44 results in Reports
Sort by:
Refine
  • Incident Response

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report The Market For Managed Detection And Response Booms In 2017

    Cyberattacks And Skill Shortages Drive MDR Demand
    July 21, 2017 | Jeff Pollard

    Managed detection and response (MDR) has emerged as a specific category of managed security services (MSS) in the last 12 months. Security and risk (S&R) pros thinking about investing in MDR...

  • For Security & Risk Professionals

    Report

    Report Breakout Vendors: Security Automation And Orchestration (SAO)

    SAO Will Gain Widespread Adoption In 24 Months
    April 18, 2017 | Joseph Blankenship

    Security and risk (S&R) professionals are under increasing strain as they struggle to keep pace with cyberthreats, manage a complex technology environment, and hire experienced staff. These factors...

  • For Security & Risk Professionals

    Report

    Report Mature Cybersecurity Incident Response Requires Legal Advice

    Engage Legal To Help Your CEO Make Smart Decisions and Improve Breach Response
    March 13, 2017 | Josh Zelonis

    Business and technology leaders often dismiss lawyers as pedantic and obstacles to productivity. This is certainly something security and risk pros can relate to. However, it's important to get...

  • For Infrastructure & Operations Professionals

    Report

    Report Five Steps To Reinforce And Harden Application Security

    I&O Teams Must Prevent And Remediate App Vulnerabilities
    January 13, 2017 | Milan Hanson, Amy DeMartine

    Today's cybercriminals are highly skilled, resourceful, and determined. Vulnerabilities such as web server misconfigurations or components that include known vulnerabilities give cybercriminals...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From The World's Biggest Data Breaches And Privacy Abuses, 2016

    Continuous Improvement: The Data Security And Privacy Playbook
    January 9, 2017 | Stephanie Balaouras, Heidi Shey

    Breaking news of a massive customer breach or blatant privacy abuse dominates the headlines for days. However, months and even years later, affected customers still struggle with the aftermath and...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Incident Response Service Providers

    IR Services Are Vital To Mitigating The Consequences Of A Breach
    December 21, 2016 | Josh Zelonis

    A mature incident response (IR) is essential to your business. Breaches are inevitable, and the costs and damage to reputation can be massive. As a result, IR-as-a-service has fully graduated into...

  • For Security & Risk Professionals

    Report

    Report Calculate The Business Impact And Cost Of A Breach

    Business Case: The Data Security And Privacy Playbook
    November 17, 2016 | Heidi Shey

    The business impact and cost of a breach are notoriously difficult to measure. A data breach initiates a tangle of direct and indirect costs, with some costs accruing in the immediate aftermath and...

  • For Security & Risk Professionals

    Report

    Report Maximize The Benefits Of Your Incident Response Retainer

    A Strong Relationship With Your Retainer Is Critical To Breach Response
    November 11, 2016 | Josh Zelonis

    To deal with the inevitability of a significant cyberattack and breach, security and risk pros are forging relationships with external breach notification and incident response (IR) firms. However,...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Poor Planning, Not An IoT Botnet, Disrupted The Internet

    Dyn Outage Underscores The Need To Plan For Failure
    October 24, 2016 | Jeff Pollard, Joseph Blankenship

    On October 21, internet users went through a real exercise in one way the internet could die. Critical infrastructure exists on the internet as well as in the real world, and this attack crippled...

  • For Security & Risk Professionals

    Report

    Report Planning For Failure: How To Survive A Breach

    An Effective Incident Management Program Is Essential To Help You Stay In Business
    September 9, 2016 | John Kindervag, Josh Zelonis

    Cybercriminals are using more sophisticated and targeted attacks to steal everything from valuable intellectual property to the sensitive personal information of your customers, partners, and...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Global Legal Privacy And Cybersecurity Services

    Nine Law Firms Marry Legal Expertise And Business Acumen To Solve Privacy And Cybersecurity Challenges
    August 12, 2016 | Enza Iannopollo

    In the past, security and risk (S&R) and privacy professionals might have left engaging with external law firms to their own legal departments. However, changes to the regulatory and business...

