Search Results
-
For Security & Risk Professionals
Report
Report TechRadar™: Application Security, Q3 2017
Application Security Solutions Pivot To Meet Application Conditions
July 6, 2017 | Amy DeMartineApplications are increasingly the face of interaction between companies and their customers; this includes customer-facing applications, differentiating mobile apps, internet-of-things (IoT) device...
-
For Security & Risk Professionals
Report
Report Future-Proof Your Digital Business With Zero Trust Security
Vision: The Security Architecture And Operations Playbook
July 5, 2017 | Jeff PollardAs CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it is the perfect time to migrate to a Zero Trust security architecture. Security and risk...
-
For Security & Risk Professionals
Report
Report Breakout Vendors: Internet Of Things (IoT) Security
CENTRI, Device Authority, Mocana, And Rubicon Labs Stand Out
June 29, 2017 | Merritt MaximSecurity and risk (S&R) professionals are under increasing pressure to secure IoT deployments to minimize the risk of data breaches, disruptive cyberattacks, and even physical attacks. As a result,...
-
For Security & Risk Professionals
Report
Report Hardcoded For Failure
Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
June 21, 2017 | Chase CunninghamThere is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...
-
For Security & Risk Professionals
Report
Report Security Strength And Ease Benchmark: US Online Retailers 2017
Continuous Improvement: The Identity And Access Management Playbook
According to Forrester Data Online Retail Forecast, 2016 to 2021 (US), online retail sales have grown 15% year-over-year since 2015. As retailers expand their digital offerings and work to attract...
-
For CIO Professionals
Report
Report Zero Trust Security: A CIO's Guide To Defending Their Business From Cyberattacks
Increase Business Agility By Adopting Zero Trust
June 14, 2017 | Martha BennettLegacy, perimeter-centric models of information security are of no use in today's digital businesses, as they are no longer bounded by the four walls of their corporation. Instead, CIOs must move...
-
For Infrastructure & Operations Professionals
Report
Report Reduce Risk And Improve Security Through Infrastructure Automation
The Bad Guys Use Automation — Fight Fire With Fire
Security initiatives are becoming increasingly difficult, if not impossible, to execute manually. As infrastructure-as-code (IaC) and internet-of-things (IoT) solutions proliferate, organizations...
-
For Infrastructure & Operations Professionals
Report
Report Best Practices: Strategies For Making The Crucial Shift To DevSecOps
May 1, 2017 | Milan HansonCybersecurity needs help from infrastructure and operations (I&O) teams. Threats are evolving faster than ever and becoming increasingly sophisticated. Consumers drive shorter release cycles by...
-
For Security & Risk Professionals
Report
Report The Top Security Technology Trends To Watch, 2017
Tools And Technology: The S&R Practice Playbook
Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...
-
For Security & Risk Professionals
Report
Report Ten Basic Steps To Secure Software Containers
Instructions For Safely Developing And Deploying Software In Containers
Software containers help developers incorporate new microservice application designs, build and release code faster, and push fixes through testing more frequently. Today, most organizations use...
-
For Security & Risk Professionals
Report
Report Jump-Start Zero Trust With Forrester's Reference Architecture
A Blueprint For Protecting Customers And Employees With Zero Trust
Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security: In Zero Trust, all network traffic is inherently untrusted. In this report, we...
-
For Security & Risk Professionals
Report
Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model
Assessment: The Security Architecture And Operations Playbook
As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...
-
For Security & Risk Professionals
Report
Report Quick Take: CA Technologies Fills Its DevOps Security Gap With Veracode
March 7, 2017 | Amy DeMartineSecurity and risk (S&R) pros need the benefits of combining the development and operations (DevOps) automatic software delivery pipeline with application security testing to give developers early,...
-
For CIO Professionals
Report
Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities
Healthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...
