Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Search Results
-
Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security
Wednesday, March 10, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Andras CserIn this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021
The Seven Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for cybersecurity risk ratings, we identified the seven most significant providers in the category — BitSight, Black Kite (previously Normshield),...
-
Report Scoring Our 2020 Cloud Predictions
COVID-19 Delayed Almost All Our Predictions
February 10, 2021 | Tracy WooEvery year, Forrester predicts what lies ahead for cloud in the year to come. But have these predictions proven true over the past year for infrastructure and operations (I&O) professionals? This...
-
Report The State Of Cybersecurity In Indonesia
Indonesian Security Leaders Will Accelerate Their Security Transformation In 2021
Adaptiveness and CX improvements are key business priorities for firms in Indonesia in 2021, and cybersecurity will be crucial to safeguarding these priorities. Indonesia is in the early stages of...
-
Report Lay Your Security Tech Foundation
Beginner Level: Technology Practices For Cybersecurity And Privacy
This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to help...
-
Report The Forrester Tech Tide™: Cloud Governance And Enablement Technologies, Q4 2020
Fourteen Technologies That Underpin Cloud Governance And Enablement
Cloud governance is critical to firms' ability to drive growth, accelerate innovation, and provide flexibility at scale. To accelerate their performance in cloud, companies are evaluating and...
-
Report Now Tech: Cloud Cost Management And Optimization, Q4 2020
Forrester's Overview Of 18 CCMO Providers
November 10, 2020 | Tracy WooYou can use cloud cost management and optimization (CCMO) offerings to visualize your cloud costs, optimize resource usage, and better budget and forecast future spend. But to realize these...
-
Report The Future Of Identity And Access Management
Vision: The Identity And Access Management Playbook
Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...
-
Playbook The Cloud Computing Playbook For 2021
Cloud Services Accelerate Your Pursuit Of Customer Obsession
Confusing cloud definitions and erroneously identified "cloud" solutions impede cloud from becoming a staple in your customer-centric technology portfolio. Forrester offers its cloud computing...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report Forrester Infographic: The State Of The European Cybersecurity Product Market
European Security Leaders Trying To Buy Local Will Struggle To Meet Their Needs
July 8, 2020 | Paul McKayDeveloping a thriving European cybersecurity product market is a key EU digital single market priority in 2020 and beyond. European security leaders would love to buy locally but don't always have...
-
Webinar Top Security Technologies To Watch, 2020
Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...
-
Report The Cloud CX Value Map
Use The CX Value Map To Measure Cloud Success Across Your Organization
June 3, 2020 | Dave Bartoletti, Will McKeon-WhiteAs enterprises expand their cloud usage, infrastructure and operations (I&O) professionals are increasingly cloud intermediaries and must become better "vendors" of services for their internal...
-
Webinar European Security Market Trends, 2020
May 18, 2020 | Paul McKaySecurity leaders in Europe have had to deal with one of the biggest workforce transformations ever known as workers have moved from office work to homeworking to counter the current COVID-19...
-
Report Now Tech: DDoS Mitigation Solutions, Q2 2020
Forrester's Overview Of 22 DDoS Mitigation Solution Providers
April 20, 2020 | David HolmesYou can use DDoS mitigation solutions to protect revenue generated by digital assets, maintain consistent customer experience, and meet availability compliance requirements. But to realize these...
-
Report Cybersecurity Risk Ratings Market Outlook, 2020 And Beyond
CISO Trust And Transparency Issues Drive Market Consolidation And Exits
March 16, 2020 | Paul McKayCybersecurity risk ratings vendors leverage externally available data about a firm to rate its cybersecurity posture. These vendors have now become mainstream despite customers, suppliers, and...
-
Report The Top Trends Driving Cloud Workload Security In 2020
Market Consolidation, SaaS Offerings, And Remediation And DevOps Integration Are Reshaping The CWS Market
March 3, 2020 | Andras CserCloud workload security (CWS) solutions are deployed to detect, mitigate, and prevent cloud misconfigurations, configuration drift, identity and privilege proliferations, and vulnerabilities in...
-
Report Take The Wheel: Build Your Cloud Roadmap Now
Roadmap: The Cloud Computing Playbook
January 30, 2020 | Dave Bartoletti, Lauren NelsonYour customers demand more cloud-enabled experiences. Your business leaders want the latest cloud applications; your developers want new cloud-native tools to deliver software faster; and your tech...
