Featured content
The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Charts & Figures
-
Invest: Intelligence Management Solutions
April 13, 2021
-
Invest: Third-Party Threat Intelligence
April 13, 2021
-
Maintain: Brand Threat Intelligence
April 13, 2021
Search Results
-
Webinar Lessons From The Field: How To Gain Value From Cybersecurity Risk Ratings Platforms
Using The Forrester Wave™
Tuesday, April 20, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Paul McKay, Alla ValenteCybersecurity risk ratings platforms are a divisive topic, with some customers gaining a lot of value from them and others who are less complimentary about their use. Join this webinar to find...
-
Report The Forrester Tech Tide™: Threat Intelligence, Q2 2021
Fifteen Technologies And Services Underpin Threat Intelligence
Threat intelligence is increasingly critical to firms' ability to manage cyber risk and build resilient security programs. To accelerate their threat intelligence performance, firms are evaluating...
-
Webinar Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR
April 13, 2021 | Allie MellenIn this webinar, we address the elephant in the room: defining extended detection and response (XDR). Join this webinar to learn what XDR is, what benefits it can bring to security teams, and how...
-
Report The State Of Data Security And Privacy, 2021
Benchmarks: The Data Security And Privacy Playbook
April 6, 2021 | Heidi SheyOrganizations can learn from the patterns behind data breaches, exposure, and misuse to evaluate their current practices and controls for data protection. Key trends in data security and privacy...
-
Report Modernize Your Approach To Endpoint Governance
Use Risk-Based Security Policies And Standards to Protect Your Evolving Workforce
Remote work has caused massive shifts in how workers use technology, and traditional approaches to endpoint governance have failed due to an outdated focus on protecting network-bound corporate...
-
Report A CISO's First 100 Days
Few Wins But Big Losses At Stake Early In Your Tenure
The energy and momentum created when a new leader takes the reins unlocks opportunities, but if CISOs don't handle their first 100 days well, they risk alienating stakeholders and isolating...
-
Report Q&A: Bot Management In Retail
Bots are prevalent in retail, and if retailers don't manage them properly, they will overwhelm good customer traffic — as highlighted by customers' struggles to buy the recently launched PS5 gaming...
-
Report The Forrester Wave™: Managed Detection And Response, Q1 2021
The 15 Providers That Matter Most And How They Stack Up
In our 19-criterion evaluation of managed detection and response providers, we identified the 15 most significant ones — Arctic Wolf, Binary Defense, CrowdStrike, Cybereason, deepwatch, eSentire,...
-
Report The Forrester Wave™: External Threat Intelligence Services, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
In our 26-criterion evaluation of external threat intelligence services providers, we identified the 12 most significant ones — CrowdStrike, Digital Shadows, FireEye, Flashpoint, Group-IB, IBM,...
-
Report Best Practices: Mitigating Insider Threat
Processes: The Zero Trust Security Playbook
Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to...
-
Report Forrester's Global Map Of Privacy Rights And Regulations, 2021
Keeping up with evolving regulatory requirements is a top challenge for companies around the world. To help, we created an interactive global map of privacy rights and regulations, which provides...
-
Report Top Recommendations For Your Security Program, 2021
Following the mad scramble in 2020 to secure the remote workforce during the global pandemic, 2021 is a time for security leaders to assess their current cybersecurity posture, prioritize...
-
Report Top Cybersecurity Threats In 2021
Landscape: The Zero Trust Security Playbook
In light of the 2020 SolarWinds compromise that affected a substantial number of US government agencies, Microsoft, and FireEye, it's tempting in 2021 to focus on defending against supply chain...
-
Playbook The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...
-
Report Forrester Infographic: Static Application Security Testing Usage Aimed At Developers
March 2, 2021 | Sandy CarielliCustomers of the vendors evaluated in "The Forrester Wave™: Static Application Security Testing, Q1 2021" push greater adoption of static application security testing (SAST) as a critical DevSecOps...
-
Report Forrester Infographic: Retail CISO Career Paths
March 2, 2021 | Jeff PollardSeventy-nine percent of retail and consumer product companies from the Fortune 500 have a dedicated CISO with a public presence. To understand the skills, experience, and education that qualify...
-
Report The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021
The Seven Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for cybersecurity risk ratings, we identified the seven most significant providers in the category — BitSight, Black Kite (previously Normshield),...
-
Report Forrester Infographic: CISO Career Paths 2.0
February 10, 2021 | Jeff PollardThis is a 2020 update of our 2017 analysis of CISO backgrounds and current career profiles. We analyzed data from CISOs and heads of security in the Fortune 500 via LinkedIn to understand the...
