Skip to main content
87 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Secure customers, protect the brand
  • Tech Sector Economics

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report The State Of Network Security, 2020 To 2021

    Benchmarks: The Zero Trust Security Playbook
    January 7, 2021 | David Holmes, Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...

  • Report Best Practices For Container Security

    Protecting Containerized Applications Requires Technical And Organizational Steps
    July 24, 2020 | Sandy Carielli, Andras Cser

    Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...

  • Report The Forrester New Wave™: Connected Medical Device Security, Q2 2020

    The Eight Providers That Matter Most And How They Stack Up
    June 11, 2020 | Chris Sherman

    In Forrester's evaluation of the emerging market for medical device security solutions, we identified the eight most significant providers in the category — Armis, CyberMDX, Cynerio, Forescout,...

  • Report Forrester Infographic: Understanding European Security Leader Spending Patterns, 2020

    European Security Leaders Adapt To Stagnating Security Budgets
    May 18, 2020 | Paul McKay

    Forrester surveyed 1,346 European security decision makers to understand how they plan to spend their budgets in 2020. This infographic summarizes security spending patterns and key takeaways from...

  • Report The State Of Application Security, 2020

    Applications Remain The Top External Attack Method; Don't Get Complacent
    May 4, 2020 | Sandy Carielli

    Application weaknesses and software vulnerabilities continue to be the most common external attack method. Now is not the time to backslide on your application security efforts. Instead, follow the...

  • Report Understand The State Of Identity And Access Management, 2020

    Benchmarks: The Identity And Access Management Playbook
    April 21, 2020 | Sean Ryan, Andras Cser

    This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...

  • Report New Tech: Medical Device Security, Q1 2020

    Forrester's Landscape Overview Of 19 Providers
    March 23, 2020 | Chris Sherman, Elsa Pikulik

    Connected medical devices are an integral part of modern healthcare providers, but security teams at those organizations struggle to understand and mitigate connected medical devices directly...

  • Report Security Budgets Europe, 2020: SaaS Security Is In Vogue

    European Security Leaders Adopt Sustainable Budgeting Practices
    March 20, 2020 | Paul McKay

    In 2020, European security leaders are grappling with a toxic mix of geopolitical tensions, economic growth slowdown, and board of directors fatigue caused by questionable results after years of...

  • Report Now Tech: European Cybersecurity Incident Response Services, Q1 2020

    Forrester's Overview Of 19 European Cybersecurity Incident Response Providers
    March 10, 2020 | Paul McKay, Josh Zelonis

    You can use European cybersecurity incident response (IR) providers to help you recover from a cybersecurity breach, stress test your cybersecurity IR plan, and support post-breach remediation...

  • Report The State Of Data Security And Privacy, 2020

    Benchmarks: The Data Security And Privacy Playbook
    February 27, 2020 | Heidi Shey

    This data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...

  • Report Security Budgets 2020: New Threats Bring New Priorities

    Benchmarks: The S&R Practice Playbook
    February 14, 2020 | Jeff Pollard

    This report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...

  • Report The State Of Government Application Security, 2020

    Government Must Invest Aggressively In Application Security To Protect Citizen Data
    January 7, 2020 | Sandy Carielli, Amy DeMartine

    Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....

  • Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

    Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
    November 25, 2019 | Andras Cser, Sean Ryan

    With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...

  • Report The State Of European Security In 2019: Slower-Growing Budgets Drive Fit-For-Purpose Security

    June 12, 2019 | Paul McKay

    A wobbly Eurozone economy and slower-growing budgets force European security and risk (S&R) leaders to prioritize their spending. Read this report to pinpoint the most important changes in the...

  • Report Forrester's Guide To Paying Ransomware

    Paying Ransom Can Be A Valid Recovery Option Based On Business Need And Circumstances
    June 5, 2019 | Josh Zelonis, Trevor Lyness

    Conventional wisdom says that when your company suffers a ransomware attack, you should never pay the ransom. But hardline conversations about whether to negotiate with cybercriminals takes a...

  • Report Best Practices: Medical Device Security

    Control Your Hospital's Expanding Device Risk Exposure

    Healthcare providers struggle to understand and mitigate medical device risk, particularly devices connected to the hospital network and directly involved in patient care. Meanwhile, patients...

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Report The State Of Endpoint Security, 2019

    Buyers Demand Better Product Efficacy And Integrated Data Security
    January 22, 2019 | Chris Sherman, Salvatore Schiano

    Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns to help security...

Content Type

Apply

Filters

Industry

Region

Vendor