security architecture

As businesses compete to win and retain customers concerned about the privacy of their data, more firms are learning the value of a robust and effective security architecture. Get benchmarks and technical guidance here.

Learn more about how Forrester supports IT professionals.

Insights

Blog

How Philip Morris International’s Outcome‑Driven EA Practice Won The 2025 Forrester EA Award In EMEA

Stéphane Vanrechem 3 days ago
Philip Morris International (PMI) won Forrester’s 2025 Enterprise Architecture Award in the EMEA region by redesigning its operating model to make AI scalable, governed, and reusable from day one.
Blog

Claude Code Security Causes A SaaS-pocalypse In Cybersecurity

Jeff Pollard February 23, 2026
We have seen this pattern before, even if the specifics look different. Think back to the day AWS introduced GuardDuty, when Microsoft folded Defender for Endpoint into its enterprise licensing commitments and launched Microsoft Sentinel, or when Google acquired Mandiant and eventually Wiz. Sure, the launch of fully autonomous AI agents that can ingest entire […]

Predictions 2026: Your Planning Starts Here

2026 will demand proof, not promises. Explore Forrester’s Predictions resources — guides, webinars, and blogs — to plan smarter, lead with trust, and stay ahead of disruption.

Blog

Enterprise Architects Have Stepped Out Of The Ivory Tower

Stéphane Vanrechem February 12, 2026
For years, many enterprise architecture (EA) teams operated in isolation, building elaborate frameworks that few understood and even fewer used. Then something shifted: Architects started solving actual business problems instead of perfecting abstract models. Our research captures this turnaround. In 2023, only 35% of digital and IT professionals said architects add value; by 2025, that figure […]
Blog

Think Hardware Security Modules Aren’t Exciting? Think Post-Quantum Migration!

Andras Cser January 30, 2026
Hardware security modules (HSMs) are a key foundational security component of public key infrastructure. HSMs hold the crown-jewel keys for encryption and digital signatures and perform encryption and decryption operations on protected data and payment information. While HSMs have been in use for decades, they now play an oversized role in migrating to post-quantum security […]
Blog

The Success Of Your Proactive Security Strategy Depends On Your Answer To Six Questions

Erik Nost January 20, 2026
Proactive security has always been based on three principles: visibility, prioritization, and remediation. But in the age of AI, each principle will continue to experience challenges. In our latest research, The Future Of Proactive Security, we found that the future of proactive security hinges on how well teams answer six foundational questions across each principle: what, when, where, why, how, and who. Since AI accelerates […]
Blog

The Enterprise Architecture Management Suites Landscape, Q4 2025, Is Out!

Stéphane Vanrechem January 7, 2026
Enterprise architecture (EA) leaders face unprecedented pressure to cut through complexity. Technology portfolios are sprawling, operating models are in flux, and the mandate for strategic alignment has never been more urgent.
Blog

MITRE ATT&CK Evaluations Return: More Coverage, More Nuance

Allie Mellen December 10, 2025
There were many big changes in this latest round. Read our breakdown and what we learned.

Now On Demand: 2026 Tech And Security Predictions

Missed it live? Watch our on-demand webinar to explore our 2026 predictions. Learn what tech and security leaders must do to lead with trust and value.

Blog

AI Vendor Threat Research And Cybersecurity’s Cynicism Problem

Jeff Pollard November 24, 2025
For years, the security community decried the lack of transparency in public breach disclosure and communication. But when AI vendors break with old norms and publish how attackers exploit their platforms, that same community’s reaction is split. Some are treating this intelligence as a learning opportunity. Others are dismissing it as marketing noise. Unfortunately, some […]
Blog

Anthropic Catches Attackers Using Agents In The Act

James Plouffe November 17, 2025
On November 13, AI vendor Anthropic published details about the disruption of what it characterized as an AI-led cyber espionage operation. Learn what is in Anthropic's report and get tips on how to protect against future AI-enabled attacks.
Blog

