Featured content
The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Charts & Figures
-
Bots Impact Retailers And Their Customers
March 31, 2021
-
Retail Bot Management Adoption
March 31, 2021
-
Search Results
-
Report Q&A: Bot Management In Retail
Bots are prevalent in retail, and if retailers don't manage them properly, they will overwhelm good customer traffic — as highlighted by customers' struggles to buy the recently launched PS5 gaming...
-
Report The Forrester Wave™: External Threat Intelligence Services, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
In our 26-criterion evaluation of external threat intelligence services providers, we identified the 12 most significant ones — CrowdStrike, Digital Shadows, FireEye, Flashpoint, Group-IB, IBM,...
-
Report Best Practices: Mitigating Insider Threat
Processes: The Zero Trust Security Playbook
Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to...
-
Report Top Cybersecurity Threats In 2021
Landscape: The Zero Trust Security Playbook
In light of the 2020 SolarWinds compromise that affected a substantial number of US government agencies, Microsoft, and FireEye, it's tempting in 2021 to focus on defending against supply chain...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...
-
Report How To Integrate Threat Intelligence Into Your Security Program
Reducing Risk And Uncertainty To Your Organization With Threat Intelligence
January 15, 2021 | Brian KimeAn effective security architecture requires insights into your organization's threat landscape, but many S&R professionals are disappointed in the results of their threat intelligence efforts. This...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report Build The Business Case For Cybersecurity And Privacy
Business Case: The Cybersecurity And Privacy Playbook
August 14, 2020 | Sean RyanMega data breaches will often spur organizations to invest in cyber security. However, if the approach is reactive and unplanned, then it's a wasted opportunity. Use this report to structure a...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success
Advanced Level: Process For Cybersecurity And Privacy
CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect their brands, they help their firms drive revenue growth and sustained long-term success. This report — the...
-
Report Job Description: Director Of Threat Intelligence
The Infosec Renaissance Pro
July 13, 2020 | Brian KimeSecurity and risk (S&R) professionals frequently struggle to maximize the value of their investments in threat intelligence solutions. Improperly treating threat intelligence as a technical control...
-
Report Promote Cybersecurity And Privacy By Utilizing Metrics
Intermediate Level: Process For Cybersecurity And Privacy
The intermediate phase of cybersecurity and privacy maturity relies on establishing metrics and collecting data to drive process improvement. This report — the second of three in the process...
-
Report Build A Strong Foundation For Cybersecurity And Privacy Processes
Beginner Level: Process For Cybersecurity And Privacy
To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and defined processes for critical areas. This report — the first of three in the...
-
Report Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
Executive Overview: The Zero Trust Security Playbook
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Report Sell Your Zero Trust Strategy Internally
Gain Advocacy, Support, And Budget For Your Security Vision
June 23, 2020 | Jinan Budge, Chase CunninghamSecurity and risk (S&R) professionals often struggle to obtain buy-in or support from the many stakeholders who will be affected by Zero Trust (ZT) implementations. This report shows S&R leaders...
-
Report The Forrester New Wave™: Connected Medical Device Security, Q2 2020
The Eight Providers That Matter Most And How They Stack Up
June 11, 2020 | Chris ShermanIn Forrester's evaluation of the emerging market for medical device security solutions, we identified the eight most significant providers in the category — Armis, CyberMDX, Cynerio, Forescout,...
-
Webinar Zero Trust Is Moving From Theory To Practice For European Organizations
June 8, 2020 | Paul McKayEuropean organizations are adopting the Zero Trust eXtended (ZTX) ecosystem approach to secure their businesses. They use it to secure their transition to cloud-first strategies and to enable a...
-
Report Now Tech: Zero Trust Solution Providers, Q2 2020
Forrester's Overview Of 38 Zero Trust Solution Providers
May 1, 2020 | Chase CunninghamYou can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...
-
Report How To Implement Zero Trust Security In Europe
Large technology companies and the US federal government have adopted Zero Trust (ZT) as their next-generation security model. 2019 saw Zero Trust enter the European security market. In 2020,...
-
Report New Tech: Medical Device Security, Q1 2020
Forrester's Landscape Overview Of 19 Providers
Connected medical devices are an integral part of modern healthcare providers, but security teams at those organizations struggle to understand and mitigate connected medical devices directly...
-
Report Ignore Geopolitical Risk At Your Peril
Why And How You Must Address Global Cybersecurity Concerns
Failing to formally incorporate geopolitical considerations in your risk management processes could ultimately mean havoc for your international presence, global customer base, third-party...
-
Report Top Cybersecurity Threats In 2020
January 24, 2020 | Josh Zelonis, Sandy CarielliSecurity and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...
-
Report The Business Case For Data Security And Privacy
Business Case: The Data Security And Privacy Playbook
January 23, 2020 | Heidi SheyBusinesses recognize that the consequences of breach, data misuse, or privacy mishaps can be costly. For security, risk, and privacy professionals, building a business case based on the importance...
-
Report Don't Poison Your Employee Experience With The Wrong Approach To Insider Threat
Security Leaders Must Balance Security, Governance, And Employee Privacy
Your colleagues are one of the biggest threats to the security of your organization, but treating them as criminals is obviously not an option. Considerations for employees' privacy, company...
- 1
- 2
Content Type
ApplyFilters
Industry
- Healthcare (25)
- Public Sector (3)
- Consumer Electronics (1)
- Energy & Utilities (1)
- Financial Services (1)
- Manufacturing (1)
- Media & Entertainment (1)
- Retail (1)
- Transportation & Logistics (1)
- Travel (1)
Primary Role
- Security & Risk (117)
- CIO (8)
- Infrastructure & Operations (2)
Methodology
- Business Technographics (17)
- Forrester New Wave (12)
- Forrester Wave (10)
- New Tech (7)
- Now Tech (6)
Region
- North America (9)
- Europe (4)
Vendor
- Akamai (10)
- Cisco (10)
- Google (10)
- Okta (10)
- Palo Alto Networks (10)
- Proofpoint (10)
- Unisys (10)
- BlackBerry Cylance (6)
- Centrify (6)
- Fortinet (6)
- Microsoft (6)
- IBM (5)
- Rapid7 (5)
- Check Point (4)
- CrowdStrike (4)
- FireEye (4)
- Symantec (4)
Analyst
- Chris Sherman (16)
- Brian Kime (15)
- Heidi Shey (8)
- Elsa Pikulik (5)
- Merritt Maxim (5)
- Amy DeMartine (4)
- Sandy Carielli (4)
- Andras Cser (3)
- Claire O'Malley (3)
- Enza Iannopollo (3)
- Jeff Pollard (3)
- Joseph Blankenship (3)
- Paul McKay (3)
- Jinan Budge (2)
- Naveen Chhabra (2)
- Salvatore Schiano (2)
- Sean Ryan (2)
- David Holmes (1)
- Fatemeh Khatibloo (1)
- John Bratincevic (1)
- Laura Koetzle (1)
- Renee Murphy (1)
- Rick Parrish (1)
- Stephanie Balaouras (1)
- Steve Turner (1)
- Sucharita Kodali (1)