Skip to main content
132 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Tech Sector Economics

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report The State Of Data Security And Privacy, 2021

    Benchmarks: The Data Security And Privacy Playbook
    April 6, 2021 | Heidi Shey

    Organizations can learn from the patterns behind data breaches, exposure, and misuse to evaluate their current practices and controls for data protection. Key trends in data security and privacy...

  • Report Best Practices: Mitigating Insider Threat

    Processes: The Zero Trust Security Playbook

    Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to...

  • Report How To Manage The Human Risk In Cybersecurity

    Continuous Improvement: The S&R Practice Playbook
    January 13, 2021 | Jinan Budge

    Traditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...

  • Report The State Of Network Security, 2020 To 2021

    Benchmarks: The Zero Trust Security Playbook
    January 7, 2021 | David Holmes, Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...

  • Report Best Practices For Container Security

    Protecting Containerized Applications Requires Technical And Organizational Steps
    July 24, 2020 | Sandy Carielli, Andras Cser

    Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...

  • Report The Forrester New Wave™: Connected Medical Device Security, Q2 2020

    The Eight Providers That Matter Most And How They Stack Up
    June 11, 2020 | Chris Sherman

    In Forrester's evaluation of the emerging market for medical device security solutions, we identified the eight most significant providers in the category — Armis, CyberMDX, Cynerio, Forescout,...

  • Report Forrester Infographic: Understanding European Security Leader Spending Patterns, 2020

    European Security Leaders Adapt To Stagnating Security Budgets
    May 18, 2020 | Paul McKay

    Forrester surveyed 1,346 European security decision makers to understand how they plan to spend their budgets in 2020. This infographic summarizes security spending patterns and key takeaways from...

  • Report The State Of Application Security, 2020

    Applications Remain The Top External Attack Method; Don't Get Complacent
    May 4, 2020 | Sandy Carielli

    Application weaknesses and software vulnerabilities continue to be the most common external attack method. Now is not the time to backslide on your application security efforts. Instead, follow the...

  • Report Understand The State Of Identity And Access Management, 2020

    Benchmarks: The Identity And Access Management Playbook
    April 21, 2020 | Sean Ryan, Andras Cser

    This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...

  • Report New Tech: Medical Device Security, Q1 2020

    Forrester's Landscape Overview Of 19 Providers
    March 23, 2020 | Chris Sherman, Elsa Pikulik

    Connected medical devices are an integral part of modern healthcare providers, but security teams at those organizations struggle to understand and mitigate connected medical devices directly...

  • Report Security Budgets Europe, 2020: SaaS Security Is In Vogue

    European Security Leaders Adopt Sustainable Budgeting Practices
    March 20, 2020 | Paul McKay

    In 2020, European security leaders are grappling with a toxic mix of geopolitical tensions, economic growth slowdown, and board of directors fatigue caused by questionable results after years of...

  • Report Now Tech: European Cybersecurity Incident Response Services, Q1 2020

    Forrester's Overview Of 19 European Cybersecurity Incident Response Providers
    March 10, 2020 | Paul McKay, Josh Zelonis

    You can use European cybersecurity incident response (IR) providers to help you recover from a cybersecurity breach, stress test your cybersecurity IR plan, and support post-breach remediation...

  • Report The State Of Data Security And Privacy, 2020

    February 27, 2020 | Heidi Shey

    This data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...

  • Report Security Budgets 2020: New Threats Bring New Priorities

    Benchmarks: The S&R Practice Playbook
    February 14, 2020 | Jeff Pollard

    This report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...

  • Report The State Of Government Application Security, 2020

    Government Must Invest Aggressively In Application Security To Protect Citizen Data
    January 7, 2020 | Sandy Carielli, Amy DeMartine

    Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....

  • Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

    Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
    November 25, 2019 | Andras Cser, Sean Ryan

    With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...

  • Report Future-Proof Your Digital Business With Zero Trust Security

    October 4, 2019 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it's the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • Report New Tech: Cyber Ranges, Q3 2019

    Forrester's Landscape Overview Of 14 Providers
    July 30, 2019 | Jeff Pollard, Claire O'Malley

    Cyber ranges use a simulated breach environment to prepare your workforce for the stress, panic, and communication barriers they will face during a real cyberattack. In an inevitable cyberattack,...

  • Report Security Budgets In Asia Pacific, 2019

    Budgets Are Rising As The Region Continues To Play Catch-Up
    July 15, 2019 | Jinan Budge

    In 2019, CISOs in Asia Pacific (AP) must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how security...

  • Report The US Healthcare Security Benchmark, 2018 To 2019

    Healthcare Pros Must Spend Wisely To Counter Increasing Complexity
    July 5, 2019 | Chris Sherman, Salvatore Schiano, Jeff Becker

    In the past, IT security teams within US healthcare providers had much smaller budgets than those within other industries. This is no longer the case, as budget increases in healthcare have come as...

  • Report The State Of European Security In 2019: Slower-Growing Budgets Drive Fit-For-Purpose Security

    June 12, 2019 | Paul McKay

    A wobbly Eurozone economy and slower-growing budgets force European security and risk (S&R) leaders to prioritize their spending. Read this report to pinpoint the most important changes in the...

  • Report Forrester's Guide To Paying Ransomware

    Paying Ransom Can Be A Valid Recovery Option Based On Business Need And Circumstances
    June 5, 2019 | Josh Zelonis, Trevor Lyness

    Conventional wisdom says that when your company suffers a ransomware attack, you should never pay the ransom. But hardline conversations about whether to negotiate with cybercriminals takes a...

  • Report Best Practices: Medical Device Security

    Control Your Hospital's Expanding Device Risk Exposure

    Healthcare providers struggle to understand and mitigate medical device risk, particularly devices connected to the hospital network and directly involved in patient care. Meanwhile, patients...