Advanced Search
57 results in Reports
Sort by:
Refine
  • Endpoint Security

Search Results

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Endpoint Security, Q1 2017

    Consolidation Will Lead To A Less Fragmented Market
    January 27, 2017 | Chris Sherman

    Security professionals face a fragmented market when selecting enterprise endpoint security tools; current and emerging technologies each offer benefits and challenges, a different employee...

  • For Security & Risk Professionals

    Report

    Report Forrester's Customer IAM Security Maturity Assessment Model

    December 12, 2016 | Andras Cser, Merritt Maxim

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer (AoC). If your customers can't register or log into your website, mobile app, or phone...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Endpoint Security Suites, Q4 2016

    The 15 Providers That Matter Most And How They Stack Up
    October 19, 2016 | Chris Sherman

    In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea,...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Intel Spins Off McAfee As Synergies Fail To Materialize

    McAfee Is Better Off On Its Own Once Again
    September 9, 2016 | Jeff Pollard, Joseph Blankenship

    On September 7, Intel agreed to spin out Intel Security with a new, but old, name — McAfee. This acquisition winds up a cautionary tale to security leaders on what can happen when a tech giant...

  • For Security & Risk Professionals

    Report

    Report The 2016 State Of Endpoint Security Adoption

    Investments In Advanced Endpoint Controls Are Poised To Accelerate Over The Coming Year
    April 25, 2016 | Chris Sherman

    Every year, Forrester surveys thousands of security decision-makers and information workers globally from a wide range of industries and organization sizes. This report presents the most relevant...

  • For Security & Risk Professionals

    Report

    Report Top 13 Technology Trends S&R Pros Should Watch: 2016

    Tools And Technology: The S&R Practice Playbook
    April 21, 2016 | Andras Cser, John Kindervag

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 40-plus research...

  • For Security & Risk Professionals

    Report

    Report Twelve Recommendations For Your Security Program In 2016

    Expanded Expectations Demand A Customer-Centric Focus
    April 21, 2016 | Heidi Shey, Jeff Pollard

    Each year, Forrester outlines important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Mobile Security, Q1 2016

    Tools And Technology: The Mobile Security Playbook
    March 28, 2016 | Chris Sherman

    Security and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...

  • For Security & Risk Professionals

    Report

    Report Brief: Endpoint Security Innovation Is Intensifying

    The Time Is Now To Protect Your Digital Workforce With A Reinvigorated Endpoint Security Strategy
    September 18, 2015 | Rick Holland, Chris Sherman

    For your employees to do their very best work, they need access to a wide range of business applications and sensitive information — often from whatever endpoint device they deem appropriate....

  • For Security & Risk Professionals

    Report

    Report Top 11 Trends S&R Pros Should Watch: 2015

    June 23, 2015 | Heidi Shey, Andras Cser

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; research projects that we...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Voice Biometrics

    March 30, 2015 | Andras Cser, Heidi Shey

    While most security and risk (S&R) pros have gone to great lengths to secure their enterprise's online channels such as web, mobile web, and mobile apps, they have failed to protect customers who...

  • For Enterprise Architecture Professionals

    Report

    Report Brief: Plan Your Four-Tiered Approach To Enterprise Mobile Security

    January 23, 2015 | Pamela Heiligenthal

    In the early stages of enterprise mobility, many firms bought a mobile device management (MDM) tool to protect and secure email and calendar access. As enterprise mobility goes beyond simple email...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Endpoint Encryption, Q1 2015

    The Seven Providers That Matter Most And How They Stack Up
    January 16, 2015 | Chris Sherman

    Security and risk (S&R) professionals often turn to endpoint encryption technologies to protect corporate data, meet regulatory requirements, and prevent accidental data leaks. Full disk,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Enterprise Mobile Security, Q4 2014

    November 3, 2014 | Tyler Shields

    There are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application and data...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Symantec Splits In Two

    Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete

    On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will...

  • For Security & Risk Professionals

    Report

    Report Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further
    October 1, 2014 | Rick Holland, Andras Cser

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and...

  • For Security & Risk Professionals

    Report

    Report The State Of Endpoint Security Adoption 2014 To 2015

    Adoption Of Proactive Security Tools Will Outpace Signature-Based Antimalware In 2015
    September 24, 2014 | Chris Sherman

    Every year, Forrester conducts a number of global surveys of security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...

  • For Security & Risk Professionals

    Report

    Report Brief: Stolen And Lost Devices Are Putting Personal Healthcare Information At Risk

    It's Time For Healthcare CISOs To Close The Faucet Of Data Loss From Endpoints
    September 4, 2014 | Chris Sherman, Heidi Shey

    Amid a rising tide of compliance pressures, employee mobility, and high black-market values for personally identifiable information (PII) and personal healthcare information (PHI), security and...

  • For Security & Risk Professionals

    Report

    Report Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities

    Multiple Technologies Are Required For Breach Detection
    July 24, 2014 | Rick Holland

    In part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and...

  • For Security & Risk Professionals

    Report

    Report Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure

    When Selecting Security Vendors, Look For Specialized Industry Expertise
    July 11, 2014 | Rick Holland

    For years, security and risk (S&R) professionals have focused almost exclusively on protecting the organization's sensitive information resources, such as customer data, intellectual property, and...

  • For Security & Risk Professionals

    Report

    Report Prepare For The Post-AV Era Part 2: Layer Your Endpoint Security Tools For Max Protection

    July 7, 2014 | Chris Sherman

    In this second report covering the post-antivirus (AV) era, we discuss how a layered approach to endpoint security can help decrease the risk of attack significantly beyond what antivirus alone can...

  • For Security & Risk Professionals

    Report

    Report Prepare For The Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus

    S&R Pros Are Shifting AV Spend To More Proactive Security Technologies
    June 9, 2014 | Chris Sherman

    As malware increases in sophistication and the number of new variants rises, antivirus (AV) technologies have steadily become less effective at stopping advanced threats to employee endpoints and...

  • For Security & Risk Professionals

    Report

    Report Raise The Security Bar With Human-Factor-Friendly Design Concepts

    You Can Only Improve Security If You Care About Customer And Employee Experience
    May 28, 2014 | Tyler Shields

    Security leaders must realize that human factors contribute to the success of a security control as much as the risk reduction of the security control itself. Security leaders who choose to ignore...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q2 2014

    Tools To Define, Dissect, And Defend Your Data
    April 22, 2014 | Stephanie Balaouras, John Kindervag

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...

  • For Security & Risk Professionals

    Report

    Report Top 15 Trends S&R Pros Should Watch: 2014

    April 18, 2014 | Andras Cser, Andrew Rose

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research...