Endpoint Security
Devices connecting to networks is the bedrock of the digital economy and serve as a hacker’s bread and butter. Read our insights on endpoint security in an increasingly connected world.
Insights
Blog
Warning: The Mobile Endpoint In Your Pocket May Be Just As Vulnerable As Your Desktop
Microsoft Windows is the dominant desktop operating system globally, which is a primary reason why hackers target Windows continually, because even with a very low success rate due to Windows’ extensive protections, hackers know that their chances of conquest are better than on MacOS or other operating systems. This isn’t to knock Windows or praise […]
Podcast
A Fresh Look At The Future Of The CISO
The role of the chief information security officer (CISO) is more vital than ever. But how are CISOs holding up under the spotlight, and how is the role changing? VP and Principal Analyst Jeff Pollard and Principal Analyst Jess Burn share some new research on the future of the CISO.
Plan Your IT & Security Budgets For 2025 Success
Watch our on-demand technology budget planning webinar. Get benchmarks for strategic investments, divestments, and experiments to maximize business value from 2025 tech and security spending.
Blog
Predictions 2025: Security And Risk Pros Will Brace For Regulations And Resilience
With cybercrime expected to cost $12 trillion in 2025, regulators will take a more active role in protecting consumer data while organizations pivot to adopt more proactive security measures to limit material impacts. Find out more in our 2025 predictions for cybersecurity, risk, and privacy.
Blog
Apply For The 2024 Forrester Security & Risk Summit Scholarship Today
Forrester is once again partnering with Women in Security and Privacy to provide free admission to our Security & Risk Summit for four women looking to break into cybersecurity. Learn the details and find out how to apply for the scholarship here.
Blog
CrowdStrike Holds Its Fal.Con Conference As It Tries To Move On From July 19
Here are the top things you need to know coming out of CrowdStrike's recently held Fal.Con user conference, just two months after its config update took down 8.5 million Windows endpoints.
Blog
Why Attack The Front Door If The Mobile Side Door Is Open?
When it comes to mobile device security, barely half of organizations are using unified endpoint management (UEM). That’s like locking the front door and leaving the side door wide open. Find out why security teams overlook mobile devices in this preview of our upcoming Security & Risk Summit.
Blog
Don’t Let Another Organization Win Your Forrester 2024 Security & Risk Enterprise Leadership Award
The Security & Risk Enterprise Leadership Award recognizes orgs that transformed the security, privacy, and risk management. Learn more about the award and find out how to apply.
Focus 2025 Security Budgets On Risk Mitigation And Tech Sprawl
Security leaders, explore our 2025 Planning Guide for benchmarks on where to invest, divest, and experiment with your budget.
Blog
Falcon Fallout: What’s Next For CrowdStrike, Competitors, And CISOs
The July 19 CrowdStrike Falcon outage created major trust issues for the company and the broader security market. What's next for CrowdStrike? Find out as we make several predictions on where the company will go next.
Blog
Invest, Experiment, And Scale Back: Budget Priorities For CISOs In 2025
The majority of security technology decision-makers anticipate further budget increases in 2025. Learn three key areas for CISOs to focus on in the year ahead in this preview of our 2025 Budget Planning Guide for security leaders.
Blog
Even Greener Pastures Have Their Own Manure
Tech leaders considering migrating critical systems away from Windows to other operating systems in the wake of CrowdStrike might want to give that strategy some thought. Find out why.
Blog
CrowdStrike Global Outage: Critical Next Steps For Tech And Security Leaders
Technology leaders woke up this morning to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong. Get updates on the steps that your organization should take now and in the long term as a result of the CrowdStrike outage.
Blog
Announcing The Forrester Wave™: Extended Detection And Response Platforms, Q2 2024
Recent upheaval in the security information and event management market has created new opportunities for extended detection and response platform vendors. Get three tips on evaluating this changing market in this preview of our new Forrester Wave™ evaluation.
Eliminate Your Security Gaps And Redundancies
Learn how to align your security products and services with their functions using Forrester’s Security Tools and Services Mapping (STSM).
Blog
Announcing Forrester’s Security & Risk Enterprise Leadership Award
We have opened the call for our annual Security & Risk Enterprise Leadership Award. This award recognizes organizations that have transformed the security, privacy, and risk management functions into capabilities that fuel long-term success. Learn more about the award and how to apply.
Blog
Cisco Live EMEA 2024: Yes, AI Was Everywhere, And So Was A Surprising Amount of Innovation
Cisco Live EMEA 2024 was a different event than past years and provided some pleasant surprises. Read our key takeaways from the event based on presentations and personal interactions with some Cisco executives.
Blog
You Got Your Carbon Black In My Symantec! No, You Got Your Symantec In My Carbon Black!
What is Broadcom planning to do with VMware’s Carbon Black unit? Find out in this blog covering the plan to integrate Carbon Black with Broadcom's existing product lineup.
Blog
EDR Is Officially Out, And XDR Still Won’t Solve Your SIEM Problems
Forrester predicted that endpoint detection and response (EDR) as we know it would be replaced by extended detection and response (XDR). That day has finally come. Learn the implications of that shift in this blog post.
Blog
VMware Customers: Brace For Impact
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Blog
Tremors Originating From A California Ripple In The Enterprise Browser Market
Learn why the news of Palo Alto Networks' intentions to acquire Talon Cyber Security demonstrates the importance of securing the browser.
Blog
Announcing The Forrester Wave™: Endpoint Security, Q4 2023
Learn three key trends currently driving the endpoint security market in a preview of the new Wave report on endpoint security.
Blog
The CISO And CIO Microsoft Security Dilemma: Fend Off Or Learn To Love?
Should CISOs fend off Microsoft to keep their preferred products or embrace consolidation? Find out in this blog.
More posts