Zero Trust Model
As data security becomes a business imperative for every company and industry, leveraging a Zero Trust security framework (ZTX) can streamline the path to compliance. Learn more about Forrester’s Zero Trust research and framework here.
Insights
Blog
SentinelOne Secures Identity First, Deception Second, In Attivo Acquisition
Endpoint security and extended detection and response (XDR) vendor SentinelOne today announced the acquisition of Attivo Networks for just over $600 million. Attivo was a darling of deception technology, but SentinelOne was really after its Active Directory protection portfolio, including ADAssessor and ADSecure. Enterprise identity plays a critical role in the Zero Trust world mandated […]
Blog
Chronicles Of Mandiant: Google Put A Ring On It
Mandiant trades up from FireEye and finds a home within Google Cloud Platform.
US Public Sector Predictions 2022
Discover how the President's Management Agenda will shape agencies' priorities in 2022.
Blog
OMB’s Zero Trust Strategy: Government Gets Good
What a time to be alive! Hot on the heels of Forrester’s release of our definition of modern Zero Trust (ZT), the US Office of Management and Budget (OMB) released a memo entitled Moving the US Government Toward Zero Trust Cybersecurity Principles. Coincidence? Yes. A big deal? Also, yes. If executed as mandated, not only […]
Blog
The Definition Of Modern Zero Trust
At the beginning of 2022, Zero Trust faces a bizarre dichotomy; it’s on the verge of becoming the de facto cybersecurity approach while simultaneously having many security practitioners decry it as “just a marketing ploy.” How did we, as the security community, arrive at such a precarious perch? Part of the problem, according to John […]
Blog
The Future Of Healthcare
Healthcare is going to see some dramatic change in the decade ahead. Find out which areas are most likely to be impacted and what leaders can do to set their healthcare organizations up for success.
Blog
Introducing The Ransomware Survival Guide
Time and time again, we’ve heard these two burning questions from so many organizations: “How do we protect ourselves against ransomware?” and “Where do we start?” We’ve all seen the ransomware “research” landscape — littered with top-10 lists, vendor cure-alls (spoiler: don’t depend on one security tool to completely eradicate ransomware), and so many other […]
Blog
Forrester Security & Risk Forum 2021: Be Part Of Our World
Maybe it’s the amazing talks coming up today and tomorrow at the Forrester Security & Risk (S&R) Forum or maybe I’ve watched “The Little Mermaid” with the family one time too many — either way, I was inspired to write a little ditty about the forum, sung to the tune of “Part of Your World.” […]
Predictions 2022 Live
Chart a bold path to success in 2022. Hear our predictions for the year ahead.
Blog
Forcepoint Acquires Bitglass
In its quest to add to its Zero Trust edge (ZTE), also known as secure access service edge (SASE), portfolio, Forcepoint acquired cloud security gateway (CSG), also known as cloud access security broker (CASB), provider Bitglass for a Forrester-estimated $200-300 million last week. Beyond the usual criteria (ability to retain marketing and development talent of Bitglass), […]
Blog
Halloween Comes Early For Syniverse, FB, And Twitch — What We Can Learn From Their Spooky Outages Plus Breaches
As renowned ghost hunter and solver of mysteries Scooby-Doo would say, “Ruh roh, Raggy!” It looks like more than ghosts are wreaking havoc on haunted networks. We’re less than a full week into October, and Cybersecurity Awareness Month isn’t quite taking shape the way we expected. Ostensibly, orgs decided to pivot and use this time […]
Blog
Zero Trust For Healthcare Orgs Is Just What The Doctor Ordered
Healthcare data is low-hanging fruit for hackers. Learn how adopting a Zero Trust strategy can help keep your data safe.
Blog
Zero Trust Doesn’t Mean Zero Breaches
We occasionally get asked this question: “Would Zero Trust have prevented [insert high-profile breach]?” The breach in question could be Equifax, SolarWinds, or the United States Office of Personnel Management. We haven’t been asked (yet) about the announcement from Microsoft this month, where they acknowledged that they were a target of, and indeed had an […]
Blog
Forrester’s List Of Ransomware Resources
With ransomware continuing as a high-impact problem (with seemingly no end in sight), we’ve put together some useful ransomware resources for security practitioners. Security and risk (S&R) pros can use these resources to help prevent, protect, detect, and respond to ransomware outbreaks. The links below are a mixture of Forrester’s own research and third-party links. […]
European Predictions 2022
Visit our resource hub to discover the key trends impacting European businesses in 2022.
Blog
Biden Executive Order Bets Big On Zero Trust For The Future Of US Cybersecurity
Forrester's security team sifts through the details of the new executive order on cybersecurity and looks forward at its long-term impact.
Blog
Ransomware: Survive By Outrunning The Guy Next To You
There are two people in a wood, and they run into a bear. The first person gets down on his knees to pray; the second person starts lacing up his boots. The first person asks the second person, “My dear friend, what are you doing? You can’t outrun a bear.” To which the second person […]
Blog
Zero Trust Is Not A Security Solution; It’s A Strategy
One of the top challenges and misunderstandings that I continue to see here at Forrester is about what the definition of Zero Trust actually is. Zero Trust is not one product or platform; it’s a security framework built around the concept of “never trust, always verify” and “assuming breach.” Attempting to buy Zero Trust as […]
Blog
Take Security To The Zero Trust Edge
Senior Analyst David Holmes introduces Forrester’s new model for security and networking services.
Blog
It Is A Privilege To Announce The Forrester Wave™: Privileged Identity Management (PIM), Q4 2020
Bad puns in the title of this blog post aside (queue the rolling of the eyes, sigh, and slight smirk), we are pleased to announce that “The Forrester Wave™: Privileged Identity Management (PIM), Q4 2020” is now live. While PIM vendors have been adding new capabilities and improved user experience over the past two years, […]
See the future and gain a competitive advantage for 2022
Discover 12 trends our research reveals will matter most this year. Download our Predictions 2022 Guide.
Blog
Dealing With The Access Hoarders In Your Organization
Anyone who has seen the show Hoarders knows how people who fill their houses with unneeded stuff can literally bury themselves in junk. Security and risk (S&R) pros who manage employee access to apps, databases, and systems should notice the Hoarders parallel when it comes to IT access: Many employees unknowingly acquire access over time, […]
Blog
The Security Snapshot: Are You “More” Normal?
The COVID-19 pandemic unequivocally changed how employers think the workforce could and should look like. As firms have been growing more acclimated to the “new normal,” insider threats, breaches, and employee unrest are on the rise. You need to know which security vendors fit your needs and which strategies to take. As we head into month […]
Blog
How A Password Manager Could Save Your Marriage
My wife has the good fortune of living with a security and risk pro who also happens to be a US Army intelligence officer, so she’s been previously scolded about lax security practices. I also point out how “hacking” scenes on TV and in movies are comical and inaccurate. Note: Said wife was not consulted […]
More posts