Featured content
The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Charts & Figures
-
The Threat Intelligence Cycle
January 15, 2021
-
Intelligence Preparation Of The Operational Environment
January 15, 2021
-
Search Results
-
Report How To Integrate Threat Intelligence Into Your Security Program
Reducing Risk And Uncertainty To Your Organization With Threat Intelligence
January 15, 2021 | Brian KimeAn effective security architecture requires insights into your organization's threat landscape, but many S&R professionals are disappointed in the results of their threat intelligence efforts. This...
-
Report Optimize Your Human Risk Management Practices To Differentiate
Advanced Level: People Practices For Cybersecurity And Privacy
January 13, 2021 | Jinan BudgeFirms at the advanced stage of cybersecurity and privacy maturity have likely built a positive reputation for responsible data use and enjoy strong employee morale. This report — the last of three...
-
Report The Forrester Wave™: Static Application Security Testing, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
January 11, 2021 | Sandy CarielliIn our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report Now Tech: External Threat Intelligence Services, Q4 2020
Forrester's Overview Of 30 External Threat Intelligence Services Providers
You can use external threat intelligence services to reduce the risk of vulnerability exploitation, protect your brand's reputation, and monitor and track cyberthreats. But to realize these...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Report Now Tech: Managed Detection And Response Services Providers, Q4 2020
Forrester's Overview Of 42 Managed Detection And Response Providers
December 16, 2020 | Jeff PollardYou can use managed detection and response (MDR) to attain significant expertise to help drive detection and response, become proactive rather than reactive, and choose what the security team will...
-
Report Multinational Firms Must Quickly Adapt To The UK's Divergence From EU Privacy Standards
December 3, 2020 | Enza IannopolloWith Brexit negotiations coming to an end and a deal with the EU still out of sight, data protection matters are more uncertain than ever. Meanwhile, the UK data protection regulator is softening...
-
Report The Forrester Wave™: Security Analytics Platforms, Q4 2020
The 11 Providers That Matter Most And How They Stack Up
In our 27-criterion evaluation of security analytics platform providers, we identified the 11 most significant ones — Exabeam, FireEye, Gurucul, IBM Security, LogRhythm, Micro Focus, Microsoft,...
-
Report Define A Roadmap To Accelerate Your Security Program
Roadmap: The S&R Practice Playbook
Turning strategy into action reveals a CISO's worth. A solid security roadmap is the best way to do this; it guides implementation efforts, shows support for key business initiatives, and explains...
-
Report Gauge Your GRC Program Maturity
Assessment: The Governance, Risk, And Compliance Playbook
Risk management pros must objectively assess their governance, risk, and compliance (GRC) program to identify gaps and highlight strengths to successfully create a roadmap for improvements. This...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report Build The Business Case For Cybersecurity And Privacy
Business Case: The Cybersecurity And Privacy Playbook
August 14, 2020 | Sean RyanMega data breaches will often spur organizations to invest in cyber security. However, if the approach is reactive and unplanned, then it's a wasted opportunity. Use this report to structure a...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report The Top Trends Shaping Anti-Money Laundering In 2020
Robotic Process Automation, Cryptocurrencies, Real-Time Detection, And KYC Processes Gain Importance
August 10, 2020 | Andras CserWith new real-time transactions gaining popularity and new legalized product markets (such as cannabis) emerging, anti-money-laundering (AML) regulations are getting tougher and more complex. This...
-
Report Now Tech: Security Analytics Platforms, Q3 2020
Forrester's Overview Of 23 Security Analytics Platform Providers
August 7, 2020 | Josh ZelonisYou can use security analytics platforms to provide better visibility into your environments, detect threats and support investigations, and orchestrate a response across the environment. But to...
-
Report Maintain Security Visibility In The TLS 1.3 Era
You Have Two Years To Prepare Your Security Tools For TLS 1.3 And DNS-Over-HTTPS
July 30, 2020 | David HolmesNew encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Soon, security controls, already starved for...
-
Report The Forrester Wave™: Global Managed Security Services Providers, Q3 2020
The 15 Providers That Matter Most And How They Stack Up
In our 26-criterion evaluation of global managed security services providers (MSSPs), we identified the 15 most significant ones — Accenture, Alert Logic, AT&T Cybersecurity, Capgemini,...
-
Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success
Advanced Level: Process For Cybersecurity And Privacy
CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect their brands, they help their firms drive revenue growth and sustained long-term success. This report — the...
-
Report Promote Cybersecurity And Privacy By Utilizing Metrics
Intermediate Level: Process For Cybersecurity And Privacy
The intermediate phase of cybersecurity and privacy maturity relies on establishing metrics and collecting data to drive process improvement. This report — the second of three in the process...
