Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
Search Results
-
Report Business Resiliency Is The Bulwark To A World Defined By Systemic Risk And Chaos
Resiliency Ensures Continuity And The Ability To Pivot To New Opportunities During A Crisis
In times of crisis or sudden risk events, business resiliency practices ensure the uninterrupted delivery of customer products and services, keep employees safe and productive, and minimize the...
-
Report Drive Growth With Customer Trust And Build Brand Resilience
Advanced Level: Technology Practices For Cybersecurity And Privacy
When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report...
-
Report Lay Your Security Tech Foundation
Beginner Level: Technology Practices For Cybersecurity And Privacy
This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to help...
-
Report Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses
Intermediate Level: Technology Practices For Cybersecurity And Privacy
CIOs and technology leaders in the intermediate phase of cybersecurity and privacy maturity must ensure that security always travels with the data and should position data security and privacy as...
-
Blog The Security Snapshot: Are You “More” Normal?
November 9, 2020 | Amy DeMartineThe COVID-19 pandemic unequivocally changed how employers think the workforce could and should look like. As firms have been growing more acclimated to the “new normal,” insider...
-
Blog Calling Business Resilience Pros!
October 22, 2020 | Amy DeMartineEach year, Forrester Research and the Disaster Recovery Journal team up to launch a study examining the state of business resiliency. We focus on a different, rotating resiliency domain each year:...
-
Report Guard Your Competitive Edge And Maintain Trust With Data Privacy And Security
Executive Overview: The Data Security And Privacy Playbook
August 21, 2020 | Amy DeMartineData is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, while privacy...
-
Report The Forrester Wave™: Web Application Firewalls, Q1 2020
The 10 Providers That Matter Most And How They Stack Up
In our 33-criterion evaluation of web application firewall (WAF) providers, we identified the 10 most significant ones — Akamai Technologies, Alibaba Cloud, Amazon Web Services, Barracuda Networks,...
-
Report The Forrester New Wave™: Bot Management, Q1 2020
The 13 Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for bot management, we identified the 13 most significant providers in the category — Akamai Technologies, Alibaba Cloud, AppsFlyer, Cloudflare,...
-
Report The State Of Government Application Security, 2020
Government Must Invest Aggressively In Application Security To Protect Citizen Data
Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....
-
Report Now Tech: Web Application Firewalls, Q4 2019
Forrester's Overview Of 31 WAF Providers
You can use web application firewalls (WAFs) to protect applications, apply consistent and global security policies, and comply with regulations. But to realize these benefits, you'll first have to...
-
Report New Tech: Bot Management, Q4 2019
Forrester's Landscape Overview Of 22 Providers
Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated,...
-
Webinar Secure What You Sell: Director's Cut
Securing the products and services their companies sell offers a mechanism for CISOs to contribute to their firms' goals. This webinar helps CISOs understand the world of product security and how...
-
Blog The Security Snapshot: Renew Your Security Program This Season
October 21, 2019 | Amy DeMartine“Life starts all over again when it gets crisp in the fall.” — F. Scott Fitzgerald, “The Great Gatsby” Fall is officially upon us. Leaves are piling up in our yards, and there is a...
-
Report Secure What You Sell: CISOs Must Tackle Product Security To Protect Customers
Today's mature enterprise security programs excel at securing infrastructure. Product security is different; it begins with minimum viable security during early-stage development and must extend to...
-
Blog Top Security Technology Trends In 2019: Transforming The Future Of Work In Security
August 7, 2019 | Amy DeMartineWalk the show floor at any security event, and you will be inundated with a multitude of purportedly cutting-edge and disruptive security technologies. When every vendor claims that their solution...
-
Report The Top Security Technology Trends To Watch, 2019
Eight Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...
-
Report Find Elusive Security Defects Using Bug Bounty Platforms
Harness The Power Of Hackers To Protect Your Company's Applications
July 15, 2019 | Amy DeMartineApps continue to be the top method of attack for cybercriminals. Unfortunately, prerelease scanning and penetration testing services discover only known security flaw patterns or use a limited...
-
Report Forrester Infographic: Build A Better Bot Management Program
Create A Single Team Now To Battle Bad Bots
July 8, 2019 | Amy DeMartineInternet traffic contains a worrying amount of bad bot traffic. Organizations need to do a much better job of combating them or suffer their scraping, fraud, inventory hoarding, credential...
-
Webinar Protect Against Bad Bots That Are Trying To Kill Your Customer Experience
June 18, 2019 | Amy DeMartineYou may have heard about chatbots, but did you know that 38% of internet traffic comes from automated programs called bots and more than half of this is malicious? These bots are simple programs...
-
Report Show, Don't Tell, Your Developers How To Write Secure Code
Use Application Security Testing To Educate Your Developers
April 19, 2019 | Amy DeMartine, Trevor LynessApplications are the most frequent attack vector for companies; as a result, security pros made application security their top priority in 2019. Application security can only improve, however, if...
-
Report The Forrester Wave™: Software Composition Analysis, Q2 2019
The 10 Providers That Matter Most And How They Stack Up
April 8, 2019 | Amy DeMartineIn our 33-criterion evaluation of software composition analysis providers, we identified the 10 most significant ones — Flexera, FOSSA, GitLab, JFrog, Snyk, Sonatype, Synopsys, Veracode, WhiteHat...
-
Report Top Recommendations For Your Security Program, 2019
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
Content Type
ApplyFilters
Industry
- Financial Services (2)
- Public Sector (2)
- Healthcare (1)
- Retail (1)
Primary Role
- Security & Risk (22)
- CIO (3)
Topics
- Application Security (16)
- Information Security (14)
- Data & Information Protection (7)
- Governance Risk & Compliance (GRC) (6)
- Security Operations & Program Governance (6)
- Identity & Access Management (IAM) (5)
- Innovation (5)
- Business & IT Alignment (3)
- Cloud Computing (2)
- Employee Experience (2)
- Application Management (1)
- Artificial Intelligence (AI) (1)
- Customer Relationship Management (CRM) (1)
- Data Centers & Data Center Networking (1)
- Data Management (1)
- Enterprise Mobility (1)
- Internet of Things (IoT) (1)
- Measurement (1)
- Pandemic (1)
- Program & Project Management (1)
- Tech Sector Economics (1)
- Telecommunications Services (1)
Methodology
- Forrester Wave (5)
- Infographic (2)
- Forrester New Wave (1)
- New Tech (1)
- Now Tech (1)