Skip to main content
51 results in Reports
 
Sort by:
Refine
  • Data Security

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report Maintain Security Visibility In The TLS 1.3 Era

    You Have Two Years To Prepare Your Security Tools For TLS 1.3 And DNS-Over-HTTPS
    July 30, 2020 | David Holmes

    New encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) are sweeping the last crumbs of visible user activity off the enterprise network table. Soon, security controls, already starved for...

  • Report Enhance EX With Zero Trust

    Business Case: The Zero Trust Security Playbook
    July 13, 2020 | Andrew Hewitt, David Holmes

    Forrester's Zero Trust (ZT) framework is the modern security architecture blueprint for enterprises. Fundamentally, ZT is about moving away from traditional perimeter-based security approaches and...

  • Report Forrester Infographic: The State Of The European Cybersecurity Product Market

    European Security Leaders Trying To Buy Local Will Struggle To Meet Their Needs
    July 8, 2020 | Paul McKay

    Developing a thriving European cybersecurity product market is a key EU digital single market priority in 2020 and beyond. European security leaders would love to buy locally but don't always have...

  • Report Audio: The Long-Term Impact Of Emerging Technology On US Healthcare Providers

    July 1, 2020 | Brian Hopkins, Jeff Becker

    Healthcare CIOs face an unprecedented number of challenges in the coming years: extremely high costs, declining care outcomes, and exhausted employees. This report reveals the impact that emerging...

  • Report A Five-Step Strategy For Data Discovery And Classification

    Strategic Plan: The Data Security And Privacy Playbook
    June 26, 2020 | Heidi Shey

    To protect data and support data governance, security and risk (S&R) pros need to understand what data exists, where it resides, how valuable it is to the firm, and who can use it. This report...

  • Report Bust The Zero Trust Myths

    Prioritize Zero Trust Concerns, Because Your Stakeholders Can Make Or Break Your Strategy
    June 22, 2020 | Jinan Budge, Chase Cunningham

    Zero Trust (ZT) is prone to misconceptions. IT and business leaders often think that ZT is too hard, too expensive, and requires them to restructure everything they've built or deploy...

  • Report Mitigating Ransomware With Zero Trust

    Bolster Your Defenses With Zero Trust Principles And Techniques
    June 8, 2020 | Chase Cunningham, Josh Zelonis, David Holmes

    Ransomware and malware continue to plague organizations across the globe. Entire industries have been affected and, in some cases, ground to a halt thanks to the scourge of ransomware attacks....

  • Report Select The Right IoT Monitoring Strategy

    Tackle The Key IoT Challenges That Stress Existing Enterprise Monitoring
    May 26, 2020 | Rich Lane

    Internet of things (IoT) monitoring isn't like standard server or cloud monitoring. IoT sensors and devices generate diverse data volumes at a rate three times that of traditional infrastructure...

  • Report Benchmark Your Cybersecurity And Privacy Maturity, 2020

    The Benchmark Report In The Cybersecurity And Privacy Playbook
    April 28, 2020 | Merritt Maxim, Elsa Pikulik

    This data-driven report examines the maturity of security and privacy programs at companies around the world. It also looks at how different maturity levels vary in terms of business priorities and...

  • Report Cybersecurity Risk Ratings Market Outlook, 2020 And Beyond

    CISO Trust And Transparency Issues Drive Market Consolidation And Exits
    March 16, 2020 | Paul McKay

    Cybersecurity risk ratings vendors leverage externally available data about a firm to rate its cybersecurity posture. These vendors have now become mainstream despite customers, suppliers, and...

  • Report The State Of Data Security And Privacy, 2020

    Benchmarks: The Data Security And Privacy Playbook
    February 27, 2020 | Heidi Shey

    This data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...

  • Report Shift From Privacy Readiness To Sustained Compliance

    Roadmap: The Data Security And Privacy Playbook
    February 6, 2020 | Enza Iannopollo

    New privacy rules are popping up all over the world. Increasingly, security and risk (S&R) and privacy professionals believe that maintaining compliance with global privacy regulations is one of...

