February 15, 2012 Updated: February 22, 2012 The Forrester Wave : Risk-Based Authentication, Q1 2012

Size: px
Start display at page:

Download "February 15, 2012 Updated: February 22, 2012 The Forrester Wave : Risk-Based Authentication, Q1 2012"

Transcription

1 February 15, 2012 Updated: February 22, 2012 The Forrester Wave : Risk-Based Authentication, Q by Andras Cser and Eve Maler for Security & Risk Professionals Making Leaders Successful Every Day

2 February 15, 2012 Updated: February 22, 2012 The Forrester Wave : Risk-Based Authentication, Q The Six Vendors That Matter Most And How They Stack Up by Andras Cser and Eve Maler with Stephanie Balaouras and Jessica McKee Executive Summary In Forrester s 16-criteria evaluation of risk-based authentication vendors, we identified the six significant vendors in this category CA Technologies, Entrust, iovation, RSA, Symantec, and ThreatMetrix and researched, analyzed, and scored them. This report details our findings about how each vendor measures up and plots where they stand in relation to each other, to help security and risk professionals select the right solution for their authentication requirements. table of Contents 2 5 Ease Of Use And Cost Of Deployment Drive Use Of Risk-Based Authentication Risk-Based Authentication Looks At Login Context As An Implicit Second Factor Five Reasons Why Security And Risk Professionals Are Turning To Risk-Based Authentication Market Landscape: More Fraud Monitoring And Behavior Detection Risk-Based Authentication Evaluation Overview Evaluation Criteria Evaluated Vendors Have Market Presence And Success In Selected Verticals 6 Evaluation Analysis 8 Vendor Profiles Leaders Strong Performers 10 Supplemental Material NOTES & RESOURCES Forrester conducted lab-based, hands-on evaluations in November 2011 and interviewed six vendor and 12 user companies, including: CA Technologies, Entrust, iovation, RSA, Symantec, and ThreatMetrix. Related Research Documents TechRadar For Security And Risk Professionals: Strong Authentication, Q February 3, 2012 Atlas Shrugged: Security Pros Must Adjust To The New Realities Of A Post-RSA Breach World November 4, 2011 Market Overview: Fraud Management Solutions August 25, 2010 The Forrester Wave : Identity And Access Management, Q November 3, Forrester Research, Inc. All rights reserved. Forrester, Forrester Wave, RoleView, Technographics, TechRankings, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective owners. Reproduction or sharing of this content in any form without prior written permission is strictly prohibited. To purchase reprints of this document, please clientsupport@ forrester.com. For additional reproduction and usage information, see Forrester s Citation Policy located at Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.

3 2 The Forrester Wave : Risk-Based Authentication, Q Ease of Use and cost of deployment drive use of Risk-based authentication The most recent US Federal Financial Institutions Examination Council (FFIEC) regulations require banks to use stronger, two-factor authentication mechanisms in addition to techniques such as security questions and mutual authentication (training users to only enter their password if they see the image they selected at registration time). FFIEC also added requirements to evaluate the risk of login and post-login transactions. 1 These requirements were added because static security questions have been weakened as a security method since fraudsters and cybercriminals can find many security answers, such as your pet s name or the street you grew up on, in profiles for social media such as Facebook and Twitter. Although traditional strong authentication may involve looking up and supplying a secret from a printed list, typing a secret on a keyboard, or placing one s finger on a print reader, cost and complexity can slow adoption. This is where risk-based authentication methods can help. Risk-Based Authentication Looks At Login Context As An Implicit Second Factor Risk-based authentication (RBA) methods observe users actions and transaction context silently in order to form a risk score. RBA frequently leads to stepping up to a stronger form authentication that the user must explicitly perform. 2 Users all over the world, especially those in North America, are frustrated with having to carry hardware tokens to authenticate, and security and risk (S&R) professionals increasingly realize that they should inconvenience a customer, business partner, or employee only if they see an elevated risk of fraud based on the user s login and transaction context. For example, if the user logged in 10 minutes ago from China or Eastern Europe and now is trying to log in from Canada or the US, it s definitely a higher risk transaction. Logging in during normal business hours for the geolocation of the server is also less risky than logging in during off hours, such as 1 o clock on a Sunday morning. Based on authentication and transaction context, you can build a risk score that estimates how much deviation there is from a normal transaction and what you should do (see Figure 1). Typical actions include: 1) allow the user to log in without further authentication; 2) ask for more credentials (two-factor authentication tokens, send SMS text message to the user s mobile phone); or 3) block the user and, if the risk score is very high, lock them out, too. February 15, 2012 Updated: February 22, , Forrester Research, Inc. Reproduction Prohibited

4 The Forrester Wave : Risk-Based Authentication, Q Figure 1 Build A Risk Score That Estimates Deviation User 1 IP address geolocation: US Browser locale: US Time: 10:10 a.m., Tuesday Device: Same as always Low risk Server in US User 1 IP address geolocation: Vietnam Browser locale: Vietnam Time: 10:15 a.m., Tuesday Device: New High risk User 2 IP address geolocation: US Browser locale: Vietnam Time: 1 a.m., Sunday Device: New High risk Source: Forrester Research, Inc. Five Reasons Why Security And Risk Professionals Are Turning To Risk-Based Authentication Why are more S&R professionals turning to RBA? It s because RBA: Is easy to deploy. RBA only has server-side installation and configuration and typically only requires minimal client-side components (JavaScript, ActiveX, etc.). It doesn t require extensive and costly software package delivery to the user s front end. Works well on mobile devices. Security and risk professionals find that they must increasingly support mobile device logins and security. RBA allows for device fingerprinting on mobile devices just as easily as it does on regular desktops. For high-risk transactions, you can prompt users to authenticate using a software token that is installed on a mobile device. This significantly reduces hardware and general maintenance costs associated with tokens. Software tokens can also perform advanced functions such as transaction-signing for banking transactions. Is flexible to use on nonweb channels. While the primary use case of RBA today is on the web channel, given RBA s excellent capabilities to pick up on behavior anomalies, you can easily adopt the infrastructure for channels such as kiosks, bank branches, and telephone interactive voice response. Is easy to use. Users experience matters not just for external-facing consumer applications but also for B2B and B2E use cases. Companies marketing departments are telling security 2012, Forrester Research, Inc. Reproduction Prohibited February 15, 2012 Updated: February 22, 2012

5 4 The Forrester Wave : Risk-Based Authentication, Q departments not to interfere with user experience unnecessarily RBA solves this challenge easily; users don t see much of what s happening and their user experience is largely unchanged. Is cost-effective. When users use fewer tokens, you will get fewer help desk calls on password resets. Companies that we talked to also mentioned that because RBA integrates with SMS/text message-based, one-time passwords (OTPs) or software OTP tokens installed on mobile devices, they have to buy and maintain fewer physical hardware tokens. This also leads to significant costs savings (see Figure 2). Figure 2 Firms Motivations To Deploy Risk-Based Authentication One-Time Password 5. Easy to deploy Generate 4. Mobile is everywhere 3. Flexible One-Time Password Easy-to-use Generate 1. Cost-effective Source: Forrester Research, Inc. Market Landscape: More Fraud Monitoring And Behavior Detection Forrester observes that RBA solutions increasingly integrate with back-end fraud monitoring systems, such as Actimize, Accertify, Retail Decisions, CyberSource, and FICO, which look at and analyze transaction details (amounts, locations, addresses, etc.). This helps better coordinate fraud detection at the time of the login and at the time a user performs the transaction. In this dynamic and emerging market, most legacy OTP and web single sign-on vendors have offerings in this space, and many device fingerprinting companies offer RBA features. Vendors have been concentrating on: 1) creating reliable device fingerprints for not only desktops but also mobile devices; 2) creating self-learning systems to detect behavioral anomalies; and 3) combining statistical models with rules to establish a risk score. February 15, 2012 Updated: February 22, , Forrester Research, Inc. Reproduction Prohibited

