Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Focus On Four Technology Areas To Drive Cybersecurity And Privacy
January 11, 2021
-
Focus On Four Technology Areas To Drive Cybersecurity And Privacy
January 11, 2021
-
Focus On Four Technology Areas To Drive Cybersecurity And Privacy
January 11, 2021
Search Results
-
Webinar How To Secure And Govern Non-Human Identities
Wednesday, February 3, 2021, 1:00 p.m.-1:40 p.m. Eastern time (18:00-18:40 GMT) | Sean RyanDo you know how many software bots, physical robots, or internet of things (IoT) devices are connected to your network? How many of these devices store or interact with critical data? Such...
-
Report The State Of Cybersecurity In Indonesia
Indonesian Security Leaders Will Accelerate Their Security Transformation In 2021
Adaptiveness and CX improvements are key business priorities for firms in Indonesia in 2021, and cybersecurity will be crucial to safeguarding these priorities. Indonesia is in the early stages of...
-
Report Drive Growth With Customer Trust And Build Brand Resilience
Advanced Level: Technology Practices For Cybersecurity And Privacy
When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report...
-
Report Lay Your Security Tech Foundation
Beginner Level: Technology Practices For Cybersecurity And Privacy
This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to help...
-
Report Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses
Intermediate Level: Technology Practices For Cybersecurity And Privacy
CIOs and technology leaders in the intermediate phase of cybersecurity and privacy maturity must ensure that security always travels with the data and should position data security and privacy as...
-
Report The Forrester Wave™: Static Application Security Testing, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
January 11, 2021 | Sandy CarielliIn our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...
-
Report The Future Of Cybersecurity And Privacy: Defeat The Data Economy's Demons
The Vision Report In The Cybersecurity And Privacy Playbook
The combination of data and machines could fuel either techno-optimistic utopia (happier, healthier lives for all) or totalitarian dystopia (corporations and governments using personal data to...
-
Report The State Of Network Security, 2020 To 2021
Benchmarks: The Zero Trust Security Playbook
This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2020 to...
-
Report How To Secure And Govern Non-Human Identities
Apply Zero Trust IAM Principles To Secure Software Bots, Physical Robots, And IoT Devices
January 6, 2021 | Sean Ryan, Chase CunninghamDo you know how many software bots, physical robots, or IoT devices are connected to your network? How many of these devices store or interact with critical data? Such nonhumans boost productivity...
-
Report Gauge Your ZTX Security Maturity
Assessment: The Zero Trust Security Playbook
December 31, 2020 | Chase CunninghamTo convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros...
-
Report Now Tech: External Threat Intelligence Services, Q4 2020
Forrester's Overview Of 30 External Threat Intelligence Services Providers
You can use external threat intelligence services to reduce the risk of vulnerability exploitation, protect your brand's reputation, and monitor and track cyberthreats. But to realize these...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Report Evolve Your IAM Strategy For Your Digital Business
Executive Overview: The Identity And Access Management Playbook
New business models have extended the identity boundaries of today's digital businesses: Security and risk (S&R) pros must manage identities and access across populations (employees, partners, and...
-
Report Multinational Firms Must Quickly Adapt To The UK's Divergence From EU Privacy Standards
December 3, 2020 | Enza IannopolloWith Brexit negotiations coming to an end and a deal with the EU still out of sight, data protection matters are more uncertain than ever. Meanwhile, the UK data protection regulator is softening...
-
Webinar Transform Enterprise Security With The Zero Trust Edge
November 10, 2020 | David HolmesEnterprise security architecture has struggled because we have to interface with the most toxic network ever built — the public internet. It was designed to withstand nuclear attacks and to...
-
Webinar Cybersecurity Predictions 2021
This webinar provides a deep dive on our five cybersecurity predictions slated to take place in 2021. CISOs and other security leaders will learn what will happen, why, and what to do about it in...
-
Report Forrester Predictions 2021: Accelerating Out Of The Crisis
October 28, 2020 | Sharyn Leaver2020 shattered the status quo. In 2021, advanced organizations will adapt and use the upheaval to forge a competitive edge. Discover your organization's path to success. Read Forrester's 2021...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Webinar The Future Of Endpoint Management And Security Is Now
The COVID-19 pandemic has accelerated the shift toward modern endpoint management and security. To improve scalability, business continuity, security, and digital employee experience, organizations...
-
Report Build The Business Case For Cybersecurity And Privacy
Business Case: The Cybersecurity And Privacy Playbook
August 14, 2020 | Sean RyanMega data breaches will often spur organizations to invest in cyber security. However, if the approach is reactive and unplanned, then it's a wasted opportunity. Use this report to structure a...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
August 10, 2020 | David HolmesIn our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...
