Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Forrester Wave™: Enterprise Email Security, Q2 2019
May 16, 2019
-
-
Evaluated Vendors And Product Information
May 16, 2019
Search Results
-
Report Build A High-Performance, Customer-Obsessed Security Organization
Executive Overview: The S&R Practice Playbook
February 2, 2021 | Joseph BlankenshipCISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...
-
Report The Forrester Wave™: Security Analytics Platforms, Q4 2020
The 11 Providers That Matter Most And How They Stack Up
In our 27-criterion evaluation of security analytics platform providers, we identified the 11 most significant ones — Exabeam, FireEye, Gurucul, IBM Security, LogRhythm, Micro Focus, Microsoft,...
-
Webinar Cybersecurity Predictions 2021
This webinar provides a deep dive on our five cybersecurity predictions slated to take place in 2021. CISOs and other security leaders will learn what will happen, why, and what to do about it in...
-
Report Now Tech: Enterprise Email Security Providers, Q3 2020
Forrester's Overview Of 33 Enterprise Email Security Providers
You can use enterprise email security to defend against email-borne attacks like phishing, safeguard sensitive data from theft or compromise, and protect your organization's brands. But to realize...
-
Report Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
Executive Overview: The Zero Trust Security Playbook
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Report Prevent Fraud And Phishing Attacks With DMARC
Email Authentication Keeps Cybercriminals Out Of Your Inbox
Despite the many security technologies and education in place, phishing and business email compromise remain two of the biggest threats for organizations everywhere. Domain-based Message...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is rapidly becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by...
-
Report Don't Poison Your Employee Experience With The Wrong Approach To Insider Threat
Security Leaders Must Balance Security, Governance, And Employee Privacy
Your colleagues are one of the biggest threats to the security of your organization, but treating them as criminals is obviously not an option. Considerations for employees' privacy, company...
-
Report Best Practices: Phishing Prevention
Protect Against Email-Borne Threats With Forrester's Layered Approach
Attackers use phishing and other social engineering tactics to infiltrate corporate networks. Advances in malicious email protection can recognize and stop obvious phishing attempts, but...
-
Report Reverse Cybersecurity's Self-Inflicted Staffing Shortage
Adopt More Realistic Expectations And More Effective Hiring Practices
Every day, we hear news stories, speeches, and vendor pitches that lament our acute cybersecurity talent shortage, one that will take years to address. However, the shortage is largely...
-
Report Best Practices: Mitigating Insider Threats
Defend Your Organization Against The Threats Insiders Pose
Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to...
-
Report The Forrester Wave™: Enterprise Email Security, Q2 2019
The 12 Providers That Matter Most And How They Stack Up
May 16, 2019 | Joseph BlankenshipIn our 32-criterion evaluation of enterprise email content security providers, we identified the 12 most significant ones — Barracuda, Cisco, Clearswift, Forcepoint, Microsoft, Mimecast,...
-
Report Top Recommendations For Your Security Program, 2019
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Report Recruiting And Retaining Insider Threat Analysts
To Avoid An Embarrassing And Devastating Insider Attack, Hire Dedicated Analysts
March 7, 2019 | Joseph BlankenshipWhether accidental or malicious, insider incidents can result in fraud, privacy abuses, IP theft, and other damage. It's difficult for security pros to detect this activity because insiders need...
-
Report New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019
Forrester's Landscape Overview Of 21 Providers
A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems,...
-
Report How Insiders Use The Dark Web To Sell Your Data
Financial Services Firms Need To Prioritize Monitoring For Insider Threats
February 28, 2019 | Joseph BlankenshipFinancial gain is one of the primary reasons malicious insiders steal valuable data or sell access to sensitive systems. The internet connects buyers and sellers of sensitive data, making it easy...
Content Type
ApplyFilters
Industry
- Manufacturing (1)
Topics
- Security Operations & Program Governance (27)
- Employee Experience (21)
- Information Security (12)
- Identity & Access Management (IAM) (7)
- Tech Sector Economics (7)
- Data & Information Protection (6)
- Networking (2)
- Organization (2)
- Application Management (1)
- Application Security (1)
- Business & IT Alignment (1)
- Business Intelligence (1)
- Cloud Computing (1)
- Governance Risk & Compliance (GRC) (1)
- Measurement (1)
- Pandemic (1)
Methodology
- Forrester Wave (5)
- Business Technographics (1)
- New Tech (1)
- Now Tech (1)
Region
- North America (1)
Vendor
- Cisco (4)
- Microsoft (4)
- Proofpoint (4)