6 The Forrester Wave : Risk-Based Authentication, Q Risk-Based Authentication Evaluation Overview To assess the state of the RBA market and see how the vendors stack up against each other, Forrester evaluated the strengths and weaknesses of top RBA vendors. Evaluation Criteria After examining past research, user need assessments, and vendor and expert interviews, we developed a comprehensive set of evaluation criteria. We evaluated vendors against 16 criteria, which we grouped into three high-level buckets: Current offering. Each vendor s position on the vertical axis of the Forrester Wave graphic indicates the strength of its current product offering. After the vendor s demonstration of the solution, Forrester requested unfettered access to an online demonstration environment of the solution. Forrester looked at how easy it would be for administrators to manage policies as well as what kind of login and transaction (payment, account creation, etc.) templates existed in the solution. Forrester investigated how the vendor calculates device fingerprints and what kinds of strong authentication methods, web access management, and fraud management solutions the RBA vendor provides and/or integrates with. Finally, Forrester looked at how the solution provides capabilities for fraudulent case management. Strategy. A vendor s position on the horizontal axis indicates the strength of its go-to-market strategy. Forrester looked at how many engineers are developing the solution and how many salespeople are selling it. Forrester also evaluated how differentiated the vendor s future plans are, customer satisfaction with the vendor s solution based on actual customer interviews, and IT inquiries. Forrester also placed emphasis on the vendor s mobile strategy and the available delivery methods (on-premises versus cloud). Market presence. The size of the vendor s bubble on the chart indicates its market presence. Forrester estimated the vendor s product revenue (excluding implementation services) and measured the solution s installed base and its growth in terms of number of production customer organizations. Evaluated Vendors Have Market Presence And Success In Selected Verticals Forrester included six vendors in the assessment: CA Technologies, Entrust, iovation, RSA, Symantec, and ThreatMetrix. Each of these vendors has (see Figure 3): Product revenues greater than $2 million. Forrester evaluated vendors that generate more than $2 million annually from selling product. We excluded consulting revenue related to custom and specialized solutions. General viability in selected verticals. The solution must have an install base with credible, named references in financial services, healthcare, insurance, public sector, and retail. 2012, Forrester Research, Inc. Reproduction Prohibited February 15, 2012 Updated: February 22, 2012

7 6 The Forrester Wave : Risk-Based Authentication, Q Mindshare among our clients. Forrester included vendors whose solutions we regularly hear about in client inquiries in an unsolicited fashion (our clients looked at these vendors on their own and had questions about them, our clients have included these vendors in RFPs on their own, etc.). Forrester also invited Oracle and 41st Parameter to participate in this survey, but they declined to participate. Figure 3 Evaluated Vendors: Product Information And Selection Criteria Vendor Product evaluated Version evaluated Version release date CA Technologies CA RiskMinder (formerly CA Arcot RiskFort) v September 2010 Entrust IdentityGuard v. 10 June 2011 Iovation ReputationManager 360 v November 2010 RSA Adaptive Authentication v SP3 December 2010 Symantec VIP Fraud Detection Service v. 4.0 April 2011 ThreatMetrix ThreatMetrix Prevention Platform v. 2.3 March 2011 Vendor selection criteria Product revenues greater than $2 million. Forrester evaluated vendors that generate more than $2 million annually from selling product. We excluded consulting revenue related to custom and specialized solutions. General viability in selected verticals. The solution must have an install base with credible, named references in financial services, healthcare, insurance, public sector, and retail. Mindshare among our clients. Forrester included vendors whose solutions we regularly hear about in client inquiries in an unsolicited fashion (our clients looked at these vendors on their own and had questions about them, our clients have included these vendors in RFPs on their own, etc.). Source: Forrester Research, Inc. EVALUATION ANALYSIS The evaluation uncovered a market in which (see Figure 4): RSA and CA Technologies lead the pack. RSA dominated this Forrester Wave because it has a huge customer base that dwarfs other vendors and has been striving to provide customers with a wide selection of authentication methods and tokens and well-rounded case management. RSA also offers a leading data aggregator s data sources for identity vetting and proofing for out-of-wallet security questions to help organizations meet FFIEC compliance mandate requirements. CA s acquisition of Arcot signals that it s evolving from a traditional IAM vendor into not only RBA but fraud management. CA Technologies also offers IDology data sources February 15, 2012 Updated: February 22, , Forrester Research, Inc. Reproduction Prohibited

8 The Forrester Wave : Risk-Based Authentication, Q for identity vetting and proofing for out-of-wallet security questions. CA Technologies offers a single administrative console that manages both the risk-based authentication and strong authentication credentials. Symantec, Entrust, ThreatMetrix, and iovation offer competitive options. Entrust has long been a credible RBA and OTP vendor in the government and financial services verticals and has a solid, well-integrated solution. Symantec s acquisition of the VeriSign Fraud Detection Services, and its integration with the VeriSign Identity Protection authentication-as-a-service and the Symantec Endpoint Protection portfolio, is a promising offering for many organizations trying to meet FFIEC compliance mandate requirements. ThreatMetrix and iovation both have a device fingerprinting and reputation background that they are rapidly expanding into riskbased authentication. This evaluation of the RBA market is intended to be a starting point only. We encourage readers to view detailed product evaluations and adapt the criteria weightings to fit their individual needs through the Forrester Wave Excel-based vendor comparison tool. Figure 4 Forrester Wave : Risk-Based Authentication, Q1 12 Strong Risky Strong Bets Contenders Performers Leaders Go online to download the Forrester Wave tool for more detailed product evaluations, feature Current offering Entrust ThreatMetrix iovation CA Symantec RSA comparisons, and customizable rankings. Market presence Weak Weak Strategy Strong Source: Forrester Research, Inc. 2012, Forrester Research, Inc. Reproduction Prohibited February 15, 2012 Updated: February 22, 2012

