4 results in Everything
 
Sort by:
Refine
  • Security Operations & Program Governance
  • Rapid7

Featured content

The Security Architecture And Operations Playbook For 2019

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Report The Forrester Wave™: Security Analytics Platforms, Q3 2018

    The 13 Providers That Matter Most And How They Stack Up
    September 21, 2018 | Joseph Blankenship

    In our 30-criteria evaluation of security analytics platforms providers, we identified the 13 most significant ones — AlienVault, Exabeam, Fortinet, Gurucul, Huntsman Security, IBM, LogRhythm,...

  • Report The Forrester Wave™: Vulnerability Risk Management, Q1 2018

    The 12 Providers That Matter Most And How They Stack Up
    March 14, 2018 | Josh Zelonis

    In our 22-criteria evaluation of vulnerability risk management (VRM) providers, we identified the 12 most significant ones — Beyond Security, BeyondTrust, Digital Defense, IBM, Kenna Security,...

  • Report Vendor Landscape: Global Managed Security Services, 2017

    Converged Services Thrive While Isolated Offerings Go Extinct
    April 24, 2017 | Jeff Pollard

    For security pros looking to augment their programs with services partners, this is an age of abundance — abundant budget and abundant choice. But sometimes too many choices is just as bad as no...

  • Report Vendor Landscape: Vulnerability Management, 2017

    Software Vulnerabilities Are The Leading Means Of External Attacks — It's Time To Do Something About It
    April 21, 2017 | Josh Zelonis

    Breaches can undermine customer trust, endanger revenue growth and profits, and permanently tarnish reputations. According to our data, software vulnerabilities are the single largest factor in...