Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Evaluated Vendors And Product Information
January 11, 2021
-
Forrester Wave™: Static Application Security Testing, Q1 2021
January 11, 2021
Search Results
-
Report The Forrester Wave™: Static Application Security Testing, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
January 11, 2021 | Sandy CarielliIn our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Webinar More Than A Gateway: Take A Holistic Approach To API Security
APIs provide a foundation for innovation and digital transformation, but as evidenced by the number of API related breaches, organizations struggle to secure them. The API security landscape is a...
-
Report The Future Of Identity And Access Management
Vision: The Identity And Access Management Playbook
Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
August 10, 2020 | David HolmesIn our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...
-
Report Now Tech: Static Application Security Testing, Q3 2020
Forrester's Overview Of 19 SAST Providers
August 6, 2020 | Sandy CarielliYou can use static application security testing (SAST) to reduce the time to fix application security weaknesses, improve application delivery speed and predictability, and educate developers on...
-
Webinar So You're Implementing Containers? Secure Them!
Technology leaders are jumping at the chance to implement containers, and security leaders are scrambling to figure out how to protect them. Join us for a fireside chat about key container security...
-
Report Best Practices For Container Security
Protecting Containerized Applications Requires Technical And Organizational Steps
Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...
-
Report Forrester Infographic: Web Application Firewall Customers Weigh In
July 23, 2020 | Sandy CarielliWeb application firewall (WAF) providers aim to protect customers from a range of application attacks, from OWASP Top 10 vulnerabilities to API-based attacks, client-side attacks, and even bots. We...
-
Report Use Privileged Identity Management Pricing Insight For Buyer Advantage
Understand Pricing Mechanics To Optimize Your PIM Procurement
Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...
-
Report How A Least Privilege Model Can Reduce Dynamic Access Risks
Applying Zero Trust To Address Overprivileged Employee/Entity Access
Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either...
-
Report The State Of Application Security, 2020
Applications Remain The Top External Attack Method; Don't Get Complacent
May 4, 2020 | Sandy CarielliApplication weaknesses and software vulnerabilities continue to be the most common external attack method. Now is not the time to backslide on your application security efforts. Instead, follow the...
-
Report Zoom Becomes A Product Security Cautionary Tale
CISOs Must Take Extra Steps To Protect Their Firms While Zoom Fixes Critical Flaws
As the global pandemic sent hundreds of thousands of employees to work from home overnight, Zoom quickly rose to worldwide prominence as a central enabling technology. But just as quickly, Zoom...
-
Report Now Tech: Privileged Identity Management, Q2 2020
Forrester's Overview Of 17 Privileged Identity Management Providers
April 2, 2020 | Sean RyanYou can use PIM offerings to reduce exposure to the most damaging types of breaches, comply with a growing list of regulations, replace manual processes for oversight of privileged accounts, and...
-
Report Now Tech: Enterprise Firewalls, Q1 2020
Forrester's Overview Of 18 Enterprise Firewall Providers
March 20, 2020 | David HolmesYou can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...
-
Report Optimize User Experience With Passwordless Authentication
Improve User Experience And Security And Lower The Cost Of Cross-Channel Authentication
With the evolution of numerical computing, the password has lost its ability to protect critical applications and data. This report looks at passwordless authentication, explaining how it can...
-
Report The Forrester Wave™: Web Application Firewalls, Q1 2020
The 10 Providers That Matter Most And How They Stack Up
In our 33-criterion evaluation of web application firewall (WAF) providers, we identified the 10 most significant ones — Akamai Technologies, Alibaba Cloud, Amazon Web Services, Barracuda Networks,...
-
Report The Forrester New Wave™: Bot Management, Q1 2020
The 13 Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for bot management, we identified the 13 most significant providers in the category — Akamai Technologies, Alibaba Cloud, AppsFlyer, Cloudflare,...
-
Report Top Cybersecurity Threats In 2020
Landscape: The Zero Trust Security Playbook
January 24, 2020 | Josh Zelonis, Sandy CarielliSecurity and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...
-
Report The State Of Government Application Security, 2020
Government Must Invest Aggressively In Application Security To Protect Citizen Data
Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....
-
Report Now Tech: Web Application Firewalls, Q4 2019
Forrester's Overview Of 31 WAF Providers
You can use web application firewalls (WAFs) to protect applications, apply consistent and global security policies, and comply with regulations. But to realize these benefits, you'll first have to...
-
Report New Tech: Bot Management, Q4 2019
Forrester's Landscape Overview Of 22 Providers
Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated,...
- 1
- 2
Content Type
ApplyFilters
Industry
- Public Sector (6)
- Financial Services (3)
- Healthcare (3)
- Retail (3)
- Energy & Utilities (2)
- Manufacturing (2)
- Media & Entertainment (2)
- Consumer Electronics (1)
- Transportation & Logistics (1)
- Travel (1)
Topics
- Web Application Firewalls (WAF) (52)
- API Security (40)
- Container Security (18)
- Dynamic Application Security Testing (DAST) (17)
- Application Penetration Testing Tools (13)
- Runtime Application Self-Protection (RASP) (13)
- Software Composition Analysis (SCA) (5)
- Interactive Application Security Testing (IAST) (1)
Methodology
- Now Tech (26)
- Forrester Tech Tide (19)
- Forrester Wave (19)
- Forrester New Wave (17)
- Business Technographics (11)
- ForecastView (9)
- New Tech (8)
- Infographic (4)
- Online Maturity Assessment (2)
- Maturity Assessment (1)
- Predictions (1)
Region
- North America (1)
Vendor
- Akamai (31)
- Oracle (27)
- Microsoft (26)
- Cisco (23)
- Micro Focus (23)
- Google (22)
- IBM (22)
- Okta (22)
- CA Technologies (19)
- Centrify (19)
- CyberArk (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- Intel (19)
- Neustar (19)
- Pitney Bowes (19)
- RSA (19)
- SailPoint (19)
- Salesforce (19)
- SAP (19)
- Imperva (12)
- Alibaba (8)
- Veracode (8)
- Cloudflare (5)
- Amazon (4)
- Check Point (4)
- Fortinet (4)
- HCL Technologies (4)
- Huawei (4)
- Juniper Networks (4)
- Palo Alto Networks (4)
- OpenText (3)
- Flexera (1)
- Publicis Sapient (1)
Analyst
- Sandy Carielli (32)
- Amy DeMartine (28)
- Andras Cser (18)
- Sean Ryan (11)
- David Holmes (10)
- Jennifer Adams (9)
- Jeff Pollard (7)
- Heidi Shey (4)
- Merritt Maxim (4)
- Claire O'Malley (2)
- Fatemeh Khatibloo (2)
- Jinan Budge (2)
- Renee Murphy (2)
- Alla Valente (1)
- Art Schoeller (1)
- David Mooter (1)
- Enza Iannopollo (1)
- John Bratincevic (1)
- Joseph Blankenship (1)
- Laura Koetzle (1)
- Paul McKay (1)
- Rick Parrish (1)
- Stephanie Balaouras (1)