Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
External Attacks Are The Leading Cause Of Confirmed Breaches
January 7, 2021
-
Search Results
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report Best Practices For Container Security
Protecting Containerized Applications Requires Technical And Organizational Steps
Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...
-
Report The Forrester New Wave™: Connected Medical Device Security, Q2 2020
The Eight Providers That Matter Most And How They Stack Up
June 11, 2020 | Chris ShermanIn Forrester's evaluation of the emerging market for medical device security solutions, we identified the eight most significant providers in the category — Armis, CyberMDX, Cynerio, Forescout,...
-
Report Forrester Infographic: Understanding European Security Leader Spending Patterns, 2020
European Security Leaders Adapt To Stagnating Security Budgets
May 18, 2020 | Paul McKayForrester surveyed 1,346 European security decision makers to understand how they plan to spend their budgets in 2020. This infographic summarizes security spending patterns and key takeaways from...
-
Report The State Of Application Security, 2020
Applications Remain The Top External Attack Method; Don't Get Complacent
May 4, 2020 | Sandy CarielliApplication weaknesses and software vulnerabilities continue to be the most common external attack method. Now is not the time to backslide on your application security efforts. Instead, follow the...
-
Report Understand The State Of Identity And Access Management, 2020
Benchmarks: The Identity And Access Management Playbook
This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...
-
Report New Tech: Medical Device Security, Q1 2020
Forrester's Landscape Overview Of 19 Providers
Connected medical devices are an integral part of modern healthcare providers, but security teams at those organizations struggle to understand and mitigate connected medical devices directly...
-
Report Security Budgets Europe, 2020: SaaS Security Is In Vogue
European Security Leaders Adopt Sustainable Budgeting Practices
March 20, 2020 | Paul McKayIn 2020, European security leaders are grappling with a toxic mix of geopolitical tensions, economic growth slowdown, and board of directors fatigue caused by questionable results after years of...
-
Report Now Tech: European Cybersecurity Incident Response Services, Q1 2020
Forrester's Overview Of 19 European Cybersecurity Incident Response Providers
March 10, 2020 | Paul McKay, Josh ZelonisYou can use European cybersecurity incident response (IR) providers to help you recover from a cybersecurity breach, stress test your cybersecurity IR plan, and support post-breach remediation...
-
Report The State Of Data Security And Privacy, 2020
Benchmarks: The Data Security And Privacy Playbook
February 27, 2020 | Heidi SheyThis data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...
-
Report Security Budgets 2020: New Threats Bring New Priorities
Benchmarks: The S&R Practice Playbook
February 14, 2020 | Jeff PollardThis report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...
-
Report The State Of Government Application Security, 2020
Government Must Invest Aggressively In Application Security To Protect Citizen Data
Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....
-
Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs
Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...
-
Report The State Of European Security In 2019: Slower-Growing Budgets Drive Fit-For-Purpose Security
June 12, 2019 | Paul McKayA wobbly Eurozone economy and slower-growing budgets force European security and risk (S&R) leaders to prioritize their spending. Read this report to pinpoint the most important changes in the...
-
Report Forrester's Guide To Paying Ransomware
Paying Ransom Can Be A Valid Recovery Option Based On Business Need And Circumstances
June 5, 2019 | Josh Zelonis, Trevor LynessConventional wisdom says that when your company suffers a ransomware attack, you should never pay the ransom. But hardline conversations about whether to negotiate with cybercriminals takes a...
-
Report Best Practices: Medical Device Security
Control Your Hospital's Expanding Device Risk Exposure
Healthcare providers struggle to understand and mitigate medical device risk, particularly devices connected to the hospital network and directly involved in patient care. Meanwhile, patients...
-
Report The State Of Application Security, 2019
Organizations Are Rushing To Protect Their Applications With Automation
February 27, 2019 | Amy DeMartineApplication weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...
-
Report The State Of Endpoint Security, 2019
Buyers Demand Better Product Efficacy And Integrated Data Security
Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns to help security...
Content Type
ApplyFilters
Industry
- Healthcare (22)
- Public Sector (1)
Topics
Methodology
- Forrester New Wave (12)
- Business Technographics (9)
- New Tech (7)
- Now Tech (6)
- Infographic (1)
Region
- Europe (14)
Vendor
- Accenture (6)
- BAE Systems (6)
- Capgemini (6)
- CrowdStrike (6)
- Deloitte (6)
- FireEye (6)
- IBM (6)
- PwC (6)
Analyst
- Chris Sherman (15)
- Sandy Carielli (11)
- Paul McKay (10)
- Heidi Shey (8)
- Amy DeMartine (6)
- Andras Cser (3)
- Salvatore Schiano (2)
- Sean Ryan (2)
- David Holmes (1)
- Elsa Pikulik (1)
- Jeff Pollard (1)