Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Breakdown Of Confirmed Breaches In 2020
April 6, 2021
-
Data Types Compromised In The Past 12 Months
April 6, 2021
Search Results
-
Report The State Of Data Security And Privacy, 2021
Benchmarks: The Data Security And Privacy Playbook
April 6, 2021 | Heidi SheyOrganizations can learn from the patterns behind data breaches, exposure, and misuse to evaluate their current practices and controls for data protection. Key trends in data security and privacy...
-
Report A CISO's First 100 Days
Few Wins But Big Losses At Stake Early In Your Tenure
The energy and momentum created when a new leader takes the reins unlocks opportunities, but if CISOs don't handle their first 100 days well, they risk alienating stakeholders and isolating...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...
-
Report Use Forrester's CISO Strategic Canvas To Align Security With Business
Strategic Plan: The S&R Practice Playbook
Security leaders know it's critical to align their efforts to the business, speak their business colleagues' language, and show support for business objectives. But with never-ending inbound...
-
Report How To Manage The Human Risk In Cybersecurity
Continuous Improvement: The S&R Practice Playbook
January 13, 2021 | Jinan BudgeTraditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...
-
Report Evolve Your IAM Strategy For Your Digital Business
Executive Overview: The Identity And Access Management Playbook
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
August 10, 2020 | David HolmesIn our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...
-
Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020
Forrester's Overview Of 24 CIAM Providers
June 24, 2020 | Andras CserYou can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...
-
Report Now Tech: Network Analysis And Visibility, Q2 2020
Forrester's Overview Of 24 Network Analysis And Visibility Providers
June 23, 2020 | Josh ZelonisYou can use network analysis and visibility (NAV) solutions to identify unmanaged assets, understand how to implement Zero Trust segmentation, and detect threats within your environment. But to...
-
Report Bust The Zero Trust Myths
Prioritize Zero Trust Concerns, Because Your Stakeholders Can Make Or Break Your Strategy
June 22, 2020 | Jinan Budge, Chase CunninghamZero Trust (ZT) is prone to misconceptions. IT and business leaders often think that ZT is too hard, too expensive, and requires them to restructure everything they've built or deploy...
-
Report Use Privileged Identity Management Pricing Insight For Buyer Advantage
Understand Pricing Mechanics To Optimize Your PIM Procurement
Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...
-
Report Throw DARTS To Hit Your Zero Trust Targets
Vision: The Zero Trust Security Playbook
June 15, 2020 | Chase Cunningham, Peter CerratoOrganizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...
-
Report Build A Developer Security Champions Program
Developer Security Champions Scale Your Team And Address Application Security Issues Closer To The Source
June 12, 2020 | Sandy CarielliFirms that want to secure applications are challenged by understaffed security teams and lack of security awareness on the part of developers. Developer security champions are developers who act as...
-
Report Mitigating Ransomware With Zero Trust
Bolster Your Defenses With Zero Trust Principles And Techniques
June 8, 2020 | Chase Cunningham, Josh Zelonis, David HolmesRansomware and malware continue to plague organizations across the globe. Entire industries have been affected and, in some cases, ground to a halt thanks to the scourge of ransomware attacks....
-
Report Now Tech: Zero Trust Solution Providers, Q2 2020
Forrester's Overview Of 38 Zero Trust Solution Providers
May 1, 2020 | Chase CunninghamYou can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...
-
Report How To Implement Zero Trust Security In Europe
Large technology companies and the US federal government have adopted Zero Trust (ZT) as their next-generation security model. 2019 saw Zero Trust enter the European security market. In 2020,...
-
Report Now Tech: Enterprise Firewalls, Q1 2020
Forrester's Overview Of 18 Enterprise Firewall Providers
March 20, 2020 | David HolmesYou can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...
-
Report Build A Security Champions Network
How To Integrate Security Culture Across Your Organization
Building a security culture up, down, and across the organization and engaging the multitudes of stakeholders is neither a simple task nor one that can easily be completed in the short term. This...
-
Report The Top Trends Shaping IAM In 2020
Landscape: The Identity And Access Management Playbook
Identity is a core building block of a robust Zero Trust security ecosystem and infrastructure. In this report, we look at the eight most important trends that will shape the identity and access...
-
Report A CISO's Guide To Successfully Leading Change
How To Build Support, Manage Detractors, And Navigate Politics
January 9, 2020 | Jinan BudgeCybersecurity is getting ever more scrutiny from boards, execs, and customers. Many CISOs need to launch large change programs to transform their cybersecurity capabilities amidst unprecedented...
-
Report Justify Security Budget By Its Impact On Maturity
Business Case: The S&R Practice Playbook
Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...
-
Report Build The Business Case For GRC
Business Case: The Governance, Risk, And Compliance Playbook
The business case for governance, risk management, and compliance (GRC) efforts too often relies on the fear of costly events or regulatory action. This report helps GRC leaders elevate the...
-
Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs
Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...
-
Report Research Overview: Security Awareness, Behavior, And Culture
A CISO's Guide To Research About The People Side Of Security
October 30, 2019 | Jinan BudgeThe people element of security has long sat on the back burner as security and risk (S&R) pros buy product after product without first solving fundamental problems. People and culture are central...
- 1
- 2
Content Type
ApplyFilters
Industry
- Healthcare (7)
- Financial Services (1)
- Manufacturing (1)
- Retail (1)
Topics
Methodology
- Now Tech (24)
- Forrester Wave (8)
- Business Technographics (7)
- Total Economic Impact (TEI) (3)
- Maturity Assessment (1)
Region
- North America (6)
- Europe (4)
Vendor
- Cisco (14)
- Palo Alto Networks (14)
- Akamai (10)
- Fortinet (10)
- Google (10)
- Okta (10)
- Proofpoint (10)
- Unisys (10)
- Check Point (8)
- BlackBerry Cylance (6)
- Centrify (6)
- Microsoft (6)
- Huawei (4)
- Juniper Networks (4)
- Symantec (4)
- IBM (1)
Analyst
- Jinan Budge (15)
- David Holmes (13)
- Andras Cser (11)
- Jeff Pollard (11)
- Heidi Shey (8)
- Paul McKay (4)
- Alla Valente (3)
- Amy DeMartine (3)
- Sean Ryan (3)
- Merritt Maxim (2)
- Renee Murphy (2)
- Sandy Carielli (2)
- Chris Sherman (1)
- Claire O'Malley (1)
- Enza Iannopollo (1)
- Jess Burn (1)
- Naveen Chhabra (1)
- Peter Cerrato (1)
- Salvatore Schiano (1)
- Steve Turner (1)