Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
SaaS Application Security Areas
April 16, 2021
-
-
Example Of A Risk-Based Security Policy
April 6, 2021
Search Results
-
Webinar Lessons From The Field: How To Gain Value From Cybersecurity Risk Ratings Platforms
Using The Forrester Wave™
Tuesday, April 20, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Paul McKay, Alla ValenteCybersecurity risk ratings platforms are a divisive topic, with some customers gaining a lot of value from them and others who are less complimentary about their use. Join this webinar to find...
-
Report The Four Tenets Of SaaS Application Security And Protection
Check For ZT Principles For Your SaaS Vendors' Security Stance
April 16, 2021 | Andras CserAs costs of on-premises hosting increase and firms continue to deploy more SaaS apps, firms are now storing sensitive and personally identifiable information in SaaS apps — increasing the overall...
-
Report Modernize Your Approach To Endpoint Governance
Use Risk-Based Security Policies And Standards to Protect Your Evolving Workforce
Remote work has caused massive shifts in how workers use technology, and traditional approaches to endpoint governance have failed due to an outdated focus on protecting network-bound corporate...
-
Report The Rise Of Anti-Surveillance Capitalism
The Apparel, Cosmetics, And Technology Shaping Surveillance Resistance And Why It's Time For CISOs To Adopt Them
Security and risk pros need to weigh surveillance capitalism as a risk to their enterprise. This report will explain how data collected, synthesized, and commercialized by tech companies, data...
-
Report Now Tech: Digital Signature And Trust Services, Q1 2021
Forrester's Overview Of 19 Digital Signature And Trust Services Providers
March 25, 2021 | Enza IannopolloYou can use digital signature and trust services providers to accelerate digital transformation, improve the experience of your employees and customers, while delivering strong compliance,...
-
Report Best Practices: Mitigating Insider Threat
Processes: The Zero Trust Security Playbook
Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to...
-
Report Forrester's Global Map Of Privacy Rights And Regulations, 2021
Keeping up with evolving regulatory requirements is a top challenge for companies around the world. To help, we created an interactive global map of privacy rights and regulations, which provides...
-
Report Top Recommendations For Your Security Program, 2021
Following the mad scramble in 2020 to secure the remote workforce during the global pandemic, 2021 is a time for security leaders to assess their current cybersecurity posture, prioritize...
-
Report The Opportunity, The Unknowns, And The Risks Of Vaccine Passports In The Workplace
Despite The Hype, Employers Must Make Only Modest Changes To Pandemic Protocols
With vaccine rollout occurring around the world, hopes run high of returning to a life free from COVID-19. Vaccine passports promise to quickly turn this hope into a reality, including bringing...
-
Report Top Cybersecurity Threats In 2021
Landscape: The Zero Trust Security Playbook
In light of the 2020 SolarWinds compromise that affected a substantial number of US government agencies, Microsoft, and FireEye, it's tempting in 2021 to focus on defending against supply chain...
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report Now Tech: Data Security Platforms, Q1 2021
Forrester's Overview Of 26 Data Security Platform Providers
February 25, 2021 | Heidi SheyYou can use data security platforms to take a data-centric approach to securing data, provide a center of gravity for integration with additional security technologies, and streamline your overall...
-
Report The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021
The Seven Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for cybersecurity risk ratings, we identified the seven most significant providers in the category — BitSight, Black Kite (previously Normshield),...
-
Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation
Vision: The Data Security And Privacy Playbook
From data breaches that corrupt business performance and reputation, to privacy violations that hurt consumers, to unwarranted workplace surveillance that diminishes employee trust and experience,...
-
Report A Strategic Guide For Controlling And Securing Your Data
Forrester's Data Security Control Framework
January 19, 2021 | Heidi SheyIn organizations that are complex or that have huge amounts of data, security, risk, and privacy pros often don't know where to start. A Zero Trust approach where data security is a key pillar is...
-
Playbook The Data Security And Privacy Playbook For 2021
Protect Your Intellectual Property And Customer Data From Theft And Abuse
Data is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, while privacy...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Report Multinational Firms Must Quickly Adapt To The UK's Divergence From EU Privacy Standards
December 3, 2020 | Enza IannopolloWith Brexit negotiations coming to an end and a deal with the EU still out of sight, data protection matters are more uncertain than ever. Meanwhile, the UK data protection regulator is softening...
-
Webinar Privacy Predictions 2021
Elevate Customer And Employee Privacy As A Strategic Business And Societal Imperative
With values-based consumers watching companies closely and employee privacy posed to become a priority for companies and regulators, 2021 will bring a great deal of change and new risks to...
-
Webinar Countering TLS 1.3 And DNS-Over-HTTPS
October 6, 2020 | David HolmesNew encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Network monitoring must adapt with these new...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report Guard Your Competitive Edge And Maintain Trust With Data Privacy And Security
Executive Overview: The Data Security And Privacy Playbook
August 21, 2020 | Amy DeMartineData is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, while privacy...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report Maintain Security Visibility In The TLS 1.3 Era
You Have Two Years To Prepare Your Security Tools For TLS 1.3 And DNS-Over-HTTPS
July 30, 2020 | David HolmesNew encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Soon, security controls, already starved for...
-
Report Now Tech: Enterprise Email Security Providers, Q3 2020
Forrester's Overview Of 33 Enterprise Email Security Providers
You can use enterprise email security to defend against email-borne attacks like phishing, safeguard sensitive data from theft or compromise, and protect your organization's brands. But to realize...
Content Type
ApplyFilters
Industry
- Healthcare (34)
- Financial Services (16)
- Public Sector (6)
- Retail (6)
- Energy & Utilities (3)
- Manufacturing (3)
- Travel (2)
- Consumer Electronics (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
Topics
- Data Security (140)
- Privacy (119)
- Encryption (22)
- Data Loss Prevention (DLP) (10)
- Data Classification (3)
- Data Discovery & Flow Mapping (2)
Methodology
- Forrester Tech Tide (41)
- Now Tech (29)
- Business Technographics (25)
- Forrester New Wave (23)
- Forrester Wave (20)
- New Tech (7)
- Infographic (2)
- Online Maturity Assessment (2)
- Maturity Assessment (1)
- Predictions (1)
Region
- North America (15)
- Europe (4)
Vendor
- Microsoft (19)
- Cisco (11)
- BlackBerry Cylance (10)
- CrowdStrike (10)
- Palo Alto Networks (10)
- VMware (9)
- Check Point (6)
- FireEye (6)
- OpenText (6)
- Symantec (5)
- Carbon Black (4)
- Dell (4)
- Google (4)
- IBM (4)
- Imperva (4)
- Micro Focus (4)
- Oracle (4)
- Proofpoint (4)
- Varonis (4)
Analyst
- Heidi Shey (45)
- Enza Iannopollo (44)
- Andras Cser (19)
- Chris Sherman (16)
- Paul McKay (16)
- Alla Valente (11)
- David Holmes (10)
- Jeff Pollard (10)
- Joseph Blankenship (7)
- Merritt Maxim (7)
- Jinan Budge (6)
- Sandy Carielli (6)
- Claire O'Malley (5)
- Amy DeMartine (4)
- Renee Murphy (3)
- Salvatore Schiano (3)
- Sean Ryan (3)
- Brian Kime (2)
- Elsa Pikulik (2)
- Fatemeh Khatibloo (2)
- Stephanie Balaouras (2)
- Daniel Hong (1)
- Jess Burn (1)
- Laura Koetzle (1)
- Naveen Chhabra (1)
- Rick Parrish (1)
- Stephanie Liu (1)
- Zhi-Ying Barry (1)