9 8 The Forrester Wave : Risk-Based Authentication, Q Figure 4 Forrester Wave : Risk-Based Authentication, Q1 12 (Cont.) Forrester s Weighting CA Entrust iovation RSA Symantec ThreatMetrix CURRENT OFFERING Policy administration auditing and rules Templates Login context and device profiling Statistical risk models Two-factor authentication provided Web single sign-on Fraud intelligence integration and information networks Case management 50% 10% 10% 10% 10% STRATEGY Personnel Future plans Customer satisfaction Mobile strategy Hosted offering Verticals 50% 25% 20% 10% MARKET PRESENCE Product revenue Installed base 0% 50% 50% All scores are based on a scale of 0 (weak) to 5 (strong). Source: Forrester Research, Inc. vendor PROFILES Leaders RSA extends OTP token market domination to RBA. RSA was able to overcome the fallout of its breach earlier this year and offers a credible and solid RBA product to its customers. The solution offers specific and self-learning models for each protected channel with the solid case management that provides feedback to the statistical model. It has a good integration story with many web access management solutions and provides an SOA-based architecture for easy customer integration. RSA offers adaptive authentication as an on-premises product or hosted solution. The solution has the largest installed base and number of resources supporting it. RSA is somewhat behind others with its transaction-signing software tokens, accessibility of the statistical model to end users, and agility to meet new customer requirements. February 15, 2012 Updated: February 22, , Forrester Research, Inc. Reproduction Prohibited

10 The Forrester Wave : Risk-Based Authentication, Q CA Technologies has leading hosted RBA capabilities. In 2010, CA Technologies acquired Arcot to boost its security and fraud management capabilities. 3 CA can provide the solution not only as an on-premises, perpetual license offering but also as a hosted SaaS solution with peruser and per-transaction pricing. The solution provides strong case management screens with case queues and extensive reporting, which it can integrate with other case management systems that clients have. While CA Technologies rule management shines by providing a great complement to the statistical model, only one rule can impact the risk score, which some customers accept but others find too restrictive. The solution has basic built-in link analytics based on a set of predefined dimensions such as device, IP, user, and where applicable, merchant, and can only evaluate arbitrary transaction attributes when integrated by CA Technologies Technical Services. Strong Performers Entrust has a broad set of authenticators and extensive presence in financial services. Of the vendors reviewed, Entrust has the broadest set of brand name authenticators, which caters to firms that want to implement a well-integrated and full-featured RBA solution. It provides a great self-service user interface for end users to manage their tokens ( I left my token at home and want to use a grid-card today only ). Administrators can freely influence and configure what goes into a device ID and how IP addresses are factored into calculating risk scores. The solution provides no real case management today, lacks in full OATH standards support, has no link analytics, and has separate policy management interfaces for IdentityGuard and TransactionGuard. Symantec provides extensive statistical models and integration with VIP. The Symantec/ VeriSign solution has extensive behavioral analytics modeling with a self-learning and customizable information clustering model. It also allows for dynamic blacklisting of entities and has a strong focus on payment fraud. The solution integrates with the VIP authentication framework of , SMS, phone (Authentify) challenge mechanisms. It has a very flexible, programming language-like rule design framework and a decent fraud case management interface. The solution does not provide JavaScript collector; all client-side attribute collection is the client s responsibility, which can lead to some integration challenges. There is no visual interface for link analytics, and using customer-built models can be expensive in terms of integration cost. The product does not provide out-of-the-box integration with commercial web access management solutions and lacks market presence in the retail vertical. The vendor also had the lowest number of customers in production. ThreatMetrix provides extensive client- and server-side device analytics. Coming from the device fingerprint and reputation field, the solution has a very strong device identification mechanism that is fairly configurable. The solution provides extensive templates and models for payment, account creation, and login transactions and integrates with CyberSource and Accertify s fraud management solutions. The company grew its headcount with an acquisition 2012, Forrester Research, Inc. Reproduction Prohibited February 15, 2012 Updated: February 22, 2012

11 10 The Forrester Wave : Risk-Based Authentication, Q in December The solution is somewhat behind other vendors on authentication; standalone does not provide its own authentication tokens and does not provide productized integrations with web single sign-on solutions but integrates with ActivIdentity 4TRESS. The vendor s road map includes identity screening, out-of-band authentication, improved mobile device identification, and an extended library for mobile application support. (Scoring does not reflect ThreatMetrix s December 2011 acquisition of TrustDefender, an antimalware and secure browsing company). Iovation provides an association network and has a great network of fraud integrations. The solution comes with great delegated administration support for policy changes. As a vendor with a pedigree in device reputation, the solution provides extensive capabilities for IP address velocity checking and entity white lists and blacklists. Iovation doesn t publish the data elements it collects for device identification, but Forrester expects that they are a combination of hardware, software, network, and browser information tags. The solution provides extensive templates for deposits, loans, logins, modify account profile, payment, signup, withdrawal, as well as customer-defined transactions. There is no end user self-service, and the vendor does not provide its own authenticators or out-of-the-box integration with commercial web access management solutions. Supplemental MATERIAL Online Resource The online version of Figure 4 is an Excel-based vendor comparison tool that provides detailed product evaluations and customizable rankings. Data Sources Used In This Forrester Wave Forrester used a combination of four data sources to assess the strengths and weaknesses of each solution: Vendor surveys. Forrester surveyed vendors on their capabilities as they relate to the evaluation criteria. Once we analyzed the completed vendor surveys, we conducted vendor calls where necessary to gather details of vendor qualifications. Product demos. We asked vendors to conduct demonstrations of their product s functionality. We used findings from these product demos to validate details of each vendor s product capabilities. Independent, hands-on product testing. Forrester also requested unfettered access to vendors demonstration environments, where it could play with the product, validating its functionality and fit for Forrester s use cases, as well as testing the user interface and its ease of use. Customer reference calls. To validate product and vendor qualifications, Forrester also conducted reference calls with two of each vendor s current customers. February 15, 2012 Updated: February 22, , Forrester Research, Inc. Reproduction Prohibited

12 The Forrester Wave : Risk-Based Authentication, Q The Forrester Wave Methodology We conduct primary research to develop a list of vendors that meet our criteria to be evaluated in this market. From that initial pool of vendors, we then narrow our final list. We choose these vendors based on: 1) product fit; 2) customer success; and 3) Forrester client demand. We eliminate vendors that have limited customer references and products that don t fit the scope of our evaluation. After examining past research, user need assessments, and vendor and expert interviews, we develop the initial evaluation criteria. To evaluate the vendors and their products against our set of criteria, we gather details of product qualifications through a combination of lab evaluations, questionnaires, demos, and/or discussions with client references. We send evaluations to the vendors for their review, and we adjust the evaluations to provide the most accurate view of vendor offerings and strategies. We set default weightings to reflect our analysis of the needs of large user companies and/or other scenarios as outlined in the Forrester Wave document and then score the vendors based on a clearly defined scale. These default weightings are intended only as a starting point, and we encourage readers to adapt the weightings to fit their individual needs through the Excel-based tool. The final scores generate the graphical depiction of the market based on current offering, strategy, and market presence. Forrester intends to update vendor evaluations regularly as product capabilities and vendor strategies evolve. Endnotes 1 Go to the Federal Financial Institutions Examination Council for more information about risk management controls necessary to authenticate the identity of retail and commercial customers accessing Internet-based financial services. Source: FFIEC ( 2 While security pros have always known that authentication is a prerequisite for most authorization functions, modern online life is finally demanding stronger forms of authentication than the lowly userchosen password. To better understand the landscape and the curve of the technologies on the market, see the February 3, 2012, TechRadar For Security Pros: Strong Authentication, Q report. 3 At end of February 2012, CA Technologies plans to change the product name to CA RiskMinder v , Forrester Research, Inc. Reproduction Prohibited February 15, 2012 Updated: February 22, 2012

