About Forrester
Forrester Research, Inc. is an independent research company that provides pragmatic and forward-thinking advice to global leaders in business and technology.
A New Way For Emailers To Defend Themselves Against Email Fraud
Hundreds of brands are hijacked by phishing scams every month, costing companies and ultimately their end customers billions. And existing methods to fight phishing like email authentication...
The Six Vendors That Matter Most And How They Stack Up
In Forrester's 16-criteria evaluation of risk-based authentication vendors, we identified the six significant vendors in this category — CA Technologies, Entrust, iovation, RSA, Symantec, and...
Traditional Methods Start To Sag, While Mobile-Fueled Methods Surge
The strong authentication landscape has undergone tremendous churn in recent years as new mobile-fueled technologies have come online and as RSA, the premier vendor of hardware one-time password...
Segment E-Signature Use Cases To Help In Your Selection
Electronic signatures are gaining momentum due to accelerating consumer technology and the need to reduce both transaction costs and the time to close business. But despite increasing customer...
No Waiting, Happy Customers, And Better Compliance
Electronic signatures are gaining momentum among businesses of all shapes and sizes due to accelerating consumer technology and the need to reduce both transaction costs and the time to close...
Plan Your Move To Risk-Based Authentication And Software-Based Tokens
The RSA breach presents IT security professionals with significant challenges regarding authentication and questions the security of the bulletproof hardware token hitherto thought to be invincible....
Security And Risk Professionals Must Prepare To Phase Out SAS 70 Today
Developed by the American Institute of CPAs (AICPA), the Statements on Auditing Standards 70 (SAS 70) has been around since 1992. When the Sarbanes-Oxley Act (SOX) of 2002 passed, SAS 70 gained new...
Database Security Solutions Mature While The Market Consolidates
Enterprise databases continue to experience growing attacks despite enhanced security processes and increasing database security approaches. Security gaps in solutions persist in intelligent...
This presentation discusses database security trends and drivers, current database security challenges, why enterprises should focus on an enterprisewide database security strategy, the three pillars...
IBM, Imperva, And Sentrigo Lead, With Application Security, Oracle, And Fortinet Close Behind
In Forrester's 147-criteria evaluation of database auditing and real-time protection vendors, we found that the market is rife with mature products. IBM, Imperva, and Sentrigo lead the pack because...
Forrester's security and risk (S&R;) team fields hundreds of inquiries every month. We often gauge the interest in various topics and plan our future research agenda based on this barometer. Many of...
Six New Features And Capabilities Redefine PIM Architecture
Privileged identity management (PIM) is composed of password safes, sensitive entitlement management, and session recording and auditing. It's used primarily for managing system administrator...
How One Healthcare Provider Improved The End User Experience Of 1,500 Physicians
In today's healthcare environment, physicians must access a wide array of IT applications to provide quality patient care. Because of the growing number of both on-premises and SaaS-based...
How Biometrics Enable Smart Computing Solutions
Biometrics is already a growing market today in a variety of applications. Smart Computing will help to fuel biometrics growth as smart applications call for a greater level of security and...
Uptake Of Individual Technologies Is Low, But Cloud Options Hold Promise
Interest in and adoption of identity and access management (IAM) technologies has been growing steadily over the past few years, fueled both by the desire to streamline processes relating to...
Key Vendors Made Dramatic Moves And Are Looking At A Cloudy Future
The strong authentication market is on the move — slowly but surely. Nearly half of the authentication vendors profiled in Forrester's July 2008 market overview have since changed hands. Even...
This document provides vendor strategists with an analysis of the key trends in the India IT market in 2009 and previews the top trends that will shape the local market in 2010. Despite the global...
Straight-Through Processing And Legally Binding Approvals Enable Enterprise Flexibility And Cost Savings
Electronic signatures (e-signatures) have been finding traction among companies of all sizes, particularly as part of overall business process automation initiatives. The market today is composed of...
Customer Data Is Accessible Yet Safe Whether Users Are Connected Or Not
Matt Jennings at Baker Tilly Virchow Krause needed to overhaul the accounting and advisory firm's security processes and technologies to ensure ongoing regulatory compliance and customer confidence....
Stronger Measures Have Become Essential To Defend Against Growing Attacks
With increasingly sophisticated attacks and rising internal data theft, database security merits a stronger focus that goes beyond traditional authentication, authorization, and access control (AAA)....