Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
Search Results
-
Report Now Tech: Software Composition Analysis, Q2 2021
Forrester's Overview Of 22 Software Composition Analysis Providers
April 7, 2021 | Sandy CarielliYou can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development lifecycle (SDLC). But to...
-
Report The State Of Data Security And Privacy, 2021
Benchmarks: The Data Security And Privacy Playbook
April 6, 2021 | Heidi SheyOrganizations can learn from the patterns behind data breaches, exposure, and misuse to evaluate their current practices and controls for data protection. Key trends in data security and privacy...
-
Report The State Of Application Security, 2021
Applications Remain A Key Attack Vector, But Signs Of Hope Emerge
March 23, 2021 | Sandy CarielliApplications remain a top cause of external breaches, and the prevalence of open source, API, and containers only adds complexity to the security team. Happily, organizations have started to...
-
Report Best Practices: Mitigating Insider Threat
Processes: The Zero Trust Security Playbook
Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to...
-
Webinar Key Trends Shaping Infrastructure-As-A-Service Native Security
March 10, 2021 | Andras CserIn this webinar, we review key customer requirements as well as cloud service provider vendors' investments shaping the next 12 to 18 months of infrastructure-as-a-service platform native security...
-
Report Forrester Infographic: Static Application Security Testing Usage Aimed At Developers
March 2, 2021 | Sandy CarielliCustomers of the vendors evaluated in "The Forrester Wave™: Static Application Security Testing, Q1 2021" push greater adoption of static application security testing (SAST) as a critical DevSecOps...
-
Report The Forrester Wave™: Static Application Security Testing, Q1 2021
The 12 Providers That Matter Most And How They Stack Up
January 11, 2021 | Sandy CarielliIn our 28-criterion evaluation of static application security testing (SAST) providers, we identified the 12 most significant ones — CAST, Checkmarx, GitHub, GitLab, HCL Software, Micro Focus,...
-
Report Don't Ignore Security In Low-Code Development
Low-Code Mitigates Some Security Risks — But "Citizen Developers" Bring New Challenges
The low-code movement can turn anyone into a developer, but it can't turn anyone into a security-aware developer. Low-code platforms abstract away some security risks, but other security...
-
Report Gauge Your Data Security And Privacy Maturity
Assessment: The Data Security And Privacy Playbook
To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost to one that champions privacy and uses its technology prowess...
-
Webinar More Than A Gateway: Take A Holistic Approach To API Security
APIs provide a foundation for innovation and digital transformation, but as evidenced by the number of API related breaches, organizations struggle to secure them. The API security landscape is a...
-
Report The Future Of Identity And Access Management
Vision: The Identity And Access Management Playbook
Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, marketing pros, CIOs,...
-
Forum Security & Risk Global
Leading the Way
As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
August 10, 2020 | David HolmesIn our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...
-
Report Now Tech: Static Application Security Testing, Q3 2020
Forrester's Overview Of 19 SAST Providers
August 6, 2020 | Sandy CarielliYou can use static application security testing (SAST) to reduce the time to fix application security weaknesses, improve application delivery speed and predictability, and educate developers on...
-
Webinar So You're Implementing Containers? Secure Them!
Technology leaders are jumping at the chance to implement containers, and security leaders are scrambling to figure out how to protect them. Join us for a fireside chat about key container security...
-
Report Best Practices For Container Security
Protecting Containerized Applications Requires Technical And Organizational Steps
Container adoption is increasing, and security must come along for the ride. Organizations value the scalability and agility that containers offer, but containers introduce new security challenges...
-
Report Forrester Infographic: Web Application Firewall Customers Weigh In
July 23, 2020 | Sandy CarielliWeb application firewall (WAF) providers aim to protect customers from a range of application attacks, from OWASP Top 10 vulnerabilities to API-based attacks, client-side attacks, and even bots. We...
-
Report Use Privileged Identity Management Pricing Insight For Buyer Advantage
Understand Pricing Mechanics To Optimize Your PIM Procurement
Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...
