Why Read This
This report outlines Forrester's solution to help security and risk (S&R) leaders develop their road map for Zero Trust network threat mitigation technologies using Forrester's TechRadar™ methodology. 2011 was the year of the breach. The news is filled with reports of network attacks and stolen data. Consumers routinely undergo the stress of fraudulent charges or compromised credit cards. Terms such as "botnet" have become part of our vocabulary. As a result, security and risk (S&R) professionals find themselves on a neverending quest to maintain the integrity of their networks. To provide some insight into the vast array of options available to meet today's threats, Forrester investigated 17 threat mitigation technologies, including encryption, wireless IDS/IPS, unified threat management, and web security gateway. Compliance-driven products, such as web application firewalls and network firewalls, continue to remain strong in the enterprise. Network IDS and IPS continue to play in both the best practice and compliance arenas, with IPS replacing IDS in most organizations. Also, recent data breaches will aid the adoption of emerging technologies such as network encryption and configuration auditing tools.
Tags: Content Security, Data & Information Protection, Email Content Security, Encryption, Firewalls, Infrastructure Security, Network Management, Networking, Security Operations & Program Governance, Vulnerability & Threat Management, Web Content Security, Zero Trust