Featured content
The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Search Results
-
Report The Forrester Wave™: Security Analytics Platforms, Q4 2020
The 11 Providers That Matter Most And How They Stack Up
In our 27-criterion evaluation of security analytics platform providers, we identified the 11 most significant ones — Exabeam, FireEye, Gurucul, IBM Security, LogRhythm, Micro Focus, Microsoft,...
-
Report The Forrester Wave™: Global Managed Security Services Providers, Q3 2020
The 15 Providers That Matter Most And How They Stack Up
In our 26-criterion evaluation of global managed security services providers (MSSPs), we identified the 15 most significant ones — Accenture, Alert Logic, AT&T Cybersecurity, Capgemini,...
-
Report Build A Strong Foundation For Cybersecurity And Privacy Processes
Beginner Level: Process For Cybersecurity And Privacy
To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and defined processes for critical areas. This report — the first of three in the...
-
Report Now Tech: Global And Emerging Managed Security Services Providers, Q2 2020
Forrester's Overview Of 42 Global And Emerging Managed Security Services Providers
You can use global managed security services providers (MSSPs) to create space for security leaders, prioritize which activities the security team should focus on, and ease the challenges...
-
Report The Future Of The CISO
Vision: The S&R Practice Playbook
For many security and risk pros, becoming a CISO is challenging, and they find themselves in situations where they're forced to conform, rather than excel. This report outlines types of CISOs,...
-
Report Prevent Fraud And Phishing Attacks With DMARC
Email Authentication Keeps Cybercriminals Out Of Your Inbox
Despite the many security technologies and education in place, phishing and business email compromise remain two of the biggest threats for organizations everywhere. Domain-based Message...
-
Report Ignore Geopolitical Risk At Your Peril
Why And How You Must Address Global Cybersecurity Concerns
Failing to formally incorporate geopolitical considerations in your risk management processes could ultimately mean havoc for your international presence, global customer base, third-party...
-
Report Predictions 2020: Cybersecurity
Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...
-
Report Avoid Corporate Scandal Caused By The Surveillance Economy
A Guide For CISOs To Stop Unethical Surveillance Tactics Before They Start
Welcome to the era of widespread personal surveillance. Organizations have joined the government in collecting, analyzing, and storing oceans of personal data. The private sector is fully engaged...
-
Report Top Recommendations For Your Security Program, 2019
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
Content Type
ApplyFilters
Industry
- Public Sector (1)
Primary Role
- Security & Risk (9)
- CIO (1)
Topics
Methodology
- Forrester Wave (2)
- Now Tech (1)
- Predictions (1)
Vendor
- Accenture (2)
- AT&T (2)
- Capgemini (2)
- CenturyLink (2)
- Cognizant (2)
- Deloitte (2)
- EY (2)
- IBM (2)
- Wipro (2)
- DXC Technology (1)
- Fujitsu (1)
- HCL Technologies (1)
- Infosys (1)
- Rackspace (1)
- Rapid7 (1)
- Tech Mahindra (1)