58 results in Everything
 
Sort by:
Refine
  • Secure customers, protect the brand
  • Cloud Computing
  • Security & Risk

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Forum Security & Risk

    Learn best practices for data security and cybersecurity risk management.
    September 22, 2020 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk 2020 to learn about...

  • Report Cybersecurity Risk Ratings Market Outlook, 2020 And Beyond

    CISO Trust And Transparency Issues Drive Market Consolidation And Exits
    March 16, 2020 | Paul McKay

    Cybersecurity risk ratings vendors leverage externally available data about a firm to rate its cybersecurity posture. These vendors have now become mainstream despite customers, suppliers, and...

  • Report Securing Private 5G At The Edge: Europe Edition

    Guide To Securing Private 5G And Edge Computing Use Cases For European Organizations
    March 13, 2020 | Paul McKay

    5G networks are being deployed around Europe in 2020; several countries and telecom operators will bring 5G to the consumer market in 2020 and beyond. You'll find the most compelling 5G use cases...

  • Report The Top Trends Driving Cloud Workload Security In 2020

    Market Consolidation, SaaS Offerings, And Remediation And DevOps Integration Are Reshaping The CWS Market
    March 3, 2020 | Andras Cser

    Cloud workload security (CWS) solutions are deployed to detect, mitigate, and prevent cloud misconfigurations, configuration drift, identity and privilege proliferations, and vulnerabilities in...

  • Report The Forrester Wave™: Cloud Workload Security, Q4 2019

    The 13 Providers That Matter Most And How They Stack Up
    December 9, 2019 | Andras Cser

    In our 30-criterion evaluation of cloud workload security (CWS) providers, we identified the 13 most significant ones — Alert Logic, Aqua Security, Bitdefender, Cavirin, Check Point, Cisco,...

  • Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

    Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
    November 25, 2019 | Andras Cser, Sean Ryan

    With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...

  • Report The Forrester Tech Tide™: Identity And Access Management, Q4 2019

    Seventeen Technology Categories Underpin The IAM Market
    November 14, 2019 | Andras Cser, Sean Ryan

    Identity and access management (IAM) is increasingly critical to firms' ability to win, serve, and retain their customers. To accelerate their performance in IAM, companies are evaluating and...

  • Webinar Tactics For Maximizing Cybersecurity Risk Ratings Solutions

    October 15, 2019 | Paul McKay, Trevor Lyness

    Cybersecurity risk ratings solutions are becoming a core part of enterprise security and third-party security programs of global companies. Join this webinar to learn the best practices and tactics...

  • Webinar Hybrid Cloud Security Best Practices

    August 21, 2019 | Andras Cser

    Protecting cloud workloads and their configuration in public, private, and hybrid clouds is a key concern of enterprises. This webinar highlights the drivers and best practices to secure...

  • Report Cybersecurity Risk Ratings Enhance Third-Party Risk Management

    Rating Solutions Help Accelerate Third-Party Security Assurance But Can't Replace Essential Processes
    July 25, 2019 | Paul McKay, Trevor Lyness

    Cybersecurity risk rating solutions are a valuable tool for third-party risk management (TPRM), but both the technology and the way customers use it are still maturing. Security and risk leaders...

  • Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    June 26, 2019 | Andras Cser, Merritt Maxim

    Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, CIOs, and CISOs use IAM...

  • Report Hybrid Cloud Security Best Practices

    Focus On The Five C's: Console, Configuration, Connectivity, Cloud Data, And Containers
    June 20, 2019 | Andras Cser

    Hybrid cloud security is a must for firms moving their critical data from on-premises to cloud workloads. This report, based on a small, 20-respondent panel survey, looks at cloud security best...

  • Webinar Cloud Security Gateways — Key Trends And Vendor Landscape

    Using The Forrester Wave™
    June 12, 2019 | Andras Cser

    Cloud security gateways (CSGs) are a key component of protecting data both on-premises and in the cloud. This webinar looks at buyer behaviors and the vendor landscape of CSGs. Key...

  • Webinar European Security Market Trends In 2019

    May 7, 2019 | Paul McKay

    Security leaders in Europe aren’t just grappling with the constantly changing security threat landscape. Budgetary pressures are starting to bite as economic growth slows down. CISOs will...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report Now Tech: Data Loss Prevention, Q1 2019

    Forrester's Overview Of 37 Data Loss Prevention (DLP) Providers
    January 18, 2019 | Heidi Shey

    You can use data loss prevention (DLP) capabilities to support compliance, protect intellectual property, and augment employee security awareness. But to access these benefits, you'll first have to...