Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Now Tech Market Presence Segments: Cloud Security Gateways, Q1 2021
January 26, 2021
-
Now Tech Functionality Segments: Cloud Security Gateways, Q1 2021
January 26, 2021
-
Now Tech Midsize Vendors: Cloud Security Gateways, Q1 2021
January 26, 2021
Search Results
-
Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security
Wednesday, March 10, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Andras CserIn this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...
-
Webinar How To Secure And Govern Non-Human Identities
Wednesday, February 3, 2021, 1:00 p.m.-1:40 p.m. Eastern time (18:00-18:40 GMT) | Sean RyanDo you know how many software bots, physical robots, or internet of things (IoT) devices are connected to your network? How many of these devices store or interact with critical data? Such...
-
Report Now Tech: Cloud Security Gateways, Q1 2021
Forrester's Overview Of 16 Cloud Security Gateway Providers
January 26, 2021 | Andras CserYou can use cloud security gateway (CSG, also known as cloud access security broker or CASB) solutions to detect and protect against: 1) data loss, 2) excessive sensitive data access, and 3) use of...
-
Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation
Vision: The Data Security And Privacy Playbook
From data breaches that corrupt business performance and reputation, to privacy violations that hurt consumers, to unwarranted workplace surveillance that diminishes employee trust and experience,...
-
Report A Strategic Guide For Controlling And Securing Your Data
Forrester's Data Security Control Framework
January 19, 2021 | Heidi SheyIn organizations that are complex or that have huge amounts of data, security, risk, and privacy pros often don't know where to start. A Zero Trust approach where data security is a key pillar is...
-
Webinar Privileged Identity Management Suites: The Essentials And The Differentiators
Based On The Forrester Wave™
Learn about the essential capabilities inherent in privileged identity management (PIM) suites along with the differentiating features for addressing new use cases. Key takeaways: Learn about the...
-
Report How To Integrate Threat Intelligence Into Your Security Program
Reducing Risk And Uncertainty To Your Organization With Threat Intelligence
January 15, 2021 | Brian KimeAn effective security architecture requires insights into your organization's threat landscape, but many S&R professionals are disappointed in the results of their threat intelligence efforts. This...
-
Report The State Of Environmental Sustainability In The Fortune Global 200
Climate Action As A Risk Management And Growth Strategy Takes Center Stage
In 2020, firms had to adapt to a series of risk events — COVID-19, megawildfires, a devastating hurricane season — engendered or magnified by climate change. Leading Fortune Global 200 firms have...
-
Report Optimize Your Human Risk Management Practices To Differentiate
Advanced Level: People Practices For Cybersecurity And Privacy
January 13, 2021 | Jinan BudgeFirms at the advanced stage of cybersecurity and privacy maturity have likely built a positive reputation for responsible data use and enjoy strong employee morale. This report — the last of three...
-
Report Establish Your Human Risk Management For Cybersecurity And Privacy Excellence
Beginner Level: People Practices For Cybersecurity And Privacy
January 13, 2021 | Jinan BudgeIf you're just starting your journey to cybersecurity and privacy maturity, you're not alone. If CIOs, chief information security officers (CISOs), and chief privacy officers (CPOs) establish...
-
Report Drive Growth With Customer Trust And Build Brand Resilience
Advanced Level: Technology Practices For Cybersecurity And Privacy
When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report...
-
Report Lay Your Security Tech Foundation
Beginner Level: Technology Practices For Cybersecurity And Privacy
This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to help...
-
Report Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses
Intermediate Level: Technology Practices For Cybersecurity And Privacy
CIOs and technology leaders in the intermediate phase of cybersecurity and privacy maturity must ensure that security always travels with the data and should position data security and privacy as...
-
Report The Forrester Wave™: Static Application Security Testing, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
January 11, 2021 | Sandy CarielliIn our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...
-
Report The Future Of Cybersecurity And Privacy: Defeat The Data Economy's Demons
The Vision Report In The Cybersecurity And Privacy Playbook
The combination of data and machines could fuel either techno-optimistic utopia (happier, healthier lives for all) or totalitarian dystopia (corporations and governments using personal data to...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report How To Secure And Govern Non-Human Identities
Apply Zero Trust IAM Principles To Secure Software Bots, Physical Robots, And IoT Devices
January 6, 2021 | Sean Ryan, Chase CunninghamDo you know how many software bots, physical robots, or IoT devices are connected to your network? How many of these devices store or interact with critical data? Such nonhumans boost productivity...
