Advanced Search
97 results in Reports
Sort by:
Refine
  • Application Security

Search Results

  • For Infrastructure & Operations Professionals

    Report

    Report Best Practices: Strategies For Making The Crucial Shift To DevSecOps

    May 1, 2017 | Milan Hanson

    Cybersecurity needs help from infrastructure and operations (I&O) teams. Threats are evolving faster than ever and becoming increasingly sophisticated. Consumers drive shorter release cycles by...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook
    April 26, 2017 | Merritt Maxim, Jeff Pollard

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Ten Basic Steps To Secure Software Containers

    Instructions For Safely Developing And Deploying Software In Containers
    April 14, 2017 | Amy DeMartine, Dave Bartoletti

    Software containers help developers incorporate new microservice application designs, build and release code faster, and push fixes through testing more frequently. Today, most organizations use...

  • For Security & Risk Professionals

    Report

    Report Quick Take: CA Technologies Fills Its DevOps Security Gap With Veracode

    March 7, 2017 | Amy DeMartine

    Security and risk (S&R) pros need the benefits of combining the development and operations (DevOps) automatic software delivery pipeline with application security testing to give developers early,...

  • For Security & Risk Professionals

    Report

    Report Mobile Application Authentication Trends And Best Practices

    The Right Authentication Method Can Make Or Break A Great Digital Experience
    March 2, 2017 | Andras Cser, Michael Facemire

    Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Software Composition Analysis, Q1 2017

    The Six Providers That Matter Most And How They Stack Up
    February 23, 2017 | Amy DeMartine

    In our 38-criteria evaluation of software composition analysis (SCA) providers, we identified the six most significant ones — Black Duck Software, Flexera Software, Sonatype, Synopsys, Veracode,...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Web Application Firewalls

    WAFs Remain Relevant With Machine Learning Features
    January 20, 2017 | Amy DeMartine

    Security pros started widely adopting web application firewalls (WAFs) back in 2006. During the past 10 years, WAF vendors have evolved their products to make them easier to maintain, more...

  • For Infrastructure & Operations Professionals

    Report

    Report Five Steps To Reinforce And Harden Application Security

    I&O Teams Must Prevent And Remediate App Vulnerabilities
    January 13, 2017 | Milan Hanson, Amy DeMartine

    Today's cybercriminals are highly skilled, resourceful, and determined. Vulnerabilities such as web server misconfigurations or components that include known vulnerabilities give cybercriminals...

  • For Security & Risk Professionals

    Report

    Report Secure Applications At The Speed Of DevOps

    How To Leverage DevOps Trends To Strengthen Applications
    December 16, 2016 | Amy DeMartine

    DevOps methodologies are increasing the pace of application releases, straining security teams that protect those applications at a time when security expertise is already scarce. Security pros...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Cloud Security Gateways, Q4 2016

    The Eight Providers That Matter Most And How They Stack Up
    November 15, 2016 | Andras Cser

    In our 23-criteria evaluation of cloud security gateway (CSG) providers, we identified the eight most significant ones — Bitglass, Blue Coat/Symantec, CipherCloud, CloudLock/Cisco, Imperva,...

  • For Security & Risk Professionals

    Report

    Report The State Of Application Security: 2016 And Beyond

    App Dev Is Leaving Security In The Dust, But You Can Change That
    November 9, 2016 | Amy DeMartine

    Applications are under siege, and successful application attacks are the source of the biggest data loss. At the same time, applications are shifting toward more speedy releases. To keep up,...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Software Composition Analysis

    Security, Legal, And App Dev Pros Find Common Value In Dependency Management
    October 21, 2016 | Amy DeMartine

    Software composition analysis (SCA) tools provide valuable data to security pros, legal pros, and app developers by identifying software vulnerabilities and exposing licenses for open source...

  • For CIO Professionals

    Report

    Report Brief: Learning The Lessons From Two Major Disasters In The Blockchain Universe

    What The DAO Debacle And The Bitfinex Hack Mean For Enterprise Blockchain Initiatives
    August 25, 2016 | Martha Bennett

    Whether you followed the headlines about The DAO fiasco and the resultant Ethereum hard fork, or the disappearance of nearly 120,000 Bitcoins from cryptocurrency exchange Bitfinex — if you have...

