Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Search Results
-
Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security
Wednesday, March 10, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Andras CserIn this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021
The Seven Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for cybersecurity risk ratings, we identified the seven most significant providers in the category — BitSight, Black Kite (previously Normshield),...
-
Report Now Tech: Cloud Security Gateways, Q1 2021
Forrester's Overview Of 16 Cloud Security Gateway Providers
January 26, 2021 | Andras CserYou can use cloud security gateway (CSG, also known as cloud access security broker or CASB) solutions to detect and protect against: 1) data loss, 2) excessive sensitive data access, and 3) use of...
-
Report Lay Your Security Tech Foundation
Beginner Level: Technology Practices For Cybersecurity And Privacy
This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to help...
-
Report The Future Of Identity And Access Management
Vision: The Identity And Access Management Playbook
Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report Forrester Infographic: The State Of The European Cybersecurity Product Market
European Security Leaders Trying To Buy Local Will Struggle To Meet Their Needs
July 8, 2020 | Paul McKayDeveloping a thriving European cybersecurity product market is a key EU digital single market priority in 2020 and beyond. European security leaders would love to buy locally but don't always have...
-
Webinar Top Security Technologies To Watch, 2020
Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...
-
Report Throw DARTS To Hit Your Zero Trust Targets
Vision: The Zero Trust Security Playbook
June 15, 2020 | Chase Cunningham, Peter CerratoOrganizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...
-
Report Assess Your Cloud Security Readiness
Leverage Forrester's Custom Tool To Assess Your Cloud Security Maturity Across Six Major Technology Competencies
May 29, 2020 | Andras CserAs firms migrate computing and data resources to the cloud, security remains a top concern and priority for both operational and compliance reasons. S&R professionals should use our custom tool, a...
-
Webinar European Security Market Trends, 2020
May 18, 2020 | Paul McKaySecurity leaders in Europe have had to deal with one of the biggest workforce transformations ever known as workers have moved from office work to homeworking to counter the current COVID-19...
-
Report Zero Trust Primer For 5G Security Use Cases
More Bandwidth Means More Data To Protect
May 1, 2020 | Jeff PollardSecurity and risk pros concerned about 5G security will find that the security narrative was hijacked — rightfully — by geopolitical and national security concerns. For enterprise security leaders,...
-
Report Now Tech: DDoS Mitigation Solutions, Q2 2020
Forrester's Overview Of 22 DDoS Mitigation Solution Providers
April 20, 2020 | David HolmesYou can use DDoS mitigation solutions to protect revenue generated by digital assets, maintain consistent customer experience, and meet availability compliance requirements. But to realize these...
-
Report Cybersecurity Risk Ratings Market Outlook, 2020 And Beyond
CISO Trust And Transparency Issues Drive Market Consolidation And Exits
March 16, 2020 | Paul McKayCybersecurity risk ratings vendors leverage externally available data about a firm to rate its cybersecurity posture. These vendors have now become mainstream despite customers, suppliers, and...
-
Report Securing Private 5G At The Edge: Europe Edition
Guide To Securing Private 5G And Edge Computing Use Cases For European Organizations
March 13, 2020 | Paul McKay5G networks are being deployed around Europe in 2020; several countries and telecom operators will bring 5G to the consumer market in 2020 and beyond. You'll find the most compelling 5G use cases...
-
Report The Top Trends Driving Cloud Workload Security In 2020
Market Consolidation, SaaS Offerings, And Remediation And DevOps Integration Are Reshaping The CWS Market
March 3, 2020 | Andras CserCloud workload security (CWS) solutions are deployed to detect, mitigate, and prevent cloud misconfigurations, configuration drift, identity and privilege proliferations, and vulnerabilities in...
-
Report The Forrester Wave™: Cloud Workload Security, Q4 2019
The 13 Providers That Matter Most And How They Stack Up
December 9, 2019 | Andras CserIn our 30-criterion evaluation of cloud workload security (CWS) providers, we identified the 13 most significant ones — Alert Logic, Aqua Security, Bitdefender, Cavirin, Check Point, Cisco,...
