502 results in Reports
Sort by:
Refine
  • Security Operations & Program Governance

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report Assess Your Exposure To Geopolitical Cyber Risk

    How To Identify The Impacts Of Geopolitical Dynamics Across Your Organization
    July 26, 2017 | Claire O'Malley, Jeff Pollard

    Geopolitical tensions around the world are spawning nearly constant cyberattacks on unprepared private sector firms. These cyberattacks result in millions of dollars in lost customer trust, as well...

  • For Security & Risk Professionals

    Report

    Report The Market For Managed Detection And Response Booms In 2017

    Cyberattacks And Skill Shortages Drive MDR Demand
    July 21, 2017 | Jeff Pollard

    Managed detection and response (MDR) has emerged as a specific category of managed security services (MSS) in the last 12 months. Security and risk (S&R) pros thinking about investing in MDR...

  • For Security & Risk Professionals

    Report

    Report Remove The Mystery From Security Metrics

    Performance Management: The S&R Practice Playbook
    July 18, 2017 | Jeff Pollard

    Difficulty creating meaningful metrics persists for chief information security officers (CISOs) despite a decade of discussion. Without good metrics, the security organization can't hope to...

  • For Security & Risk Professionals

    Report

    Report Honeypots 2.0: Deception Technology Lures Cybercriminals Into A Trap

    Hollywood Isn't The Only Industry Banking On Sequels
    July 18, 2017 | Josh Zelonis, Jeff Pollard

    Security and risk (S&R) professionals can leverage deception technologies that mimic real production applications and systems in an attempt to lure attackers into an intrusion. The concept isn't...

  • For Security & Risk Professionals

    Report

    Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Security Architecture And Operations Playbook
    July 5, 2017 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it is the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: External Threat Intelligence, 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    June 26, 2017 | Josh Zelonis

    The threat intelligence market is muddled by confusing messaging that has hurt security and risk (S&R) pros' ability to succeed with their intelligence capabilities. This report provides a course...

  • For Security & Risk Professionals

    Report

    Report Hardcoded For Failure

    Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
    June 21, 2017 | Chase Cunningham

    There is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...

  • For Security & Risk Professionals

    Report

    Report Identify Companywide Roles And Responsibilities To Support Your GDPR Compliance Efforts

    Many Teams Contribute To The Success Of Your Privacy And GDPR Strategy
    June 20, 2017 | Enza Iannopollo

    Privacy and security professionals preparing to comply with the European Union's General Data Protection Regulation (GDPR), by May 2018, need the support of their peers across the organization....

  • For Infrastructure & Operations Professionals

    Report

    Report Reduce Risk And Improve Security Through Infrastructure Automation

    The Bad Guys Use Automation — Fight Fire With Fire

    Security initiatives are becoming increasingly difficult, if not impossible, to execute manually. As infrastructure-as-code (IaC) and internet-of-things (IoT) solutions proliferate, organizations...

  • For Security & Risk Professionals

    Report

    Report Creating Actionable Security And Privacy Policy

    Policy: The Data Security And Privacy Playbook
    May 3, 2017 | Heidi Shey

    Data security and privacy policies are ineffective and can even hinder business processes without a clear understanding of the data — from what it is to where it exists. Data identity is the...

  • For Infrastructure & Operations Professionals

    Report

    Report Best Practices: Strategies For Making The Crucial Shift To DevSecOps

    May 1, 2017 | Milan Hanson

    Cybersecurity needs help from infrastructure and operations (I&O) teams. Threats are evolving faster than ever and becoming increasingly sophisticated. Consumers drive shorter release cycles by...

  • For Security & Risk Professionals

    Report

    Report Forrester's Guide To Drone Security Risks

    S&R Pros Must Prepare Their Businesses Today For Rapid Drone Adoption
    April 27, 2017 | Merritt Maxim, Salvatore Schiano

    Drones are no longer just a buzzword or hip gadget for amateur hobbyists. Organizations are increasingly deploying drones in a wide range of applications from agriculture to law enforcement. But...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook
    April 26, 2017 | Merritt Maxim, Jeff Pollard

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Best Practices For Minimizing Business Travel Risk

    Detailed Guides For Preventing Cybertheft, Espionage, And Physical Harm
    April 24, 2017 | Heidi Shey, Merritt Maxim

    Determined adversaries will stop at nothing to infiltrate your firm for its sensitive data, and employees who travel for business or take their devices on the road often become a vulnerability that...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Global Managed Security Services, 2017

    Converged Services Thrive While Isolated Offerings Go Extinct
    April 24, 2017 | Jeff Pollard

    For security pros looking to augment their programs with services partners, this is an age of abundance — abundant budget and abundant choice. But sometimes too many choices is just as bad as no...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Vulnerability Management, 2017

    Software Vulnerabilities Are The Leading Means Of External Attacks — It's Time To Do Something About It
    April 21, 2017 | Josh Zelonis

    Breaches can undermine customer trust, endanger revenue growth and profits, and permanently tarnish reputations. According to our data, software vulnerabilities are the single largest factor in...

  • For Security & Risk Professionals

    Report

    Report Breakout Vendors: Security Automation And Orchestration (SAO)

    SAO Will Gain Widespread Adoption In 24 Months
    April 18, 2017 | Joseph Blankenship

    Security and risk (S&R) professionals are under increasing strain as they struggle to keep pace with cyberthreats, manage a complex technology environment, and hire experienced staff. These factors...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Physical Security, Q1 2017

    New Technologies Emerging To Improve Physical Security
    April 17, 2017 | Merritt Maxim

    This TechRadar defines the use cases, business value, and outlook for the 14 most relevant and important technologies for physical security. This includes core technologies, such as converged...

  • For Security & Risk Professionals

    Report

    Report Achieve Early Success In Threat Intelligence With The Right Collection Strategy

    S&R Pros Must Use Strategic Intelligence To Maximize Their Investment
    April 11, 2017 | Josh Zelonis

    Threat intelligence is a different animal than most security and risk (S&R) professionals are used to dealing with. For those new to the space, getting started can feel like an overwhelming...

  • For Security & Risk Professionals

    Report

    Report Top Seven Recommendations For Your Security Program In 2017

    April 7, 2017 | Jeff Pollard, Amy DeMartine

    Each year, Forrester outlines important recommendations for a successful security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Jump-Start Zero Trust With Forrester's Reference Architecture

    A Blueprint For Protecting Customers And Employees With Zero Trust
    March 27, 2017 | Laura Koetzle, Andre Kindness

    Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security: In Zero Trust, all network traffic is inherently untrusted. In this report, we...

  • For Security & Risk Professionals

    Report

    Report Mature Cybersecurity Incident Response Requires Legal Advice

    Engage Legal To Help Your CEO Make Smart Decisions and Improve Breach Response
    March 13, 2017 | Josh Zelonis

    Business and technology leaders often dismiss lawyers as pedantic and obstacles to productivity. This is certainly something security and risk pros can relate to. However, it's important to get...

  • For Security & Risk Professionals

    Report

    Report Improve Physical Security And Customer Experience

    S&R Pros Must Develop Five Essential Capabilities In 2017
    March 9, 2017 | Merritt Maxim

    Every customer interaction plays a vital role in shaping that customer's confidence in your brand. While many businesses have heavily invested in optimizing the digital customer experience (CX),...

  • For Security & Risk Professionals

    Report

    Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...

  • For CIO Professionals

    Report

    Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities

    March 6, 2017 | Kate McCarthy, Chris Sherman

    Healthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst