Advanced Search
23 results in Reports
Sort by:
Refine
  • Zero Trust

Search Results

  • For Security & Risk Professionals

    Report

    Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...

  • For CIO Professionals

    Report

    Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities

    March 6, 2017 | Kate McCarthy, Chris Sherman

    Healthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...

  • For Security & Risk Professionals

    Report

    Report Top Cybersecurity Threats In 2017

    Landscape: The Security Architecture And Operations Playbook
    January 26, 2017 | Josh Zelonis

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this...

  • For Security & Risk Professionals

    Report

    Report Achieving Zero Trust Identity And Access Management

    Zero Trust IAM Unifies And Improves Access Control Across The Digital Business
    October 25, 2016 | Andras Cser, Merritt Maxim

    Increasingly, IAM has become a tool not just for security but also for business agility. As firms exploit digital technologies to create new sources of value for customers and to increase their...

  • For Security & Risk Professionals

    Report

    Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook
    August 4, 2016 | John Kindervag

    In response to increasingly complex cyberattacks, security professionals devote more time and resources to granular aspects of their networks. This is understandable and necessary to a degree, but...

  • For Security & Risk Professionals

    Report

    Report Five Steps To A Zero Trust Network

    Strategic Plan: The Security Architecture And Operations Playbook
    July 27, 2016 | John Kindervag

    A Zero Trust (ZT) network abolishes the idea of a trusted network inside the corporate perimeter. A ZT network creates microperimeters of control around an enterprise's sensitive data assets and...

  • For Security & Risk Professionals

    Report

    Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Vision: The Data Security And Privacy Playbook
    July 7, 2016 | John Kindervag, Heidi Shey

    Data is the lifeblood of today's digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits,...

  • For Security & Risk Professionals

    Report

    Report No More Chewy Centers: The Zero Trust Model Of Information Security

    Vision: The Security Architecture And Operations Playbook
    March 23, 2016 | John Kindervag

    There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Zero Trust Identity Standards, Q1 2016

    Road Map: The Identity And Access Management Playbook
    January 5, 2016 | Merritt Maxim, Andras Cser

    Security and risk (S&R) professionals must ensure that identity and access information flows seamlessly across system and business boundaries for B2B access, employee single sign-on into cloud...

  • For Security & Risk Professionals

    Report

    Report Case Study: WestJet Redefines Its Security With Forrester's Zero Trust Model

    WestJet Enables An Agile Architecture And Fortified Security With Zero Trust
    May 27, 2015 | John Kindervag, Kelley Mak

    Legacy perimeter-centric approaches to security are ineffectual for today's digital business. Security and risk (S&R) leaders need a new approach, and that approach is Forrester's Zero Trust Model...

  • For Security & Risk Professionals

    Report

    Report Three Technical Innovations Will Ignite Zero Trust

    May 5, 2015 | John Kindervag, Andre Kindness

    Forrester's Zero Trust Model of information security is gaining worldwide traction. Security and risk (S&R) pros at large enterprises are adopting and implementing Zero Trust networks and...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Zero Trust Network Threat Mitigation Technology, Q1 2015

    January 28, 2015 | John Kindervag, Kelley Mak

    Not a week goes by without news of network attacks and stolen data. Consumers routinely undergo the stress of fraudulent charges or compromised credit cards. Digital businesses lose millions in...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Network Security: 2014 To 2015

    December 22, 2014 | Heidi Shey, Kelley Mak

    Throughout the year, Forrester analysts engage in hundreds of discussions with vendors and security pros about security architecture and operations. Analysis of B2B survey data from Forrester's...

  • For Security & Risk Professionals

    Report

    Report Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    December 11, 2014 | John Kindervag, Stephanie Balaouras

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Zero Trust Identity Standards, Q3 2014

    Standards In The OAuth Orbit — And SCIM — Continue To Grow
    October 7, 2014 | Andras Cser

    The Zero Trust enterprise requires enterprise applications, identity stores, mobile apps, the Internet of Things, and other systems on-premises and in the cloud to generate and consume a variety of...

  • For Security & Risk Professionals

    Report

    Report Build Security Into Your Network's DNA: The Zero Trust Network Architecture

    November 15, 2012 | John Kindervag

    One of our goals with Zero Trust is to optimize the security architectures and technologies for future flexibility. As we move toward a data-centric world with shifting threats and perimeters, we...

  • For Security & Risk Professionals

    Report

    Report TechRadar™ For Security Pros: Zero Trust Identity Standards, Q3 2012

    October 24, 2012 | Eve Maler, Andras Cser

    This report outlines Forrester's solution to help security and risk (S&R) leaders develop their road map of IAM processes using Forrester's TechRadar™ methodology. The extended enterprise...

  • For Security & Risk Professionals

    Report

    Report Actionable Identity Intelligence Protects Big Data And Zero Trust Identities

    Predictive And Behavioral Analysis Finds Its Way Into Identity And Access Management
    August 1, 2012 | Andras Cser

    Identity and access management (IAM) professionals need to protect information and prevent unauthorized users from accessing business-critical systems in an increasingly complex IT environment....

  • For Security & Risk Professionals

    Report

    Report Develop Your Road Map For Zero Trust Network Mitigation Technology

    Network Analysis And Visibility Tools Take Center Stage
    May 9, 2012 | John Kindervag

    This report outlines Forrester's solution to help security and risk (S&R) leaders develop their road map for Zero Trust network threat mitigation technologies using Forrester's TechRadar™...

  • For Security & Risk Professionals

    Report

    Report The Risk Manager's Handbook: How To Evaluate Risks To Plan An Effective Response

    Determining Whether, When, And How To Treat Risks
    February 2, 2012 | Christopher McClean, Nick Hayes

    The goal of a risk management program is to drive effective decisions and actions based on an understanding of how uncertainty may affect objectives. However, even mature programs that have...

  • For Security & Risk Professionals

    Report

    Report Applying Zero Trust To The Extended Enterprise

    Preparing Your Network For Any Device, Anywhere, Any Time
    August 5, 2011 | John Kindervag

    You are part of an extended enterprise — a new extended ecosystem of customers, clouds, service providers, partners, supply chains, and empowered users. The business expects you, the security...

  • For Security & Risk Professionals

    Report

    Report Understanding Simple Cloud Identity Management

    With The SCIM Specifications, User Provisioning Goes "Zero Trust"
    July 15, 2011 | Eve Maler

    Business owners are jumping on SaaS services to get quicker wins, and CIOs are finding these services attractive for cutting costs as well. Since it's relatively quick and easy to hook up these...

  • For Security & Risk Professionals

    Report

    Report Pull Your Head Out Of The Sand And Put It On A Swivel: Introducing Network Analysis And Visibility

    Essential Functionality For The Zero Trust Model Of Information Security
    January 24, 2011 | John Kindervag

    In today's threat environment, the network perimeter has disappeared. Insiders are as insidious a threat as outsiders. In the past, the "trust but verify" model did not facilitate insight into...