461 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Information Security

Search Results

  • Forum Privacy & Security 2019

    The Technology of Trust
    September 12, 2019 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...

  • Webinar European Security Market Trends In 2019

    Tuesday, May 7, 2019, 11:00 a.m.-11:40 a.m. Eastern time (16:00-16:40 GMT) | Paul McKay

    Security leaders in Europe aren’t just grappling with the constantly changing security threat landscape. Budgetary pressures are starting to bite as economic growth slows down. CISOs will...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Throw Away Your Current Application Security Metrics

    Match Application Security Metrics To Developer Speed
    March 1, 2019 | Amy DeMartine, Jeff Pollard

    Applications underpin customer engagement, but they also are the top external attack method for breaches. To avoid launching efforts that waste time, effort, and money, security leaders need...

  • Report New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019

    Forrester's Landscape Overview Of 21 Providers
    February 28, 2019 | Merritt Maxim, Joseph Blankenship

    A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems,...

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Report The Forrester MITRE ATT&CK Evaluation Guide

    An Objective Analysis Of The Evaluation And How To Interpret The Results
    February 27, 2019 | Josh Zelonis

    In an industry desperate for objective efficacy testing, the introduction of the MITRE ATT&CK evaluation of endpoint detection and response (EDR) security products is a much-welcomed event....

  • Report The Future Of Endpoint Protection, 2019 To 2024

    Endpoint Security Will Focus On Apps' And Users' Behavior
    January 24, 2019 | Chris Sherman

    Security leaders have struggled for the past 20 years to balance effective endpoint security with good employee experience, and this challenge will only get tougher as attacks and technologies...

  • Report Now Tech: Software Composition Analysis, Q1 2019

    Forrester's Overview Of 17 Software Composition Analysis Providers
    January 24, 2019 | Amy DeMartine

    You can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development life cycle (SDLC). But to...

  • Report Now Tech: Security Awareness And Training Solutions, Q1 2019

    Forrester's Overview Of 20 Security Awareness And Training Solution Providers
    January 23, 2019 | Jinan Budge, Claire O'Malley

    You can use security awareness and training solutions to build the ever-important human firewall, prepare your workforce for recognizing and responding to phishing attacks, and rebrand security as...

  • Report The State Of Endpoint Security, 2019

    Buyers Demand Better Product Efficacy And Integrated Data Security
    January 22, 2019 | Chris Sherman, Salvatore Schiano

    Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns to help security...

  • Report Now Tech: Antiphishing Solutions, Q1 2019

    Processes: The Security Architecture And Operations Playbook
    January 8, 2019 | Joseph Blankenship, Nick Hayes, Claire O'Malley

    You can use antiphishing solutions to detect and block malicious emails, protect against impersonation attacks, and educate employees with training and phishing simulations. But to access these...

  • Report The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q1 2019

    Tools And Technology: The Security Architecture And Operations Playbook
    January 2, 2019 | Josh Zelonis, Joseph Blankenship

    Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm's brand. To accelerate their performance in threat detection and...

  • Report The Zero Trust eXtended Ecosystem: Networks

    Strategic Plan: The Security Architecture And Operations Playbook
    January 2, 2019 | Chase Cunningham

    Anywhere packets pass is a place that can offer cybercriminals command and control of critical network assets, but it can also enable better security and ultimately help to build a Zero Trust...

  • Report Partner With European Security Startups To Protect Your Business

    How To Capitalize On The Market's Best New Innovations
    December 28, 2018 | Paul McKay

    In addition to more-traditional venture funding, investors and governments across Europe have spent big to set up security incubators and accelerators, and their efforts have resulted in some true...

  • Report Now Tech: Crisis Communication And Mass Notification Solutions, Q4 2018

    Forrester's Overview Of 17 Crisis Communication And Mass Notification Providers
    December 18, 2018 | Merritt Maxim

    You can use crisis communication and mass notification solutions to improve your response to critical events and incidents that disrupt business, hamper employee productivity, or threaten physical...

  • Report New Tech: Secure Communications, Q4 2018

    Forrester's Landscape Overview Of 27 Providers
    December 11, 2018 | Heidi Shey

    This report presents an overview of the emerging vendors in the secure communications market. These are vendors whose offerings include a mix of encrypted messaging/text and additional...

  • Report Top Cybersecurity Threats In 2019

    Landscape: The Security Architecture And Operations Playbook
    December 11, 2018 | Josh Zelonis

    Security pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this challenge is to...

  • Report The State Of Network Security: 2018 To 2019

    Benchmarks: The Security Architecture And Operations Playbook
    November 27, 2018 | Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2018 to...

  • Report The Forrester New Wave™: Secure Communications, Q4 2018

    The 10 Providers That Matter Most And How They Stack Up
    November 19, 2018 | Heidi Shey

    In Forrester's evaluation of the emerging market for secure communications, we identified the 10 most significant providers in the category — CellTrust, Dispel, KoolSpan, SafeChats, SaltDNA, Silent...

  • Report The Forrester New Wave™: Cybersecurity Risk Rating Solutions, Q4 2018

    The Nine Providers That Matter Most And How They Stack Up
    November 13, 2018 | Nick Hayes, Trevor Lyness

    In Forrester's evaluation of the emerging market for cybersecurity risk rating solutions, we identified the nine most significant providers in the category — BitSight, FICO, iTrust, NormShield,...

  • Report The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018

    Tools And Technology: The Security Architecture And Operations Playbook
    November 8, 2018 | Chase Cunningham

    In our 15-criterion evaluation of Zero Trust eXtended ecosystem providers, we identified the 14 most significant ones — Akamai Technologies, Centrify, Cisco, Cyxtera Technologies, Forcepoint,...

  • Report Get Fighting Fit For EU's NISD

    The Hype Of GDPR Buried An Equally Important EU Cybersecurity Regulation
    October 5, 2018 | Paul McKay

    Over the past few months, organizations operating essential services across Europe have been finding out if they are in scope of the EU Network Information Systems Directive (NISD). The directive...

  • Report Gauge Your Data Security And Privacy Maturity

    Assessment: The Data Security And Privacy Playbook
    October 5, 2018 | Enza Iannopollo, Heidi Shey

    To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost, to one that champions privacy and uses its technology...

  • Report Application Security Market Will Exceed $7 Billion By 2023

    Security Scanning Tools Will Continue To Lead As Total Spending More Than Doubles
    October 4, 2018 | Amy DeMartine, Jennifer Adams

    Applications are critical touchpoints for your customers but, when it comes to external attacks, also your weakest link. Application security tools identify and remediate vulnerabilities during...

Content Type

Apply

Filters

Region

Vendor