Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Encryption And DLP Are Widely Adopted
April 6, 2021
-
-
Search Results
-
Webinar Lessons From The Field: How To Gain Value From Cybersecurity Risk Ratings Platforms
Using The Forrester Wave™
Tuesday, April 20, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Paul McKay, Alla ValenteCybersecurity risk ratings platforms are a divisive topic, with some customers gaining a lot of value from them and others who are less complimentary about their use. Join this webinar to find...
-
Report The State Of Data Security And Privacy, 2021
Benchmarks: The Data Security And Privacy Playbook
April 6, 2021 | Heidi SheyOrganizations can learn from the patterns behind data breaches, exposure, and misuse to evaluate their current practices and controls for data protection. Key trends in data security and privacy...
-
Report Forrester Infographic: Global Security Budgets In 2021
March 26, 2021 | Jeff PollardSecurity and risk pros are entering 2021 in unclear circumstances. As the pandemic continues to wax and wane, economic uncertainty makes long-term planning almost impossible. Yet work-from-home...
-
Report Future Requirements For IaaS Platform Native Security In 2021 To 2022
Essential Cross-Cloud Services That Should Be Part Of Your Cloud Strategy
March 17, 2021 | Andras CserInfrastructure-as-a-service platform native security (IPNS) plays a crucial role in securing data, workloads, and network communications in public cloud platforms such as Amazon Web Services (AWS),...
-
Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security
March 10, 2021 | Andras CserIn this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...
-
Report Top Cybersecurity Threats In 2021
Landscape: The Zero Trust Security Playbook
In light of the 2020 SolarWinds compromise that affected a substantial number of US government agencies, Microsoft, and FireEye, it's tempting in 2021 to focus on defending against supply chain...
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021
The Seven Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for cybersecurity risk ratings, we identified the seven most significant providers in the category — BitSight, Black Kite (previously Normshield),...
-
Report Now Tech: Cloud Security Gateways, Q1 2021
Forrester's Overview Of 16 Cloud Security Gateway Providers
January 26, 2021 | Andras CserYou can use cloud security gateway (CSG, also known as cloud access security broker or CASB) solutions to detect and protect against: 1) data loss, 2) excessive sensitive data access, and 3) use of...
-
Report The Future Of Identity And Access Management
Vision: The Identity And Access Management Playbook
Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report Forrester Infographic: The State Of The European Cybersecurity Product Market
European Security Leaders Trying To Buy Local Will Struggle To Meet Their Needs
July 8, 2020 | Paul McKayDeveloping a thriving European cybersecurity product market is a key EU digital single market priority in 2020 and beyond. European security leaders would love to buy locally but don't always have...
-
Webinar Top Security Technologies To Watch, 2020
Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...
-
Report Throw DARTS To Hit Your Zero Trust Targets
Vision: The Zero Trust Security Playbook
June 15, 2020 | Chase Cunningham, Peter CerratoOrganizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...
-
Report Assess Your Cloud Security Readiness
Leverage Forrester's Custom Tool To Assess Your Cloud Security Maturity Across Six Major Technology Competencies
May 29, 2020 | Andras CserAs firms migrate computing and data resources to the cloud, security remains a top concern and priority for both operational and compliance reasons. S&R professionals should use our custom tool, a...
-
Webinar European Security Market Trends, 2020
May 18, 2020 | Paul McKaySecurity leaders in Europe have had to deal with one of the biggest workforce transformations ever known as workers have moved from office work to homeworking to counter the current COVID-19...
-
Report Zero Trust Primer For 5G Security Use Cases
More Bandwidth Means More Data To Protect
May 1, 2020 | Jeff PollardSecurity and risk pros concerned about 5G security will find that the security narrative was hijacked — rightfully — by geopolitical and national security concerns. For enterprise security leaders,...
-
Report Now Tech: DDoS Mitigation Solutions, Q2 2020
Forrester's Overview Of 22 DDoS Mitigation Solution Providers
April 20, 2020 | David HolmesYou can use DDoS mitigation solutions to protect revenue generated by digital assets, maintain consistent customer experience, and meet availability compliance requirements. But to realize these...
