Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Sustainability Posture Of The Fortune Global 200 By Region
January 15, 2021
-
State Of Sustainability In The Fortune Global 200
January 15, 2021
-
Sustainability Initiatives Address Several Environmental Factors
January 15, 2021
Search Results
-
Report The State Of Environmental Sustainability In The Fortune Global 200
Climate Action As A Risk Management And Growth Strategy Takes Center Stage
In 2020, firms had to adapt to a series of risk events — COVID-19, megawildfires, a devastating hurricane season — engendered or magnified by climate change. Leading Fortune Global 200 firms have...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report GRC Vision, 2021 To 2026
Vision: The Governance, Risk, And Compliance Playbook
Risk management professionals should be looking five years into the future to successfully steer their fast-paced businesses. Many key trends will amplify strategic and digital risks and transform...
-
Report Gauge Your ZTX Security Maturity
Assessment: The Zero Trust Security Playbook
December 31, 2020 | Chase CunninghamTo convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros...
-
Report Evolve Your IAM Strategy For Your Digital Business
Executive Overview: The Identity And Access Management Playbook
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
-
Webinar Cybersecurity Predictions 2021
This webinar provides a deep dive on our five cybersecurity predictions slated to take place in 2021. CISOs and other security leaders will learn what will happen, why, and what to do about it in...
-
Report The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
August 10, 2020 | David HolmesIn our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...
-
Report Now Tech: Static Application Security Testing, Q3 2020
Forrester's Overview Of 19 SAST Providers
August 6, 2020 | Sandy CarielliYou can use static application security testing (SAST) to reduce the time to fix application security weaknesses, improve application delivery speed and predictability, and educate developers on...
-
Report Best Practices For eCommerce And Retail Fraud Management
Balancing Secure Customer Experiences With Fraud Management Efficiency
July 21, 2020 | Andras CsereCommerce and retail fraud management (ERFM) is a tightrope that forces security and risk (S&R) pros to balance the business need for frictionless customer experiences with fraud avoidance. This...
-
Report Technology Best Practices To Protect Your Homeworkers' Endpoints
Limit Homeworker Risks With The Right Endpoint Security And Management
Firms must maximize their remote workers' productivity without exposing them or their devices to new risks. This is complicated by the use of personally owned devices, over which the IT security...
-
Report Video: End User And Administrator Experiences With A Zero Trust Network Access Solution
Kill The VPN For End Users With ZTNA
July 2, 2020 | Chase CunninghamIn the post COVID-19 world there is a lot of talk about eliminating the VPN. Security and risk (S&R) leaders, however, are often hesitant to dive into the deep end on these solutions as they worry...
-
Report The Top Security Technology Trends To Watch, 2020
Ten Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top 10 security technologies to...
-
Report The Time For A Digital Signature Is Now
June 18, 2020 | Enza IannopolloThe COVID-19 pandemic has forced consumers, employees, and partners to dramatically change their digital habits and adopt new ones. These new behaviors are here to stay, and businesses are under...
-
Report Returning To Work: How To Avoid The 15 Most Critical Risks
The Legal, Regulatory, And Operational Risks Of Pandemic Recovery Everyone Needs To Know
As enterprises plan to reopen office buildings, plants, and other facilities, they will have to develop detailed pandemic management protocols (PMPs) before they can safely ask employees,...
-
Webinar Employees Return To Work: The Top Regulatory, Legal, And Operational Risks To Prepare For
June 9, 2020 | Enza IannopolloAs employees return to work, companies must identify, assess, and mitigate a wide range of regulatory and legal risks. From undermining employees' privacy rights to requirements for inclusion and...
-
Report Governments Must Stop Privacy Abuses While Fighting The Pandemic
How Government Agencies Like The UK National Health Service Must Enforce Strong Data Governance To Protect Citizens
May 4, 2020 | Enza IannopolloIn their battle against COVID-19, several governments and their partners are leveraging technology to collect, process, share, and store data about citizens. As governments turn their attention to...
-
Report Every CISO Is Now A Transformational CISO
Lead During Turbulent Times Using The Traits Of This CISO Type
May 1, 2020 | Jeff Pollard, Josh ZelonisTransformational CISOs love overhauling a struggling security program and seeing long-term improvements take shape. Retooling, restaffing, and rebuilding from the ground up inspires them. Not every...
-
Report Top Recommendations For Your Security Program, 2020
Landscape: The S&R Practice Playbook
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Report Zoom Becomes A Product Security Cautionary Tale
CISOs Must Take Extra Steps To Protect Their Firms While Zoom Fixes Critical Flaws
As the global pandemic sent hundreds of thousands of employees to work from home overnight, Zoom quickly rose to worldwide prominence as a central enabling technology. But just as quickly, Zoom...
-
Webinar Prepare Your Organization For Pandemic Recovery
As the epicenter of the COVID-19 pandemic shifts around the world and each affected region reaches its peak infection rate, firms must prepare now to restart closed plants, reopen retail locations,...
-
Report Returning To Work: How To Prepare For Pandemic Recovery
Essential Steps And Pandemic Management Protocols For Planning Your Operational Recovery
As the epicenter of the global COVID-19 pandemic shifts and each affected region reaches its peak infection rate, firms must prepare now to restart closed plants, reopen retail locations, and bring...
-
Webinar Best Practices: Pandemic Planning And Preparedness
As the current outbreak of coronavirus disease 2019 (COVID-19) continues to spread globally, organizations are quickly updating their pandemic plans or rushing to create plans from scratch. Whether...
-
Report Prepare Your Organization For A Pandemic
Key Recommendations For How Business And Risk Leaders Build Resiliency In A World Where Disease Outbreaks Are The New Normal
The likelihood and impact of a pandemic are impossible to predict with much accuracy. Regardless, history tells us there's a potential for widespread and costly disruption — especially for those...
Content Type
ApplyFilters
Industry
- Retail (5)
- Healthcare (1)
- Manufacturing (1)
- Public Sector (1)
Methodology
- Now Tech (7)
- Forrester Wave (4)
- Maturity Assessment (2)
- Online Maturity Assessment (2)
Region
- Europe (3)
Vendor
- Check Point (4)
- Cisco (4)
- Fortinet (4)
- Huawei (4)
- Juniper Networks (4)
- Palo Alto Networks (4)
- Deloitte (1)
Analyst
- Sandy Carielli (9)
- Alla Valente (7)
- Andras Cser (6)
- Jeff Pollard (6)
- Stephanie Balaouras (6)
- David Holmes (5)
- Enza Iannopollo (5)
- Heidi Shey (4)
- Andrew Hewitt (3)
- Jinan Budge (3)
- Paul McKay (3)
- Renee Murphy (2)
- Scott Compton (2)
- Abhijit Sunil (1)
- Arielle Trzcinski (1)
- Art Schoeller (1)
- Brian Kime (1)
- Chris Sherman (1)
- Fatemeh Khatibloo (1)
- Joseph Blankenship (1)
- Merritt Maxim (1)
- Salvatore Schiano (1)
- Sam Higgins (1)
- Sean Ryan (1)
- Sucharita Kodali (1)