network security
In an increasingly connected world, excellent network security is a business imperative. Read our insights on how your business can protect its networks.
Insights
Blog
Get A Head Start On The National Cybersecurity Strategy
This blog outlines Forrester’s existing Security & Risk research to help organizations navigate, manage, and prepare their organizations for the implications of the National Cybersecurity Strategy.
Blog
Introducing Forrester’s Network Analysis And Visibility Landscape, Q1 2023
In today’s Zero Trust (ZT) world, organizations have been heavily focused on Zero Trust edge identity solutions. In some cases, however, they’ve neglected visibility across all the connections, endpoints, and applications in the enterprise. Network analysis and visibility (NAV) solutions have become almost an afterthought to ZT, but they are actually central to a robust […]
Unlock The Secret To 2023 Tech Success
Attend our predictions webinar on overcoming resource constraints with a focus on resiliency and talent.
Blog
A Zero Trust Paradox: Which Comes First, Microsegmentation Or Microperimeter?
The common trope, “What came first, the chicken or the egg?” is a question about origins and paradoxical relationships. Security and risk conversations about microsegmentation and microperimeters suffer from a similar dilemma. These two concepts are heavily emphasized in Zero Trust conversations as key components to advance maturity. Security and risk pros confuse the usage […]
Blog
Cybersecurity Risk Dashboards: No Value, Extreme Liability
Over the last 12 months, “risk dashboards” became all the rage in cybersecurity, with varied titles such as “risk index,” “security baseline,” “security posture,” and “risk posture.” These dashboards appear in a vendor’s user interface and purport to help security programs improve. Some even offer coveted “benchmark data” that leaders can share with boards and […]
Blog
Enterprise Firewalls: The Security Tech That Keeps On Ticking
Learn the three approaches enterprise firewall vendors are taking to work around a shortage of network security techs.
Blog
Has Zero Trust Killed Defense in Depth? Or “DiD” It Refine It?
Zero Trust (ZT) continues to make waves (no pun intended), with US federal agencies now publishing guidance, such as the OMB’s M-22-09 or the DoD’s ZT strategy, for effective implementations, allowing for the government to be viewed as a source of trust in cybersecurity — although ZT is still mired in myths, and these can […]
Blog
Predictions 2023: Economic Uncertainty And Climate Shifts Will Shape Edge, IoT, And Networking
From the city to the farm, market forces will have a dramatic impact on edge, IoT, and networking. Learn more in our 2023 predictions.
Prepare Your Infrastructure For 2023 Change
Get our Predictions 2023 guide to explore the infrastructure shifts driving transformation and resiliency.
Blog
Predictions 2023: Security Pros Face Greater Internal Risks
On top of the usual challenges, in 2023, security pros will see more risk coming from internal forces, such as enabling anywhere work and the future of the office. Learn more in our 2023 predictions.
Blog
Prefacio: Mi Blog de Introducción
Dándole seguimiento a los múltiples mensajes de apoyo y animo en este nuevo capítulo de mi vida, he decidido escribir un prefacio. He escogido intencionalmente “Prefacio” como el título de este primero blog para indicar que no solo se trata de un capítulo, pero será un libro lleno de revelaciones para líderes de negocios y […]
Blog
A Preface: My Introductory Blog
Following the multiple messages of support and encouragement in this new chapter of my life, I have decided to write a preface. I have intentionally chosen “A Preface” as the title of this first blog to indicate that it’s not only going to be a chapter but a book full of insight for business and […]
Blog
SD-WAN Sunsets And ZTE Emerges
Software-defined WAN (SD-WAN) has started to ride off into the sunset (which is long overdue). For some time, you might see some vendors wandering around aimlessly, hoping to sell you a SD-WAN solution, but for the most part, the networking market is moving on. It didn’t happen like I predicted. I thought the SD-WAN acronym […]
Webinar
Shape Your 2023 Cybersecurity Priorities For Uncertain Times
As 2023 approaches, security leaders are hard at work planning for the cybersecurity trends headed our way – setting budgets, developing plans, and establishing priorities. Is your plan on track?
Shape Your 2023 Cybersecurity Priorities For Uncertain Times
Join us for a planning webinar to learn how you can budget and align your 2023 cybersecurity plans for what’s ahead.
Blog
It’s More Than Just Emojis: Secure Your Communications
What’s within an employee chat? More than emojis. Employee communications via chat, voice calls, and videoconferencing can include customers’ personal information, insights about business operations, or other highly sensitive material. Consumer apps aren’t suited for such purposes. They lack enterprise controls for management and compliance, have privacy policies and terms of use that can change […]
Blog
Space And The LEO Promise — A New Forrester Frontier
The Space Race Has Restarted Today’s interest in the space industry is the most intense since the Apollo missions first captivated the world in the 1960s. Billionaire space tourists in reusable rockets, a planned return trip to the moon, and smaller, cheaper satellites designed to operate in low Earth orbit (LEO) promising to connect the […]
Blog
New Security & Risk Planning Guide Helps CISOs Set 2023 Priorities
Which security technologies should be getting the investment in 2023, and which ones should you be scaling back on? Read a few key takeaways from our planning guide for security and risk leaders.
Blog
Getting The Knack For NAC
Network access control (NAC) was first offered in 2006 as a security solution that seemed promising but struggled to gain any interest for its adoption. This only worsened in the wake of anywhere-work and the move to the cloud, as on-premises networks declined in importance. Newer solutions such as Zero Trust network access (ZTNA), which […]
Podcast
The Best And Worst Security Practices From Around The World
The fact is, no business can stop every breach. So is it time to shift to a “post-breach” resilience strategy? Analyst Allie Mellen thinks so. This week, she discusses the best — and worst — security practices from various global regions.
See How Your EA Ecosystem Measures Up
Watch our enterprise architecture update to see what's working - and what's not.
Blog
Voorspellingen voor 2022: duurzaamheid en digitale kloof bepalen edge, IoT en netwerken
Hieronder vindt u de drie gewaagde veronderstellingen die wij voor edge, IoT en netwerken maken in 2022.
Blog
Our 2022 Top Recommendations For Your Security Program: CISOs Get An Offer They Can’t Refuse
The Coppola classic has a few surprising parallels with today's chief information security officer.
Blog
Forr The Planet: Intervju om hållbarhet – Ericsson
(Foto: Abhinav Sunil) Eftersom telekombranschen tillhandahåller stamnät för uppkoppling och nätverksinfrastruktur har denna bransch hamnat i rampljuset när det gäller hållbarhet. Nu när 5G är här, vad kan vi göra för att se till att de nya nätverken är så energieffektiva som möjligt? Jag pratade med Heather Johnson, VP för sustainability and corporate responsibility på Ericsson, […]
More posts