Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
Search Results
-
Report Secure Your Customers And Protect Your Brand
Executive Overview: The Cybersecurity And Privacy Playbook
Today, CIOs and CTOs are transforming the foundations of their business using a range of technologies. A successful digital transformation must be accompanied by a cybersecurity and privacy...
-
Report Evolve Your IAM Strategy For Your Digital Business
Executive Overview: The Identity And Access Management Playbook
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
-
Blog New Research: Emerging Use Cases And Risks For Biometrics
October 1, 2020 | Merritt MaximBiometric authentication is a powerful technology with many compelling use cases but is not without controversy and distinct risks. What are users’ privacy rights in how biometric information is...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success
Advanced Level: Process For Cybersecurity And Privacy
CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect their brands, they help their firms drive revenue growth and sustained long-term success. This report — the...
-
Report Promote Cybersecurity And Privacy By Utilizing Metrics
Intermediate Level: Process For Cybersecurity And Privacy
The intermediate phase of cybersecurity and privacy maturity relies on establishing metrics and collecting data to drive process improvement. This report — the second of three in the process...
-
Report Build A Strong Foundation For Cybersecurity And Privacy Processes
Beginner Level: Process For Cybersecurity And Privacy
To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and defined processes for critical areas. This report — the first of three in the...
-
Webinar Top Security Technologies To Watch, 2020
Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...
-
Blog The Security Snapshot: Embracing The New Norm
May 14, 2020 | Merritt MaximThe outbreak of the novel coronavirus in early 2020 has created unprecedented societal and economic changes globally. Organizations in many industries and regions now face an uncertain and rapidly...
-
Report Benchmark Your Cybersecurity And Privacy Maturity, 2020
The Benchmark Report In The Cybersecurity And Privacy Playbook
This data-driven report examines the maturity of security and privacy programs at companies around the world. It also looks at how different maturity levels vary in terms of business priorities and...
-
Blog New Technologies Expand The Physical Security Portfolio
April 23, 2020 | Merritt MaximIn this new era of social distancing, the physical security world may seem less relevant. But the digital and physical worlds are converging. These dependent systems are increasingly tested to...
-
Report Forrester Infographic: Differentiate Employee Experience In Smart Building Environments
As the importance of employee experience (EX) grows, where you work matters even more. Today's workplace is undergoing a renaissance of new digitally connected technologies designed to improve...
-
Report The Forrester Tech Tide™: Digital Physical Security And Employee Safety, Q2 2020
Seventeen Technologies Underpin Physical Security And Safety Initiatives
In a world of increasing physical threats ranging from extreme weather to workplace violence, firms are making the safety of their employees a top priority. To accelerate their physical security...
-
Webinar Recapping The 2020 RSA Conference: Forrester’s Perspectives
The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is rapidly becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by...
-
Webinar Predictions 2020: Cybersecurity
In 2020 and beyond, security and risk professionals will discover that cybersecurity decisions have broader societal implications than ever before. Our lives increasingly depend on technology to...
-
Report Now Tech: Managed IAM Services, Q4 2019
Forrester's Overview Of 18 IAM Managed Security Services Providers
You can use managed identity and access management (IAM) services providers to implement IAM faster based on prebuilt integrations and deployment models, adapt to rapidly evolving digital...
-
Report Predictions 2020: Cybersecurity
Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...
-
Blog The Security Snapshot: Shaping The New Cybersecurity Culture
August 29, 2019 | Merritt MaximAll managers understand that both recruiting top talent as well as crafting a winning team and company culture is crucial to high performance. However, 22% of security decision makers note their...
-
Webinar The Security And Privacy Implications Of Drones
Drones are no longer just airborne toys for amateur hobbyists. Organizations increasingly deploy drones in a wide range of applications, from agriculture to maintenance and inspection to law...
-
Blog Broadcom Buys Symantec’s Enterprise Biz: Good News For Investors, Bad News For Enterprises
August 9, 2019 | Merritt MaximYesterday, Broadcom announced a definitive deal to acquire the enterprise business of Symantec for $10.7 billion in cash. This deal caps weeks of speculation that Symantec was in play, initiated in...
-
Report The Top Security Technology Trends To Watch, 2019
Eight Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...
-
Blog Making The Smart City Safe And Secure
July 22, 2019 | Merritt MaximAccording to UN projections, 68% of the world’s population will live in urban areas by 2050. As cities grow, municipal governments are investing in infrastructure and applications to improve...
-
Webinar Biometrics At The Crossroads: The Coming Privacy Versus Usability Battle
July 16, 2019 | Merritt MaximThe last few years have seen a growth in interest in using biometric technologies (including facial, finger, and voice) to drive authentication experiences while improving customer experience. But...
-
Report Making Smart Cities Safe And Secure
Building Secure And Resilient Digital Systems To Serve Citizens
The era of the connected city has arrived, as municipal leaders around the globe invest in new technologies to optimize existing services and improve overall citizen experience. But with these new...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (5)
- Manufacturing (4)
- Public Sector (4)
- Energy & Utilities (3)
- Healthcare (2)
- Transportation & Logistics (2)
- Travel (2)
- Consumer Electronics (1)
- Media & Entertainment (1)
- Retail (1)
Primary Role
- Security & Risk (22)
- CIO (5)
- Infrastructure & Operations (1)
Topics
- Information Security (16)
- Security Operations & Program Governance (15)
- Identity & Access Management (IAM) (10)
- Data & Information Protection (9)
- Business & IT Alignment (6)
- Governance Risk & Compliance (GRC) (6)
- Application Security (4)
- Biometrics (3)
- Cloud Computing (3)
- Internet of Things (IoT) (3)
- Artificial Intelligence (AI) (2)
- Customer Relationship Management (CRM) (2)
- Employee Experience (2)
- Measurement (2)
- Networking (2)
- Pandemic (2)
- Application Management (1)
- Customer Experience Management (1)
- eCommerce (1)
- Enterprise Architecture Domains & Practices (1)
- Financial Management (1)
- Mobile Application Development (1)
- Office Productivity (1)
- Organization (1)
- Program & Project Management (1)
- Systems Management (1)
- Systems Of Engagement (1)
- Tech Sector Economics (1)
Methodology
- Business Technographics (1)
- ForecastView (1)
- Forrester Tech Tide (1)
- Forrester Wave (1)
- Infographic (1)
- New Tech (1)
- Now Tech (1)
- Predictions (1)
Region
- North America (1)