582 results in Everything
 
Sort by:
Refine
  • Secure customers, protect the brand

Search Results

  • Webinar European Security Market Trends In 2019

    May 7, 2019 | Paul McKay

    Security leaders in Europe aren’t just grappling with the constantly changing security threat landscape. Budgetary pressures are starting to bite as economic growth slows down. CISOs will...

  • Report The Forrester Wave™: Global Cybersecurity Consulting Providers, Q2 2019

    Tools And Technology: The S&R Practice Playbook
    May 1, 2019 | Jeff Pollard, Claire O'Malley

    In our 23-criterion evaluation of global cybersecurity consulting providers, we identified the 14 most significant ones — Accenture, BAE Systems, Booz Allen Hamilton, Crowe, Deloitte, EY, IBM,...

  • Report Protect Your Firm From Drones

    Security And Risk Pros Must Prepare Their Business For The Security, Privacy, And Compliance Risks of Drone Technology
    April 19, 2019 | Merritt Maxim, Salvatore Schiano

    Drones are no longer just airborne toys for amateur hobbyists. Organizations increasingly deploy drones in a wide range of applications, from agriculture, to maintenance and inspection, to law...

  • Report The Digital Risk Protection Market In 2019

    The First Cyber Intelligence Capability You Should Invest In
    April 19, 2019 | Josh Zelonis, Trevor Lyness

    This report is a deep dive into the digital risk protection market. We review where we see the market evolving as well as the different types of buyers and use cases for digital risk protection...

  • Report How To Implement Zero Trust Security In Europe

    Large technology companies and the US Federal Government have adopted Zero Trust (ZT) as their next-generation security model. 2019 is the year that Zero Trust hits the mainstream in Europe....

  • Report Protect Your Intellectual Property And Customer Data From Theft And Abuse

    Executive Overview: The Data Security And Privacy Playbook
    April 16, 2019 | Stephanie Balaouras

    Data is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, and privacy...

  • Report Avoid Corporate Scandal Caused By The Surveillance Economy

    A Guide For CISOs To Stop Unethical Surveillance Tactics Before They Start
    April 12, 2019 | Jeff Pollard, Claire O'Malley

    Welcome to the era of widespread personal surveillance. Organizations have joined the government in collecting, analyzing, and storing oceans of personal data. The private sector is fully engaged...

  • Report The Forrester Wave™: Software Composition Analysis, Q2 2019

    The 10 Providers That Matter Most And How They Stack Up
    April 8, 2019 | Amy DeMartine

    In our 33-criterion evaluation of software composition analysis providers, we identified the 10 most significant ones — Flexera, FOSSA, GitLab, JFrog, Snyk, Sonatype, Synopsys, Veracode, WhiteHat...

  • Webinar Get Control Over Your Bots With Forrester’s Automation Framework

    April 3, 2019 | Chris Gardner, Craig Le Clair

    Every organization has automation, and its impact on winning, serving, and retaining customers is unquestionable. However, it can be difficult to align islands of automation and rationalize your...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report Best Practices: Customer Call Center Authentication

    Prioritize Implicit Biometrics And Phone Reputation To Reduce Customer And Agent Friction
    March 22, 2019 | Andras Cser, Merritt Maxim

    Customer call center authentication (CCCA) combines human and machine processes, tools, and technologies. The call center is invariably the channel of last resort for customers looking to get...

  • Report Top Research For CIOs: Security

    Realize The Value That Excellent Security Delivers
    March 15, 2019 | Matthew Guarini

    Security no longer lives exclusively in the IT department. Now, thanks to ever-escalating attacks, boards and C-suites have become all too familiar with the risks of breaches, and they demand...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Build A Road Map For Personal Identity And Data Management

    March 8, 2019 | Fatemeh Khatibloo

    The era of personal identity and data management (PIDM) is here, spurred by increasingly privacy-aware consumers, new privacy regulations, and a crop of Silicon Valley advocates for data ethics. To...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

  • Report How Insiders Use The Dark Web To Sell Your Data

    Financial Services Firms Need To Prioritize Monitoring For Insider Threats
    February 28, 2019 | Joseph Blankenship

    Financial gain is one of the primary reasons malicious insiders steal valuable data or sell access to sensitive systems. The internet connects buyers and sellers of sensitive data, making it easy...

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Webinar Digital Transformation Snakes And Ladders

    February 26, 2019 | Nigel Fenwick

    Digital business transformation is hard. Many efforts fail to deliver. Yet firms will invest billions of dollars into business transformations around the world in 2019. Are there tactics you...

  • Webinar The State Of Unified Endpoint Management: Insights From The Forrester Wave™

    February 26, 2019 | Andrew Hewitt

    Providing a great technology experience for employees requires anytime, anywhere access to task-critical information on whatever device or application they prefer. But how do you ensure a...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report The Global Tech Market Outlook For 2019 To 2020

    Tougher Times Are Ahead As We Move Away From 2018's Peak Growth Rates
    February 11, 2019 | Andrew Bartels

    When CIOs look back in five years, they will probably mark 2018 as the best year for tech budgets over that period. To help CIOs navigate these shifting tech waters and prepare for tougher times,...

  • Report Tackle The California Consumer Privacy Act Now

    Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
    February 8, 2019 | Enza Iannopollo

    In less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...

  • Report Widen Your Risk Taxonomy To Remove Blind Spots

    Landscape: The Governance, Risk, And Compliance Playbook
    February 8, 2019 | Renee Murphy

    The way enterprises categorize risk has important implications for how they assess, measure, and treat it. Antiquated categories of risk — such as legal, operational, financial, and strategic — may...

  • Webinar Customer Call Centers: Dos And Don'ts

    February 7, 2019 | Andras Cser

    When we have the online channels (e.g., web, mobile app, etc.) all secured, fraudsters turn to the customer call center as an avenue to commit fraud. This webinar explains key types of fraud, best...

  • Report 2019 US Tech Budgets: Industry Outlook

    CIOs Should Make Their 2019 Plans With A Solid Understanding Of What's Going On In Their Industry
    February 6, 2019 | Andrew Bartels

    The US tech budget outlook for 2019 is generally positive, with projected growth of 6.1% only slightly slower than its 2018 growth. But in that broad picture, different industries will face very...

Content Type

Apply

Filters

Region

Vendor