Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Evaluated Vendors And Product Information
March 3, 2021
-
Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
March 3, 2021
Search Results
-
Webinar Adapt Or Die: Use XDR To Scale Your Threat Detection And Response Arm With The Business
Tuesday, April 13, 2021, 11:00 a.m.-12:00 p.m. Eastern time (16:00-17:00 GMT) | Allie MellenIn this webinar, we address the elephant in the room: defining extended detection and response (XDR). Join this webinar to learn what XDR is, what benefits it can bring to security teams, and how...
-
Webinar Top Systemic Risks Of 2021
Wednesday, March 24, 2021, 1:00 p.m.-2:00 p.m. Eastern time (17:00-18:00 GMT) | Renee Murphy, Alla Valente, Salvatore SchianoThey originate as systemic risk events before becoming your current nightmare scenario. These external events impact your firm and your customers but are completely out of your control. Most firms...
-
Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security
Wednesday, March 10, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Andras CserIn this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...
-
Report Now Tech: Enterprise Fraud Management, Q1 2021
Forrester's Overview Of 37 Enterprise Fraud Management Providers
March 2, 2021 | Andras CserYou can use enterprise fraud management (EFM) to catch and reduce fraud, lower customer friction and labor costs, automate transaction risk scoring, and improve business intelligence. But to...
-
Report Forrester Infographic: Static Application Security Testing Usage Aimed At Developers
March 2, 2021 | Sandy CarielliCustomers of the vendors evaluated in "The Forrester Wave™: Static Application Security Testing, Q1 2021" push greater adoption of static application security testing (SAST) as a critical DevSecOps...
-
Report Forrester Infographic: Retail CISO Career Paths
March 2, 2021 | Jeff PollardSeventy-nine percent of retail and consumer product companies from the Fortune 500 have a dedicated CISO with a public presence. To understand the skills, experience, and education that qualify...
-
Report Now Tech: Data Security Platforms, Q1 2021
Forrester's Overview Of 26 Data Security Platform Providers
February 25, 2021 | Heidi SheyYou can use data security platforms to take a data-centric approach to securing data, provide a center of gravity for integration with additional security technologies, and streamline your overall...
-
Report The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021
The Seven Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for cybersecurity risk ratings, we identified the seven most significant providers in the category — BitSight, Black Kite (previously Normshield),...
-
Report Now Tech: European Cybersecurity Consulting Providers, Q1 2021
Forrester's Overview Of 32 European Security Consulting Providers
February 17, 2021 | Paul McKayYou can use European security consulting providers to help construct and gain executive buy in for your security program, accelerate innovation and help you quickly implement your security program....
-
Report Forrester Infographic: CISO Career Paths 2.0
February 10, 2021 | Jeff PollardThis is a 2020 update of our 2017 analysis of CISO backgrounds and current career profiles. We analyzed data from CISOs and heads of security in the Fortune 500 via LinkedIn to understand the...
-
Report Best Practices And Trends: Voice Biometrics
Voice Biometrics Can Improve Security And Customer Experience
Voice biometrics offers improved account access security and user experience. Modern voice biometrics solutions resist replay attacks and have improved in accuracy and performance in the past five...
-
Report The Top Systemic Risks, 2021
Landscape: The Governance, Risk, And Compliance Playbook
They originate as systemic risk events before becoming your current nightmare scenario. These external events impact your firm and your customers but are completely out of your control. Most firms...
-
Report Forrester Infographic: GRC Adoption Is Growing, But Platforms Fail To Wow
February 9, 2021 | Alla ValenteTechnology that ceases to deliver value daily will soon be replaced by a competitor that does. The governance, risk, and compliance (GRC) platform market is no exception. When implemented...
-
Report Business Resiliency Is The Bulwark To A World Defined By Systemic Risk And Chaos
Resiliency Ensures Continuity And The Ability To Pivot To New Opportunities During A Crisis
In times of crisis or sudden risk events, business resiliency practices ensure the uninterrupted delivery of customer products and services, keep employees safe and productive, and minimize the...
