Refine your results

Date Range

Methodology

Analyst

Topics

Industry

Role

20 results in Reports

  • Authentication, Authorization & Audit
  • For Interactive Marketing Professionals

    Report:Defining DMARC

    A New Way For Emailers To Defend Themselves Against Email Fraud

    Hundreds of brands are hijacked by phishing scams every month, costing companies and ultimately their end customers billions. And existing methods to fight phishing like email authentication...

    • Downloads: 23
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Risk-Based Authentication, Q1 2012

    The Six Vendors That Matter Most And How They Stack Up

    In Forrester's 16-criteria evaluation of risk-based authentication vendors, we identified the six significant vendors in this category — CA Technologies, Entrust, iovation, RSA, Symantec, and...

    • Downloads: 60
  • For Security & Risk Professionals

    Report:TechRadar™ For Security Pros: Strong Authentication, Q1 2012

    Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge

    The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...

    • Downloads: 47
  • For Application Development & Delivery Professionals

    Report:What To Look For In E-Signature Providers

    Segment E-Signature Use Cases To Help In Your Selection

    Electronic signatures are gaining momentum due to accelerating consumer technology and the need to reduce both transaction costs and the time to close business. But despite increasing customer...

    • Downloads: 19
  • For Application Development & Delivery Professionals

    Report:Customer Experience Drives E-Signature Adoption

    No Waiting, Happy Customers, And Better Compliance

    Electronic signatures are gaining momentum among businesses of all shapes and sizes due to accelerating consumer technology and the need to reduce both transaction costs and the time to close...

    • Downloads: 23
  • For Security & Risk Professionals

    Report:Atlas Shrugged: Security Pros Must Adjust To The New Realities Of A Post-RSA Breach World

    Plan Your Move To Risk-Based Authentication And Software-Based Tokens

    The RSA breach presents IT security professionals with significant challenges regarding authentication and questions the security of the bulletproof hardware token hitherto thought to be invincible....

    • Downloads: 5
    • Rating:
  • For Security & Risk Professionals

    Report:SAS 70 Out, New Service Organization Control Reports In

    Security And Risk Professionals Must Prepare To Phase Out SAS 70 Today

    Developed by the American Institute of CPAs (AICPA), the Statements on Auditing Standards 70 (SAS 70) has been around since 1992. When the Sarbanes-Oxley Act (SOX) of 2002 passed, SAS 70 gained new...

    • Downloads: 20
  • For Application Development & Delivery Professionals

    Report:Market Overview: Database Security, 2011

    Database Security Solutions Mature While The Market Consolidates

    Enterprise databases continue to experience growing attacks despite enhanced security processes and increasing database security approaches. Security gaps in solutions persist in intelligent...

    • Downloads: 32
  • For Application Development & Delivery Professionals

    Report:Why Enterprise Database Security Strategy Has Become Critical

    This presentation discusses database security trends and drivers, current database security challenges, why enterprises should focus on an enterprisewide database security strategy, the three pillars...

    • Downloads: 8
  • For Application Development & Delivery Professionals

    Report:The Forrester Wave™: Database Auditing And Real-Time Protection, Q2 2011

    IBM, Imperva, And Sentrigo Lead, With Application Security, Oracle, And Fortinet Close Behind

    In Forrester's 147-criteria evaluation of database auditing and real-time protection vendors, we found that the market is rife with mature products. IBM, Imperva, and Sentrigo lead the pack because...

    • Downloads: 27
  • For Security & Risk Professionals

    Report:Inquiry Spotlight: Security And Risk, Q1 To Q4 2010

    Forrester's security and risk (S&R;) team fields hundreds of inquiries every month. We often gauge the interest in various topics and plan our future research agenda based on this barometer. Many of...

    • Downloads: 7
  • For Security & Risk Professionals

    Report:Market Overview: Privileged Identity Management

    Six New Features And Capabilities Redefine PIM Architecture

    Privileged identity management (PIM) is composed of password safes, sensitive entitlement management, and session recording and auditing. It's used primarily for managing system administrator...

    • Downloads: 15
  • For Security & Risk Professionals

    Report:Case Study: Improving Healthcare IT With Streamlined Access To Clinical Applications

    How One Healthcare Provider Improved The End User Experience Of 1,500 Physicians

    In today's healthcare environment, physicians must access a wide array of IT applications to provide quality patient care. Because of the growing number of both on-premises and SaaS-based...

    • Downloads: 9
  • For Vendor Strategy Professionals

    Report:Smart Computing Fuels Biometrics Growth

    How Biometrics Enable Smart Computing Solutions

    Biometrics is already a growing market today in a variety of applications. Smart Computing will help to fuel biometrics growth as smart applications call for a greater level of security and...

    • Downloads: 3
  • For Security & Risk Professionals

    Report:Identity And Access Management Adoption In Europe: 2009

    Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise

    Interest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...

    • Downloads: 3
  • For Security & Risk Professionals

    Report:Shift Happened In The Strong Authentication Market In 2009

    Key Vendors Made Dramatic Moves And Are Looking At A Cloudy Future

    The strong authentication market is on the move — slowly but surely. Nearly half of the authentication vendors profiled in Forrester's July 2008 market overview have since changed hands. Even...

    • Downloads: 4
  • For Vendor Strategy Professionals

    Report:India IT Market Predictions 2010

    This document provides vendor strategists with an analysis of the key trends in the India IT market in 2009 and previews the top trends that will shape the local market in 2010. Despite the global...

    • For Security & Risk Professionals

      Report:Market Overview: E-Signatures In 2010

      Straight-Through Processing And Legally Binding Approvals Enable Enterprise Flexibility And Cost Savings

      Electronic signatures (e-signatures) have been finding traction among companies of all sizes, particularly as part of overall business process automation initiatives. The market today is composed of...

      • Downloads: 16
    • For Security & Risk Professionals

      Report:Case Study: Baker Tilly Virchow Krause Builds Trust With Strong Authentication

      Customer Data Is Accessible Yet Safe Whether Users Are Connected Or Not

      Matt Jennings at Baker Tilly Virchow Krause needed to overhaul the accounting and advisory firm's security processes and technologies to ensure ongoing regulatory compliance and customer confidence....

      • Downloads: 4
    • For Application Development & Delivery Professionals

      Report:Your Enterprise Database Security Strategy 2010

      Stronger Measures Have Become Essential To Defend Against Growing Attacks

      With increasingly sophisticated attacks and rising internal data theft, database security merits a stronger focus that goes beyond traditional authentication, authorization, and access control (AAA)....

      • Downloads: 3
      • Comments: 1
      • Rating:
     
    Loading...

    Browse

    About Forrester

    Forrester Research, Inc. is an independent research company that provides pragmatic and forward-thinking advice to global leaders in business and technology.

    Roles We Serve

    Forrester supports leaders in 17 roles across three distinct client segments: IT, Marketing & Strategy, and Technology Industry.

    Analysts & Coverage Areas

    Aligned to your professional role, Forrester's analysts are experts in the specific technologies, issues, and trends currently impacting your business.

    Forrester Leadership Boards

    Fresh thinking and collaborative problem-solving through an unmatched combination of peer networking, forward-looking analysis, and professional guidance.

    Consulting

    Our expert analysts apply custom research-based solutions and data-rich insight to your critical challenges and opportunities.

    Community

    Connect with peers and analysts, share your views, and ask questions on key business issues.

    Blog

    Forrester analysts weigh in on the latest business and technology news.

    • BROWSE
    • Register
    • Call +1 617.613.5730