175 results in Reports
Sort by:
Refine
  • Vulnerability & Threat Management

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook
    September 19, 2017 | Stephanie Balaouras, Heidi Shey

    In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • For Security & Risk Professionals

    Report

    Report Calculate The Business Impact And Cost Of A Breach

    Business Case: The Data Security And Privacy Playbook
    August 31, 2017 | Heidi Shey

    The business impact and cost of a breach are notoriously difficult to measure. A data breach initiates a tangle of direct and indirect costs, with some accruing in the immediate aftermath and...

  • For Security & Risk Professionals

    Report

    Report Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook
    August 25, 2017 | Heidi Shey, Jeff Pollard

    New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...

  • For Security & Risk Professionals

    Report

    Report Forrester Data: Endpoint Security Software Forecast, 2016 To 2021 (Global)

    ForecastView Document
    August 22, 2017 | Jennifer Adams, Chris Sherman

    Hackers are creating new, more sophisticated malware daily, and endpoint security solutions provide a critical line of defense to protect PCs, laptops, and servers from these malicious threats....

  • For Security & Risk Professionals

    Report

    Report Ransomware Protection: Five Best Practices

    Harden Your Defenses Now For This Growing Threat
    July 27, 2017 | Chris Sherman, Salvatore Schiano

    Ransomware is holding enterprises hostage. Recent outbreaks from variants such as WannaCry and Petya have many security and risk (S&R) pros wondering if they can prevent this growing threat. By...

  • For Security & Risk Professionals

    Report

    Report Honeypots 2.0: Deception Technology Lures Cybercriminals Into A Trap

    Hollywood Isn't The Only Industry Banking On Sequels
    July 18, 2017 | Josh Zelonis, Jeff Pollard

    Security and risk (S&R) professionals can leverage deception technologies that mimic real production applications and systems in an attempt to lure attackers into an intrusion. The concept isn't...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: External Threat Intelligence, 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    June 26, 2017 | Josh Zelonis

    The threat intelligence market is muddled by confusing messaging that has hurt security and risk (S&R) pros' ability to succeed with their intelligence capabilities. This report provides a course...

  • For Security & Risk Professionals

    Report

    Report Hardcoded For Failure

    Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
    June 21, 2017 | Chase Cunningham

    There is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook
    April 26, 2017 | Merritt Maxim, Jeff Pollard

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Best Practices For Minimizing Business Travel Risk

    Detailed Guides For Preventing Cybertheft, Espionage, And Physical Harm
    April 24, 2017 | Heidi Shey, Merritt Maxim

    Determined adversaries will stop at nothing to infiltrate your firm for its sensitive data, and employees who travel for business or take their devices on the road often become a vulnerability that...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Vulnerability Management, 2017

    Software Vulnerabilities Are The Leading Means Of External Attacks — It's Time To Do Something About It
    April 21, 2017 | Josh Zelonis

    Breaches can undermine customer trust, endanger revenue growth and profits, and permanently tarnish reputations. According to our data, software vulnerabilities are the single largest factor in...

  • For Security & Risk Professionals

    Report

    Report Achieve Early Success In Threat Intelligence With The Right Collection Strategy

    S&R Pros Must Use Strategic Intelligence To Maximize Their Investment
    April 11, 2017 | Josh Zelonis

    Threat intelligence is a different animal than most security and risk (S&R) professionals are used to dealing with. For those new to the space, getting started can feel like an overwhelming...

  • For Security & Risk Professionals

    Report

    Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...

  • For CIO Professionals

    Report

    Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities

    March 6, 2017 | Kate McCarthy, Chris Sherman

    Healthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...

  • For Security & Risk Professionals

    Report

    Report Top Cybersecurity Threats In 2017

    Landscape: The Security Architecture And Operations Playbook
    January 26, 2017 | Josh Zelonis

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this...

  • For Security & Risk Professionals

    Report

    Report The State Of Network Security: 2016 To 2017

    Benchmarks: The Security Architecture And Operations Playbook
    January 26, 2017 | Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2016 to...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For Infrastructure & Operations Professionals

    Report

    Report Five Steps To Reinforce And Harden Application Security

    I&O Teams Must Prevent And Remediate App Vulnerabilities
    January 13, 2017 | Milan Hanson, Amy DeMartine

    Today's cybercriminals are highly skilled, resourceful, and determined. Vulnerabilities such as web server misconfigurations or components that include known vulnerabilities give cybercriminals...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From The World's Biggest Data Breaches And Privacy Abuses, 2016

    Continuous Improvement: The Data Security And Privacy Playbook
    January 9, 2017 | Stephanie Balaouras, Heidi Shey

    Breaking news of a massive customer breach or blatant privacy abuse dominates the headlines for days. However, months and even years later, affected customers still struggle with the aftermath and...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Data Security And Privacy: 2016 To 2017

    Benchmarks: The Data Security And Privacy Playbook
    December 7, 2016 | Heidi Shey

    Throughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...

  • For B2B Marketing Professionals

    Report

    Report Global Business Technographics® Security Survey, 2016: Overview

    A Business Technographics Presentation
    December 6, 2016 | Tyler McDaniel, Brian Luu

    This report is our overview of security decision-makers’ adoption of network security and security operations technologies; adoption of sourcing solutions to protect public cloud deployments;...

  • For Security & Risk Professionals

    Report

    Report Maximize The Benefits Of Your Incident Response Retainer

    A Strong Relationship With Your Retainer Is Critical To Breach Response
    November 11, 2016 | Josh Zelonis

    To deal with the inevitability of a significant cyberattack and breach, security and risk pros are forging relationships with external breach notification and incident response (IR) firms. However,...

  • For Security & Risk Professionals

    Report

    Report Predictions 2017: Cybersecurity Risks Intensify

    Landscape: The S&R Practice Playbook
    November 1, 2016 | Amy DeMartine, Jeff Pollard

    The connected world has arrived; we live and work in it. In this new reality, the next 12 months will see battles rage that will determine the amount of control individuals have over their own data...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Poor Planning, Not An IoT Botnet, Disrupted The Internet

    Dyn Outage Underscores The Need To Plan For Failure
    October 24, 2016 | Jeff Pollard, Joseph Blankenship

    On October 21, internet users went through a real exercise in one way the internet could die. Critical infrastructure exists on the internet as well as in the real world, and this attack crippled...

  • For Security & Risk Professionals

    Report

    Report The IoT Attack Surface Transcends The Digital-Physical Divide

    Security Leaders Must Prepare For High-Impact Attacks
    October 13, 2016 | Jeff Pollard, Merritt Maxim

    The internet of things (IoT) has evolved beyond a hyped buzzword into commercially available technologies that can significantly improve customer outcomes and deliver business benefits. However,...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Market Imperatives

Region

Vendor

Analyst