Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Focus On Four Technology Areas To Drive Cybersecurity And Privacy
January 11, 2021
-
-
5G Planned Use Cases
May 1, 2020
Search Results
-
Report Lay Your Security Tech Foundation
Beginner Level: Technology Practices For Cybersecurity And Privacy
This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to help...
-
Webinar The New, Unstable Normal Roundtable: How COVID-19 Will Change Business And Technology Forever
Europe-Friendly Start Time
The lasting impact of COVID-19 and the high likelihood of future pandemics will usher in five macro shifts that will fundamentally change business and technology: 1) Customer expectations will...
-
Webinar The New, Unstable Normal Roundtable: How COVID-19 Will Change Business And Technology Forever
The lasting impact of COVID-19 and the high likelihood of future pandemics will usher in five macro shifts that will fundamentally change business and technology: 1) Customer expectations will...
-
Report Zero Trust Primer For 5G Security Use Cases
More Bandwidth Means More Data To Protect
May 1, 2020 | Jeff PollardSecurity and risk pros concerned about 5G security will find that the security narrative was hijacked — rightfully — by geopolitical and national security concerns. For enterprise security leaders,...
-
Report Securing Private 5G At The Edge: Europe Edition
Guide To Securing Private 5G And Edge Computing Use Cases For European Organizations
March 13, 2020 | Paul McKay5G networks are being deployed around Europe in 2020; several countries and telecom operators will bring 5G to the consumer market in 2020 and beyond. You'll find the most compelling 5G use cases...
-
Report The Forrester New Wave™: Bot Management, Q1 2020
The 13 Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for bot management, we identified the 13 most significant providers in the category — Akamai Technologies, Alibaba Cloud, AppsFlyer, Cloudflare,...
-
Report Capturing Innovation In Your Security Program
Security Startups Offer More Flexibility And Innovative Approaches To Securing Your Enterprise
Cybersecurity is one of the hottest areas worldwide for venture capital and private equity investment. There has never been so many cybersecurity startups globally. Unprecedented levels of...
-
Report New Tech: Bot Management, Q4 2019
Forrester's Landscape Overview Of 22 Providers
Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated,...
-
Report Forrester Infographic: Build A Better Bot Management Program
Create A Single Team Now To Battle Bad Bots
July 8, 2019 | Amy DeMartineInternet traffic contains a worrying amount of bad bot traffic. Organizations need to do a much better job of combating them or suffer their scraping, fraud, inventory hoarding, credential...
Content Type
ApplyFilters
Industry
- Financial Services (2)
- Manufacturing (2)
- Retail (2)
Primary Role
- Security & Risk (38)
- CIO (4)
Topics
Methodology
- Forrester New Wave (17)
- New Tech (8)
- Infographic (1)
Region
- Europe (4)
Vendor
- Akamai (8)
- Alibaba (8)
- Imperva (8)
- Oracle (8)
- Cloudflare (1)
Analyst
- Amy DeMartine (4)
- Jeff Pollard (4)
- Paul McKay (4)
- Alla Valente (2)
- Sandy Carielli (2)
- Anjali Lai (1)
- Brian Hopkins (1)
- Heidi Shey (1)
- James McQuivey, PhD (1)
- Jinan Budge (1)
- Laura Koetzle (1)
- Martha Bennett (1)
- Martin Gill (1)
- Melissa Parrish (1)
- Stephanie Balaouras (1)
- Sucharita Kodali (1)