Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
Panorays QuickCard
February 25, 2021
-
Forrester New Wave™: Cybersecurity Risk Ratings Scorecard, Q1 2021
February 25, 2021
-
RiskRecon QuickCard
February 25, 2021
Search Results
-
Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security
Wednesday, March 10, 2021, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Andras CserIn this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...
-
Report The Forrester New Wave™: Cybersecurity Risk Ratings Platforms, Q1 2021
The Seven Providers That Matter Most And How They Stack Up
In Forrester's evaluation of the emerging market for cybersecurity risk ratings, we identified the seven most significant providers in the category — BitSight, Black Kite (previously Normshield),...
-
Report Now Tech: Cloud Security Gateways, Q1 2021
Forrester's Overview Of 16 Cloud Security Gateway Providers
January 26, 2021 | Andras CserYou can use cloud security gateway (CSG, also known as cloud access security broker or CASB) solutions to detect and protect against: 1) data loss, 2) excessive sensitive data access, and 3) use of...
-
Report The Future Of Identity And Access Management
Vision: The Identity And Access Management Playbook
Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report Forrester Infographic: The State Of The European Cybersecurity Product Market
European Security Leaders Trying To Buy Local Will Struggle To Meet Their Needs
July 8, 2020 | Paul McKayDeveloping a thriving European cybersecurity product market is a key EU digital single market priority in 2020 and beyond. European security leaders would love to buy locally but don't always have...
-
Webinar Top Security Technologies To Watch, 2020
Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...
-
Report Throw DARTS To Hit Your Zero Trust Targets
Vision: The Zero Trust Security Playbook
June 15, 2020 | Chase Cunningham, Peter CerratoOrganizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...
-
Report Assess Your Cloud Security Readiness
Leverage Forrester's Custom Tool To Assess Your Cloud Security Maturity Across Six Major Technology Competencies
May 29, 2020 | Andras CserAs firms migrate computing and data resources to the cloud, security remains a top concern and priority for both operational and compliance reasons. S&R professionals should use our custom tool, a...
-
Webinar European Security Market Trends, 2020
May 18, 2020 | Paul McKaySecurity leaders in Europe have had to deal with one of the biggest workforce transformations ever known as workers have moved from office work to homeworking to counter the current COVID-19...
-
Report Zero Trust Primer For 5G Security Use Cases
More Bandwidth Means More Data To Protect
May 1, 2020 | Jeff PollardSecurity and risk pros concerned about 5G security will find that the security narrative was hijacked — rightfully — by geopolitical and national security concerns. For enterprise security leaders,...
-
Report Now Tech: DDoS Mitigation Solutions, Q2 2020
Forrester's Overview Of 22 DDoS Mitigation Solution Providers
April 20, 2020 | David HolmesYou can use DDoS mitigation solutions to protect revenue generated by digital assets, maintain consistent customer experience, and meet availability compliance requirements. But to realize these...
-
Report Cybersecurity Risk Ratings Market Outlook, 2020 And Beyond
CISO Trust And Transparency Issues Drive Market Consolidation And Exits
March 16, 2020 | Paul McKayCybersecurity risk ratings vendors leverage externally available data about a firm to rate its cybersecurity posture. These vendors have now become mainstream despite customers, suppliers, and...
-
Report Securing Private 5G At The Edge: Europe Edition
Guide To Securing Private 5G And Edge Computing Use Cases For European Organizations
March 13, 2020 | Paul McKay5G networks are being deployed around Europe in 2020; several countries and telecom operators will bring 5G to the consumer market in 2020 and beyond. You'll find the most compelling 5G use cases...
-
Report The Top Trends Driving Cloud Workload Security In 2020
Market Consolidation, SaaS Offerings, And Remediation And DevOps Integration Are Reshaping The CWS Market
March 3, 2020 | Andras CserCloud workload security (CWS) solutions are deployed to detect, mitigate, and prevent cloud misconfigurations, configuration drift, identity and privilege proliferations, and vulnerabilities in...
-
Report The Forrester Wave™: Cloud Workload Security, Q4 2019
The 13 Providers That Matter Most And How They Stack Up
December 9, 2019 | Andras CserIn our 30-criterion evaluation of cloud workload security (CWS) providers, we identified the 13 most significant ones — Alert Logic, Aqua Security, Bitdefender, Cavirin, Check Point, Cisco,...
-
Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs
Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...
