101 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Andras Cser

Search Results

  • Webinar Hybrid Cloud Security Best Practices

    Wednesday, August 21, 2019, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Andras Cser

    Protecting cloud workloads and their configuration in public, private, and hybrid clouds is a key concern of enterprises. This webinar highlights the drivers and best practices to secure...

  • Report Build Your Identity And Access Management Road Map

    Road Map: The Identity And Access Management Playbook
    July 16, 2019 | Andras Cser, Merritt Maxim

    Base your identity and access management (IAM) road map on a well-defined strategy that establishes and articulates to technology and business leaders the business need and value of IAM. Your IAM...

  • Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    June 26, 2019 | Andras Cser, Merritt Maxim

    Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, CIOs, and CISOs use IAM...

  • Report Hybrid Cloud Security Best Practices

    Focus On The Five C's: Console, Configuration, Connectivity, Cloud Data, And Containers
    June 20, 2019 | Andras Cser

    Hybrid cloud security is a must for firms moving their critical data from on-premises to cloud workloads. This report, based on a small, 20-respondent panel survey, looks at cloud security best...

  • Report The Forrester Wave™: Identity-As-A-Service (IDaaS) For Enterprise, Q2 2019

    The 10 Providers That Matter Most And How They Stack Up
    June 12, 2019 | Andras Cser, Merritt Maxim

    In our 37-criterion evaluation of providers of identity-as-a-service (IDaaS) for enterprise, we identified the 10 most significant ones — Google, IBM, Idaptive, Microsoft, Okta, OneLogin, OpenText,...

  • Webinar Cloud Security Gateways — Key Trends And Vendor Landscape

    Using The Forrester Wave™
    June 12, 2019 | Andras Cser

    Cloud security gateways (CSGs) are a key component of protecting data both on-premises and in the cloud. This webinar looks at buyer behaviors and the vendor landscape of CSGs. Key...

  • Report Forrester Analytics: IAM Software Forecast, 2018 To 2023 (Global)

    ForecastView Document

    Identity and access management (IAM) software tools help digital businesses provide access to employees, partners, and customers without sacrificing security or user experience. This data-driven...

  • Report Forrester Analytics: Cloud Security Solutions Forecast, 2018 To 2023 (Global)

    ForecastView Document
    April 1, 2019 | Jennifer Adams, Andras Cser

    As software, infrastructure, and platforms shift to the cloud, a new breed of security services continues to emerge and grow to address the security requirements. This data-driven report gives a...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook
    March 25, 2019 | Andras Cser, Merritt Maxim

    Your identity and access management (IAM) strategy must establish and explain the business need and value of IAM to technology and business leaders. It must also describe the current state, define...

  • Report Best Practices: Customer Call Center Authentication

    Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
    March 22, 2019 | Andras Cser, Merritt Maxim

    Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Now Tech: Payment Tokenization, Q1 2019

    Forrester's Overview Of 21 Payment Tokenization Providers
    March 7, 2019 | Andras Cser

    You can use payment tokenization (PT) solutions to: 1) reduce the risk of fraud from stolen personal account numbers (PANs); 2) reduce the scope of PCI DSS compliance and audits; and 3) increase...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report The Security Of Cryptocurrencies

    Security Must Help Business Leaders Make Risk-Based Decisions On Cryptocurrency Adoption And Implementation
    February 13, 2019 | Andras Cser, Heidi Shey, Jeff Pollard

    Many enterprises are considering the adoption of cryptocurrencies for payment. As a security and risk (S&R) professional, you're responsible for helping business leaders understand the legal and...

  • Webinar Customer Call Centers: Dos And Don'ts

    February 7, 2019 | Andras Cser

    When we have the online channels (e.g., web, mobile app, etc.) all secured, fraudsters turn to the customer call center as an avenue to commit fraud. This webinar explains key types of fraud, best...

  • Report New Tech: Blockchain Identity (BCI) Management, Q1 2019

    Forrester's Landscape Overview Of 22 Providers
    January 3, 2019 | Andras Cser, Martha Bennett

    A new crop of blockchain identity (BCI) technologies, and the solutions they power, stand poised to unleash new paradigms in identity verification (IDV) and access policy enforcement, leading to...

  • Report Top Trends Shaping IAM In 2019

    Landscape: The Identity And Access Management Playbook
    January 3, 2019 | Andras Cser, Merritt Maxim

    For today's digital businesses, identity and access management (IAM) involves more than just provisioning and enforcing employee access to corporate applications and data. Security and risk (S&R)...

  • Report Understand The State Of Identity And Access Management, 2018 To 2019

    Benchmarks: The Identity And Access Management Playbook
    December 19, 2018 | Merritt Maxim, Andras Cser

    This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...

  • Report Building A Customer-Obsessed IAM Team

    Organization: The Identity And Access Management Playbook
    December 18, 2018 | Merritt Maxim, Andras Cser

    For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides an overview of the skills and...

  • Report Top Enterprise Fraud Management And Anti-Money-Laundering Trends

    Consortium, Third-Party, And Blockchain Data Integration Will Transform EFM And AML Solutions And Practices
    December 17, 2018 | Andras Cser

    While enterprise fraud management (EFM) and anti-money laundering (AML) are mature functions, regulatory pressures in Europe and advances in machine learning are rapidly and profoundly changing...

  • Report The Forrester Wave™: Privileged Identity Management, Q4 2018

    The 11 Providers That Matter Most And How They Stack Up
    November 14, 2018 | Andras Cser

    In our 35-criterion evaluation of privileged identity management (PIM) providers, we identified the 11 most significant ones — BeyondTrust, Bomgar, CA Technologies, Centrify, CyberArk,...

  • Webinar Top Trends Affecting Enterprise Fraud Management

    October 25, 2018 | Andras Cser

    This webinar looks at the top trends that affect the market and best practices for enterprise fraud management. We navigate through the top seven to 10 trends and provide best practices...

  • Report Best Practices: Customer And Employee Authentication

    Use Authentication To Reduce The Risk Of Data Breaches, Account Takeovers, And Fraud
    October 4, 2018 | Andras Cser, Merritt Maxim

    At their simplest, authentication solutions keep the bad guys out and let the good guys in. Security professionals use them to enforce user access policy and provide login and authorization...

  • Report Best Practices: Cloud Workload Security

    The Longer You Wait To Implement Cloud Workload Security, The Harder It Gets
    October 1, 2018 | Andras Cser

    Under increased pressure to move sensitive data to the cloud, security teams must comprehensively secure cloud workloads. Cloud workload security (CWS) solutions offer an automated and centralized...

Content Type

Apply

Filters

Region

Vendor