Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
ZTX Data Capabilities And Example Vendors
August 11, 2020
-
Examples Of Data Security Startups To Watch
August 11, 2020
Search Results
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
August 10, 2020 | David HolmesIn our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...
-
Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020
Forrester's Overview Of 24 CIAM Providers
June 24, 2020 | Andras CserYou can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...
-
Report Now Tech: Network Analysis And Visibility, Q2 2020
Forrester's Overview Of 24 Network Analysis And Visibility Providers
June 23, 2020 | Josh ZelonisYou can use network analysis and visibility (NAV) solutions to identify unmanaged assets, understand how to implement Zero Trust segmentation, and detect threats within your environment. But to...
-
Report Use Privileged Identity Management Pricing Insight For Buyer Advantage
Understand Pricing Mechanics To Optimize Your PIM Procurement
Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...
-
Report Throw DARTS To Hit Your Zero Trust Targets
Vision: The Zero Trust Security Playbook
June 15, 2020 | Chase Cunningham, Peter CerratoOrganizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...
-
Report Build A Developer Security Champions Program
Developer Security Champions Scale Your Team And Address Application Security Issues Closer To The Source
June 12, 2020 | Sandy CarielliFirms that want to secure applications are challenged by understaffed security teams and lack of security awareness on the part of developers. Developer security champions are developers who act as...
-
Report Mitigating Ransomware With Zero Trust
Bolster Your Defenses With Zero Trust Principles And Techniques
June 8, 2020 | Chase Cunningham, Josh Zelonis, David HolmesRansomware and malware continue to plague organizations across the globe. Entire industries have been affected and, in some cases, ground to a halt thanks to the scourge of ransomware attacks....
-
Report Now Tech: Zero Trust Solution Providers, Q2 2020
Forrester's Overview Of 38 Zero Trust Solution Providers
May 1, 2020 | Chase CunninghamYou can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...
-
Report How To Implement Zero Trust Security In Europe
Large technology companies and the US federal government have adopted Zero Trust (ZT) as their next-generation security model. 2019 saw Zero Trust enter the European security market. In 2020,...
-
Report Now Tech: Enterprise Firewalls, Q1 2020
Forrester's Overview Of 18 Enterprise Firewall Providers
March 20, 2020 | David HolmesYou can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...
-
Report The Top Trends Shaping IAM In 2020
Landscape: The Identity And Access Management Playbook
Identity is a core building block of a robust Zero Trust security ecosystem and infrastructure. In this report, we look at the eight most important trends that will shape the identity and access...
-
Report Justify Security Budget By Its Impact On Maturity
Business Case: The S&R Practice Playbook
Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...
-
Report Build The Business Case For GRC
Business Case: The Governance, Risk, And Compliance Playbook
The business case for governance, risk management, and compliance (GRC) efforts too often relies on the fear of costly events or regulatory action. This report helps GRC leaders elevate the...
-
Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs
Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...
-
Report The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019
The 14 Providers That Matter Most And How They Stack Up
October 29, 2019 | Chase CunninghamIn our 16-criterion evaluation of Zero Trust eXtended (ZTX) ecosystem providers, we identified the 14 most significant ones — Akamai Technologies, Check Point, Cisco, Cyxtera Technologies,...
-
Report The Eight Business And Security Benefits Of Zero Trust
In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...
-
Report The Zero Trust eXtended (ZTX) Ecosystem
Strategic Plan: The Zero Trust Security Playbook
July 11, 2019 | Chase CunninghamIn the past two years, Forrester's Zero Trust security has exploded in awareness and plans for adoption. We've reached this market inflection thanks to the categorical realization from both...
-
Webinar The Beginner's Guide To Regtech And The Digital Transformation Of Compliance
Digital transformation has fundamentally changed how businesses in every industry operate and deliver value to their customers. Now their compliance function must also leverage digital technology...
-
Report Widen Your Risk Taxonomy To Remove Blind Spots
Landscape: The Governance, Risk, And Compliance Playbook
February 8, 2019 | Renee MurphyThe way enterprises categorize risk has important implications for how they assess, measure, and treat it. Antiquated categories of risk — such as legal, operational, financial, and strategic — may...
Content Type
ApplyFilters
Industry
- Financial Services (1)
- Healthcare (1)
- Manufacturing (1)
- Retail (1)
Topics
- Digital Business (44)
- Business Value (22)
- Digital Transformation (11)
Methodology
- Now Tech (19)
- Forrester Wave (5)
- Total Economic Impact (TEI) (3)
- Maturity Assessment (1)
Region
- Europe (1)
Vendor
- Cisco (11)
- Palo Alto Networks (11)
- Fortinet (10)
- Akamai (7)
- Google (7)
- Okta (7)
- Proofpoint (7)
- Unisys (7)
- BlackBerry Cylance (6)
- Centrify (6)
- Microsoft (6)
- Check Point (5)
- Huawei (4)
- Juniper Networks (4)
- IBM (1)
- Symantec (1)
Analyst
- David Holmes (12)
- Andras Cser (9)
- Alla Valente (3)
- Renee Murphy (3)
- Sean Ryan (3)
- Jeff Pollard (2)
- Paul McKay (2)
- Sandy Carielli (2)
- Enza Iannopollo (1)
- Heidi Shey (1)
- Naveen Chhabra (1)
- Peter Cerrato (1)