-
For B2B Marketing Professionals
Report
Report Global Business Technographics® Devices And Security Workforce Survey, 2016: Overview
A Business Technographics Presentation
March 3, 2017 | Tyler McDanielThis report is an overview of the broad patterns occurring within information workers across multiple areas related to the devices they use and how these devices are secured, based on...
-
For Security & Risk Professionals
Report
Report Mobile Application Authentication Trends And Best Practices
The Right Authentication Method Can Make Or Break A Great Digital Experience
Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Software Composition Analysis, Q1 2017
The Six Providers That Matter Most And How They Stack Up
February 23, 2017 | Amy DeMartineIn our 38-criteria evaluation of software composition analysis (SCA) providers, we identified the six most significant ones — Black Duck Software, Flexera Software, Sonatype, Synopsys, Veracode,...
-
For Security & Risk Professionals
Report
Report Build A Cross-Functional Mobile Security Team
Organization: The Mobile Security Playbook
February 22, 2017 | Chris ShermanAs security leaders look to support business engagement with customers, partners, and employees through mobile, they often discover gaps in team expertise. To better organize talent, security execs...
-
For Security & Risk Professionals
Report
Report Define A Compelling Strategy To Secure And Protect Mobile Moments
Strategic Plan: The Mobile Security Playbook
This report helps security and risk (S&R) leaders develop comprehensive strategic mobile security plans to secure and protect both employees' and customers' mobile moments — without degrading the...
-
For Security & Risk Professionals
Report
Report Design Mobile Security Metrics With Mobile Moments In Mind
Performance Management: The Mobile Security Playbook
February 13, 2017 | Jeff PollardSecurity leaders struggling to demonstrate business value need to incorporate mobile security metrics into their reports. As companies adopt the mobile mind shift, mobile security metrics are often...
-
For Security & Risk Professionals
Report
Report Secure And Protect Mobile Moments
Executive Overview: The Mobile Security Playbook
February 6, 2017 | Christopher McCleanThe mobile mind shift is an expectation that an individual can get what she wants in her immediate context and moment of need. This shift applies to your customers and your employees....
-
For Security & Risk Professionals
Report
Report Navigate The Future Of Mobile Security
Vision: The Mobile Security Playbook
The speed at which: 1) employees have adopted mobile applications and 2) DevOps methodologies are increasing application releases has forced security and risk (S&R) pros to revamp how they approach...
-
For Security & Risk Professionals
Report
Report TechRadar™: Endpoint Security, Q1 2017
Consolidation Will Lead To A Less Fragmented Market
January 27, 2017 | Chris ShermanSecurity professionals face a fragmented market when selecting enterprise endpoint security tools; current and emerging technologies each offer benefits and challenges, a different employee...
-
For Security & Risk Professionals
Report
Report Top Cybersecurity Threats In 2017
Landscape: The Security Architecture And Operations Playbook
January 26, 2017 | Josh ZelonisSecurity and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this...
-
For Security & Risk Professionals
Report
Report The State Of Network Security: 2016 To 2017
Benchmarks: The Security Architecture And Operations Playbook
January 26, 2017 | Heidi SheyThis data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2016 to...
