Search Results
-
For Security & Risk Professionals
Report
Report TechRadar™: Application Security, Q3 2017
Application Security Solutions Pivot To Meet Application Conditions
July 6, 2017 | Amy DeMartineApplications are increasingly the face of interaction between companies and their customers; this includes customer-facing applications, differentiating mobile apps, internet-of-things (IoT) device...
-
For Security & Risk Professionals
Report
Report Hardcoded For Failure
Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
June 21, 2017 | Chase CunninghamThere is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...
-
For Infrastructure & Operations Professionals
Report
Report Reduce Risk And Improve Security Through Infrastructure Automation
The Bad Guys Use Automation — Fight Fire With Fire
Security initiatives are becoming increasingly difficult, if not impossible, to execute manually. As infrastructure-as-code (IaC) and internet-of-things (IoT) solutions proliferate, organizations...
-
For Infrastructure & Operations Professionals
Report
Report Best Practices: Strategies For Making The Crucial Shift To DevSecOps
May 1, 2017 | Milan HansonCybersecurity needs help from infrastructure and operations (I&O) teams. Threats are evolving faster than ever and becoming increasingly sophisticated. Consumers drive shorter release cycles by...
-
For Security & Risk Professionals
Report
Report The Top Security Technology Trends To Watch, 2017
Tools And Technology: The S&R Practice Playbook
Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...
-
For Security & Risk Professionals
Report
Report Ten Basic Steps To Secure Software Containers
Instructions For Safely Developing And Deploying Software In Containers
Software containers help developers incorporate new microservice application designs, build and release code faster, and push fixes through testing more frequently. Today, most organizations use...
-
For Security & Risk Professionals
Report
Report Quick Take: CA Technologies Fills Its DevOps Security Gap With Veracode
March 7, 2017 | Amy DeMartineSecurity and risk (S&R) pros need the benefits of combining the development and operations (DevOps) automatic software delivery pipeline with application security testing to give developers early,...
-
For Security & Risk Professionals
Report
Report Mobile Application Authentication Trends And Best Practices
The Right Authentication Method Can Make Or Break A Great Digital Experience
Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Software Composition Analysis, Q1 2017
The Six Providers That Matter Most And How They Stack Up
February 23, 2017 | Amy DeMartineIn our 38-criteria evaluation of software composition analysis (SCA) providers, we identified the six most significant ones — Black Duck Software, Flexera Software, Sonatype, Synopsys, Veracode,...
-
For Security & Risk Professionals
Report
Report Vendor Landscape: Web Application Firewalls
WAFs Remain Relevant With Machine Learning Features
January 20, 2017 | Amy DeMartineSecurity pros started widely adopting web application firewalls (WAFs) back in 2006. During the past 10 years, WAF vendors have evolved their products to make them easier to maintain, more...
-
For Infrastructure & Operations Professionals
Report
Report Five Steps To Reinforce And Harden Application Security
I&O Teams Must Prevent And Remediate App Vulnerabilities
Today's cybercriminals are highly skilled, resourceful, and determined. Vulnerabilities such as web server misconfigurations or components that include known vulnerabilities give cybercriminals...
-
For Security & Risk Professionals
Report
Report Secure Applications At The Speed Of DevOps
How To Leverage DevOps Trends To Strengthen Applications
December 16, 2016 | Amy DeMartineDevOps methodologies are increasing the pace of application releases, straining security teams that protect those applications at a time when security expertise is already scarce. Security pros...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Cloud Security Gateways, Q4 2016
The Eight Providers That Matter Most And How They Stack Up
November 15, 2016 | Andras CserIn our 23-criteria evaluation of cloud security gateway (CSG) providers, we identified the eight most significant ones — Bitglass, Blue Coat/Symantec, CipherCloud, CloudLock/Cisco, Imperva,...
-
For Security & Risk Professionals
Report
Report The State Of Application Security: 2016 And Beyond
App Dev Is Leaving Security In The Dust, But You Can Change That
November 9, 2016 | Amy DeMartineApplications are under siege, and successful application attacks are the source of the biggest data loss. At the same time, applications are shifting toward more speedy releases. To keep up,...
-
For Security & Risk Professionals
Report
Report Vendor Landscape: Software Composition Analysis
Security, Legal, And App Dev Pros Find Common Value In Dependency Management
October 21, 2016 | Amy DeMartineSoftware composition analysis (SCA) tools provide valuable data to security pros, legal pros, and app developers by identifying software vulnerabilities and exposing licenses for open source...
-
For CIO Professionals
Report
Report Brief: Learning The Lessons From Two Major Disasters In The Blockchain Universe
What The DAO Debacle And The Bitfinex Hack Mean For Enterprise Blockchain Initiatives
August 25, 2016 | Martha BennettWhether you followed the headlines about The DAO fiasco and the resultant Ethereum hard fork, or the disappearance of nearly 120,000 Bitcoins from cryptocurrency exchange Bitfinex — if you have...
