Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Evaluated Vendors And Product Information
January 11, 2021
-
Forrester Wave™: Static Application Security Testing, Q1 2021
January 11, 2021
Search Results
-
Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security
Wednesday, March 10, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Andras CserIn this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...
-
Report The Forrester Wave™: Static Application Security Testing, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
January 11, 2021 | Sandy CarielliIn our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Report The Future Of Documents
A Look Beyond The Paradigm Of Paper And Into Opportunities For Innovation
December 9, 2020 | Cheryl McKinnonApplication development and delivery (AD&D) professionals can drive innovation in one of the most fundamental business activities: the creation and distribution of documents. Despite more than 30...
-
Webinar More Than A Gateway: Take A Holistic Approach To API Security
APIs provide a foundation for innovation and digital transformation, but as evidenced by the number of API related breaches, organizations struggle to secure them. The API security landscape is a...
-
Report The Future Of Identity And Access Management
Vision: The Identity And Access Management Playbook
Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
August 10, 2020 | David HolmesIn our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...
-
Report Now Tech: Static Application Security Testing, Q3 2020
Forrester's Overview Of 19 SAST Providers
August 6, 2020 | Sandy CarielliYou can use static application security testing (SAST) to reduce the time to fix application security weaknesses, improve application delivery speed and predictability, and educate developers on...
-
Webinar So You're Implementing Containers? Secure Them!
Technology leaders are jumping at the chance to implement containers, and security leaders are scrambling to figure out how to protect them. Join us for a fireside chat about key container security...
-
Report Best Practices For Container Security
Protecting Containerized Applications Requires Technical And Organizational Steps
Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...
-
Report Forrester Infographic: Web Application Firewall Customers Weigh In
July 23, 2020 | Sandy CarielliWeb application firewall (WAF) providers aim to protect customers from a range of application attacks, from OWASP Top 10 vulnerabilities to API-based attacks, client-side attacks, and even bots. We...
-
Report Use Privileged Identity Management Pricing Insight For Buyer Advantage
Understand Pricing Mechanics To Optimize Your PIM Procurement
Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...
-
Report Now Tech: Public Cloud Development Platforms In China, Q2 2020
Forrester's Overview Of 28 Public Cloud Development Platform Providers In China
You can use public cloud development platforms to build the technology foundations of an adaptive enterprise and simplify digital operations, modernize business applications, and facilitate...
-
Report The Forrester Wave™: Continuous Functional Test Automation Suites, Q2 2020
The 15 Providers That Matter Most And How They Stack Up
June 18, 2020 | Diego Lo GiudiceIn our 26-criterion evaluation of continuous functional test automation (CFTA) providers, we identified the 15 most significant ones — ACCELQ, Broadcom, Cyara, Eggplant, Experitest, IBM, mabl,...
-
Report How A Least Privilege Model Can Reduce Dynamic Access Risks
Applying Zero Trust To Address Overprivileged Employee/Entity Access
Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either...
-
Report The State Of Application Security, 2020
Applications Remain The Top External Attack Method; Don't Get Complacent
May 4, 2020 | Sandy CarielliApplication weaknesses and software vulnerabilities continue to be the most common external attack method. Now is not the time to backslide on your application security efforts. Instead, follow the...
-
Report Zoom Becomes A Product Security Cautionary Tale
CISOs Must Take Extra Steps To Protect Their Firms While Zoom Fixes Critical Flaws
As the global pandemic sent hundreds of thousands of employees to work from home overnight, Zoom quickly rose to worldwide prominence as a central enabling technology. But just as quickly, Zoom...
-
Report Now Tech: Privileged Identity Management, Q2 2020
Forrester's Overview Of 17 Privileged Identity Management Providers
April 2, 2020 | Sean RyanYou can use PIM offerings to reduce exposure to the most damaging types of breaches, comply with a growing list of regulations, replace manual processes for oversight of privileged accounts, and...
-
Report Now Tech: Enterprise Firewalls, Q1 2020
Forrester's Overview Of 18 Enterprise Firewall Providers
March 20, 2020 | David HolmesYou can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...
