, reduce the operational costs of authentication, and improve the authentication...

  • Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    July 20, 2018 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

Content Type

Apply

Filters

Primary Role

Methodology

Vendor