1,261 results in Everything
 
Sort by:
Refine
  • Security & Risk

Search Results

  • Report Now Tech: Managed Security Services In Asia Pacific, Q1 2019

    Forrester's Overview Of 19 Managed Security Service Providers
    January 16, 2019 | Jinan Budge

    You can use managed security services to rapidly transform your security operations, improve your talent diversity, increase your breadth of skills, and support your global business. But to access...

  • Report Build A High-Performance, Customer-Obsessed Security Organization

    Executive Overview: The S&R Practice Playbook
    January 16, 2019 | Christopher McClean

    CISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...

  • Report Now Tech: Antiphishing Solutions, Q1 2019

    Processes: The Zero Trust Security Playbook
    January 8, 2019 | Joseph Blankenship, Nick Hayes, Claire O'Malley

    You can use antiphishing solutions to detect and block malicious emails, protect against impersonation attacks, and educate employees with training and phishing simulations. But to access these...

  • Report Define A Road Map To Accelerate Your Security Program

    Road Map: The S&R Practice Playbook
    January 8, 2019 | Christopher McClean

    Turning strategy into action reveals a CISO's worth. A solid security road map is the best way to do this; it guides implementation efforts, shows support for key business initiatives, and explains...

  • Webinar Beware Of And Prepare For The Coming Data Integrity Crisis

    Companies increasingly rely on data and automated decision making to transform their business. This, however, means that the impact of a data integrity attack – where an attacker alters...

  • Report New Tech: Blockchain Identity (BCI) Management, Q1 2019

    Forrester's Landscape Overview Of 22 Providers
    January 3, 2019 | Andras Cser, Martha Bennett

    A new crop of blockchain identity (BCI) technologies, and the solutions they power, stand poised to unleash new paradigms in identity verification (IDV) and access policy enforcement, leading to...

  • Report Top Trends Shaping IAM In 2019

    Landscape: The Identity And Access Management Playbook
    January 3, 2019 | Andras Cser, Merritt Maxim

    For today's digital businesses, identity and access management (IAM) involves more than just provisioning and enforcing employee access to corporate applications and data. Security and risk (S&R)...

  • Report The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q1 2019

    Tools And Technology: The Zero Trust Security Playbook
    January 2, 2019 | Josh Zelonis, Joseph Blankenship

    Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm's brand. To accelerate their performance in threat detection and...

  • Report The Zero Trust eXtended Ecosystem: Networks

    The Network Continues To Be A Critical Point Of Control In ZTX
    January 2, 2019 | Chase Cunningham

    Anywhere packets pass is a place that can offer cybercriminals command and control of critical network assets, but it can also enable better security and ultimately help to build a Zero Trust...

  • Report Partner With European Security Startups To Protect Your Business

    How To Capitalize On The Market's Best New Innovations
    December 28, 2018 | Paul McKay

    In addition to more-traditional venture funding, investors and governments across Europe have spent big to set up security incubators and accelerators, and their efforts have resulted in some true...

  • Report How To Talk To Your Board About Cybersecurity

    Best Practices And Template For Board Presentations
    December 28, 2018 | Jeff Pollard, Jinan Budge, Paul McKay

    Whether there to answer questions, give a status update, or build support, security leaders need to make the most out of each opportunity they get in front of their board of directors. This report...

  • Report The Five Milestones To GDPR Success

    Road Map: The Data Security And Privacy Playbook
    December 24, 2018 | Enza Iannopollo

    May 25, 2018 marked the beginning of GDPR enforcement, but many firms are still behind on their compliance road map. We believe that fines and enforcement actions are just weeks ahead and that...

  • Report Understand The State Of Identity And Access Management, 2018 To 2019

    Benchmarks: The Identity And Access Management Playbook
    December 19, 2018 | Merritt Maxim, Andras Cser

    This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...

  • Report Building A Customer-Obsessed IAM Team

    Organization: The Identity And Access Management Playbook
    December 18, 2018 | Merritt Maxim, Andras Cser

    For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides an overview of the skills and...

  • Report Now Tech: Crisis Communication And Mass Notification Solutions, Q4 2018

    Forrester's Overview Of 17 Crisis Communication And Mass Notification Providers
    December 18, 2018 | Merritt Maxim

    You can use crisis communication and mass notification solutions to improve your response to critical events and incidents that disrupt business, hamper employee productivity, or threaten physical...

  • Report Top Enterprise Fraud Management And Anti-Money-Laundering Trends

    Consortium, Third-Party, And Blockchain Data Integration Will Transform EFM And AML Solutions And Practices
    December 17, 2018 | Andras Cser

    While enterprise fraud management (EFM) and anti-money laundering (AML) are mature functions, regulatory pressures in Europe and advances in machine learning are rapidly and profoundly changing...

  • Report Security Budgets 2019: The Year Of Services Arrives

    Benchmarks: The S&R Practice Playbook
    December 17, 2018 | Jeff Pollard

    This report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...

  • Report New Tech: Secure Communications, Q4 2018

    Forrester's Landscape Overview Of 27 Providers
    December 11, 2018 | Heidi Shey

    This report presents an overview of the emerging vendors in the secure communications market. These are vendors whose offerings include a mix of encrypted messaging/text and additional...

  • Report Top Cybersecurity Threats In 2019

    Landscape: The Zero Trust Security Playbook
    December 11, 2018 | Josh Zelonis

    Security pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this challenge is to...

  • Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    December 10, 2018 | Jeff Pollard

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • Report Measure GRC Performance To Show Processes And Data Reliability

    Performance Management: The Governance, Risk, And Compliance Playbook
    December 6, 2018 | Renee Murphy

    The more complex a program is, the more difficult it is to mature and maintain it. The more complicated the business process is, the faster and more devastating this breakdown can be. Strong...

  • Report Maintain Your Security Edge

    Continuous Improvement: The Zero Trust Security Playbook
    December 6, 2018 | Heidi Shey, Jeff Pollard, Claire O'Malley

    New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...

  • Report The State Of Data Security And Privacy: 2018 To 2019

    Benchmarks: The Data Security And Privacy Playbook
    December 5, 2018 | Heidi Shey, Enza Iannopollo

    This data-driven report outlines budgeting and spending, technology adoption plans, and other key breach, data protection, and privacy trends in global firms for 2018 through 2019. Understanding...

  • Report Estimate Breach Impact And Costs To Drive Investments

    Business Case: The Data Security And Privacy Playbook
    December 3, 2018 | Heidi Shey

    In today's climate, businesses are taking a hard look at the risks associated with data misuse and privacy missteps. For security, risk, and privacy professionals to build a business case for...

  • Report Get Tactical With A Dynamic GRC Road Map

    Road Map: The Governance, Risk, And Compliance Playbook
    November 30, 2018 | Nick Hayes

    GRC road maps document the practical steps needed to execute major risk and compliance initiatives. The challenge is how to plan for continued progress, knowing for certain that the risk and...

Content Type

Apply

Filters

Region

Vendor