Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Evaluated Vendors And Product Information
March 3, 2021
-
Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
March 3, 2021
Search Results
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...
-
Report Introducing The Zero Trust Edge Model For Security And Network Services
Strategic Plan: The Zero Trust Security Playbook
To support the digitalization of a company using cloud and internet of things (IoT), many networking teams turned to SD-WAN. However, SD-WAN doesn't address the new security requirements or the...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Webinar Countering TLS 1.3 And DNS-Over-HTTPS
October 6, 2020 | David HolmesNew encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Network monitoring must adapt with these new...
-
Report The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
August 10, 2020 | David HolmesIn our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...
-
Report Maintain Security Visibility In The TLS 1.3 Era
You Have Two Years To Prepare Your Security Tools For TLS 1.3 And DNS-Over-HTTPS
July 30, 2020 | David HolmesNew encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Soon, security controls, already starved for...
-
Report Mitigating Ransomware With Zero Trust
Bolster Your Defenses With Zero Trust Principles And Techniques
June 8, 2020 | Chase Cunningham, Josh Zelonis, David HolmesRansomware and malware continue to plague organizations across the globe. Entire industries have been affected and, in some cases, ground to a halt thanks to the scourge of ransomware attacks....
-
Report Now Tech: DDoS Mitigation Solutions, Q2 2020
Forrester's Overview Of 22 DDoS Mitigation Solution Providers
April 20, 2020 | David HolmesYou can use DDoS mitigation solutions to protect revenue generated by digital assets, maintain consistent customer experience, and meet availability compliance requirements. But to realize these...
-
Report Now Tech: Enterprise Firewalls, Q1 2020
Forrester's Overview Of 18 Enterprise Firewall Providers
March 20, 2020 | David HolmesYou can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...
-
Report The Eight Business And Security Benefits Of Zero Trust
In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...
Content Type
ApplyFilters
Topics
- Information Security (19)
- Security Operations & Program Governance (18)
- Networking (14)
- Business & IT Alignment (13)
- Cloud Computing (11)
- Application Security (10)
- Data & Information Protection (10)
- Pandemic (6)
- Governance Risk & Compliance (GRC) (5)
- Identity & Access Management (IAM) (5)
- Measurement (4)
- Employee Experience (1)
- Infrastructure Architectures (1)
- Sourcing Strategy & Execution (1)
- Tech Sector Economics (1)
Methodology
- Now Tech (13)
- Forrester Wave (8)
Vendor
- Huawei (11)
- Akamai (7)
- Alibaba (7)
- Amazon (7)
- CenturyLink (7)
- Cloudflare (7)
- Google (7)
- Imperva (7)
- Microsoft (7)
- Neustar (7)
- Tencent (7)
- Check Point (4)
- Cisco (4)
- Fortinet (4)
- Juniper Networks (4)
- Palo Alto Networks (4)