-
Report Secure Your Customers And Protect Your Brand
Executive Overview: The Cybersecurity And Privacy Playbook
Today, CIOs and CTOs are transforming the foundations of their business using a range of technologies. A successful digital transformation must be accompanied by a cybersecurity and privacy...
-
Report GRC Vision, 2021 To 2026
Vision: The Governance, Risk, And Compliance Playbook
Risk management professionals should be looking five years into the future to successfully steer their fast-paced businesses. Many key trends will amplify strategic and digital risks and transform...
-
Report Gauge Your ZTX Security Maturity
Assessment: The Zero Trust Security Playbook
December 31, 2020 | Chase CunninghamTo convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros...
-
Report Build Your Identity And Access Management Roadmap
Roadmap: The Identity And Access Management Playbook
You must base your identity and access management (IAM) roadmap on a well-defined strategy that establishes and articulates the business need and value of IAM across your entire organization. Your...
-
Report Now Tech: External Threat Intelligence Services, Q4 2020
Forrester's Overview Of 30 External Threat Intelligence Services Providers
You can use external threat intelligence services to reduce the risk of vulnerability exploitation, protect your brand's reputation, and monitor and track cyberthreats. But to realize these...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Report Operationalize Your Return-To-Work Strategy: Mitigate Privacy Risk
A Return-To-Work Series Report
December 16, 2020 | Enza IannopolloAs local government organizations begin to lift shelter-in-place orders, businesses are finalizing plans to reopen workspaces. But many business leaders remain unsure if the safeguards they...
Content Type
ApplyFilters
Industry
- Healthcare (55)
- Financial Services (52)
- Retail (45)
- Manufacturing (35)
- Public Sector (35)
- Transportation & Logistics (23)
- Energy & Utilities (20)
- Media & Entertainment (19)
- Travel (3)
- Consumer Electronics (2)
Primary Role
- Security & Risk (699)
- CIO (94)
- B2C Marketing (31)
- Sourcing & Vendor Management (16)
- eBusiness & Channel Strategy (7)
- Infrastructure & Operations (7)
- Application Development & Delivery (5)
- CMO (3)
- Customer Experience (2)
Topics
- Information Security (320)
- Security Operations & Program Governance (313)
- Data & Information Protection (232)
- Governance Risk & Compliance (GRC) (196)
- Identity & Access Management (IAM) (178)
- Application Security (160)
- Tech Sector Economics (141)
- Business & IT Alignment (107)
- Cloud Computing (96)
- Employee Experience (75)
- Pandemic (70)
- Internet of Things (IoT) (52)
- IT Services (52)
- Measurement (48)
- Data Centers & Data Center Networking (46)
- Organization (46)
- Innovation (42)
- Networking (33)
- Sourcing & Procurement Applications (33)
- Customer Experience Management (32)
- Artificial Intelligence (AI) (30)
- Financial Management (30)
- Biometrics (29)
- Customer Relationship Management (CRM) (28)
- Enterprise Architecture Domains & Practices (17)
- Storage (16)
- Telecommunications Services (15)
- Customer Intelligence (14)
- Enterprise Mobility (13)
- eCommerce (12)
- Packaged Solutions (12)
- Sourcing Strategy & Execution (12)
- Architecture & Technology Strategy (11)
- Strategy Planning & Governance (10)
- Systems Management (9)
- Branding (8)
- Digital Marketing (7)
- Infrastructure Architectures (7)
- Marketing Methods (7)
- Market Research (6)