-
Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs
Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...
-
Report The Forrester Tech Tide™: Identity And Access Management, Q4 2019
Seventeen Technology Categories Underpin The IAM Market
Identity and access management (IAM) is increasingly critical to firms' ability to win, serve, and retain their customers. To accelerate their performance in IAM, companies are evaluating and...
-
Webinar Tactics For Maximizing Cybersecurity Risk Ratings Solutions
October 15, 2019 | Paul McKay, Trevor LynessCybersecurity risk ratings solutions are becoming a core part of enterprise security and third-party security programs of global companies. Join this webinar to learn the best practices and tactics...
-
Report Best Practices: Cloud Governance
Processes: The Cloud Computing Playbook
Transitioning workloads and data to the cloud is unstoppable — but the most difficult question is how to govern the process so you have a predictable, accountable, and scalable transition that...
-
Webinar Hybrid Cloud Security Best Practices
August 21, 2019 | Andras CserProtecting cloud workloads and their configuration in public, private, and hybrid clouds is a key concern of enterprises. This webinar highlights the drivers and best practices to secure...
-
Report Cybersecurity Risk Ratings Enhance Third-Party Risk Management
Rating Solutions Help Accelerate Third-Party Security Assurance But Can't Replace Essential Processes
July 25, 2019 | Paul McKay, Trevor LynessCybersecurity risk rating solutions are a valuable tool for third-party risk management (TPRM), but both the technology and the way customers use it are still maturing. Security and risk leaders...
-
Report The Public Cloud Market Outlook, 2019 To 2022
Public Cloud Growth Continues To Power Tech Spending
July 2, 2019 | Andrew Bartels, Dave Bartoletti, John RymerPublic cloud infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) have fundamentally reshaped the way enterprises consume technology — and how they...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (4)
- Retail (4)
- Healthcare (2)
- Public Sector (2)
- Consumer Electronics (1)
- Energy & Utilities (1)
- Manufacturing (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
- Travel (1)
Primary Role
- Security & Risk (93)
- CIO (11)
- Infrastructure & Operations (5)
Topics
- Cloud Security (72)
- Public Cloud (22)
- Hybrid Cloud (19)
- Private Cloud (13)
- Hybrid Cloud Management (8)
- Cloud Management (7)
- Cloud Workload Security (CWS) (3)
Methodology
- Forrester Tech Tide (19)
- Now Tech (13)
- Forrester New Wave (11)
- Forrester Wave (5)
- Infographic (2)
- Maturity Assessment (1)
- Online Maturity Assessment (1)
Region
- Europe (6)
- Africa (1)
- Middle East (1)
- North America (1)
Vendor
- Microsoft (27)
- Akamai (26)
- Google (26)
- Neustar (26)
- Cisco (21)
- CA Technologies (19)
- Centrify (19)
- CyberArk (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- IBM (19)
- Intel (19)
- Micro Focus (19)
- Okta (19)
- Oracle (19)
- Pitney Bowes (19)
- RSA (19)
- SailPoint (19)
- Salesforce (19)
- SAP (19)
- Alibaba (7)
- Amazon (7)
- CenturyLink (7)
- Cloudflare (7)
- Huawei (7)
- Imperva (7)
- Tencent (7)
- Symantec (2)
- Check Point (1)
- Palo Alto Networks (1)
Analyst
- Andras Cser (26)
- Paul McKay (13)
- David Holmes (11)
- Jeff Pollard (7)
- Merritt Maxim (3)
- Sean Ryan (3)
- Alla Valente (2)
- Amy DeMartine (2)
- Andrew Bartels (1)
- Claire O'Malley (1)
- Fatemeh Khatibloo (1)
- Heidi Shey (1)
- Jinan Budge (1)
- Joseph Blankenship (1)
- Laura Koetzle (1)
- Lauren Nelson (1)
- Peter Cerrato (1)
- Renee Murphy (1)
- Rick Parrish (1)
- Sandy Carielli (1)
- Stephanie Balaouras (1)