Summary
In part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and risk (S&R) leaders are ready to turn their focus to the technologies for prevention as well as detection and response. S&R leaders frequently struggle with deploying the right mix of technologies to detect and respond to attacks. In this report, we discuss the four technologies that should form the pillars of your breach detection capabilities: malware analysis, network analysis and visibility, endpoint visibility and control, and security analytics. For each technology, we provide you with key evaluation criteria, considerations, and both commercial and open source solutions to help you select the right solution. These technologies, in the hands of skilled staff, are essential for building resiliency into your cybersecurity program.
- Stay ahead of changing market and customer dynamics with the latest insights.
- Partner with expert analysts to make progress on your top initiatives.
- Get answers from trusted research using Izola, Forrester's genAI tool.