-
Report Scoring Our 2019 Cloud Predictions
We Were Spot-On For Three And Early On Two
January 10, 2020 | Dave Bartoletti, Lauren NelsonEvery year, Forrester predicts what lies ahead for cloud in the year to come. But have these predictions proven true over the past year for infrastructure and operations (I&O) professionals? This...
-
Webinar Predictions 2020: Cloud Computing
As 2019 comes to a close, it is once again time to talk predictions for the upcoming year. This webinar outlines Forrester’s five key cloud predictions that will shape the market for 2020....
-
Report The Forrester Wave™: Cloud Workload Security, Q4 2019
The 13 Providers That Matter Most And How They Stack Up
December 9, 2019 | Andras CserIn our 30-criterion evaluation of cloud workload security (CWS) providers, we identified the 13 most significant ones — Alert Logic, Aqua Security, Bitdefender, Cavirin, Check Point, Cisco,...
-
Report The Forrester Tech Tide™: Identity And Access Management, Q4 2019
Seventeen Technology Categories Underpin The IAM Market
Identity and access management (IAM) is increasingly critical to firms' ability to win, serve, and retain their customers. To accelerate their performance in IAM, companies are evaluating and...
-
Report Predictions 2020: Cloud Computing
New Hyperscale Alliances, Cloud-Native Innovations, And Security Demands Will Reshape The Cloud Battleground — Again
More than any other force, cloud computing has reshaped the business technology landscape. In 2020, cloud application, platform, infrastructure, and management vendors will battle fiercely for...
-
Webinar Tactics For Maximizing Cybersecurity Risk Ratings Solutions
October 15, 2019 | Paul McKay, Trevor LynessCybersecurity risk ratings solutions are becoming a core part of enterprise security and third-party security programs of global companies. Join this webinar to learn the best practices and tactics...
- 1
- 2
Content Type
ApplyFilters
Industry
- Healthcare (9)
- Financial Services (4)
- Retail (4)
- Public Sector (2)
- Consumer Electronics (1)
- Energy & Utilities (1)
- Manufacturing (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
- Travel (1)
Primary Role
- Security & Risk (93)
- Infrastructure & Operations (40)
- eBusiness & Channel Strategy (6)
- CIO (4)
Methodology
- Forrester Tech Tide (35)
- Now Tech (19)
- ForecastView (17)
- Forrester New Wave (11)
- Business Technographics (10)
- Forrester Wave (7)
- Predictions (5)
- Infographic (2)
Region
- Europe (3)
- Africa (1)
- Asia Pacific (1)
- Middle East (1)
- North America (1)
Vendor
- Google (33)
- Microsoft (33)
- Akamai (26)
- IBM (26)
- Neustar (26)
- Oracle (26)
- Salesforce (26)
- SAP (25)
- Cisco (23)
- CA Technologies (19)
- Centrify (19)
- CyberArk (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- Intel (19)
- Micro Focus (19)
- Okta (19)
- Pitney Bowes (19)
- RSA (19)
- SailPoint (19)
- Amazon (14)
- VMware (13)
- Alibaba (8)
- CenturyLink (7)
- Cloudflare (7)
- Huawei (7)
- Imperva (7)
- Tencent (7)
- Apptio (6)
- Flexera (6)
- NTT DATA (6)
- Nutanix (6)
- Pegasystems (6)
- Rackspace (6)
- ServiceNow (6)
- Symantec (4)
- Check Point (3)
- Palo Alto Networks (3)
- Carbon Black (1)
- Infor (1)
- Philips (1)
- SAS (1)
Analyst
- Andras Cser (23)
- David Holmes (11)
- Jennifer Adams (10)
- Paul McKay (10)
- Tracy Woo (10)
- Jeff Pollard (4)
- Jinan Budge (4)
- Lauren Nelson (4)
- Merritt Maxim (3)
- Abhijit Sunil (2)
- Alla Valente (2)
- Amy DeMartine (2)
- Sean Ryan (2)
- Achim Granzen (1)
- Arielle Trzcinski (1)
- Charlie Dai (1)
- Claire O'Malley (1)
- Fatemeh Khatibloo (1)
- Heidi Shey (1)
- Joseph Blankenship (1)
- Laura Koetzle (1)
- Liz Herbert (1)
- Renee Murphy (1)
- Rick Parrish (1)
- Sandy Carielli (1)
- Stephanie Balaouras (1)
- Will McKeon-White (1)