Content categories
- Reports (491)
- Playbooks (1)
- Data (1)
- Events (36)
- Charts & Figures (863)
- Everything (1392)
Refine your results
Date Range
- Past 7 days (2)
- Past 6 months (31)
- Past 12 months (53)
- Past 18 months (78)
Primary Role
- Security & Risk (332)
- Infrastructure & Operations (58)
- CIO (41)
- Application Development & Delivery (35)
- B2C Marketing (7)
- + Show All
- Enterprise Architecture (7)
- Sourcing & Vendor Management (5)
- B2B Marketing (2)
- Customer Insights (2)
- eBusiness & Channel Strategy (2)
Methodology
- Business Technographics (108)
- Forrester Wave (31)
- TechRadar (17)
- Consumer Technographics (9)
- Maturity Model (5)
- + Show All
- Vendor Landscape (3)
- ForecastView (2)
- Maturity Assessment (2)
- Breakout Vendors (1)
Industry
- Financial Services (43)
- Healthcare (16)
- Public Sector (14)
- Consumer Electronics (13)
- Retail (13)
- + Show All
- Manufacturing (9)
- Energy & Utilities (4)
- Media & Entertainment (3)
- Travel (3)
Topics
- Mobile Security (157)
- Network Security (115)
- Application Security (100)
- Content Security (87)
- Endpoint Security (57)
- + Show All
- Zero Trust (26)
- Antimalware (19)
- Firewalls (17)
- Digital Certificates & Public Key Infrastructures (16)
- API & SOA Security (11)
Market Imperatives
- Differentiate with digital (29)
- Excel at customer-obsessed marketing (15)
- Build an insights-driven organization (12)
- Drive revenue with great customer experience (3)
Region
- North America (106)
- Europe (82)
- Asia Pacific (28)
- Latin America (3)
- Africa (1)
Vendor
- IBM (16)
- Microsoft (14)
- Symantec (14)
- Cisco Systems (12)
- Apple (10)
- + Show All
- BlackBerry (10)
- Dell (6)
- Google (6)
- Deloitte (5)
- Hewlett-Packard (HP) (5)
- VMware (5)
- Wipro (5)
- Accenture (4)
- CSC (4)
- Intel (4)
- Sybase (4)
- Oracle (3)
- SAP (3)
- Citrix Systems (2)
- EMC (2)
- Juniper Networks (2)
- Novell (2)
- Tata Consultancy Services (TCS) (2)
- Adobe Systems (1)
- Amazon (1)
- AT&T (1)
- BMC (1)
- Facebook (1)
- FireEye (1)
- Infosys (1)
- Salesforce (1)
- Sony Electronics (1)
Analyst
- Andras Cser (56)
- Chris Sherman (45)
- Heidi Shey (40)
- Stephanie Balaouras (22)
- Noel Yuhanna (19)
- + Show All
- Merritt Maxim (13)
- Amy DeMartine (12)
- Jeff Pollard (11)
- Michele Pelino (11)
- Nick Hayes (11)
- Joseph Blankenship (9)
- Christopher McClean (6)
- Randy Heffner (6)
- Jeffrey S. Hammond (5)
- Renee Murphy (5)
- Dane Anderson (4)
- David K. Johnson (4)
- Laura Koetzle (4)
- Michael Facemire (4)
- Mike Gualtieri (4)
- Ted Schadler (4)
- Andre Kindness (3)
- Frank E. Gillett (3)
- Josh Zelonis (3)
- Shar VanBoskirk (3)
- Alexander Spiliotes (2)
- Dave Bartoletti (2)
- Enza Iannopollo (2)
- Fatemeh Khatibloo (2)
- J. P. Gownder (2)
- John Brand (2)
- Liz Herbert (2)
- Martha Bennett (2)
- Milan Hanson (2)
- TJ Keitt (2)
- Tyler McDaniel (2)
- Alex Cullen (1)
- Andrew Bartels (1)
- Brian Hopkins (1)
- Brian Luu (1)
- Charlie Dai (1)
- Chase Cunningham (1)
- Cheryl McKinnon (1)
- Chris Gardner (1)
- Christopher Mines (1)
- Christopher Voce (1)
- Claire O'Malley (1)
- Craig Le Clair (1)
- Dan Bieler (1)
- George Lawrie (1)
- Glenn O'Donnell (1)
- Henry Peyret (1)
- Joe Stanhope (1)
- Julie A. Ask (1)
- Kate McCarthy (1)
- Lauren E. Nelson (1)
- Michael Barnes (1)
- Pascal Matzke (1)
- Peter Cerrato (1)
- Reineke Reitsma (1)
- Richard Fichera (1)
- Rob Koplowitz (1)
- Robert Stroud (1)
- Roxana Strohmenger (1)
- Shaurya Priya (1)
- Zhi Ying Ng (1)
