35 results in Reports
Sort by:
Refine
  • Security Architecture

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Security Architecture And Operations Playbook
    July 5, 2017 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it is the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • For Security & Risk Professionals

    Report

    Report Creating Actionable Security And Privacy Policy

    Policy: The Data Security And Privacy Playbook
    May 3, 2017 | Heidi Shey

    Data security and privacy policies are ineffective and can even hinder business processes without a clear understanding of the data — from what it is to where it exists. Data identity is the...

  • For Security & Risk Professionals

    Report

    Report Jump-Start Zero Trust With Forrester's Reference Architecture

    A Blueprint For Protecting Customers And Employees With Zero Trust
    March 27, 2017 | Laura Koetzle, Andre Kindness

    Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security: In Zero Trust, all network traffic is inherently untrusted. In this report, we...

  • For Security & Risk Professionals

    Report

    Report Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook
    November 4, 2016 | Stephanie Balaouras, John Kindervag

    In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • For Security & Risk Professionals

    Report

    Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook
    August 4, 2016 | John Kindervag

    In response to increasingly complex cyberattacks, security professionals devote more time and resources to granular aspects of their networks. This is understandable and necessary to a degree, but...

  • For Security & Risk Professionals

    Report

    Report Job Description: Identity And Access Management Architect

    Staff IAM Efficiently To Enable The Digital Business
    May 11, 2016 | Merritt Maxim, Andras Cser

    For security and risk leaders building a comprehensive identity and access management (IAM) strategy for their digital business, this report provides an overview of the skills, job descriptions,...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Your Next Security Analyst Could Be A Computer

    IBM Announces Watson For Cyber Security
    May 10, 2016 | Joseph Blankenship

    IBM announced on May 10 that it is launching a project to use its cognitive computing technology, Watson, in cybersecurity. Working with eight universities, IBM intends to train Watson on the...

  • For Security & Risk Professionals

    Report

    Report Security Leaders, Earn Your Seat At The Table

    CISOs Must Be On The Board Agenda Or Risk Being Sidelined
    April 29, 2015 | Martin Whitworth

    If CISOs want to be taken seriously as senior business executives, they must be prepared to engage with board members. This means effectively communicating on matters concerning information and...

  • For Security & Risk Professionals

    Report

    Report Create And Support The New Security Designer Role

    The Rise Of The Security Designer
    April 27, 2015 | Tyler Shields

    Enterprises are paying much more attention to design when considering how to build quality experiences for their customers. A strong next step in product development evolution is embracing security...

  • For Security & Risk Professionals

    Report

    Report Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    December 11, 2014 | John Kindervag, Stephanie Balaouras

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Network Security: 2013 To 2014

    January 6, 2014 | Heidi Shey, Kelley Mak

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about security architecture and operations. Analysis of B2B survey data from Forrester's...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Enterprise Mobile Security, Q4 2013

    December 13, 2013 | Tyler Shields

    There are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application layer,...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Cisco's Acquisition Of Sourcefire Has Significant Potential

    But Only If Cisco Doesn't Strangle Innovation
    July 24, 2013 | John Kindervag, Rick Holland

    On July 23, 2013, Cisco announced its acquisition of network security specialist Sourcefire for $2.7 billion. With the acquisition of Sourcefire, Cisco confirms that customers do in fact want...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Security And Risk, Q1 To Q4 2012

    June 26, 2013 | Stephanie Balaouras, Andras Cser

    Forrester's security and risk (S&R) team fields hundreds of inquiries every month. We use these inquiries as a barometer to track client challenges and to gauge client interest in the various...

  • For Security & Risk Professionals

    Report

    Report Seven Habits Of Highly Effective Incident Response Teams

    April 17, 2013 | Rick Holland

    Given the continued metastasizing of the threat landscape, it comes as no surprise that enterprises should possess mature incident response capabilities that are built on staff, augmented by...

  • For Security & Risk Professionals

    Report

    Report Build Security Into Your Network's DNA: The Zero Trust Network Architecture

    November 15, 2012 | John Kindervag

    One of our goals with Zero Trust is to optimize the security architectures and technologies for future flexibility. As we move toward a data-centric world with shifting threats and perimeters, we...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Network Security: 2012 To 2013

    September 20, 2012 | Heidi Shey

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and end users about security architecture and operations. Analysis of B2B survey data from Forrester's...

  • For Security & Risk Professionals

    Report

    Report OpenID Connect Heralds The "Identity Singularity"

    Prepare For Cloud Security Improvements, Along With A Tincture Of Disruption
    October 26, 2011 | Eve Maler

    Security professionals responsible for diverse types of access management across cloud services, devices, and populations have to pull off a neat trick: control access requests that routinely cross...

  • For Security & Risk Professionals

    Report

    Report Securing An Empowered Organization

    An Empowered Report: Run At The Threat, Shape The Future Of Your Company
    October 29, 2010 | Chenxi Wang

    Employees are provisioning themselves with consumer and cloud technology. Forrester's study of US information workers reveals that 37% are doing something with technology without permission. And...

  • For Security & Risk Professionals

    Report

    Report The Security Of B2B: Enabling An Unbounded Enterprise

    Rethinking And Redesigning B2B Security Architecture For Today's Tech Innovations
    April 29, 2010 | Usman Sindhu

    Many security and risk professionals seek to implement fine-grained security controls that span traditional boundaries and perimeters for their organizations. Businesses today have global...

  • For Security & Risk Professionals

    Report

    Report The PCI Unleashed Framework

    January 8, 2010 | John Kindervag

    The PCI Unleashed Framework is designed to logically organize the PCI requirements so that it is easy to understand and extend. The framework shows that there is an overall security organization...

  • For Enterprise Architecture Professionals

    Report

    Report The State Of Enterprise Architecture 2010: Organization, Priorities, And Support

    December 17, 2009 | Gene Leganza, Alex Cullen

    The EA team of 2009 reports high into the IT organization (either to the CIO or senior planning roles beneath the CIO), has broad acceptance and support, and spends about half its time on strategic...

  • For Security & Risk Professionals

    Report

    Report Shift In Ownership: Protecting Data Outside Your Four Walls

    October 28, 2009 | Robert Whiteley III

    In September 2009, Forrester hosted a two-day event designed to help security and risk professionals understand the top three shifts impacting their job heading. This document summarizes the key...

  • For Security & Risk Professionals

    Report

    Report Shift In Expectations: Modernizing Your SRM Program

    October 28, 2009 | Robert Whiteley III

    In September 2009, Forrester hosted a two-day event designed to help security and risk professionals understand the top three shifts impacting their job heading. This document summarizes the key...

  • For Security & Risk Professionals

    Report

    Report Shift In Architecture: Building A Flexible, Compliant Foundation

    October 27, 2009 | Robert Whiteley III

    In September 2009, Forrester hosted a two-day event designed to help security and risk professionals understand the top three shifts impacting their job heading. This document summarizes the key...