security architecture

As businesses compete to win and retain customers concerned about the privacy of their data, more firms are learning the value of a robust and effective security architecture. Get benchmarks and technical guidance here.

Learn more about how Forrester supports IT professionals.

Insights

Blog

Top Recommendations For CISOs In 2025: Deal With Uncertainty … Again

Jeff Pollard 4 days ago
The security landscape continues to evolve, as does global uncertainty, leaving CISOs preparing for turbulence ahead.
Blog

The Brewing Battle For Digital Online Age Verification

Merritt Maxim 4 days ago
With online identity verification well understood and maturing, the next brewing verification battle is around age verification, a subset of identity verification.

Missed Our Tech & Security Predictions Webinar?

Watch the replay to catch up! Dive into the top 2025 predictions and discover their impact on your tech and security strategies — with exclusive insights from the analysts who conducted the research.

Blog

Quantum Security Isn’t Hype — Every Security Leader Needs It

Merritt Maxim March 3, 2025
The commercial availability of quantum computers that can compromise traditional asymmetric cryptography is still five to 10 years away. But security and risk (S&R) professionals must assess and prepare for the impact of quantum security now.
Blog

Why We’re Moving From ZTE To SASE Terminology

Andre Kindness February 18, 2025
Find out why Forrester is pivoting away from the term Zero Trust edge (ZTE) in favor of the term secure access service edge (SASE).
Blog

Assessment Is Anyone’s Guess: Proving GOAT Status Requires Validation

Erik Nost February 11, 2025
As spectators tuned in to Super Bowl LIX to indulge in American culture rife with consumerism, T. Swift, and rap feuds, the buzz was less around the game and more on determining who is pro football’s GOAT (greatest of all time).
Blog

March To The Beat Of Zero Trust

Carlos Rivera November 20, 2024
Zero Trust has become the standard information security model to adopt globally. It’s no longer a question of should; it’s a question of how and where to begin. For some time, the topic of Zero Trust was met with disparaging and opposing views proclaiming it to be another buzzword for vendors to market products. Well, […]
Blog

Announcing Forrester’s 2024 Security & Risk Enterprise Leadership Award Winner And Finalist

Stephanie Balaouras November 14, 2024
Learn more about the security strategies that helped Schneider Electric win this year’s Security & Risk Enterprise Leadership Award, which recognizes organizations that have transformed their security, privacy, and risk management functions.
Podcast

A Fresh Look At The Future Of The CISO

What It Means October 17, 2024
The role of the chief information security officer (CISO) is more vital than ever. But how are CISOs holding up under the spotlight, and how is the role changing? VP and Principal Analyst Jeff Pollard and Principal Analyst Jess Burn share some new research on the future of the CISO.
Blog

Old Dogs Learn New Tricks — The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024

Carlos Rivera October 7, 2024
Contrary to expectations the enterprise firewall continues to thrive. and vendors have made significant progress in keeping up with rapid innovations. Learn more in this preview of the recently published report, The Forrester Wave™: Enterprise Firewall Solutions, Q4 2024.
Blog

Gone Are The Days Of Networking Infrastructure Choice

Andre Kindness October 1, 2024
One outcome of internal developments or acquisitions is that networking infrastructure choice has evaporated — even if vendors claim otherwise. HPE's recent acquisition of Juniper brings this into focus.
Blog

Predictions 2025: Security And Risk Pros Will Brace For Regulations And Resilience

Cody Scott October 1, 2024
With cybercrime expected to cost $12 trillion in 2025, regulators will take a more active role in protecting consumer data while organizations pivot to adopt more proactive security measures to limit material impacts. Find out more in our 2025 predictions for cybersecurity, risk, and privacy.
Blog

Apply For The 2024 Forrester Security & Risk Summit Scholarship Today

Allie Mellen September 30, 2024
Forrester is once again partnering with Women in Security and Privacy to provide free admission to our Security & Risk Summit for four women looking to break into cybersecurity. Learn the details and find out how to apply for the scholarship here.

2025 Tech Predictions: Your Must-Have Guide

From AI’s impact to cloud evolution and smarter workflows for the SDLC and AIOps, 2025 is set to be a big year for tech. Download our Predictions guide to see if you’re on track to make the most of these changes.

Blog

That’s A Nice IoT Device You’ve Got There … It’d Be A Shame If Mirai Used It For Its Botnet

Paddy Harrington September 16, 2024
A variant of the Mirai DDoS botnet that arrived in late 2016 and has remained active (because its creators released the malware for anyone to use) is using unpatched (and, in this case, unpatchable) AVTECH closed-circuit television cameras as part of its botnet to attack targets of opportunity, such as an early target of the […]
Blog

Don’t Let Another Organization Win Your Forrester 2024 Security & Risk Enterprise Leadership Award

Amy DeMartine September 16, 2024
The Security & Risk Enterprise Leadership Award recognizes orgs that transformed the security, privacy, and risk management. Learn more about the award and find out how to apply.
Blog

Announcing The Forrester Wave™: Microsegmentation Solutions, Q3 2024

Joseph Blankenship August 29, 2024
Forrester just published the second edition of The Forrester Wave™: Microsegmentation Solutions. Just over two years separates this research from the previous report, and the technological advances over that short time are stunning. The previous evaluation, The Forrester New Wave™: Microsegmentation, Q1 2022, was all about layer 3 microsegmentation in a data center (or private […]
Blog

A Recent Issue Highlights The Importance Of Securing The Hypervisor

Paddy Harrington August 8, 2024
Learn how applying Zero Trust, identity and access management, and endpoint detection and response (EDR) can help protect VMware’s ESXi hypervisor from a newly exploited vulnerability.
Blog

Falcon Fallout: What’s Next For CrowdStrike, Competitors, And CISOs

Jeff Pollard August 6, 2024
The July 19 CrowdStrike Falcon outage created major trust issues for the company and the broader security market. What's next for CrowdStrike? Find out as we make several predictions on where the company will go next.

Plan Your IT & Security Budgets For 2025 Success

Watch our on-demand technology budget planning webinar. Get benchmarks for strategic investments, divestments, and experiments to maximize business value from 2025 tech and security spending.

Blog

Invest, Experiment, And Scale Back: Budget Priorities For CISOs In 2025

Jeff Pollard August 1, 2024
The majority of security technology decision-makers anticipate further budget increases in 2025. Learn three key areas for CISOs to focus on in the year ahead in this preview of our 2025 Budget Planning Guide for security leaders.
Blog

CrowdStrike Global Outage: Critical Next Steps For Tech And Security Leaders

Andras Cser July 19, 2024
Technology leaders woke up this morning to find that a software update by cybersecurity vendor CrowdStrike had gone badly wrong. Get updates on the steps that your organization should take now and in the long term as a result of the CrowdStrike outage.
Blog

And So It Begins: Insights From Splunk’s First .conf With Cisco

Joseph Blankenship June 18, 2024
The big question at the Splunk annual user conference — .conf — was simple: What will happen to Splunk in the wake of the Cisco deal? Find out if the question got answered in this review of the conference.
More posts