Advanced Search
94 results in Reports
Sort by:
Refine
  • Application Security

Search Results

  • For Security & Risk Professionals

    Report

    Report Quick Take: CA Technologies Fills Its DevOps Security Gap With Veracode

    March 7, 2017 | Amy DeMartine

    Security and risk (S&R) pros need the benefits of combining the development and operations (DevOps) automatic software delivery pipeline with application security testing to give developers early,...

  • For Security & Risk Professionals

    Report

    Report Mobile Application Authentication Trends And Best Practices

    The Right Authentication Method Can Make Or Break A Great Digital Experience
    March 2, 2017 | Andras Cser, Michael Facemire

    Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Software Composition Analysis, Q1 2017

    The Six Providers That Matter Most And How They Stack Up
    February 23, 2017 | Amy DeMartine

    In our 38-criteria evaluation of software composition analysis (SCA) providers, we identified the six most significant ones — Black Duck Software, Flexera Software, Sonatype, Synopsys, Veracode,...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Web Application Firewalls

    WAFs Remain Relevant With Machine Learning Features
    January 20, 2017 | Amy DeMartine

    Security pros started widely adopting web application firewalls (WAFs) back in 2006. During the past 10 years, WAF vendors have evolved their products to make them easier to maintain, more...

  • For Infrastructure & Operations Professionals

    Report

    Report Five Steps To Reinforce And Harden Application Security

    I&O Teams Must Prevent And Remediate App Vulnerabilities
    January 13, 2017 | Milan Hanson, Amy DeMartine

    Today's cybercriminals are highly skilled, resourceful, and determined. Vulnerabilities such as web server misconfigurations or components that include known vulnerabilities give cybercriminals...

  • For Security & Risk Professionals

    Report

    Report Secure Applications At The Speed Of DevOps

    How To Leverage DevOps Trends To Strengthen Applications
    December 16, 2016 | Amy DeMartine

    DevOps methodologies are increasing the pace of application releases, straining security teams that protect those applications at a time when security expertise is already scarce. Security pros...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Cloud Security Gateways, Q4 2016

    The Eight Providers That Matter Most And How They Stack Up
    November 15, 2016 | Andras Cser

    In our 23-criteria evaluation of cloud security gateway (CSG) providers, we identified the eight most significant ones — Bitglass, Blue Coat/Symantec, CipherCloud, CloudLock/Cisco, Imperva,...

  • For Security & Risk Professionals

    Report

    Report The State Of Application Security: 2016 And Beyond

    App Dev Is Leaving Security In The Dust, But You Can Change That
    November 9, 2016 | Amy DeMartine

    Applications are under siege, and successful application attacks are the source of the biggest data loss. At the same time, applications are shifting toward more speedy releases. To keep up,...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Software Composition Analysis

    Security, Legal, And App Dev Pros Find Common Value In Dependency Management
    October 21, 2016 | Amy DeMartine

    Software composition analysis (SCA) tools provide valuable data to security pros, legal pros, and app developers by identifying software vulnerabilities and exposing licenses for open source...

  • For CIO Professionals

    Report

    Report Brief: Learning The Lessons From Two Major Disasters In The Blockchain Universe

    What The DAO Debacle And The Bitfinex Hack Mean For Enterprise Blockchain Initiatives
    August 25, 2016 | Martha Bennett

    Whether you followed the headlines about The DAO fiasco and the resultant Ethereum hard fork, or the disappearance of nearly 120,000 Bitcoins from cryptocurrency exchange Bitfinex — if you have...

  • For Application Development & Delivery Professionals

    Report

    Report Brief: App Security Can't Happen Without Developers

    Use A Combination Of People And Tools To Deliver Secure Apps
    May 26, 2016 | John M. Wargo

    Application development and delivery (AD&D) professionals must keep security front and center when they're crafting apps that run outside of the firewall. Otherwise, they risk finding their brands...

