Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
-
Four Steps To Create A Strategic Program To Manage The Human Risks
January 13, 2021
Search Results
-
Report How To Manage The Human Risk In Cybersecurity
Continuous Improvement: The S&R Practice Playbook
January 13, 2021 | Jinan BudgeTraditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report Best Practices For Container Security
Protecting Containerized Applications Requires Technical And Organizational Steps
Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...
-
Report The Forrester New Wave™: Connected Medical Device Security, Q2 2020
The Eight Providers That Matter Most And How They Stack Up
June 11, 2020 | Chris ShermanIn Forrester's evaluation of the emerging market for medical device security solutions, we identified the eight most significant providers in the category — Armis, CyberMDX, Cynerio, Forescout,...
-
Report Forrester Infographic: Understanding European Security Leader Spending Patterns, 2020
European Security Leaders Adapt To Stagnating Security Budgets
May 18, 2020 | Paul McKayForrester surveyed 1,346 European security decision makers to understand how they plan to spend their budgets in 2020. This infographic summarizes security spending patterns and key takeaways from...
-
Report The State Of Application Security, 2020
Applications Remain The Top External Attack Method; Don't Get Complacent
May 4, 2020 | Sandy CarielliApplication weaknesses and software vulnerabilities continue to be the most common external attack method. Now is not the time to backslide on your application security efforts. Instead, follow the...
-
Report Understand The State Of Identity And Access Management, 2020
Benchmarks: The Identity And Access Management Playbook
This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...
-
Report New Tech: Medical Device Security, Q1 2020
Forrester's Landscape Overview Of 19 Providers
Connected medical devices are an integral part of modern healthcare providers, but security teams at those organizations struggle to understand and mitigate connected medical devices directly...
-
Report Security Budgets Europe, 2020: SaaS Security Is In Vogue
European Security Leaders Adopt Sustainable Budgeting Practices
March 20, 2020 | Paul McKayIn 2020, European security leaders are grappling with a toxic mix of geopolitical tensions, economic growth slowdown, and board of directors fatigue caused by questionable results after years of...
-
Report The State Of Data Security And Privacy, 2020
Benchmarks: The Data Security And Privacy Playbook
February 27, 2020 | Heidi SheyThis data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...
-
Report The State Of Government Application Security, 2020
Government Must Invest Aggressively In Application Security To Protect Citizen Data
Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....
-
Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs
Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...
-
Report Future-Proof Your Digital Business With Zero Trust Security
October 4, 2019 | Jeff PollardAs CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it's the perfect time to migrate to a Zero Trust security architecture. Security and risk...
-
Report The US Healthcare Security Benchmark, 2018 To 2019
Healthcare Pros Must Spend Wisely To Counter Increasing Complexity
In the past, IT security teams within US healthcare providers had much smaller budgets than those within other industries. This is no longer the case, as budget increases in healthcare have come as...
-
Report The State Of European Security In 2019: Slower-Growing Budgets Drive Fit-For-Purpose Security
June 12, 2019 | Paul McKayA wobbly Eurozone economy and slower-growing budgets force European security and risk (S&R) leaders to prioritize their spending. Read this report to pinpoint the most important changes in the...
-
Report Forrester's Guide To Paying Ransomware
Paying Ransom Can Be A Valid Recovery Option Based On Business Need And Circumstances
June 5, 2019 | Josh Zelonis, Trevor LynessConventional wisdom says that when your company suffers a ransomware attack, you should never pay the ransom. But hardline conversations about whether to negotiate with cybercriminals takes a...
-
Report Best Practices: Medical Device Security
Control Your Hospital's Expanding Device Risk Exposure
Healthcare providers struggle to understand and mitigate medical device risk, particularly devices connected to the hospital network and directly involved in patient care. Meanwhile, patients...
-
Report Forrester Analytics: Cloud Security Solutions Forecast, 2018 To 2023 (Global)
ForecastView Document
As software, infrastructure, and platforms shift to the cloud, a new breed of security services continues to emerge and grow to address the security requirements. This data-driven report gives a...
-
Report Security Budgets Europe, 2019: Budgets Rise And Security Services Overtake Products
March 21, 2019 | Paul McKayThis year, European CISOs must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how European security...
-
Report The State Of Application Security, 2019
Organizations Are Rushing To Protect Their Applications With Automation
February 27, 2019 | Amy DeMartineApplication weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...
Content Type
ApplyFilters
Industry
- Healthcare (28)
- Public Sector (3)
Methodology
- Business Technographics (17)
- Forrester New Wave (12)
- ForecastView (8)
- New Tech (7)
- Infographic (2)
Region
- Europe (14)
- North America (6)
Analyst
- Chris Sherman (15)
- Paul McKay (15)
- Sandy Carielli (11)
- Heidi Shey (8)
- Jeff Pollard (7)
- Amy DeMartine (6)
- Andras Cser (4)
- Jinan Budge (4)
- Salvatore Schiano (2)
- Sean Ryan (2)
- David Holmes (1)
- Elsa Pikulik (1)
- Jennifer Adams (1)