Advanced Search
41 results in Reports
Sort by:
Refine
  • Security Information & Event Management (SIEM)

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Security Analytics Platforms, Q1 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    March 6, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman...

  • For Security & Risk Professionals

    Report

    Report Zero Trust Security Metrics That Matter To The Business

    Performance Management: The Security Architecture And Operations Playbook
    February 9, 2017 | Stephanie Balaouras

    Forrester's Zero Trust (ZT) Model of information security demands that security teams eliminate the dangerous trust assumptions underpinning perimeter-based security architectures. When you embrace...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For Infrastructure & Operations Professionals

    Report

    Report Five Steps To Reinforce And Harden Application Security

    I&O Teams Must Prevent And Remediate App Vulnerabilities
    January 13, 2017 | Milan Hanson, Amy DeMartine

    Today's cybercriminals are highly skilled, resourceful, and determined. Vulnerabilities such as web server misconfigurations or components that include known vulnerabilities give cybercriminals...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Security Analytics (SA)

    The SA Ecosystem Enables Rapid Detection And Response To Cyberthreats
    November 15, 2016 | Joseph Blankenship

    Enabling their teams to quickly detect and respond to internal and external cyberthreats is critical for security leaders. Security analytics (SA) solutions promise to provide an array of...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Intel Spins Off McAfee As Synergies Fail To Materialize

    McAfee Is Better Off On Its Own Once Again
    September 9, 2016 | Jeff Pollard, Joseph Blankenship

    On September 7, Intel agreed to spin out Intel Security with a new, but old, name — McAfee. This acquisition winds up a cautionary tale to security leaders on what can happen when a tech giant...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Security User Behavior Analytics (SUBA)

    Use SUBA To Enhance Security Analytics

    Protecting the enterprise against unknown internal and external cyberthreats is a critical priority on the agenda of every CISO. Security user behavior analytics (SUBA) solutions promise to provide...

  • For Security & Risk Professionals

    Report

    Report Counteract Cyberattacks With Security Analytics

    Platforms Offer Real-Time Monitoring, Rapid Detection, And Effective Response
    May 9, 2016 | Joseph Blankenship

    Security analytics (SA) has garnered a lot of attention during the past few years. However, marketing hype and misunderstandings regarding SA have confused the market, making it difficult for...

  • For Security & Risk Professionals

    Report

    Report Top 13 Technology Trends S&R Pros Should Watch: 2016

    Tools And Technology: The S&R Practice Playbook
    April 21, 2016 | Andras Cser, John Kindervag

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 40-plus research...

  • For Security & Risk Professionals

    Report

    Report Twelve Recommendations For Your Security Program In 2016

    Expanded Expectations Demand A Customer-Centric Focus
    April 21, 2016 | Heidi Shey, Jeff Pollard

    Each year, Forrester outlines important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Security User Behavior Analytics (SUBA), 2016

    SUBA Helps S&R Pros Detect And Then Thwart Imminent Internal Attacks
    April 7, 2016 | Andras Cser, Joseph Blankenship

    Security and risk (S&R) leaders are struggling to prevent data breaches, threats from malicious insiders, and fraud. Solutions for security user behavior analytics (SUBA) aim to provide S&R pros...

  • For Security & Risk Professionals

    Report

    Report No More Chewy Centers: The Zero Trust Model Of Information Security

    Vision: The Security Architecture And Operations Playbook
    March 23, 2016 | John Kindervag

    There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q1 2016

    Road Map: The Data Security And Privacy Playbook
    February 22, 2016 | Stephanie Balaouras, John Kindervag

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

  • For Security & Risk Professionals

    Report

    Report Remove The Mystery From Security Metrics

    Performance Management: The S&R Practice Playbook
    February 19, 2016 | Jeff Pollard

    Difficulty creating meaningful metrics persists for chief information security officers (CISOs) despite a decade of discussion. But without good metrics, the security organization can't hope to...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Cloud Access Security Intelligence (CASI) Solutions

    S&R Pros Can Use CASI To Discover Cloud Apps, Monitor Employee Behavior, And Prevent Data Leaks
    December 9, 2015 | Andras Cser

    To support their firms' cloud strategy without compromising security or compliance, security and risk (S&R) pros need to develop a number of important capabilities. They need the capability to: 1)...

  • For Security & Risk Professionals

    Report

    Report Know Your Adversary

    Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program
    April 2, 2015 | Rick Holland

    In February 2013, incident management and forensics expert Mandiant issued a report exposing the identities of three members of a cyberespionage group known as APT1. In May 2014, the US Department...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Proofpoint Acquires Nexgate

    Acquisition Signals A Maturing Social Risk And Compliance Market, But Proofpoint Still Has 'Points To Prove'
    October 24, 2014 | Nick Hayes, Rick Holland

    On October 23, 2014, Proofpoint announced that it had acquired social risk and compliance (SRC) vendor Nexgate for approximately $35 million. While smaller than other security or social media...

  • For Security & Risk Professionals

    Report

    Report Critical Questions To Ask Your Privileged Identity Management Solution Provider

    Cloud Support, Threat Management, And Behavioral Analytics Are Now Mandatory Features
    September 9, 2014 | Andras Cser

    Technology management professionals with administrator privileges have the responsibility to ensure that their critical business technology is secure, available, and achieving performance...

  • For Security & Risk Professionals

    Report

    Report Use Actionable Threat Intelligence To Protect Your Digital Business

    Threat Intel Must Have Business Alignment, Relevance, And Integration To Be Effective
    August 14, 2014 | Rick Holland

    Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will...

  • For Security & Risk Professionals

    Report

    Report Detecting Cyberthreats With Fraud-Based Advanced Analytics Technology

    New Security Analytics Capabilities Will Replace Traditional SIEM, And Security Service Providers Will Lead The Adoption
    August 4, 2014 | Ed Ferrara

    Security and risk (S&R) professionals know that cyberattacks are often the first step in the complex dance of credit card theft and the fraud that results. Cyberattacks take many forms and affect...

  • For Security & Risk Professionals

    Report

    Report Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities

    Multiple Technologies Are Required For Breach Detection
    July 24, 2014 | Rick Holland

    In part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and...

  • For Security & Risk Professionals

    Report

    Report Brief: AT&T And IBM Accelerate The Move To Utility-Based Security

    Reliable And Effective Security Utilities Free Resources So That CISOs Can Focus On Customers
    June 30, 2014 | Ed Ferrara

    AT&T and IBM announced in February a strategic alliance to provide a set of comprehensive security services that, if successful, would define the next generation of managed security services...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q2 2014

    Tools To Define, Dissect, And Defend Your Data
    April 22, 2014 | Stephanie Balaouras, John Kindervag

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...

  • For Security & Risk Professionals

    Report

    Report Top 15 Trends S&R Pros Should Watch: 2014

    April 18, 2014 | Andras Cser, Andrew Rose

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research...

  • For Security & Risk Professionals

    Report

    Report Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy
    February 5, 2014 | Andrew Rose, Stephanie Balaouras

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current...