Skip to main content
128 results in Everything
 
Sort by:
Refine
  • Secure customers, protect the brand
  • Security & Risk
  • Now Tech

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report Now Tech: Digital Signature And Trust Services, Q1 2021

    Forrester's Overview Of 19 Digital Signature And Trust Services Providers
    March 25, 2021 | Enza Iannopollo

    You can use digital signature and trust services providers to accelerate digital transformation, improve the experience of your employees and customers, while delivering strong compliance,...

  • Report Now Tech: Enterprise Fraud Management, Q1 2021

    Forrester's Overview Of 37 Enterprise Fraud Management Providers
    March 2, 2021 | Andras Cser

    You can use enterprise fraud management (EFM) to catch and reduce fraud, lower customer friction and labor costs, automate transaction risk scoring, and improve business intelligence. But to...

  • Report Now Tech: Data Security Platforms, Q1 2021

    Forrester's Overview Of 26 Data Security Platform Providers
    February 25, 2021 | Heidi Shey

    You can use data security platforms to take a data-centric approach to securing data, provide a center of gravity for integration with additional security technologies, and streamline your overall...

  • Report Now Tech: European Cybersecurity Consulting Providers, Q1 2021

    Forrester's Overview Of 32 European Security Consulting Providers
    February 17, 2021 | Paul McKay

    You can use European security consulting providers to help construct and gain executive buy in for your security program, accelerate innovation and help you quickly implement your security program....

  • Report Now Tech: Cloud Security Gateways, Q1 2021

    Forrester's Overview Of 16 Cloud Security Gateway Providers
    January 26, 2021 | Andras Cser

    You can use cloud security gateway (CSG, also known as cloud access security broker or CASB) solutions to detect and protect against: 1) data loss, 2) excessive sensitive data access, and 3) use of...

  • Report Now Tech: External Threat Intelligence Services, Q4 2020

    Forrester's Overview Of 30 External Threat Intelligence Services Providers
    December 28, 2020 | Brian Kime, Elsa Pikulik

    You can use external threat intelligence services to reduce the risk of vulnerability exploitation, protect your brand's reputation, and monitor and track cyberthreats. But to realize these...

  • Report Now Tech: Managed Detection And Response Services Providers, Q4 2020

    Forrester's Overview Of 42 Managed Detection And Response Providers
    December 16, 2020 | Jeff Pollard

    You can use managed detection and response (MDR) to attain significant expertise to help drive detection and response, become proactive rather than reactive, and choose what the security team will...

  • Report Now Tech: Security Analytics Platforms, Q3 2020

    Forrester's Overview Of 23 Security Analytics Platform Providers
    August 7, 2020 | Josh Zelonis

    You can use security analytics platforms to provide better visibility into your environments, detect threats and support investigations, and orchestrate a response across the environment. But to...

  • Report Now Tech: Static Application Security Testing, Q3 2020

    Forrester's Overview Of 19 SAST Providers
    August 6, 2020 | Sandy Carielli

    You can use static application security testing (SAST) to reduce the time to fix application security weaknesses, improve application delivery speed and predictability, and educate developers on...

  • Report Now Tech: Third-Party Risk Management Technology, Q3 2020

    Forrester's Overview Of 23 Third-Party Risk Management Providers
    August 5, 2020 | Alla Valente

    You can use third-party risk management (TPRM) technology to catalog, classify, and track all third-party relationships, mitigate risks across all states of the third-party lifecycle, and protect...

  • Report Now Tech: Enterprise Email Security Providers, Q3 2020

    Forrester's Overview Of 33 Enterprise Email Security Providers

    You can use enterprise email security to defend against email-borne attacks like phishing, safeguard sensitive data from theft or compromise, and protect your organization's brands. But to realize...

  • Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020

    Forrester's Overview Of 24 CIAM Providers
    June 24, 2020 | Andras Cser

    You can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...

