33 results in Reports
 
Sort by:
Refine
  • Security & Risk
  • Data Security

Featured content

ForresterNow

FORRESTERNOW

As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report Cybersecurity Risk Ratings Market Outlook, 2020 And Beyond

    CISO Trust And Transparency Issues Drive Market Consolidation And Exits
    March 16, 2020 | Paul McKay

    Cybersecurity risk ratings vendors leverage externally available data about a firm to rate its cybersecurity posture. These vendors have now become mainstream despite customers, suppliers, and...

  • Report The State Of Data Security And Privacy, 2020

    Benchmarks: The Data Security And Privacy Playbook
    February 27, 2020 | Heidi Shey

    This data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...

  • Report Shift From Privacy Readiness To Sustained Compliance

    Roadmap: The Data Security And Privacy Playbook
    February 6, 2020 | Enza Iannopollo

    New privacy rules are popping up all over the world. Increasingly, security and risk (S&R) and privacy professionals believe that maintaining compliance with global privacy regulations is one of...

  • Report Top Cybersecurity Threats In 2020

    Landscape: The Zero Trust Security Playbook
    January 24, 2020 | Josh Zelonis, Sandy Carielli

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...

  • Report Prepare For Decentralized Digital Identity: Security SWOT

    Benefits Of Privacy And Centralization Get Hampered By Lack Of Trust, Early Fragmentation, And Growing Pains Of Wallet Management
    January 21, 2020 | Andras Cser, Sean Ryan

    Decentralized digital identity (DDID) is not just a technology buzzword: It promises a complete restructuring of the currently centralized physical and digital identity ecosystem into a...

  • Report How To Manage Brexit's Impact: CISO Edition

    Focus On Data Protection, Staffing, And Regulatory Alignment
    December 12, 2019 | Paul McKay, Enza Iannopollo

    While the recent UK general election has provided certainty that the first stage of Brexit will happen on January 31, the certainty only persists until the end of 2020. It's still possible that a...

  • Report Forrester's 2019 Consumer Privacy Segmentation: Europe

    Understand Consumer Privacy Preferences And Behaviors To Improve Engagement, Trust, And Experience
    November 13, 2019 | Enza Iannopollo

    In this report, we explain how privacy professionals can apply Forrester's Consumer Privacy Segmentation to understand how privacy perspectives vary by geography across Europe. Armed with this...

  • Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Vision: The Data Security And Privacy Playbook
    October 16, 2019 | Heidi Shey, Enza Iannopollo

    Data is the lifeblood of digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every security and privacy leader. Security and privacy pros must ensure that...

  • Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Zero Trust Security Playbook
    September 25, 2019 | Chase Cunningham, David Holmes, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...

  • Report Now Tech: eDiscovery Service Providers, Q3 2019

    Forrester's Overview Of 35 eDiscovery Service Providers
    September 4, 2019 | Heidi Shey

    You can use eDiscovery service providers to boost expertise, speed, and scale of eDiscovery-related operations, benefit from best-fit technologies for your requirements, and optimize overall...

  • Report Gauge Your Information Security Maturity

    Assessment: The S&R Practice Playbook
    September 4, 2019 | Renee Murphy

    Information security is a complex discipline, and CISOs are responsible for compiling a vast array of controls and standards to plot a road map for improvements. However, CISOs can't determine a...

  • Report The Top Security Technology Trends To Watch, 2019

    Eight Security And Risk Technologies Will Disrupt Security And Risk Practices

    Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...

  • Report Cybersecurity Risk Ratings Enhance Third-Party Risk Management

    Rating Solutions Help Accelerate Third-Party Security Assurance But Can't Replace Essential Processes
    July 25, 2019 | Paul McKay, Trevor Lyness

    Cybersecurity risk rating solutions are a valuable tool for third-party risk management (TPRM), but both the technology and the way customers use it are still maturing. Security and risk leaders...

  • Report The Top Trends Shaping Privacy In 2019

    A Forrester Guide To The Macro Trends And Key Takeaways From The IAPP Global Privacy Summit 2019
    July 10, 2019 | Enza Iannopollo, Heidi Shey

    May 2019 was a significant month in the privacy field: It was not only the first anniversary of GDPR, but thousands of privacy professionals also gathered in Washington, D.C. for the International...

  • Report The US Healthcare Security Benchmark, 2018 To 2019

    Healthcare Pros Must Spend Wisely To Counter Increasing Complexity

    In the past, IT security teams within US healthcare providers had much smaller budgets than those within other industries. This is no longer the case, as budget increases in healthcare have come as...

  • Report Forrester's Global Map Of Privacy Rights And Regulations, 2019

    Landscape: The Data Security And Privacy Playbook

    S&R pros rate compliance with global privacy regulations a top challenge. To help, we created an interactive global map of privacy rights and regulations, which explains the data protection...

  • Report Hybrid Cloud Security Best Practices

    Focus On The Five C's: Console, Configuration, Connectivity, Cloud Data, And Containers
    June 20, 2019 | Andras Cser

    Hybrid cloud security is a must for firms moving their critical data from on-premises to cloud workloads. This report, based on a small, 20-respondent panel survey, looks at cloud security best...

  • Report The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019

    The 13 Providers That Matter Most And How They Stack Up
    June 10, 2019 | Heidi Shey

    In our 25-criterion evaluation of data security portfolio providers, we identified the 13 most significant ones — Dell, Digital Guardian, Forcepoint, Google, GTB Technologies, IBM, Imperva, McAfee,...

  • Report Quick Take: Australia's PayID Breach Demonstrates The Importance Of Customer Trust

    June 6, 2019 | Jinan Budge, Zhi-Ying Barry

    This week, a security breach involving the PayID service of Australia's New Payments Platform (NPP) came to light — an incident affecting tens of thousands of bank customers. Malicious actors used...

  • Report Protect Your Intellectual Property And Customer Data From Theft And Abuse

    Executive Overview: The Data Security And Privacy Playbook
    April 16, 2019 | Stephanie Balaouras

    Data is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, and privacy...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Now Tech: Payment Tokenization, Q1 2019

    Forrester's Overview Of 21 Payment Tokenization Providers
    March 7, 2019 | Andras Cser

    You can use payment tokenization (PT) solutions to: 1) reduce the risk of fraud from stolen personal account numbers (PANs); 2) reduce the scope of PCI DSS compliance and audits; and 3) increase...

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report Use Advanced Encryption For Data Security

    January 30, 2019 | Chase Cunningham

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders...

  • Report Now Tech: Data Loss Prevention, Q1 2019

    Forrester's Overview Of 37 Data Loss Prevention (DLP) Providers
    January 18, 2019 | Heidi Shey

    You can use data loss prevention (DLP) capabilities to support compliance, protect intellectual property, and augment employee security awareness. But to access these benefits, you'll first have to...