Skip to main content
188 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Application Security

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report The Forrester Wave™: Static Application Security Testing, Q1 2021

    The 12 Providers That Matter Most And How They Stack Up
    January 11, 2021 | Sandy Carielli

    In our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...

  • Report Don't Ignore Security In Low-Code Development

    Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
    December 23, 2020 | Sandy Carielli, John Bratincevic

    The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...

  • Report Gauge Your Data Security And Privacy Maturity

    Assessment: The Data Security And Privacy Playbook
    December 18, 2020 | Enza Iannopollo, Heidi Shey

    To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...

  • Webinar More Than A Gateway: Take A Holistic Approach To API Security

    December 1, 2020 | Sandy Carielli, David Mooter

    APIs provide a foundation for innovation and digital transformation, but as evidenced by the number of API related breaches, organizations struggle to secure them. The API security landscape is a...

  • Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    October 23, 2020 | Andras Cser, Sean Ryan

    Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...

  • Forum Security & Risk Global

    Leading the Way
    September 22, 2020 | Live Virtual Experience | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...

  • Report The Zero Trust eXtended Ecosystem: Data

    Landscape: The Data Security And Privacy Playbook
    August 11, 2020 | Heidi Shey, Chase Cunningham

    Data security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...

  • Report The Forrester Wave™: Enterprise Firewalls, Q3 2020

    The 11 Providers That Matter Most And How They Stack Up
    August 10, 2020 | David Holmes

    In our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...

  • Report Now Tech: Static Application Security Testing, Q3 2020

    Forrester's Overview Of 19 SAST Providers
    August 6, 2020 | Sandy Carielli

    You can use static application security testing (SAST) to reduce the time to fix application security weaknesses, improve application delivery speed and predictability, and educate developers on...

  • Webinar So You're Implementing Containers? Secure Them!

    July 28, 2020 | Sandy Carielli, Andras Cser

    Technology leaders are jumping at the chance to implement containers, and security leaders are scrambling to figure out how to protect them. Join us for a fireside chat about key container security...

  • Report Best Practices For Container Security

    Protecting Containerized Applications Requires Technical And Organizational Steps
    July 24, 2020 | Sandy Carielli, Andras Cser

    Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...

  • Report Forrester Infographic: Web Application Firewall Customers Weigh In

    July 23, 2020 | Sandy Carielli

    Web application firewall (WAF) providers aim to protect customers from a range of application attacks, from OWASP Top 10 vulnerabilities to API-based attacks, client-side attacks, and even bots. We...

  • Report Use Privileged Identity Management Pricing Insight For Buyer Advantage

    Understand Pricing Mechanics To Optimize Your PIM Procurement
    June 18, 2020 | Sean Ryan, Andras Cser

    Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...

  • Report How A Least Privilege Model Can Reduce Dynamic Access Risks

    Applying Zero Trust To Address Overprivileged Employee/Entity Access
    May 27, 2020 | Sean Ryan, Andras Cser

    Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either...

  • Report The State Of Application Security, 2020

    Applications Remain The Top External Attack Method; Don't Get Complacent
    May 4, 2020 | Sandy Carielli

    Application weaknesses and software vulnerabilities continue to be the most common external attack method. Now is not the time to backslide on your application security efforts. Instead, follow the...

  • Report Zoom Becomes A Product Security Cautionary Tale

    CISOs Must Take Extra Steps To Protect Their Firms While Zoom Fixes Critical Flaws

    As the global pandemic sent hundreds of thousands of employees to work from home overnight, Zoom quickly rose to worldwide prominence as a central enabling technology. But just as quickly, Zoom...

  • Report Now Tech: Privileged Identity Management, Q2 2020

    Forrester's Overview Of 17 Privileged Identity Management Providers
    April 2, 2020 | Sean Ryan

    You can use PIM offerings to reduce exposure to the most damaging types of breaches, comply with a growing list of regulations, replace manual processes for oversight of privileged accounts, and...

  • Report Now Tech: Enterprise Firewalls, Q1 2020

    Forrester's Overview Of 18 Enterprise Firewall Providers
    March 20, 2020 | David Holmes

    You can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...

  • Report Optimize User Experience With Passwordless Authentication

    Improve User Experience And Security And Lower The Cost Of Cross-Channel Authentication
    March 2, 2020 | Andras Cser, Sean Ryan

    With the evolution of numerical computing, the password has lost its ability to protect critical applications and data. This report looks at passwordless authentication, explaining how it can...

  • Report The Forrester Wave™: Web Application Firewalls, Q1 2020

    The 10 Providers That Matter Most And How They Stack Up
    February 26, 2020 | Sandy Carielli, Amy DeMartine

    In our 33-criterion evaluation of web application firewall (WAF) providers, we identified the 10 most significant ones — Akamai Technologies, Alibaba Cloud, Amazon Web Services, Barracuda Networks,...

  • Report The Forrester New Wave™: Bot Management, Q1 2020

    The 13 Providers That Matter Most And How They Stack Up
    January 29, 2020 | Sandy Carielli, Amy DeMartine

    In Forrester's evaluation of the emerging market for bot management, we identified the 13 most significant providers in the category — Akamai Technologies, Alibaba Cloud, AppsFlyer, Cloudflare,...

  • Report Top Cybersecurity Threats In 2020

    Landscape: The Zero Trust Security Playbook
    January 24, 2020 | Josh Zelonis, Sandy Carielli

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...

  • Report The State Of Government Application Security, 2020

    Government Must Invest Aggressively In Application Security To Protect Citizen Data
    January 7, 2020 | Sandy Carielli, Amy DeMartine

    Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....

  • Report Now Tech: Web Application Firewalls, Q4 2019

    Forrester's Overview Of 31 WAF Providers
    December 20, 2019 | Sandy Carielli, Amy DeMartine

    You can use web application firewalls (WAFs) to protect applications, apply consistent and global security policies, and comply with regulations. But to realize these benefits, you'll first have to...

  • Report New Tech: Bot Management, Q4 2019

    Forrester's Landscape Overview Of 22 Providers
    December 13, 2019 | Sandy Carielli, Amy DeMartine

    Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated,...

  • 1
  • 2

Content Type

Apply

Filters

Region

Vendor