59 results in Everything
 
Sort by:
Refine
  • Secure customers, protect the brand
  • Application Security

Search Results

  • Webinar Secure What You Sell: Director's Cut

    Tuesday, October 29, 2019, 11:00 a.m.-12:00 p.m. Eastern time (15:00-16:00 GMT) | Amy DeMartine, Jeff Pollard

    Securing the products and services their companies sell offers a mechanism for CISOs to contribute to their firms' goals. This webinar helps CISOs understand the world of product security and how...

  • Report Secure What You Sell: CISOs Must Tackle Product Security To Protect Customers

    October 8, 2019 | Jeff Pollard, Amy DeMartine

    Today's mature enterprise security programs excel at securing infrastructure. Product security is different; it begins with minimum viable security during early-stage development and must extend to...

  • Report Gauge Your Data Security And Privacy Maturity

    Assessment: The Data Security And Privacy Playbook
    September 27, 2019 | Enza Iannopollo, Heidi Shey

    To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost, to one that champions privacy and uses its technology...

  • Forum Security & Risk 2019

    A New Hope
    September 12, 2019 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...

  • Report Forrester Infographic: Build A Better Bot Management Program

    Create A Single Team Now To Battle Bad Bots
    July 8, 2019 | Amy DeMartine

    Internet traffic contains a worrying amount of bad bot traffic. Organizations need to do a much better job of combating them or suffer their scraping, fraud, inventory hoarding, credential...

  • Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    June 26, 2019 | Andras Cser, Merritt Maxim

    Identity and access management (IAM) capabilities are critical in the fight to protect customers from account takeover, identity theft, and privacy abuses. Business leaders, CIOs, and CISOs use IAM...

  • Report Hybrid Cloud Security Best Practices

    Focus On The Five C's: Console, Configuration, Connectivity, Cloud Data, And Containers
    June 20, 2019 | Andras Cser

    Hybrid cloud security is a must for firms moving their critical data from on-premises to cloud workloads. This report, based on a small, 20-respondent panel survey, looks at cloud security best...

  • Webinar Protect Against Bad Bots That Are Trying To Kill Your Customer Experience

    June 18, 2019 | Amy DeMartine

    You may have heard about chatbots, but did you know that 38% of internet traffic comes from automated programs called bots and more than half of this is malicious? These bots are simple programs...

  • Report The Forrester Wave™: Identity-As-A-Service (IDaaS) For Enterprise, Q2 2019

    Tools And Technology: The Identity And Access Management Playbook
    June 12, 2019 | Andras Cser, Merritt Maxim

    In our 37-criterion evaluation of providers of identity-as-a-service (IDaaS) for enterprise, we identified the 10 most significant ones — Google, IBM, Idaptive, Microsoft, Okta, OneLogin, OpenText,...

  • Report The Forrester Wave™: Software Composition Analysis, Q2 2019

    The 10 Providers That Matter Most And How They Stack Up
    April 8, 2019 | Amy DeMartine

    In our 33-criterion evaluation of software composition analysis providers, we identified the 10 most significant ones — Flexera, FOSSA, GitLab, JFrog, Snyk, Sonatype, Synopsys, Veracode, WhiteHat...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Report Now Tech: Software Composition Analysis, Q1 2019

    Forrester's Overview Of 17 Software Composition Analysis Providers
    January 24, 2019 | Amy DeMartine

    You can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development life cycle (SDLC). But to...

  • Report Predictions 2019: Cybersecurity

    The US-China Trade War Will Revive Corporate Espionage Attacks Around The World
    November 5, 2018 | Amy DeMartine, Jeff Pollard, Heidi Shey

    The race to improve customer engagement compels companies to collect volumes of personal data, and this puts enormous pressure on security teams to protect customers from fraud, privacy abuses, and...

  • Report Now Tech: Container Security, Q4 2018

    Forrester's Overview Of 24 Container Security Providers
    October 3, 2018 | Amy DeMartine

    You can use container security tools to secure critical applications, speed development efforts, and tamperproof your containers. But to access these benefits, you'll first have to select from a...

  • Report The Forrester New Wave™: Bot Management, Q3 2018

    The 12 Providers That Matter Most And How They Stack Up
    September 20, 2018 | Amy DeMartine

    In Forrester's evaluation of the emerging bot management market, we identified the 12 most significant providers — Akamai Technologies, Alibaba Cloud, Cloudflare, DataDome, Distil Networks, Oracle...

  • Report Stop Bad Bots From Killing Customer Experience

    Strengthen Engagement And Budget By Securing Web Traffic
    September 6, 2018 | Amy DeMartine, Joseph Blankenship, Susan Bidel

    Automated internet traffic is on the rise, largely due to software programs called bots. Although some bots facilitate data sharing and customer engagement, many are tools that malicious attackers...

  • Report New Tech: Bot Management, Q3 2018

    Forrester's Landscape Overview Of 19 Providers
    September 6, 2018 | Amy DeMartine

    Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated,...

  • Report The Forrester Wave™: Web Application Firewalls, Q2 2018

    The 10 Vendors That Matter Most And How They Stack Up
    June 25, 2018 | Amy DeMartine

    In our 33-criteria evaluation of web application firewall (WAF) vendors, we identified the 10 most significant ones — Akamai Technologies, Amazon Web Services, Barracuda Networks, Cloudflare, F5...