  • Report Now Tech: Network Analysis And Visibility, Q2 2020

    Forrester's Overview Of 24 Network Analysis And Visibility Providers
    June 23, 2020 | Josh Zelonis

    You can use network analysis and visibility (NAV) solutions to identify unmanaged assets, understand how to implement Zero Trust segmentation, and detect threats within your environment. But to...

  • Report Now Tech: Global And Emerging Managed Security Services Providers, Q2 2020

    Forrester's Overview Of 42 Global And Emerging Managed Security Services Providers
    May 8, 2020 | Jeff Pollard, Claire O'Malley

    You can use global managed security services providers (MSSPs) to create space for security leaders, prioritize which activities the security team should focus on, and ease the challenges...

  • Report Now Tech: European Managed Security Services Providers, Q2 2020

    Forrester's Overview Of 30 European Managed Security Services Providers
    May 4, 2020 | Paul McKay

    You can use European managed security services providers (MSSPs) to improve security visibility, enhance response capability, and act as an extension to your security team. But to realize these...

  • Report Now Tech: Zero Trust Solution Providers, Q2 2020

    Forrester's Overview Of 38 Zero Trust Solution Providers
    May 1, 2020 | Chase Cunningham

    You can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...

  • Report Now Tech: DDoS Mitigation Solutions, Q2 2020

    Forrester's Overview Of 22 DDoS Mitigation Solution Providers
    April 20, 2020 | David Holmes

    You can use DDoS mitigation solutions to protect revenue generated by digital assets, maintain consistent customer experience, and meet availability compliance requirements. But to realize these...

  • Report Now Tech: Enterprise Firewalls, Q1 2020

    Forrester's Overview Of 18 Enterprise Firewall Providers
    March 20, 2020 | David Holmes

    You can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...

  • Report Now Tech: European Cybersecurity Incident Response Services, Q1 2020

    Forrester's Overview Of 19 European Cybersecurity Incident Response Providers
    March 10, 2020 | Paul McKay, Josh Zelonis

    You can use European cybersecurity incident response (IR) providers to help you recover from a cybersecurity breach, stress test your cybersecurity IR plan, and support post-breach remediation...

  • Report Now Tech: Enterprise Detection And Response, Q1 2020

    Forrester's Overview Of 29 Enterprise Detection And Response Providers
    February 5, 2020 | Josh Zelonis

    You can use enterprise detection and response (EDR) offerings to improve detection, investigate alerts, and provide remote remediation of compromised systems. But to realize these benefits, you'll...

  • Report Now Tech: Web Application Firewalls, Q4 2019

    Forrester's Overview Of 31 WAF Providers
    December 20, 2019 | Sandy Carielli, Amy DeMartine

    You can use web application firewalls (WAFs) to protect applications, apply consistent and global security policies, and comply with regulations. But to realize these benefits, you'll first have to...

  • Report Now Tech: Governance, Risk, And Compliance Technology, Q4 2019

    Forrester's Overview Of 23 Governance, Risk, And Compliance Providers
    December 13, 2019 | Alla Valente

    You can use governance, risk, and compliance (GRC) technology to protect your customers, business, and brand; proactively respond to emerging risks and evolving regulations; and navigate through...

  • Report Now Tech: Managed IAM Services, Q4 2019

    Forrester's Overview Of 18 IAM Managed Security Services Providers
    December 2, 2019 | Merritt Maxim, Andras Cser, Sean Ryan

    You can use managed identity and access management (IAM) services providers to implement IAM faster based on prebuilt integrations and deployment models, adapt to rapidly evolving digital...

  • Report Now Tech: eDiscovery Service Providers, Q3 2019

    Forrester's Overview Of 35 eDiscovery Service Providers
    September 4, 2019 | Heidi Shey

    You can use eDiscovery service providers to boost expertise, speed, and scale of eDiscovery-related operations, benefit from best-fit technologies for your requirements, and optimize overall...