-
Report How A Least Privilege Model Can Reduce Dynamic Access Risks
Applying Zero Trust To Address Overprivileged Employee/Entity Access
Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either...
-
Report The State Of Application Security, 2020
Applications Remain The Top External Attack Method; Don't Get Complacent
May 4, 2020 | Sandy CarielliApplication weaknesses and software vulnerabilities continue to be the most common external attack method. Now is not the time to backslide on your application security efforts. Instead, follow the...
-
Report Zoom Becomes A Product Security Cautionary Tale
CISOs Must Take Extra Steps To Protect Their Firms While Zoom Fixes Critical Flaws
As the global pandemic sent hundreds of thousands of employees to work from home overnight, Zoom quickly rose to worldwide prominence as a central enabling technology. But just as quickly, Zoom...
-
Report Now Tech: Privileged Identity Management, Q2 2020
Forrester's Overview Of 17 Privileged Identity Management Providers
April 2, 2020 | Sean RyanYou can use PIM offerings to reduce exposure to the most damaging types of breaches, comply with a growing list of regulations, replace manual processes for oversight of privileged accounts, and...
-
Report Now Tech: Enterprise Firewalls, Q1 2020
Forrester's Overview Of 18 Enterprise Firewall Providers
March 20, 2020 | David HolmesYou can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...
-
Report Optimize User Experience With Passwordless Authentication
Improve User Experience And Security And Lower The Cost Of Cross-Channel Authentication
With the evolution of numerical computing, the password has lost its ability to protect critical applications and data. This report looks at passwordless authentication, explaining how it can...
- 1
- 2
Content Type
ApplyFilters
Industry
- Public Sector (5)
- Financial Services (4)
- Retail (4)
- Healthcare (3)
- Energy & Utilities (2)
- Manufacturing (2)
- Media & Entertainment (2)
- Consumer Electronics (1)
- Transportation & Logistics (1)
- Travel (1)
Topics
- API Security (58)
- Web Application Firewalls (WAF) (57)
- Container Security (39)
- Software Composition Analysis (SCA) (24)
- Dynamic Application Security Testing (DAST) (17)
- Application Penetration Testing Tools (11)
- Interactive Application Security Testing (IAST) (11)
- Runtime Application Self-Protection (RASP) (11)
Methodology
- Now Tech (20)
- Business Technographics (19)
- Forrester Tech Tide (19)
- Forrester New Wave (17)
- Forrester Wave (15)
- New Tech (8)
- Infographic (5)
- Maturity Assessment (1)
- Online Maturity Assessment (1)
- Predictions (1)
Region
- North America (9)
Vendor
- Akamai (31)
- Oracle (27)
- Microsoft (26)
- Cisco (23)
- Micro Focus (23)
- Google (22)
- IBM (22)
- Okta (22)
- CA Technologies (19)
- Centrify (19)
- CyberArk (19)
- Equifax (19)
- Experian (19)
- ForgeRock (19)
- Gemalto (19)
- Intel (19)
- Neustar (19)
- Pitney Bowes (19)
- RSA (19)
- SailPoint (19)
- Salesforce (19)
- SAP (19)
- Imperva (12)
- HCL Technologies (11)
- Palo Alto Networks (11)
- Alibaba (8)
- Rapid7 (7)
- Cloudflare (5)
- Amazon (4)
- Check Point (4)
- Fortinet (4)
- Huawei (4)
- Juniper Networks (4)
- Veracode (4)
- OpenText (3)
Analyst
- Sandy Carielli (51)
- Andras Cser (18)
- Sean Ryan (11)
- David Holmes (10)
- Heidi Shey (10)
- Amy DeMartine (9)
- Jeff Pollard (5)
- Merritt Maxim (3)
- Claire O'Malley (2)
- Fatemeh Khatibloo (2)
- Art Schoeller (1)
- David Mooter (1)
- Enza Iannopollo (1)
- Jinan Budge (1)
- John Bratincevic (1)
- Joseph Blankenship (1)
- Laura Koetzle (1)
- Renee Murphy (1)
- Rick Parrish (1)
- Stephanie Balaouras (1)