Save or Share this Report

For Security & Risk Professionals

Develop Your Road Map For Zero Trust Network Mitigation Technology

Network Analysis And Visibility Tools Take Center Stage

May 9, 2012

Primary author headshot


Why Read This Report

This report outlines Forrester's solution to help security and risk (S&R) leaders develop their road map for Zero Trust network threat mitigation technologies using Forrester's TechRadar™ methodology. 2011 was the year of the breach. The news is filled with reports of network attacks and stolen data. Consumers routinely undergo the stress of fraudulent charges or compromised credit cards. Terms such as "botnet" have become part of our vocabulary. As a result, security and risk (S&R) professionals find themselves on a neverending quest to maintain the integrity of their networks. To provide some insight into the vast array of options available to meet today's threats, Forrester investigated 17 threat mitigation technologies, including encryption, wireless IDS/IPS, unified threat management, and web security gateway. Compliance-driven products, such as web application firewalls and network firewalls, continue to remain strong in the enterprise. Network IDS and IPS continue to play in both the best practice and compliance arenas, with IPS replacing IDS in most organizations. Also, recent data breaches will aid the adoption of emerging technologies such as network encryption and configuration auditing tools.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($2495 USD).


Tools And Templates

Vendor Selection Aids

vendor selection icon
  • TechRadar™: Network Threat Mitigation, Q2 '12

Table of Contents

  • Today's Threats Demonstrate The Need For Network Threat Mitigation
  • Why The Future Of Network Threat Mitigation Matters
  • Overview: TechRadar For Network Threat Mitigation
  • Varied Uses To Secure Infrastructure

  • Rethink Your Network Architecture And Your Tools
  • Supplemental Material
  • Related Research Documents