Featured content
The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Charts & Figures
-
Threat Intelligence Integration At The Tactical Level
January 15, 2021
-
Intelligence Preparation Of The Operational Environment
January 15, 2021
-
Organizations Are Overwhelmed With Threat Intelligence
January 15, 2021
Search Results
-
Report How To Integrate Threat Intelligence Into Your Security Program
Reducing Risk And Uncertainty To Your Organization With Threat Intelligence
January 15, 2021 | Brian KimeAn effective security architecture requires insights into your organization's threat landscape, but many S&R professionals are disappointed in the results of their threat intelligence efforts. This...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report Build The Business Case For Cybersecurity And Privacy
Business Case: The Cybersecurity And Privacy Playbook
August 14, 2020 | Sean RyanMega data breaches will often spur organizations to invest in cyber security. However, if the approach is reactive and unplanned, then it's a wasted opportunity. Use this report to structure a...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success
Advanced Level: Process For Cybersecurity And Privacy
CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect their brands, they help their firms drive revenue growth and sustained long-term success. This report — the...
-
Report Job Description: Director Of Threat Intelligence
The Infosec Renaissance Pro
July 13, 2020 | Brian KimeSecurity and risk (S&R) professionals frequently struggle to maximize the value of their investments in threat intelligence solutions. Improperly treating threat intelligence as a technical control...
-
Report Promote Cybersecurity And Privacy By Utilizing Metrics
Intermediate Level: Process For Cybersecurity And Privacy
The intermediate phase of cybersecurity and privacy maturity relies on establishing metrics and collecting data to drive process improvement. This report — the second of three in the process...
-
Report Build A Strong Foundation For Cybersecurity And Privacy Processes
Beginner Level: Process For Cybersecurity And Privacy
To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and defined processes for critical areas. This report — the first of three in the...
-
Report Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
Executive Overview: The Zero Trust Security Playbook
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Report Sell Your Zero Trust Strategy Internally
Gain Advocacy, Support, And Budget For Your Security Vision
June 23, 2020 | Jinan Budge, Chase CunninghamSecurity and risk (S&R) professionals often struggle to obtain buy-in or support from the many stakeholders who will be affected by Zero Trust (ZT) implementations. This report shows S&R leaders...
-
Report The Forrester New Wave™: Connected Medical Device Security, Q2 2020
The Eight Providers That Matter Most And How They Stack Up
June 11, 2020 | Chris ShermanIn Forrester's evaluation of the emerging market for medical device security solutions, we identified the eight most significant providers in the category — Armis, CyberMDX, Cynerio, Forescout,...
-
Webinar Zero Trust Is Moving From Theory To Practice For European Organizations
June 8, 2020 | Paul McKayEuropean organizations are adopting the Zero Trust eXtended (ZTX) ecosystem approach to secure their businesses. They use it to secure their transition to cloud-first strategies and to enable a...
-
Report Now Tech: Zero Trust Solution Providers, Q2 2020
Forrester's Overview Of 38 Zero Trust Solution Providers
May 1, 2020 | Chase CunninghamYou can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...
-
Report How To Implement Zero Trust Security In Europe
Large technology companies and the US federal government have adopted Zero Trust (ZT) as their next-generation security model. 2019 saw Zero Trust enter the European security market. In 2020,...
-
Report New Tech: Medical Device Security, Q1 2020
Forrester's Landscape Overview Of 19 Providers
Connected medical devices are an integral part of modern healthcare providers, but security teams at those organizations struggle to understand and mitigate connected medical devices directly...
-
Report Ignore Geopolitical Risk At Your Peril
Why And How You Must Address Global Cybersecurity Concerns
Failing to formally incorporate geopolitical considerations in your risk management processes could ultimately mean havoc for your international presence, global customer base, third-party...
-
Report Top Cybersecurity Threats In 2020
Landscape: The Zero Trust Security Playbook
January 24, 2020 | Josh Zelonis, Sandy CarielliSecurity and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...
-
Report The Business Case For Data Security And Privacy
Business Case: The Data Security And Privacy Playbook
January 23, 2020 | Heidi SheyBusinesses recognize that the consequences of breach, data misuse, or privacy mishaps can be costly. For security, risk, and privacy professionals, building a business case based on the importance...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is rapidly becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by...
-
Report Don't Poison Your Employee Experience With The Wrong Approach To Insider Threat
Security Leaders Must Balance Security, Governance, And Employee Privacy
Your colleagues are one of the biggest threats to the security of your organization, but treating them as criminals is obviously not an option. Considerations for employees' privacy, company...
-
Report The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019
The 14 Providers That Matter Most And How They Stack Up
October 29, 2019 | Chase CunninghamIn our 16-criterion evaluation of Zero Trust eXtended (ZTX) ecosystem providers, we identified the 14 most significant ones — Akamai Technologies, Check Point, Cisco, Cyxtera Technologies,...
-
Report Four Technologies Combine To Protect You From Ransomware Attacks
October 18, 2019 | Naveen ChhabraAs the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware. Ransomware attacks do not...
-
Report The Forrester Wave™: Vulnerability Risk Management, Q4 2019
The 13 Providers That Matter Most And How They Stack Up
October 17, 2019 | Josh Zelonis, Trevor LynessIn our 14-criterion evaluation of vulnerability risk management providers, we identified the 13 most significant ones — Brinqa, Digital Defense, Expanse, Kenna Security, NopSec, Outpost24, Qualys,...
-
Webinar When Ransomware Strikes: How To Make The Ransom Payment Decision
October 8, 2019 | Trevor Lyness, Josh ZelonisRansomware attacks on businesses are increasing. And no one wants to pay a ransom when ransomware strikes. However, if ransomware has your business’ operations in a vise, you may find...
- 1
- 2
Content Type
ApplyFilters
Industry
- Healthcare (25)
- Public Sector (3)
- Consumer Electronics (1)
- Energy & Utilities (1)
- Financial Services (1)
- Manufacturing (1)
- Media & Entertainment (1)
- Retail (1)
- Transportation & Logistics (1)
- Travel (1)
Primary Role
- Security & Risk (115)
- CIO (8)
- Infrastructure & Operations (2)
Methodology
- Business Technographics (17)
- Forrester New Wave (12)
- Forrester Wave (9)
- New Tech (7)
- Now Tech (6)
Region
- North America (9)
- Europe (4)
Vendor
- Akamai (10)
- Cisco (10)
- Google (10)
- Okta (10)
- Palo Alto Networks (10)
- Proofpoint (10)
- Unisys (10)
- BlackBerry Cylance (6)
- Centrify (6)
- Fortinet (6)
- Microsoft (6)
- Rapid7 (5)
- Check Point (4)
- Symantec (4)
- IBM (1)
Analyst
- Chris Sherman (16)
- Brian Kime (13)
- Joseph Blankenship (11)
- Heidi Shey (8)
- Merritt Maxim (5)
- Amy DeMartine (4)
- Elsa Pikulik (4)
- Claire O'Malley (3)
- Paul McKay (3)
- Enza Iannopollo (2)
- Jeff Pollard (2)
- Jinan Budge (2)
- Naveen Chhabra (2)
- Salvatore Schiano (2)
- Sandy Carielli (2)
- Sean Ryan (2)
- Andras Cser (1)
- David Holmes (1)
- Fatemeh Khatibloo (1)
- John Bratincevic (1)
- Laura Koetzle (1)
- Renee Murphy (1)
- Rick Parrish (1)
- Stephanie Balaouras (1)