517 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Secure customers, protect the brand

Featured content

ForresterNow

FORRESTERNOW

Forrester First Insight

As the coronavirus dominates the global headlines, businesses should take the opportunity to develop business continuity plans specifically for pandemics—focusing on customer, employee, and partner needs. Read more »

Search Results

  • Webinar Recapping The 2020 RSA Conference: Forrester’s Perspectives

    Wednesday, March 18, 2020, 1:00 p.m.-2:00 p.m. Eastern time (17:00-18:00 GMT) | Merritt Maxim

    The RSA Conference is an important annual event to assess the global state of information security. As the world’s largest information security event, the RSA Conference provides a full week...

  • Report Managing The Security Risks Posed By Your Employees' IoT Devices

    Your Employees' Connected Ecosystems Place Enterprise Assets At Risk
    February 19, 2020 | Chris Sherman

    Your employees are also consumers, and their personal IoT devices — ranging from home automation hubs to connected cars — interact with the enterprise devices they use to access sensitive company...

  • Report Security Budgets 2020: New Threats Bring New Priorities

    Benchmarks: The S&R Practice Playbook
    February 14, 2020 | Jeff Pollard

    This report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...

  • Report Prepare Your Organization For A Pandemic

    Key Recommendations For How Business And Risk Leaders Build Resiliency In A World Where Disease Outbreaks Are The New Normal

    The likelihood and impact of a pandemic are impossible to predict with much accuracy. Regardless, history tells us there's a potential for widespread and costly disruption — especially for those...

  • Report Shift From Privacy Readiness To Sustained Compliance

    Roadmap: The Data Security And Privacy Playbook
    February 6, 2020 | Enza Iannopollo

    New privacy rules are popping up all over the world. Increasingly, security and risk (S&R) and privacy professionals believe that maintaining compliance with global privacy regulations is one of...

  • Webinar Kill The Employee Password With Zero Trust

    February 6, 2020 | Sean Ryan

    Passwords are easy to hack and expensive to support. So why do so many organizations still rely on them for secure access? S&R pros need to ditch the password and adopt a Zero Trust approach to...

  • Report Now Tech: Enterprise Detection And Response, Q1 2020

    Forrester's Overview Of 29 Enterprise Detection And Response Providers
    February 5, 2020 | Josh Zelonis

    You can use enterprise detection and response (EDR) offerings to improve detection, investigate alerts, and provide remote remediation of compromised systems. But to realize these benefits, you'll...

  • Report The Future Of The CISO

    Vision: The S&R Practice Playbook
    January 31, 2020 | Jeff Pollard, Claire O'Malley, Paul McKay

    For many security and risk pros, becoming a CISO is challenging, and they find themselves in situations where they're forced to conform, rather than excel. This report outlines types of CISOs,...

  • Report Ignore Geopolitical Risk At Your Peril

    Why And How You Must Address Global Cybersecurity Concerns
    January 31, 2020 | Jeff Pollard, Claire O'Malley

    Failing to formally incorporate geopolitical considerations in your risk management processes could ultimately mean havoc for your international presence, global customer base, third-party...

  • Report The Top Trends Shaping IAM In 2020

    Landscape: The Identity And Access Management Playbook
    January 29, 2020 | Andras Cser, Sean Ryan

    Identity is a core building block of a robust Zero Trust security ecosystem and infrastructure. In this report, we look at the eight most important trends that will shape the identity and access...

  • Report The Forrester New Wave™: Bot Management, Q1 2020

    The 13 Providers That Matter Most And How They Stack Up
    January 29, 2020 | Sandy Carielli, Amy DeMartine

    In Forrester's evaluation of the emerging market for bot management, we identified the 13 most significant providers in the category — Akamai Technologies, Alibaba Cloud, AppsFlyer, Cloudflare,...

