Skip to main content
42 results in Reports
 
Sort by:
Refine
  • Zero Trust

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report Now Tech: Data Security Platforms, Q1 2021

    Forrester's Overview Of 26 Data Security Platform Providers
    February 25, 2021 | Heidi Shey

    You can use data security platforms to take a data-centric approach to securing data, provide a center of gravity for integration with additional security technologies, and streamline your overall...

  • Report Introducing The Zero Trust Edge Model For Security And Network Services

    Strategic Plan: The Zero Trust Security Playbook
    January 28, 2021 | David Holmes, Andre Kindness

    To support the digitalization of a company using cloud and internet of things (IoT), many networking teams turned to SD-WAN. However, SD-WAN doesn't address the new security requirements or the...

  • Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Vision: The Data Security And Privacy Playbook
    January 19, 2021 | Enza Iannopollo, Heidi Shey

    From data breaches that corrupt business performance and reputation, to privacy violations that hurt consumers, to unwarranted workplace surveillance that diminishes employee trust and experience,...

  • Report A Strategic Guide For Controlling And Securing Your Data

    Forrester's Data Security Control Framework
    January 19, 2021 | Heidi Shey

    In organizations that are complex or that have huge amounts of data, security, risk, and privacy pros often don't know where to start. A Zero Trust approach where data security is a key pillar is...

  • Report The State Of Cybersecurity In Indonesia

    Indonesian Security Leaders Will Accelerate Their Security Transformation In 2021
    January 14, 2021 | Jinan Budge, Achim Granzen

    Adaptiveness and CX improvements are key business priorities for firms in Indonesia in 2021, and cybersecurity will be crucial to safeguarding these priorities. Indonesia is in the early stages of...

  • Report Drive Growth With Customer Trust And Build Brand Resilience

    Advanced Level: Technology Practices For Cybersecurity And Privacy

    When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report...

  • Report Lay Your Security Tech Foundation

    Beginner Level: Technology Practices For Cybersecurity And Privacy
    January 11, 2021 | Jeff Pollard, Amy DeMartine

    This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to help...

  • Report Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses

    Intermediate Level: Technology Practices For Cybersecurity And Privacy

    CIOs and technology leaders in the intermediate phase of cybersecurity and privacy maturity must ensure that security always travels with the data and should position data security and privacy as...

  • Report How To Secure And Govern Non-Human Identities

    Apply Zero Trust IAM Principles To Secure Software Bots, Physical Robots, And IoT Devices
    January 6, 2021 | Sean Ryan, Chase Cunningham

    Do you know how many software bots, physical robots, or IoT devices are connected to your network? How many of these devices store or interact with critical data? Such nonhumans boost productivity...

  • Report Gauge Your ZTX Security Maturity

    Assessment: The Zero Trust Security Playbook
    December 31, 2020 | Chase Cunningham

    To convert your digital business ecosystem into a secure, Zero Trust eXtended (ZTX) ecosystem, you need to know where to start the transformation. This report guides security and risk (S&R) pros...

  • Report The Zero Trust eXtended Ecosystem: Data

    Landscape: The Data Security And Privacy Playbook
    August 11, 2020 | Heidi Shey, Chase Cunningham

    Data security is a key pillar of Zero Trust. Security leaders must use standalone data security technologies as well as data security capabilities within adjacent security technologies and...

  • Report The Forrester Wave™: Enterprise Firewalls, Q3 2020

    The 11 Providers That Matter Most And How They Stack Up
    August 10, 2020 | David Holmes

    In our 34-criterion evaluation of enterprise firewall providers, we identified the 11 most significant ones — Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet,...

  • Report Enhance EX With Zero Trust

    Business Case: The Zero Trust Security Playbook
    July 13, 2020 | Andrew Hewitt, David Holmes

    Forrester's Zero Trust (ZT) framework is the modern security architecture blueprint for enterprises. Fundamentally, ZT is about moving away from traditional perimeter-based security approaches and...