- Data Management (5)
- B2B (3)
- Digital Customer Experience (3)
- IT Process Automation (3)
- Marketing Mix Modeling (3)
- Mobile Application Development (3)
- Program & Project Management (3)
- User Experience (3)
- Marketing Measurement (2)
- Office Productivity (2)
- Planning & Fulfillment (2)
- Application Management (1)
- Business Intelligence (1)
- Enterprise Collaboration (1)
- Enterprise Content Management (ECM) (1)
- Marketing Automation (1)
- Product & Solutions Strategies (1)
Methodology
- Now Tech (115)
- Forrester Wave (62)
- Forrester Tech Tide (41)
- Business Technographics (34)
- Forrester New Wave (30)
- Maturity Assessment (25)
- New Tech (22)
- Online Maturity Assessment (9)
- Infographic (6)
- Total Economic Impact (TEI) (5)
- Predictions (3)
Region
- Europe (33)
- North America (19)
- Africa (1)
- Middle East (1)
Vendor
- Microsoft (64)
- IBM (62)
- Oracle (48)
- Akamai (45)
- Cisco (45)
- Google (40)
- SAP (39)
- Okta (29)
- Micro Focus (28)
- Deloitte (27)
- Centrify (26)
- Neustar (26)
- RSA (26)
- Imperva (23)
- PwC (23)
- Palo Alto Networks (22)
- Accenture (20)
- Coupa (20)
- CyberArk (20)
- CA Technologies (19)
- Capgemini (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- Intel (19)
- Pitney Bowes (19)
- SailPoint (19)
- Salesforce (19)
- BlackBerry Cylance (17)
- Check Point (16)
- CrowdStrike (16)
- Alibaba (15)
- CenturyLink (14)
- EY (14)
- ServiceNow (14)
- Unisys (14)
- Wipro (14)
- Cognizant (13)
- Symantec (13)
- Cloudflare (12)
- FireEye (12)
- Amazon (11)
- Huawei (11)
- BAE Systems (10)
- Fortinet (10)
- Infosys (10)
- KPMG (10)
- OpenText (9)
- Proofpoint (8)
- Veracode (8)
- Cylance (7)
- DocuSign (7)
- Rapid7 (7)
- Tencent (7)
- Apttus (6)
- Ariba (6)
- Atos (6)
- Infor (6)
- Tata Consultancy Services (TCS) (6)
- VMware (6)
- HCL Technologies (5)
- AT&T (4)
- Carbon Black (4)
- Dell (4)
- DXC Technology (4)
- Juniper Networks (4)
- Varonis (4)
- FICO (3)
- Hewlett Packard Enterprise (HPE) (3)
- NTT DATA (3)
- SAS (3)
- Citrix (1)
- Flexera (1)
- Fujitsu (1)
- ManageEngine (1)
- Nielsen (1)
- Rackspace (1)
- Tech Mahindra (1)
Analyst
- Andras Cser (72)
- Heidi Shey (60)
- Andrew Bartels (55)
- Paul McKay (50)
- Sandy Carielli (38)
- Enza Iannopollo (36)
- Jeff Pollard (35)
- Alla Valente (34)
- Sean Ryan (31)
- Chris Sherman (27)
- Renee Murphy (25)
- Amy DeMartine (24)
- David Holmes (24)
- Merritt Maxim (22)
- Fatemeh Khatibloo (21)
- Jinan Budge (18)
- Joseph Blankenship (18)
- Salvatore Schiano (17)
- Claire O'Malley (14)
- Stephanie Balaouras (14)
- Brian Kime (9)
- Elsa Pikulik (7)
- Andrew Hewitt (5)
- Martha Bennett (4)
- Stephanie Liu (4)
- Art Schoeller (3)
- Laura Koetzle (3)
- Nigel Fenwick (3)
- Sucharita Kodali (3)
- Anjali Lai (2)
- Arielle Trzcinski (2)
- Caleb Ewald (2)
- Cheryl McKinnon (2)
- David Johnson (2)
- Emily Pfeiffer (2)
- James McQuivey, PhD (2)
- Rick Parrish (2)
- Scott Compton (2)
- Abhijit Sunil (1)
- Andrew Hogan (1)
- Aurelie L'Hostis (1)
- Brian Hopkins (1)
- Chris Gardner (1)
- Craig Le Clair (1)
- David Mooter (1)
- Faith Adams (1)
- George Lawrie (1)
- J. P. Gownder (1)
- Jacob Morgan (1)
- Jeff Lash (1)
- Jim Nail (1)
- John Bratincevic (1)
- Judy Weader (1)
- Julie Ask (1)
- Lauren Nelson (1)
- Lily Varon (1)
- Luis Deya (1)
- Mark Bartrick (1)
- Martin Gill (1)
- Matthew Guarini (1)
- Melissa Parrish (1)
- Michelle Beeson (1)
- Naveen Chhabra (1)
- Paul Miller (1)
- Peter Cerrato (1)
- Reggie Lau (1)
- Sam Higgins (1)
- Sarah Dawson (1)
- Stephen Powers (1)
- Tina Moffett (1)