  • Report Top Cybersecurity Threats In 2020

    Landscape: The Zero Trust Security Playbook
    January 24, 2020 | Josh Zelonis, Sandy Carielli

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...

  • Report Privacy In 2019: The Year In Review

    What B2C Marketers Need To Know About The Privacy Climate
    January 22, 2020 | Fatemeh Khatibloo, Stephanie Liu

    2019 was a significant year in the privacy field. The General Data Protection Regulation (GDPR) hit its first anniversary, California passed seven amendments to the California Consumer Privacy Act...

  • Report Prepare For Decentralized Digital Identity: Security SWOT

    Benefits Of Privacy And Centralization Get Hampered By Lack Of Trust, Early Fragmentation, And Growing Pains Of Wallet Management
    January 21, 2020 | Andras Cser, Sean Ryan

    Decentralized digital identity (DDID) is not just a technology buzzword: It promises a complete restructuring of the currently centralized physical and digital identity ecosystem into a...

  • Report Assess Your Cybersecurity And Privacy Maturity

    Assessment: The Cybersecurity And Privacy Playbook
    January 3, 2020 | Enza Iannopollo, Renee Murphy

    Weak cybersecurity and privacy practices reflect poorly on your company's brand, making it less attractive to customers, partners, employees, and investors. CIOs who want to drive and sustain...

  • Report How To Manage Brexit's Impact: CISO Edition

    Focus On Data Protection, Staffing, And Regulatory Alignment
    December 12, 2019 | Paul McKay, Enza Iannopollo

    While the recent UK general election has provided certainty that the first stage of Brexit will happen on January 31, the certainty only persists until the end of 2020. It's still possible that a...

  • Report CIOs: Take Four Steps To Integrate Cybersecurity And Privacy Into Your Strategy

    Strategy: The Cybersecurity And Privacy Playbook
    December 2, 2019 | Paul McKay

    As CIO, you must work with the chief information security officer (CISO) and chief privacy officer (CPO) to integrate security and privacy into your overall IT strategy. This report lays out the...

  • Report Forrester's 2019 Consumer Privacy Segmentation: Europe

    Understand Consumer Privacy Preferences And Behaviors To Improve Engagement, Trust, And Experience
    November 13, 2019 | Enza Iannopollo

    In this report, we explain how privacy professionals can apply Forrester's Consumer Privacy Segmentation to understand how privacy perspectives vary by geography across Europe. Armed with this...

  • Report Lay Your Security Tech Foundation

    Beginner Level: Technology Practices For Cybersecurity And Privacy
    November 4, 2019 | Jeff Pollard, Amy DeMartine

    This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to move...

  • Report Predictions 2020: Privacy And Data Ethics

    Marketers Fight To Retain Access To Consumer Data As Regional Regulations Make A Global Impact In Courtrooms And Boardrooms

    2020 is poised to be the "year of the privacy regulator." As a result, privacy and data ethics will rightfully take their place on the boardroom agenda. This report lays out Forrester's five...

  • Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Vision: The Data Security And Privacy Playbook
    October 16, 2019 | Heidi Shey, Enza Iannopollo

    Data is the lifeblood of digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every security and privacy leader. Security and privacy pros must ensure that...

  • Report The Eight Business And Security Benefits Of Zero Trust

    September 25, 2019 | Chase Cunningham, David Holmes, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...

  • Report Secure Your Customers And Protect Your Brand

    Executive Overview: The Cybersecurity And Privacy Playbook
    September 12, 2019 | Laura Koetzle, Merritt Maxim

    Today, CIOs and CTOs are transforming the foundations of their business with technology. For that transformation to succeed, you must transform your cybersecurity and privacy practices...

  • Report Now Tech: eDiscovery Service Providers, Q3 2019

    Forrester's Overview Of 35 eDiscovery Service Providers
    September 4, 2019 | Heidi Shey

    You can use eDiscovery service providers to boost expertise, speed, and scale of eDiscovery-related operations, benefit from best-fit technologies for your requirements, and optimize overall...