13 Making Leaders Successful Every Day Headquarters Forrester Research, Inc. 60 Acorn Park Drive Cambridge, MA USA Tel: Fax: Nasdaq symbol: FORR Research and Sales Offices Forrester has research centers and sales offices in more than 27 cities internationally, including Amsterdam, Netherlands; Beijing, China; Cambridge, Mass.; Dallas, Texas; Dubai, United Arab Emirates; Frankfurt, Germany; London, UK; New Delhi, India; San Francisco, Calif.; Sydney, Australia; Tel Aviv, Israel; and Toronto, Canada. For the location of the Forrester office nearest you, please visit: For information on hard-copy or electronic reprints, please contact Client Support at , , or We offer quantity discounts and special pricing for academic and nonprofit institutions. Forrester Research, Inc. (Nasdaq: FORR) is an independent research company that provides pragmatic and forwardthinking advice to global leaders in business and technology. Forrester works with professionals in 19 key roles at major companies providing proprietary research, customer insight, consulting, events, and peer-to-peer executive programs. For more than 28 years, Forrester has been making IT, marketing, and technology industry leaders successful every day. For more information, visit

Making Leaders Successful Every Day

Making Leaders Successful Every Day January 27, 2012 The Forrester Wave : US Digital Agencies Mobile Marketing Strategy And Execution, Q1 2012 by Melissa Parrish for Interactive Marketing Professionals Making Leaders Successful Every Day

More information

The Forrester Wave : IT Governance, Risk, And Compliance Platforms, Q4 2011 by Chris McClean for Security & Risk Professionals

The Forrester Wave : IT Governance, Risk, And Compliance Platforms, Q4 2011 by Chris McClean for Security & Risk Professionals December 1, 2011 The Forrester Wave : IT Governance, Risk, And Compliance Platforms, Q4 2011 by Chris McClean for Security & Risk Professionals Making Leaders Successful Every Day December 1, 2011 The

More information

The Forrester Wave : Application Release Automation, Q2 2015

The Forrester Wave : Application Release Automation, Q2 2015 For: Infrastructure & Operations Professionals The Forrester Wave : Application Release Automation, Q2 2015 by Amy DeMartine and Kurt Bittner, April 14, 2015 Key Takeaways I&O Pros Are Turning Toward Release

More information

The Forrester Wave : Digital Agencies In China Strategy And Execution, Q1 2015

The Forrester Wave : Digital Agencies In China Strategy And Execution, Q1 2015 For: Marketing Leadership Professionals The Forrester Wave : Digital Agencies In China Strategy And Execution, Q1 2015 by Xiaofeng Wang, January 27, 2015 Key Takeaways OgilvyOne, Isobar, And Razorfish

More information

The Forrester Wave : Loyalty Program Service Providers, Q4 2013

The Forrester Wave : Loyalty Program Service Providers, Q4 2013 For: Customer Insights Professionals The Forrester Wave : Loyalty Program Service Providers, Q4 2013 by Emily Collins, October 30, 2013 Key Takeaways Loyalty Service Providers Don t Just Support Points

More information

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals NetQoS Offers An Experience Monitoring Solution For Global Performance Management The Forrester Wave Vendor Summary, Q2 2007 by Jean-Pierre Garbani with Thomas Mendel, Ph.D., and Reedwan Iqbal EXECUTIVE

More information

Making Leaders Successful Every Day

Making Leaders Successful Every Day January 23, 2012 Understanding Customer Service Satisfaction To Inform Your 2012 ebusiness Strategy by Diane Clarkson for ebusiness & Channel Strategy Professionals Making Leaders Successful Every Day

More information

May 6, 2011 The Forrester Wave : Database Auditing And Real-Time Protection, Q2 2011

May 6, 2011 The Forrester Wave : Database Auditing And Real-Time Protection, Q2 2011 May 6, 2011 The Forrester Wave : Database Auditing And Real-Time Protection, Q2 2011 by Noel Yuhanna for Application Development & Delivery Professionals Making Leaders Successful Every Day May 6, 2011

More information

Making Leaders Successful Every Day

Making Leaders Successful Every Day November 30, 2011 The Forrester Wave : Enterprise Governance, Risk, And Compliance Platforms, Q4 2011 by Chris McClean for Security & Risk Professionals Making Leaders Successful Every Day November 30,

More information

The Forrester Wave : Bid Management Software Providers, Q4 2012

The Forrester Wave : Bid Management Software Providers, Q4 2012 FOR: Interactive Marketing Professionals The Forrester Wave : Bid Management Software Providers, Q4 2012 by shar VanBoskirk, november 16, 2012 Key TaKeaWays software solutions exist To help scale paid

More information

How To Onboarding

How To Onboarding February 6, 2012 A Strategic Approach To Onboarding Financial Service Consumers by Brad Strothkamp for Consumer Product Strategy Professionals Making Leaders Successful Every Day February 6, 2012 A Strategic

More information

The Forrester Wave : Identity And Access Management Suites, Q3 2013

The Forrester Wave : Identity And Access Management Suites, Q3 2013 For: Security & Risk Professionals The Forrester Wave : Identity And Access Management Suites, Q3 2013 by Andras Cser and Eve Maler, September 4, 2013 KEY TAKEAWAYS The Old Boundaries Are Gone -- Enterprise

More information

September 27, 2007 PremiTech s Passive End User Experience Monitoring Agent Is Performance-Oriented The Forrester Wave Vendor Summary, Q3 2007

September 27, 2007 PremiTech s Passive End User Experience Monitoring Agent Is Performance-Oriented The Forrester Wave Vendor Summary, Q3 2007 PremiTech s Passive End User Experience Monitoring Agent Is Performance-Oriented The Forrester Wave Vendor Summary, Q3 2007 by Jean-Pierre Garbani with Thomas Mendel, Ph.D. and Reedwan Iqbal EXECUTIVE

More information

April 25, 2011 The Forrester Wave : Enterprise Service Bus, Q2 2011

April 25, 2011 The Forrester Wave : Enterprise Service Bus, Q2 2011 April 25, 2011 The Forrester Wave : Enterprise Service Bus, Q2 2011 by Ken Vollmer for Application Development & Delivery Professionals Making Leaders Successful Every Day April 25, 2011 The Forrester

More information

The Forrester Wave : Enterprise Backup And Recovery Software, Q2 2013

The Forrester Wave : Enterprise Backup And Recovery Software, Q2 2013 For: Infrastructure & Operations Professionals The Forrester Wave : Enterprise Backup And Recovery Software, Q2 2013 by Rachel A. Dines, June 28, 2013 KEY TAKEAWAYS Plagued By Age-Old Backup And Recovery

More information

January 12, 2011 The Forrester Wave : US Database Marketing Service Providers, Q1 2011 by Dave Frankland for Customer Intelligence Professionals

January 12, 2011 The Forrester Wave : US Database Marketing Service Providers, Q1 2011 by Dave Frankland for Customer Intelligence Professionals January 12, 2011 The Forrester Wave : US Database Marketing Service Providers, Q1 2011 by Dave Frankland for Customer Intelligence Professionals Making Leaders Successful Every Day January 12, 2011 The

More information

October 6, 2011 The Forrester Wave : Web Analytics, Q4 2011 by Joe Stanhope for Customer Intelligence Professionals