-
Report Use Forrester's CISO Strategic Canvas To Align Security With Business
Strategic Plan: The S&R Practice Playbook
Security leaders know it's critical to align their efforts to the business, speak their business colleagues' language, and show support for business objectives. But with never-ending inbound...
-
Report Best Practices And Trends: Voice Biometrics
Voice Biometrics Can Improve Security And Customer Experience
Voice biometrics offers improved account access security and user experience. Modern voice biometrics solutions resist replay attacks and have improved in accuracy and performance in the past five...
-
Report Remove The Mystery From Security Metrics
Performance Management: The S&R Practice Playbook
February 5, 2021 | Jeff PollardCISOs continue to have difficulty creating meaningful security metrics despite a decade of discussion. Without good metrics, the security organization can't participate in business conversations...
-
Report Build A High-Performance, Customer-Obsessed Security Organization
Executive Overview: The S&R Practice Playbook
February 2, 2021 | Joseph BlankenshipCISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...
-
Report How To Integrate Threat Intelligence Into Your Security Program
Reducing Risk And Uncertainty To Your Organization With Threat Intelligence
January 15, 2021 | Brian KimeAn effective security architecture requires insights into your organization's threat landscape, but many S&R professionals are disappointed in the results of their threat intelligence efforts. This...
Content Type
ApplyFilters
Industry
- Healthcare (33)
- Financial Services (8)
- Public Sector (5)
- Manufacturing (3)
- Retail (3)
- Energy & Utilities (2)
- Travel (2)
- Consumer Electronics (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
Topics
- Vulnerability & Threat Management (134)
- Data Breach Notifications & Incident Response (113)
- Security Architecture (82)
- Managed Security Services Providers (MSSPs) (51)
- Threat Intelligence (44)
- Security Analytics (33)
- Distributed Denial of Service (DDoS) (30)
- Security Information & Event Management (SIEM) (22)
- Physical Security (20)
- Security User Behavior Analytics (SUBA) (15)
- Security Performance Management (10)
- Security Automation & Orchestration (1)
- Security Patch Management (1)
Methodology
- Now Tech (60)
- Forrester Wave (42)
- Forrester Tech Tide (37)
- Business Technographics (34)
- Forrester New Wave (23)
- Maturity Assessment (16)
- New Tech (15)
- Infographic (10)
- Online Maturity Assessment (4)
- Predictions (1)
Region
- Europe (35)
- North America (18)
- Asia Pacific (5)
Vendor
- IBM (30)
- Accenture (25)
- Capgemini (25)
- Deloitte (25)
- CrowdStrike (23)
- Microsoft (23)
- Palo Alto Networks (20)
- Cognizant (19)
- EY (19)
- FireEye (19)
- Wipro (19)
- Akamai (17)
- CenturyLink (17)
- Google (17)
- BlackBerry Cylance (16)
- Cisco (16)
- Infosys (16)
- PwC (15)
- Rapid7 (15)
- Proofpoint (14)
- HCL Technologies (11)
- AT&T (10)
- Check Point (10)
- DXC Technology (10)
- Okta (10)
- Unisys (10)
- BAE Systems (9)
- KPMG (9)
- VMware (9)
- Alibaba (7)
- Amazon (7)
- Cloudflare (7)
- Fujitsu (7)
- Huawei (7)
- Imperva (7)
- Neustar (7)
- Rackspace (7)
- Tech Mahindra (7)
- Tencent (7)
- Atos (6)
- Centrify (6)
- Fortinet (6)
- OpenText (6)
- Tata Consultancy Services (TCS) (6)
- Carbon Black (4)
- Micro Focus (4)
- Symantec (4)
- Veracode (4)
- FICO (3)
- Hewlett Packard Enterprise (HPE) (3)
- NTT DATA (3)
- SAS (3)
Analyst
- Jeff Pollard (43)
- Paul McKay (41)
- Heidi Shey (40)
- Jinan Budge (34)
- Andras Cser (23)
- Brian Kime (20)
- Chris Sherman (18)
- David Holmes (18)
- Enza Iannopollo (17)
- Sandy Carielli (14)
- Alla Valente (13)
- Claire O'Malley (13)
- Renee Murphy (12)
- Merritt Maxim (9)
- Joseph Blankenship (7)
- Salvatore Schiano (7)
- Sean Ryan (6)
- Amy DeMartine (5)
- Elsa Pikulik (5)
- Stephanie Balaouras (3)
- Jess Burn (2)
- Abhijit Sunil (1)
- Allie Mellen (1)
- Fatemeh Khatibloo (1)
- John Bratincevic (1)
- Laura Koetzle (1)
- Naveen Chhabra (1)
- Peter Cerrato (1)
- Rick Parrish (1)
- Sam Higgins (1)
- Steve Turner (1)
- Sucharita Kodali (1)