29 results in Everything
 

Sorry — your search returned 0 results, so we expanded the date range to "All".

Sort by:
Refine
  • Security & Risk
  • Consumer Mobility

Search Results

  • Webinar Understand Forrester's Privacy Segments In Europe To Please Your Customers Without Upsetting The Regulators

    September 28, 2017 | Gina Fleming, Enza Iannopollo

    Firms around the world are getting ready to comply with more stringent data privacy rules, and their customers are changing their privacy attitudes and behaviors. Some customers carefully select...

  • Report Design Mobile Security Metrics With Mobile Moments In Mind

    The Complete Mobile Security Dashboard
    February 13, 2017 | Jeff Pollard

    Security leaders struggling to demonstrate business value need to incorporate mobile security metrics into their reports. As companies adopt the mobile mind shift, mobile security metrics are often...

  • Report Brief: Mind The App!

    Five Recommendations To Get Data Privacy Right When Collecting Customer Data Via Mobile Apps
    July 10, 2015 | Enza Iannopollo

    The mobile mind shift puts companies into customers' pockets, and mobile apps have become the one-stop shop for customer engagement — and done well, mobile apps delight both customers (who get what...

  • Report Market Overview: Voice Biometrics

    March 30, 2015 | Andras Cser, Heidi Shey

    While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...

  • Report Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further
    October 1, 2014 | Rick Holland, Andras Cser, Heidi Shey

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and...

  • Report Brief: Apple Pay Signals A Fundamental Shift In Secure Payments Technologies

    September 22, 2014 | Andras Cser, Denee Carrington

    During the past year, customers, US customers in particular, were rocked by revelations that hackers had stolen their credit and debit card numbers from trusted and respected retailers such as...

  • Webinar "Leveling Up" Your Mobile Application Ecosystem

    December 4, 2013 | Tyler Shields

    Just as Security & Risk Professionals are coming to grips with managing personally owned devices in the corporate environment, the risks are moving higher up the stack and into the application...

  • Report Quick Take: Apple's iPhone 5S: The "S" Is For Security

    Biometrics Is Reborn On The Mobile Phone
    September 11, 2013 | Andras Cser, Eve Maler, Heidi Shey

    Biometrics has always held tremendous promise for better security, but it's never quite gained a solid foothold due to privacy concerns, cost of implementation, and availability of other substitute...

  • Report Mobile Authentication: Is This My App? Is This My User?

    Strategy Deep Dive: The Mobile Security And Operations Playbook
    December 5, 2012 | Andras Cser, Chenxi Wang

    Mobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to...

  • Report The 2012 Consumer Security Market Landscape: Key Dynamics And Growth Opportunities

    November 28, 2012 | Heidi Shey

    Freeware solutions, device proliferation, consumerization, the app Internet, and new entrants offering adjacent consumer privacy and security offerings have and will continue to change consumer...

  • Report Prepare For Anywhere, Anytime, Any-Device Engagement With A Stateless Mobile Architecture

    June 29, 2012 | Chenxi Wang

    This report outlines Forrester's future look for mobile security and operations. We designed this report to help security and risk (S&R) and infrastructure and operations (I&O) executives...

  • Report PCI X-Ray: Wireless Guidelines

    April 7, 2010 | John Kindervag

    To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...

  • Report PCI X-Ray: What's New In 1.2?

    January 30, 2009 | John Kindervag

    To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...

  • Webinar The Threat Alert: Wireless Is The New Internet

    December 30, 2008 | John Kindervag

    Recent data thefts highlight the risk of insecurely deploying enterprise wireless networks. Up to now, the focus of corporate network teams has been to provide wireless connectivity and...

  • Report PCI X-Ray: Wireless Security

    October 1, 2008 | John Kindervag

    To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...

  • Report Threat Alert: Wireless Is The New Internet

    August 12, 2008 | John Kindervag

    Until the recent indictment of 11 people for hacking into retailers' wireless networks and stealing more than 40 million credit and debit card accounts, the focus of corporate network teams has...

  • Report Mobile Authentication Marries Security With Convenience

    A Token-Killing Form Factor For Secure Consumer Online Banking
    November 16, 2007 | Bill Nagel

    Financial institutions seeking to expand their online and mobile banking offerings to their entire customer base face the age-old challenge of balancing security with usability. Many banks feel...