Featured content
The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Charts & Figures
-
-
Evaluated Vendors And Product Information
March 3, 2021
-
Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
March 3, 2021
Search Results
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...
-
Report Forrester Infographic: Static Application Security Testing Usage Aimed At Developers
March 2, 2021 | Sandy CarielliCustomers of the vendors evaluated in "The Forrester Wave™: Static Application Security Testing, Q1 2021" push greater adoption of static application security testing (SAST) as a critical DevSecOps...
-
Report Forrester Infographic: Retail CISO Career Paths
March 2, 2021 | Jeff PollardSeventy-nine percent of retail and consumer product companies from the Fortune 500 have a dedicated CISO with a public presence. To understand the skills, experience, and education that qualify...
-
Report The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021
The Seven Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for cybersecurity risk ratings, we identified the seven most significant providers in the category — BitSight, Black Kite (previously Normshield),...
-
Report Forrester Infographic: CISO Career Paths 2.0
February 10, 2021 | Jeff PollardThis is a 2020 update of our 2017 analysis of CISO backgrounds and current career profiles. We analyzed data from CISOs and heads of security in the Fortune 500 via LinkedIn to understand the...
-
Report Use Forrester's CISO Strategic Canvas To Align Security With Business
Strategic Plan: The S&R Practice Playbook
Security leaders know it's critical to align their efforts to the business, speak their business colleagues' language, and show support for business objectives. But with never-ending inbound...
-
Report Best Practices And Trends: Voice Biometrics
Voice Biometrics Can Improve Security And Customer Experience
Voice biometrics offers improved account access security and user experience. Modern voice biometrics solutions resist replay attacks and have improved in accuracy and performance in the past five...
-
Report Remove The Mystery From Security Metrics
Performance Management: The S&R Practice Playbook
February 5, 2021 | Jeff PollardCISOs continue to have difficulty creating meaningful security metrics despite a decade of discussion. Without good metrics, the security organization can't participate in business conversations...
-
Report Build A High-Performance, Customer-Obsessed Security Organization
Executive Overview: The S&R Practice Playbook
February 2, 2021 | Joseph BlankenshipCISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...
-
Report How To Integrate Threat Intelligence Into Your Security Program
Reducing Risk And Uncertainty To Your Organization With Threat Intelligence
January 15, 2021 | Brian KimeAn effective security architecture requires insights into your organization's threat landscape, but many S&R professionals are disappointed in the results of their threat intelligence efforts. This...
-
Report How To Manage The Human Risk In Cybersecurity
Continuous Improvement: The S&R Practice Playbook
January 13, 2021 | Jinan BudgeTraditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...
-
Report The Forrester Wave™: Static Application Security Testing, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
January 11, 2021 | Sandy CarielliIn our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Playbook The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Report Now Tech: External Threat Intelligence Services, Q4 2020
Forrester's Overview Of 30 External Threat Intelligence Services Providers
You can use external threat intelligence services to reduce the risk of vulnerability exploitation, protect your brand's reputation, and monitor and track cyberthreats. But to realize these...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Report Now Tech: Managed Detection And Response Services Providers, Q4 2020
Forrester's Overview Of 42 Managed Detection And Response Providers
December 16, 2020 | Jeff PollardYou can use managed detection and response (MDR) to attain significant expertise to help drive detection and response, become proactive rather than reactive, and choose what the security team will...
-
Report Multinational Firms Must Quickly Adapt To The UK's Divergence From EU Privacy Standards
December 3, 2020 | Enza IannopolloWith Brexit negotiations coming to an end and a deal with the EU still out of sight, data protection matters are more uncertain than ever. Meanwhile, the UK data protection regulator is softening...
-
Report The Forrester Wave™: Security Analytics Platforms, Q4 2020
The 11 Providers That Matter Most And How They Stack Up
In our 27-criterion evaluation of security analytics platform providers, we identified the 11 most significant ones — Exabeam, FireEye, Gurucul, IBM Security, LogRhythm, Micro Focus, Microsoft,...
