19 results in Reports
Sort by:
Refine
  • Antimalware

Search Results

  • For Security & Risk Professionals

    Report

    Report Ransomware Protection: Five Best Practices

    Harden Your Defenses Now For This Growing Threat
    July 27, 2017 | Chris Sherman, Salvatore Schiano

    Ransomware is holding enterprises hostage. Recent outbreaks from variants such as WannaCry and Petya have many security and risk (S&R) pros wondering if they can prevent this growing threat. By...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Automated Malware Analysis, Q2 2016

    April 21, 2016 | Jeff Pollard, Kelley Mak

    In our 36-criteria evaluation of automated malware analysis providers, we identified the 11 most significant ones — Blue Coat, Check Point, Cisco, Cyphort, Fidelis Cybersecurity, FireEye, Fortinet,...

  • For Security & Risk Professionals

    Report

    Report Brief: FireEye Is Evolving Into An Enterprise Security Vendor

    Recent Acquisitions Indicate FireEye Is Ready To Advance Security Automation
    March 30, 2016 | Jeff Pollard, Joseph Blankenship

    FireEye's acquisition of automation specialist Invotas International comes just 10 days after its acquisition of threat intelligence specialist iSight Partners. With these and prior acquisitions,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Mobile Security, Q1 2016

    Tools And Technology: The Mobile Security Playbook
    March 28, 2016 | Chris Sherman

    Security and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...

  • For Security & Risk Professionals

    Report

    Report Brief: Top 13 Takeaways From Black Hat USA 2015

    Security Researchers Demonstrate Vulnerabilities In The Internet, Connected Cars, And Critical Infrastructure
    September 2, 2015 | Rick Holland, Tyler Shields

    In this brief, we examine the most important takeaways from the Black Hat USA 2015 conference in August. We discuss factors driving the emergence of certain trends and why security and risk (S&R)...

  • For Security & Risk Professionals

    Report

    Report Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities

    Multiple Technologies Are Required For Breach Detection
    July 24, 2014 | Rick Holland

    In part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and...

  • For Security & Risk Professionals

    Report

    Report Prepare For The Post-AV Era Part 2: Layer Your Endpoint Security Tools For Max Protection

    July 7, 2014 | Chris Sherman

    In this second report covering the post-antivirus (AV) era, we discuss how a layered approach to endpoint security can help decrease the risk of attack significantly beyond what antivirus alone can...

  • For Security & Risk Professionals

    Report

    Report Prepare For The Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus

    S&R Pros Are Shifting AV Spend To More Proactive Security Technologies
    June 9, 2014 | Chris Sherman

    As malware increases in sophistication and the number of new variants rises, antivirus (AV) technologies have steadily become less effective at stopping advanced threats to employee endpoints and...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Enterprise Mobile Security, Q4 2013

    December 13, 2013 | Tyler Shields

    There are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application layer,...

  • For Security & Risk Professionals

    Report

    Report Introducing Forrester's Prioritized Patching Process (P3)

    Leverage Predictive Threat Modeling And Data Value For A Context-Based Approach To Patch Prioritization
    November 11, 2013 | Chris Sherman, John Kindervag

    Criminals want access to your valuable assets, and one of their preferred methods is to exploit vulnerabilities lurking in your software and systems. Typically, these vulnerabilities have available...

  • For Security & Risk Professionals

    Report

    Report Endpoint Security Suite Market Update: Q2 2013

    Forrester's Post-Wave™ Evaluation Of New Product Updates
    July 23, 2013 | Chris Sherman

    In Q1 2013, Forrester published the Endpoint Security Wave™, a 50-criteria evaluation of the top nine endpoint security vendors. As part of our mission to keep our clients informed of...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Endpoint Security, Q1 2013

    Endpoint Security Suites Take Center Stage In The Enterprise
    January 4, 2013 | Chenxi Wang, Chris Sherman

    In Forrester's 50 criteria evaluation of endpoint security vendors, we identified nine top providers in the category — F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec,...

  • For Security & Risk Professionals

    Report

    Report The 2012 Consumer Security Market Landscape: Key Dynamics And Growth Opportunities

    November 28, 2012 | Heidi Shey

    Freeware solutions, device proliferation, consumerization, the app Internet, and new entrants offering adjacent consumer privacy and security offerings have and will continue to change consumer...

  • For Security & Risk Professionals

    Report

    Report Application Control: An Essential Endpoint Security Component

    September 7, 2012 | Chenxi Wang, Chris Sherman

    It's no mystery that antivirus (AV) technologies are fighting a losing battle against an increasingly sophisticated malware threat landscape. Attackers often penetrate user endpoints with new...

  • For Security & Risk Professionals

    Report

    Report Malware And Trojans And Bots, Oh My!

    Stop Chasing Malware Flavor Of The Month, Start Planning Strategically
    February 28, 2011 | Chenxi Wang

    2010 was an exciting year on the malware calendar — the year that brought us Operation Aurora, Zeus, and Stuxnet. Malware is now a widespread problem for both consumers and businesses....

  • For CIO Professionals

    Report

    Report Enterprise Antivirus Market Shares In Australia

    May 31, 2010 | Dane Anderson

    This report provides detailed analytical information on enterprise use of IT in the Asia Pacific IT marketplace for vendor strategists. The document highlights the market share for antivirus...

  • For CIO Professionals

    Report

    Report Consumer Security Market Trends, 2009 To 2010: The Freeware Threat

    December 4, 2009 | Jonathan Penn

    The rise of freeware represents one of the most disruptive forces to hit the consumer security market. Free solutions of good quality have changed the market dynamic from one where original...

  • For Security & Risk Professionals

    Report

    Report PCI X-Ray: File Integrity Monitoring

    October 26, 2009 | John Kindervag

    To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. We've designed the PCI...

  • For CIO Professionals

    Report

    Report Consumers Turn To Freeware As Their Security Worries Deepen

    Consumers Are Getting More Security-Savvy, More Concerned, And Less Trusting
    July 6, 2009 | Jonathan Penn

    To understand the state of consumers' attitudes and behavior with regard to online security and privacy and how it is changing, Forrester recently surveyed more than 4,600 online adults in North...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Market Imperatives

Region

Vendor

Analyst