-
Report The Forrester Tech Tide™: Identity And Access Management, Q4 2019
Seventeen Technology Categories Underpin The IAM Market
Identity and access management (IAM) is increasingly critical to firms' ability to win, serve, and retain their customers. To accelerate their performance in IAM, companies are evaluating and...
-
Webinar Tactics For Maximizing Cybersecurity Risk Ratings Solutions
October 15, 2019 | Paul McKay, Trevor LynessCybersecurity risk ratings solutions are becoming a core part of enterprise security and third-party security programs of global companies. Join this webinar to learn the best practices and tactics...
-
Report Future-Proof Your Digital Business With Zero Trust Security
October 4, 2019 | Jeff PollardAs CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it's the perfect time to migrate to a Zero Trust security architecture. Security and risk...
-
Webinar Hybrid Cloud Security Best Practices
August 21, 2019 | Andras CserProtecting cloud workloads and their configuration in public, private, and hybrid clouds is a key concern of enterprises. This webinar highlights the drivers and best practices to secure...
-
Report Cybersecurity Risk Ratings Enhance Third-Party Risk Management
Rating Solutions Help Accelerate Third-Party Security Assurance But Can't Replace Essential Processes
July 25, 2019 | Paul McKay, Trevor LynessCybersecurity risk rating solutions are a valuable tool for third-party risk management (TPRM), but both the technology and the way customers use it are still maturing. Security and risk leaders...
-
Report Hybrid Cloud Security Best Practices
Focus On The Five C's: Console, Configuration, Connectivity, Cloud Data, And Containers
June 20, 2019 | Andras CserHybrid cloud security is a must for firms moving their critical data from on-premises to cloud workloads. This report, based on a small, 20-respondent panel survey, looks at cloud security best...
-
Report Security Outlook 2019: Modest Growth, But Some Sectors Will See Double-Digit Increases
ForecastView Document
June 18, 2019 | Jennifer AdamsHackers are creating new, more sophisticated malware daily. The shift of mission-critical data and applications to the cloud is changing the way companies protect their assets. How are security and...
-
Webinar Cloud Security Gateways — Key Trends And Vendor Landscape
Using The Forrester Wave™
June 12, 2019 | Andras CserCloud security gateways (CSGs) are a key component of protecting data both on-premises and in the cloud. This webinar looks at buyer behaviors and the vendor landscape of CSGs. Key...
- 1
- 2
Content Type
ApplyFilters
Industry
- Financial Services (4)
- Retail (4)
- Healthcare (2)
- Public Sector (2)
- Consumer Electronics (1)
- Energy & Utilities (1)
- Manufacturing (1)
- Media & Entertainment (1)
- Transportation & Logistics (1)
- Travel (1)
Topics
- Cloud Security (92)
- Hybrid Cloud (26)
- Private Cloud (15)
- Public Cloud (15)
- Cloud Management (9)
- Cloud Workload Security (CWS) (9)
- Hybrid Cloud Management (8)
Methodology
- Forrester Tech Tide (19)
- ForecastView (17)
- Now Tech (13)
- Forrester New Wave (11)
- Business Technographics (7)
- Forrester Wave (6)
- Infographic (2)
- Maturity Assessment (1)
- Online Maturity Assessment (1)
Region
- Europe (6)
- Africa (1)
- Middle East (1)
- North America (1)
Vendor
- Microsoft (30)
- Akamai (26)
- Cisco (26)
- Google (26)
- Neustar (26)
- CA Technologies (19)
- Centrify (19)
- CyberArk (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- IBM (19)
- Intel (19)
- Micro Focus (19)
- Okta (19)
- Oracle (19)
- Pitney Bowes (19)
- RSA (19)
- SailPoint (19)
- Salesforce (19)
- SAP (19)
- Alibaba (7)
- Amazon (7)
- CenturyLink (7)
- Cloudflare (7)
- Huawei (7)
- Imperva (7)
- Symantec (7)
- Tencent (7)
- Check Point (3)
- Palo Alto Networks (3)
Analyst
- Andras Cser (35)
- Jeff Pollard (13)
- Paul McKay (13)
- Jennifer Adams (10)
- David Holmes (7)
- Jinan Budge (3)
- Merritt Maxim (3)
- Sean Ryan (3)
- Alla Valente (2)
- Amy DeMartine (1)
- Claire O'Malley (1)
- Fatemeh Khatibloo (1)
- Heidi Shey (1)
- Joseph Blankenship (1)
- Laura Koetzle (1)
- Peter Cerrato (1)
- Renee Murphy (1)
- Rick Parrish (1)
- Sandy Carielli (1)
- Stephanie Balaouras (1)