10000 results for cloud security in All

Trend Report

Navigate The AI-Native Cloud Security Ecosystem In China
Cloud Security For AI And AI For Cloud Security: Two Sides Of The Same Coin AI-native cloud security hinges on two dimensions: cloud security for AI and AI for cloud security. Cloud security for AI ensures that cloud platforms give AI a trusted foundation by protecting data, models, specialized infrastructure, agents, and other modern applications from threats like leaks, theft, and exploits.
Charlie Dai
Charlie Dai

Essentials Report

Forrester’s Essential Research For Cloud Security
Understanding the size of the cloud security market also helps you select your cloud security investments and vendor. Our research includes the following reports in this area: leveraging MSSPs for cloud security, cloud migration best practices, and cloud predictions forecasts. Major Domains Of Cloud Security This figure represents the major domains of cloud security. It is split into two main categories: infrastructure as a service and SaaS.
Andras Cser
Andras Cser

Trend Report

How Generative AI Will Influence Cloud Security
Generative AI (genAI) brings unprecedented change and innovation to cloud security, including but not limited to cloud infrastructure-native and third-party security solutions and software-as-a-service (SaaS) app security. The benefits of genAI in cloud security include better threat detection, improved cloud detection and response, lower labor costs, and reduced exposure to regulatory fines and sanctions. This report examines some of the effects that genAI will have on cloud security.
Andras Cser
Andras Cser

Data Overview Report

Cloud Security — Reality Strikes After Migration
This indicates that the public cloud, while promising intrinsic security, opens new and widens existing gaps in security for respondents with workloads that run in the cloud (see Figure 3). To address these concerns, we recommend deploying cloud workload security consisting of cloud security posture management, cloud workload protection, container security, and infrastructure-as-code security as components.
Naveen Chhabra
Andras Cser
Naveen Chhabra, Andras Cser

blog

Tackling Cloud Security: US Federal Edition
The US DoD published its Security Requirements Guide documentation for cloud security and the CISA released its Cloud Security Technical Reference Architecture — each give a review on the requirements for US federal agencies. Zero Trust principles, a shared responsibility model between cloud service providers and federal agencies, robust cloud security posture management, and protecting data during cloud migration and within cloud environments are each key callouts in these materials.

blog

Tackling Cloud Security: US State And Local Government Edition
Learn some of the unique challenges that state and local governments face when it comes to cloud security and governance.

Trend Report

The Top Trends Shaping Cloud Security Posture Management (CSPM) In 2024
Cloud workload security (CWS) is a cloud security and detection and response platform that contains cloud security posture management (CSPM) tools and capabilities. CSPM allows organizations to detect and respond to configuration drifts with cloud infrastructure, such as compute (e.g., EC2 instances, Azure virtual machines), storage (e.g., S3 buckets, Google Cloud Storage), and network (e.g., VPCs, VPNs).
Andras Cser
Andras Cser

blog

Cloud Security Provider Wiz Raises $1B In VC Funding, Passes On Lacework Acquisition
This signals high investor confidence in cloud security (specifically, cloud security posture management), agent-based and agentless cloud workload protection (CWP), container security, and infrastructure-as-code scanning. Wiz’s investors include an impressive list of tier-one VC firms such as Andreessen Horowitz, Insight Partners, Lightspeed Venture Partners, and Sequoia Capital.

Template

The Forrester Cloud Security Compliance Checklist
Related Research Assess Your Cloud Security Readiness. This report introduces Forrester’s cloud security readiness assessment, which evaluates cloud security maturity and provides actionable guidance to improve and expand your cloud security coverage in order to protect cloud workloads and data more effectively. Forrester’s Essential Research For Cloud Security Governance And Tools.
Renee Murphy
Lee Sustar
Tracy Woo
Renee Murphy, Lee Sustar, Tracy Woo

Role Profile

Role Profile: Cloud Security Engineer
Cloud Risk and Compliance as Code, Google Cloud Security Analytics and Operations, Google Cloud Security and Resilience Framework, and Microsoft Defender for Cloud) Cloud security gateways (e.g., Forcepoint Cloud Security Gateway, Microsoft Cloud App Security, Symantec DLP Cloud) Cloud workload security solutions Cloud access security broker tools (e.g., Forcepoint One, iboss, Netskope, Zscaler) Cloud security posture management (e.g., Palo Alto, McAfee) CI/CD tools (e.g., Ansible, Chef, Puppet,
Tracy Woo
Andras Cser
Tracy Woo, Andras Cser

Get help finding what you need
Ask Forrester AI for instant answers or submit a research request and receive a curated list of research within 48 hours.