43 results in Everything
 
Sort by:
Refine
  • Information Security
  • Now Tech

Search Results

  • Report Now Tech: Software Composition Analysis, Q1 2019

    Forrester's Overview Of 17 Software Composition Analysis Providers
    January 24, 2019 | Amy DeMartine

    You can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development life cycle (SDLC). But to...

  • Report Now Tech: Security Awareness And Training Solutions, Q1 2019

    Forrester's Overview Of 20 Security Awareness And Training Solution Providers
    January 23, 2019 | Jinan Budge, Claire O'Malley

    You can use security awareness and training solutions to build the ever-important human firewall, prepare your workforce for recognizing and responding to phishing attacks, and rebrand security as...

  • Report Now Tech: Antiphishing Solutions, Q1 2019

    Processes: The Zero Trust Security Playbook
    January 8, 2019 | Joseph Blankenship, Nick Hayes, Claire O'Malley

    You can use antiphishing solutions to detect and block malicious emails, protect against impersonation attacks, and educate employees with training and phishing simulations. But to access these...

  • Report Now Tech: Crisis Communication And Mass Notification Solutions, Q4 2018

    Forrester's Overview Of 17 Crisis Communication And Mass Notification Providers
    December 18, 2018 | Merritt Maxim

    You can use crisis communication and mass notification solutions to improve your response to critical events and incidents that disrupt business, hamper employee productivity, or threaten physical...

  • Report Now Tech: Authentication Management Solutions, Q3 2018

    Forrester's Overview Of 26 Authentication Management Providers
    August 7, 2018 | Andras Cser, Merritt Maxim

    You can use authentication management solutions to simplify and standardize credential processing for applications, reduce the operational costs of authentication, and improve the authentication...

  • Report Now Tech: Mobile Security, Q1 2018

    Forrester's Overview Of 20 Mobile Security Providers
    March 15, 2018 | Chris Sherman

    You can use mobile security tools to enable employees to be productive, serve customers, generate revenue, and maintain a competitive edge, even as targeted attacks threaten your assets and...

  • Report Now Tech: Endpoint Detection And Response, Q1 2018

    Forrester's Overview Of 26 EDR Providers
    February 1, 2018 | Josh Zelonis

    You can use endpoint detection and response (EDR) offerings to improve endpoint visibility, orchestrate threat remediation, and achieve superior threat hunting. But to access these benefits, you'll...

Content Type

Apply

Filters

Vendor