-
Report Cybersecurity Risk Ratings Market Outlook, 2020 And Beyond
CISO Trust And Transparency Issues Drive Market Consolidation And Exits
March 16, 2020 | Paul McKayCybersecurity risk ratings vendors leverage externally available data about a firm to rate its cybersecurity posture. These vendors have now become mainstream despite customers, suppliers, and...
-
Report Securing Private 5G At The Edge: Europe Edition
Guide To Securing Private 5G And Edge Computing Use Cases For European Organizations
March 13, 2020 | Paul McKay5G networks are being deployed around Europe in 2020; several countries and telecom operators will bring 5G to the consumer market in 2020 and beyond. You'll find the most compelling 5G use cases...
-
Report The Top Trends Driving Cloud Workload Security In 2020
Market Consolidation, SaaS Offerings, And Remediation And DevOps Integration Are Reshaping The CWS Market
March 3, 2020 | Andras CserCloud workload security (CWS) solutions are deployed to detect, mitigate, and prevent cloud misconfigurations, configuration drift, identity and privilege proliferations, and vulnerabilities in...
-
Report The Forrester Wave™: Cloud Workload Security, Q4 2019
The 13 Providers That Matter Most And How They Stack Up
December 9, 2019 | Andras CserIn our 30-criterion evaluation of cloud workload security (CWS) providers, we identified the 13 most significant ones — Alert Logic, Aqua Security, Bitdefender, Cavirin, Check Point, Cisco,...
-
Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs
Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...
-
Report The Forrester Tech Tide™: Identity And Access Management, Q4 2019
Seventeen Technology Categories Underpin The IAM Market
Identity and access management (IAM) is increasingly critical to firms' ability to win, serve, and retain their customers. To accelerate their performance in IAM, companies are evaluating and...
-
Webinar Tactics For Maximizing Cybersecurity Risk Ratings Solutions
October 15, 2019 | Paul McKay, Trevor LynessCybersecurity risk ratings solutions are becoming a core part of enterprise security and third-party security programs of global companies. Join this webinar to learn the best practices and tactics...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (4)
- Retail (4)
- Healthcare (2)
- Public Sector (2)
- Consumer Electronics (1)
- Energy & Utilities (1)
- Manufacturing (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
- Travel (1)
Topics
- Cloud Security (91)
- Hybrid Cloud (26)
- Private Cloud (17)
- Public Cloud (17)
- Cloud Management (11)
- Cloud Workload Security (CWS) (11)
- Hybrid Cloud Management (8)
Methodology
- Forrester Tech Tide (19)
- Now Tech (13)
- Forrester New Wave (11)
- ForecastView (9)
- Business Technographics (7)
- Forrester Wave (7)
- Infographic (2)
- Maturity Assessment (1)
- Online Maturity Assessment (1)
Region
- Europe (6)
- Africa (1)
- Middle East (1)
- North America (1)
Vendor
- Microsoft (27)
- Akamai (26)
- Google (26)
- Neustar (26)
- Cisco (23)
- CA Technologies (19)
- Centrify (19)
- CyberArk (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- IBM (19)
- Intel (19)
- Micro Focus (19)
- Okta (19)
- Oracle (19)
- Pitney Bowes (19)
- RSA (19)
- SailPoint (19)
- Salesforce (19)
- SAP (19)
- Alibaba (7)
- Amazon (7)
- CenturyLink (7)
- Cloudflare (7)
- Huawei (7)
- Imperva (7)
- Tencent (7)
- Symantec (4)
- Check Point (3)
- Palo Alto Networks (3)
Analyst
- Andras Cser (33)
- Jeff Pollard (15)
- Paul McKay (13)
- David Holmes (11)
- Jennifer Adams (9)
- Heidi Shey (7)
- Alla Valente (3)
- Sean Ryan (3)
- Jinan Budge (2)
- Merritt Maxim (2)
- Sandy Carielli (2)
- Brian Kime (1)
- Enza Iannopollo (1)
- Fatemeh Khatibloo (1)
- Laura Koetzle (1)
- Peter Cerrato (1)
- Renee Murphy (1)
- Rick Parrish (1)
- Stephanie Balaouras (1)