Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Evaluated Vendors And Product Information
March 3, 2021
-
Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
March 3, 2021
Search Results
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report Now Tech: Data Security Platforms, Q1 2021
Forrester's Overview Of 26 Data Security Platform Providers
February 25, 2021 | Heidi SheyYou can use data security platforms to take a data-centric approach to securing data, provide a center of gravity for integration with additional security technologies, and streamline your overall...
-
Report The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021
The Seven Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for cybersecurity risk ratings, we identified the seven most significant providers in the category — BitSight, Black Kite (previously Normshield),...
-
Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation
Vision: The Data Security And Privacy Playbook
From data breaches that corrupt business performance and reputation, to privacy violations that hurt consumers, to unwarranted workplace surveillance that diminishes employee trust and experience,...
-
Report A Strategic Guide For Controlling And Securing Your Data
Forrester's Data Security Control Framework
January 19, 2021 | Heidi SheyIn organizations that are complex or that have huge amounts of data, security, risk, and privacy pros often don't know where to start. A Zero Trust approach where data security is a key pillar is...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Report Multinational Firms Must Quickly Adapt To The UK's Divergence From EU Privacy Standards
December 3, 2020 | Enza IannopolloWith Brexit negotiations coming to an end and a deal with the EU still out of sight, data protection matters are more uncertain than ever. Meanwhile, the UK data protection regulator is softening...
-
Webinar Privacy Predictions 2021
Elevate Customer And Employee Privacy As A Strategic Business And Societal Imperative
With values-based consumers watching companies closely and employee privacy posed to become a priority for companies and regulators, 2021 will bring a great deal of change and new risks to...
-
Webinar Countering TLS 1.3 And DNS-Over-HTTPS
October 6, 2020 | David HolmesNew encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Network monitoring must adapt with these new...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report Guard Your Competitive Edge And Maintain Trust With Data Privacy And Security
Executive Overview: The Data Security And Privacy Playbook
August 21, 2020 | Amy DeMartineData is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, while privacy...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report Maintain Security Visibility In The TLS 1.3 Era
You Have Two Years To Prepare Your Security Tools For TLS 1.3 And DNS-Over-HTTPS
July 30, 2020 | David HolmesNew encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Soon, security controls, already starved for...
-
Report Now Tech: Enterprise Email Security Providers, Q3 2020
Forrester's Overview Of 33 Enterprise Email Security Providers
You can use enterprise email security to defend against email-borne attacks like phishing, safeguard sensitive data from theft or compromise, and protect your organization's brands. But to realize...
-
Report Forrester Infographic: The State Of The European Cybersecurity Product Market
European Security Leaders Trying To Buy Local Will Struggle To Meet Their Needs
July 8, 2020 | Paul McKayDeveloping a thriving European cybersecurity product market is a key EU digital single market priority in 2020 and beyond. European security leaders would love to buy locally but don't always have...
-
Report Video: End User And Administrator Experiences With A Zero Trust Network Access Solution
Kill The VPN For End Users With ZTNA
July 2, 2020 | Chase CunninghamIn the post COVID-19 world there is a lot of talk about eliminating the VPN. Security and risk (S&R) leaders, however, are often hesitant to dive into the deep end on these solutions as they worry...
-
Report A Five-Step Strategy For Data Discovery And Classification
Strategic Plan: The Data Security And Privacy Playbook
June 26, 2020 | Heidi SheyTo protect data and support data governance, security and risk (S&R) pros need to understand what data exists, where it resides, how valuable it is to the firm, and who can use it. This report...
-
Webinar Top Security Technologies To Watch, 2020
Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...
-
Report The Forrester New Wave™: Connected Medical Device Security, Q2 2020
The Eight Providers That Matter Most And How They Stack Up
June 11, 2020 | Chris ShermanIn Forrester's evaluation of the emerging market for medical device security solutions, we identified the eight most significant providers in the category — Armis, CyberMDX, Cynerio, Forescout,...
-
Webinar Employees Return To Work: The Top Regulatory, Legal, And Operational Risks To Prepare For
June 9, 2020 | Enza IannopolloAs employees return to work, companies must identify, assess, and mitigate a wide range of regulatory and legal risks. From undermining employees' privacy rights to requirements for inclusion and...
-
Report Mitigating Ransomware With Zero Trust
Bolster Your Defenses With Zero Trust Principles And Techniques
June 8, 2020 | Chase Cunningham, Josh Zelonis, David HolmesRansomware and malware continue to plague organizations across the globe. Entire industries have been affected and, in some cases, ground to a halt thanks to the scourge of ransomware attacks....
-
Report Governments Must Stop Privacy Abuses While Fighting The Pandemic
How Government Agencies Like The UK National Health Service Must Enforce Strong Data Governance To Protect Citizens
May 4, 2020 | Enza IannopolloIn their battle against COVID-19, several governments and their partners are leveraging technology to collect, process, share, and store data about citizens. As governments turn their attention to...
-
Report The Forrester Wave™: Privacy Management Software, Q1 2020
Tools And Technology: The Data Security And Privacy Playbook
March 30, 2020 | Enza IannopolloIn our 26-criterion evaluation of privacy management software providers, we identified the 15 most significant ones — Crownpeak, DataGrail, LogicGate, LogicManager, Nymity, OneTrust, Poslovna...
-
Webinar Recapping The 2020 RSA Conference: Forrester’s Perspectives
The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week...
-
Report New Tech: Medical Device Security, Q1 2020
Forrester's Landscape Overview Of 19 Providers
Connected medical devices are an integral part of modern healthcare providers, but security teams at those organizations struggle to understand and mitigate connected medical devices directly...
Content Type
ApplyFilters
Industry
- Healthcare (26)
- Financial Services (13)
- Public Sector (4)
- Retail (4)
- Energy & Utilities (3)
- Manufacturing (3)
- Travel (2)
- Consumer Electronics (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
Topics
- Data Security (104)
- Privacy (93)
- Encryption (12)
- Data Loss Prevention (DLP) (4)
- Data Classification (3)
- Data Discovery & Flow Mapping (2)
Methodology
- Forrester New Wave (23)
- Now Tech (22)
- Business Technographics (17)
- Forrester Wave (13)
- New Tech (7)
- Infographic (2)
- Forrester Tech Tide (1)
- Maturity Assessment (1)
- Online Maturity Assessment (1)
- Predictions (1)
Region
- Europe (4)
- North America (1)
Vendor
- Microsoft (12)
- Cisco (8)
- BlackBerry Cylance (6)
- Check Point (6)
- CrowdStrike (6)
- FireEye (6)
- OpenText (6)
- Palo Alto Networks (6)
- Symantec (5)
- VMware (5)
- Dell (4)
- Google (4)
- IBM (4)
- Imperva (4)
- Micro Focus (4)
- Oracle (4)
- Varonis (4)
- Proofpoint (1)
Analyst
- Heidi Shey (42)
- Enza Iannopollo (25)
- Andras Cser (15)
- Chris Sherman (14)
- Paul McKay (14)
- David Holmes (10)
- Jeff Pollard (9)
- Merritt Maxim (7)
- Amy DeMartine (4)
- Sandy Carielli (4)
- Alla Valente (3)
- Claire O'Malley (3)
- Jinan Budge (3)
- Joseph Blankenship (2)
- Renee Murphy (2)
- Salvatore Schiano (2)
- Stephanie Balaouras (2)
- Elsa Pikulik (1)
- Fatemeh Khatibloo (1)
- Laura Koetzle (1)
- Naveen Chhabra (1)
- Rick Parrish (1)
- Sean Ryan (1)
- Stephanie Liu (1)