-
Report Define A Roadmap To Accelerate Your Security Program
Roadmap: The S&R Practice Playbook
Turning strategy into action reveals a CISO's worth. A solid security roadmap is the best way to do this; it guides implementation efforts, shows support for key business initiatives, and explains...
-
Report Gauge Your GRC Program Maturity
Assessment: The Governance, Risk, And Compliance Playbook
Risk management pros must objectively assess their governance, risk, and compliance (GRC) program to identify gaps and highlight strengths to successfully create a roadmap for improvements. This...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
Content Type
ApplyFilters
Industry
- Healthcare (32)
- Financial Services (7)
- Public Sector (4)
- Retail (3)
- Energy & Utilities (2)
- Manufacturing (2)
- Travel (2)
- Consumer Electronics (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
Topics
- Vulnerability & Threat Management (115)
- Data Breach Notifications & Incident Response (90)
- Security Architecture (79)
- Managed Security Services Providers (MSSPs) (50)
- Security Analytics (31)
- Security Information & Event Management (SIEM) (22)
- Threat Intelligence (22)
- Distributed Denial of Service (DDoS) (17)
- Security Performance Management (10)
- Security User Behavior Analytics (SUBA) (7)
- Physical Security (3)
- Security Automation & Orchestration (2)
- Security Patch Management (1)
Methodology
- Now Tech (60)
- Business Technographics (53)
- Forrester Wave (46)
- Forrester New Wave (23)
- Forrester Tech Tide (20)
- Maturity Assessment (16)
- New Tech (15)
- Infographic (8)
- Online Maturity Assessment (4)
- Predictions (1)
Region
- Europe (45)
- North America (23)
- Asia Pacific (9)
Vendor
- Deloitte (33)
- IBM (30)
- Accenture (29)
- Capgemini (25)
- Microsoft (23)
- Wipro (23)
- EY (21)
- CrowdStrike (20)
- Palo Alto Networks (20)
- Cognizant (19)
- PwC (19)
- Akamai (17)
- CenturyLink (17)
- Google (17)
- BlackBerry Cylance (16)
- Cisco (16)
- FireEye (16)
- Infosys (16)
- Proofpoint (14)
- Rapid7 (12)
- HCL Technologies (11)
- AT&T (10)
- Check Point (10)
- DXC Technology (10)
- Okta (10)
- Unisys (10)
- BAE Systems (9)
- KPMG (9)
- VMware (9)
- Symantec (8)
- Verizon Communications (8)
- Alibaba (7)
- Amazon (7)
- Cloudflare (7)
- Fujitsu (7)
- Huawei (7)
- Imperva (7)
- Neustar (7)
- Rackspace (7)
- Tech Mahindra (7)
- Tencent (7)
- Atos (6)
- Centrify (6)
- Fortinet (6)
- OpenText (6)
- Tata Consultancy Services (TCS) (6)
- Carbon Black (4)
- Cylance (4)
- Micro Focus (4)
- Veracode (4)
- FICO (3)
- Hewlett Packard Enterprise (HPE) (3)
- NTT DATA (3)
- SAS (3)
Analyst
- Paul McKay (44)
- Jeff Pollard (40)
- Jinan Budge (40)
- Heidi Shey (33)
- Andras Cser (22)
- David Holmes (18)
- Chris Sherman (17)
- Brian Kime (16)
- Claire O'Malley (16)
- Enza Iannopollo (15)
- Joseph Blankenship (15)
- Renee Murphy (12)
- Alla Valente (11)
- Merritt Maxim (11)
- Sandy Carielli (10)
- Salvatore Schiano (7)
- Amy DeMartine (6)
- Sean Ryan (5)
- Stephanie Balaouras (3)
- Elsa Pikulik (2)
- Abhijit Sunil (1)
- Fatemeh Khatibloo (1)
- John Bratincevic (1)
- Laura Koetzle (1)
- Naveen Chhabra (1)
- Peter Cerrato (1)
- Rick Parrish (1)
- Sam Higgins (1)
- Steve Turner (1)