Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Search Results
-
Report Modernize Your Approach To Endpoint Governance
Use Risk-Based Security Policies And Standards to Protect Your Evolving Workforce
Remote work has caused massive shifts in how workers use technology, and traditional approaches to endpoint governance have failed due to an outdated focus on protecting network-bound corporate...
-
Report The Rise Of Anti-Surveillance Capitalism
The Apparel, Cosmetics, And Technology Shaping Surveillance Resistance And Why It's Time For CISOs To Adopt Them
Security and risk pros need to weigh surveillance capitalism as a risk to their enterprise. This report will explain how data collected, synthesized, and commercialized by tech companies, data...
-
Report Forrester Infographic: Global Security Budgets In 2021
March 26, 2021 | Jeff PollardSecurity and risk pros are entering 2021 in unclear circumstances. As the pandemic continues to wax and wane, economic uncertainty makes long-term planning almost impossible. Yet work-from-home...
-
Report Now Tech: Digital Signature And Trust Services, Q1 2021
Forrester's Overview Of 19 Digital Signature And Trust Services Providers
March 25, 2021 | Enza IannopolloYou can use digital signature and trust services providers to accelerate digital transformation, improve the experience of your employees and customers, while delivering strong compliance,...
-
Report Forrester Infographic: European Security Budgets In 2021
March 24, 2021 | Paul McKayIn 2021, security leaders continue to invest differentially in new security controls delivered from the cloud and will rely on security service providers to support their security programs until...
-
Report Best Practices: Mitigating Insider Threat
Processes: The Zero Trust Security Playbook
Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to...
-
Report Future Requirements For IaaS Platform Native Security In 2021 To 2022
Essential Cross-Cloud Services That Should Be Part Of Your Cloud Strategy
March 17, 2021 | Andras CserInfrastructure-as-a-service platform native security (IPNS) plays a crucial role in securing data, workloads, and network communications in public cloud platforms such as Amazon Web Services (AWS),...
-
Report Top Recommendations For Your Security Program, 2021
Following the mad scramble in 2020 to secure the remote workforce during the global pandemic, 2021 is a time for security leaders to assess their current cybersecurity posture, prioritize...
-
Report Top Cybersecurity Threats In 2021
Landscape: The Zero Trust Security Playbook
In light of the 2020 SolarWinds compromise that affected a substantial number of US government agencies, Microsoft, and FireEye, it's tempting in 2021 to focus on defending against supply chain...
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report A Practical Guide To A Zero Trust Implementation
Roadmap: The Zero Trust Security Playbook
Zero Trust is becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by the...
-
Report Forrester Infographic: Static Application Security Testing Usage Aimed At Developers
March 2, 2021 | Sandy CarielliCustomers of the vendors evaluated in "The Forrester Wave™: Static Application Security Testing, Q1 2021" push greater adoption of static application security testing (SAST) as a critical DevSecOps...
-
Report Now Tech: Data Security Platforms, Q1 2021
Forrester's Overview Of 26 Data Security Platform Providers
February 25, 2021 | Heidi SheyYou can use data security platforms to take a data-centric approach to securing data, provide a center of gravity for integration with additional security technologies, and streamline your overall...
-
Report The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021
The Seven Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for cybersecurity risk ratings, we identified the seven most significant providers in the category — BitSight, Black Kite (previously Normshield),...
-
Report Geopolitical Disruption Demands Local Trust
CMOs At Global Brands Must Pivot To Truly Multilocal Operations
February 11, 2021 | Thomas HussonEven before COVID-19, significant economic, political, and tech trends were fragmenting the global order. The pandemic's economic and social crises and associated geopolitical shifts will drive...
-
Report Introducing The Zero Trust Edge Model For Security And Network Services
Strategic Plan: The Zero Trust Security Playbook
To support the digitalization of a company using cloud and internet of things (IoT), many networking teams turned to SD-WAN. However, SD-WAN doesn't address the new security requirements or the...
-
Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation
Vision: The Data Security And Privacy Playbook
From data breaches that corrupt business performance and reputation, to privacy violations that hurt consumers, to unwarranted workplace surveillance that diminishes employee trust and experience,...
-
Report A Strategic Guide For Controlling And Securing Your Data
Forrester's Data Security Control Framework
January 19, 2021 | Heidi SheyIn organizations that are complex or that have huge amounts of data, security, risk, and privacy pros often don't know where to start. A Zero Trust approach where data security is a key pillar is...
-
Report The State Of Cybersecurity In Indonesia
Indonesian Security Leaders Will Accelerate Their Security Transformation In 2021
Adaptiveness and CX improvements are key business priorities for firms in Indonesia in 2021, and cybersecurity will be crucial to safeguarding these priorities. Indonesia is in the early stages of...
