Charts & Figures
-
Enterprise Security Analytics Implementation
September 21, 2018
-
Evaluated Vendors And Product Information
September 21, 2018
-
Forrester Wave™: Security Analytics Platforms Scorecard, Q3 2018
September 21, 2018
Search Results
-
Report Now Tech: Antiphishing Solutions, Q1 2019
Processes: The Security Architecture And Operations Playbook
You can use antiphishing solutions to detect and block malicious emails, protect against impersonation attacks, and educate employees with training and phishing simulations. But to access these...
-
Webinar Beware Of And Prepare For The Coming Data Integrity Crisis
Companies increasingly rely on data and automated decision making to transform their business. This, however, means that the impact of a data integrity attack – where an attacker alters...
-
Report The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q1 2019
Tools And Technology: The Security Architecture And Operations Playbook
Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm's brand. To accelerate their performance in threat detection and...
-
Blog Phishing: The Simple Attack That Shreds The Defenses Of Sensitive Networks
December 20, 2018 | Joseph BlankenshipDiplomatic networks carry some of the world’s most sensitive information: communications between world leaders, key technical intellectual property, trade strategies, and military plans. A recent...
-
Report Beware The Coming Data Integrity Crisis
Data Tampering Will Threaten Your Digital Transformation
Insights-driven businesses are growing at eight times the rate of global GDP and will earn more than $1.8 trillion by 2021. As organizations rush to capitalize on the value of data, security...
-
Report The Forrester Wave™: Security Analytics Platforms, Q3 2018
The 13 Providers That Matter Most And How They Stack Up
September 21, 2018 | Joseph BlankenshipIn our 30-criteria evaluation of security analytics platforms providers, we identified the 13 most significant ones — AlienVault, Exabeam, Fortinet, Gurucul, Huntsman Security, IBM, LogRhythm,...
-
Report Stop Bad Bots From Killing Customer Experience
Strengthen Engagement And Budget By Securing Web Traffic
Automated internet traffic is on the rise, largely due to software programs called bots. Although some bots facilitate data sharing and customer engagement, many are tools that malicious attackers...
-
Blog Insider Threat Has Undergone A Digital Transformation
July 31, 2018 | Joseph BlankenshipBefore the internet gave us ubiquitous connectivity, selling secrets was hard. Finding buyers and sellers required research, relationship building, and connection in person or by phone. Exchanging...
-
Report Defend Your Data As Insiders Monetize Their Access
July 30, 2018 | Joseph BlankenshipFinancial gain is one of the primary reasons malicious insiders steal valuable data or sell access to sensitive systems. The internet connects buyers and sellers of sensitive data, making it easy...
-
Report The Forrester Tech Tide™: Zero Trust Threat Prevention, Q3 2018
25 Technologies Underpin Zero Trust Threat Prevention
Zero Trust (ZT) threat prevention is increasingly critical to deny malicious attackers' access to enterprise assets. To accelerate their performance in ZT threat prevention, companies are...
-
Report Now Tech: Security Automation And Orchestration (SAO), Q3 2018
Forrester's Overview Of 17 SAO Providers
July 5, 2018 | Joseph BlankenshipYou can use security automation and orchestration (SAO) to increase analyst capacity, shorten incident response times, and integrate disparate security technologies. But to access these benefits,...
-
Report Reduce Risk And Improve Security Through Infrastructure Automation
The Bad Guys Use Automation — Fight Fire With Fire
Today's security initiatives are impossible to execute manually. As infrastructure-as-code (IaC), edge computing, and internet-of-things (IoT) solutions proliferate, organizations must leverage...
-
Blog Tesla Sabotage: A Perfect Storm For Insider Threat
June 20, 2018 | Joseph BlankenshipLast Sunday, Tesla CEO Elon Musk sent an all-employee email to Tesla employees revealing that the company was the victim of insider sabotage. Musk indicated that the saboteur made changes to...
-
Report Now Tech: DDoS Mitigation Solutions, Q2 2018
Forrester's Overview Of 21 DDoS Migration Solutions
April 27, 2018 | Joseph BlankenshipYou can use DDoS mitigation solutions to ensure the availability of mission-critical services, preserve brand reputation, and maintain customers' experience with your digital assets. But to access...
-
Report CISOs, Get Ready To Pay More As Tech Titans Enter The Security Market
Alphabet, Amazon, And Microsoft Seek To Remake The Cybersecurity Landscape
Three tech giants are rushing in to disrupt the cybersecurity market the same way they disrupted retail, computing, and advertising. When computing was on-premises or in client-owned data centers,...
-
Report Protecting Industrial Control Systems And Critical Infrastructure From Attack
Increasing Threats And Devastating Consequences Require A Zero Trust Security Approach
Much of today's industrial control systems (ICSs), including those in critical infrastructure industries like energy and utilities, consist of outdated technology connected to IT networks and...
-
Report Using AI For Evil
A Guide To How Cybercriminals Will Weaponize And Exploit AI To Attack Your Business
The tools of artificial intelligence (AI), from text analytics to facial recognition to machine learning (ML) platforms, are transforming almost every aspect of business from personalized customer...
-
Report Protect Your Business From Parasitic Cryptomining
The Cryptocurrency Gold Rush Is Fueling New Cybercrime And Enterprise Risk
Cryptocurrency values have soared to astronomical, unsustainable, gold-rush levels, and like any gold rush, this one has attracted its share of bad actors and parasites. Cryptomining — adding...
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q4 2017
The 11 Providers That Matter Most And How They Stack Up
December 7, 2017 | Joseph BlankenshipIn our 36-criteria evaluation of DDoS mitigation providers, we identified 11 of the most significant ones — Akamai Technologies, Arbor Networks, Cloudflare, F5 Networks, Fortinet, Huawei...
-
Report Predictions 2018: Automation Alters The Global Workforce
Ten Key Developments In Automation Reshape The Industry In 2018
Automation has been one of the most profound and disruptive forces in human history. The market for automation in many forms will accelerate faster in 2018 as firms look to squeeze performance and...
-
Report Predictions 2018: Cybersecurity
In 2018, consumers and businesses will face challenges brought on by four primary forces: 1) rising tensions in international relations; 2) ubiquitous connectivity; 3) digital transformation...
-
Report Best Practices: Mitigating Insider Threats
Defend Your Organization Against The Threats Insiders Pose
Whether accidental or malicious, insider threat incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros...
-
Report Artificial Intelligence Will Revolutionize Cybersecurity
But Security Leaders Must View All Vendor Claims With Skepticism
Security vendors are inundating CISOs with products purporting to use artificial intelligence to dramatically improve the accuracy and speed of both threat detection and response. However, much of...
-
Report Assess Your Exposure To Geopolitical Cyber Risk
How To Identify The Impacts Of Geopolitical Dynamics Across Your Organization
Geopolitical tensions around the world are spawning nearly constant cyberattacks on unprepared private sector firms. These cyberattacks result in millions of dollars in lost customer trust, as well...
-
Report The Top Security Technology Trends To Watch, 2017
Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...
- 1
- 2