Skip to main content
52 results in Everything
 
Sort by:
Refine
  • Transform IT to win, serve, and retain customers
  • Security Operations & Program Governance

Featured content

The Zero Trust Security Playbook For 2020

Defend Your Digital Business From Advanced Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, organized, well-funded cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • Report Job Description: Director Of Threat Intelligence

    The Infosec Renaissance Pro
    July 13, 2020 | Brian Kime

    Security and risk (S&R) professionals frequently struggle to maximize the value of their investments in threat intelligence solutions. Improperly treating threat intelligence as a technical control...

  • Report Enhance EX With Zero Trust

    Business Case: The Zero Trust Security Playbook
    July 13, 2020 | Andrew Hewitt, David Holmes

    Forrester's Zero Trust (ZT) framework is the modern security architecture blueprint for enterprises. Fundamentally, ZT is about moving away from traditional perimeter-based security approaches and...

  • Report Sell Your Zero Trust Strategy Internally

    Gain Advocacy, Support, And Budget For Your Security Vision
    June 23, 2020 | Jinan Budge, Chase Cunningham

    Security and risk (S&R) professionals often struggle to obtain buy-in or support from the many stakeholders who will be affected by Zero Trust (ZT) implementations. This report shows S&R leaders...

  • Report Bust The Zero Trust Myths

    Prioritize Zero Trust Concerns, Because Your Stakeholders Can Make Or Break Your Strategy
    June 22, 2020 | Jinan Budge, Chase Cunningham

    Zero Trust (ZT) is prone to misconceptions. IT and business leaders often think that ZT is too hard, too expensive, and requires them to restructure everything they've built or deploy...

  • Report Microservice Application Platforms Need A New Type Of Reference Architecture

    The Unique Needs Of Each Business Domain Call For Custom Cloud-Native Application Platforms
    March 6, 2020 | Randy Heffner

    In these early days for microservices, it's clear that they face a long road to maturity: Only 13% of microservices users say they have production-proven platforms. Enterprises need microservice...

  • Report The Forrester Wave™: Security Awareness And Training Solutions, Q1 2020

    The 12 Providers That Matter Most And How They Stack Up
    February 25, 2020 | Jinan Budge, Claire O'Malley

    In our 23-criterion evaluation of security awareness and training (SA&T) providers, we identified the 12 most significant ones — Cofense, CybSafe, Elevate Security, Infosec, Inspired eLearning,...

  • Report Build A Security Champions Network

    How To Integrate Security Culture Across Your Organization
    February 12, 2020 | Jinan Budge, Claire O'Malley

    Building a security culture up, down, and across the organization and engaging the multitudes of stakeholders is neither a simple task nor one that can easily be completed in the short term. This...

  • Report Plan Your Microservice Application Platforms Using A New Structure For A New Era

    Java Is A Useful Point Of Contrast For Future Cloud-Native Application Platforms
    February 11, 2020 | Randy Heffner

    While enterprise developers increasingly adopt microservices, maturity will be a long time in coming. For mainstream developers to build high-end solutions with microservices, enterprises need...

  • Report A CISO's Guide To Successfully Leading Change

    How To Build Support, Manage Detractors, And Navigate Politics
    January 9, 2020 | Jinan Budge

    Cybersecurity is getting ever more scrutiny from boards, execs, and customers. Many CISOs need to launch large change programs to transform their cybersecurity capabilities amidst unprecedented...

  • Report Research Overview: Security Awareness, Behavior, And Culture

    A CISO's Guide To Research About The People Side Of Security
    October 30, 2019 | Jinan Budge

    The people element of security has long sat on the back burner as security and risk (S&R) pros buy product after product without first solving fundamental problems. People and culture are central...

  • Report With Microservices, A Service Mesh Helps Developers Focus On The Business

    Diverse Hybrid Microservice Patterns Will Drive Service Mesh Specialization
    October 24, 2019 | Randy Heffner

    Microservices provide application modularity and deployment flexibility, building agility for innovation and rapid response to digital disruption. But distributed systems are hard, and...

  • Report Four Technologies Combine To Protect You From Ransomware Attacks

    October 18, 2019 | Naveen Chhabra

    As the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware. Ransomware attacks do not...

  • Report Master Your Security Service Catalog

    Processes: The S&R Practice Playbook
    October 10, 2019 | Paul McKay

    CISOs are increasingly expected to show their peers in the executive suite how security aligns to business needs. But too many CISOs focus only on delivering technical controls, which results in a...

  • Report Security Budgets In Asia Pacific, 2019

    Budgets Are Rising As The Region Continues To Play Catch-Up
    July 15, 2019 | Jinan Budge

    In 2019, CISOs in Asia Pacific (AP) must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how security...

  • Report Executive Spotlight: Top Priorities For Security And Risk Leaders In 2019

    The Top Five Priorities That Security And Risk Leaders Are Focusing On
    June 7, 2019 | Jinan Budge

    Forrester's Security & Risk Council is comprised of some of the senior-most security and risk (S&R) executives at companies with $1 billion or more in revenue. Each year, we ask our members about...

  • Report New Tech: Industrial Control Systems (ICS) Security Solutions, Q1 2019

    Forrester's Landscape Overview Of 21 Providers
    February 28, 2019 | Merritt Maxim, Joseph Blankenship

    A new crop of industrial control systems (ICS) security technologies, and the solutions they power, stand poised to unleash new paradigms in protecting and securing high-value industrial systems,...

  • Report Design For Dependability By Embracing A Future Of Trusted Technology

    Reliable Services Are Critical For A Secure, Always-On Economy
    February 25, 2019 | Naveen Chhabra

    As the world evolves into a connected web of services that weave devices, users, and data in a seamless user experience, the megacloud providers have set expectations — for always-on capabilities,...

  • Report Now Tech: Managed Security Services In Asia Pacific, Q1 2019

    Forrester's Overview Of 19 Managed Security Service Providers
    January 16, 2019 | Jinan Budge

    You can use managed security services to rapidly transform your security operations, improve your talent diversity, increase your breadth of skills, and support your global business. But to access...