  • For Application Development & Delivery Professionals

    Report

    Report Brief: App Security Can't Happen Without Developers

    Use A Combination Of People And Tools To Deliver Secure Apps
    May 26, 2016 | John M. Wargo

    Application development and delivery (AD&D) professionals must keep security front and center when they're crafting apps that run outside of the firewall. Otherwise, they risk finding their brands...

  • For Application Development & Delivery Professionals

    Report

    Report Big Data Security Strategies For Hadoop Enterprise Data Lakes

    Apply Zero Trust To Your Big Data Security Strategy
    April 25, 2016 | Mike Gualtieri, John Kindervag

    The crown jewels must be protected. Data stored in Hadoop is no exception. As application development and delivery (AD&D) professionals rush to build data lakes using Hadoop, they often do so...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Mobile Security, Q1 2016

    Tools And Technology: The Mobile Security Playbook
    March 28, 2016 | Chris Sherman

    Security and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...

  • For Security & Risk Professionals

    Report

    Report It's Time To Level Up Your Mobile Application Security Program

    Processes: The Mobile Security Playbook
    March 25, 2016 | Chris Sherman

    Security leaders must balance the requirements of their digital workforce with the need to protect corporate data. This report helps security and risk (S&R) professionals better evaluate the...

  • For Application Development & Delivery Professionals

    Report

    Report Forrester Research World Application Security Forecast, 2015 To 2020 (Global)

    ForecastView Spreadsheet
    February 5, 2016 | Shaurya Priya

    This forecast, made exclusively available for Business Technology ForecastView clients, sizes and forecasts global companies’ spending on application security solutions. This forecast...

  • For Security & Risk Professionals

    Report

    Report Address The Top 10 Nontechnical Security Risks In Mobile App Development

    Continuous Improvement: The Mobile Security Playbook
    January 20, 2016 | Tyler Shields, Jennie Duong

    Security is more than just purchasing the latest next-generation solution to the most recent threat of attack. Likewise, security in mobile application development doesn't mean simply conducting a...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Zero Trust Identity Standards, Q1 2016

    Road Map: The Identity And Access Management Playbook
    January 5, 2016 | Merritt Maxim, Andras Cser

    Security and risk (S&R) professionals must ensure that identity and access information flows seamlessly across system and business boundaries for B2B access, employee single sign-on into cloud...

  • For Infrastructure & Operations Professionals

    Report

    Report The Seven Habits Of Rugged DevOps

    October 15, 2015 | Amy DeMartine, Kurt Bittner

    DevOps practices can only increase speed and quality up to a point without security and risk (S&R) pros' expertise. Old application security practices hinder speedy releases, and security...

  • For Application Development & Delivery Professionals

    Report

    Report Improve Cybersecurity With DevOps

    DevOps Gives Security Professionals New Tools And Approaches
    July 20, 2015 | Kurt Bittner, Rick Holland

    Organizations use applications to compete for customers; the faster they deliver those applications, the better they compete. Many application development and delivery (AD&D) pros are turning to...

  • For Security & Risk Professionals

    Report

    Report Top 11 Trends S&R Pros Should Watch: 2015

    June 23, 2015 | Heidi Shey, Andras Cser

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; research projects that we...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Application Security, Q2 2015

    Seek New Innovation With Hybrid Analysis; WAF Fizzles Out
    June 2, 2015 | Tyler Shields, Jennie Duong

    Application security is an important part of the overall IT security budget. Odds are, at this very moment, your firm has several application layer vulnerabilities. Reactively securing applications...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Rapid7 Pushes Into Application Security With Its NT Objectives Acquisition

    May 4, 2015 | Tyler Shields, Kelley Mak

    Over the past decade, penetration testing tools and vulnerability management vendors have continually commoditized the efforts of manual service offerings. Delivering automated, high-quality,...