October 6, 2011 The Forrester Wave : Web Analytics, Q4 2011 by Joe Stanhope for Customer Intelligence Professionals October 6, 2011 The Forrester Wave : Web Analytics, Q4 2011 by Joe Stanhope for Customer Intelligence Professionals Making Leaders Successful Every Day October 6, 2011 The Forrester Wave : Web Analytics,

More information

April 15, 2008 The Forrester Wave : Data Center Automation, Q2 2008. by Evelyn Hubbert for IT Infrastructure & Operations Professionals

April 15, 2008 The Forrester Wave : Data Center Automation, Q2 2008. by Evelyn Hubbert for IT Infrastructure & Operations Professionals April 15, 2008 The Forrester Wave : Data Center Automation, Q2 2008 by Evelyn Hubbert for IT Infrastructure & Operations Professionals Making Leaders Successful Every Day Includes a Forrester Wave April

More information

How To Choose An Itsm Software As A Service (Saas) From A List Of Vendors

How To Choose An Itsm Software As A Service (Saas) From A List Of Vendors For: Infrastructure & Operations Professionals The Forrester Wave : ITSM SaaS Delivery Capabilities, Q3 2014 by Amy DeMartine, July 28, 2014 Key Takeaways The ITSM SaaS Market Is Growing, But Delivery

More information

January 10, 2006 Allant: A Market Leader Among Database Marketing Service Providers The Forrester Wave Vendor Summary, Q1 2006

January 10, 2006 Allant: A Market Leader Among Database Marketing Service Providers The Forrester Wave Vendor Summary, Q1 2006 TECH CHOICES Allant: A Market Leader Among Database Marketing Service Providers The Forrester Wave Vendor Summary, Q1 2006 by Eric Schmitt with Chris Charron and Jennifer Joseph EXECUTIVE SUMMARY The Allant

More information

The Forrester Wave : Customer Analytics Solutions, Q4 2012

The Forrester Wave : Customer Analytics Solutions, Q4 2012 FOR: Customer Intelligence Professionals The Forrester Wave : Customer Analytics Solutions, Q4 2012 by srividya sridharan, October 26, 2012 key TakeaWays Customer analytics Users Want help across The analytics

More information

The Forrester Wave : SEO Platforms, Q4 2012

The Forrester Wave : SEO Platforms, Q4 2012 FOR: Interactive Marketing Professionals The Forrester Wave : SEO Platforms, Q4 2012 by shar VanBoskirk, October 31, 2012 key TakeaWays seo isn t Just about agencies anymore Search marketers have traditionally

More information

December 23, 2009 The Forrester Wave : Email Marketing Service Providers, Q4 2009

December 23, 2009 The Forrester Wave : Email Marketing Service Providers, Q4 2009 December 23, 2009 The Forrester Wave : Email Marketing Service Providers, Q4 2009 by Carlton A. Doty and Julie M. Katz for Interactive Marketing Professionals Making Leaders Successful Every Day Includes

More information

The Forrester Wave : Traditional Disaster Recovery Service Providers, Q1 2014

The Forrester Wave : Traditional Disaster Recovery Service Providers, Q1 2014 For: Infrastructure & Operations Professionals The Forrester Wave : Traditional Disaster Recovery Service Providers, Q1 2014 by Rachel A. Dines, January 17, 2014 Key Takeaways Firms Look To Outsourced

More information

March 4, 2011 The Forrester Wave : Message Archiving Software, Q1 2011 by Brian W. Hill for Content & Collaboration Professionals

March 4, 2011 The Forrester Wave : Message Archiving Software, Q1 2011 by Brian W. Hill for Content & Collaboration Professionals March 4, 2011 The Forrester Wave : Message Archiving Software, Q1 2011 by Brian W. Hill for Content & Collaboration Professionals Making Leaders Successful Every Day March 4, 2011 The Forrester Wave :

More information

The Forrester Wave : Private Cloud Solutions In China, Q1 2015

The Forrester Wave : Private Cloud Solutions In China, Q1 2015 For: Infrastructure & Operations Professionals The Forrester Wave : Private Cloud Solutions In China, Q1 2015 by Charlie Dai and Frank Liu, January 23, 2015 Key Takeaways HP And VMware Lead Among Multinationals;

More information

I&O Execs: It's Time To Rediscover BSM 2011

I&O Execs: It's Time To Rediscover BSM 2011 May 13, 2011 I&O Execs: It's Time To Rediscover BSM 2011 by Jean-Pierre Garbani with Robert Whiteley and Alex Crumb for IT Operations Professionals Making Leaders Successful Every Day For Infrastructure

More information

September 21, 2011 The Forrester Wave : Marketing Mix Modeling, Q3 2011 by Luca S. Paderni for CMO & Marketing Leadership Professionals

September 21, 2011 The Forrester Wave : Marketing Mix Modeling, Q3 2011 by Luca S. Paderni for CMO & Marketing Leadership Professionals September 21, 2011 The Forrester Wave : Marketing Mix Modeling, Q3 2011 by Luca S. Paderni for CMO & Marketing Leadership Professionals Making Leaders Successful Every Day September 21, 2011 The Forrester

More information

Consumer Web Portals: Platforms At Significant Security Risk

Consumer Web Portals: Platforms At Significant Security Risk A Custom Technology Adoption Profile Commissioned By RSA December 2013 Consumer Web Portals: Platforms At Significant Security Risk 1 Introduction The increasing number of digital identities, prevalence

More information

The Forrester Wave : Innovation Agencies, Q4 2014

The Forrester Wave : Innovation Agencies, Q4 2014 For: CMOs The Forrester Wave : Innovation Agencies, Q4 2014 by Sarah Sikowitz, December 8, 2014 Key Takeaways SapientNitro, R/GA, And Frog Lead The Pack Forrester s research uncovered a market in which

More information

The Forrester Wave : Web Analytics, Q2 2014

The Forrester Wave : Web Analytics, Q2 2014 For: Customer Insights Professionals The Forrester Wave : Web Analytics, Q2 2014 by James McCormick, May 13, 2014 Key Takeaways Adobe, AT Internet, IBM, And Webtrends Are Leaders In Enterprise Web Analytics

More information

October 27, 2009 Case Study: ING Delivers Personalized Product Offers Across Channels In Real Time

October 27, 2009 Case Study: ING Delivers Personalized Product Offers Across Channels In Real Time October 27, 2009 Case Study: ING Delivers Personalized Product Offers Across Channels In Real Time by Alexander Hesse for Customer Intelligence Professionals Making Leaders Successful Every Day October

More information

How To Compare The Profit From Aaas To Onpremise On A Computer Or A Server Or Server (Forrester)

How To Compare The Profit From Aaas To Onpremise On A Computer Or A Server Or Server (Forrester) September 20, 2006 Comparing The ROI Of SaaS Versus On-Premise Using Forrester s TEI Approach by R Ray Wang TECH CHOICES Helping Business Thrive On Technology Change TECH CHOICES Includes a TEI model and

More information

ebay Enterprise Is A Strong Performer Among Omnichannel Order

ebay Enterprise Is A Strong Performer Among Omnichannel Order For ebusiness & Channel Strategy Professionals July 29, 2014 ebay Enterprise Is A Performer Among Omnichannel Order Management Vendors Excerpted From The Forrester Wave : Omnichannel Order Management,

More information

The Forrester Wave : Room-Based Videoconferencing, Q3 2012

The Forrester Wave : Room-Based Videoconferencing, Q3 2012 FOR: CIOs The Forrester Wave : Room-Based Videoconferencing, Q3 2012 by Philipp Karcher, August 21, 2012 Key TaKeaWays Videoconferencing Lets Firms Cut Travel and improve everyday Meetings In a work culture

More information

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals Silver Peak Systems Provides The Most Scalable WAN Optimization Appliance The Forrester Wave Vendor Summary, Q3 2007 by Robert Whiteley with Simon Yates and Rachel Batiancila EXECUTIVE SUMMARY Silver Peak

More information

The Forrester Wave : Cross-Channel Attribution Providers, Q4 2014

The Forrester Wave : Cross-Channel Attribution Providers, Q4 2014 For: Customer Insights Professionals The Forrester Wave : Cross-Channel Attribution Providers, Q4 2014 by Tina Moffett, November 7, 2014 Key Takeaways AOL/Convertro, Google, And Visual IQ Lead The Pack

More information

The Forrester Wave : Online Video Platforms, Q1 2013

The Forrester Wave : Online Video Platforms, Q1 2013 For: Application Development & Delivery professionals The Forrester Wave : Online Video Platforms, Q1 2013 by philipp Karcher, march 8, 2013 key TakeaWays Businesses use Video platforms To Manage Their

More information

September 16, 2008 Why IT Service Management Should Matter To You

September 16, 2008 Why IT Service Management Should Matter To You September 16, 2008 Why IT Service Management Should Matter To You by Evelyn Hubbert for IT Infrastructure & Operations Professionals Making Leaders Successful Every Day Client Choice topic September 16,

More information

How To Evaluate Human Resource Management Systems

How To Evaluate Human Resource Management Systems January 25, 2012 The Forrester Wave : Human Resource Management Systems, Q1 2012 by Paul D. Hamerman for Business Process Professionals Making Leaders Successful Every Day January 25, 2012 The Forrester

More information

The Forrester Wave : Enterprise Listening Platforms, Q1 2014

The Forrester Wave : Enterprise Listening Platforms, Q1 2014 For: Customer Insights Professionals The Forrester Wave : Enterprise Listening Platforms, Q1 2014 by Allison Smith, January 22, 2014 Key Takeaways Listening Platforms Have Expanded Their Capabilities Enterprise

More information

The Forrester Wave : Application Security, Q4 2014

The Forrester Wave : Application Security, Q4 2014 For: Security & Risk Professionals The Forrester Wave : Application Security, Q4 2014 by Tyler Shields, December 23,2014 Key Takeaways HP, IBM, Veracode, WhiteHat, Contrast Security, Quotium, And Checkmarx

More information

Making Leaders Successful Every Day

Making Leaders Successful Every Day October 6, 2008 The Forrester Wave : Integration-Centric Business Process Management Suites, Q4 2008 by Ken Vollmer for Enterprise Architecture Professionals Making Leaders Successful Every Day Includes

More information

The Forrester Wave : B2E Cloud IAM, Q2 2015

The Forrester Wave : B2E Cloud IAM, Q2 2015 For: Security & Risk Professionals The Forrester Wave : B2E Cloud IAM, Q2 2015 by Andras Cser and Merritt Maxim, June 29, 2015 Key Takeaways OneLogin And Okta Lead The Pack Forrester s research uncovered

More information

ForeScout Technologies Is A Leader Among Network Access Control Vendors

ForeScout Technologies Is A Leader Among Network Access Control Vendors For ForeScout Technologies Is A Leader Among Network Access Control Vendors Excerpted From The Forrester Wave : Network Access Control, Q2 2011 by John Kindervag with Stephanie Balaouras, Robert Whiteley,

More information

The Forrester Wave : Enterprise Architecture Service Providers, Q1 2015

The Forrester Wave : Enterprise Architecture Service Providers, Q1 2015 For: Enterprise Architecture Professionals The Forrester Wave : Enterprise Architecture Service Providers, Q1 2015 by Henry Peyret and Gordon Barnett, March 19, 2015 Key Takeaways The EA Service Provider

More information

April 29, 2010 The Security Of B2B: Enabling An Unbounded Enterprise

April 29, 2010 The Security Of B2B: Enabling An Unbounded Enterprise April 29, 2010 The Security Of B2B: Enabling An Unbounded Enterprise by Usman Sindhu for Security & Risk Professionals Making Leaders Successful Every Day April 29, 2010 The Security Of B2B: Enabling An

More information

The Forrester Wave : Cross-Channel Campaign Management, Q3 2014

The Forrester Wave : Cross-Channel Campaign Management, Q3 2014 For: Customer Insights Professionals The Forrester Wave : Cross-Channel Campaign Management, Q3 2014 by Jason McNellis, August 28, 2014 Key Takeaways The Cross-Channel Campaign Market Is Complex The campaign

More information

The Forrester Wave : SaaS HR Management Systems, Q4 2014

The Forrester Wave : SaaS HR Management Systems, Q4 2014 For: Applications Development & Delivery Professionals The Forrester Wave : SaaS HR Management Systems, Q4 2014 by Paul D. Hamerman, October 1, 2014 Key Takeaways SaaS HRMS Is Growing Rapidly As A Migration

More information

February 17, 2011 The State Of Customer Experience, 2011. by Megan Burns for Customer Experience Professionals. Making Leaders Successful Every Day

February 17, 2011 The State Of Customer Experience, 2011. by Megan Burns for Customer Experience Professionals. Making Leaders Successful Every Day February 17, 2011 The State Of Customer Experience, 2011 by Megan Burns for Customer Experience Professionals Making Leaders Successful Every Day February 17, 2011 The State Of Customer Experience, 2011

More information

The Forrester Wave : Public Cloud Platform Service Providers Security, Q4 2014

The Forrester Wave : Public Cloud Platform Service Providers Security, Q4 2014 For: Security & Risk Professionals The Forrester Wave : Public Cloud Platform Service Providers Security, Q4 2014 by Andras Cser and Ed Ferrara, November 17, 2014 Updated: November 18, 2014 Key Takeaways

More information

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals Blue Coat Systems Adds Security And Control To WAN Optimization Appliances The Forrester Wave Vendor Summary, Q3 2007 by Robert Whiteley with Simon Yates and Rachel Batiancila EXECUTIVE SUMMARY Blue Coat

More information

SOLUTION BRIEF ADVANCED AUTHENTICATION. How do I increase trust and security with my online customers in a convenient and cost effective manner?

