Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Search Results
-
Report Now Tech: Data Security Platforms, Q1 2021
Forrester's Overview Of 26 Data Security Platform Providers
February 25, 2021 | Heidi SheyYou can use data security platforms to take a data-centric approach to securing data, provide a center of gravity for integration with additional security technologies, and streamline your overall...
-
Report Introducing The Zero Trust Edge Model For Security And Network Services
Strategic Plan: The Zero Trust Security Playbook
To support the digitalization of a company using cloud and internet of things (IoT), many networking teams turned to SD-WAN. However, SD-WAN doesn't address the new security requirements or the...
-
Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation
Vision: The Data Security And Privacy Playbook
From data breaches that corrupt business performance and reputation, to privacy violations that hurt consumers, to unwarranted workplace surveillance that diminishes employee trust and experience,...
-
Report A Strategic Guide For Controlling And Securing Your Data
Forrester's Data Security Control Framework
January 19, 2021 | Heidi SheyIn organizations that are complex or that have huge amounts of data, security, risk, and privacy pros often don't know where to start. A Zero Trust approach where data security is a key pillar is...
-
Report The State Of Cybersecurity In Indonesia
Indonesian Security Leaders Will Accelerate Their Security Transformation In 2021
Adaptiveness and CX improvements are key business priorities for firms in Indonesia in 2021, and cybersecurity will be crucial to safeguarding these priorities. Indonesia is in the early stages of...
-
Report Drive Growth With Customer Trust And Build Brand Resilience
Advanced Level: Technology Practices For Cybersecurity And Privacy
When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report...
-
Report Lay Your Security Tech Foundation
Beginner Level: Technology Practices For Cybersecurity And Privacy
This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to help...
-
Report Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses
Intermediate Level: Technology Practices For Cybersecurity And Privacy
CIOs and technology leaders in the intermediate phase of cybersecurity and privacy maturity must ensure that security always travels with the data and should position data security and privacy as...
-
Report How To Secure And Govern Non-Human Identities
Apply Zero Trust IAM Principles To Secure Software Bots, Physical Robots, And IoT Devices
January 6, 2021 | Sean Ryan, Chase CunninghamDo you know how many software bots, physical robots, or IoT devices are connected to your network? How many of these devices store or interact with critical data? Such nonhumans boost productivity...
-
Report Gauge Your ZTX Security Maturity
Assessment: The Zero Trust Security Playbook
December 31, 2020 | Chase CunninghamTo convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros...
-
Report The Zero Trust eXtended Ecosystem: Data
Landscape: The Data Security And Privacy Playbook
August 11, 2020 | Heidi Shey, Chase CunninghamData security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...
-
Report The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
August 10, 2020 | David HolmesIn our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...
-
Report Enhance EX With Zero Trust
Business Case: The Zero Trust Security Playbook
Forrester's Zero Trust (ZT) framework is the modern security architecture blueprint for enterprises. Fundamentally, ZT is about moving away from traditional perimeter-based security approaches and...
-
Report Video: End User And Administrator Experiences With A Zero Trust Network Access Solution
Kill The VPN For End Users With ZTNA
July 2, 2020 | Chase CunninghamIn the post COVID-19 world there is a lot of talk about eliminating the VPN. Security and risk (S&R) leaders, however, are often hesitant to dive into the deep end on these solutions as they worry...
-
Report Sell Your Zero Trust Strategy Internally
Gain Advocacy, Support, And Budget For Your Security Vision
June 23, 2020 | Jinan Budge, Chase CunninghamSecurity and risk (S&R) professionals often struggle to obtain buy-in or support from the many stakeholders who will be affected by Zero Trust (ZT) implementations. This report shows S&R leaders...
-
Report Now Tech: Network Analysis And Visibility, Q2 2020
Forrester's Overview Of 24 Network Analysis And Visibility Providers
June 23, 2020 | Josh ZelonisYou can use network analysis and visibility (NAV) solutions to identify unmanaged assets, understand how to implement Zero Trust segmentation, and detect threats within your environment. But to...
