42 results in Reports
Sort by:
Refine
  • Security Information & Event Management (SIEM)

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Data From Mutating Threats With A Zero Trust Network

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report Remove The Mystery From Security Metrics

    Performance Management: The S&R Practice Playbook
    July 18, 2017 | Jeff Pollard

    Difficulty creating meaningful metrics persists for chief information security officers (CISOs) despite a decade of discussion. Without good metrics, the security organization can't hope to...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: External Threat Intelligence, 2017

    Look Beyond Your Own Perimeter To Understand And Prevent Threats
    June 26, 2017 | Josh Zelonis

    The threat intelligence market is muddled by confusing messaging that has hurt security and risk (S&R) pros' ability to succeed with their intelligence capabilities. This report provides a course...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Security Analytics Platforms, Q1 2017

    IBM, Splunk, LogRhythm, And RSA Display Advanced Detection Features
    March 6, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman...

  • For Security & Risk Professionals

    Report

    Report Zero Trust Security Metrics That Matter To The Business

    Performance Management: The Security Architecture And Operations Playbook
    February 9, 2017 | Stephanie Balaouras

    Forrester's Zero Trust (ZT) Model of information security demands that security teams eliminate the dangerous trust assumptions underpinning perimeter-based security architectures. When you embrace...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For Infrastructure & Operations Professionals

    Report

    Report Five Steps To Reinforce And Harden Application Security

    I&O Teams Must Prevent And Remediate App Vulnerabilities
    January 13, 2017 | Milan Hanson, Amy DeMartine

    Today's cybercriminals are highly skilled, resourceful, and determined. Vulnerabilities such as web server misconfigurations or components that include known vulnerabilities give cybercriminals...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Security Analytics (SA)

    The SA Ecosystem Enables Rapid Detection And Response To Cyberthreats
    November 15, 2016 | Joseph Blankenship

    Enabling their teams to quickly detect and respond to internal and external cyberthreats is critical for security leaders. Security analytics (SA) solutions promise to provide an array of...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Intel Spins Off McAfee As Synergies Fail To Materialize

    McAfee Is Better Off On Its Own Once Again
    September 9, 2016 | Jeff Pollard, Joseph Blankenship

    On September 7, Intel agreed to spin out Intel Security with a new, but old, name — McAfee. This acquisition winds up a cautionary tale to security leaders on what can happen when a tech giant...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Security User Behavior Analytics (SUBA)

    Use SUBA To Enhance Security Analytics

    Protecting the enterprise against unknown internal and external cyberthreats is a critical priority on the agenda of every CISO. Security user behavior analytics (SUBA) solutions promise to provide...

  • For Security & Risk Professionals

    Report

    Report Counteract Cyberattacks With Security Analytics

    Platforms Offer Real-Time Monitoring, Rapid Detection, And Effective Response
    May 9, 2016 | Joseph Blankenship

    Security analytics (SA) has garnered a lot of attention during the past few years. However, marketing hype and misunderstandings regarding SA have confused the market, making it difficult for...

  • For Security & Risk Professionals

    Report

    Report Top 13 Technology Trends S&R Pros Should Watch: 2016

    April 21, 2016 | Andras Cser, John Kindervag, Joseph Blankenship

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 40-plus research...

  • For Security & Risk Professionals

    Report

    Report Twelve Recommendations For Your Security Program In 2016

    Expanded Expectations Demand A Customer-Centric Focus
    April 21, 2016 | Heidi Shey, Jeff Pollard, Andras Cser

    Each year, Forrester outlines important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Security User Behavior Analytics (SUBA), 2016

    SUBA Helps S&R Pros Detect And Then Thwart Imminent Internal Attacks

    Security and risk (S&R) leaders are struggling to prevent data breaches, threats from malicious insiders, and fraud. Solutions for security user behavior analytics (SUBA) aim to provide S&R pros...

  • For Security & Risk Professionals

    Report

    Report No More Chewy Centers: The Zero Trust Model Of Information Security

    March 23, 2016 | John Kindervag

    There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Cloud Access Security Intelligence (CASI) Solutions

    S&R Pros Can Use CASI To Discover Cloud Apps, Monitor Employee Behavior, And Prevent Data Leaks
    December 9, 2015 | Andras Cser

    To support their firms' cloud strategy without compromising security or compliance, security and risk (S&R) pros need to develop a number of important capabilities. They need the capability to: 1)...

  • For Security & Risk Professionals

    Report

    Report Know Your Adversary

    Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program
    April 2, 2015 | Rick Holland

    In February 2013, incident management and forensics expert Mandiant issued a report exposing the identities of three members of a cyberespionage group known as APT1. In May 2014, the US Department...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Proofpoint Acquires Nexgate

    Acquisition Signals A Maturing Social Risk And Compliance Market, But Proofpoint Still Has 'Points To Prove'
    October 24, 2014 | Nick Hayes, Rick Holland

    On October 23, 2014, Proofpoint announced that it had acquired social risk and compliance (SRC) vendor Nexgate for approximately $35 million. While smaller than other security or social media...

  • For Security & Risk Professionals

    Report

    Report Critical Questions To Ask Your Privileged Identity Management Solution Provider

    Cloud Support, Threat Management, And Behavioral Analytics Are Now Mandatory Features
    September 9, 2014 | Andras Cser

    Technology management professionals with administrator privileges have the responsibility to ensure that their critical business technology is secure, available, and achieving performance...

  • For Security & Risk Professionals

    Report

    Report Use Actionable Threat Intelligence To Protect Your Digital Business

    Threat Intel Must Have Business Alignment, Relevance, And Integration To Be Effective
    August 14, 2014 | Rick Holland

    Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will...

  • For Security & Risk Professionals

    Report

    Report Detecting Cyberthreats With Fraud-Based Advanced Analytics Technology

    New Security Analytics Capabilities Will Replace Traditional SIEM, And Security Service Providers Will Lead The Adoption
    August 4, 2014 | Ed Ferrara

    Security and risk (S&R) professionals know that cyberattacks are often the first step in the complex dance of credit card theft and the fraud that results. Cyberattacks take many forms and affect...

  • For Security & Risk Professionals

    Report

    Report Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities

    Multiple Technologies Are Required For Breach Detection
    July 24, 2014 | Rick Holland

    In part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and...

  • For Security & Risk Professionals

    Report

    Report Brief: AT&T And IBM Accelerate The Move To Utility-Based Security

    Reliable And Effective Security Utilities Free Resources So That CISOs Can Focus On Customers
    June 30, 2014 | Ed Ferrara

    AT&T and IBM announced in February a strategic alliance to provide a set of comprehensive security services that, if successful, would define the next generation of managed security services...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q2 2014

    Tools To Define, Dissect, And Defend Your Data
    April 22, 2014 | Stephanie Balaouras, John Kindervag, Heidi Shey

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...

  • For Security & Risk Professionals

    Report

    Report Top 15 Trends S&R Pros Should Watch: 2014

    April 18, 2014 | Andras Cser, Andrew Rose, Chris Sherman

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research...