503 results in Everything
 
Sort by:
Refine
  • Secure customers, protect the brand

Search Results

  • Report Best Practices: Customer Call Center Authentication

    Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
    March 22, 2019 | Andras Cser, Merritt Maxim

    Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...

  • Report Top Research For CIOs: Security

    Realize The Value That Excellent Security Delivers
    March 15, 2019 | Matthew Guarini

    Security no longer lives exclusively in the IT department. Now, thanks to ever-escalating attacks, boards and C-suites have become all too familiar with the risks of breaches, and they demand...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Build A Road Map For Personal Identity And Data Management

    March 8, 2019 | Fatemeh Khatibloo

    The era of personal identity and data management (PIDM) is here, spurred by increasingly privacy-aware consumers, new privacy regulations, and a crop of Silicon Valley advocates for data ethics. To...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

  • Report How Insiders Use The Dark Web To Sell Your Data

    Financial Services Firms Need To Prioritize Monitoring For Insider Threats
    February 28, 2019 | Joseph Blankenship

    Financial gain is one of the primary reasons malicious insiders steal valuable data or sell access to sensitive systems. The internet connects buyers and sellers of sensitive data, making it easy...

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Webinar Digital Transformation Snakes And Ladders

    February 26, 2019 | Nigel Fenwick

    Digital business transformation is hard. Many efforts fail to deliver. Yet firms will invest billions of dollars into business transformations around the world in 2019. Are there tactics you...

  • Webinar The State Of Unified Endpoint Management: Insights From The Forrester Wave™

    February 26, 2019 | Andrew Hewitt

    Providing a great technology experience for employees requires anytime, anywhere access to task-critical information on whatever device or application they prefer. But how do you ensure a...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report The Global Tech Market Outlook For 2019 To 2020

    Tougher Times Are Ahead As We Move Away From 2018's Peak Growth Rates
    February 11, 2019 | Andrew Bartels

    When CIOs look back in five years, they will probably mark 2018 as the best year for tech budgets over that period. To help CIOs navigate these shifting tech waters and prepare for tougher times,...

  • Report Tackle The California Consumer Privacy Act Now

    Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
    February 8, 2019 | Enza Iannopollo

    In less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...

  • Report Widen Your Risk Taxonomy To Remove Blind Spots

    Landscape: The Governance, Risk, And Compliance Playbook
    February 8, 2019 | Renee Murphy

    The way enterprises categorize risk has important implications for how they assess, measure, and treat it. Antiquated categories of risk — such as legal, operational, financial, and strategic — may...

  • Webinar Customer Call Centers: Dos And Don'ts

    February 7, 2019 | Andras Cser

    When we have the online channels (e.g., web, mobile app, etc.) all secured, fraudsters turn to the customer call center as an avenue to commit fraud. This webinar explains key types of fraud, best...

  • Report 2019 US Tech Budgets: Industry Outlook

    CIOs Should Make Their 2019 Plans With A Solid Understanding Of What's Going On In Their Industry
    February 6, 2019 | Andrew Bartels

    The US tech budget outlook for 2019 is generally positive, with projected growth of 6.1% only slightly slower than its 2018 growth. But in that broad picture, different industries will face very...

  • Report The ROI Of Privacy

    Business Case: The Customer Trust And Privacy Playbook
    February 5, 2019 | Fatemeh Khatibloo, Reggie Lau

    Organizations have traditionally focused investment and resources on preventing data breaches, but consumers are growing more aware of privacy breaches and creepy experiences. B2C marketers must...

  • Report Build Your Security Organization

    Organization: The S&R Practice Playbook
    January 31, 2019 | Jeff Pollard, Paul McKay

    CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. This report examines key organizational challenges...

  • Report Use Advanced Encryption For Data Security

    January 30, 2019 | Chase Cunningham

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders...

  • Webinar Data Privacy Day 2019: Forrester's Predictions For Marketing Privacy And Data Ethics

    January 28, 2019 | Fatemeh Khatibloo

    While 2018 was a major year for the marketing-privacy ecosystem, 2019 will bring even more disruption. Consumers will take the lead on enforcing privacy changes, with regulators no longer being the...

  • Report GRC Vision, 2019 To 2024

    Vision: The Governance, Risk, And Compliance Playbook
    January 25, 2019 | Renee Murphy, Christopher McClean

    Risk management professionals are used to helping steer their organizations through uncertainty, and as fast as business and technology are advancing, they should be looking five years into the...

  • Report Elevate Cybersecurity And Privacy Oversight

    Intermediate Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Paul McKay, Renee Murphy, Nick Hayes

    Firms with intermediate cybersecurity and privacy oversight have a solid foundation and are seeking to extend their influence in the organization. By strengthening strategy, governance, adherence...

  • Report The Future Of Endpoint Protection, 2019 To 2024

    Endpoint Security Will Focus On Apps' And Users' Behavior
    January 24, 2019 | Chris Sherman

    Security leaders have struggled for the past 20 years to balance effective endpoint security with good employee experience, and this challenge will only get tougher as attacks and technologies...

  • Report Now Tech: Software Composition Analysis, Q1 2019

    Forrester's Overview Of 17 Software Composition Analysis Providers
    January 24, 2019 | Amy DeMartine

    You can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development life cycle (SDLC). But to...

  • Webinar Can You Hear Me Now? It's Time For Brands To Cross The Voice Frontier

    January 23, 2019 | Dipanjan Chatterjee

    Voice is poised to bring about a massive pivot in the digital transformation of brands. Just as brands got used to consumers experiencing them by furiously tapping and poking at their devices, we...

  • Report The State Of Endpoint Security, 2019

    Buyers Demand Better Product Efficacy And Integrated Data Security
    January 22, 2019 | Chris Sherman, Salvatore Schiano

    Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns to help security...

Content Type

Apply

Filters

Region

Vendor