SOLUTION BRIEF ADVANCED AUTHENTICATION. How do I increase trust and security with my online customers in a convenient and cost effective manner? SOLUTION BRIEF ADVANCED AUTHENTICATION How do I increase trust and security with my online customers in a convenient and cost effective manner? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT

More information

The Forrester Wave : Enterprise Mobile Management, Q3 2014

The Forrester Wave : Enterprise Mobile Management, Q3 2014 For: Infrastructure & Operations Professionals The Forrester Wave : Enterprise Mobile Management, Q3 2014 by Christian Kane, Tyler Shields, September 30, 2014 Key Takeaways IBM, Citrix, MobileIron, AirWatch

More information

TECH CHOICES. April 20, 2005 The Forrester Wave : Client Systems Management Tools, Q2 2005. by David Friedlander

TECH CHOICES. April 20, 2005 The Forrester Wave : Client Systems Management Tools, Q2 2005. by David Friedlander April 20, 2005 The Forrester Wave : Client Systems Management Tools, Q2 2005 by David Friedlander TECH CHOICES Helping Business Thrive On Technology Change TECH CHOICES Includes a Forrester Wave April

More information

The Forrester Wave : Online Testing Platforms, Q1 2013

The Forrester Wave : Online Testing Platforms, Q1 2013 For: Customer Intelligence Professionals The Forrester Wave : Online Testing Platforms, Q1 2013 by Joe stanhope, February 7, 2013 updated: Febuary 13, 2013 key TakeaWays online Testing is poised For a

More information

For ebusiness & Channel Strategy Professionals

For ebusiness & Channel Strategy Professionals Retailers Plan To Expand Online Customer Service Channels In 2010 But Disconnection Between Customer Service And Brand May Spell Trouble by Diane Clarkson with Carrie Johnson, Elizabeth Stark, and Kate

More information

July 26, 2011 Updated: July 28, 2011 Are Events Dead? Not If You re A Tech Buyer by Kim Celestre for Technology Marketing Professionals

July 26, 2011 Updated: July 28, 2011 Are Events Dead? Not If You re A Tech Buyer by Kim Celestre for Technology Marketing Professionals July 26, 2011 Updated: July 28, 2011 Are Events Dead? Not If You re A Tech Buyer by Kim Celestre for Technology Marketing Professionals Making Leaders Successful Every Day July 26, 2011 Updated: July 28,

More information

August 24, 2007 Are You Ready For Unified Communications?

August 24, 2007 Are You Ready For Unified Communications? August 24, 2007 Are You Ready For Unified Communications? by Elizabeth Herrell for Infrastructure & Operations Professionals Making Leaders Successful Every Day For IT Infrastructure & Operations Professionals

More information

April 10, 2009 The Forrester Wave : IT Asset Life- Cycle Management, Q2 2009. by Evelyn Hubbert for IT Infrastructure & Operations Professionals

April 10, 2009 The Forrester Wave : IT Asset Life- Cycle Management, Q2 2009. by Evelyn Hubbert for IT Infrastructure & Operations Professionals April 10, 2009 The Forrester Wave : IT Asset Life- Cycle Management, Q2 2009 by Evelyn Hubbert for IT Infrastructure & Operations Professionals Making Leaders Successful Every Day Includes a Forrester

More information

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by

More information

SECURING IDENTITIES IN CONSUMER PORTALS

SECURING IDENTITIES IN CONSUMER PORTALS SECURING IDENTITIES IN CONSUMER PORTALS Solution Brief THE CHALLENGE IN SECURING CONSUMER PORTALS TODAY The Bilateral Pull between Security and User Experience As the world becomes increasingly digital,

More information

January 31, 2012 The Forrester Wave : Cross-Channel Campaign Management, Q1 2012 by Robert Brosnan for Customer Intelligence Professionals

January 31, 2012 The Forrester Wave : Cross-Channel Campaign Management, Q1 2012 by Robert Brosnan for Customer Intelligence Professionals January 31, 2012 The Forrester Wave : Cross-Channel Campaign Management, Q1 2012 by Robert Brosnan for Customer Intelligence Professionals Making Leaders Successful Every Day January 31, 2012 The Forrester

More information

Win The Social Marketing Measurement Game

Win The Social Marketing Measurement Game FOR: Interactive Marketing Professionals Win The Social Marketing Measurement Game by Nate Elliott, November 21, 2012 KEY TAKEAWAYS Avoid The Temptation To Oversimplify Your Metrics Blended single engagement

More information

Understand Communication Channel Needs To Craft Your Customer Service Strategy

Understand Communication Channel Needs To Craft Your Customer Service Strategy For: ebusiness and Channel strategy Professionals Understand Communication Channel Needs To Craft Your Customer Service Strategy by Kate leggett, march 11, 2013 Key TaKeaWays The Majority of Consumers

More information

The Forrester Wave : API Management Solutions, Q3 2014

The Forrester Wave : API Management Solutions, Q3 2014 For: Application Development & Delivery Professionals The Forrester Wave : API Management Solutions, Q3 2014 by Randy Heffner, September 29, 2014 Key Takeaways CA Technologies, SOA Software, And Apigee

More information

April 4, 2008 The Five Essential Metrics For Managing IT by Craig Symons with Alexander Peters, Alex Cullen, and Brandy Worthington

April 4, 2008 The Five Essential Metrics For Managing IT by Craig Symons with Alexander Peters, Alex Cullen, and Brandy Worthington The Five Essential Metrics For Managing IT by Craig Symons with Alexander Peters, Alex Cullen, and Brandy Worthington EXECUTIVE SUMMARY CIOs frequently ask what IT should measure and report to business

More information

by Michael Speyer with Eric G. Brown, Emily Van Metre, and Christina Lee

by Michael Speyer with Eric G. Brown, Emily Van Metre, and Christina Lee Includes data from Business Data Services, Client Choice SaaS Economics Will Change ISVs SI And VAR Channels Channel Managers: Retool Partner Programs To Prevent SaaS Delivery Disaster by Michael Speyer

More information

Accenture Is A Leader Among Global Infrastructure Outsourcing Vendors

Accenture Is A Leader Among Global Infrastructure Outsourcing Vendors January 13, 2015 Accenture Is A Leader Among Global Infrastructure Outsourcing Vendors Excerpted From The Forrester Wave : Global Infrastructure Outsourcing, Q1 2015 by William Martorelli and Wolfgang

More information

For IT Infrastructure & Operations Professionals

For IT Infrastructure & Operations Professionals Why Isn t Server Virtualization Saving Us More? A Few Small Changes May Dramatically Increase Your Efficiency by Galen Schreck with Stephanie Balaouras and Alex Crumb Executive Summary Companies have rapidly

More information

expanding web single sign-on to cloud and mobile environments agility made possible

expanding web single sign-on to cloud and mobile environments agility made possible expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online

More information

Executive Q&A: Learning Maps; Innovative Tools For Customer Experience Training

Executive Q&A: Learning Maps; Innovative Tools For Customer Experience Training Customer Experience Professionals June 18, 2014 Executive Q&A: Learning Maps; Innovative Tools For Customer Experience Training by Samuel Stern with Harley Manning and Dylan Czarnecki Why Read This Report

More information

April 4, 2008 BPM Tool Usage Varies By Sector. by Ken Vollmer for Enterprise Architecture Professionals. Making Leaders Successful Every Day

April 4, 2008 BPM Tool Usage Varies By Sector. by Ken Vollmer for Enterprise Architecture Professionals. Making Leaders Successful Every Day April, 00 by Ken Vollmer for Enterprise Architecture Professionals Making Leaders Successful Every Day April, 00 Manufacturing And Financial Services Sectors Highlight Key Differences This is the second

More information

February 4, 2011 The Future Of EDI. by Ken Vollmer for Application Development & Delivery Professionals. Making Leaders Successful Every Day

