Skip to main content
70 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Secure customers, protect the brand
  • Business & IT Alignment

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report The Zero Trust eXtended Ecosystem: Data

    Landscape: The Data Security And Privacy Playbook
    August 11, 2020 | Heidi Shey, Chase Cunningham

    Data security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...

  • Report The Forrester Wave™: Enterprise Firewalls, Q3 2020

    The 11 Providers That Matter Most And How They Stack Up
    August 10, 2020 | David Holmes

    In our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...

  • Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020

    Forrester's Overview Of 24 CIAM Providers
    June 24, 2020 | Andras Cser

    You can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...

  • Report Now Tech: Network Analysis And Visibility, Q2 2020

    Forrester's Overview Of 24 Network Analysis And Visibility Providers
    June 23, 2020 | Josh Zelonis

    You can use network analysis and visibility (NAV) solutions to identify unmanaged assets, understand how to implement Zero Trust segmentation, and detect threats within your environment. But to...

  • Report Use Privileged Identity Management Pricing Insight For Buyer Advantage

    Understand Pricing Mechanics To Optimize Your PIM Procurement
    June 18, 2020 | Sean Ryan, Andras Cser

    Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...

  • Report Throw DARTS To Hit Your Zero Trust Targets

    Vision: The Zero Trust Security Playbook
    June 15, 2020 | Chase Cunningham, Peter Cerrato

    Organizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...

  • Report Build A Developer Security Champions Program

    Developer Security Champions Scale Your Team And Address Application Security Issues Closer To The Source
    June 12, 2020 | Sandy Carielli

    Firms that want to secure applications are challenged by understaffed security teams and lack of security awareness on the part of developers. Developer security champions are developers who act as...

  • Report Mitigating Ransomware With Zero Trust

    Bolster Your Defenses With Zero Trust Principles And Techniques
    June 8, 2020 | Chase Cunningham, Josh Zelonis, David Holmes

    Ransomware and malware continue to plague organizations across the globe. Entire industries have been affected and, in some cases, ground to a halt thanks to the scourge of ransomware attacks....

  • Report Now Tech: Zero Trust Solution Providers, Q2 2020

    Forrester's Overview Of 38 Zero Trust Solution Providers
    May 1, 2020 | Chase Cunningham

    You can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...

  • Report How To Implement Zero Trust Security In Europe

    April 15, 2020 | Paul McKay, Chase Cunningham, Enza Iannopollo

    Large technology companies and the US federal government have adopted Zero Trust (ZT) as their next-generation security model. 2019 saw Zero Trust enter the European security market. In 2020,...

  • Report Now Tech: Enterprise Firewalls, Q1 2020

    Forrester's Overview Of 18 Enterprise Firewall Providers
    March 20, 2020 | David Holmes

    You can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...

  • Report The Top Trends Shaping IAM In 2020

    Landscape: The Identity And Access Management Playbook
    January 29, 2020 | Andras Cser, Sean Ryan

    Identity is a core building block of a robust Zero Trust security ecosystem and infrastructure. In this report, we look at the eight most important trends that will shape the identity and access...

  • Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    January 9, 2020 | Jeff Pollard, Paul McKay

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • Report Build The Business Case For GRC

    Business Case: The Governance, Risk, And Compliance Playbook
    January 7, 2020 | Alla Valente, Renee Murphy

    The business case for governance, risk management, and compliance (GRC) efforts too often relies on the fear of costly events or regulatory action. This report helps GRC leaders elevate the...

  • Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

    Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
    November 25, 2019 | Andras Cser, Sean Ryan

    With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...

  • Report The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019

    The 14 Providers That Matter Most And How They Stack Up
    October 29, 2019 | Chase Cunningham

    In our 16-criterion evaluation of Zero Trust eXtended (ZTX) ecosystem providers, we identified the 14 most significant ones — Akamai Technologies, Check Point, Cisco, Cyxtera Technologies,...

  • Report The Eight Business And Security Benefits Of Zero Trust

    September 25, 2019 | Chase Cunningham, David Holmes, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...

  • Report The Zero Trust eXtended (ZTX) Ecosystem

    Strategic Plan: The Zero Trust Security Playbook
    July 11, 2019 | Chase Cunningham

    In the past two years, Forrester's Zero Trust security has exploded in awareness and plans for adoption. We've reached this market inflection thanks to the categorical realization from both...

  • Webinar The Beginner's Guide To Regtech And The Digital Transformation Of Compliance

    July 11, 2019 | Renee Murphy, Alla Valente

    Digital transformation has fundamentally changed how businesses in every industry operate and deliver value to their customers. Now their compliance function must also leverage digital technology...

  • Report Widen Your Risk Taxonomy To Remove Blind Spots

    Landscape: The Governance, Risk, And Compliance Playbook
    February 8, 2019 | Renee Murphy

    The way enterprises categorize risk has important implications for how they assess, measure, and treat it. Antiquated categories of risk — such as legal, operational, financial, and strategic — may...

Content Type

Apply

Filters

Region