Proactive Security Platforms Will Cumulate Visibility, Prioritization, And Remediation

Erik Nost November 13, 2025
Last year, we released our inaugural Forrester Wave™ on attack surface management (ASM) solutions. The ASM Wave primarily focused on visibility — the first of the three principles of proactive security. ASM’s visibility is achieved through external asset discovery and ingestion of third-party information regarding asset attributes, and both features are becoming increasingly commoditized. Yet the ubiquity of […]
Blog

Recorded Future Predict 2025: Intelligence To Operations … And Now To Action

Jitin Shabadu October 21, 2025
Recorded Future held its Predict Global 2025 conference in New York City recently. Get some key highlights from the conference as well as a look ahead to the vendor’s Predict Europe 2025 event.
Blog

Developer-Led Growth Meets Enterprise-Grade Security And Distributed Infrastructure At Cloudflare Connect 2025

Devin Dickerson October 20, 2025
Cloudflare Connect 2025 had a distinctly optimistic vibe as the vendor positions itself as the connective tissue for modern digital operations in the enterprise and showcases its AI security abilities. Learn more in this event review.
Blog

Declaring Zero Trust Without Testing Is A Lie

Tope Olufon October 20, 2025
Zero Trust without real-world testing is a false sense of security. Learn how MITRE ATT&CK-driven adversarial trials turn Zero Trust from theory into proof.
Blog

How F5 And SonicWall Revealed The Fragility Of The Software Supply Chain

Carlos Rivera October 17, 2025
The recent breaches at F5 and SonicWall illustrate how attackers are targeting the very infrastructure that enterprises rely on to secure and deliver digital services.
Blog

Announcing The Forrester Wave™: Network Analysis And Visibility Solutions, Q4 2025

Jitin Shabadu October 15, 2025
Despite its criticality, network analysis and visibility solutions remain underrepresented in enterprises compared to technologies such as endpoint detection and response and security information and event management. Find out why in this preview of our new Wave report.
Blog

Predictions 2026: Cybersecurity And Risk Leaders Grapple With New Tech And Geopolitical Threats

Paddy Harrington October 1, 2025
In 2026, continued political instability coupled with technological advancements being used by cybercriminals will force cybersecurity and risk leaders to adapt their defensive technologies and prepare their workforce for big shifts. Find out more in our 2026 predictions for cybersecurity and risk.
Blog

Splunk .conf25: Cisco, AI, And Data

Allie Mellen September 15, 2025
The 10th annual Splunk .conf took place in Boston recently. From the opening keynote to various new product releases and enhancements, get a full review of the event in this post.

2026 Tech & Security Predictions You Can’t Afford To Miss

AI cleanup, budget shifts, neocloud, and quantum threats — what’s ahead could reshape your strategy. Get Forrester’s guide with five bold predictions to stay ahead and lead with trust and value.

Blog

The Forrester Wave™: Secure Access Service Edge Solutions, Q3 2025 — A Market Transformed

Andre Kindness September 10, 2025
We just released The Forrester Wave™: Secure Access Service Edge Solutions, Q3 2025, and the results mark a dramatic shift from the 2023 Wave on Zero Trust edge solutions.
Blog

The Real Future Of Proactive Security Isn’t Finding Exposures — It’s Fixing Them

Erik Nost August 12, 2025
Visibility, prioritization, and remediation will always be the foundation of your proactive program, but many orgs still struggle to optimize all three principles in an integrated fashion. Learn how to prepare your security teams for the future of proactive security in this preview of a keynote at our upcoming Security & Risk Summit.
Blog

Introducing AEGIS — The Guardrails That CISOs Need For The Agentic Enterprise

Jeff Pollard August 4, 2025
AI agents aren’t coming — they’re already here. And they’re not waiting for your security architecture to catch up. Learn how Forrester's new AEGIS framework can help CISOs secure, govern, and manage AI agents and agentic infrastructure.
More posts