89 results in Reports
Sort by:
Refine
  • Content Security

Featured content

Analyst Call

Forrester 2018 Prediction:

Identity Will Make Or Break Trust In Digital Ecosystems

Governments will lose their perch as the sole providers of reliable, verified identities. As customers increasingly engage with businesses through digital, rather than in-person, channels, firms have to ensure they minimize fraud by issuing online credentials and allowing only trustworthy customers to transact with them.

Read the full report »

Search Results

  • For Security & Risk Professionals

    Report

    Report Security Strength And Ease Benchmark: US Most-Visited Federal Government Websites, 2017

    Only 33% of federal customers are confident that the government keeps their personal information secure, and almost 50% rate federal website ease of use as neutral or poor. In this report for S&R...

  • For Security & Risk Professionals

    Report

    Report Protect Your Digital Workforce With Browser Isolation Technology (BIT)

    BIT Helps S&R Pros Implement Zero Trust For Workforce Security
    July 21, 2017 | Chase Cunningham

    Employees today must use a browser to access most of their corporate applications, email, and collaboration tools. A variety of common threat vectors target basic user interactions as employees use...

  • For Security & Risk Professionals

    Report

    Report Security Strength And Ease Benchmark: US Online Retailers 2017

    Continuous Improvement: The Identity And Access Management Playbook

    According to Forrester Data Online Retail Forecast, 2016 to 2021 (US), online retail sales have grown 15% year-over-year since 2015. As retailers expand their digital offerings and work to attract...

  • For Security & Risk Professionals

    Report

    Report Top Cybersecurity Threats In 2017

    Landscape: The Security Architecture And Operations Playbook
    January 26, 2017 | Josh Zelonis

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this...

  • For Security & Risk Professionals

    Report

    Report Forrester's Customer IAM Security Maturity Assessment Model

    December 12, 2016 | Andras Cser, Merritt Maxim

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...

  • For Security & Risk Professionals

    Report

    Report Brief: Five Key Capabilities For Microsoft Office 365 Email Security

    Microsoft Takes Steps In The Right Direction, But Microsoft Alone Might Not Be Enough
    June 29, 2016 | Kelley Mak

    Productivity and collaboration tools are an essential technology component of workforce enablement, and because of its economics, scale, and familiar interfaces, Microsoft's Office 365 online...

  • For Security & Risk Professionals

    Report

    Report Brief: FireEye Is Evolving Into An Enterprise Security Vendor

    Recent Acquisitions Indicate FireEye Is Ready To Advance Security Automation
    March 30, 2016 | Jeff Pollard, Joseph Blankenship, Kelley Mak

    FireEye's acquisition of automation specialist Invotas International comes just 10 days after its acquisition of threat intelligence specialist iSight Partners. With these and prior acquisitions,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Mobile Security, Q1 2016

    Tools And Technology: The Mobile Security Playbook
    March 28, 2016 | Chris Sherman

    Security and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q1 2016

    Tools To Define, Dissect, And Defend Your Data
    February 22, 2016 | Stephanie Balaouras, John Kindervag, Heidi Shey

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

  • For Security & Risk Professionals

    Report

    Report Brief: Protect Employees And Customers From Malvertising

    December 2, 2015 | Kelley Mak

    Malvertising is one of the security threats creating the latest buzz. Using the mechanics of the advertising ecosystem to their advantage, attackers are serving malware to users through web...

  • For Security & Risk Professionals

    Report

    Report S&R Pros Must Empower Employees To Prevent Phishing Attacks

    Technology Alone Won't Stop Attacks; Security Awareness Is Critical
    August 20, 2015 | Kelley Mak, Rick Holland

    In a phishing attack, cybercriminals use email and/or social media to trick employees into revealing confidential information about themselves or their firms or clicking on malicious files or web...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: SaaS Web Content Security, Q2 2015

    The Eight Providers That Matter Most And How They Stack Up
    June 26, 2015 | Rick Holland, Kelley Mak

    In Forrester's 26-criteria evaluation of web content security delivered as a software-as-a-service (SaaS) solution, we identified the eight most significant providers in the category — Barracuda...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Rapid7 Pushes Into Application Security With Its NT Objectives Acquisition