-
Report Drive Growth With Customer Trust And Build Brand Resilience
Advanced Level: Technology Practices For Cybersecurity And Privacy
When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report...
-
Report Lay Your Security Tech Foundation
Beginner Level: Technology Practices For Cybersecurity And Privacy
This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to help...
-
Report Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses
Intermediate Level: Technology Practices For Cybersecurity And Privacy
CIOs and technology leaders in the intermediate phase of cybersecurity and privacy maturity must ensure that security always travels with the data and should position data security and privacy as...
-
Report The Forrester Wave™: Static Application Security Testing, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
January 11, 2021 | Sandy CarielliIn our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...
-
Report The Future Of Cybersecurity And Privacy: Defeat The Data Economy's Demons
The Vision Report In The Cybersecurity And Privacy Playbook
The combination of data and machines could fuel either techno-optimistic utopia (happier, healthier lives for all) or totalitarian dystopia (corporations and governments using personal data to...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
Content Type
ApplyFilters
Industry
- Financial Services (3)
- Manufacturing (3)
- Healthcare (2)
- Retail (2)
- Transportation & Logistics (1)
Primary Role
- Security & Risk (108)
- CIO (12)
- Application Development & Delivery (5)
- Infrastructure & Operations (5)
- B2C Marketing (1)
- CMO (1)
Topics
- Network Security (45)
- Zero Trust (40)
- Endpoint Security (10)
- Mobile Security (8)
- Firewalls (7)
- Email Content Security (5)
- Web Content Security (2)
- Antimalware (1)
- Content Security (1)
Methodology
- Forrester Wave (17)
- Now Tech (12)
- Business Technographics (11)
- Infographic (4)
- Maturity Assessment (3)
- Online Maturity Assessment (3)
- ForecastView (2)
- Predictions (2)
- Consumer Technographics (1)
- Forrester New Wave (1)
- Forrester Tech Tide (1)
Region
- Europe (11)
- Asia Pacific (6)
- North America (2)
Vendor
- IBM (8)
- Microsoft (8)
- Cisco (7)
- Palo Alto Networks (7)
- Accenture (5)
- Check Point (5)
- Deloitte (5)
- KPMG (5)
- PwC (5)
- Wipro (5)
- BlackBerry Cylance (4)
- Capgemini (4)
- Google (4)
- Proofpoint (4)
- Symantec (4)
- Akamai (3)
- CrowdStrike (3)
- EY (3)
- Infosys (3)
- NTT DATA (3)
- Okta (3)
- BAE Systems (2)
- Carbon Black (2)
- Cognizant (2)
- Cylance (2)
- Fortinet (2)
- Imperva (2)
- Micro Focus (2)
- OpenText (2)
- Oracle (2)
- Tata Consultancy Services (TCS) (2)
- Tech Mahindra (2)
- Unisys (2)
- Adobe (1)
- Amazon (1)
- Atos (1)
- Centrify (1)
- CenturyLink (1)
- Cloudflare (1)
- Dell (1)
- DXC Technology (1)
- Epsilon (1)
- FireEye (1)
- HCL Technologies (1)
- Hewlett Packard Enterprise (HPE) (1)
- Huawei (1)
- Juniper Networks (1)
- Rapid7 (1)
- Salesforce (1)
- Varonis (1)
- Veracode (1)
- VMware (1)
Analyst
- Andras Cser (17)
- Heidi Shey (17)
- Paul McKay (17)
- Jeff Pollard (16)
- Jinan Budge (14)
- Sandy Carielli (13)
- Enza Iannopollo (12)
- Merritt Maxim (11)
- Claire O'Malley (10)
- David Holmes (9)
- Sean Ryan (9)
- Alla Valente (8)
- Amy DeMartine (7)
- Chris Sherman (6)
- Joseph Blankenship (6)
- Brian Kime (5)
- Elsa Pikulik (5)
- Renee Murphy (4)
- Andre Kindness (3)
- Fatemeh Khatibloo (3)
- Salvatore Schiano (3)
- Stephanie Balaouras (3)
- Abhijit Sunil (2)
- Andrew Hewitt (2)
- Art Schoeller (2)
- Jennifer Adams (2)
- Achim Granzen (1)
- Chris Gardner (1)
- Jess Burn (1)
- John Bratincevic (1)
- Naveen Chhabra (1)
- Peter Cerrato (1)
- Rich Lane (1)
- Sam Higgins (1)
- Sarah Dawson (1)
- Shar VanBoskirk (1)
- Sharyn Leaver (1)
- Steve Turner (1)
- Thomas Husson (1)
- Zhi-Ying Barry (1)