Search Results
-
For Security & Risk Professionals
Report
Report Security Strength And Ease Benchmark: US Online Retailers 2017
Continuous Improvement: The Identity And Access Management Playbook
According to Forrester Data Online Retail Forecast, 2016 to 2021 (US), online retail sales have grown 15% year-over-year since 2015. As retailers expand their digital offerings and work to attract...
-
For Security & Risk Professionals
Report
Report Top Cybersecurity Threats In 2017
Landscape: The Security Architecture And Operations Playbook
January 26, 2017 | Josh ZelonisSecurity and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this...
-
For Security & Risk Professionals
Report
Report Forrester's Customer IAM Security Maturity Assessment Model
Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...
-
For Security & Risk Professionals
Report
Report Brief: Five Key Capabilities For Microsoft Office 365 Email Security
Microsoft Takes Steps In The Right Direction, But Microsoft Alone Might Not Be Enough
June 29, 2016 | Kelley MakProductivity and collaboration tools are an essential technology component of workforce enablement, and because of its economics, scale, and familiar interfaces, Microsoft's Office 365 online...
-
For Security & Risk Professionals
Report
Report Brief: FireEye Is Evolving Into An Enterprise Security Vendor
Recent Acquisitions Indicate FireEye Is Ready To Advance Security Automation
FireEye's acquisition of automation specialist Invotas International comes just 10 days after its acquisition of threat intelligence specialist iSight Partners. With these and prior acquisitions,...
-
For Security & Risk Professionals
Report
Report TechRadar™: Mobile Security, Q1 2016
Tools And Technology: The Mobile Security Playbook
March 28, 2016 | Chris ShermanSecurity and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...
-
For Security & Risk Professionals
Report
Report TechRadar™: Data Security, Q1 2016
Road Map: The Data Security And Privacy Playbook
February 22, 2016 | Stephanie Balaouras, John KindervagAs data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...
-
For Security & Risk Professionals
Report
Report Brief: Protect Employees And Customers From Malvertising
December 2, 2015 | Kelley MakMalvertising is one of the security threats creating the latest buzz. Using the mechanics of the advertising ecosystem to their advantage, attackers are serving malware to users through web...
-
For Security & Risk Professionals
Report
Report S&R Pros Must Empower Employees To Prevent Phishing Attacks
Technology Alone Won't Stop Attacks; Security Awareness Is Critical
August 20, 2015 | Kelley Mak, Rick HollandIn a phishing attack, cybercriminals use email and/or social media to trick employees into revealing confidential information about themselves or their firms or clicking on malicious files or web...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: SaaS Web Content Security, Q2 2015
The Eight Providers That Matter Most And How They Stack Up
June 26, 2015 | Rick Holland, Kelley MakIn Forrester's 26-criteria evaluation of web content security delivered as a software-as-a-service (SaaS) solution, we identified the eight most significant providers in the category — Barracuda...
-
For Security & Risk Professionals
Report
Report Quick Take: Rapid7 Pushes Into Application Security With Its NT Objectives Acquisition
May 4, 2015 | Tyler Shields, Kelley MakOver the past decade, penetration testing tools and vulnerability management vendors have continually commoditized the efforts of manual service offerings. Delivering automated, high-quality,...
-
For Security & Risk Professionals
Report
Report TechRadar™: Zero Trust Network Threat Mitigation Technology, Q1 2015
January 28, 2015 | John Kindervag, Kelley MakNot a week goes by without news of network attacks and stolen data. Consumers routinely undergo the stress of fraudulent charges or compromised credit cards. Digital businesses lose millions in...
-
For Security & Risk Professionals
Report
Report Quick Take: Sony Breach — A Sad Tale Of Epic Failure That Could Have Been Avoided
Businesses Must Prepare For Politically And Socially Motivated Cyberattacks And Cyberespionage
December 18, 2014 | Rick Holland, Renee MurphyAlthough we are in the early stages of Sony Pictures Entertainment's (SPE's) catastrophically embarrassing intrusion, there are still many lessons that security and risk (S&R) professionals can...
-
For Security & Risk Professionals
Report
Report Market Overview: Brand Monitoring And Protection
Tools To Monitor Your External Environment, Enhance Risk Intelligence, And Secure Your Brand
July 18, 2014 | Nick HayesYour brand is incredibly distributed online today, spread across a wide range of websites, media outlets, search engines, marketplaces, social networks, forums, mobile apps, and online ads —...
-
For Security & Risk Professionals
Report
Report Brief: Proofpoint Strengthens Its Targeted Attack Defense With NetCitadel Acquisition
Acquisition Is Proof That You Must Integrate Advanced Detection With Incident Response
June 19, 2014 | Rick Holland, Heidi SheyOn May 20, 2014, Proofpoint announced that it had acquired Silicon-Valley-based startup NetCitadel, a privately owned incident response company, for approximately $24 million in cash. While small,...
