37 results in Reports
 
Sort by:
Refine
  • Network Security

Search Results

  • Report Show, Don't Tell, Your Developers How To Write Secure Code

    Use Application Security Testing To Educate Your Developers
    April 19, 2019 | Amy DeMartine, Trevor Lyness

    Applications are the most frequent attack vector for companies; as a result, security pros made application security their top priority in 2019. Application security can only improve, however, if...

  • Report How To Implement Zero Trust Security In Europe

    Large technology companies and the US Federal Government have adopted Zero Trust (ZT) as their next-generation security model. 2019 is the year that Zero Trust hits the mainstream in Europe....

  • Report Security Budgets Europe, 2019: Budgets Rise And Security Services Overtake Products

    March 21, 2019 | Paul McKay

    This year, European CISOs must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how European security...

  • Report Top Research For CIOs: Security

    Realize The Value That Excellent Security Delivers
    March 15, 2019 | Matthew Guarini

    Security no longer lives exclusively in the IT department. Now, thanks to ever-escalating attacks, boards and C-suites have become all too familiar with the risks of breaches, and they demand...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

  • Report Build A Strong Process Foundation For Cybersecurity And Privacy

    Beginner Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Claire O'Malley

    To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and clearly defined processes for critical areas ranging from internal data security...

  • Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success

    Advanced Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Stephanie Balaouras

    CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect the brand, they help their firms drive growth and long-term success. This report — the third of three in the...

  • Report Elevate Cybersecurity And Privacy With Process Metrics

    Intermediate Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Salvatore Schiano

    The intermediate phase of the journey to cybersecurity and privacy maturity turns on establishing metrics and collecting data to drive process improvement. This report — the second of three in the...

  • Report New Tech: Secure Communications, Q4 2018

    Forrester's Landscape Overview Of 27 Providers
    December 11, 2018 | Heidi Shey

    This report presents an overview of the emerging vendors in the secure communications market. These are vendors whose offerings include a mix of encrypted messaging/text and additional...

  • Report Top Cybersecurity Threats In 2019

    Landscape: The Security Architecture And Operations Playbook
    December 11, 2018 | Josh Zelonis

    Security pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this challenge is to...

  • Report The State Of Network Security: 2018 To 2019

    Benchmarks: The Security Architecture And Operations Playbook
    November 27, 2018 | Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2018 to...

  • Report The Forrester New Wave™: Secure Communications, Q4 2018

    The 10 Providers That Matter Most And How They Stack Up
    November 19, 2018 | Heidi Shey

    In Forrester's evaluation of the emerging market for secure communications, we identified the 10 most significant providers in the category — CellTrust, Dispel, KoolSpan, SafeChats, SaltDNA, Silent...

  • Report The Forrester New Wave™: Cybersecurity Risk Rating Solutions, Q4 2018

    The Nine Providers That Matter Most And How They Stack Up
    November 13, 2018 | Nick Hayes, Trevor Lyness

    In Forrester's evaluation of the emerging market for cybersecurity risk rating solutions, we identified the nine most significant providers in the category — BitSight, FICO, iTrust, NormShield,...

  • Report The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018

    Tools And Technology: The Security Architecture And Operations Playbook
    November 8, 2018 | Chase Cunningham

    In our 15-criterion evaluation of Zero Trust eXtended ecosystem providers, we identified the 14 most significant ones — Akamai Technologies, Centrify, Cisco, Cyxtera Technologies, Forcepoint,...

  • Report Get Fighting Fit For EU's NISD

    The Hype Of GDPR Buried An Equally Important EU Cybersecurity Regulation
    October 5, 2018 | Paul McKay

    Over the past few months, organizations operating essential services across Europe have been finding out if they are in scope of the EU Network Information Systems Directive (NISD). The directive...

  • Report Five Steps To A Zero Trust Network

    Road Map: The Security Architecture And Operations Playbook

    A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. ZT mandates that enterprises create microperimeters of control around their sensitive...

  • Report Best Practices: Cloud Workload Security

    The Longer You Wait To Implement Cloud Workload Security, The Harder It Gets
    October 1, 2018 | Andras Cser

    Under increased pressure to move sensitive data to the cloud, security teams must comprehensively secure cloud workloads. Cloud workload security (CWS) solutions offer an automated and centralized...

  • Report Zero Trust Outside The Wire: Combatting Cyber Influence And Espionage Threats

    Computational Propaganda, Fake News, And Viral Videos Represent A New Type Of Business Attack With Devastating Consequences
    September 25, 2018 | Chase Cunningham, Nick Hayes, Jeff Pollard

    Direct cyberattacks that take a bank offline or steal millions of customer records are alarming, but there's an even larger, more dangerous specter of attacks security leaders are unprepared to...

  • Report Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook
    September 12, 2018 | Stephanie Balaouras, Heidi Shey

    In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook
    August 24, 2018 | Chase Cunningham, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...

  • Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Vision: The Data Security And Privacy Playbook
    August 15, 2018 | Heidi Shey, Enza Iannopollo

    Data is the lifeblood of digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every security and privacy leader. Hacked customer data can erase millions in...

  • Report Master Your Security Service Catalog

    Processes: The S&R Practice Playbook
    July 24, 2018 | Paul McKay

    CISOs are increasingly expected to show their peers in the executive suite how security aligns to business needs. Today, too many CISOs are focused only on delivering technical controls, which...

  • Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    July 20, 2018 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • Report Gauge Your ZTX Security Maturity

    Assessment: The Security Architecture And Operations Playbook
    July 19, 2018 | Chase Cunningham

    To convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros...