Skip to main content
1,264 results in Everything
 
Sort by:
Refine
  • Security & Risk

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report The Forrester Wave™: Web Application Firewalls, Q1 2020

    The 10 Providers That Matter Most And How They Stack Up
    February 26, 2020 | Sandy Carielli, Amy DeMartine

    In our 33-criterion evaluation of web application firewall (WAF) providers, we identified the 10 most significant ones — Akamai Technologies, Alibaba Cloud, Amazon Web Services, Barracuda Networks,...

  • Report The Forrester Wave™: Security Awareness And Training Solutions, Q1 2020

    The 12 Providers That Matter Most And How They Stack Up
    February 25, 2020 | Jinan Budge, Claire O'Malley

    In our 23-criterion evaluation of security awareness and training (SA&T) providers, we identified the 12 most significant ones — Cofense, CybSafe, Elevate Security, Infosec, Inspired eLearning,...

  • Report Managing The Security Risks Posed By Your Employees' IoT Devices

    Your Employees' Connected Ecosystems Place Enterprise Assets At Risk
    February 19, 2020 | Chris Sherman

    Your employees are also consumers, and their personal IoT devices — ranging from home automation hubs to connected cars — interact with the enterprise devices they use to access sensitive company...

  • Report Security Budgets 2020: New Threats Bring New Priorities

    Benchmarks: The S&R Practice Playbook
    February 14, 2020 | Jeff Pollard

    This report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...

  • Report Build A Security Champions Network

    How To Integrate Security Culture Across Your Organization
    February 12, 2020 | Jinan Budge, Claire O'Malley

    Building a security culture up, down, and across the organization and engaging the multitudes of stakeholders is neither a simple task nor one that can easily be completed in the short term. This...

  • Report Prepare Your Organization For A Pandemic

    Key Recommendations For How Business And Risk Leaders Build Resiliency In A World Where Disease Outbreaks Are The New Normal

    The likelihood and impact of a pandemic are impossible to predict with much accuracy. Regardless, history tells us there's a potential for widespread and costly disruption — especially for those...

  • Report Shift From Privacy Readiness To Sustained Compliance

    Roadmap: The Data Security And Privacy Playbook
    February 6, 2020 | Enza Iannopollo

    New privacy rules are popping up all over the world. Increasingly, security and risk (S&R) and privacy professionals believe that maintaining compliance with global privacy regulations is one of...

  • Webinar Kill The Employee Password With Zero Trust

    February 6, 2020 | Sean Ryan

    Passwords are easy to hack and expensive to support. So why do so many organizations still rely on them for secure access? S&R pros need to ditch the password and adopt a Zero Trust approach to...

  • Report Now Tech: Enterprise Detection And Response, Q1 2020

    Forrester's Overview Of 29 Enterprise Detection And Response Providers
    February 5, 2020 | Josh Zelonis

    You can use enterprise detection and response (EDR) offerings to improve detection, investigate alerts, and provide remote remediation of compromised systems. But to realize these benefits, you'll...

  • Report Ignore Geopolitical Risk At Your Peril

    Why And How You Must Address Global Cybersecurity Concerns
    January 31, 2020 | Jeff Pollard, Claire O'Malley

    Failing to formally incorporate geopolitical considerations in your risk management processes could ultimately mean havoc for your international presence, global customer base, third-party...

  • Playbook The Governance, Risk, And Compliance Playbook For 2020

    Take On More Business Risk Using A World-Class GRC Program

    Governance, risk, and compliance (GRC) programs give organizations the confidence to take the business risks that drive innovation and competitive advantage. Yet too many organizations lack...

  • Report The Top Trends Shaping IAM In 2020

    Landscape: The Identity And Access Management Playbook
    January 29, 2020 | Andras Cser, Sean Ryan

    Identity is a core building block of a robust Zero Trust security ecosystem and infrastructure. In this report, we look at the eight most important trends that will shape the identity and access...

  • Report The Forrester New Wave™: Bot Management, Q1 2020

    The 13 Providers That Matter Most And How They Stack Up
    January 29, 2020 | Sandy Carielli, Amy DeMartine

    In Forrester's evaluation of the emerging market for bot management, we identified the 13 most significant providers in the category — Akamai Technologies, Alibaba Cloud, AppsFlyer, Cloudflare,...

  • Report Capturing Innovation In Your Security Program

    Security Startups Offer More Flexibility And Innovative Approaches To Securing Your Enterprise
    January 27, 2020 | Paul McKay, Jinan Budge, Heidi Shey

    Cybersecurity is one of the hottest areas worldwide for venture capital and private equity investment. There has never been so many cybersecurity startups globally. Unprecedented levels of...

  • Report Top Cybersecurity Threats In 2020

    Landscape: The Zero Trust Security Playbook
    January 24, 2020 | Josh Zelonis, Sandy Carielli

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...

  • Report The Business Case For Data Security And Privacy

    Business Case: The Data Security And Privacy Playbook
    January 23, 2020 | Heidi Shey

    Businesses recognize that the consequences of breach, data misuse, or privacy mishaps can be costly. For security, risk, and privacy professionals, building a business case based on the importance...

  • Report Prepare For Decentralized Digital Identity: Security SWOT

    Benefits Of Privacy And Centralization Get Hampered By Lack Of Trust, Early Fragmentation, And Growing Pains Of Wallet Management
    January 21, 2020 | Andras Cser, Sean Ryan

    Decentralized digital identity (DDID) is not just a technology buzzword: It promises a complete restructuring of the currently centralized physical and digital identity ecosystem into a...

  • Report A Practical Guide To A Zero Trust Implementation

    Roadmap: The Zero Trust Security Playbook

    Zero Trust is rapidly becoming the security model of choice for enterprises and governments alike. However, security leaders often don't know where to begin to implement it, or they feel daunted by...

  • Report A CISO's Guide To Successfully Leading Change

    How To Build Support, Manage Detractors, And Navigate Politics
    January 9, 2020 | Jinan Budge

    Cybersecurity is getting ever more scrutiny from boards, execs, and customers. Many CISOs need to launch large change programs to transform their cybersecurity capabilities amidst unprecedented...

  • Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    January 9, 2020 | Jeff Pollard, Paul McKay

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • Report Get Intentional With A Dynamic GRC Roadmap

    Roadmap: The Governance, Risk, And Compliance Playbook
    January 8, 2020 | Alla Valente, Renee Murphy

    GRC roadmaps must align the strategy, vision, and execution of processes and technology to the practical steps needed to execute major risk and compliance initiatives. The challenge for risk and...

  • Report Build The Business Case For GRC

    Business Case: The Governance, Risk, And Compliance Playbook
    January 7, 2020 | Alla Valente, Renee Murphy

    The business case for governance, risk management, and compliance (GRC) efforts too often relies on the fear of costly events or regulatory action. This report helps GRC leaders elevate the...

  • Report The State Of Government Application Security, 2020

    Government Must Invest Aggressively In Application Security To Protect Citizen Data
    January 7, 2020 | Sandy Carielli, Amy DeMartine

    Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....

  • Report The Biggest Trends Shaping Enterprise Risk Management In 2020

    Enterprise Risk Management Programs Must Mature Faster To Adapt To Changing Risks

    Uncertainties in the business environment and emergence of new threats are leading to more complex risks. Firms are doubling down on proactive risk management to better anticipate disruption, build...

  • Playbook The Identity And Access Management Playbook For 2020

    Evolve Your IAM Strategy For Your Digital Business

    New business models have extended the identity boundaries of today's digital businesses: Security pros must manage identities and access across a variety of populations (employees, partners, and...

Content Type

Apply

Filters

Region