Skip to main content
25 results in Everything
 
Sort by:
Refine
  • Encryption

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report The Four Tenets Of SaaS Application Security And Protection

    Check For ZT Principles For Your SaaS Vendors' Security Stance
    April 16, 2021 | Andras Cser

    As costs of on-premises hosting increase and firms continue to deploy more SaaS apps, firms are now storing sensitive and personally identifiable information in SaaS apps — increasing the overall...

  • Report The Rise Of Anti-Surveillance Capitalism

    The Apparel, Cosmetics, And Technology Shaping Surveillance Resistance And Why It's Time For CISOs To Adopt Them

    Security and risk pros need to weigh surveillance capitalism as a risk to their enterprise. This report will explain how data collected, synthesized, and commercialized by tech companies, data...

  • Report Top Cybersecurity Threats In 2021

    Landscape: The Zero Trust Security Playbook

    In light of the 2020 SolarWinds compromise that affected a substantial number of US government agencies, Microsoft, and FireEye, it's tempting in 2021 to focus on defending against supply chain...

  • Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021

    The 11 Providers That Matter Most And How They Stack Up
    March 3, 2021 | David Holmes

    In our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...

  • Report Operationalize Your Return-To-Work Strategy: Mitigate Privacy Risk

    A Return-To-Work Series Report
    December 16, 2020 | Enza Iannopollo

    As local government organizations begin to lift shelter-in-place orders, businesses are finalizing plans to reopen workspaces. But many business leaders remain unsure if the safeguards they...

  • Forum Data Strategy & Insights

    Thought leadership, strategic direction, and networking opportunities needed to shape your data and analytics strategy for the coming decade.
    October 14, 2020 | Live Virtual Experience | Brandon Purcell, Noel Yuhanna, Boris Evelson

    Are you ready to turn your organization into an insights-driven enterprise? Join more than 20 Forrester analysts, industry speakers, and over 650 data and analytics practitioners for two days at...

  • Webinar Countering TLS 1.3 And DNS-Over-HTTPS

    October 6, 2020 | David Holmes

    New encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Network monitoring must adapt with these new...

  • Report Maintain Security Visibility In The TLS 1.3 Era

    You Have Two Years To Prepare Your Security Tools For TLS 1.3 And DNS-Over-HTTPS
    July 30, 2020 | David Holmes

    New encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Soon, security controls, already starved for...

  • Report Audio: The Long-Term Impact Of Emerging Technology On US Healthcare Providers

    July 1, 2020 | Brian Hopkins, Jeff Becker

    Healthcare CIOs face an unprecedented number of challenges in the coming years: extremely high costs, declining care outcomes, and exhausted employees. This report reveals the impact that emerging...

  • Report Prepare For Decentralized Digital Identity: Security SWOT

    Benefits Of Privacy And Centralization Get Hampered By Lack Of Trust, Early Fragmentation, And Growing Pains Of Wallet Management
    January 21, 2020 | Andras Cser, Sean Ryan

    Decentralized digital identity (DDID) is not just a technology buzzword: It promises a complete restructuring of the currently centralized physical and digital identity ecosystem into a...

  • Report The Top Security Technology Trends To Watch, 2019

    Eight Security And Risk Technologies Will Disrupt Security And Risk Practices

    Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...

  • Webinar Differentiating Capabilities Of Data Security Portfolio Vendors

    Using The Forrester Wave
    June 24, 2019 | Heidi Shey

    Major data security vendors and tech titans like Microsoft and Google have expanded their portfolio of capabilities to approach data security in a holistic and integrated fashion. This expansion...