-
For Security & Risk Professionals
Report
Report TechRadar™: Data Security, Q2 2014
Tools To Define, Dissect, And Defend Your Data
April 22, 2014 | Stephanie Balaouras, John KindervagWe designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...
-
For Security & Risk Professionals
Report
Report Top 15 Trends S&R Pros Should Watch: 2014
April 18, 2014 | Andras Cser, Andrew RoseEach year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research...
-
For Customer Insights Professionals
Report
Report Is Your Customer Insights Practice Ready For EU Privacy?
Q&A: EU Privacy Regulations
This report, originally written for security and risk professionals, is of critical importance to customer insights (CI) professionals as well. The European Union is poised to increase demands of...
-
For Security & Risk Professionals
Report
Report Tech Spotlight: Enterprise File Sharing
The State Of Enterprise File Sharing In 2013 And What It Means For S&R Pros
December 20, 2013 | Heidi SheyMuch of the information used in the course of doing business today exists in a digital format, and there comes a point when it's necessary to share this data with other employees or key business...
-
For Security & Risk Professionals
Report
Report Quick Take: Moving On Up The Security Stack, F5 Acquires Versafe
September 18, 2013 | Andras Cser, Tyler ShieldsOn September 17, F5 Networks announced its acquisition of web security and antifraud vendor Versafe for an undisclosed sum. With this acquisition, F5 expands its burgeoning security portfolio...
-
For Application Development & Delivery Professionals
Report
Report Mobile Solution Architecture: User Authentication Is The Foundation Of Mobile Trust
Start Small And Keep An Eye On The Breadth Of Your Future Mobile Scenarios
April 12, 2013 | Randy HeffnerUser authentication is a key foundation of security for mobile apps — as it is for application security in general. Determining which authentication approach to use for your mobile solution...
-
For Security & Risk Professionals
Report
Report Top 15 Trends S&R Pros Should Watch: Q2 2013
April 9, 2013 | John Kindervag, Stephanie BalaourasFrom frantic security operations problems to the changing threat landscape, CISOs, senior security leaders, and other IT risk management leaders consistently have trouble keeping up with key trends...
-
For Security & Risk Professionals
Report
Report Manage The Risks Of Social Media
November 29, 2012 | Nick HayesSocial media is a security and risk nightmare — it's used everywhere, all the time, by everyone both outside and inside your organization. Although social media offers potentially great...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Email Content Security, Q4 2012
The Nine Providers That Matter Most And How They Stack Up
November 15, 2012 | Rick HollandIn Forrester's 47-criteria evaluation of email content security vendors, we identified the nine most significant vendors in the category and researched, analyzed, and scored them: Barracuda...
-
For Security & Risk Professionals
Report
Report Prepare Your Security Organization For The Internet Of Things
Why The Next Internet Revolution Is Much More Alarming Than The Last
October 23, 2012 | Andrew RoseThere is a revolution happening right now; innovative organizations are planning how they can merge the physical and digital worlds to bring new products and experiences to their customers. At the...
Content categories
- Reports (87)
- Data (1)
- Events (6)
- Charts & Figures (128)
- Everything (222)
Refine your results
Date Range
- Past 6 months (2)
- Past 12 months (3)
- Past 18 months (7)
Primary Role
- Security & Risk (61)
- CIO (13)
- B2C Marketing (7)
- Infrastructure & Operations (2)
- Application Development & Delivery (1)
- + Show All
- Customer Insights (1)
- eBusiness & Channel Strategy (1)
- Enterprise Architecture (1)
Methodology
- Business Technographics (22)
- TechRadar (8)
- Forrester Wave (7)
- Consumer Technographics (5)
- Maturity Assessment (1)
- + Show All
- Maturity Model (1)
Industry
- Consumer Electronics (10)
- Financial Services (2)
- Media & Entertainment (1)
- Retail (1)
Topics
- Web Content Security (49)
- Email Content Security (37)
Market Imperatives
- Build an insights-driven organization (2)
- Differentiate with digital (2)
- Excel at customer-obsessed marketing (2)
Region
- North America (26)
- Europe (24)
- Asia Pacific (2)
- Latin America (1)
Vendor
- Cisco Systems (3)
- CSC (3)
- Deloitte (3)
- Wipro (3)
- Microsoft (2)
- + Show All
- Symantec (2)
- FireEye (1)
- Google (1)
- Hewlett-Packard (HP) (1)
- Sony Electronics (1)
Analyst
- Heidi Shey (8)
- Andras Cser (5)
- Chris Sherman (5)
- Nick Hayes (5)
- Stephanie Balaouras (4)
- + Show All
- Shar VanBoskirk (3)
- Merritt Maxim (2)
- Alex Cullen (1)
- Alexander Spiliotes (1)
- Fatemeh Khatibloo (1)
- Jeff Pollard (1)
- Joseph Blankenship (1)
- Josh Zelonis (1)
- Randy Heffner (1)
- Reineke Reitsma (1)
- Renee Murphy (1)
- Roxana Strohmenger (1)
