Skip to main content
133 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Cloud Computing

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report Now Tech: IDaaS For Enterprise, Q2 2021

    Forrester's Overview Of 20 IDaaS-For-Enterprise Providers
    May 12, 2021 | Sean Ryan

    You can use IDaaS-for-enterprise offerings to gain efficiencies in administering user access and lifecycle management, enforcing secure access controls, and improving user productivity. But to...

  • Webinar Lessons From The Field: How To Gain Value From Cybersecurity Risk Ratings Platforms

    Using The Forrester Wave™
    April 20, 2021 | Paul McKay, Alla Valente

    Cybersecurity risk ratings platforms are a divisive topic, with some customers gaining a lot of value from them and others who are less complimentary about their use. Join this webinar to find...

  • Report The Four Tenets Of SaaS Application Security And Protection

    Check For ZT Principles For Your SaaS Vendors' Security Stance
    April 16, 2021 | Andras Cser

    As costs of on-premises hosting increase and firms continue to deploy more SaaS apps, firms are now storing sensitive and personally identifiable information in SaaS apps — increasing the overall...

  • Report The State Of Data Security And Privacy, 2021

    Benchmarks: The Data Security And Privacy Playbook
    April 6, 2021 | Heidi Shey

    Organizations can learn from the patterns behind data breaches, exposure, and misuse to evaluate their current practices and controls for data protection. Key trends in data security and privacy...

  • Report Forrester Infographic: Global Security Budgets In 2021

    March 26, 2021 | Jeff Pollard

    Security and risk pros are entering 2021 in unclear circumstances. As the pandemic continues to wax and wane, economic uncertainty makes long-term planning almost impossible. Yet work-from-home...

  • Report Future Requirements For IaaS Platform Native Security In 2021 To 2022

    Essential Cross-Cloud Services That Should Be Part Of Your Cloud Strategy
    March 17, 2021 | Andras Cser

    Infrastructure-as-a-service platform native security (IPNS) plays a crucial role in securing data, workloads, and network communications in public cloud platforms such as Amazon Web Services (AWS),...

  • Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security

    March 10, 2021 | Andras Cser

    In this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...

  • Report Top Cybersecurity Threats In 2021

    Landscape: The Zero Trust Security Playbook

    In light of the 2020 SolarWinds compromise that affected a substantial number of US government agencies, Microsoft, and FireEye, it's tempting in 2021 to focus on defending against supply chain...

  • Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021

    The 11 Providers That Matter Most And How They Stack Up
    March 3, 2021 | David Holmes

    In our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...

  • Report The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021

    The Seven Providers That Matter Most And How They Stack Up
    February 25, 2021 | Paul McKay, Alla Valente

    In Forrester's evaluation of the emerging market for cybersecurity risk ratings, we identified the seven most significant providers in the category — BitSight, Black Kite (previously Normshield),...

  • Report Now Tech: Cloud Security Gateways, Q1 2021

    Forrester's Overview Of 16 Cloud Security Gateway Providers
    January 26, 2021 | Andras Cser

    You can use cloud security gateway (CSG, also known as cloud access security broker or CASB) solutions to detect and protect against: 1) data loss, 2) excessive sensitive data access, and 3) use of...

  • Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    October 23, 2020 | Andras Cser, Sean Ryan

    Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...

  • Forum Security & Risk Global

    Leading the Way
    September 22, 2020 | Live Virtual Experience | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...

  • Report Forrester Infographic: The State Of The European Cybersecurity Product Market

    European Security Leaders Trying To Buy Local Will Struggle To Meet Their Needs
    July 8, 2020 | Paul McKay

    Developing a thriving European cybersecurity product market is a key EU digital single market priority in 2020 and beyond. European security leaders would love to buy locally but don't always have...

  • Webinar Top Security Technologies To Watch, 2020

    Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...

  • Report Throw DARTS To Hit Your Zero Trust Targets

    Vision: The Zero Trust Security Playbook
    June 15, 2020 | Chase Cunningham, Peter Cerrato

    Organizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...

  • Report Assess Your Cloud Security Readiness

    Leverage Forrester's Custom Tool To Assess Your Cloud Security Maturity Across Six Major Technology Competencies
    May 29, 2020 | Andras Cser

    As firms migrate computing and data resources to the cloud, security remains a top concern and priority for both operational and compliance reasons. S&R professionals should use our custom tool, a...

  • Webinar European Security Market Trends, 2020

    May 18, 2020 | Paul McKay

    Security leaders in Europe have had to deal with one of the biggest workforce transformations ever known as workers have moved from office work to homeworking to counter the current COVID-19...

  • Report Zero Trust Primer For 5G Security Use Cases

    More Bandwidth Means More Data To Protect
    May 1, 2020 | Jeff Pollard

    Security and risk pros concerned about 5G security will find that the security narrative was hijacked — rightfully — by geopolitical and national security concerns. For enterprise security leaders,...

  • Report Now Tech: DDoS Mitigation Solutions, Q2 2020

    Forrester's Overview Of 22 DDoS Mitigation Solution Providers
    April 20, 2020 | David Holmes

    You can use DDoS mitigation solutions to protect revenue generated by digital assets, maintain consistent customer experience, and meet availability compliance requirements. But to realize these...

  • Report Cybersecurity Risk Ratings Market Outlook, 2020 And Beyond

    CISO Trust And Transparency Issues Drive Market Consolidation And Exits
    March 16, 2020 | Paul McKay

    Cybersecurity risk ratings vendors leverage externally available data about a firm to rate its cybersecurity posture. These vendors have now become mainstream despite customers, suppliers, and...

  • Report Securing Private 5G At The Edge: Europe Edition

    Guide To Securing Private 5G And Edge Computing Use Cases For European Organizations
    March 13, 2020 | Paul McKay

    5G networks are being deployed around Europe in 2020; several countries and telecom operators will bring 5G to the consumer market in 2020 and beyond. You'll find the most compelling 5G use cases...

  • Report The Top Trends Driving Cloud Workload Security In 2020

    Market Consolidation, SaaS Offerings, And Remediation And DevOps Integration Are Reshaping The CWS Market
    March 3, 2020 | Andras Cser

    Cloud workload security (CWS) solutions are deployed to detect, mitigate, and prevent cloud misconfigurations, configuration drift, identity and privilege proliferations, and vulnerabilities in...

  • Report The Forrester Wave™: Cloud Workload Security, Q4 2019

    The 13 Providers That Matter Most And How They Stack Up
    December 9, 2019 | Andras Cser

    In our 30-criterion evaluation of cloud workload security (CWS) providers, we identified the 13 most significant ones — Alert Logic, Aqua Security, Bitdefender, Cavirin, Check Point, Cisco,...

  • Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

    Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
    November 25, 2019 | Andras Cser, Sean Ryan

    With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...

  • 1
  • 2

Content Type

Apply

Filters

Region

Vendor