    May 4, 2015 | Tyler Shields, Kelley Mak, Rick Holland

    Over the past decade, penetration testing tools and vulnerability management vendors have continually commoditized the efforts of manual service offerings. Delivering automated, high-quality,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Zero Trust Network Threat Mitigation Technology, Q1 2015

    January 28, 2015 | John Kindervag, Kelley Mak

    Not a week goes by without news of network attacks and stolen data. Consumers routinely undergo the stress of fraudulent charges or compromised credit cards. Digital businesses lose millions in...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Sony Breach — A Sad Tale Of Epic Failure That Could Have Been Avoided

    Businesses Must Prepare For Politically And Socially Motivated Cyberattacks And Cyberespionage
    December 18, 2014 | Rick Holland, Renee Murphy, Ed Ferrara

    . In this report, Forrester will summarize the currently available details and provide recommendations that S&R pros must consider to reinforce their cybersecurity programs and protect their...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Brand Monitoring And Protection

    Tools To Monitor Your External Environment, Enhance Risk Intelligence, And Secure Your Brand
    July 18, 2014 | Nick Hayes

    Your brand is incredibly distributed online today, spread across a wide range of websites, media outlets, search engines, marketplaces, social networks, forums, mobile apps, and online ads — and...

  • For Security & Risk Professionals

    Report

    Report Brief: Proofpoint Strengthens Its Targeted Attack Defense With NetCitadel Acquisition

    Acquisition Is Proof That You Must Integrate Advanced Detection With Incident Response
    June 19, 2014 | Rick Holland, Heidi Shey

    On May 20, 2014, Proofpoint announced that it had acquired Silicon-Valley-based startup NetCitadel, a privately owned incident response company, for approximately $24 million in cash. While small,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q2 2014

    Tools To Define, Dissect, And Defend Your Data
    April 22, 2014 | Stephanie Balaouras, John Kindervag, Heidi Shey

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...

  • For Security & Risk Professionals

    Report

    Report Top 15 Trends S&R Pros Should Watch: 2014

    April 18, 2014 | Andras Cser, Andrew Rose, Chris Sherman

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research...

  • For Customer Insights Professionals

    Report

    Report Is Your Customer Insights Practice Ready For EU Privacy?

    Q&A: EU Privacy Regulations
    April 3, 2014 | Fatemeh Khatibloo, Chris Sherman, Andrew Rose

    This report, originally written for security and risk professionals, is of critical importance to customer insights (CI) professionals as well. The European Union is poised to increase demands of...

  • For Security & Risk Professionals

    Report

    Report Tech Spotlight: Enterprise File Sharing

    The State Of Enterprise File Sharing In 2013 And What It Means For S&R Pros
    December 20, 2013 | Heidi Shey

    Much of the information used in the course of doing business today exists in a digital format, and there comes a point when it's necessary to share this data with other employees or key business...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Moving On Up The Security Stack, F5 Acquires Versafe

    September 18, 2013 | Andras Cser, Tyler Shields, Rick Holland

    On September 17, F5 Networks announced its acquisition of web security and antifraud vendor Versafe for an undisclosed sum. With this acquisition, F5 expands its burgeoning security portfolio...

  • For Application Development & Delivery Professionals

    Report

    Report Mobile Solution Architecture: User Authentication Is The Foundation Of Mobile Trust

    Start Small And Keep An Eye On The Breadth Of Your Future Mobile Scenarios
    April 12, 2013 | Randy Heffner

    User authentication is a key foundation of security for mobile apps — as it is for application security in general. Determining which authentication approach to use for your mobile solution...

  • For Security & Risk Professionals

    Report

    Report Top 15 Trends S&R Pros Should Watch: Q2 2013

    April 9, 2013 | John Kindervag, Stephanie Balaouras, Nick Hayes

    From frantic security operations problems to the changing threat landscape, CISOs, senior security leaders, and other IT risk management leaders consistently have trouble keeping up with key trends...

  • For Security & Risk Professionals

    Report

    Report Manage The Risks Of Social Media

    November 29, 2012 | Nick Hayes

    Social media is a security and risk nightmare — it's used everywhere, all the time, by everyone both outside and inside your organization. Although social media offers potentially great marketing...