Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Sample Technologists Career Path
December 6, 2018
-
Sample Technologist Development Plan By Job Title
December 6, 2018
Search Results
-
Report Maintain Your Security Edge
New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...
-
Report The State Of Data Security And Privacy: 2018 To 2019
This data-driven report outlines budgeting and spending, technology adoption plans, and other key breach, data protection, and privacy trends in global firms for 2018 through 2019. Understanding...
-
Report The State Of Endpoint Security, 2018
New Threats Are Driving Technology Consolidation
Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns, helping security...
-
Report The US Healthcare Security Benchmark 2017 To 2018
Healthcare Providers Must Improve Security For Digital Transformation
IT security budgets at US healthcare organizations have lagged behind other industries. In a highly regulated industry, budget constraints have made compliance challenging and impeded security...
-
Report The State Of Network Security: 2017 To 2018
November 30, 2017 | Heidi Shey, Alexander SpiliotesThis data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2017 to...
-
Report The State Of Network Security: 2016 To 2017
January 26, 2017 | Heidi SheyThis data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2016 to...
-
Report Understand The State Of Data Security And Privacy: 2016 To 2017
December 7, 2016 | Heidi SheyThroughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...
-
Report The State Of Application Security: 2016 And Beyond
App Dev Is Leaving Security In The Dust, But You Can Change That
November 9, 2016 | Amy DeMartineApplications are under siege, and successful application attacks are the source of the biggest data loss. At the same time, applications are shifting toward more speedy releases. To keep up,...
-
Report Market Overview: Data Loss Prevention
DLP Suite Adoption Holds Steady As DLP Becomes A Feature And Managed Services Offer An Attractive Option
May 2, 2016 | Heidi SheyPolicies to control data use and movement require enforcement mechanisms. Data loss prevention (DLP) capabilities give security and risk (S&R) professionals the means to enforce those policies and...
-
Report The 2016 State Of Endpoint Security Adoption
Investments In Advanced Endpoint Controls Are Poised To Accelerate Over The Coming Year
April 25, 2016 | Chris ShermanEvery year, Forrester surveys thousands of security decision-makers and information workers globally from a wide range of industries and organization sizes. This report presents the most relevant...
-
Report Rethinking Data Loss Prevention With Forrester's DLP Maturity Grid
April 18, 2016 | Heidi Shey, John KindervagData loss prevention (DLP) remains a key technology to help prevent the leakage and exfiltration of the firm's most sensitive data. Using client feedback, survey data, and input from security...
-
Report Industry Spotlight: US Healthcare Security Budgets And Priorities, Q4 2015 To Q3 2016
Healthcare Technology Innovation Continues To Outpace Security
IT security teams within US healthcare providers historically have had much smaller budgets than in other industries. As a result, they have struggled to implement advanced security capabilities...
-
Report Understand The State Of Data Security And Privacy: 2015 To 2016
January 8, 2016 | Heidi SheyThroughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...
-
Report Understand The State Of Network Security: 2015 To 2016
December 23, 2015 | Kelley Mak, Heidi SheyThis data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2015 to...
-
Report The Cybercriminal's Prize: Your Customer Data And Intellectual Property
September 2, 2015 | Heidi SheyProtecting customer data such as credit card information, log-in credentials, and other personally identifiable information (PII) is one of the top priorities for both security and risk (S&R)...
-
Report The State Of Enterprise Mobile Security, Q2 2015: Strategies Continue To Focus On Mobile Apps
May 13, 2015 | Chris Sherman, Jennie DuongEven as more firms adopt and grow comfortable with bring-your-own-device (BYOD) strategies, security and risk (S&R) pros need to remain vigilant, particularly as firms seek to empower employees...
-
Report Understand The State Of Identity And Access Management: 2014 To 2015
February 6, 2015 | Stephanie BalaourasThis report provides a spending and technology adoption benchmark for security and risk (S&R) leaders responsible for developing their organization's identity and access management (IAM) strategy....
-
Report Understand Cybersecurity And Risk Budgets For 2015
Security's Sudden Spotlight Is The CISO's Double-Edged Sword
January 14, 2015 | Ed Ferrara2014 was a watershed year for cybercrime, and companies of all sizes have noticed. Executives are now placing renewed emphasis on cybersecurity, and budgets are increasing accordingly. Chief...
-
Report Understand The State Of Network Security: 2014 To 2015
December 22, 2014 | Heidi Shey, Kelley MakThroughout the year, Forrester analysts engage in hundreds of discussions with vendors and security pros about security architecture and operations. Analysis of B2B survey data from Forrester's...
-
Report Understand The State Of Data Security And Privacy: 2014 To 2015
December 1, 2014 | Heidi Shey, Kelley MakThroughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about data security and privacy. Analysis of B2B survey data from Forrester's Business...
-
Report The State Of Endpoint Security Adoption 2014 To 2015
Adoption Of Proactive Security Tools Will Outpace Signature-Based Antimalware In 2015
September 24, 2014 | Chris ShermanEvery year, Forrester conducts a number of global surveys of security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...
-
Report Unmasking Consumer Privacy Tools
Uses, Benefits, And Implications For S&R Pros
September 5, 2014 | Heidi SheyConsumerization is alive and well, and today's engaged tech-savvy employees will bring in tools and services of their choosing to help them do their jobs better and more efficiently. This includes...
-
Report Develop A Two-Phased DDoS Mitigation Strategy
Protect Yourself From Hacktivists And Other Cybercriminals
June 19, 2014 | John Kindervag, Rick Holland, Heidi SheyUntil recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...
-
Report Prepare For The Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus
S&R Pros Are Shifting AV Spend To More Proactive Security Technologies
June 9, 2014 | Chris ShermanAs malware increases in sophistication and the number of new variants rises, antivirus (AV) technologies have steadily become less effective at stopping advanced threats to employee endpoints and...
-
Report TechRadar™: Data Security, Q2 2014
Tools To Define, Dissect, And Defend Your Data
We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...
Content Type
ApplyFilters
Industry
- Healthcare (29)
- Financial Services (18)
- Energy & Utilities (14)
- Manufacturing (14)
- Public Sector (14)
- Retail (14)
- Media & Entertainment (7)
Topics
Region
- United States (31)
Vendor
- Cisco (20)
- CSC (20)
- Wipro (20)
- VMware (19)
- Salesforce (17)
- Hewlett Packard Enterprise (HPE) (2)
Analyst
- Heidi Shey (78)
- Chris Sherman (32)
- Stephanie Balaouras (18)
- Andras Cser (9)
- Michele Pelino (8)
- Amy DeMartine (6)
- Salvatore Schiano (2)
- Claire O'Malley (1)
- Enza Iannopollo (1)
- Jeff Pollard (1)