February 4, 2011 The Future Of EDI. by Ken Vollmer for Application Development & Delivery Professionals. Making Leaders Successful Every Day February 4, 2011 by Ken Vollmer for Application Development & Delivery Professionals Making Leaders Successful Every Day February 4, 2011 It s Time To Take A More Holistic Approach by Ken Vollmer with

More information

ACI Response to FFIEC Guidance

ACI Response to FFIEC Guidance ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention

More information

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect

More information

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly

More information

March 11, 2011 The Forrester Wave : Global IT Infrastructure Outsourcing, Q1 2011

March 11, 2011 The Forrester Wave : Global IT Infrastructure Outsourcing, Q1 2011 The Forrester Wave : Global IT Infrastructure Outsourcing, Q1 2011 by Bill Martorelli and Wolfgang Benkel for Sourcing & Vendor Management Professionals Making Leaders Successful Every Day The Forrester

More information

The Forrester Wave : Financial Performance Management, Q3 2013

The Forrester Wave : Financial Performance Management, Q3 2013 For: Application Development & Delivery Professionals The Forrester Wave : Financial Performance Management, Q3 2013 by Paul D. Hamerman, September 11, 2013 Key Takeaways FPM Solutions Boost Forecasting

More information

For Vendor Strategy Professionals

For Vendor Strategy Professionals Inquiry Insights: Enterprise Mobility, Q1 2009 by Michele Pelino with Ellen Daley and Madiha Ashour Executive Summary Each year, Forrester receives more than 20,000 inquiries on a variety of topics that

More information

The Forrester Wave : Social Advertising Platforms, Q4 2013

The Forrester Wave : Social Advertising Platforms, Q4 2013 For: Marketing Leadership Professionals The Forrester Wave : Social Advertising Platforms, Q4 2013 by Zachary Reiss-Davis, December 17, 2013 Key Takeaways Marketers Spend On Social Ads But Need Third-Party

More information

January 15, 2009 Storage Choices For Virtual Server Environments. by Andrew Reichman for IT Infrastructure & Operations Professionals

January 15, 2009 Storage Choices For Virtual Server Environments. by Andrew Reichman for IT Infrastructure & Operations Professionals January 15, 2009 Storage Choices For Virtual Server Environments by Andrew Reichman for IT Infrastructure & Operations Professionals Making Leaders Successful Every Day January 15, 2009 Storage Choices

More information

December 2, 2011 Consumerization Drives Smartphone Proliferation by Ted Schadler for Content & Collaboration Professionals

December 2, 2011 Consumerization Drives Smartphone Proliferation by Ted Schadler for Content & Collaboration Professionals December 2, 2011 Consumerization Drives Smartphone Proliferation by Ted Schadler for Content & Collaboration Professionals Making Leaders Successful Every Day December 2, 2011 Consumerization Drives Smartphone

More information

Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.

Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands citrix.com/ready CA Technologies and Citrix have partnered to integrate their complementary, industry-leading

More information

October 1, 2007 The Right CRM Metrics For Your Organization by William Band with Sharyn C. Leaver and Mary Ann Rogan

October 1, 2007 The Right CRM Metrics For Your Organization by William Band with Sharyn C. Leaver and Mary Ann Rogan The Right CRM Metrics For Your Organization by William Band with Sharyn C. Leaver and Mary Ann Rogan EXECUTIVE SUMMARY Forrester interviewed 58 executives about their best practices for getting more value

More information

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE Purpose This document explains the benefits of using Risk Based Authentication (RBA) a dynamic method of cardholder authentication

More information

May 30, 2008 The Forrester Wave : Requirements Management, Q2 2008

May 30, 2008 The Forrester Wave : Requirements Management, Q2 2008 May 30, 2008 The Forrester Wave : Requirements Management, Q2 2008 by Carey Schwaber and Mary Gerush for Application Development & Program Management Professionals Making Leaders Successful Every Day Includes

More information

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing

More information

October 15, 2007 The Forrester Wave : Enterprise Apps Software Licensing And Pricing, Q4 2007

October 15, 2007 The Forrester Wave : Enterprise Apps Software Licensing And Pricing, Q4 2007 October 15, 2007 The Forrester Wave : Enterprise Apps Software Licensing And Pricing, Q4 2007 by R Ray Wang for Business Process & Applications Professionals Making Leaders Successful Every Day Includes

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

July 13, 2011 The Forrester Wave : Web Content Management For Online Customer Experience, Q3 2011

July 13, 2011 The Forrester Wave : Web Content Management For Online Customer Experience, Q3 2011 July 13, 2011 The Forrester Wave : Web Content Management For Online Customer Experience, Q3 2011 by Stephen Powers for Content & Collaboration Professionals Making Leaders Successful Every Day July 13,

More information

For Infrastructure & Operations Professionals

For Infrastructure & Operations Professionals Case Study: California State University, Fresno Implements ITSM Without Breaking The Bank by Evelyn Hubbert with Peter O Neill and Lindsey Kempton Executive Summary When faced with austere budget challenges,

More information

How To Comply With Ffiec

How To Comply With Ffiec SOLUTION BRIEF authentication in the internet banking environment: The solution for FFIEC compliance from CA Technologies agility made possible Introduction to FFIEC Compliance In October of 2005, the

More information

For Enterprise Architecture Professionals

For Enterprise Architecture Professionals Case Study: Using SOA And BPM To Support Enterprise Agility How A Florida College Used An Integrated Approach To Reach Its Goals by Ken Vollmer with Gene Leganza and Matt Czarnecki Executive Summary Case

More information

For Customer Intelligence Professionals

For Customer Intelligence Professionals Intelligence-Powered CRM Enhance Existing CRM Initiatives With Customer Intelligence by Suresh Vittal with Dave Frankland and Allison Smith Executive Summary As organizations become increasingly customer-centric,

More information

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

Transaction Anomaly Protection Stopping Malware At The Door. White Paper Transaction Anomaly Protection Stopping Malware At The Door White Paper Table of Contents Overview 3 Programmable Crime Logic Alter Web Application Flow & Content 3 Programmable Crime Logic Defeats Server-Side

More information

The Forrester Wave : On-Premises Unified Communications And Collaboration, Q2 2014

The Forrester Wave : On-Premises Unified Communications And Collaboration, Q2 2014 For: Infrastructure & Operations Professionals The Forrester Wave : On-Premises Unified Communications And Collaboration, Q2 2014 by Christopher Voce and Art Schoeller, June 26, 2014 Key Takeaways System

More information

November 1, 2011 The Forrester Wave : Enterprise Content Management, Q4 2011

November 1, 2011 The Forrester Wave : Enterprise Content Management, Q4 2011 November 1, 2011 The Forrester Wave : Enterprise Content Management, Q4 2011 by Alan Weintraub for Content & Collaboration Professionals Making Leaders Successful Every Day November 1, 2011 The Forrester

More information

The Forrester Wave : Governance, Risk, And Compliance Platforms, Q1 2014

The Forrester Wave : Governance, Risk, And Compliance Platforms, Q1 2014 For: Security & Risk Professionals The Forrester Wave : Governance, Risk, And Compliance Platforms, Q1 2014 by Christopher McClean, Nick Hayes, and Renee Murphy, January 27, 2014 Key Takeaways It s No

More information