Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
The Zero Trust eXtended Ecosystem
August 11, 2020
-
Search Results
-
Webinar The New, Unstable Normal Roundtable: How COVID-19 Will Change Business And Technology Forever
Europe-Friendly Start Time
The lasting impact of COVID-19 and the high likelihood of future pandemics will usher in five macro shifts that will fundamentally change business and technology: 1) Customer expectations will...
-
Webinar How To Build New Digital Products
For companies looking to expand revenue through digital capabilities, adding new digital products can seem like an easy option. But building new digital products is fundamentally different from...
-
Webinar The New, Unstable Normal Roundtable: How COVID-19 Will Change Business And Technology Forever
The lasting impact of COVID-19 and the high likelihood of future pandemics will usher in five macro shifts that will fundamentally change business and technology: 1) Customer expectations will...
-
Report Build The Business Case For Cybersecurity And Privacy
Business Case: The Cybersecurity And Privacy Playbook
August 14, 2020 | Sean RyanMega data breaches will often spur organizations to invest in cyber security. However, if the approach is reactive and unplanned, then it's a wasted opportunity. Use this report to structure a...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
August 10, 2020 | David HolmesIn our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...
-
Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success
Advanced Level: Process For Cybersecurity And Privacy
CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect their brands, they help their firms drive revenue growth and sustained long-term success. This report — the...
-
Report Promote Cybersecurity And Privacy By Utilizing Metrics
Intermediate Level: Process For Cybersecurity And Privacy
The intermediate phase of cybersecurity and privacy maturity relies on establishing metrics and collecting data to drive process improvement. This report — the second of three in the process...
-
Report Build A Strong Foundation For Cybersecurity And Privacy Processes
Beginner Level: Process For Cybersecurity And Privacy
To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and defined processes for critical areas. This report — the first of three in the...
-
Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020
Forrester's Overview Of 24 CIAM Providers
June 24, 2020 | Andras CserYou can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...
-
Webinar Benchmark Your Supply Chain And Digitally Disrupt Your Market
June 24, 2020 | George LawrieTo stay ahead of restless and demanding customers, application development and delivery professionals must commit to digital supply chain transformation. With the prospect of major disruption to...
-
Report Now Tech: Network Analysis And Visibility, Q2 2020
Forrester's Overview Of 24 Network Analysis And Visibility Providers
June 23, 2020 | Josh ZelonisYou can use network analysis and visibility (NAV) solutions to identify unmanaged assets, understand how to implement Zero Trust segmentation, and detect threats within your environment. But to...
-
Report Use Privileged Identity Management Pricing Insight For Buyer Advantage
Understand Pricing Mechanics To Optimize Your PIM Procurement
Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...
-
Report Throw DARTS To Hit Your Zero Trust Targets
Vision: The Zero Trust Security Playbook
June 15, 2020 | Chase Cunningham, Peter CerratoOrganizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...
-
Report Build A Developer Security Champions Program
Developer Security Champions Scale Your Team And Address Application Security Issues Closer To The Source
June 12, 2020 | Sandy CarielliFirms that want to secure applications are challenged by understaffed security teams and lack of security awareness on the part of developers. Developer security champions are developers who act as...
-
Report Mitigating Ransomware With Zero Trust
Bolster Your Defenses With Zero Trust Principles And Techniques
June 8, 2020 | Chase Cunningham, Josh Zelonis, David HolmesRansomware and malware continue to plague organizations across the globe. Entire industries have been affected and, in some cases, ground to a halt thanks to the scourge of ransomware attacks....
-
Report Now Tech: Zero Trust Solution Providers, Q2 2020
Forrester's Overview Of 38 Zero Trust Solution Providers
May 1, 2020 | Chase CunninghamYou can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...
-
Report How To Implement Zero Trust Security In Europe
Large technology companies and the US federal government have adopted Zero Trust (ZT) as their next-generation security model. 2019 saw Zero Trust enter the European security market. In 2020,...