-
Report Now Tech: Continuous Functional Test Automation Suites, Q1 2020
Forrester's Overview Of 31 Continuous Functional Test Automation Providers
March 5, 2020 | Diego Lo Giudice, Julia CaldwellYou can use continuous functional test automation tools to improve software quality, decrease testing overhead, and deliver value to customers faster. But to realize these benefits, you'll first...
-
Report Now Tech: Public Cloud Development Platforms, Q1 2020
Forrester's Overview Of 16 Public Cloud Development Platform Providers
March 4, 2020 | Dave Bartoletti, John RymerApplication development and delivery (AD&D) pros can use public cloud development platforms to quickly develop and deliver applications to support business innovations and operations automation,...
-
Report Optimize User Experience With Passwordless Authentication
Improve User Experience And Security And Lower The Cost Of Cross-Channel Authentication
With the evolution of numerical computing, the password has lost its ability to protect critical applications and data. This report looks at passwordless authentication, explaining how it can...
- 1
- 2
Content Type
ApplyFilters
Industry
- Public Sector (7)
- Financial Services (4)
- Retail (4)
- Healthcare (3)
- Energy & Utilities (2)
- Manufacturing (2)
- Media & Entertainment (2)
- Consumer Electronics (1)
- Transportation & Logistics (1)
- Travel (1)
Primary Role
- Security & Risk (183)
- Application Development & Delivery (33)
- Infrastructure & Operations (20)
- CIO (6)
Topics
- Web Application Firewalls (WAF) (52)
- API Security (40)
- Container Security (19)
- Dynamic Application Security Testing (DAST) (17)
- Application Penetration Testing Tools (13)
- Runtime Application Self-Protection (RASP) (13)
- Software Composition Analysis (SCA) (5)
- Interactive Application Security Testing (IAST) (1)
Methodology
- Now Tech (46)
- Forrester Tech Tide (39)
- Forrester Wave (23)
- Forrester New Wave (17)
- Business Technographics (11)
- ForecastView (9)
- New Tech (8)
- Infographic (4)
- Online Maturity Assessment (2)
- Maturity Assessment (1)
- Predictions (1)
Region
- Asia Pacific (6)
- North America (1)
Vendor
- Microsoft (39)
- Oracle (33)
- IBM (32)
- Akamai (31)
- Google (29)
- Micro Focus (27)
- Salesforce (25)
- SAP (25)
- Cisco (23)
- Okta (22)
- Alibaba (20)
- CA Technologies (19)
- Centrify (19)
- CyberArk (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- Intel (19)
- Neustar (19)
- Pitney Bowes (19)
- RSA (19)
- SailPoint (19)
- Amazon (16)
- Huawei (16)
- Imperva (12)
- Tencent (12)
- Veracode (8)
- Baidu (6)
- Rackspace (6)
- VMware (6)
- Cloudflare (5)
- Check Point (4)
- Fortinet (4)
- HCL Technologies (4)
- Juniper Networks (4)
- Palo Alto Networks (4)
- OpenText (3)
- Adobe (1)
- Flexera (1)
Analyst
- Sandy Carielli (32)
- Amy DeMartine (22)
- Andrew Hewitt (20)
- Andras Cser (19)
- Diego Lo Giudice (14)
- Sean Ryan (11)
- David Holmes (10)
- Jennifer Adams (9)
- Jeff Pollard (7)
- Heidi Shey (4)
- Merritt Maxim (4)
- Claire O'Malley (2)
- Fatemeh Khatibloo (2)
- Jinan Budge (2)
- Renee Murphy (2)
- Alla Valente (1)
- Art Schoeller (1)
- Charlie Dai (1)
- Cheryl McKinnon (1)
- Danny Mu (1)
- David Mooter (1)
- Enza Iannopollo (1)
- John Bratincevic (1)
- Joseph Blankenship (1)
- Laura Koetzle (1)
- Paul McKay (1)
- Rick Parrish (1)
- Stephanie Balaouras (1)