183 results in Reports
Sort by:
Refine
  • Vulnerability & Threat Management

Featured content

The Security Architecture And Operations Playbook For 2018

Defend Your Data From Mutating Threats With A Zero Trust Network

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report The US Healthcare Security Benchmark 2017 To 2018

    Healthcare Providers Must Improve Security For Digital Transformation
    January 17, 2018 | Salvatore Schiano, Chris Sherman

    IT security budgets at US healthcare organizations have lagged behind other industries. In a highly regulated industry, budget constraints have made compliance challenging and impeded security...

  • For Security & Risk Professionals

    Report

    Report Equifax Exposed Two Massive Systemic Risks

    Flaws In The Data Economy Will Make Future Breaches Even More Frequent And Damaging
    December 19, 2017 | Amy DeMartine, Jeff Pollard, Heidi Shey

    In September 2017, Equifax announced a breach of sensitive personal information of 143 million US consumers, as well as consumers in the UK and Canada. The scale and scope of the breach foretell...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: DDoS Mitigation Solutions, Q4 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    December 7, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of DDoS mitigation providers, we identified 11 of the most significant ones — Akamai Technologies, Arbor Networks, Cloudflare, F5 Networks, Fortinet, Huawei...

  • For Security & Risk Professionals

    Report

    Report Job Description: Director Of Threat Intelligence

    Organization: The Security Architecture And Operations Playbook
    December 1, 2017 | Josh Zelonis

    Security and risk (S&R) professionals frequently struggle to realize the benefits that threat intelligence marketing promises. This is in part due to trying to integrate threat intelligence as a...

  • For Security & Risk Professionals

    Report

    Report Top Cybersecurity Threats In 2018

    Landscape: The Security Architecture And Operations Playbook
    November 27, 2017 | Josh Zelonis

    Security and risk (S&R) professionals have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for...

  • For Security & Risk Professionals

    Report

    Report Predictions 2018: Cybersecurity

    Landscape: The S&R Practice Playbook
    November 7, 2017 | Andras Cser, Jeff Pollard, Merritt Maxim

    In 2018, consumers and businesses will face challenges brought on by four primary forces: 1) rising tensions in international relations; 2) ubiquitous connectivity; 3) digital transformation...

  • For Security & Risk Professionals

    Report

    Report Assess Your Digital Risk Protection Maturity

    Use Forrester's Assessment To Structure How You Monitor And Mitigate Digital Risks That Expose Your Brand, Business, And People
    November 3, 2017 | Nick Hayes

    How well do you protect your external digital assets and thwart malicious lookalikes and activity? Most companies underestimate their digital risk exposure and lack monitoring and mitigation...

  • For Security & Risk Professionals

    Report

    Report Best Practices: Mitigating Insider Threats

    Processes: The Security Architecture And Operations Playbook
    November 2, 2017 | Joseph Blankenship, Claire O'Malley

    Whether accidental or malicious, insider threat incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros...

  • For Security & Risk Professionals

    Report

    Report Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook
    September 19, 2017 | Stephanie Balaouras, Heidi Shey

    In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • For Security & Risk Professionals

    Report

    Report Calculate The Business Impact And Cost Of A Breach

    Business Case: The Data Security And Privacy Playbook
    August 31, 2017 | Heidi Shey

    The business impact and cost of a breach are notoriously difficult to measure. A data breach initiates a tangle of direct and indirect costs, with some accruing in the immediate aftermath and...

  • For Security & Risk Professionals

    Report

    Report Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook
    August 25, 2017 | Heidi Shey, Jeff Pollard

    New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...

  • For Security & Risk Professionals

    Report

    Report Forrester Data: Endpoint Security Software Forecast, 2016 To 2021 (Global)

    ForecastView Document
    August 22, 2017 | Jennifer Adams, Chris Sherman

    Hackers are creating new, more sophisticated malware daily, and endpoint security solutions provide a critical line of defense to protect PCs, laptops, and servers from these malicious threats....

  • For Security & Risk Professionals

    Report

    Report Ransomware Protection: Five Best Practices

    Harden Your Defenses Now For This Growing Threat
    July 27, 2017 | Chris Sherman, Salvatore Schiano

    Ransomware is holding enterprises hostage. Recent outbreaks from variants such as WannaCry and Petya have many security and risk (S&R) pros wondering if they can prevent this growing threat. By...

  • For Security & Risk Professionals

    Report

    Report Honeypots 2.0: Deception Technology Lures Cybercriminals Into A Trap

    Hollywood Isn't The Only Industry Banking On Sequels
    July 18, 2017 | Josh Zelonis, Jeff Pollard

    Security and risk (S&R) professionals can leverage deception technologies that mimic real production applications and systems in an attempt to lure attackers into an intrusion. The concept isn't...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: External Threat Intelligence, 2017

    Look Beyond Your Own Perimeter To Understand And Prevent Threats
    June 26, 2017 | Josh Zelonis

    The threat intelligence market is muddled by confusing messaging that has hurt security and risk (S&R) pros' ability to succeed with their intelligence capabilities. This report provides a course...

  • For Security & Risk Professionals

    Report

    Report Hardcoded For Failure

    Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
    June 21, 2017 | Chase Cunningham

    There is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Best Practices For Minimizing Business Travel Risk

    Detailed Guides For Preventing Cybertheft, Espionage, And Physical Harm

    Determined adversaries will stop at nothing to infiltrate your firm for its sensitive data, and employees who travel for business or take their devices on the road often become a vulnerability that...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Vulnerability Management, 2017

    Software Vulnerabilities Are The Leading Means Of External Attacks — It's Time To Do Something About It
    April 21, 2017 | Josh Zelonis

    Breaches can undermine customer trust, endanger revenue growth and profits, and permanently tarnish reputations. According to our data, software vulnerabilities are the single largest factor in...

  • For Security & Risk Professionals

    Report

    Report Achieve Early Success In Threat Intelligence With The Right Collection Strategy

    S&R Pros Must Use Strategic Intelligence To Maximize Their Investment
    April 11, 2017 | Josh Zelonis

    Threat intelligence is a different animal than most security and risk (S&R) professionals are used to dealing with. For those new to the space, getting started can feel like an overwhelming...

  • For Security & Risk Professionals

    Report

    Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook
    March 8, 2017 | Stephanie Balaouras, Peter Cerrato, John Kindervag

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...

  • For CIO Professionals

    Report

    Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities

    March 6, 2017 | Kate McCarthy, Chris Sherman

    Healthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...

  • For Security & Risk Professionals

    Report

    Report Top Cybersecurity Threats In 2017

    January 26, 2017 | Josh Zelonis

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this...

  • For Security & Risk Professionals

    Report

    Report The State Of Network Security: 2016 To 2017

    January 26, 2017 | Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2016 to...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

Content categories

Refine your results

Date Range

Industry

Primary Role

Methodology

Region

Vendor

Analyst

Market Imperatives