Featured content
The Security Architecture And Operations Playbook For 2019
Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
Charts & Figures
-
Evaluated Vendors And Product Information
February 20, 2019
-
Forrester Wave™: Cloud Security Gateways Scorecard, Q1 2019
February 20, 2019
-
Forrester Wave™: Cloud Security Gateways, Q1 2019
February 20, 2019
Search Results
-
Forum Data Strategy & Insights 2019
The Insights-Driven Enterprise: Data Strategies for Business Transformation
It's time to stop drowning in data. The insights-driven enterprise is dependent on a critical, shared resource: deep pools of data. Data analytics, data governance, and data infrastructure are...
-
Forum Privacy & Security 2019
The Technology of Trust
Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...
-
Report The Forrester Wave™: Cloud Security Gateways, Q1 2019
The 10 Providers That Matter Most And How They Stack Up
February 20, 2019 | Andras CserIn our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...
-
Report The State Of Business Continuity, 2018
Risk Pros Are Expanding BC To Include Most Operational Risks
As 100-year floods and cyberattacks grow more frequent, and as organizations become completely dependent on complex technology, business continuity (BC) preparedness must be a cornerstone of a...
-
Report Tackle The California Consumer Privacy Act Now
Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
February 8, 2019 | Enza IannopolloIn less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...
-
Report Build Your Security Organization
Organization: The S&R Practice Playbook
CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. This report examines key organizational challenges...
-
Report Now Tech: Security Awareness And Training Solutions, Q1 2019
Forrester's Overview Of 20 Security Awareness And Training Solution Providers
You can use security awareness and training solutions to build the ever-important human firewall, prepare your workforce for recognizing and responding to phishing attacks, and rebrand security as...
-
Report Now Tech: Data Loss Prevention, Q1 2019
Forrester's Overview Of 37 Data Loss Prevention (DLP) Providers
January 18, 2019 | Heidi SheyYou can use data loss prevention (DLP) capabilities to support compliance, protect intellectual property, and augment employee security awareness. But to access these benefits, you'll first have to...
-
Report Now Tech: Managed Security Services In Asia Pacific, Q1 2019
Forrester's Overview Of 19 Managed Security Service Providers
January 16, 2019 | Jinan BudgeYou can use managed security services to rapidly transform your security operations, improve your talent diversity, increase your breadth of skills, and support your global business. But to access...
-
Report Build A High-Performance, Customer-Obsessed Security Organization
Executive Overview: The S&R Practice Playbook
January 16, 2019 | Christopher McCleanCISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...
-
Report Build A Strong Process Foundation For Cybersecurity And Privacy
Beginner Level: Process For Cybersecurity And Privacy
January 10, 2019 | Nick Hayes, Claire O'MalleyTo ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and clearly defined processes for critical areas ranging from internal data security...
-
Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success
Advanced Level: Process For Cybersecurity And Privacy
January 10, 2019 | Stephanie BalaourasCIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect the brand, they help their firms drive growth and long-term success. This report — the third of three in the...
-
Report Elevate Cybersecurity And Privacy With Process Metrics
Intermediate Level: Process For Cybersecurity And Privacy
January 10, 2019 | Nick Hayes, Salvatore SchianoThe intermediate phase of the journey to cybersecurity and privacy maturity turns on establishing metrics and collecting data to drive process improvement. This report — the second of three in the...
-
Report Define A Road Map To Accelerate Your Security Program
Road Map: The S&R Practice Playbook
January 8, 2019 | Christopher McCleanTurning strategy into action reveals a CISO's worth. A solid security road map is the best way to do this; it guides implementation efforts, shows support for key business initiatives, and explains...
-
Playbook The Security Architecture And Operations Playbook For 2019
Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model
In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...
-
Report The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q1 2019
Tools And Technology: The Security Architecture And Operations Playbook
Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm's brand. To accelerate their performance in threat detection and...
-
Playbook The S&R Practice Playbook For 2019
Build A High-Performance Security Organization
CISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...
-
Report Partner With European Security Startups To Protect Your Business
How To Capitalize On The Market's Best New Innovations
December 28, 2018 | Paul McKayIn addition to more-traditional venture funding, investors and governments across Europe have spent big to set up security incubators and accelerators, and their efforts have resulted in some true...
-
Report How To Talk To Your Board About Cybersecurity
Best Practices And Template For Board Presentations
Whether there to answer questions, give a status update, or build support, security leaders need to make the most out of each opportunity they get in front of their board of directors. This report...
-
Report Now Tech: Crisis Communication And Mass Notification Solutions, Q4 2018
Forrester's Overview Of 17 Crisis Communication And Mass Notification Providers
December 18, 2018 | Merritt MaximYou can use crisis communication and mass notification solutions to improve your response to critical events and incidents that disrupt business, hamper employee productivity, or threaten physical...
-
Report Top Enterprise Fraud Management And Anti-Money-Laundering Trends
Consortium, Third-Party, And Blockchain Data Integration Will Transform EFM And AML Solutions And Practices
December 17, 2018 | Andras CserWhile enterprise fraud management (EFM) and anti-money laundering (AML) are mature functions, regulatory pressures in Europe and advances in machine learning are rapidly and profoundly changing...
-
Report Security Budgets 2019: The Year Of Services Arrives
Benchmarks: The S&R Practice Playbook
December 17, 2018 | Jeff PollardThis report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...
-
Report Top Cybersecurity Threats In 2019
Landscape: The Security Architecture And Operations Playbook
December 11, 2018 | Josh ZelonisSecurity pros have the challenging task of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this challenge is to...
-
Report Justify Security Budget By Its Impact On Maturity
Business Case: The S&R Practice Playbook
December 10, 2018 | Jeff PollardSecurity leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...
-
Report Measure GRC Performance To Show Processes And Data Reliability
Performance Management: The Governance, Risk, And Compliance Playbook
December 6, 2018 | Renee MurphyThe more complex a program is, the more difficult it is to mature and maintain it. The more complicated the business process is, the faster and more devastating this breakdown can be. Strong...