Search Results
-
For Security & Risk Professionals
Report
Report TechRadar™: Endpoint Security, Q1 2017
Consolidation Will Lead To A Less Fragmented Market
January 27, 2017 | Chris ShermanSecurity professionals face a fragmented market when selecting enterprise endpoint security tools; current and emerging technologies each offer benefits and challenges, a different employee...
-
For Security & Risk Professionals
Report
Report Forrester's Customer IAM Security Maturity Assessment Model
Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Endpoint Security Suites, Q4 2016
The 15 Providers That Matter Most And How They Stack Up
October 19, 2016 | Chris ShermanIn our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea,...
-
For Security & Risk Professionals
Report
Report Quick Take: Intel Spins Off McAfee As Synergies Fail To Materialize
McAfee Is Better Off On Its Own Once Again
On September 7, Intel agreed to spin out Intel Security with a new, but old, name — McAfee. This acquisition winds up a cautionary tale to security leaders on what can happen when a tech giant...
-
For Security & Risk Professionals
Report
Report The 2016 State Of Endpoint Security Adoption
Investments In Advanced Endpoint Controls Are Poised To Accelerate Over The Coming Year
April 25, 2016 | Chris ShermanEvery year, Forrester surveys thousands of security decision-makers and information workers globally from a wide range of industries and organization sizes. This report presents the most relevant...
-
For Security & Risk Professionals
Report
Report Top 13 Technology Trends S&R Pros Should Watch: 2016
April 21, 2016 | Andras Cser, John KindervagEach year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 40-plus research...
-
For Security & Risk Professionals
Report
Report Twelve Recommendations For Your Security Program In 2016
Expanded Expectations Demand A Customer-Centric Focus
Each year, Forrester outlines important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...
-
For Security & Risk Professionals
Report
Report TechRadar™: Mobile Security, Q1 2016
Tools And Technology: The Mobile Security Playbook
March 28, 2016 | Chris ShermanSecurity and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...
-
For Security & Risk Professionals
Report
Report Brief: Endpoint Security Innovation Is Intensifying
The Time Is Now To Protect Your Digital Workforce With A Reinvigorated Endpoint Security Strategy
September 18, 2015 | Rick Holland, Chris ShermanFor your employees to do their very best work, they need access to a wide range of business applications and sensitive information — often from whatever endpoint device they deem appropriate....
-
For Security & Risk Professionals
Report
Report Top 11 Trends S&R Pros Should Watch: 2015
Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; research projects that we...
-
For Security & Risk Professionals
Report
Report Market Overview: Voice Biometrics
While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...
-
For Enterprise Architecture Professionals
Report
Report Brief: Plan Your Four-Tiered Approach To Enterprise Mobile Security
January 23, 2015 | Pamela HeiligenthalIn the early stages of enterprise mobility, many firms bought a mobile device management (MDM) tool to protect and secure email and calendar access. As enterprise mobility goes beyond simple email...
-
For Security & Risk Professionals
Report
Report The Forrester Wave™: Endpoint Encryption, Q1 2015
The Seven Providers That Matter Most And How They Stack Up
January 16, 2015 | Chris ShermanSecurity and risk (S&R) professionals often turn to endpoint encryption technologies to protect corporate data, meet regulatory requirements, and prevent accidental data leaks. Full disk,...
-
For Security & Risk Professionals
Report
Report TechRadar™: Enterprise Mobile Security, Q4 2014
November 3, 2014 | Tyler ShieldsThere are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application and data...
-
For Security & Risk Professionals
Report
Report Quick Take: Symantec Splits In Two
Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete
On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will...
-
For Security & Risk Professionals
Report
Report Brief: Apple Throws Down The Privacy Gauntlet
Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further
October 1, 2014 | Rick Holland, Andras CserOn September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and...
-
For Security & Risk Professionals
Report
Report The State Of Endpoint Security Adoption 2014 To 2015
Adoption Of Proactive Security Tools Will Outpace Signature-Based Antimalware In 2015
September 24, 2014 | Chris ShermanEvery year, Forrester conducts a number of global surveys of security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...