-
Report Now Tech: Enterprise Firewalls, Q1 2020
Forrester's Overview Of 18 Enterprise Firewall Providers
March 20, 2020 | David HolmesYou can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...
-
Report 2020 To 2021 US Tech Budgets: The Industry Outlook
CIOs Should Tighten Their 2020 To 2021 Tech Budgets Based On Slowing But Still Positive US Economic Growth
March 3, 2020 | Andrew BartelsThe US tech budget outlook for 2020 and 2021 is getting darker, but growth will still be positive with a low risk of an actual downturn. In this report, we provide our 2020 to 2021 forecasts for...
-
Report The Top Trends Shaping IAM In 2020
Landscape: The Identity And Access Management Playbook
Identity is a core building block of a robust Zero Trust security ecosystem and infrastructure. In this report, we look at the eight most important trends that will shape the identity and access...
-
Webinar Forrester Event Roundup: CES 2020 And What It Means For Your Business
CES is the premier consumer technology event on the calendar. In recent years, CES has morphed into a broad tech innovation conference with an ever-increasing number of connected products using the...
-
Report Justify Security Budget By Its Impact On Maturity
Business Case: The S&R Practice Playbook
Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...
-
Report Build The Business Case For GRC
Business Case: The Governance, Risk, And Compliance Playbook
The business case for governance, risk management, and compliance (GRC) efforts too often relies on the fear of costly events or regulatory action. This report helps GRC leaders elevate the...
-
Webinar Global Tech Market Outlook Update For 2020 To 2021
Settling Into A Slow Growth Mode
January 7, 2020 | Andrew BartelsForrester updates its forecast for business and government purchases of information and communications technologies globally and by region for 2020 and 2021.Key takeaways: Slowing economic growth...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (21)
- Manufacturing (21)
- Retail (20)
- Healthcare (17)
- Transportation & Logistics (17)
- Energy & Utilities (16)
- Public Sector (16)
- Media & Entertainment (15)
- Consumer Electronics (1)
Primary Role
- Security & Risk (70)
- CIO (30)
- eBusiness & Channel Strategy (3)
- Application Development & Delivery (1)
- CMO (1)
Topics
- Digital Business (58)
- Business Value (22)
- Business Technology (BT) (19)
- Digital Transformation (18)
- Digital Disruption (2)
Methodology
- Now Tech (19)
- Forrester Wave (5)
- Total Economic Impact (TEI) (3)
- Maturity Assessment (1)
Region
- North America (17)
- Europe (3)
Vendor
- Cisco (11)
- Palo Alto Networks (11)
- Fortinet (10)
- Akamai (7)
- Google (7)
- Okta (7)
- Proofpoint (7)
- Unisys (7)
- BlackBerry Cylance (6)
- Centrify (6)
- Microsoft (6)
- Check Point (5)
- Huawei (4)
- Juniper Networks (4)
- IBM (1)
- Symantec (1)
Analyst
- Andrew Bartels (19)
- David Holmes (12)
- Andras Cser (9)
- Renee Murphy (5)
- Sean Ryan (5)
- Alla Valente (4)
- Elsa Pikulik (3)
- Merritt Maxim (3)
- Nigel Fenwick (3)
- Paul McKay (3)
- Jeff Pollard (2)
- Martha Bennett (2)
- Sandy Carielli (2)
- Anjali Lai (1)
- Aurelie L'Hostis (1)
- Brian Hopkins (1)
- Cheryl McKinnon (1)
- Claire O'Malley (1)
- Enza Iannopollo (1)
- George Lawrie (1)
- Heidi Shey (1)
- Jacob Morgan (1)
- James McQuivey, PhD (1)
- Jeff Lash (1)
- Julie Ask (1)
- Laura Koetzle (1)
- Luis Deya (1)
- Martin Gill (1)
- Melissa Parrish (1)
- Michelle Beeson (1)
- Naveen Chhabra (1)
- Paul Miller (1)
- Peter Cerrato (1)
- Salvatore Schiano (1)
- Stephanie Balaouras (1)
- Sucharita Kodali (1)