  • Report Video: End User And Administrator Experiences With A Zero Trust Network Access Solution

    Kill The VPN For End Users With ZTNA
    July 2, 2020 | Chase Cunningham

    In the post COVID-19 world there is a lot of talk about eliminating the VPN. Security and risk (S&R) leaders, however, are often hesitant to dive into the deep end on these solutions as they worry...

  • Report Sell Your Zero Trust Strategy Internally

    Gain Advocacy, Support, And Budget For Your Security Vision
    June 23, 2020 | Jinan Budge, Chase Cunningham

    Security and risk (S&R) professionals often struggle to obtain buy-in or support from the many stakeholders who will be affected by Zero Trust (ZT) implementations. This report shows S&R leaders...

  • Report Now Tech: Network Analysis And Visibility, Q2 2020

    Forrester's Overview Of 24 Network Analysis And Visibility Providers
    June 23, 2020 | Josh Zelonis

    You can use network analysis and visibility (NAV) solutions to identify unmanaged assets, understand how to implement Zero Trust segmentation, and detect threats within your environment. But to...

  • Report Bust The Zero Trust Myths

    Prioritize Zero Trust Concerns, Because Your Stakeholders Can Make Or Break Your Strategy
    June 22, 2020 | Jinan Budge, Chase Cunningham

    Zero Trust (ZT) is prone to misconceptions. IT and business leaders often think that ZT is too hard, too expensive, and requires them to restructure everything they've built or deploy...

  • Report Throw DARTS To Hit Your Zero Trust Targets

    Vision: The Zero Trust Security Playbook
    June 15, 2020 | Chase Cunningham, Peter Cerrato

    Organizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...

  • Report Mitigating Ransomware With Zero Trust

    Bolster Your Defenses With Zero Trust Principles And Techniques
    June 8, 2020 | Chase Cunningham, Josh Zelonis, David Holmes

    Ransomware and malware continue to plague organizations across the globe. Entire industries have been affected and, in some cases, ground to a halt thanks to the scourge of ransomware attacks....

  • Report Now Tech: Zero Trust Solution Providers, Q2 2020

    Forrester's Overview Of 38 Zero Trust Solution Providers
    May 1, 2020 | Chase Cunningham

    You can use Zero Trust solution providers to eliminate easy targets, take back the initiative, and clarify technology benefits for stakeholders. But to realize these benefits, you'll first have to...

  • Report How To Implement Zero Trust Security In Europe

    April 15, 2020 | Paul McKay, Chase Cunningham, Enza Iannopollo

    Large technology companies and the US federal government have adopted Zero Trust (ZT) as their next-generation security model. 2019 saw Zero Trust enter the European security market. In 2020,...

  • Report Now Tech: Enterprise Firewalls, Q1 2020

    Forrester's Overview Of 18 Enterprise Firewall Providers
    March 20, 2020 | David Holmes

    You can use modern enterprise firewalls to protect north-south perimeters, segment east-west traffic, monitor users and applications, and enable software-defined wide-area networks (SD-WANs) to...

  • Report Securing Private 5G At The Edge: Europe Edition

    Guide To Securing Private 5G And Edge Computing Use Cases For European Organizations
    March 13, 2020 | Paul McKay

    5G networks are being deployed around Europe in 2020; several countries and telecom operators will bring 5G to the consumer market in 2020 and beyond. You'll find the most compelling 5G use cases...

  • Report Microservice Application Platforms Need A New Type Of Reference Architecture

    The Unique Needs Of Each Business Domain Call For Custom Cloud-Native Application Platforms
    March 6, 2020 | Randy Heffner

    In these early days for microservices, it's clear that they face a long road to maturity: Only 13% of microservices users say they have production-proven platforms. Enterprises need microservice...

  • Report Using Zero Trust To Kill The Employee Password

    Secure Workforce Access With Stronger Authentication Methods
    March 2, 2020 | Sean Ryan, Andras Cser

    Passwords are easy pickings for cybercriminals and the culprit behind many cyberattacks. Administrative costs and user productivity losses add insult to injury. So why are so many organizations...

  • 1
  • 2