-
For Security & Risk Professionals
Report
Report Brief: Stolen And Lost Devices Are Putting Personal Healthcare Information At Risk
It's Time For Healthcare CISOs To Close The Faucet Of Data Loss From Endpoints
Amid a rising tide of compliance pressures, employee mobility, and high black-market values for personally identifiable information (PII) and personal healthcare information (PHI), security and...
-
For Security & Risk Professionals
Report
Report Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities
Multiple Technologies Are Required For Breach Detection
July 24, 2014 | Rick HollandIn part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and...
-
For Security & Risk Professionals
Report
Report Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure
When Selecting Security Vendors, Look For Specialized Industry Expertise
July 11, 2014 | Rick HollandFor years, security and risk (S&R) professionals have focused almost exclusively on protecting the organization's sensitive information resources, such as customer data, intellectual property, and...
-
For Security & Risk Professionals
Report
Report Prepare For The Post-AV Era Part 2: Layer Your Endpoint Security Tools For Max Protection
July 7, 2014 | Chris ShermanIn this second report covering the post-antivirus (AV) era, we discuss how a layered approach to endpoint security can help decrease the risk of attack significantly beyond what antivirus alone can...
-
For Security & Risk Professionals
Report
Report Prepare For The Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus
S&R Pros Are Shifting AV Spend To More Proactive Security Technologies
June 9, 2014 | Chris ShermanAs malware increases in sophistication and the number of new variants rises, antivirus (AV) technologies have steadily become less effective at stopping advanced threats to employee endpoints and...
-
For Security & Risk Professionals
Report
Report Raise The Security Bar With Human-Factor-Friendly Design Concepts
You Can Only Improve Security If You Care About Customer And Employee Experience
May 28, 2014 | Tyler ShieldsSecurity leaders must realize that human factors contribute to the success of a security control as much as the risk reduction of the security control itself. Security leaders who choose to ignore...
-
For Security & Risk Professionals
Report
Report TechRadar™: Data Security, Q2 2014
Tools To Define, Dissect, And Defend Your Data
April 22, 2014 | Stephanie Balaouras, John KindervagWe designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...
-
For Security & Risk Professionals
Report
Report Top 15 Trends S&R Pros Should Watch: 2014
April 18, 2014 | Andras Cser, Andrew RoseEach year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research...
Content categories
- Reports (57)
- Events (4)
- Charts & Figures (135)
- Everything (196)
Refine your results
Date Range
- Past 6 months (1)
- Past 12 months (4)
- Past 18 months (8)
Primary Role
- Security & Risk (45)
- Infrastructure & Operations (7)
- CIO (2)
- Enterprise Architecture (2)
- Application Development & Delivery (1)
Methodology
- Business Technographics (17)
- TechRadar (5)
- Forrester Wave (4)
Industry
- Financial Services (4)
- Healthcare (4)
- Public Sector (2)
- Consumer Electronics (1)
- Manufacturing (1)
Market Imperatives
Region
- North America (16)
- Europe (12)
- Asia Pacific (2)
Vendor
- Symantec (6)
- Microsoft (5)
- IBM (4)
- Apple (3)
- Intel (3)
- + Show All
- BlackBerry (1)
- Dell (1)
- Google (1)
- Novell (1)
Analyst
- Chris Sherman (25)
- Heidi Shey (11)
- Andras Cser (9)
- Stephanie Balaouras (5)
- Nick Hayes (4)
- + Show All
- Jeff Pollard (3)
- Joseph Blankenship (3)
- Merritt Maxim (3)
- David K. Johnson (2)
- Cheryl McKinnon (1)
- Christopher McClean (1)
- Enza Iannopollo (1)
- Henry Peyret (1)
- John Brand (1)
- Laura Koetzle (1)
- Michael Barnes (1)
- Renee Murphy (1)
