Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
-
Evaluated Vendors And Product Information
May 16, 2019
-
Forrester Wave™: Enterprise Email Security, Q2 2019
May 16, 2019
Search Results
-
Report Build A High-Performance, Customer-Obsessed Security Organization
Executive Overview: The S&R Practice Playbook
February 2, 2021 | Joseph BlankenshipCISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...
-
Report The Forrester Wave™: Security Analytics Platforms, Q4 2020
The 11 Providers That Matter Most And How They Stack Up
In our 27-criterion evaluation of security analytics platform providers, we identified the 11 most significant ones — Exabeam, FireEye, Gurucul, IBM Security, LogRhythm, Micro Focus, Microsoft,...
-
Webinar Cybersecurity Predictions 2021
This webinar provides a deep dive on our five cybersecurity predictions slated to take place in 2021. CISOs and other security leaders will learn what will happen, why, and what to do about it in...
-
Blog National Insider Threat Awareness Month: Stop Insiders With Zero Trust
September 3, 2020 | Joseph BlankenshipThe National Counterintelligence and Security Center (NCSC) and the National Insider Threat Task force (NITTF) partnered with US government agencies to kick off the second National Insider Threat...
-
Blog The Security Snapshot: Improving Your Security Posture During A Global Crisis
August 24, 2020 | Joseph BlankenshipThe COVID-19 global pandemic was top of mind for security leaders (and everyone else) during the second quarter of 2020. Forrester’s security and risk (S&R) team focused on pandemic recovery...
-
Report Now Tech: Enterprise Email Security Providers, Q3 2020
Forrester's Overview Of 33 Enterprise Email Security Providers
You can use enterprise email security to defend against email-borne attacks like phishing, safeguard sensitive data from theft or compromise, and protect your organization's brands. But to realize...
-
Report Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model
Executive Overview: The Zero Trust Security Playbook
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Blog COVID-19 Campaigns Highlight The Need For Phishing Protection
April 21, 2020 | Joseph BlankenshipDMARC’s Antiphishing Benefits Are More Important Than Ever Many of us have (at least temporarily) joined the remote workforce. Apart from learning how to be productive in a very new, improvised...
-
Blog Pandemic Fallout Creates Perfect Conditions For Insider Threat
April 15, 2020 | Joseph BlankenshipOrganizations around the world have moved quickly to deal with COVID-19, sending users to work from home, reducing staff, and taking other cost-control actions. While these steps are necessary,...
-
Report Prevent Fraud And Phishing Attacks With DMARC
Email Authentication Keeps Cybercriminals Out Of Your Inbox
Despite the many security technologies and education in place, phishing and business email compromise remain two of the biggest threats for organizations everywhere. Domain-based Message...
-
Blog The Security Snapshot: Data Privacy, The Biggest Concern Of The New Decade
February 3, 2020 | Joseph BlankenshipAt the end of 2019, Forbes identified data privacy and security as the most pressing issue in the upcoming decade. The issue is already prevalent: Every day, a new story crops up about leaked,...
-
Report Don't Poison Your Employee Experience With The Wrong Approach To Insider Threat
Security Leaders Must Balance Security, Governance, And Employee Privacy
Your colleagues are one of the biggest threats to the security of your organization, but treating them as criminals is obviously not an option. Considerations for employees' privacy, company...
-
Blog Unfortunately, Awareness Alone Won’t Do It: Successful Phishing Defense Requires A Layered Approach
October 2, 2019 | Joseph BlankenshipOctober is National Cybersecurity Awareness Month, the time of year security pros remind individuals about the importance of cybersecurity strategy and educate them in hopes they won’t become a...
-
Report Best Practices: Phishing Prevention
Protect Against Email-Borne Threats With Forrester's Layered Approach
Attackers use phishing and other social engineering tactics to infiltrate corporate networks. Advances in malicious email protection can recognize and stop obvious phishing attempts, but...
-
Blog Insider Threat Gets Its Own National Awareness Month
September 3, 2019 | Joseph BlankenshipThe US National Counterintelligence and Security Center has deemed September to be National Insider Threat Awareness Month to increase awareness about insider threats. 2019 is the first year that...
-
Blog Security & Risk 2019: Cybersecurity’s Staffing Shortage Is Self-Inflicted
August 6, 2019 | Joseph BlankenshipUnless this is your first day working in cybersecurity, you’ve heard numerous times that we have a hiring crisis — there aren’t enough people to fill the need for security talent. Current...
-
Report Reverse Cybersecurity's Self-Inflicted Staffing Shortage
Adopt More Realistic Expectations And More Effective Hiring Practices
Every day, we hear news stories, speeches, and vendor pitches that lament our acute cybersecurity talent shortage, one that will take years to address. However, the shortage is largely...
-
Blog The Security Snapshot: Forrester Time Machine
July 17, 2019 | Joseph BlankenshipAt Forrester, it is our goal to be ahead of the market trends so we can advise clients on what is to come and how they should prepare. Each year, we publish a series of predictions reports about...
-
Blog AWS re:Inforce Recap: The Cloud Isn’t Going Away, But Scare Tactics Should
June 28, 2019 | Joseph BlankenshipBoston’s bustling Seaport District played host to the first-ever AWS re:Inforce 2019 cloud security conference, with over 5,000 reported attendees. Amazon Web Services set the tone of the event to...
-
Report Best Practices: Mitigating Insider Threats
Defend Your Organization Against The Threats Insiders Pose
Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to...
-
Report The Forrester Wave™: Enterprise Email Security, Q2 2019
The 12 Providers That Matter Most And How They Stack Up
May 16, 2019 | Joseph BlankenshipIn our 32-criterion evaluation of enterprise email content security providers, we identified the 12 most significant ones — Barracuda, Cisco, Clearswift, Forcepoint, Microsoft, Mimecast,...
-
Report Top Recommendations For Your Security Program, 2019
Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...
-
Report Recruiting And Retaining Insider Threat Analysts
To Avoid An Embarrassing And Devastating Insider Attack, Hire Dedicated Analysts
March 7, 2019 | Joseph BlankenshipWhether accidental or malicious, insider incidents can result in fraud, privacy abuses, IP theft, and other damage. It's difficult for security pros to detect this activity because insiders need...
-
Blog Tech Titans Alphabet And Microsoft Are Transforming Cybersecurity
March 4, 2019 | Joseph BlankenshipLast April, we outlined how the “Tech Titans” (Amazon, Google, and Microsoft) were poised to change the cybersecurity landscape by introducing a new model for enterprises to consume cybersecurity...
Content Type
ApplyFilters
Primary Role
- Security & Risk (22)
Topics
- Security Operations & Program Governance (15)
- Employee Experience (11)
- Information Security (10)
- Identity & Access Management (IAM) (7)
- Tech Sector Economics (7)
- Data & Information Protection (6)
- Organization (2)
- Application Management (1)
- Application Security (1)
- Business Intelligence (1)
- Cloud Computing (1)
- Governance Risk & Compliance (GRC) (1)
- Measurement (1)
- Networking (1)
- Pandemic (1)
Methodology
- Forrester Wave (5)
- Business Technographics (1)
- Now Tech (1)
Region
- North America (1)
Vendor
- Cisco (4)
- Microsoft (4)
- Proofpoint (4)