-
Report Now Tech: Static Application Security Testing, Q3 2020
Forrester's Overview Of 19 SAST Providers
August 6, 2020 | Sandy CarielliYou can use static application security testing (SAST) to reduce the time to fix application security weaknesses, improve application delivery speed and predictability, and educate developers on...
-
Report Forrester Infographic: Web Application Firewall Customers Weigh In
July 23, 2020 | Sandy CarielliWeb application firewall (WAF) providers aim to protect customers from a range of application attacks, from OWASP Top 10 vulnerabilities to API-based attacks, client-side attacks, and even bots. We...
Content Type
ApplyFilters
Industry
- Manufacturing (17)
- Healthcare (10)
- Financial Services (7)
- Transportation & Logistics (6)
- Public Sector (4)
- Energy & Utilities (3)
- Retail (3)
- Consumer Electronics (1)
- Media & Entertainment (1)
- Travel (1)
Primary Role
- Security & Risk (480)
- CIO (35)
- Infrastructure & Operations (35)
- Application Development & Delivery (18)
- B2C Marketing (4)
Topics
- Zero Trust (161)
- Network Security (130)
- Endpoint Security (67)
- Firewalls (55)
- Mobile Security (14)
- Email Content Security (11)
- Antimalware (5)
- Web Content Security (3)
- Digital Certificates & PKIs (2)
- Content Security (1)
- Security Assertion Markup Language (SAML) (1)
Methodology
- Now Tech (70)
- Forrester Tech Tide (63)
- Business Technographics (61)
- Forrester Wave (61)
- ForecastView (15)
- New Tech (8)
- Infographic (6)
- Online Maturity Assessment (5)
- Maturity Assessment (4)
- Predictions (4)
Region
- Europe (30)
- Asia Pacific (16)
- Africa (1)
- Middle East (1)
- North America (1)
Vendor
- Microsoft (36)
- Cisco (32)
- Palo Alto Networks (31)
- IBM (30)
- Accenture (21)
- BlackBerry Cylance (21)
- Check Point (21)
- Deloitte (21)
- KPMG (21)
- PwC (21)
- Wipro (21)
- Capgemini (20)
- Proofpoint (18)
- Google (17)
- Infosys (15)
- Symantec (15)
- Akamai (14)
- CrowdStrike (14)
- Okta (13)
- NTT DATA (12)
- Tata Consultancy Services (TCS) (12)
- EY (10)
- Fortinet (10)
- Unisys (10)
- VMware (10)
- BAE Systems (9)
- Cognizant (9)
- OpenText (9)
- Tech Mahindra (9)
- Carbon Black (8)
- Imperva (8)
- Micro Focus (8)
- Oracle (8)
- Cylance (7)
- Veracode (7)
- Atos (6)
- Centrify (6)
- FireEye (6)
- Adobe (4)
- Amazon (4)
- Cloudflare (4)
- Dell (4)
- Epsilon (4)
- HCL Technologies (4)
- Huawei (4)
- Juniper Networks (4)
- Salesforce (4)
- Varonis (4)
- CenturyLink (3)
- DXC Technology (3)
- Hewlett Packard Enterprise (HPE) (3)
- Rapid7 (3)
- Citrix (1)
- Publicis Sapient (1)
Analyst
- Paul McKay (41)
- Sandy Carielli (30)
- Andras Cser (29)
- Jinan Budge (29)
- Amy DeMartine (26)
- Jeff Pollard (26)
- Andrew Hewitt (24)
- Heidi Shey (20)
- Chris Sherman (18)
- Enza Iannopollo (17)
- David Holmes (16)
- Merritt Maxim (16)
- Claire O'Malley (12)
- Joseph Blankenship (12)
- Sean Ryan (12)
- Alla Valente (10)
- Jennifer Adams (10)
- Elsa Pikulik (5)
- Renee Murphy (5)
- Salvatore Schiano (4)
- Shar VanBoskirk (4)
- Stephanie Balaouras (4)
- Andre Kindness (3)
- Arielle Trzcinski (3)
- Brian Kime (3)
- Fatemeh Khatibloo (3)
- Naveen Chhabra (3)
- Abhijit Sunil (2)
- Art Schoeller (2)
- Matthew Guarini (2)
- Achim Granzen (1)
- Chris Gardner (1)
- John Bratincevic (1)
- Laura Koetzle (1)
- Mark Bartrick (1)
- Peter Cerrato (1)
- Rich Lane (1)
- Rick Parrish (1)
- Sam Higgins (1)
- Sarah Dawson (1)
- Sharyn Leaver (1)
- Zhi-Ying Barry (1)