Skip to main content
242 results in Everything
 
Sort by:
Refine
  • Application Security

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security

    Wednesday, March 10, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Andras Cser

    In this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...

  • Report The Forrester Wave™: Static Application Security Testing, Q1 2021

    The 12 Providers That Matter Most And How They Stack Up
    January 11, 2021 | Sandy Carielli

    In our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...

  • Report Don't Ignore Security In Low-Code Development

    Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
    December 23, 2020 | Sandy Carielli, John Bratincevic

    The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...

  • Report Gauge Your Data Security And Privacy Maturity

    Assessment: The Data Security And Privacy Playbook
    December 18, 2020 | Enza Iannopollo, Heidi Shey

    To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...

  • Report The Future Of Documents

    A Look Beyond The Paradigm Of Paper And Into Opportunities For Innovation
    December 9, 2020 | Cheryl McKinnon

    Application development and delivery (AD&D) professionals can drive innovation in one of the most fundamental business activities: the creation and distribution of documents. Despite more than 30...

  • Webinar More Than A Gateway: Take A Holistic Approach To API Security

    December 1, 2020 | Sandy Carielli, David Mooter

    APIs provide a foundation for innovation and digital transformation, but as evidenced by the number of API related breaches, organizations struggle to secure them. The API security landscape is a...

  • Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    October 23, 2020 | Andras Cser, Sean Ryan

    Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...

  • Forum Security & Risk Global

    Leading the Way
    September 22, 2020 | Live Virtual Experience | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...

  • Report The Zero Trust eXtended Ecosystem: Data

    Landscape: The Data Security And Privacy Playbook
    August 11, 2020 | Heidi Shey, Chase Cunningham

    Data security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...

  • Report The Forrester Wave™: Enterprise Firewalls, Q3 2020

    The 11 Providers That Matter Most And How They Stack Up
    August 10, 2020 | David Holmes

    In our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...

  • Report Now Tech: Static Application Security Testing, Q3 2020

    Forrester's Overview Of 19 SAST Providers
    August 6, 2020 | Sandy Carielli

    You can use static application security testing (SAST) to reduce the time to fix application security weaknesses, improve application delivery speed and predictability, and educate developers on...

  • Webinar So You're Implementing Containers? Secure Them!

    July 28, 2020 | Sandy Carielli, Andras Cser

    Technology leaders are jumping at the chance to implement containers, and security leaders are scrambling to figure out how to protect them. Join us for a fireside chat about key container security...

  • Report Best Practices For Container Security

    Protecting Containerized Applications Requires Technical And Organizational Steps
    July 24, 2020 | Sandy Carielli, Andras Cser

    Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...

  • Report Forrester Infographic: Web Application Firewall Customers Weigh In

    July 23, 2020 | Sandy Carielli

    Web application firewall (WAF) providers aim to protect customers from a range of application attacks, from OWASP Top 10 vulnerabilities to API-based attacks, client-side attacks, and even bots. We...

  • Report Use Privileged Identity Management Pricing Insight For Buyer Advantage

    Understand Pricing Mechanics To Optimize Your PIM Procurement
    June 18, 2020 | Sean Ryan, Andras Cser

    Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...

  • Report Now Tech: Public Cloud Development Platforms In China, Q2 2020

    Forrester's Overview Of 28 Public Cloud Development Platform Providers In China
    June 18, 2020 | Charlie Dai, Danny Mu

    You can use public cloud development platforms to build the technology foundations of an adaptive enterprise and simplify digital operations, modernize business applications, and facilitate...

  • Report The Forrester Wave™: Continuous Functional Test Automation Suites, Q2 2020

    The 15 Providers That Matter Most And How They Stack Up
    June 18, 2020 | Diego Lo Giudice

    In our 26-criterion evaluation of continuous functional test automation (CFTA) providers, we identified the 15 most significant ones — ACCELQ, Broadcom, Cyara, Eggplant, Experitest, IBM, mabl,...

  • Report How A Least Privilege Model Can Reduce Dynamic Access Risks

    Applying Zero Trust To Address Overprivileged Employee/Entity Access
    May 27, 2020 | Sean Ryan, Andras Cser

    Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either...

  • Report The State Of Application Security, 2020

    Applications Remain The Top External Attack Method; Don't Get Complacent
    May 4, 2020 | Sandy Carielli

    Application weaknesses and software vulnerabilities continue to be the most common external attack method. Now is not the time to backslide on your application security efforts. Instead, follow the...

  • Report Zoom Becomes A Product Security Cautionary Tale

    CISOs Must Take Extra Steps To Protect Their Firms While Zoom Fixes Critical Flaws

    As the global pandemic sent hundreds of thousands of employees to work from home overnight, Zoom quickly rose to worldwide prominence as a central enabling technology. But just as quickly, Zoom...

  • Report Now Tech: Privileged Identity Management, Q2 2020

    Forrester's Overview Of 17 Privileged Identity Management Providers
    April 2, 2020 | Sean Ryan

    You can use PIM offerings to reduce exposure to the most damaging types of breaches, comply with a growing list of regulations, replace manual processes for oversight of privileged accounts, and...

  • Report Now Tech: Enterprise Firewalls, Q1 2020

    Forrester's Overview Of 18 Enterprise Firewall Providers
    March 20, 2020 | David Holmes

    You can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...

  • Report Now Tech: Continuous Functional Test Automation Suites, Q1 2020

    Forrester's Overview Of 31 Continuous Functional Test Automation Providers
    March 5, 2020 | Diego Lo Giudice, Julia Caldwell

    You can use continuous functional test automation tools to improve software quality, decrease testing overhead, and deliver value to customers faster. But to realize these benefits, you'll first...

  • Report Now Tech: Public Cloud Development Platforms, Q1 2020

    Forrester's Overview Of 16 Public Cloud Development Platform Providers
    March 4, 2020 | Dave Bartoletti, John Rymer

    Application development and delivery (AD&D) pros can use public cloud development platforms to quickly develop and deliver applications to support business innovations and operations automation,...

  • Report Optimize User Experience With Passwordless Authentication

    Improve User Experience And Security And Lower The Cost Of Cross-Channel Authentication
    March 2, 2020 | Andras Cser, Sean Ryan

    With the evolution of numerical computing, the password has lost its ability to protect critical applications and data. This report looks at passwordless authentication, explaining how it can...

  • 1
  • 2

Content Type

Apply

Filters

Region

Vendor