Advanced Search
112 results in Reports
Sort by:
Refine
  • Network Security

Search Results

  • For Security & Risk Professionals

    Report

    Report Top Cybersecurity Threats In 2017

    Landscape: The Security Architecture And Operations Playbook
    January 26, 2017 | Josh Zelonis

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this...

  • For Security & Risk Professionals

    Report

    Report The State Of Network Security: 2016 To 2017

    Benchmarks: The Security Architecture And Operations Playbook
    January 26, 2017 | Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2016 to...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For B2B Marketing Professionals

    Report

    Report Global Business Technographics® Security Survey, 2016: Overview

    A Business Technographics Presentation
    December 6, 2016 | Tyler McDaniel, Brian Luu

    This report is our overview of security decision-makers’ adoption of network security and security operations technologies; adoption of sourcing solutions to protect public cloud deployments;...

  • For Security & Risk Professionals

    Report

    Report Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook
    November 4, 2016 | Stephanie Balaouras, John Kindervag

    In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • For CIO Professionals

    Report

    Report Predictions 2017: Security And Skills Will Temper Growth Of IoT

    November 2, 2016 | Frank E. Gillett, Michele Pelino

    Interest in the internet of things (IoT) has hit a fever pitch: IoT was the No. 1 search topic not only among CIOs but across all Forrester clients over the past six months. But technologies and...

  • For Security & Risk Professionals

    Report

    Report Predictions 2017: Cybersecurity Risks Intensify

    Landscape: The S&R Practice Playbook
    November 1, 2016 | Amy DeMartine, Jeff Pollard

    The connected world has arrived; we live and work in it. In this new reality, the next 12 months will see battles rage that will determine the amount of control individuals have over their own data...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Poor Planning, Not An IoT Botnet, Disrupted The Internet

    Dyn Outage Underscores The Need To Plan For Failure
    October 24, 2016 | Jeff Pollard, Joseph Blankenship

    On October 21, internet users went through a real exercise in one way the internet could die. Critical infrastructure exists on the internet as well as in the real world, and this attack crippled...

  • For Security & Risk Professionals

    Report

    Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    September 30, 2016 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Intel Spins Off McAfee As Synergies Fail To Materialize

    McAfee Is Better Off On Its Own Once Again
    September 9, 2016 | Jeff Pollard, Joseph Blankenship

    On September 7, Intel agreed to spin out Intel Security with a new, but old, name — McAfee. This acquisition winds up a cautionary tale to security leaders on what can happen when a tech giant...

  • For Security & Risk Professionals

    Report

    Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook
    August 4, 2016 | John Kindervag

    In response to increasingly complex cyberattacks, security professionals devote more time and resources to granular aspects of their networks. This is understandable and necessary to a degree, but...

  • For Security & Risk Professionals

    Report

    Report Five Steps To A Zero Trust Network

    Strategic Plan: The Security Architecture And Operations Playbook
    July 27, 2016 | John Kindervag

    A Zero Trust (ZT) network abolishes the idea of a trusted network inside the corporate perimeter. A ZT network creates microperimeters of control around an enterprise's sensitive data assets and...

  • For Security & Risk Professionals

    Report

    Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Vision: The Data Security And Privacy Playbook
    July 7, 2016 | John Kindervag, Heidi Shey

    Data is the lifeblood of today's digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits,...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Symantec Buys Its Way To Relevance With Blue Coat Acquisition

    June 14, 2016 | Kelley Mak, Andras Cser

    On June 12, 2016, Symantec agreed to buy web security company Blue Coat for $4.65 billion. With a fresh set of network and cloud technologies, a new CEO at the helm, and additional financial...

  • For Security & Risk Professionals

    Report

    Report Top 13 Technology Trends S&R Pros Should Watch: 2016

    Tools And Technology: The S&R Practice Playbook
    April 21, 2016 | Andras Cser, John Kindervag

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 40-plus research...

  • For Security & Risk Professionals

    Report

    Report Twelve Recommendations For Your Security Program In 2016

    Expanded Expectations Demand A Customer-Centric Focus
    April 21, 2016 | Heidi Shey, Jeff Pollard

    Each year, Forrester outlines important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Brief: FireEye Is Evolving Into An Enterprise Security Vendor

    Recent Acquisitions Indicate FireEye Is Ready To Advance Security Automation
    March 30, 2016 | Jeff Pollard, Joseph Blankenship

    FireEye's acquisition of automation specialist Invotas International comes just 10 days after its acquisition of threat intelligence specialist iSight Partners. With these and prior acquisitions,...

  • For Security & Risk Professionals

    Report

    Report No More Chewy Centers: The Zero Trust Model Of Information Security

    Vision: The Security Architecture And Operations Playbook
    March 23, 2016 | John Kindervag

    There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q1 2016

    Road Map: The Data Security And Privacy Playbook
    February 22, 2016 | Stephanie Balaouras, John Kindervag

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

  • For Security & Risk Professionals

    Report

    Report Seven Steps To Protect Your eCommerce Website In 2016

    Start Now To Protect Your Site Before The Next Holiday Crunch
    February 12, 2016 | John Kindervag

    During the busy holidays, there is always news of a website breach or crash. Despite the millions of dollars they generate for their businesses, websites remain vulnerable to cyberattack,...

  • For Security & Risk Professionals

    Report

    Report Secure IoT As It Advances Through Maturity Phases

    Predict And Prevent Attacks Targeting The Internet Of Things
    January 7, 2016 | Tyler Shields, Michele Pelino

    The Internet of Things is not a future trend; it is here today, and the risk of attack is real. IoT exploits are reported occurring with increasing frequency, creating a state of concern for...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Network Security: 2015 To 2016

    December 23, 2015 | Kelley Mak, Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2015 to...

  • For Security & Risk Professionals

    Report

    Report Brief: Cisco Continues Its Blistering Security Acquisition Pace With The Addition Of Lancope

    Cisco's Network Security Portfolio Finally Stands On Its Own Merit
    November 19, 2015 | Rick Holland

    Cisco Systems recently announced its intent to acquire privately held, Atlanta-based Lancope, a decision that improves Cisco's network security offerings. The acquisition upgrades Cisco's network...

  • For Security & Risk Professionals

    Report

    Report Brief: The Emergence Of The Cloud Security Gateway

    Vendors Aim To Provide S&R Pros With One Consolidated Offering For All Their Cloud Security Requirements
    September 14, 2015 | Andras Cser, Rick Holland

    Vendors are a on a cloud-security buying spree. Microsoft announced its acquisition of cloud access specialist Adallom, and security vendor Blue Coat Systems announced its acquisition of cloud...

  • For Security & Risk Professionals

    Report

    Report An S&R Pro's Guide To IoT Security

    How The Internet Of Things Will Shatter Traditional Enterprise Security
    August 14, 2015 | Tyler Shields, Michele Pelino

    The Internet of Things (IoT), or what Forrester refers to as the connected world, combines technologies that enable devices, objects, and infrastructure to interact with monitoring, analytics, and...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Market Imperatives

Region

Vendor

Analyst