Search Results
-
For Security & Risk Professionals
Report
Report Ransomware Protection Best Practices
Harden Your Defenses Now For This Growing Threat
November 4, 2016 | Chris Sherman, John KindervagRansomware, once just a consumer scourge, is increasingly holding enterprises hostage. However, by focusing on the basics and implementing proper controls, security and risk (S&R) pros can slow the...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Automated Malware Analysis, Q2 2016
April 21, 2016 | Jeff Pollard, Kelley MakIn our 36-criteria evaluation of automated malware analysis providers, we identified the 11 most significant ones — Blue Coat, Check Point, Cisco, Cyphort, Fidelis Cybersecurity, FireEye, Fortinet,...
-
For Security & Risk Professionals
Report
Report Brief: FireEye Is Evolving Into An Enterprise Security Vendor
Recent Acquisitions Indicate FireEye Is Ready To Advance Security Automation
FireEye's acquisition of automation specialist Invotas International comes just 10 days after its acquisition of threat intelligence specialist iSight Partners. With these and prior acquisitions,...
-
For Security & Risk Professionals
Report
Report TechRadar™: Mobile Security, Q1 2016
Tools And Technology: The Mobile Security Playbook
March 28, 2016 | Chris ShermanSecurity and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...
-
For Security & Risk Professionals
Report
Report Brief: Top 13 Takeaways From Black Hat USA 2015
Security Researchers Demonstrate Vulnerabilities In The Internet, Connected Cars, And Critical Infrastructure
September 2, 2015 | Rick Holland, Tyler ShieldsIn this brief, we examine the most important takeaways from the Black Hat USA 2015 conference in August. We discuss factors driving the emergence of certain trends and why security and risk (S&R)...
-
For Security & Risk Professionals
Report
Report Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities
Multiple Technologies Are Required For Breach Detection
July 24, 2014 | Rick HollandIn part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and...
-
For Security & Risk Professionals
Report
Report Prepare For The Post-AV Era Part 2: Layer Your Endpoint Security Tools For Max Protection
July 7, 2014 | Chris ShermanIn this second report covering the post-antivirus (AV) era, we discuss how a layered approach to endpoint security can help decrease the risk of attack significantly beyond what antivirus alone can...
-
For Security & Risk Professionals
Report
Report Prepare For The Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus
S&R Pros Are Shifting AV Spend To More Proactive Security Technologies
June 9, 2014 | Chris ShermanAs malware increases in sophistication and the number of new variants rises, antivirus (AV) technologies have steadily become less effective at stopping advanced threats to employee endpoints and...
-
For Security & Risk Professionals
Report
Report TechRadar™: Enterprise Mobile Security, Q4 2013
December 13, 2013 | Tyler ShieldsThere are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application layer,...
-
For Security & Risk Professionals
Report
Report Introducing Forrester's Prioritized Patching Process (P3)
Leverage Predictive Threat Modeling And Data Value For A Context-Based Approach To Patch Prioritization
November 11, 2013 | Chris Sherman, John KindervagCriminals want access to your valuable assets, and one of their preferred methods is to exploit vulnerabilities lurking in your software and systems. Typically, these vulnerabilities have available...
-
For Security & Risk Professionals
Report
Report Endpoint Security Suite Market Update: Q2 2013
Forrester's Post-Wave™ Evaluation Of New Product Updates
July 23, 2013 | Chris ShermanIn Q1 2013, Forrester published the Endpoint Security Wave™, a 50-criteria evaluation of the top nine endpoint security vendors. As part of our mission to keep our clients informed of...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Endpoint Security, Q1 2013
Endpoint Security Suites Take Center Stage In The Enterprise
January 4, 2013 | Chenxi Wang, Chris ShermanIn Forrester's 50 criteria evaluation of endpoint security vendors, we identified nine top providers in the category — F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec,...
-
For Security & Risk Professionals
Report
Report The 2012 Consumer Security Market Landscape: Key Dynamics And Growth Opportunities
November 28, 2012 | Heidi SheyFreeware solutions, device proliferation, consumerization, the app Internet, and new entrants offering adjacent consumer privacy and security offerings have and will continue to change consumer...
-
For Security & Risk Professionals
Report
Report Application Control: An Essential Endpoint Security Component
September 7, 2012 | Chenxi Wang, Chris ShermanIt's no mystery that antivirus (AV) technologies are fighting a losing battle against an increasingly sophisticated malware threat landscape. Attackers often penetrate user endpoints with new...
-
For Security & Risk Professionals
Report
Report Malware And Trojans And Bots, Oh My!
Stop Chasing Malware Flavor Of The Month, Start Planning Strategically
February 28, 2011 | Chenxi Wang2010 was an exciting year on the malware calendar — the year that brought us Operation Aurora, Zeus, and Stuxnet. Malware is now a widespread problem for both consumers and businesses....
-
For CIO Professionals
Report
Report Enterprise Antivirus Market Shares In Australia
May 31, 2010 | Dane AndersonThis report provides detailed analytical information on enterprise use of IT in the Asia Pacific IT marketplace for vendor strategists. The document highlights the market share for antivirus...
-
For CIO Professionals
Report
Report Consumer Security Market Trends, 2009 To 2010: The Freeware Threat
December 4, 2009 | Jonathan PennThe rise of freeware represents one of the most disruptive forces to hit the consumer security market. Free solutions of good quality have changed the market dynamic from one where original...
-
For Security & Risk Professionals
Report
Report PCI X-Ray: File Integrity Monitoring
October 26, 2009 | John KindervagTo effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...
-
For CIO Professionals
Report
Report Consumers Turn To Freeware As Their Security Worries Deepen
Consumers Are Getting More Security-Savvy, More Concerned, And Less Trusting
July 6, 2009 | Jonathan PennTo understand the state of consumers' attitudes and behavior with regard to online security and privacy and how it is changing, Forrester recently surveyed more than 4,600 online adults in North...
Content categories
- Reports (19)
- Events (1)
- Charts & Figures (48)
- Everything (68)
Refine your results
Date Range
- Past 12 months (1)
- Past 18 months (4)
Primary Role
- Security & Risk (16)
- CIO (3)
Methodology
- Business Technographics (4)
- Consumer Technographics (2)
- Forrester Wave (2)
- TechRadar (2)
Industry
Market Imperatives
Region
- North America (4)
- Europe (3)
- Asia Pacific (2)
- Latin America (1)
Vendor
- IBM (2)
- Symantec (2)
- Cisco Systems (1)
- FireEye (1)
Analyst
- Chris Sherman (8)
- Heidi Shey (2)
- Jeff Pollard (2)
- Dane Anderson (1)
- Joseph Blankenship (1)
