Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Four Steps To Create A Strategic Program To Manage The Human Risks
January 13, 2021
-
Search Results
-
Report How To Manage The Human Risk In Cybersecurity
Continuous Improvement: The S&R Practice Playbook
January 13, 2021 | Jinan BudgeTraditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report Best Practices For Container Security
Protecting Containerized Applications Requires Technical And Organizational Steps
Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...
-
Report The Forrester New Wave™: Connected Medical Device Security, Q2 2020
The Eight Providers That Matter Most And How They Stack Up
June 11, 2020 | Chris ShermanIn Forrester's evaluation of the emerging market for medical device security solutions, we identified the eight most significant providers in the category — Armis, CyberMDX, Cynerio, Forescout,...
-
Report Forrester Infographic: Understanding European Security Leader Spending Patterns, 2020
European Security Leaders Adapt To Stagnating Security Budgets
May 18, 2020 | Paul McKayForrester surveyed 1,346 European security decision makers to understand how they plan to spend their budgets in 2020. This infographic summarizes security spending patterns and key takeaways from...
-
Report The State Of Application Security, 2020
Applications Remain The Top External Attack Method; Don't Get Complacent
May 4, 2020 | Sandy CarielliApplication weaknesses and software vulnerabilities continue to be the most common external attack method. Now is not the time to backslide on your application security efforts. Instead, follow the...
-
Report Understand The State Of Identity And Access Management, 2020
Benchmarks: The Identity And Access Management Playbook
This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...
-
Report New Tech: Medical Device Security, Q1 2020
Forrester's Landscape Overview Of 19 Providers
Connected medical devices are an integral part of modern healthcare providers, but security teams at those organizations struggle to understand and mitigate connected medical devices directly...
-
Report Security Budgets Europe, 2020: SaaS Security Is In Vogue
European Security Leaders Adopt Sustainable Budgeting Practices
March 20, 2020 | Paul McKayIn 2020, European security leaders are grappling with a toxic mix of geopolitical tensions, economic growth slowdown, and board of directors fatigue caused by questionable results after years of...
-
Report Now Tech: European Cybersecurity Incident Response Services, Q1 2020
Forrester's Overview Of 19 European Cybersecurity Incident Response Providers
March 10, 2020 | Paul McKay, Josh ZelonisYou can use European cybersecurity incident response (IR) providers to help you recover from a cybersecurity breach, stress test your cybersecurity IR plan, and support post-breach remediation...
-
Report The State Of Data Security And Privacy, 2020
Benchmarks: The Data Security And Privacy Playbook
February 27, 2020 | Heidi SheyThis data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...
-
Report Security Budgets 2020: New Threats Bring New Priorities
Benchmarks: The S&R Practice Playbook
February 14, 2020 | Jeff PollardThis report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...
-
Report The State Of Government Application Security, 2020
Government Must Invest Aggressively In Application Security To Protect Citizen Data
Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....
-
Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs
Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...
-
Report Future-Proof Your Digital Business With Zero Trust Security
October 4, 2019 | Jeff PollardAs CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it's the perfect time to migrate to a Zero Trust security architecture. Security and risk...
-
Report New Tech: Cyber Ranges, Q3 2019
Forrester's Landscape Overview Of 14 Providers
Cyber ranges use a simulated breach environment to prepare your workforce for the stress, panic, and communication barriers they will face during a real cyberattack. In an inevitable cyberattack,...
-
Report Security Budgets In Asia Pacific, 2019
Budgets Are Rising As The Region Continues To Play Catch-Up
July 15, 2019 | Jinan BudgeIn 2019, CISOs in Asia Pacific (AP) must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how security...
-
Report The US Healthcare Security Benchmark, 2018 To 2019
Healthcare Pros Must Spend Wisely To Counter Increasing Complexity
In the past, IT security teams within US healthcare providers had much smaller budgets than those within other industries. This is no longer the case, as budget increases in healthcare have come as...
-
Report The State Of European Security In 2019: Slower-Growing Budgets Drive Fit-For-Purpose Security
June 12, 2019 | Paul McKayA wobbly Eurozone economy and slower-growing budgets force European security and risk (S&R) leaders to prioritize their spending. Read this report to pinpoint the most important changes in the...
-
Report Forrester's Guide To Paying Ransomware
Paying Ransom Can Be A Valid Recovery Option Based On Business Need And Circumstances
June 5, 2019 | Josh Zelonis, Trevor LynessConventional wisdom says that when your company suffers a ransomware attack, you should never pay the ransom. But hardline conversations about whether to negotiate with cybercriminals takes a...
-
Report Best Practices: Medical Device Security
Control Your Hospital's Expanding Device Risk Exposure
Healthcare providers struggle to understand and mitigate medical device risk, particularly devices connected to the hospital network and directly involved in patient care. Meanwhile, patients...
-
Report Forrester Analytics: Cloud Security Solutions Forecast, 2018 To 2023 (Global)
ForecastView Document
As software, infrastructure, and platforms shift to the cloud, a new breed of security services continues to emerge and grow to address the security requirements. This data-driven report gives a...
-
Report Security Budgets Europe, 2019: Budgets Rise And Security Services Overtake Products
March 21, 2019 | Paul McKayThis year, European CISOs must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how European security...
-
Report The Forrester Wave™: Cybersecurity Incident Response Services, Q1 2019
The 15 Providers That Matter Most And How They Stack Up
March 18, 2019 | Josh ZelonisIn our 11-criterion evaluation of cybersecurity incident response services providers, we identified the 15 most significant ones — Aon, Booz Allen Hamilton, CrowdStrike, Cylance, Deloitte, EY,...
-
Report Recruiting And Retaining Insider Threat Analysts
To Avoid An Embarrassing And Devastating Insider Attack, Hire Dedicated Analysts
March 7, 2019 | Joseph BlankenshipWhether accidental or malicious, insider incidents can result in fraud, privacy abuses, IP theft, and other damage. It's difficult for security pros to detect this activity because insiders need...
- 1
- 2
Content Type
ApplyFilters
Industry
- Healthcare (28)
- Public Sector (3)
Topics
- Technology Adoption Data (121)
- IT Spending Forecasts (89)
Methodology
- Business Technographics (17)
- New Tech (15)
- Forrester New Wave (12)
- ForecastView (8)
- Now Tech (6)
- Forrester Wave (4)
- Infographic (2)
Region
- Europe (20)
- North America (6)
- Asia Pacific (5)
Vendor
- CrowdStrike (10)
- Deloitte (10)
- FireEye (10)
- PwC (10)
- Accenture (6)
- BAE Systems (6)
- Capgemini (6)
- IBM (6)
- Cylance (4)
- Verizon Communications (4)
- EY (1)
Analyst
- Chris Sherman (16)
- Paul McKay (16)
- Jeff Pollard (15)
- Sandy Carielli (11)
- Jinan Budge (9)
- Heidi Shey (8)
- Joseph Blankenship (7)
- Amy DeMartine (6)
- Andras Cser (4)
- Salvatore Schiano (4)
- Sean Ryan (2)
- Claire O'Malley (1)
- David Holmes (1)
- Elsa Pikulik (1)
- Jennifer Adams (1)
- Stephanie Balaouras (1)