-
Report Remove The Mystery From Security Metrics
Performance Management: The S&R Practice Playbook
February 5, 2021 | Jeff PollardCISOs continue to have difficulty creating meaningful security metrics despite a decade of discussion. Without good metrics, the security organization can't participate in business conversations...
-
Webinar How To Secure And Govern Non-Human Identities
February 3, 2021 | Sean RyanDo you know how many software bots, physical robots, or internet of things (IoT) devices are connected to your network? How many of these devices store or interact with critical data? Such...
-
Report Build A High-Performance, Customer-Obsessed Security Organization
Executive Overview: The S&R Practice Playbook
February 2, 2021 | Joseph BlankenshipCISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...
-
Report Introducing The Zero Trust Edge Model For Security And Network Services
Strategic Plan: The Zero Trust Security Playbook
To support the digitalization of a company using cloud and internet of things (IoT), many networking teams turned to SD-WAN. However, SD-WAN doesn't address the new security requirements or the...
-
Report Forrester Infographic: State Of Consumer Authentication 2020
January 27, 2021 | Andras CserCustomers' sentiment about consumer authentication plays a significant role in how S&R, marketing, and CX professionals select the authentication measures and technologies that provide adequate...
-
Report Now Tech: Cloud Security Gateways, Q1 2021
Forrester's Overview Of 16 Cloud Security Gateway Providers
January 26, 2021 | Andras CserYou can use cloud security gateway (CSG, also known as cloud access security broker or CASB) solutions to detect and protect against: 1) data loss, 2) excessive sensitive data access, and 3) use of...
-
Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation
Vision: The Data Security And Privacy Playbook
From data breaches that corrupt business performance and reputation, to privacy violations that hurt consumers, to unwarranted workplace surveillance that diminishes employee trust and experience,...
-
Report A Strategic Guide For Controlling And Securing Your Data
Forrester's Data Security Control Framework
January 19, 2021 | Heidi SheyIn organizations that are complex or that have huge amounts of data, security, risk, and privacy pros often don't know where to start. A Zero Trust approach where data security is a key pillar is...
-
Webinar Privileged Identity Management Suites: The Essentials And The Differentiators
Based On The Forrester Wave™
Learn about the essential capabilities inherent in privileged identity management (PIM) suites along with the differentiating features for addressing new use cases. Key takeaways: Learn about the...
Content Type
ApplyFilters
Industry
- Healthcare (32)
- Financial Services (28)
- Retail (18)
- Public Sector (15)
- Manufacturing (12)
- Transportation & Logistics (6)
- Energy & Utilities (4)
- Media & Entertainment (3)
- Travel (3)
- Consumer Electronics (1)
Topics
- Information Security (321)
- Security Operations & Program Governance (311)
- Data & Information Protection (189)
- Governance Risk & Compliance (GRC) (181)
- Identity & Access Management (IAM) (167)
- Application Security (156)
- Cloud Computing (93)
- Pandemic (83)
- Tech Sector Economics (77)
- Business & IT Alignment (72)
