Skip to main content

Save or Share this Report

For Security & Risk Professionals

Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities

Multiple Technologies Are Required For Breach Detection

July 24, 2014

Primary author headshot

Authors

Why Read This Report

In part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and risk (S&R) leaders are ready to turn their focus to the technologies for prevention as well as detection and response. S&R leaders frequently struggle with deploying the right mix of technologies to detect and respond to attacks. In this report, we discuss the four technologies that should form the pillars of your breach detection capabilities: malware analysis, network analysis and visibility, endpoint visibility and control, and security analytics. For each technology, we provide you with key evaluation criteria, considerations, and both commercial and open source solutions to help you select the right solution. These technologies, in the hands of skilled staff, are essential for building resiliency into your cybersecurity program.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($745 USD).

Purchase

Table of Contents

  • Forrester's Targeted-Attack Hierarchy Of Needs Continues
  • You Must Build Each Tech Pillar Of The Breach Detection Stack
  • Balance The Pillars Based On Your Needs
  • WHAT IT MEANS

  • Detection And Response Require An Integrated Technology Stack
  • Supplemental Material
  • Related Research Documents