Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Forrester Wave™: Software Composition Analysis, Q2 2019
April 8, 2019
-
-
Evaluated Vendors And Product Information
April 8, 2019
Search Results
-
Report Business Resiliency Is The Bulwark To A World Defined By Systemic Risk And Chaos
Resiliency Ensures Continuity And The Ability To Pivot To New Opportunities During A Crisis
In times of crisis or sudden risk events, business resiliency practices ensure the uninterrupted delivery of customer products and services, keep employees safe and productive, and minimize the...
-
Report Guard Your Competitive Edge And Maintain Trust With Data Privacy And Security
Executive Overview: The Data Security And Privacy Playbook
August 21, 2020 | Amy DeMartineData is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, while privacy...
-
Report The Forrester Wave™: Web Application Firewalls, Q1 2020
The 10 Providers That Matter Most And How They Stack Up
In our 33-criterion evaluation of web application firewall (WAF) providers, we identified the 10 most significant ones — Akamai Technologies, Alibaba Cloud, Amazon Web Services, Barracuda Networks,...
-
Report The Forrester New Wave™: Bot Management, Q1 2020
The 13 Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for bot management, we identified the 13 most significant providers in the category — Akamai Technologies, Alibaba Cloud, AppsFlyer, Cloudflare,...
-
Report The State Of Government Application Security, 2020
Government Must Invest Aggressively In Application Security To Protect Citizen Data
Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....
-
Report Now Tech: Web Application Firewalls, Q4 2019
Forrester's Overview Of 31 WAF Providers
You can use web application firewalls (WAFs) to protect applications, apply consistent and global security policies, and comply with regulations. But to realize these benefits, you'll first have to...
-
Report New Tech: Bot Management, Q4 2019
Forrester's Landscape Overview Of 22 Providers
Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated,...
-
Webinar Secure What You Sell: Director's Cut
Securing the products and services their companies sell offers a mechanism for CISOs to contribute to their firms' goals. This webinar helps CISOs understand the world of product security and how...
-
Report Secure What You Sell: CISOs Must Tackle Product Security To Protect Customers
Today's mature enterprise security programs excel at securing infrastructure. Product security is different; it begins with minimum viable security during early-stage development and must extend to...
-
Report The Top Security Technology Trends To Watch, 2019
Eight Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...
-
Report Forrester Infographic: Build A Better Bot Management Program
Create A Single Team Now To Battle Bad Bots
July 8, 2019 | Amy DeMartineInternet traffic contains a worrying amount of bad bot traffic. Organizations need to do a much better job of combating them or suffer their scraping, fraud, inventory hoarding, credential...
-
Webinar Protect Against Bad Bots That Are Trying To Kill Your Customer Experience
June 18, 2019 | Amy DeMartineYou may have heard about chatbots, but did you know that 38% of internet traffic comes from automated programs called bots and more than half of this is malicious? These bots are simple programs...
-
Report The Forrester Wave™: Software Composition Analysis, Q2 2019
The 10 Providers That Matter Most And How They Stack Up
April 8, 2019 | Amy DeMartineIn our 33-criterion evaluation of software composition analysis providers, we identified the 10 most significant ones — Flexera, FOSSA, GitLab, JFrog, Snyk, Sonatype, Synopsys, Veracode, WhiteHat...
-
Report Top Recommendations For Your Security Program, 2019
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
Content Type
ApplyFilters
Industry
- Financial Services (2)
- Public Sector (2)
- Healthcare (1)
- Retail (1)
Topics
- Application Security (14)
- Information Security (7)
- Data & Information Protection (4)
- Governance Risk & Compliance (GRC) (3)
- Innovation (3)
- Employee Experience (2)
- Identity & Access Management (IAM) (2)
- Security Operations & Program Governance (2)
- Application Management (1)
- Artificial Intelligence (AI) (1)
- Cloud Computing (1)
- Customer Relationship Management (CRM) (1)
- Data Centers & Data Center Networking (1)
- Enterprise Mobility (1)
- Internet of Things (IoT) (1)
- Measurement (1)
- Pandemic (1)
- Program & Project Management (1)
- Tech Sector Economics (1)
- Telecommunications Services (1)
Methodology
- Forrester Wave (5)
- Forrester New Wave (1)
- Infographic (1)
- New Tech (1)
- Now Tech (1)