42 results in Everything
 
Sort by:
Refine
  • Amy DeMartine
  • Secure customers, protect the brand

Search Results

  • Webinar Protect Against Bad Bots That Are Trying To Kill Your Customer Experience

    Tuesday, June 18, 2019, 11:00 a.m.-12:00 p.m. Eastern time (16:00-17:00 GMT) | Amy DeMartine

    You may have heard about chatbots, but did you know that 38% of internet traffic comes from automated programs called bots and more than half of this is malicious? These bots are simple programs...

  • Report The Forrester Wave™: Software Composition Analysis, Q2 2019

    The 10 Providers That Matter Most And How They Stack Up
    April 8, 2019 | Amy DeMartine

    In our 33-criterion evaluation of software composition analysis providers, we identified the 10 most significant ones — Flexera, FOSSA, GitLab, JFrog, Snyk, Sonatype, Synopsys, Veracode, WhiteHat...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Report Now Tech: Software Composition Analysis, Q1 2019

    Forrester's Overview Of 17 Software Composition Analysis Providers
    January 24, 2019 | Amy DeMartine

    You can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development life cycle (SDLC). But to...

  • Report Predictions 2019: Cybersecurity

    The US-China Trade War Will Revive Corporate Espionage Attacks Around The World
    November 5, 2018 | Amy DeMartine, Jeff Pollard, Heidi Shey

    The race to improve customer engagement compels companies to collect volumes of personal data, and this puts enormous pressure on security teams to protect customers from fraud, privacy abuses, and...

  • Report Now Tech: Container Security, Q4 2018

    Forrester's Overview Of 24 Container Security Providers
    October 3, 2018 | Amy DeMartine

    You can use container security tools to secure critical applications, speed development efforts, and tamperproof your containers. But to access these benefits, you'll first have to select from a...

  • Report Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses

    Intermediate Level: Technology Practices For Cybersecurity And Privacy

    CIOs and technology leaders in the intermediate phase of the journey to cybersecurity and privacy maturity must ensure that security travels with the data and position data security and privacy as...

  • Report Drive Growth With Customer Trust And Build Brand Resilience

    Advanced Level: Technology Practices For Cybersecurity And Privacy

    When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report...

  • Report Lay Your Security Tech Foundation

    Beginner Level: Technology Practices For Cybersecurity And Privacy

    This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to move...

  • Report The Forrester New Wave™: Bot Management, Q3 2018

    The 12 Providers That Matter Most And How They Stack Up
    September 20, 2018 | Amy DeMartine

    In Forrester's evaluation of the emerging bot management market, we identified the 12 most significant providers — Akamai Technologies, Alibaba Cloud, Cloudflare, DataDome, Distil Networks, Oracle...

  • Report Stop Bad Bots From Killing Customer Experience

    Strengthen Engagement And Budget By Securing Web Traffic
    September 6, 2018 | Amy DeMartine, Joseph Blankenship, Susan Bidel

    Automated internet traffic is on the rise, largely due to software programs called bots. Although some bots facilitate data sharing and customer engagement, many are tools that malicious attackers...

  • Report New Tech: Bot Management, Q3 2018

    Forrester's Landscape Overview Of 19 Providers
    September 6, 2018 | Amy DeMartine

    Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated,...

  • Report The Forrester Wave™: Web Application Firewalls, Q2 2018

    The 10 Vendors That Matter Most And How They Stack Up
    June 25, 2018 | Amy DeMartine

    In our 33-criteria evaluation of web application firewall (WAF) vendors, we identified the 10 most significant ones — Akamai Technologies, Amazon Web Services, Barracuda Networks, Cloudflare, F5...

  • Report IAM For Intelligent Agents

    Intelligent Agents Will Require Continuous Authentication And Authorization To Protect Customers, Data, And Privileged Systems

    Proper identity and access management (IAM) for intelligent agents (IAs) that covers virtual assistants such as Alexa, Cortana, Google Assistant, and Siri reduces the likelihood of fraud, identity...