  • For Security & Risk Professionals

    Report

    Report Rules Of Engagement: A Call To Action To Automate Breach Response

    August 3, 2016 | Joseph Blankenship, John Kindervag

    As the remediation costs, customer impacts, and reputational damage of a data breach continue to skyrocket, the security industry must find new ways to prevent the exfiltration of proprietary data...

  • For Security & Risk Professionals

    Report

    Report Twelve Recommendations For Your Security Program In 2016

    Expanded Expectations Demand A Customer-Centric Focus
    April 21, 2016 | Heidi Shey, Jeff Pollard

    Each year, Forrester outlines important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From The World's Biggest Customer Data Breaches And Privacy Incidents, 2015

    December 2, 2015 | Stephanie Balaouras, Heidi Shey

    Breaking news of a massive customer breach dominates headlines for days. However, months and even years later, affected customers still struggle with the aftermath and firms are still absorbing the...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Customer Data Breach Notification And Response Services, Q3 2015

    The Six Providers That Matter Most And How They Stack Up
    September 15, 2015 | Heidi Shey

    In Forrester's 23-criteria evaluation of breach notification and response services, we identified the six most significant services providers in the category — AllClear ID, CSID, Equifax,...

  • For Infrastructure & Operations Professionals

    Report

    Report Top Technologies For The Infrastructure & Operations BT Agenda

    February 4, 2015 | Laura Koetzle, Glenn O'Donnell

    Your company's only route to sustainable competitive advantage is to deliver a superior customer experience. Because your customers, channels, competitors, and coveted talent are digital, your...

  • For Security & Risk Professionals

    Report

    Report Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    December 11, 2014 | John Kindervag, Stephanie Balaouras

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

  • For Enterprise Architecture Professionals

    Report

    Report Choosing Between Specialist Solutions And Dynamic Case Management Platforms

    Eleven Criteria Sort Through A Challenging Decision
    November 6, 2014 | Craig Le Clair

    Case management deployment options confuse enterprise architects that struggle to compare the value of a "fit to purpose" solution versus a dynamic case management (DCM) platform capability. We...

  • For Security & Risk Professionals

    Report

    Report Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities

    Multiple Technologies Are Required For Breach Detection
    July 24, 2014 | Rick Holland

    In part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and...

  • For Security & Risk Professionals

    Report

    Report Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals
    June 19, 2014 | John Kindervag, Rick Holland

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

  • For Security & Risk Professionals

    Report

    Report Brief: Proofpoint Strengthens Its Targeted Attack Defense With NetCitadel Acquisition

    Acquisition Is Proof That You Must Integrate Advanced Detection With Incident Response
    June 19, 2014 | Rick Holland, Heidi Shey

    On May 20, 2014, Proofpoint announced that it had acquired Silicon-Valley-based startup NetCitadel, a privately owned incident response company, for approximately $24 million in cash. While small,...

  • For Security & Risk Professionals

    Report

    Report Top 15 Trends S&R Pros Should Watch: 2014

    April 18, 2014 | Andras Cser, Andrew Rose

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Palo Alto Networks Acquires Cyvera

    Palo Alto Extends Its Reach To The Endpoint
    March 25, 2014 | Rick Holland, Chris Sherman

    On March 24, 2014, Palo Alto Networks announced an agreement to acquire Cyvera, a privately held endpoint security company, for approximately $200 million. With the acquisition, Palo Alto Networks...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Bit9 And Carbon Black Merge

    Bit9 With Carbon Credits Is An Impressive Endpoint Security Play
    February 14, 2014 | Rick Holland

    On February 13, 2014, Bit9 announced that it had merged with endpoint incident response startup Carbon Black, for an undisclosed amount. Bit9 also announced that it had raised $38.25 million to...

  • For Security & Risk Professionals

    Report

    Report Quick Take: FireEye Acquires Mandiant

    FireEye Emerging As A Leader In A New Breed Of Security Companies
    January 7, 2014 | Rick Holland, John Kindervag

    On January 2, 2014, FireEye announced its acquisition of incident response and forensics specialist Mandiant for nearly $900 million in stock and $100 million in cash. With this acquisition,...