499 results in Reports
Sort by:
Refine
  • Information Security

Search Results

  • For Security & Risk Professionals

    Report

    Report Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook
    September 19, 2017 | Stephanie Balaouras, Heidi Shey

    In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • For Security & Risk Professionals

    Report

    Report Secure The Rise Of Intelligent Agents

    Securing Intelligent Agents Will Stress Application Security Basics
    September 14, 2017 | Amy DeMartine, Jennifer Wise

    Early-stage intelligent agents (IAs) have arrived and are gaining traction among consumers. Leaving behind the direct, detailed commands of their virtual assistant predecessors, IAs will soon see...

  • For Security & Risk Professionals

    Report

    Report Artificial Intelligence Will Revolutionize Cybersecurity

    But Security Leaders Must View All Vendor Claims With Skepticism
    September 14, 2017 | Chase Cunningham, Joseph Blankenship

    Security vendors are inundating CISOs with products purporting to use artificial intelligence to dramatically improve the accuracy and speed of both threat detection and response. However, much of...

  • For Security & Risk Professionals

    Report

    Report Assess The Maturity Of Your Application Security Program

    Know What Application Security Functions To Prioritize, And How
    September 14, 2017 | Amy DeMartine

    Successful attacks on applications continue to prove the ubiquity of software vulnerabilities, and now that applications are releasing faster than ever, the problem will grow much worse if not...

  • For Security & Risk Professionals

    Report

    Report Security Strength And Ease Benchmark: US Most-Visited Federal Government Websites, 2017

    September 14, 2017 | Andras Cser, Rick Parrish

    Only 33% of federal customers are confident that the government keeps their personal information secure, and almost 50% rate federal website ease of use as neutral or poor. In this report for S&R...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Cloud Workload Security Solutions, Q3 2017

    New CWS Functionality Offers Better Breach Detection, Granular Control, And More Cloud Integration
    September 1, 2017 | Andras Cser

    As businesses continue to adopt both infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) cloud platforms, S&R pros struggle to protect their organization's valuable data while...

  • For Security & Risk Professionals

    Report

    Report Forrester Data: Endpoint Security Software Forecast, 2016 To 2021 (Global)

    ForecastView Document
    August 22, 2017 | Jennifer Adams, Chris Sherman

    Hackers are creating new, more sophisticated malware daily, and endpoint security solutions provide a critical line of defense to protect PCs, laptops, and servers from these malicious threats....

  • For Security & Risk Professionals

    Report

    Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    August 18, 2017 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Application Security Testing

    Choose The Right SAST, DAST, MAST, And IAST For Your Firm's Developers
    August 7, 2017 | Amy DeMartine

    Application releases are getting faster, especially as developers make use of DevOps methodologies to automate releases. Security pros can support and even drive these changes using continuous...

  • For Infrastructure & Operations Professionals

    Report

    Report Improve Skills And Staffing For A Better Employee Experience

    Organization: The Workforce Enablement Playbook
    August 2, 2017 | David K. Johnson, Michele Pelino

    Enterprises have a growing awareness of how technology affects employee productivity, turnover, customer experience (CX), and financial performance. To lead, infrastructure and operations (I&O)...

  • For Security & Risk Professionals

    Report

    Report Ransomware Protection: Five Best Practices

    Harden Your Defenses Now For This Growing Threat
    July 27, 2017 | Chris Sherman, Salvatore Schiano

    Ransomware is holding enterprises hostage. Recent outbreaks from variants such as WannaCry and Petya have many security and risk (S&R) pros wondering if they can prevent this growing threat. By...

  • For Security & Risk Professionals

    Report

    Report Protect Your Digital Workforce With Browser Isolation Technology (BIT)

    BIT Helps S&R Pros Implement Zero Trust For Workforce Security
    July 21, 2017 | Chase Cunningham

    Employees today must use a browser to access most of their corporate applications, email, and collaboration tools. A variety of common threat vectors target basic user interactions as employees use...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Application Security, Q3 2017

    Application Security Solutions Pivot To Meet Application Conditions
    July 6, 2017 | Amy DeMartine

    Applications are increasingly the face of interaction between companies and their customers; this includes customer-facing applications, differentiating mobile apps, internet-of-things (IoT) device...

  • For Security & Risk Professionals

    Report

    Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Security Architecture And Operations Playbook
    July 5, 2017 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it is the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • For Security & Risk Professionals

    Report

    Report Breakout Vendors: Internet Of Things (IoT) Security

    CENTRI, Device Authority, Mocana, And Rubicon Labs Stand Out
    June 29, 2017 | Merritt Maxim

    Security and risk (S&R) professionals are under increasing pressure to secure IoT deployments to minimize the risk of data breaches, disruptive cyberattacks, and even physical attacks. As a result,...

  • For Security & Risk Professionals

    Report

    Report Hardcoded For Failure

    Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
    June 21, 2017 | Chase Cunningham

    There is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...

  • For Security & Risk Professionals

    Report

    Report Security Strength And Ease Benchmark: US Online Retailers 2017

    Continuous Improvement: The Identity And Access Management Playbook
    June 15, 2017 | Andras Cser, Alexander Spiliotes

    According to Forrester Data Online Retail Forecast, 2016 to 2021 (US), online retail sales have grown 15% year-over-year since 2015. As retailers expand their digital offerings and work to attract...

  • For CIO Professionals

    Report

    Report Zero Trust Security: A CIO's Guide To Defending Their Business From Cyberattacks

    Increase Business Agility By Adopting Zero Trust
    June 14, 2017 | Martha Bennett

    Legacy, perimeter-centric models of information security are of no use in today's digital businesses, as they are no longer bounded by the four walls of their corporation. Instead, CIOs must move...

  • For Infrastructure & Operations Professionals

    Report

    Report Reduce Risk And Improve Security Through Infrastructure Automation

    The Bad Guys Use Automation — Fight Fire With Fire

    Security initiatives are becoming increasingly difficult, if not impossible, to execute manually. As infrastructure-as-code (IaC) and internet-of-things (IoT) solutions proliferate, organizations...

  • For Infrastructure & Operations Professionals

    Report

    Report Best Practices: Strategies For Making The Crucial Shift To DevSecOps

    May 1, 2017 | Milan Hanson

    Cybersecurity needs help from infrastructure and operations (I&O) teams. Threats are evolving faster than ever and becoming increasingly sophisticated. Consumers drive shorter release cycles by...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook
    April 26, 2017 | Merritt Maxim, Jeff Pollard

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Ten Basic Steps To Secure Software Containers

    Instructions For Safely Developing And Deploying Software In Containers
    April 14, 2017 | Amy DeMartine, Dave Bartoletti

    Software containers help developers incorporate new microservice application designs, build and release code faster, and push fixes through testing more frequently. Today, most organizations use...

  • For Security & Risk Professionals

    Report

    Report Jump-Start Zero Trust With Forrester's Reference Architecture

    A Blueprint For Protecting Customers And Employees With Zero Trust
    March 27, 2017 | Laura Koetzle, Andre Kindness

    Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security: In Zero Trust, all network traffic is inherently untrusted. In this report, we...

  • For Security & Risk Professionals

    Report

    Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...

  • For Security & Risk Professionals

    Report

    Report Quick Take: CA Technologies Fills Its DevOps Security Gap With Veracode

    March 7, 2017 | Amy DeMartine

    Security and risk (S&R) pros need the benefits of combining the development and operations (DevOps) automatic software delivery pipeline with application security testing to give developers early,...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst