Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Search Results
-
Report The Forrester Wave™: Security Analytics Platforms, Q4 2020
The 11 Providers That Matter Most And How They Stack Up
In our 27-criterion evaluation of security analytics platform providers, we identified the 11 most significant ones — Exabeam, FireEye, Gurucul, IBM Security, LogRhythm, Micro Focus, Microsoft,...
-
Report The Forrester Wave™: Global Managed Security Services Providers, Q3 2020
The 15 Providers That Matter Most And How They Stack Up
In our 26-criterion evaluation of global managed security services providers (MSSPs), we identified the 15 most significant ones — Accenture, Alert Logic, AT&T Cybersecurity, Capgemini,...
-
Report Now Tech: Enterprise Email Security Providers, Q3 2020
Forrester's Overview Of 33 Enterprise Email Security Providers
You can use enterprise email security to defend against email-borne attacks like phishing, safeguard sensitive data from theft or compromise, and protect your organization's brands. But to realize...
-
Report Now Tech: Global And Emerging Managed Security Services Providers, Q2 2020
Forrester's Overview Of 42 Global And Emerging Managed Security Services Providers
You can use global managed security services providers (MSSPs) to create space for security leaders, prioritize which activities the security team should focus on, and ease the challenges...
-
Report The Future Of The CISO
Vision: The S&R Practice Playbook
For many security and risk pros, becoming a CISO is challenging, and they find themselves in situations where they're forced to conform, rather than excel. This report outlines types of CISOs,...
-
Report Prevent Fraud And Phishing Attacks With DMARC
Email Authentication Keeps Cybercriminals Out Of Your Inbox
Despite the many security technologies and education in place, phishing and business email compromise remain two of the biggest threats for organizations everywhere. Domain-based Message...
-
Report The Forrester Wave™: Security Awareness And Training Solutions, Q1 2020
The 12 Providers That Matter Most And How They Stack Up
In our 23-criterion evaluation of security awareness and training (SA&T) providers, we identified the 12 most significant ones — Cofense, CybSafe, Elevate Security, Infosec, Inspired eLearning,...
-
Report Build A Security Champions Network
How To Integrate Security Culture Across Your Organization
Building a security culture up, down, and across the organization and engaging the multitudes of stakeholders is neither a simple task nor one that can easily be completed in the short term. This...
-
Report Ignore Geopolitical Risk At Your Peril
Why And How You Must Address Global Cybersecurity Concerns
Failing to formally incorporate geopolitical considerations in your risk management processes could ultimately mean havoc for your international presence, global customer base, third-party...
-
Report Predictions 2020: Cybersecurity
Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...
-
Report The Forrester Tech Tide™: Governance, Risk, And Compliance Management, Q4 2019
Governance, risk, and compliance (GRC) is increasingly critical to firms' ability to win, serve, and retain their customers. To accelerate their business performance and help identify, mitigate,...
-
Report Best Practices: Phishing Prevention
Protect Against Email-Borne Threats With Forrester's Layered Approach
Attackers use phishing and other social engineering tactics to infiltrate corporate networks. Advances in malicious email protection can recognize and stop obvious phishing attempts, but...
-
Report New Tech: Cyber Ranges, Q3 2019
Forrester's Landscape Overview Of 14 Providers
Cyber ranges use a simulated breach environment to prepare your workforce for the stress, panic, and communication barriers they will face during a real cyberattack. In an inevitable cyberattack,...
-
Report Best Practices: Mitigating Insider Threats
Defend Your Organization Against The Threats Insiders Pose
Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to...
-
Report The Forrester Wave™: Midsize Cybersecurity Consulting Services, Q2 2019
The Eight Providers That Matter Most And How They Stack Up
In our 24-criterion evaluation of midsize cybersecurity consulting services providers, we identified the eight most significant ones — Berezha Security, CenturyLink, Cylance, Herjavec Group, Telos,...
-
Report The Forrester Wave™: Global Cybersecurity Consulting Providers, Q2 2019
The 14 Providers That Matter Most And How They Stack Up
In our 23-criterion evaluation of global cybersecurity consulting providers, we identified the 14 most significant ones — Accenture, BAE Systems, Booz Allen Hamilton, Crowe, Deloitte, EY, IBM,...
-
Report Lessons Learned: Managed Security Services, 2019
Critical Insights From Forrester Wave™ Customer References Every Security Leader Should Know
Despite the maturity of the managed security services provider (MSSP) market, security and risk pros and vendors far too often fail to sync up as true, successful partners. This report delves into...
-
Report Avoid Corporate Scandal Caused By The Surveillance Economy
A Guide For CISOs To Stop Unethical Surveillance Tactics Before They Start
Welcome to the era of widespread personal surveillance. Organizations have joined the government in collecting, analyzing, and storing oceans of personal data. The private sector is fully engaged...
-
Report The Business Case For Security Awareness And Training
How To Measure Changes In Security Behavior And Culture
Everyone has long recognized the importance of the human element to cybersecurity, yet we still see staff acting unwisely and inviting threat actors into our networks. It's clear that something...
-
Report Harden Your Human Firewall
Engagement And Communication Tactics That Strengthen Security Culture
Building a strong security culture is no easy task. It requires strategy, vision, people, and the right attitude to change behavior and set a cultural shift in motion. This report highlights some...
-
Report Top Recommendations For Your Security Program, 2019
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
Content Type
ApplyFilters
Industry
- Public Sector (1)
Topics
- Security Operations & Program Governance (16)
- Information Security (10)
- Governance Risk & Compliance (GRC) (7)
- Identity & Access Management (IAM) (5)
- Data & Information Protection (4)
- Employee Experience (4)
- Application Security (2)
- IT Services (2)
- Measurement (2)
- Application Management (1)
- Biometrics (1)
- Business & IT Alignment (1)
- Cloud Computing (1)
- Tech Sector Economics (1)
Methodology
- Forrester Wave (5)
- Business Technographics (3)
- Now Tech (2)
- Forrester Tech Tide (1)
- New Tech (1)
- Predictions (1)
Region
- North America (2)
- Europe (1)
Vendor
- Accenture (3)
- CenturyLink (3)
- Deloitte (3)
- EY (3)
- IBM (3)
- Wipro (3)
- AT&T (2)
- Capgemini (2)
- Cognizant (2)
- Rapid7 (2)
- BAE Systems (1)
- Cylance (1)
- DXC Technology (1)
- Fujitsu (1)
- HCL Technologies (1)
- Infosys (1)
- KPMG (1)
- Proofpoint (1)
- PwC (1)
- Rackspace (1)
- Tech Mahindra (1)