64 results in Reports
 
Sort by:
Refine
  • Security & Risk
  • Data & Information Protection

Search Results

  • Report Now Tech: eDiscovery Service Providers, Q3 2019

    Forrester's Overview Of 35 eDiscovery Service Providers
    September 4, 2019 | Heidi Shey

    You can use eDiscovery service providers to boost expertise, speed, and scale of eDiscovery-related operations, benefit from best-fit technologies for your requirements, and optimize overall...

  • Report Gauge Your Information Security Maturity

    Assessment: The S&R Practice Playbook
    September 4, 2019 | Renee Murphy

    Information security is a complex discipline, and CISOs are responsible for compiling a vast array of controls and standards to plot a road map for improvements. However, CISOs can't determine a...

  • Report The Top Security Technology Trends To Watch, 2019

    Eight Security And Risk Technologies Will Disrupt Security And Risk Practices

    Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...

  • Report Protect Whistleblowers For Business Success

    A Guide To Legitimizing And Safeguarding Corporate Whistleblowers In Today's Digital Workplace
    July 31, 2019 | Alla Valente

    Whistleblowers are an essential safety valve in ethical corporate culture. They provide a mechanism for healthy corporate governance by exposing fraud and corruption and, more recently, revealing...

  • Report Cybersecurity Risk Ratings Enhance Third-Party Risk Management

    Rating Solutions Help Accelerate Third-Party Security Assurance But Can't Replace Essential Processes
    July 25, 2019 | Paul McKay, Trevor Lyness

    Cybersecurity risk rating solutions are a valuable tool for third-party risk management (TPRM), but both the technology and the way customers use it are still maturing. Security and risk leaders...

  • Report The Forrester Tech Tide™: Data Security And Privacy, Q3 2019

    Tools And Technology: The Data Security And Privacy Playbook
    July 22, 2019 | Heidi Shey, Enza Iannopollo

    Data security and privacy is critical to firms' ability to win, serve, and retain their customers. To protect sensitive data, meet compliance, and continue to mature their practices for data...

  • Report Zero Trust For Compliance

    A Control Mapping Of The Zero Trust Framework To 12 Industry And Government Compliance Mandates

    Security and risk professionals who use Forrester's Zero Trust framework as the foundation for their security vision and architecture are able to meet compliance requirements with greater ease....

  • Report The Top Trends Shaping Privacy In 2019

    A Forrester Guide To The Macro Trends And Key Takeaways From The IAPP Global Privacy Summit 2019
    July 10, 2019 | Enza Iannopollo, Heidi Shey

    May 2019 was a significant month in the privacy field: It was not only the first anniversary of GDPR, but thousands of privacy professionals also gathered in Washington, D.C. for the International...

  • Report Make Your Digital Transformation An Ethical One

    An Ethical Transformation Series Report

    To close the gap between customer expectations and your current capabilities, your organization, like many others, is probably undergoing a digital transformation. This transformation is critical...

  • Report The US Healthcare Security Benchmark, 2018 To 2019

    Healthcare Pros Must Spend Wisely To Counter Increasing Complexity

    In the past, IT security teams within US healthcare providers had much smaller budgets than those within other industries. This is no longer the case, as budget increases in healthcare have come as...

  • Report Forrester's Global Map Of Privacy Rights And Regulations, 2019

    Landscape: The Data Security And Privacy Playbook

    S&R pros rate compliance with global privacy regulations a top challenge. To help, we created an interactive global map of privacy rights and regulations, which explains the data protection...

  • Report Hybrid Cloud Security Best Practices

    Focus On The Five C's: Console, Configuration, Connectivity, Cloud Data, And Containers
    June 20, 2019 | Andras Cser

    Hybrid cloud security is a must for firms moving their critical data from on-premises to cloud workloads. This report, based on a small, 20-respondent panel survey, looks at cloud security best...

  • Report The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019

    The 13 Providers That Matter Most And How They Stack Up
    June 10, 2019 | Heidi Shey

    In our 25-criterion evaluation of data security portfolio providers, we identified the 13 most significant ones — Dell, Digital Guardian, Forcepoint, Google, GTB Technologies, IBM, Imperva, McAfee,...

  • Report Quick Take: Australia's PayID Breach Demonstrates The Importance Of Customer Trust

    June 6, 2019 | Jinan Budge, Zhi-Ying Barry

    This week, a security breach involving the PayID service of Australia's New Payments Platform (NPP) came to light — an incident affecting tens of thousands of bank customers. Malicious actors used...

  • Report Best Practices: Medical Device Security

    Control Your Hospital's Expanding Device Risk Exposure

    Healthcare providers struggle to understand and mitigate medical device risk, particularly devices connected to the hospital network and directly involved in patient care. Meanwhile, patients...

  • Report The Forrester Wave™: Enterprise Email Security, Q2 2019

    The 12 Providers That Matter Most And How They Stack Up
    May 16, 2019 | Joseph Blankenship

    In our 32-criterion evaluation of enterprise email content security providers, we identified the 12 most significant ones — Barracuda, Cisco, Clearswift, Forcepoint, Microsoft, Mimecast,...

  • Report Improve Open Banking Customer Authentication Experiences With Biometrics

    Improving Payment Security Must Not Sacrifice Customer Experience
    May 10, 2019 | Paul McKay

    The introduction of the second Payment Services Directive (PSD2) on January 13, 2018 revolutionized the European financial services industry. In 2019, financial services professionals will focus on...

  • Report The Digital Risk Protection Market In 2019

    The First Cyber Intelligence Capability You Should Invest In
    April 19, 2019 | Josh Zelonis, Trevor Lyness

    This report is a deep dive into the digital risk protection market. We review where we see the market evolving as well as the different types of buyers and use cases for digital risk protection...

  • Report Protect Your Intellectual Property And Customer Data From Theft And Abuse

    Executive Overview: The Data Security And Privacy Playbook
    April 16, 2019 | Stephanie Balaouras

    Data is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, and privacy...

  • Report Avoid Corporate Scandal Caused By The Surveillance Economy

    A Guide For CISOs To Stop Unethical Surveillance Tactics Before They Start
    April 12, 2019 | Jeff Pollard, Claire O'Malley

    Welcome to the era of widespread personal surveillance. Organizations have joined the government in collecting, analyzing, and storing oceans of personal data. The private sector is fully engaged...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Now Tech: Payment Tokenization, Q1 2019

    Forrester's Overview Of 21 Payment Tokenization Providers
    March 7, 2019 | Andras Cser

    You can use payment tokenization (PT) solutions to: 1) reduce the risk of fraud from stolen personal account numbers (PANs); 2) reduce the scope of PCI DSS compliance and audits; and 3) increase...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report Tackle The California Consumer Privacy Act Now

    Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
    February 8, 2019 | Enza Iannopollo

    In less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...

  • Report Use Advanced Encryption For Data Security

    January 30, 2019 | Chase Cunningham

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders...

Content Type

Apply

Filters

Region

Vendor