-
For Application Development & Delivery Professionals
Report
Report Brief: App Security Can't Happen Without Developers
Use A Combination Of People And Tools To Deliver Secure Apps
May 26, 2016 | John M. WargoApplication development and delivery (AD&D) professionals must keep security front and center when they're crafting apps that run outside of the firewall. Otherwise, they risk finding their brands...
-
For Application Development & Delivery Professionals
Report
Report Big Data Security Strategies For Hadoop Enterprise Data Lakes
Apply Zero Trust To Your Big Data Security Strategy
April 25, 2016 | Mike Gualtieri, John KindervagThe crown jewels must be protected. Data stored in Hadoop is no exception. As application development and delivery (AD&D) professionals rush to build data lakes using Hadoop, they often do so...
-
For Security & Risk Professionals
Report
Report TechRadar™: Mobile Security, Q1 2016
Tools And Technology: The Mobile Security Playbook
March 28, 2016 | Chris ShermanSecurity and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...
-
For Security & Risk Professionals
Report
Report It's Time To Level Up Your Mobile Application Security Program
Processes: The Mobile Security Playbook
March 25, 2016 | Chris ShermanSecurity leaders must balance the requirements of their digital workforce with the need to protect corporate data. This report helps security and risk (S&R) professionals better evaluate the...
-
For Application Development & Delivery Professionals
Report
Report Forrester Research World Application Security Forecast, 2015 To 2020 (Global)
ForecastView Spreadsheet
February 5, 2016 | Shaurya PriyaThis forecast, made exclusively available for Business Technology ForecastView clients, sizes and forecasts global companies’ spending on application security solutions. This forecast...
-
For Security & Risk Professionals
Report
Report Address The Top 10 Nontechnical Security Risks In Mobile App Development
Continuous Improvement: The Mobile Security Playbook
January 20, 2016 | Tyler Shields, Jennie DuongSecurity is more than just purchasing the latest next-generation solution to the most recent threat of attack. Likewise, security in mobile application development doesn't mean simply conducting a...
-
For Security & Risk Professionals
Report
Report TechRadar™: Zero Trust Identity Standards, Q1 2016
Road Map: The Identity And Access Management Playbook
Security and risk (S&R) professionals must ensure that identity and access information flows seamlessly across system and business boundaries for B2B access, employee single sign-on into cloud...
-
For Infrastructure & Operations Professionals
Report
Report The Seven Habits Of Rugged DevOps
October 15, 2015 | Amy DeMartine, Kurt BittnerDevOps practices can only increase speed and quality up to a point without security and risk (S&R) pros' expertise. Old application security practices hinder speedy releases, and security...
-
For Application Development & Delivery Professionals
Report
Report Improve Cybersecurity With DevOps
DevOps Gives Security Professionals New Tools And Approaches
July 20, 2015 | Kurt Bittner, Rick HollandOrganizations use applications to compete for customers; the faster they deliver those applications, the better they compete. Many application development and delivery (AD&D) pros are turning to...
Content categories
- Reports (100)
- Data (1)
- Events (11)
- Charts & Figures (200)
- Everything (312)
Refine your results
Date Range
- Past 7 days (1)
- Past 6 months (11)
- Past 12 months (16)
- Past 18 months (22)
Primary Role
- Security & Risk (60)
- Application Development & Delivery (28)
- CIO (6)
- Infrastructure & Operations (5)
- Enterprise Architecture (1)
Methodology
- Business Technographics (22)
- Forrester Wave (8)
- TechRadar (8)
- Vendor Landscape (2)
- ForecastView (1)
Industry
- Financial Services (6)
- Public Sector (2)
- Healthcare (1)
Market Imperatives
- Differentiate with digital (4)
- Build an insights-driven organization (1)
- Drive revenue with great customer experience (1)
- Excel at customer-obsessed marketing (1)
Region
- North America (18)
- Europe (16)
- Asia Pacific (1)
Vendor
- CSC (4)
- Wipro (4)
- Deloitte (3)
- IBM (3)
- Microsoft (2)
- + Show All
- Sybase (2)
- Symantec (2)
- Accenture (1)
- Amazon (1)
- Cisco Systems (1)
- Citrix Systems (1)
- Facebook (1)
- Hewlett-Packard (HP) (1)
- Juniper Networks (1)
- Oracle (1)
- SAP (1)
- Tata Consultancy Services (TCS) (1)
Analyst
- Noel Yuhanna (16)
- Amy DeMartine (11)
- Andras Cser (10)
- Randy Heffner (6)
- Chris Sherman (4)
- + Show All
- Mike Gualtieri (3)
- Heidi Shey (2)
- Joseph Blankenship (2)
- Merritt Maxim (2)
- Milan Hanson (2)
- Stephanie Balaouras (2)
- Chase Cunningham (1)
- Chris Gardner (1)
- Dave Bartoletti (1)
- Fatemeh Khatibloo (1)
- Jeff Pollard (1)
- Jeffrey S. Hammond (1)
- Josh Zelonis (1)
- Martha Bennett (1)
- Michael Facemire (1)
- Michele Pelino (1)
- Nick Hayes (1)
- Shaurya Priya (1)
