Skip to main content
15 results in Everything
 
Sort by:
Refine
  • David Holmes
  • Security Operations & Program Governance

Featured content

The Zero Trust Security Playbook For 2021

Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Report The State Of Network Security, 2020 To 2021

    Benchmarks: The Zero Trust Security Playbook
    January 7, 2021 | David Holmes, Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...

  • Report Maintain Security Visibility In The TLS 1.3 Era

    You Have Two Years To Prepare Your Security Tools For TLS 1.3 And DNS-Over-HTTPS
    July 30, 2020 | David Holmes

    New encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Soon, security controls, already starved for...

  • Report Enhance EX With Zero Trust

    Business Case: The Zero Trust Security Playbook
    July 13, 2020 | Andrew Hewitt, David Holmes

    Forrester's Zero Trust (ZT) framework is the modern security architecture blueprint for enterprises. Fundamentally, ZT is about moving away from traditional perimeter-based security approaches and...

  • Report Mitigating Ransomware With Zero Trust

    Bolster Your Defenses With Zero Trust Principles And Techniques
    June 8, 2020 | Chase Cunningham, Josh Zelonis, David Holmes

    Ransomware and malware continue to plague organizations across the globe. Entire industries have been affected and, in some cases, ground to a halt thanks to the scourge of ransomware attacks....

  • Report Now Tech: DDoS Mitigation Solutions, Q2 2020

    Forrester's Overview Of 22 DDoS Mitigation Solution Providers
    April 20, 2020 | David Holmes

    You can use DDoS mitigation solutions to protect revenue generated by digital assets, maintain consistent customer experience, and meet availability compliance requirements. But to realize these...

  • Report A Practical Guide To A Zero Trust Implementation

    Roadmap: The Zero Trust Security Playbook
    January 15, 2020 | Chase Cunningham, David Holmes, Jinan Budge

    Zero Trust is rapidly becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by...

  • Report The Eight Business And Security Benefits Of Zero Trust

    September 25, 2019 | Chase Cunningham, David Holmes, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...