Skip to main content
131 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Business & IT Alignment

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report Embed Cybersecurity And Privacy Everywhere To Secure Your Brand And Business

    May 10, 2021 | Heidi Shey, Amy DeMartine

    Meeting compliance requirements is the floor and not equivalent to creating robust cybersecurity and privacy practices that create the culture and conditions required to meet today's demands and...

  • Report The State Of Data Security And Privacy, 2021

    Benchmarks: The Data Security And Privacy Playbook
    April 6, 2021 | Heidi Shey

    Organizations can learn from the patterns behind data breaches, exposure, and misuse to evaluate their current practices and controls for data protection. Key trends in data security and privacy...

  • Report A CISO's First 100 Days

    Few Wins But Big Losses At Stake Early In Your Tenure
    March 31, 2021 | Jeff Pollard, Paul McKay, Jinan Budge

    The energy and momentum created when a new leader takes the reins unlocks opportunities, but if CISOs don't handle their first 100 days well, they risk alienating stakeholders and isolating...

  • Report A Practical Guide To A Zero Trust Implementation

    Roadmap: The Zero Trust Security Playbook
    March 3, 2021 | Steve Turner, David Holmes, Chase Cunningham

    Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...

  • Report Use Forrester's CISO Strategic Canvas To Align Security With Business

    Strategic Plan: The S&R Practice Playbook
    February 10, 2021 | Jeff Pollard, Jinan Budge

    Security leaders know it's critical to align their efforts to the business, speak their business colleagues' language, and show support for business objectives. But with never-ending inbound...

  • Report How To Manage The Human Risk In Cybersecurity

    Continuous Improvement: The S&R Practice Playbook
    January 13, 2021 | Jinan Budge

    Traditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...

  • Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    December 4, 2020 | Merritt Maxim, Andras Cser

    New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...

  • Report The Zero Trust eXtended Ecosystem: Data

    Landscape: The Data Security And Privacy Playbook
    August 11, 2020 | Heidi Shey, Chase Cunningham

    Data security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...

  • Report The Forrester Wave™: Enterprise Firewalls, Q3 2020

    The 11 Providers That Matter Most And How They Stack Up
    August 10, 2020 | David Holmes

    In our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...

  • Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020

    Forrester's Overview Of 24 CIAM Providers
    June 24, 2020 | Andras Cser

    You can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...

  • Report Now Tech: Network Analysis And Visibility, Q2 2020

    Forrester's Overview Of 24 Network Analysis And Visibility Providers
    June 23, 2020 | Josh Zelonis

    You can use network analysis and visibility (NAV) solutions to identify unmanaged assets, understand how to implement Zero Trust segmentation, and detect threats within your environment. But to...

  • Report Bust The Zero Trust Myths

    Prioritize Zero Trust Concerns, Because Your Stakeholders Can Make Or Break Your Strategy
    June 22, 2020 | Jinan Budge, Chase Cunningham

    Zero Trust (ZT) is prone to misconceptions. IT and business leaders often think that ZT is too hard, too expensive, and requires them to restructure everything they've built or deploy...

  • Report Use Privileged Identity Management Pricing Insight For Buyer Advantage

    Understand Pricing Mechanics To Optimize Your PIM Procurement
    June 18, 2020 | Sean Ryan, Andras Cser

    Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...

  • Report Throw DARTS To Hit Your Zero Trust Targets

    Vision: The Zero Trust Security Playbook
    June 15, 2020 | Chase Cunningham, Peter Cerrato

    Organizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...

  • Report Build A Developer Security Champions Program

    Developer Security Champions Scale Your Team And Address Application Security Issues Closer To The Source
    June 12, 2020 | Sandy Carielli

    Firms that want to secure applications are challenged by understaffed security teams and lack of security awareness on the part of developers. Developer security champions are developers who act as...

  • Report Mitigating Ransomware With Zero Trust

    Bolster Your Defenses With Zero Trust Principles And Techniques
    June 8, 2020 | Chase Cunningham, Josh Zelonis, David Holmes

    Ransomware and malware continue to plague organizations across the globe. Entire industries have been affected and, in some cases, ground to a halt thanks to the scourge of ransomware attacks....

  • Report Now Tech: Zero Trust Solution Providers, Q2 2020

    Forrester's Overview Of 38 Zero Trust Solution Providers
    May 1, 2020 | Chase Cunningham

    You can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...

  • Report How To Implement Zero Trust Security In Europe

    April 15, 2020 | Paul McKay, Chase Cunningham, Enza Iannopollo

    Large technology companies and the US federal government have adopted Zero Trust (ZT) as their next-generation security model. 2019 saw Zero Trust enter the European security market. In 2020,...

  • Report Now Tech: Enterprise Firewalls, Q1 2020

    Forrester's Overview Of 18 Enterprise Firewall Providers
    March 20, 2020 | David Holmes

    You can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...

  • Report Build A Security Champions Network

    How To Integrate Security Culture Across Your Organization
    February 12, 2020 | Jinan Budge, Claire O'Malley

    Building a security culture up, down, and across the organization and engaging the multitudes of stakeholders is neither a simple task nor one that can easily be completed in the short term. This...

  • Report The Top Trends Shaping IAM In 2020

    Landscape: The Identity And Access Management Playbook
    January 29, 2020 | Andras Cser, Sean Ryan

    Identity is a core building block of a robust Zero Trust security ecosystem and infrastructure. In this report, we look at the eight most important trends that will shape the identity and access...

  • Report A CISO's Guide To Successfully Leading Change

    How To Build Support, Manage Detractors, And Navigate Politics
    January 9, 2020 | Jinan Budge

    Cybersecurity is getting ever more scrutiny from boards, execs, and customers. Many CISOs need to launch large change programs to transform their cybersecurity capabilities amidst unprecedented...

  • Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    January 9, 2020 | Jeff Pollard, Paul McKay

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • Report Build The Business Case For GRC

    Business Case: The Governance, Risk, And Compliance Playbook
    January 7, 2020 | Alla Valente, Renee Murphy

    The business case for governance, risk management, and compliance (GRC) efforts too often relies on the fear of costly events or regulatory action. This report helps GRC leaders elevate the...

  • Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

    Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
    November 25, 2019 | Andras Cser, Sean Ryan

    With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...

  • 1
  • 2