Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
The Threat Intelligence Cycle
January 15, 2021
-
Intelligence Preparation Of The Operational Environment
January 15, 2021
-
Threat Intelligence Integration At The Tactical Level
January 15, 2021
Search Results
-
Webinar How To Secure And Govern Non-Human Identities
Wednesday, February 3, 2021, 1:00 p.m.-1:40 p.m. Eastern time (18:00-18:40 GMT) | Sean RyanDo you know how many software bots, physical robots, or internet of things (IoT) devices are connected to your network? How many of these devices store or interact with critical data? Such...
-
Webinar Privileged Identity Management Suites: The Essentials And The Differentiators
Based On The Forrester Wave™
Tuesday, January 19, 2021, 1:00 p.m.-1:40 p.m. Eastern time (18:00-18:40 GMT) | Sean Ryan, Elsa PikulikLearn about the essential capabilities inherent in privileged identity management (PIM) suites along with the differentiating features for addressing new use cases. Key takeaways: Learn about the...
-
Report How To Integrate Threat Intelligence Into Your Security Program
Reducing Risk And Uncertainty To Your Organization With Threat Intelligence
January 15, 2021 | Brian KimeAn effective security architecture requires insights into your organization's threat landscape, but many S&R professionals are disappointed in the results of their threat intelligence efforts. This...
-
Report The State Of Environmental Sustainability In The Fortune Global 200
Climate Action As A Risk Management And Growth Strategy Takes Center Stage
In 2020, firms had to adapt to a series of risk events — COVID-19, megawildfires, a devastating hurricane season — engendered or magnified by climate change. Leading Fortune Global 200 firms have...
-
Report How To Manage The Human Risk In Cybersecurity
Continuous Improvement: The S&R Practice Playbook
January 13, 2021 | Jinan BudgeTraditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...
-
Report The Forrester Wave™: Static Application Security Testing, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
January 11, 2021 | Sandy CarielliIn our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report How To Secure And Govern Non-Human Identities
Apply Zero Trust IAM Principles To Secure Software Bots, Physical Robots, And IoT Devices
January 6, 2021 | Sean Ryan, Chase CunninghamDo you know how many software bots, physical robots, or IoT devices are connected to your network? How many of these devices store or interact with critical data? Such nonhumans boost productivity...
-
Report GRC Vision, 2021 To 2026
Vision: The Governance, Risk, And Compliance Playbook
Risk management professionals should be looking five years into the future to successfully steer their fast-paced businesses. Many key trends will amplify strategic and digital risks and transform...
-
Report Gauge Your ZTX Security Maturity
Assessment: The Zero Trust Security Playbook
December 31, 2020 | Chase CunninghamTo convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros...
-
Report Build Your Identity And Access Management Roadmap
Roadmap: The Identity And Access Management Playbook
You must base your identity and access management (IAM) roadmap on a well-defined strategy that establishes and articulates the business need and value of IAM across your entire organization. Your...
-
Playbook The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Playbook The Governance, Risk, And Compliance Playbook For 2021
Take On More Business Risk Using A World-Class GRC Program
Governance, risk, and compliance (GRC) programs give organizations the confidence to take the business risks that drive innovation and competitive advantage. Yet too many organizations lack...
-
Playbook The Data Security And Privacy Playbook For 2021
Protect Your Intellectual Property And Customer Data From Theft And Abuse
Data is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, while privacy...
-
Report Now Tech: External Threat Intelligence Services, Q4 2020
Forrester's Overview Of 30 External Threat Intelligence Services Providers
You can use external threat intelligence services to reduce the risk of vulnerability exploitation, protect your brand's reputation, and monitor and track cyberthreats. But to realize these...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Report Now Tech: Managed Detection And Response Services Providers, Q4 2020
Forrester's Overview Of 42 Managed Detection And Response Providers
December 16, 2020 | Jeff PollardYou can use managed detection and response (MDR) to attain significant expertise to help drive detection and response, become proactive rather than reactive, and choose what the security team will...
-
Report Evolve Your IAM Strategy For Your Digital Business
Executive Overview: The Identity And Access Management Playbook
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
-
Report Multinational Firms Must Quickly Adapt To The UK's Divergence From EU Privacy Standards
December 3, 2020 | Enza IannopolloWith Brexit negotiations coming to an end and a deal with the EU still out of sight, data protection matters are more uncertain than ever. Meanwhile, the UK data protection regulator is softening...
-
Report The Forrester Wave™: Security Analytics Platforms, Q4 2020
The 11 Providers That Matter Most And How They Stack Up
In our 27-criterion evaluation of security analytics platform providers, we identified the 11 most significant ones — Exabeam, FireEye, Gurucul, IBM Security, LogRhythm, Micro Focus, Microsoft,...
-
Report Define A Roadmap To Accelerate Your Security Program
Roadmap: The S&R Practice Playbook
Turning strategy into action reveals a CISO's worth. A solid security roadmap is the best way to do this; it guides implementation efforts, shows support for key business initiatives, and explains...
-
Webinar More Than A Gateway: Take A Holistic Approach To API Security
APIs provide a foundation for innovation and digital transformation, but as evidenced by the number of API related breaches, organizations struggle to secure them. The API security landscape is a...
-
Webinar Customer Identity And Access Management: What's Hot And What's Not
Based On The Forrester Wave™
November 17, 2020 | Andras CserIn this webinar, we review the evaluation criteria and results of Forrester's Q4 2020 customer identity and access management (CIAM) Wave. We look at scores of the evaluated solutions as well as...
