Endpoint Security

Devices connecting to networks is the bedrock of the digital economy and serve as a hacker’s bread and butter. Read our insights on endpoint security in an increasingly connected world.

Insights

Blog

Warning: The Mobile Endpoint In Your Pocket May Be Just As Vulnerable As Your Desktop

Paddy Harrington 13 hours ago
Microsoft Windows is the dominant desktop operating system globally, which is a primary reason why hackers target Windows continually, because even with a very low success rate due to Windows’ extensive protections, hackers know that their chances of conquest are better than on MacOS or other operating systems. This isn’t to knock Windows or praise […]
Podcast

A Fresh Look At The Future Of The CISO

What It Means October 17, 2024
The role of the chief information security officer (CISO) is more vital than ever. But how are CISOs holding up under the spotlight, and how is the role changing? VP and Principal Analyst Jeff Pollard and Principal Analyst Jess Burn share some new research on the future of the CISO.

Plan Your IT & Security Budgets For 2025 Success

Watch our on-demand technology budget planning webinar. Get benchmarks for strategic investments, divestments, and experiments to maximize business value from 2025 tech and security spending.

Blog

Predictions 2025: Security And Risk Pros Will Brace For Regulations And Resilience

Cody Scott October 1, 2024
With cybercrime expected to cost $12 trillion in 2025, regulators will take a more active role in protecting consumer data while organizations pivot to adopt more proactive security measures to limit material impacts. Find out more in our 2025 predictions for cybersecurity, risk, and privacy.
Blog

Apply For The 2024 Forrester Security & Risk Summit Scholarship Today

Allie Mellen September 30, 2024
Forrester is once again partnering with Women in Security and Privacy to provide free admission to our Security & Risk Summit for four women looking to break into cybersecurity. Learn the details and find out how to apply for the scholarship here.
Blog

CrowdStrike Holds Its Fal.Con Conference As It Tries To Move On From July 19

Allie Mellen September 24, 2024
Here are the top things you need to know coming out of CrowdStrike's recently held Fal.Con user conference, just two months after its config update took down 8.5 million Windows endpoints.
Blog

Why Attack The Front Door If The Mobile Side Door Is Open?

Paddy Harrington September 19, 2024
When it comes to mobile device security, barely half of organizations are using unified endpoint management (UEM). That’s like locking the front door and leaving the side door wide open. Find out why security teams overlook mobile devices in this preview of our upcoming Security & Risk Summit.
Blog

Don’t Let Another Organization Win Your Forrester 2024 Security & Risk Enterprise Leadership Award

Amy DeMartine September 16, 2024
The Security & Risk Enterprise Leadership Award recognizes orgs that transformed the security, privacy, and risk management. Learn more about the award and find out how to apply.

Focus 2025 Security Budgets On Risk Mitigation And Tech Sprawl

Security leaders, explore our 2025 Planning Guide for benchmarks on where to invest, divest, and experiment with your budget.

Blog

Falcon Fallout: What’s Next For CrowdStrike, Competitors, And CISOs

Jeff Pollard August 6, 2024
The July 19 CrowdStrike Falcon outage created major trust issues for the company and the broader security market. What's next for CrowdStrike? Find out as we make several predictions on where the company will go next.
Blog

Invest, Experiment, And Scale Back: Budget Priorities For CISOs In 2025

Jeff Pollard August 1, 2024
The majority of security technology decision-makers anticipate further budget increases in 2025. Learn three key areas for CISOs to focus on in the year ahead in this preview of our 2025 Budget Planning Guide for security leaders.
Blog

Even Greener Pastures Have Their Own Manure

Paddy Harrington July 31, 2024
Tech leaders considering migrating critical systems away from Windows to other operating systems in the wake of CrowdStrike might want to give that strategy some thought. Find out why.
Blog

CrowdStrike Global Outage: Critical Next Steps For Tech And Security Leaders

Andras Cser July 19, 2024
Technology leaders woke up this morning to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong. Get updates on the steps that your organization should take now and in the long term as a result of the CrowdStrike outage.
Blog

Announcing The Forrester Wave™: Extended Detection And Response Platforms, Q2 2024

Allie Mellen June 4, 2024
Recent upheaval in the security information and event management market has created new opportunities for extended detection and response platform vendors. Get three tips on evaluating this changing market in this preview of our new Forrester Wave™ evaluation.

Eliminate Your Security Gaps And Redundancies

Learn how to align your security products and services with their functions using Forrester’s Security Tools and Services Mapping (STSM).

Blog

Announcing Forrester’s Security & Risk Enterprise Leadership Award

Stephanie Balaouras May 1, 2024
We have opened the call for our annual Security & Risk Enterprise Leadership Award. This award recognizes organizations that have transformed the security, privacy, and risk management functions into capabilities that fuel long-term success. Learn more about the award and how to apply.
Blog

Cisco Live EMEA 2024: Yes, AI Was Everywhere, And So Was A Surprising Amount of Innovation

Madelein van der Hout March 26, 2024
Cisco Live EMEA 2024 was a different event than past years and provided some pleasant surprises. Read our key takeaways from the event based on presentations and personal interactions with some Cisco executives.
Blog

You Got Your Carbon Black In My Symantec! No, You Got Your Symantec In My Carbon Black!

Paddy Harrington March 13, 2024
What is Broadcom planning to do with VMware’s Carbon Black unit? Find out in this blog covering the plan to integrate Carbon Black with Broadcom's existing product lineup.
Blog

EDR Is Officially Out, And XDR Still Won’t Solve Your SIEM Problems

Allie Mellen November 28, 2023
Forrester predicted that endpoint detection and response (EDR) as we know it would be replaced by extended detection and response (XDR). That day has finally come. Learn the implications of that shift in this blog post.
Blog

VMware Customers: Brace For Impact

Tracy Woo November 22, 2023
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Blog

Tremors Originating From A California Ripple In The Enterprise Browser Market

Paddy Harrington November 9, 2023
Learn why the news of Palo Alto Networks' intentions to acquire Talon Cyber Security demonstrates the importance of securing the browser.
Blog

Announcing The Forrester Wave™: Endpoint Security, Q4 2023

Paddy Harrington October 27, 2023
Learn three key trends currently driving the endpoint security market in a preview of the new Wave report on endpoint security.
Blog

The CISO And CIO Microsoft Security Dilemma: Fend Off Or Learn To Love?

Jeff Pollard September 28, 2023
Should CISOs fend off Microsoft to keep their preferred products or embrace consolidation? Find out in this blog.
More posts