18 results in Reports
 
Sort by:
Refine
  • Security & Risk
  • Business Technographics
  • Tech Sector Economics

Search Results

  • Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Zero Trust Security Playbook
    October 4, 2019 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it's the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • Report Best Practices: Medical Device Security

    Control Your Hospital's Expanding Device Risk Exposure

    Healthcare providers struggle to understand and mitigate medical device risk, particularly devices connected to the hospital network and directly involved in patient care. Meanwhile, patients...

  • Report Security Budgets 2019: The Year Of Services Arrives

    Benchmarks: The S&R Practice Playbook
    December 17, 2018 | Jeff Pollard

    This report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...

  • Report Maintain Your Security Edge

    Continuous Improvement: The Zero Trust Security Playbook
    December 6, 2018 | Heidi Shey, Jeff Pollard, Claire O'Malley

    New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...

  • Report The State Of Data Security And Privacy: 2018 To 2019

    Benchmarks: The Data Security And Privacy Playbook
    December 5, 2018 | Heidi Shey, Enza Iannopollo

    This data-driven report outlines budgeting and spending, technology adoption plans, and other key breach, data protection, and privacy trends in global firms for 2018 through 2019. Understanding...

  • Report Manage Third-Party Risk To Achieve And Maintain GDPR Compliance

    April 19, 2018 | Enza Iannopollo, Alexander Spiliotes

    It doesn't matter if third parties supply you with data, technology, or services: If they touch your customers' or employees' personal data, their security and privacy postures directly affect your...

  • Report Top Trends Shaping Identity Verification (IDV) In 2018

    Post-Equifax Breach, IDV Aggregators Will Cater To Multifaceted IDV Requirements
    March 29, 2018 | Andras Cser, Merritt Maxim

    In the face of increasing identity theft, stricter compliance regulations, and the push for online customer acquisition, reliable, accurate, cost-effective, and easy-to-use identity verification...

  • Report Use AI To Optimize Your IAM Initiatives

    Mitigate Identity Risks And Automate Processes With Emerging AI Models
    March 27, 2018 | Merritt Maxim, Andras Cser

    AI and machine learning (ML) are transforming many existing technologies and processes. Identity and access management (IAM) is no exception to this trend, with many incumbent IAM vendors and new...

  • Report Security Budgets 2018: Financial Services And Insurance

    New Initiatives Require Security To Take An Expertise-On-Demand Approach
    March 22, 2018 | Jeff Pollard

    Data breaches, regulation, stiff competition for talent, and decentralized technology spending are still major challenges for security leaders in the FSI industry. We compare the budgets of...

  • Report The State Of Endpoint Security, 2018

    New Threats Are Driving Technology Consolidation
    February 5, 2018 | Chris Sherman, Salvatore Schiano

    Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns, helping security...

  • Report The State Of GDPR Readiness

    GDPR Readiness Progresses, But Strategies Depend Too Heavily On IT
    January 31, 2018 | Enza Iannopollo

    With the deadline for GDPR compliance looming in May 2018, it's a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of...

  • Report The State Of Application Security, 2018

    Application Security Is Worsening, But Automation Offers Hope
    January 23, 2018 | Amy DeMartine

    In 2017, applications rolled out the welcome mat to malicious hackers, topping the list of successful external attack targets. Why? Developers continue transitioning from perfect to fast to provide...

  • Report The US Healthcare Security Benchmark 2017 To 2018

    Healthcare Providers Must Improve Security For Digital Transformation
    January 17, 2018 | Salvatore Schiano, Chris Sherman

    IT security budgets at US healthcare organizations have lagged behind other industries. In a highly regulated industry, budget constraints have made compliance challenging and impeded security...

  • Report The State Of IoT Security 2018

    There Is Growing Awareness Of IoT Threats, But Deployments Are Still At Risk
    January 9, 2018 | Merritt Maxim

    IoT technology enables businesses to optimize processes, enhance product offerings, and transform the customer experience. While business leaders are excited about the business insights they will...

  • Report The State Of Risk Management 2017

    December 5, 2017 | Christopher McClean

    Executives must take big bets on new technologies, business models, and emerging markets to stay ahead of the fast pace of competition. With so much at stake and so many public examples of...

  • Report The State Of Network Security: 2017 To 2018

    November 30, 2017 | Heidi Shey, Alexander Spiliotes

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2017 to...

  • Report The Forrester Wave™: Identity-As-A-Service, Q4 2017

    The Seven Vendors That Matter Most And How They Stack Up
    November 17, 2017 | Andras Cser, Merritt Maxim

    In our 41-criteria evaluation of IDaaS providers, we identified the seven most significant ones — Centrify, Gemalto, Microsoft, Okta, OneLogin, Oracle, and Ping Identity — and researched, analyzed,...

  • Report Understand The State Of Identity And Access Management: 2017 To 2018

    October 24, 2017 | Merritt Maxim, Andras Cser

    This report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing an organizationwide identity and access management (IAM) strategy....