Zero Trust Model
As data security becomes a business imperative for every company and industry, leveraging a Zero Trust security framework (ZTX) can streamline the path to compliance. Learn more about Forrester’s Zero Trust research and framework here.
Insights
Blog
A Deep Dive Into The Forrester Wave™: Zero Trust Edge Solutions, Q3 2023
Get an inside look at the industry’s first evaluation of all-in-one Zero Trust Edge (ZTE) solutions, which some vendors call secure software-defined WAN (SD-WAN) and others call secure access service edge (SASE).
Blog
Introducing The Zero Trust Threat Detection And Response Tech Tide™
As a mariner, I know the value of paying attention to the tides to navigate complex waterways in previously untraveled waters. This Tech Tide™ enables security and risk pros to identify wasteful and redundant technologies while focusing on the current attack surface. As attacks increase in sophistication, Zero Trust threat detection and response has become […]
Strenthen Security Operations With Agile SecOps
Read this report to learn how to apply agile software development lifecycle practices (SDLC) to detection and response to create engineering-driven detection operations.
Blog
Decoding The New Zero Trust Terminology
Over the last year, I’ve been scared of two things. Our research teams have been planning and publishing a ton of research around Zero Trust, and since we’re analysts, new terminology, and comorbid acronyms, have emerged. My first fear was that all these new terms would confuse both the readers and the market. The second […]
Blog
Asset Management May Make Minds Meander, But Mastery Is Core To Zero Trust
At some point in every organization’s security journey, the problem of asset management inevitably comes up. Solutions are often cosmetic and don’t tackle fundamental issues or provide real visibility. As more organizations chart their Zero Trust course, the asset management problem comes up a lot more, as you cannot mediate what you do not know, […]
Blog
All Aboard: Chart Your Course To Zero Trust Intermediate
Organizations around the world are embarking on their Zero Trust journeys. Often, these voyages are undertaken without a complete understanding of the destination: Zero Trust maturity. Reaching a level of Zero Trust maturity requires careful planning and a steady course to get there. Forrester recently published a report to help security and IT pros achieve […]
Blog
Zero Trust Comes Into The Mainstream In Europe
Until recently, discussions about Zero Trust (ZT) in Europe focused on the what and why. The last year has seen a significant shift in the market, and organizations have now begun focusing on the how. European organizations see significant value in adopting Zero Trust and have taken steps to prioritize adoption. This trend is driven […]
Blog
Get A Head Start On The National Cybersecurity Strategy
This blog outlines Forrester’s existing Security & Risk research to help organizations navigate, manage, and prepare their organizations for the implications of the National Cybersecurity Strategy.
Don't Get Misled By Unrealistic AI And Security Expectations
Learn the truth behind ML’s madness, how AI and security (really) work in detection and response, and red-flag claims to avoid.
Blog
Success With Zero Trust Lives And Dies By Executive Support
Forrester originated the Zero Trust Model over a decade ago and defines Zero Trust as: An information security model that denies access to applications and data by default. Threat prevention is achieved by only granting access to networks and workloads utilizing policy informed by continuous, contextual, risk-based verification across users and their associated devices. Zero Trust advocates […]
Blog
Enterprise Firewalls: The Security Tech That Keeps On Ticking
Learn the three approaches enterprise firewall vendors are taking to work around a shortage of network security techs.
Blog
’Tis The Season To Highlight Our Favorite 2022 S&R Research
It’s December, the year is almost over, and most of us will be taking the next week off, so what better way to wrap up 2022 than with a review of some of our favorite security and risk (S&R) reports from this year? I teamed up with Senior Research Associate Alexis Tatro to highlight her […]
Blog
Meet The New EMEA Cybersecurity Analyst
Meet Tope Olufon, the new analyst covering cybersecurity in EMEA.
Blog
Redefining Data Security For The Modern Age
Learn how to redefine data security in an age of multicloud, anywhere work, edge computing, and changing privacy regulations.
Seven Steps To Bolstering Network Security With Zero Trust Edge
Watch this video to break down vendor ZTE hype and learn how to implement it across all endpoints in an enteprisewide networking fabric.
Blog
New Security & Risk Planning Guide Helps CISOs Set 2023 Priorities
Which security technologies should be getting the investment in 2023, and which ones should you be scaling back on? Read a few key takeaways from our planning guide for security and risk leaders.
Blog
US Federal Government Continues Cybersecurity Leadership With New OMB Memo
The guidance in the new memorandum enables federal civilian agencies to properly assign cyber-initiative funding toward the most critical areas. Here, we take a closer look.
Blog
SentinelOne Secures Identity First, Deception Second, In Attivo Acquisition
Endpoint security and extended detection and response (XDR) vendor SentinelOne today announced the acquisition of Attivo Networks for just over $600 million. Attivo was a darling of deception technology, but SentinelOne was really after its Active Directory protection portfolio, including ADAssessor and ADSecure. Enterprise identity plays a critical role in the Zero Trust world mandated […]
Blog
Chronicles Of Mandiant: Google Put A Ring On It
Mandiant trades up from FireEye and finds a home within Google Cloud Platform.
Blog
OMB’s Zero Trust Strategy: Government Gets Good
What a time to be alive! Hot on the heels of Forrester’s release of our definition of modern Zero Trust (ZT), the US Office of Management and Budget (OMB) released a memo entitled Moving the US Government Toward Zero Trust Cybersecurity Principles. Coincidence? Yes. A big deal? Also, yes. If executed as mandated, not only […]
Get More Risk Mitigation With Your 2024 Budget
Download our 2024 Planning Guide for Security and Risk Leaders to see where strategic cybersecurity investments (and divestments) can deliver more business value.
Blog
The Definition Of Modern Zero Trust
Zero Trust faces a bizarre dichotomy. Learn what it is — and perhaps more importantly what it isn't today.
Blog
The Future Of Healthcare
Healthcare is going to see some dramatic change in the decade ahead. Find out which areas are most likely to be impacted and what leaders can do to set their healthcare organizations up for success.
Blog
Introducing The Ransomware Survival Guide
Time and time again, we’ve heard these two burning questions from so many organizations: “How do we protect ourselves against ransomware?” and “Where do we start?” We’ve all seen the ransomware “research” landscape — littered with top-10 lists, vendor cure-alls (spoiler: don’t depend on one security tool to completely eradicate ransomware), and so many other […]
More posts