Skip to main content
38 results in Reports
 
Sort by:
Refine
  • Secure customers, protect the brand
  • Andras Cser

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    October 23, 2020 | Andras Cser, Sean Ryan

    Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...

  • Report Forrester's Identity And Access Management Maturity Assessment

    Assessment: The Identity And Access Management Playbook
    October 16, 2020 | Sean Ryan, Andras Cser

    Forrester's IAM maturity assessment tool is designed to help S&R professionals identify gaps in their current IAM strategy across all major identity and access management (IAM) functional areas,...

  • Report The Top Trends Shaping Anti-Money Laundering In 2020

    Robotic Process Automation, Cryptocurrencies, Real-Time Detection, And KYC Processes Gain Importance
    August 10, 2020 | Andras Cser

    With new real-time transactions gaining popularity and new legalized product markets (such as cannabis) emerging, anti-money-laundering (AML) regulations are getting tougher and more complex. This...

  • Report Best Practices For Container Security

    Protecting Containerized Applications Requires Technical And Organizational Steps
    July 24, 2020 | Sandy Carielli, Andras Cser

    Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...

  • Report Best Practices For eCommerce And Retail Fraud Management

    Balancing Secure Customer Experiences With Fraud Management Efficiency
    July 21, 2020 | Andras Cser

    eCommerce and retail fraud management (ERFM) is a tightrope that forces security and risk (S&R) pros to balance the business need for frictionless customer experiences with fraud avoidance. This...

  • Report The Top Security Technology Trends To Watch, 2020

    Ten Security And Risk Technologies Will Disrupt Security And Risk Practices

    Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top 10 security technologies to...

  • Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020

    Forrester's Overview Of 24 CIAM Providers
    June 24, 2020 | Andras Cser

    You can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...

  • Report Use Privileged Identity Management Pricing Insight For Buyer Advantage

    Understand Pricing Mechanics To Optimize Your PIM Procurement
    June 18, 2020 | Sean Ryan, Andras Cser

    Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...

  • Report Building A Customer-Obsessed IAM Team

    Organization: The Identity And Access Management Playbook
    June 3, 2020 | Andras Cser, Sean Ryan

    For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides job descriptions and an...

  • Report Assess Your Cloud Security Readiness

    Leverage Forrester's Custom Tool To Assess Your Cloud Security Maturity Across Six Major Technology Competencies
    May 29, 2020 | Andras Cser

    As firms migrate computing and data resources to the cloud, security remains a top concern and priority for both operational and compliance reasons. S&R professionals should use our custom tool, a...

  • Report The Forrester Wave™: Risk-Based Authentication, Q2 2020

    The Seven Providers That Matter Most And How They Stack Up
    May 27, 2020 | Andras Cser

    In our 33-criterion evaluation of risk-based authentication (RBA) providers, we identified the seven most significant ones — AppGate, IBM, Kount, LexisNexis Risk Solutions, OneSpan, RSA, and...

  • Report How A Least Privilege Model Can Reduce Dynamic Access Risks

    Applying Zero Trust To Address Overprivileged Employee/Entity Access
    May 27, 2020 | Sean Ryan, Andras Cser

    Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either...

  • Report Video: The Five Pillars Of A Robust And Resilient CIAM Strategy

    How Building An Identity Foundation Helps Drive Customer Trust And Loyalty
    May 11, 2020 | Andras Cser

    In a world where online interactions not only augment but replace in-person interactions, robust and resilient customer identity and access management (CIAM) plays a critical role. To help guide...

  • Report Understand The State Of Identity And Access Management, 2020

    Benchmarks: The Identity And Access Management Playbook
    April 21, 2020 | Sean Ryan, Andras Cser

    This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...

  • Report The Forrester Customer-Obsessed Identity And Access Management Operating Model

    Continuous Improvement: The Identity And Access Management Playbook
    April 20, 2020 | Andras Cser, Sean Ryan

    Being customer obsessed creates advantage and resiliency in times of change or difficulty. This is especially true for customer identity and access management (CIAM): The security customer...

  • Report The Top Trends Driving Cloud Workload Security In 2020

    Market Consolidation, SaaS Offerings, And Remediation And DevOps Integration Are Reshaping The CWS Market
    March 3, 2020 | Andras Cser

    Cloud workload security (CWS) solutions are deployed to detect, mitigate, and prevent cloud misconfigurations, configuration drift, identity and privilege proliferations, and vulnerabilities in...

  • Report Optimize User Experience With Passwordless Authentication

    Improve User Experience And Security And Lower The Cost Of Cross-Channel Authentication
    March 2, 2020 | Andras Cser, Sean Ryan

    With the evolution of numerical computing, the password has lost its ability to protect critical applications and data. This report looks at passwordless authentication, explaining how it can...

  • Report Using Zero Trust To Kill The Employee Password

    Secure Workforce Access With Stronger Authentication Methods
    March 2, 2020 | Sean Ryan, Andras Cser

    Passwords are easy pickings for cybercriminals and the culprit behind many cyberattacks. Administrative costs and user productivity losses add insult to injury. So why are so many organizations...

  • Report The Top Trends Shaping IAM In 2020

    Landscape: The Identity And Access Management Playbook
    January 29, 2020 | Andras Cser, Sean Ryan

    Identity is a core building block of a robust Zero Trust security ecosystem and infrastructure. In this report, we look at the eight most important trends that will shape the identity and access...

  • Report The Forrester Wave™: Cloud Workload Security, Q4 2019

    The 13 Providers That Matter Most And How They Stack Up
    December 9, 2019 | Andras Cser

    In our 30-criterion evaluation of cloud workload security (CWS) providers, we identified the 13 most significant ones — Alert Logic, Aqua Security, Bitdefender, Cavirin, Check Point, Cisco,...

  • Report Now Tech: Managed IAM Services, Q4 2019

    Forrester's Overview Of 18 IAM Managed Security Services Providers
    December 2, 2019 | Merritt Maxim, Andras Cser, Sean Ryan

    You can use managed identity and access management (IAM) services providers to implement IAM faster based on prebuilt integrations and deployment models, adapt to rapidly evolving digital...

  • Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

    Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
    November 25, 2019 | Andras Cser, Sean Ryan

    With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...

  • Report The Forrester Tech Tide™: Identity And Access Management, Q4 2019

    Seventeen Technology Categories Underpin The IAM Market
    November 14, 2019 | Andras Cser, Sean Ryan

    Identity and access management (IAM) is increasingly critical to firms' ability to win, serve, and retain their customers. To accelerate their performance in IAM, companies are evaluating and...

  • Report Predictions 2020: Cybersecurity

    October 30, 2019 | Jeff Pollard, Andras Cser, Heidi Shey

    Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...

  • Report Best Practices: Cloud Governance

    Processes: The Cloud Computing Playbook
    October 9, 2019 | Andras Cser, Lauren Nelson

    Transitioning workloads and data to the cloud is unstoppable — but the most difficult question is how to govern the process so you have a predictable, accountable, and scalable transition that...

  • 1
  • 2

Content Type

Apply

Filters

Industry