Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
Search Results
-
Report Now Tech: Zero Trust Solution Providers, Q2 2020
Forrester's Overview Of 38 Zero Trust Solution Providers
May 1, 2020 | Chase CunninghamYou can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...
-
Report Now Tech: DDoS Mitigation Solutions, Q2 2020
Forrester's Overview Of 22 DDoS Mitigation Solution Providers
April 20, 2020 | David HolmesYou can use DDoS mitigation solutions to protect revenue generated by digital assets, maintain consistent customer experience, and meet availability compliance requirements. But to realize these...
-
Report The Forrester Wave™: Web Application Firewalls, Q1 2020
The 10 Providers That Matter Most And How They Stack Up
In our 33-criterion evaluation of web application firewall (WAF) providers, we identified the 10 most significant ones — Akamai Technologies, Alibaba Cloud, Amazon Web Services, Barracuda Networks,...
-
Report Now Tech: Enterprise Detection And Response, Q1 2020
Forrester's Overview Of 29 Enterprise Detection And Response Providers
February 5, 2020 | Josh ZelonisYou can use enterprise detection and response (EDR) offerings to improve detection, investigate alerts, and provide remote remediation of compromised systems. But to realize these benefits, you'll...
-
Report Now Tech: Governance, Risk, And Compliance Technology, Q4 2019
Forrester's Overview Of 23 Governance, Risk, And Compliance Providers
December 13, 2019 | Alla ValenteYou can use governance, risk, and compliance (GRC) technology to protect your customers, business, and brand; proactively respond to emerging risks and evolving regulations; and navigate through...
-
Report The Forrester Tech Tide™: Identity And Access Management, Q4 2019
Seventeen Technology Categories Underpin The IAM Market
Identity and access management (IAM) is increasingly critical to firms' ability to win, serve, and retain their customers. To accelerate their performance in IAM, companies are evaluating and...
-
Report The Forrester Wave™: Endpoint Security Suites, Q3 2019
The 15 Providers That Matter Most And How They Stack Up
September 23, 2019 | Chris ShermanIn our 25-criterion evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bitdefender, BlackBerry Cylance, Carbon Black, Check Point, Cisco, CrowdStrike,...
-
Report The Forrester Wave™: Identity-As-A-Service (IDaaS) For Enterprise, Q2 2019
The 10 Providers That Matter Most And How They Stack Up
In our 37-criterion evaluation of providers of identity-as-a-service (IDaaS) for enterprise, we identified the 10 most significant ones — Google, IBM, Idaptive, Microsoft, Okta, OneLogin, OpenText,...
-
Webinar Cloud Security Gateways — Key Trends And Vendor Landscape
Using The Forrester Wave™
June 12, 2019 | Andras CserCloud security gateways (CSGs) are a key component of protecting data both on-premises and in the cloud. This webinar looks at buyer behaviors and the vendor landscape of CSGs. Key...
-
Report The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019
The 13 Providers That Matter Most And How They Stack Up
June 10, 2019 | Heidi SheyIn our 25-criterion evaluation of data security portfolio providers, we identified the 13 most significant ones — Dell, Digital Guardian, Forcepoint, Google, GTB Technologies, IBM, Imperva, McAfee,...
-
Report The Forrester Wave™: Enterprise Email Security, Q2 2019
The 12 Providers That Matter Most And How They Stack Up
May 16, 2019 | Joseph BlankenshipIn our 32-criterion evaluation of enterprise email content security providers, we identified the 12 most significant ones — Barracuda, Cisco, Clearswift, Forcepoint, Microsoft, Mimecast,...
Content Type
ApplyFilters
Industry
- Financial Services (1)
- Healthcare (1)
- Retail (1)
Topics
- Identity & Access Management (IAM) (29)
- Information Security (28)
- Cloud Computing (27)
- Application Security (26)
- Security Operations & Program Governance (19)
- Networking (13)
- Data & Information Protection (12)
- Governance Risk & Compliance (GRC) (7)
- Business & IT Alignment (6)
- Mobile Application Development (3)
Methodology
- Now Tech (21)
- Forrester Tech Tide (19)
- Forrester Wave (16)
Analyst
- Alla Valente (7)
- David Holmes (7)
- Chris Sherman (4)
- Heidi Shey (4)
- Andras Cser (3)
- Amy DeMartine (1)
- Joseph Blankenship (1)
- Merritt Maxim (1)
- Sandy Carielli (1)
- Sean Ryan (1)