25 results in Everything
 
Sort by:
Refine
  • Security Information & Event Management (SIEM)

Featured content

The Zero Trust Security Playbook For 2019

Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Forum Privacy & Security 2019

    The Technology of Trust
    September 12, 2019 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...

  • Report Remove The Mystery From Security Metrics

    Performance Management: The S&R Practice Playbook
    November 16, 2018 | Jeff Pollard

    Difficulty creating meaningful metrics persists for chief information security officers (CISOs) despite a decade of discussion. Without good metrics, the security organization can't participate in...

  • Report The Forrester Wave™: Security Analytics Platforms, Q3 2018

    The 13 Providers That Matter Most And How They Stack Up
    September 21, 2018 | Joseph Blankenship

    In our 30-criteria evaluation of security analytics platforms providers, we identified the 13 most significant ones — AlienVault, Exabeam, Fortinet, Gurucul, Huntsman Security, IBM, LogRhythm,...

  • Report The State Of The Threat Intelligence Platform Market, Q3 2018

    A Market And Investment Review
    July 30, 2018 | Josh Zelonis

    As security and risk (S&R) pros adopt threat intelligence capabilities within their organizations, it becomes necessary to manage that intelligence using a threat intel platform (TIP). This report...

  • Report Craft Zero Trust Security Metrics That Matter To Your Business

    Performance Management: The Zero Trust Security Playbook
    March 27, 2018 | Stephanie Balaouras

    Forrester's Zero Trust (ZT) Model of information security demands that security teams eliminate the dangerous trust assumptions underpinning perimeter-based security architectures. When you embrace...

  • Report Vendor Landscape: External Threat Intelligence, 2017

    Look Beyond Your Own Perimeter To Understand And Prevent Threats
    June 26, 2017 | Josh Zelonis

    The threat intelligence market is muddled by confusing messaging that has hurt security and risk (S&R) pros' ability to succeed with their intelligence capabilities. This report provides a course...