-
Report Build A Strong Foundation For Cybersecurity And Privacy Processes
Beginner Level: Process For Cybersecurity And Privacy
To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and defined processes for critical areas. This report — the first of three in the...
-
Report Forrester Infographic: The State Of The European Cybersecurity Product Market
European Security Leaders Trying To Buy Local Will Struggle To Meet Their Needs
July 8, 2020 | Paul McKayDeveloping a thriving European cybersecurity product market is a key EU digital single market priority in 2020 and beyond. European security leaders would love to buy locally but don't always have...
-
Report Video: End User And Administrator Experiences With A Zero Trust Network Access Solution
Kill The VPN For End Users With ZTNA
July 2, 2020 | Chase CunninghamIn the post COVID-19 world there is a lot of talk about eliminating the VPN. Security and risk (S&R) leaders, however, are often hesitant to dive into the deep end on these solutions as they worry...
-
Report Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
Executive Overview: The Zero Trust Security Playbook
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Content Type
ApplyFilters
Industry
- Healthcare (24)
- Financial Services (7)
- Public Sector (4)
- Retail (3)
- Energy & Utilities (2)
- Manufacturing (2)
- Travel (2)
- Consumer Electronics (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
Primary Role
- Security & Risk (297)
- CIO (10)
- Application Development & Delivery (2)
Topics
- Vulnerability & Threat Management (91)
- Data Breach Notifications & Incident Response (55)
- Security Architecture (55)
- Managed Security Services Providers (MSSPs) (20)
- Security Analytics (20)
- Distributed Denial of Service (DDoS) (13)
- Security Information & Event Management (SIEM) (11)
- Threat Intelligence (9)
- Physical Security (7)
- Security User Behavior Analytics (SUBA) (7)
- Security Performance Management (3)
- Security Automation & Orchestration (2)
- Security Patch Management (1)
Methodology
- Now Tech (48)
- Forrester Wave (24)
- Business Technographics (18)
- Maturity Assessment (16)
- Forrester New Wave (12)
- New Tech (7)
- Infographic (3)
- Online Maturity Assessment (3)
- Forrester Tech Tide (1)
- Predictions (1)
Region
- Europe (22)
- North America (1)
Vendor
- IBM (20)
- Microsoft (20)
- Accenture (19)
- Capgemini (19)
- Deloitte (19)
- PwC (15)
- Akamai (14)
- Cisco (14)
- Google (14)
- Cognizant (13)
- EY (13)
- Palo Alto Networks (13)
- Wipro (13)
- BlackBerry Cylance (12)
- CrowdStrike (12)
- FireEye (12)
- CenturyLink (11)
- Infosys (10)
- BAE Systems (9)
- KPMG (9)
- Alibaba (7)
- Amazon (7)
- Check Point (7)
- Cloudflare (7)
- Huawei (7)
- Imperva (7)
- Neustar (7)
- Okta (7)
- Proofpoint (7)
- Tencent (7)
- Unisys (7)
- Atos (6)
- Centrify (6)
- Fortinet (6)
- OpenText (6)
- Rapid7 (6)
- Tata Consultancy Services (TCS) (6)
- HCL Technologies (5)
- VMware (5)
- AT&T (4)
- DXC Technology (4)
- Micro Focus (4)
- Veracode (4)
- FICO (3)
- Hewlett Packard Enterprise (HPE) (3)
- NTT DATA (3)
- SAS (3)
- Symantec (2)
- Fujitsu (1)
- Rackspace (1)
- Tech Mahindra (1)
Analyst
- Heidi Shey (32)
- Paul McKay (28)
- Andras Cser (21)
- Jeff Pollard (17)
- Enza Iannopollo (16)
- Joseph Blankenship (15)
- Chris Sherman (14)
- David Holmes (13)
- Merritt Maxim (13)
- Jinan Budge (12)
- Renee Murphy (11)
- Claire O'Malley (10)
- Sandy Carielli (9)
- Brian Kime (8)
- Salvatore Schiano (7)
- Sean Ryan (6)
- Alla Valente (5)
- Elsa Pikulik (5)
- Amy DeMartine (2)
- Stephanie Balaouras (2)
- Abhijit Sunil (1)
- Art Schoeller (1)
- Fatemeh Khatibloo (1)
- John Bratincevic (1)
- Laura Koetzle (1)
- Naveen Chhabra (1)
- Peter Cerrato (1)
- Rick Parrish (1)
- Sam Higgins (1)
- Sarah Dawson (1)