Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Evaluated Vendors And Product Information
January 11, 2021
-
Forrester Wave™: Static Application Security Testing, Q1 2021
January 11, 2021
Search Results
-
Report The Forrester Wave™: Static Application Security Testing, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
January 11, 2021 | Sandy CarielliIn our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Webinar More Than A Gateway: Take A Holistic Approach To API Security
APIs provide a foundation for innovation and digital transformation, but as evidenced by the number of API related breaches, organizations struggle to secure them. The API security landscape is a...
-
Report Now Tech: Static Application Security Testing, Q3 2020
Forrester's Overview Of 19 SAST Providers
August 6, 2020 | Sandy CarielliYou can use static application security testing (SAST) to reduce the time to fix application security weaknesses, improve application delivery speed and predictability, and educate developers on...
-
Webinar So You're Implementing Containers? Secure Them!
Technology leaders are jumping at the chance to implement containers, and security leaders are scrambling to figure out how to protect them. Join us for a fireside chat about key container security...
-
Report Best Practices For Container Security
Protecting Containerized Applications Requires Technical And Organizational Steps
Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...
-
Report Forrester Infographic: Web Application Firewall Customers Weigh In
July 23, 2020 | Sandy CarielliWeb application firewall (WAF) providers aim to protect customers from a range of application attacks, from OWASP Top 10 vulnerabilities to API-based attacks, client-side attacks, and even bots. We...
-
Report The Top Security Technology Trends To Watch, 2020
Ten Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top 10 security technologies to...
-
Webinar Top Security Technologies To Watch, 2020
Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...
-
Report Build A Developer Security Champions Program
Developer Security Champions Scale Your Team And Address Application Security Issues Closer To The Source
June 12, 2020 | Sandy CarielliFirms that want to secure applications are challenged by understaffed security teams and lack of security awareness on the part of developers. Developer security champions are developers who act as...
-
Report The State Of Application Security, 2020
Applications Remain The Top External Attack Method; Don't Get Complacent
May 4, 2020 | Sandy CarielliApplication weaknesses and software vulnerabilities continue to be the most common external attack method. Now is not the time to backslide on your application security efforts. Instead, follow the...
-
Report Top Recommendations For Your Security Program, 2020
Landscape: The S&R Practice Playbook
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Webinar Recapping The 2020 RSA Conference: Forrester’s Perspectives
The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week...
-
Report The Forrester Wave™: Web Application Firewalls, Q1 2020
The 10 Providers That Matter Most And How They Stack Up
In our 33-criterion evaluation of web application firewall (WAF) providers, we identified the 10 most significant ones — Akamai Technologies, Alibaba Cloud, Amazon Web Services, Barracuda Networks,...
-
Report The Forrester New Wave™: Bot Management, Q1 2020
The 13 Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for bot management, we identified the 13 most significant providers in the category — Akamai Technologies, Alibaba Cloud, AppsFlyer, Cloudflare,...
-
Report Top Cybersecurity Threats In 2020
Landscape: The Zero Trust Security Playbook
January 24, 2020 | Josh Zelonis, Sandy CarielliSecurity and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...
-
Report The State Of Government Application Security, 2020
Government Must Invest Aggressively In Application Security To Protect Citizen Data
Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....
-
Report Now Tech: Web Application Firewalls, Q4 2019
Forrester's Overview Of 31 WAF Providers
You can use web application firewalls (WAFs) to protect applications, apply consistent and global security policies, and comply with regulations. But to realize these benefits, you'll first have to...
-
Report New Tech: Bot Management, Q4 2019
Forrester's Landscape Overview Of 22 Providers
Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated,...
Content Type
ApplyFilters
Industry
- Public Sector (3)
- Energy & Utilities (2)
- Financial Services (2)
- Healthcare (2)
- Manufacturing (2)
- Media & Entertainment (1)
- Retail (1)
Topics
- Application Security (32)
- Information Security (30)
- Tech Sector Economics (11)
- Pandemic (9)
- Security Operations & Program Governance (9)
- Data & Information Protection (4)
- Governance Risk & Compliance (GRC) (4)
- Architecture & Technology Strategy (2)
- Business & IT Alignment (2)
- Data Centers & Data Center Networking (2)
- Employee Experience (2)
- Enterprise Mobility (2)
- Innovation (2)
- Telecommunications Services (2)
- Cloud Computing (1)
- Financial Management (1)
Methodology
- Now Tech (8)
- Forrester Wave (5)
- Business Technographics (2)
- Infographic (2)
- Forrester New Wave (1)
- New Tech (1)
Vendor
- HCL Technologies (4)
- Micro Focus (4)
- Veracode (4)
- Akamai (2)
- Cloudflare (2)
- Imperva (2)
- Alibaba (1)
- Amazon (1)
- Microsoft (1)
- Oracle (1)