  • Report Capturing Innovation In Your Security Program

    Security Startups Offer More Flexibility And Innovative Approaches To Securing Your Enterprise
    January 27, 2020 | Paul McKay, Jinan Budge, Heidi Shey

    Cybersecurity is one of the hottest areas worldwide for venture capital and private equity investment. There has never been so many cybersecurity startups globally. Unprecedented levels of...

  • Report Top Cybersecurity Threats In 2020

    Landscape: The Zero Trust Security Playbook
    January 24, 2020 | Josh Zelonis, Sandy Carielli

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...

  • Report The Business Case For Data Security And Privacy

    Business Case: The Data Security And Privacy Playbook
    January 23, 2020 | Heidi Shey

    Businesses recognize that the consequences of breach, data misuse, or privacy mishaps can be costly. For security, risk, and privacy professionals, building a business case based on the importance...

  • Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    January 9, 2020 | Jeff Pollard, Paul McKay

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • Report Build The Business Case For GRC

    Business Case: The Governance, Risk, And Compliance Playbook
    January 7, 2020 | Alla Valente, Renee Murphy

    The business case for governance, risk management, and compliance (GRC) efforts too often relies on the fear of costly events or regulatory action. This report helps GRC leaders elevate the...

  • Report The State Of Government Application Security, 2020

    Government Must Invest Aggressively In Application Security To Protect Citizen Data
    January 7, 2020 | Sandy Carielli, Amy DeMartine

    Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....

  • Report The Biggest Trends Shaping Enterprise Risk Management In 2020

    Enterprise Risk Management Programs Must Mature Faster To Adapt To Changing Risks

    Uncertainties in the business environment and emergence of new threats are leading to more complex risks. Firms are doubling down on proactive risk management to better anticipate disruption, build...

  • Report Collective Bargaining Forces Companies To Manage Reputational Risk

    Risk Managers Must Do More To Protect Their Firm's Reputation
    December 23, 2019 | Renee Murphy, Salvatore Schiano

    One of the biggest sources of reputational risk is the focused impact of employees or customers who negotiate collectively. Through this collective bargaining, customers or employees change how...

  • Report Don't Poison Your Employee Experience With The Wrong Approach To Insider Threat

    Security Leaders Must Balance Security, Governance, And Employee Privacy
    December 20, 2019 | Joseph Blankenship, Enza Iannopollo

    Your colleagues are one of the biggest threats to the security of your organization, but treating them as criminals is obviously not an option. Considerations for employees' privacy, company...

  • Report Now Tech: Web Application Firewalls, Q4 2019

    Forrester's Overview Of 31 WAF Providers
    December 20, 2019 | Sandy Carielli, Amy DeMartine

    You can use web application firewalls (WAFs) to protect applications, apply consistent and global security policies, and comply with regulations. But to realize these benefits, you'll first have to...

  • Report Now Tech: Governance, Risk, And Compliance Technology, Q4 2019

    Forrester's Overview Of 23 Governance, Risk, And Compliance Providers
    December 13, 2019 | Alla Valente

    You can use governance, risk, and compliance (GRC) technology to protect your customers, business, and brand; proactively respond to emerging risks and evolving regulations; and navigate through...

  • Report New Tech: Bot Management, Q4 2019

    Forrester's Landscape Overview Of 22 Providers
    December 13, 2019 | Sandy Carielli, Amy DeMartine

    Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated,...

  • Report How To Manage Brexit's Impact: CISO Edition

    Focus On Data Protection, Staffing, And Regulatory Alignment
    December 12, 2019 | Paul McKay, Enza Iannopollo

    While the recent UK general election has provided certainty that the first stage of Brexit will happen on January 31, the certainty only persists until the end of 2020. It's still possible that a...

  • Webinar Top Trends Shaping IAM In 2020

    December 11, 2019 | Andras Cser, Sean Ryan

    This webinar highlights the top trends influencing identity and access management (IAM) in 2020. We cover enterprise and customer IAM as well as access management and governance.Key...

Content Type

Apply

Filters

Region