-
Report Bust The Zero Trust Myths
Prioritize Zero Trust Concerns, Because Your Stakeholders Can Make Or Break Your Strategy
June 22, 2020 | Jinan Budge, Chase CunninghamZero Trust (ZT) is prone to misconceptions. IT and business leaders often think that ZT is too hard, too expensive, and requires them to restructure everything they've built or deploy...
-
Report Throw DARTS To Hit Your Zero Trust Targets
Vision: The Zero Trust Security Playbook
June 15, 2020 | Chase Cunningham, Peter CerratoOrganizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...
-
Report Mitigating Ransomware With Zero Trust
Bolster Your Defenses With Zero Trust Principles And Techniques
June 8, 2020 | Chase Cunningham, Josh Zelonis, David HolmesRansomware and malware continue to plague organizations across the globe. Entire industries have been affected and, in some cases, ground to a halt thanks to the scourge of ransomware attacks....
-
Report Now Tech: Zero Trust Solution Providers, Q2 2020
Forrester's Overview Of 38 Zero Trust Solution Providers
May 1, 2020 | Chase CunninghamYou can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...
-
Report How To Implement Zero Trust Security In Europe
Large technology companies and the US federal government have adopted Zero Trust (ZT) as their next-generation security model. 2019 saw Zero Trust enter the European security market. In 2020,...
-
Report Now Tech: Enterprise Firewalls, Q1 2020
Forrester's Overview Of 18 Enterprise Firewall Providers
March 20, 2020 | David HolmesYou can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...
-
Report Securing Private 5G At The Edge: Europe Edition
Guide To Securing Private 5G And Edge Computing Use Cases For European Organizations
March 13, 2020 | Paul McKay5G networks are being deployed around Europe in 2020; several countries and telecom operators will bring 5G to the consumer market in 2020 and beyond. You'll find the most compelling 5G use cases...
-
Report Microservice Application Platforms Need A New Type Of Reference Architecture
The Unique Needs Of Each Business Domain Call For Custom Cloud-Native Application Platforms
March 6, 2020 | Randy HeffnerIn these early days for microservices, it's clear that they face a long road to maturity: Only 13% of microservices users say they have production-proven platforms. Enterprises need microservice...
-
Report Using Zero Trust To Kill The Employee Password
Secure Workforce Access With Stronger Authentication Methods
Passwords are easy pickings for cybercriminals and the culprit behind many cyberattacks. Administrative costs and user productivity losses add insult to injury. So why are so many organizations...
- 1
- 2
Content Type
ApplyFilters
Industry
- Healthcare (3)
- Manufacturing (1)
- Transportation & Logistics (1)
Primary Role
- Security & Risk (28)
- CIO (7)
- Infrastructure & Operations (4)
- Application Development & Delivery (3)
Methodology
- Business Technographics (5)
- Now Tech (4)
- Forrester Wave (3)
- Forrester Tech Tide (1)
- Maturity Assessment (1)
- Online Maturity Assessment (1)
- Predictions (1)
Region
- Europe (2)
- Asia Pacific (1)
Vendor
- Cisco (3)
- Google (3)
- Palo Alto Networks (3)
- Akamai (2)
- Check Point (2)
- Fortinet (2)
- IBM (2)
- Microsoft (2)
- Okta (2)
- Proofpoint (2)
- Symantec (2)
- Unisys (2)
- BlackBerry Cylance (1)
- Capgemini (1)
- Centrify (1)
- Dell (1)
- Huawei (1)
- Imperva (1)
- Juniper Networks (1)
- Micro Focus (1)
- Oracle (1)
- Varonis (1)
Analyst
- David Holmes (6)
- Heidi Shey (5)
- Jeff Pollard (5)
- Amy DeMartine (3)
- Andre Kindness (3)
- Jinan Budge (3)
- Sean Ryan (3)
- Alla Valente (2)
- Andras Cser (2)
- Arielle Trzcinski (2)
- Enza Iannopollo (2)
- Paul McKay (2)
- Stephanie Balaouras (2)
- Abhijit Sunil (1)
- Achim Granzen (1)
- Andrew Hewitt (1)
- Chris Gardner (1)
- Chris Sherman (1)
- Matthew Guarini (1)
- Merritt Maxim (1)
- Naveen Chhabra (1)
- Peter Cerrato (1)
- Renee Murphy (1)
- Salvatore Schiano (1)