- Employee Experience (56)
- Measurement (53)
- Internet of Things (IoT) (51)
- Networking (49)
- Data Centers & Data Center Networking (45)
- Innovation (38)
- Organization (37)
- Biometrics (29)
- Financial Management (29)
- Telecommunications Services (25)
- Customer Experience Management (21)
- Enterprise Mobility (21)
- Customer Relationship Management (CRM) (20)
- Enterprise Architecture Domains & Practices (17)
- Infrastructure Architectures (15)
- Artificial Intelligence (AI) (14)
- IT Services (14)
- eCommerce (10)
- Sourcing Strategy & Execution (10)
- Packaged Solutions (7)
- Storage (7)
- Systems Management (7)
- Architecture & Technology Strategy (6)
- Branding (6)
- Mobile Application Development (3)
- Program & Project Management (3)
- Enterprise Collaboration (2)
- IT Process Automation (2)
- Planning & Fulfillment (2)
- Application Management (1)
- Business Intelligence (1)
- Data Management (1)
- Market Research (1)
- User Experience (1)
Methodology
- Now Tech (121)
- Forrester Wave (61)
- Forrester New Wave (41)
- Forrester Tech Tide (40)
- Business Technographics (23)
- New Tech (22)
- Maturity Assessment (21)
- Infographic (14)
- Online Maturity Assessment (8)
- Total Economic Impact (TEI) (3)
- Predictions (1)
Region
- Europe (32)
- North America (4)
- Africa (1)
- Middle East (1)
Vendor
- Microsoft (62)
- IBM (61)
- Akamai (45)
- Cisco (43)
- Google (40)
- Oracle (31)
- Okta (29)
- Micro Focus (28)
- Deloitte (27)
- Centrify (26)
- Neustar (26)
- RSA (26)
- SAP (26)
- Imperva (23)
- PwC (23)
- Palo Alto Networks (22)
- Accenture (20)
- CyberArk (20)
- CA Technologies (19)
- Capgemini (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- Intel (19)
- Pitney Bowes (19)
- SailPoint (19)
- Salesforce (19)
- BlackBerry Cylance (16)
- Check Point (16)
- CrowdStrike (16)
- Alibaba (15)
- CenturyLink (14)
- EY (14)
- ServiceNow (14)
- Unisys (14)
- Wipro (14)
- Cognizant (13)
- Cloudflare (12)
- FireEye (12)
- Symantec (12)
- Amazon (11)
- Huawei (11)
- BAE Systems (10)
- Fortinet (10)
- Infosys (10)
- KPMG (10)
- OpenText (9)
- Proofpoint (8)
- Veracode (8)
- Coupa (7)
- Cylance (7)
- Rapid7 (7)
- Tencent (7)
- Atos (6)
- Tata Consultancy Services (TCS) (6)
- HCL Technologies (5)
- VMware (5)
- AT&T (4)
- Carbon Black (4)
- Dell (4)
- DXC Technology (4)
- Juniper Networks (4)
- Varonis (4)
- FICO (3)
- Hewlett Packard Enterprise (HPE) (3)
- NTT DATA (3)
- SAS (3)
- Flexera (1)
- Fujitsu (1)
- ManageEngine (1)
- Rackspace (1)
- Tech Mahindra (1)
Analyst
- Andras Cser (77)
- Heidi Shey (65)
- Paul McKay (56)
- Alla Valente (39)
- Sandy Carielli (39)
- Jeff Pollard (36)
- Enza Iannopollo (31)
- David Holmes (30)
- Sean Ryan (30)
- Chris Sherman (27)
- Renee Murphy (21)
- Merritt Maxim (18)
- Amy DeMartine (17)
- Salvatore Schiano (16)
- Jinan Budge (15)
- Claire O'Malley (13)
- Stephanie Balaouras (10)
- Brian Kime (9)
- Joseph Blankenship (9)
- Andrew Hewitt (3)
- Elsa Pikulik (3)
- Fatemeh Khatibloo (2)
- Naveen Chhabra (2)
- Scott Compton (2)
- Abhijit Sunil (1)
- Allie Mellen (1)
- Andre Kindness (1)
- Andrew Hogan (1)
- Arielle Trzcinski (1)
- Art Schoeller (1)
- David Mooter (1)
- John Bratincevic (1)
- Laura Koetzle (1)
- Mark Bartrick (1)
- Peter Cerrato (1)
- Rick Parrish (1)
- Rob Koplowitz (1)
- Sam Higgins (1)
- Stephanie Liu (1)
- Steve Turner (1)
- Sucharita Kodali (1)