Skip to main content
111 results in Everything
 
Sort by:
Refine
  • Cloud Computing
  • Secure customers, protect the brand

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Forum Security & Risk Global

    Leading the Way
    September 22, 2020 | Live Virtual Experience | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    As attackers get more sophisticated and new technologies emerge, the strategies to protect your organization’s valuable data must also evolve. Attend Security & Risk to learn about...

  • Report Forrester Infographic: The State Of The European Cybersecurity Product Market

    European Security Leaders Trying To Buy Local Will Struggle To Meet Their Needs
    July 8, 2020 | Paul McKay

    Developing a thriving European cybersecurity product market is a key EU digital single market priority in 2020 and beyond. European security leaders would love to buy locally but don't always have...

  • Webinar Top Security Technologies To Watch, 2020

    Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives over the last six months to uncover the top eight security...

  • Report Throw DARTS To Hit Your Zero Trust Targets

    Vision: The Zero Trust Security Playbook
    June 15, 2020 | Chase Cunningham, Peter Cerrato

    Organizations across the globe are embracing the idea of Zero Trust. While the security industry is aligning itself to enable this powerful strategy, many companies still don't quite grasp the Zero...

  • Report Assess Your Cloud Security Readiness

    Leverage Forrester's Custom Tool To Assess Your Cloud Security Maturity Across Six Major Technology Competencies
    May 29, 2020 | Andras Cser

    As firms migrate computing and data resources to the cloud, security remains a top concern and priority for both operational and compliance reasons. S&R professionals should use our custom tool, a...

  • Webinar European Security Market Trends, 2020

    May 18, 2020 | Paul McKay

    Security leaders in Europe have had to deal with one of the biggest workforce transformations ever known as workers have moved from office work to homeworking to counter the current COVID-19...

  • Report Zero Trust Primer For 5G Security Use Cases

    More Bandwidth Means More Data To Protect
    May 1, 2020 | Jeff Pollard

    Security and risk pros concerned about 5G security will find that the security narrative was hijacked — rightfully — by geopolitical and national security concerns. For enterprise security leaders,...

  • Report Now Tech: DDoS Mitigation Solutions, Q2 2020

    Forrester's Overview Of 22 DDoS Mitigation Solution Providers
    April 20, 2020 | David Holmes

    You can use DDoS mitigation solutions to protect revenue generated by digital assets, maintain consistent customer experience, and meet availability compliance requirements. But to realize these...

  • Report Cybersecurity Risk Ratings Market Outlook, 2020 And Beyond

    CISO Trust And Transparency Issues Drive Market Consolidation And Exits
    March 16, 2020 | Paul McKay

    Cybersecurity risk ratings vendors leverage externally available data about a firm to rate its cybersecurity posture. These vendors have now become mainstream despite customers, suppliers, and...

  • Report Securing Private 5G At The Edge: Europe Edition

    Guide To Securing Private 5G And Edge Computing Use Cases For European Organizations
    March 13, 2020 | Paul McKay

    5G networks are being deployed around Europe in 2020; several countries and telecom operators will bring 5G to the consumer market in 2020 and beyond. You'll find the most compelling 5G use cases...

  • Report The Top Trends Driving Cloud Workload Security In 2020

    Market Consolidation, SaaS Offerings, And Remediation And DevOps Integration Are Reshaping The CWS Market
    March 3, 2020 | Andras Cser

    Cloud workload security (CWS) solutions are deployed to detect, mitigate, and prevent cloud misconfigurations, configuration drift, identity and privilege proliferations, and vulnerabilities in...

  • Report The Forrester Wave™: Cloud Workload Security, Q4 2019

    The 13 Providers That Matter Most And How They Stack Up
    December 9, 2019 | Andras Cser

    In our 30-criterion evaluation of cloud workload security (CWS) providers, we identified the 13 most significant ones — Alert Logic, Aqua Security, Bitdefender, Cavirin, Check Point, Cisco,...

  • Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

    Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
    November 25, 2019 | Andras Cser, Sean Ryan

    With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...

  • Report The Forrester Tech Tide™: Identity And Access Management, Q4 2019

    Seventeen Technology Categories Underpin The IAM Market
    November 14, 2019 | Andras Cser, Sean Ryan

    Identity and access management (IAM) is increasingly critical to firms' ability to win, serve, and retain their customers. To accelerate their performance in IAM, companies are evaluating and...

  • Report Lay Your Security Tech Foundation

    Beginner Level: Technology Practices For Cybersecurity And Privacy
    November 4, 2019 | Jeff Pollard, Amy DeMartine

    This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to move...

  • Webinar Tactics For Maximizing Cybersecurity Risk Ratings Solutions

    October 15, 2019 | Paul McKay, Trevor Lyness

    Cybersecurity risk ratings solutions are becoming a core part of enterprise security and third-party security programs of global companies. Join this webinar to learn the best practices and tactics...

  • Report Best Practices: Cloud Governance

    Processes: The Cloud Computing Playbook
    October 9, 2019 | Andras Cser, Lauren Nelson

    Transitioning workloads and data to the cloud is unstoppable — but the most difficult question is how to govern the process so you have a predictable, accountable, and scalable transition that...

  • Webinar Hybrid Cloud Security Best Practices

    August 21, 2019 | Andras Cser

    Protecting cloud workloads and their configuration in public, private, and hybrid clouds is a key concern of enterprises. This webinar highlights the drivers and best practices to secure...

  • Report Cybersecurity Risk Ratings Enhance Third-Party Risk Management

    Rating Solutions Help Accelerate Third-Party Security Assurance But Can't Replace Essential Processes
    July 25, 2019 | Paul McKay, Trevor Lyness

    Cybersecurity risk rating solutions are a valuable tool for third-party risk management (TPRM), but both the technology and the way customers use it are still maturing. Security and risk leaders...

  • Report The Public Cloud Market Outlook, 2019 To 2022

    Public Cloud Growth Continues To Power Tech Spending

    Public cloud infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) have fundamentally reshaped the way enterprises consume technology — and how they...

  • Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    June 26, 2019 | Andras Cser, Merritt Maxim

    Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, CIOs, and CISOs use IAM...

  • Report Hybrid Cloud Security Best Practices

    Focus On The Five C's: Console, Configuration, Connectivity, Cloud Data, And Containers
    June 20, 2019 | Andras Cser

    Hybrid cloud security is a must for firms moving their critical data from on-premises to cloud workloads. This report, based on a small, 20-respondent panel survey, looks at cloud security best...

  • Webinar Cloud Security Gateways — Key Trends And Vendor Landscape

    Using The Forrester Wave™
    June 12, 2019 | Andras Cser

    Cloud security gateways (CSGs) are a key component of protecting data both on-premises and in the cloud. This webinar looks at buyer behaviors and the vendor landscape of CSGs. Key...

  • Webinar European Security Market Trends In 2019

    May 7, 2019 | Paul McKay

    Security leaders in Europe aren’t just grappling with the constantly changing security threat landscape. Budgetary pressures are starting to bite as economic growth slows down. CISOs will...

  • Report Top Recommendations For Your Security Program, 2019

    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • 1
  • 2

Content Type

Apply

Filters

Primary Role

Region

Vendor