  • For Application Development & Delivery Professionals

    Report

    Report Big Data Security Strategies For Hadoop Enterprise Data Lakes

    Apply Zero Trust To Your Big Data Security Strategy
    April 25, 2016 | Mike Gualtieri, John Kindervag

    The crown jewels must be protected. Data stored in Hadoop is no exception. As application development and delivery (AD&D) professionals rush to build data lakes using Hadoop, they often do so...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Mobile Security, Q1 2016

    Tools And Technology: The Mobile Security Playbook
    March 28, 2016 | Chris Sherman

    Security and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...

  • For Security & Risk Professionals

    Report

    Report It's Time To Level Up Your Mobile Application Security Program

    Processes: The Mobile Security Playbook
    March 25, 2016 | Chris Sherman

    Security leaders must balance the requirements of their digital workforce with the need to protect corporate data. This report helps security and risk (S&R) professionals better evaluate the...

  • For Application Development & Delivery Professionals

    Report

    Report Forrester Research World Application Security Forecast, 2015 To 2020 (Global)

    ForecastView Spreadsheet
    February 5, 2016 | Shaurya Priya

    This forecast, made exclusively available for Business Technology ForecastView clients, sizes and forecasts global companies’ spending on application security solutions. This forecast...

  • For Security & Risk Professionals

    Report

    Report Address The Top 10 Nontechnical Security Risks In Mobile App Development

    Continuous Improvement: The Mobile Security Playbook
    January 20, 2016 | Tyler Shields, Jennie Duong

    Security is more than just purchasing the latest next-generation solution to the most recent threat of attack. Likewise, security in mobile application development doesn't mean simply conducting a...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Zero Trust Identity Standards, Q1 2016

    Road Map: The Identity And Access Management Playbook
    January 5, 2016 | Merritt Maxim, Andras Cser

    Security and risk (S&R) professionals must ensure that identity and access information flows seamlessly across system and business boundaries for B2B access, employee single sign-on into cloud...

  • For Infrastructure & Operations Professionals

    Report

    Report The Seven Habits Of Rugged DevOps

    October 15, 2015 | Amy DeMartine, Kurt Bittner

    DevOps practices can only increase speed and quality up to a point without security and risk (S&R) pros' expertise. Old application security practices hinder speedy releases, and security...

  • For Application Development & Delivery Professionals

    Report

    Report Improve Cybersecurity With DevOps

    DevOps Gives Security Professionals New Tools And Approaches
    July 20, 2015 | Kurt Bittner, Rick Holland

    Organizations use applications to compete for customers; the faster they deliver those applications, the better they compete. Many application development and delivery (AD&D) pros are turning to...

  • For Security & Risk Professionals

    Report

    Report Top 11 Trends S&R Pros Should Watch: 2015

    June 23, 2015 | Heidi Shey, Andras Cser

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; research projects that we...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Application Security, Q2 2015

    Seek New Innovation With Hybrid Analysis; WAF Fizzles Out
    June 2, 2015 | Tyler Shields, Jennie Duong

    Application security is an important part of the overall IT security budget. Odds are, at this very moment, your firm has several application layer vulnerabilities. Reactively securing applications...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Rapid7 Pushes Into Application Security With Its NT Objectives Acquisition

    May 4, 2015 | Tyler Shields, Kelley Mak

    Over the past decade, penetration testing tools and vulnerability management vendors have continually commoditized the efforts of manual service offerings. Delivering automated, high-quality,...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Application Security, Q4 2014

    December 23, 2014 | Tyler Shields

    In Forrester's 82-criteria evaluation of application security vendors, we identified the 12 most significant service providers in the category — Beyond Security, Checkmarx, Contrast Security,...

  • For Infrastructure & Operations Professionals

    Report

    Report Building The Business Case For A Bring-Your-Own-Device (BYOD) Program

    December 4, 2014 | Michele Pelino

    This report outlines Forrester's guidance for developing a business case to justify a BYOD program to support your workforce enablement strategy. Supporting the growing number and increasing...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Public Cloud Platform Service Providers' Security, Q4 2014

    Public Cloud Platforms Step Up Their Security Game, But Is It Enough To Safely Deploy Critical Applications And Data To The Cloud?
    November 17, 2014 | Andras Cser, Ed Ferrara

    Nearly every large enterprise today is building and deploying new applications on one or more of the leading public cloud platforms. But rarely is this initiative done with the security and risk...