-
Webinar Privacy Predictions 2021
Elevate Customer And Employee Privacy As A Strategic Business And Societal Imperative
With values-based consumers watching companies closely and employee privacy posed to become a priority for companies and regulators, 2021 will bring a great deal of change and new risks to...
Content Type
ApplyFilters
Industry
- Healthcare (40)
- Financial Services (32)
- Manufacturing (19)
- Retail (18)
- Public Sector (16)
- Transportation & Logistics (6)
- Energy & Utilities (4)
- Media & Entertainment (4)
- Travel (3)
- Consumer Electronics (1)
Topics
- Security Operations & Program Governance (513)
- Information Security (480)
- Governance Risk & Compliance (GRC) (301)
- Data & Information Protection (269)
- Identity & Access Management (IAM) (242)
- Application Security (188)
- Tech Sector Economics (158)
- Employee Experience (126)
- Business & IT Alignment (115)
- Cloud Computing (107)
- Data Centers & Data Center Networking (67)
- Measurement (63)
- Internet of Things (IoT) (58)
- Pandemic (56)
- Financial Management (46)
- Organization (46)
- Networking (45)
- Innovation (39)
- Customer Experience Management (30)
- Biometrics (29)
- Customer Relationship Management (CRM) (28)
- IT Services (24)
- Enterprise Architecture Domains & Practices (21)
- Artificial Intelligence (AI) (17)
- Telecommunications Services (15)
- Enterprise Mobility (12)
- Market Research (10)
- Systems Management (8)
- eCommerce (7)
- Architecture & Technology Strategy (6)
- Branding (6)
- Infrastructure Architectures (6)
- IT Process Automation (6)
- Strategy Planning & Governance (5)
- Mobile Application Development (3)
- Packaged Solutions (3)
- Program & Project Management (3)
- Storage (3)
- Application Management (1)
- Business Intelligence (1)
- Data Management (1)
- Enterprise Collaboration (1)
- Sourcing Strategy & Execution (1)
- User Experience (1)
Methodology
- Now Tech (137)
- Forrester Tech Tide (99)
- Forrester Wave (96)
- Business Technographics (58)
- Forrester New Wave (41)
- New Tech (38)
- ForecastView (23)
- Maturity Assessment (21)
- Online Maturity Assessment (9)
- Infographic (8)
- Total Economic Impact (TEI) (3)
- Predictions (1)
Region
- Europe (53)
- North America (20)
- Asia Pacific (18)
- Africa (1)
- Middle East (1)
Vendor
- IBM (86)
- Microsoft (73)
- Cisco (55)
- Deloitte (52)
- Akamai (48)
- Google (43)
- Accenture (41)
- PwC (38)
- Wipro (35)
- Okta (32)
- Capgemini (31)
- Oracle (31)
- Palo Alto Networks (31)
- RSA (30)
- SAP (30)
- Micro Focus (28)
- Centrify (26)
- Neustar (26)
- Symantec (25)
- CrowdStrike (24)
- Imperva (23)
- EY (22)
- Infosys (22)
- Check Point (21)
- KPMG (21)
- BlackBerry Cylance (20)
- CenturyLink (20)
- CyberArk (20)
- CA Technologies (19)
- Cognizant (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- Intel (19)
- Pitney Bowes (19)
- SailPoint (19)
- Salesforce (19)
- BAE Systems (18)
- Proofpoint (18)
- Unisys (17)
- FireEye (16)
- Tech Mahindra (16)
- Alibaba (15)
- Rapid7 (15)
- ServiceNow (14)
- Cloudflare (12)
- NTT DATA (12)
- Tata Consultancy Services (TCS) (12)
- Amazon (11)
- Cylance (11)
- HCL Technologies (11)
- Huawei (11)
- AT&T (10)
- DXC Technology (10)
- Fortinet (10)
- OpenText (9)
- VMware (9)
- Carbon Black (8)
- Veracode (8)
- Verizon Communications (8)
- Coupa (7)
- Fujitsu (7)
- Rackspace (7)
- Tencent (7)
- Atos (6)
- Dell (4)
- Juniper Networks (4)
- Varonis (4)
- FICO (3)
- Hewlett Packard Enterprise (HPE) (3)
- SAS (3)
- Flexera (1)
- ManageEngine (1)
- Publicis Sapient (1)
Analyst
- Andras Cser (89)
- Paul McKay (69)
- Heidi Shey (57)
- Jinan Budge (54)
- Jeff Pollard (50)
- Enza Iannopollo (43)
- Alla Valente (40)
- Sandy Carielli (38)
- Amy DeMartine (33)
- Chris Sherman (33)
- Joseph Blankenship (33)
- Sean Ryan (32)
- David Holmes (26)
- Renee Murphy (24)
- Claire O'Malley (22)
- Merritt Maxim (22)
- Brian Kime (18)
- Salvatore Schiano (17)
- Stephanie Balaouras (12)
- Jennifer Adams (11)
- Andrew Hewitt (4)
- Elsa Pikulik (3)
- Fatemeh Khatibloo (2)
- Scott Compton (2)
- Abhijit Sunil (1)
- Andrew Hogan (1)
- Arielle Trzcinski (1)
- Art Schoeller (1)
- Danny Mu (1)
- David Mooter (1)
- John Bratincevic (1)
- Laura Koetzle (1)
- Mark Bartrick (1)
- Meng Liu (1)
- Naveen Chhabra (1)
- Peter Cerrato (1)
- Rick Parrish (1)
- Sam Higgins (1)
- Stephanie Liu (1)
- Sucharita Kodali (1)
- Zhi-Ying Barry (1)