47 results in Reports
 
Sort by:
Refine
  • Tech Sector Economics
  • Security & Risk

Search Results

  • Report Security Budgets Europe, 2019: Budgets Rise And Security Services Overtake Products

    March 21, 2019 | Paul McKay

    This year, European CISOs must contend with a shaky economic outlook, a geopolitically complex threat landscape, and further regulatory scrutiny. Read this report to find out how European security...

  • Report The Forrester Wave™: Cybersecurity Incident Response Services, Q1 2019

    The 15 Providers That Matter Most And How They Stack Up
    March 18, 2019 | Josh Zelonis

    In our 11-criterion evaluation of cybersecurity incident response services providers, we identified the 15 most significant ones — Aon, Booz Allen Hamilton, CrowdStrike, Cylance, Deloitte, EY,...

  • Report Recruiting And Retaining Insider Threat Analysts

    To Avoid An Embarrassing And Devastating Insider Attack, Hire Dedicated Analysts
    March 7, 2019 | Joseph Blankenship

    Whether accidental or malicious, insider incidents can result in fraud, privacy abuses, IP theft, and other damage. It's difficult for security pros to detect this activity because insiders need...

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Report The State Of Business Continuity, 2018

    Risk Pros Are Expanding BC To Include Most Operational Risks
    February 11, 2019 | Stephanie Balaouras, Salvatore Schiano

    As 100-year floods and cyberattacks grow more frequent, and as organizations become completely dependent on complex technology, business continuity (BC) preparedness must be a cornerstone of a...

  • Report The State Of Endpoint Security, 2019

    Buyers Demand Better Product Efficacy And Integrated Data Security
    January 22, 2019 | Chris Sherman, Salvatore Schiano

    Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns to help security...

  • Report How To Talk To Your Board About Cybersecurity

    Best Practices And Template For Board Presentations
    December 28, 2018 | Jeff Pollard, Jinan Budge, Paul McKay

    Whether there to answer questions, give a status update, or build support, security leaders need to make the most out of each opportunity they get in front of their board of directors. This report...

  • Report Understand The State Of Identity And Access Management, 2018 To 2019

    Benchmarks: The Identity And Access Management Playbook
    December 19, 2018 | Merritt Maxim, Andras Cser

    This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...

  • Report Security Budgets 2019: The Year Of Services Arrives

    Benchmarks: The S&R Practice Playbook
    December 17, 2018 | Jeff Pollard

    This report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use...

  • Report Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook
    December 6, 2018 | Heidi Shey, Jeff Pollard, Claire O'Malley

    New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...

  • Report The State Of Data Security And Privacy: 2018 To 2019

    Benchmarks: The Data Security And Privacy Playbook
    December 5, 2018 | Heidi Shey, Enza Iannopollo

    This data-driven report outlines budgeting and spending, technology adoption plans, and other key breach, data protection, and privacy trends in global firms for 2018 through 2019. Understanding...

  • Report The State Of Risk Management 2018

    Benchmarks: The Governance, Risk, And Compliance Playbook
    November 30, 2018 | Christopher McClean, Trevor Lyness

    Executives must take big bets on new technologies, business models, and emerging markets to stay ahead of the fast pace of competition. With so much at stake and so many public examples of...

  • Report The State Of Network Security: 2018 To 2019

    Benchmarks: The Security Architecture And Operations Playbook
    November 27, 2018 | Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2018 to...

  • Report Instill A Security Culture By Elevating Communication

    Continuous Improvement: The S&R Practice Playbook
    October 19, 2018 | Jinan Budge, Claire O'Malley

    Traditional approaches to security communication are limited to perfunctory one-off training sessions that fail to take customers, regulators, and other external stakeholders into account and...

  • Report Now Tech: Container Security, Q4 2018

    Forrester's Overview Of 24 Container Security Providers
    October 3, 2018 | Amy DeMartine

    You can use container security tools to secure critical applications, speed development efforts, and tamperproof your containers. But to access these benefits, you'll first have to select from a...

  • Report CISOs, Get Ready To Pay More As Tech Titans Enter The Security Market

    Alphabet, Amazon, And Microsoft Seek To Remake The Cybersecurity Landscape
    April 24, 2018 | Jeff Pollard, Joseph Blankenship

    Three tech giants are rushing in to disrupt the cybersecurity market the same way they disrupted retail, computing, and advertising. When computing was on-premises or in client-owned data centers,...

  • Report Manage Third-Party Risk To Achieve And Maintain GDPR Compliance

    April 19, 2018 | Enza Iannopollo, Alexander Spiliotes

    It doesn't matter if third parties supply you with data, technology, or services: If they touch your customers' or employees' personal data, their security and privacy postures directly affect your...

  • Report Top Trends Shaping Identity Verification (IDV) In 2018

    Post-Equifax Breach, IDV Aggregators Will Cater To Multifaceted IDV Requirements
    March 29, 2018 | Andras Cser, Merritt Maxim

    In the face of increasing identity theft, stricter compliance regulations, and the push for online customer acquisition, reliable, accurate, cost-effective, and easy-to-use identity verification...

  • Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Security Architecture And Operations Playbook
    March 28, 2018 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it's the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • Report Use AI To Optimize Your IAM Initiatives

    Mitigate Identity Risks And Automate Processes With Emerging AI Models
    March 27, 2018 | Merritt Maxim, Andras Cser

    AI and machine learning (ML) are transforming many existing technologies and processes. Identity and access management (IAM) is no exception to this trend, with many incumbent IAM vendors and new...

  • Report Top Recommendations For Your Security Program, 2018

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report Security Budgets 2018: Financial Services And Insurance

    New Initiatives Require Security To Take An Expertise-On-Demand Approach
    March 22, 2018 | Jeff Pollard

    Data breaches, regulation, stiff competition for talent, and decentralized technology spending are still major challenges for security leaders in the FSI industry. We compare the budgets of...

  • Report The State Of Microsoft Active Directory 2018

    For Today's Digital Businesses, AD Is The Identity Backbone Of The Entire Ecosystem
    March 20, 2018 | Merritt Maxim

    Microsoft's Active Directory (AD) has become the most widely used enterprise repository for digital identities. Its centralized collection of user account information also makes it a tempting...

  • Report The State Of Endpoint Security, 2018

    New Threats Are Driving Technology Consolidation
    February 5, 2018 | Chris Sherman, Salvatore Schiano

    Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns, helping security...

  • Report The State Of GDPR Readiness

    GDPR Readiness Progresses, But Strategies Depend Too Heavily On IT
    January 31, 2018 | Enza Iannopollo

    With the deadline for GDPR compliance looming in May 2018, it's a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of...