Featured content
The Zero Trust Security Playbook For 2021
Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Charts & Figures
-
Sample Zero Trust Roadmap
March 3, 2021
-
Zero Trust Maturity Phases
March 3, 2021
-
Threat Intelligence Integration At The Tactical Level
January 15, 2021
Search Results
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...
-
Report How To Integrate Threat Intelligence Into Your Security Program
Reducing Risk And Uncertainty To Your Organization With Threat Intelligence
January 15, 2021 | Brian KimeAn effective security architecture requires insights into your organization's threat landscape, but many S&R professionals are disappointed in the results of their threat intelligence efforts. This...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report Build The Business Case For Cybersecurity And Privacy
Business Case: The Cybersecurity And Privacy Playbook
August 14, 2020 | Sean RyanMega data breaches will often spur organizations to invest in cyber security. However, if the approach is reactive and unplanned, then it's a wasted opportunity. Use this report to structure a...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success
Advanced Level: Process For Cybersecurity And Privacy
CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect their brands, they help their firms drive revenue growth and sustained long-term success. This report — the...
-
Report Promote Cybersecurity And Privacy By Utilizing Metrics
Intermediate Level: Process For Cybersecurity And Privacy
The intermediate phase of cybersecurity and privacy maturity relies on establishing metrics and collecting data to drive process improvement. This report — the second of three in the process...
-
Report Build A Strong Foundation For Cybersecurity And Privacy Processes
Beginner Level: Process For Cybersecurity And Privacy
To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and defined processes for critical areas. This report — the first of three in the...
-
Report Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
Executive Overview: The Zero Trust Security Playbook
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Report The Forrester New Wave™: Connected Medical Device Security, Q2 2020
The Eight Providers That Matter Most And How They Stack Up
June 11, 2020 | Chris ShermanIn Forrester's evaluation of the emerging market for medical device security solutions, we identified the eight most significant providers in the category — Armis, CyberMDX, Cynerio, Forescout,...
-
Webinar Zero Trust Is Moving From Theory To Practice For European Organizations
June 8, 2020 | Paul McKayEuropean organizations are adopting the Zero Trust eXtended (ZTX) ecosystem approach to secure their businesses. They use it to secure their transition to cloud-first strategies and to enable a...
-
Report Now Tech: Zero Trust Solution Providers, Q2 2020
Forrester's Overview Of 38 Zero Trust Solution Providers
May 1, 2020 | Chase CunninghamYou can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...
-
Report How To Implement Zero Trust Security In Europe
Large technology companies and the US federal government have adopted Zero Trust (ZT) as their next-generation security model. 2019 saw Zero Trust enter the European security market. In 2020,...
-
Report New Tech: Medical Device Security, Q1 2020
Forrester's Landscape Overview Of 19 Providers
Connected medical devices are an integral part of modern healthcare providers, but security teams at those organizations struggle to understand and mitigate connected medical devices directly...
-
Report Ignore Geopolitical Risk At Your Peril
Why And How You Must Address Global Cybersecurity Concerns
Failing to formally incorporate geopolitical considerations in your risk management processes could ultimately mean havoc for your international presence, global customer base, third-party...
-
Report Top Cybersecurity Threats In 2020
Landscape: The Zero Trust Security Playbook
January 24, 2020 | Josh Zelonis, Sandy CarielliSecurity and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...
-
Report The Business Case For Data Security And Privacy
Business Case: The Data Security And Privacy Playbook
January 23, 2020 | Heidi SheyBusinesses recognize that the consequences of breach, data misuse, or privacy mishaps can be costly. For security, risk, and privacy professionals, building a business case based on the importance...
-
Report Don't Poison Your Employee Experience With The Wrong Approach To Insider Threat
Security Leaders Must Balance Security, Governance, And Employee Privacy
Your colleagues are one of the biggest threats to the security of your organization, but treating them as criminals is obviously not an option. Considerations for employees' privacy, company...
-
Report The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019
The 14 Providers That Matter Most And How They Stack Up
October 29, 2019 | Chase CunninghamIn our 16-criterion evaluation of Zero Trust eXtended (ZTX) ecosystem providers, we identified the 14 most significant ones — Akamai Technologies, Check Point, Cisco, Cyxtera Technologies,...
-
Report The Forrester Wave™: Vulnerability Risk Management, Q4 2019
The 13 Providers That Matter Most And How They Stack Up
October 17, 2019 | Josh Zelonis, Trevor LynessIn our 14-criterion evaluation of vulnerability risk management providers, we identified the 13 most significant ones — Brinqa, Digital Defense, Expanse, Kenna Security, NopSec, Outpost24, Qualys,...
-
Webinar When Ransomware Strikes: How To Make The Ransom Payment Decision
October 8, 2019 | Trevor Lyness, Josh ZelonisRansomware attacks on businesses are increasing. And no one wants to pay a ransom when ransomware strikes. However, if ransomware has your business’ operations in a vise, you may find...
-
Report Forrester's Guide To Paying Ransomware
Paying Ransom Can Be A Valid Recovery Option Based On Business Need And Circumstances
June 5, 2019 | Josh Zelonis, Trevor LynessConventional wisdom says that when your company suffers a ransomware attack, you should never pay the ransom. But hardline conversations about whether to negotiate with cybercriminals takes a...
-
Report Best Practices: Medical Device Security
Control Your Hospital's Expanding Device Risk Exposure
Healthcare providers struggle to understand and mitigate medical device risk, particularly devices connected to the hospital network and directly involved in patient care. Meanwhile, patients...
Content Type
ApplyFilters
Industry
- Healthcare (23)
- Public Sector (3)
- Consumer Electronics (1)
- Energy & Utilities (1)
- Financial Services (1)
- Manufacturing (1)
- Media & Entertainment (1)
- Retail (1)
- Transportation & Logistics (1)
- Travel (1)
Primary Role
- Security & Risk (76)
- CIO (8)
Methodology
- Forrester New Wave (12)
- Business Technographics (9)
- New Tech (7)
- Forrester Wave (6)
- Now Tech (6)
Region
- Europe (1)
- North America (1)
Vendor
- Akamai (7)
- Cisco (7)
- Google (7)
- Okta (7)
- Palo Alto Networks (7)
- Proofpoint (7)
- Unisys (7)
- BlackBerry Cylance (6)
- Centrify (6)
- Fortinet (6)
- Microsoft (6)
- Rapid7 (5)
- Check Point (1)
- IBM (1)
- Symantec (1)
Analyst
- Chris Sherman (14)
- Heidi Shey (8)
- Brian Kime (6)
- Merritt Maxim (5)
- Elsa Pikulik (4)
- Paul McKay (3)
- Claire O'Malley (2)
- Enza Iannopollo (2)
- Jeff Pollard (2)
- Joseph Blankenship (2)
- Salvatore Schiano (2)
- Sandy Carielli (2)
- Sean Ryan (2)
- Andras Cser (1)
- David Holmes (1)
- Fatemeh Khatibloo (1)
- Jinan Budge (1)
- John Bratincevic (1)
- Laura Koetzle (1)
- Renee Murphy (1)
- Rick Parrish (1)
- Stephanie Balaouras (1)
- Steve Turner (1)