Search Results
-
Report Predictions 2020: Cybersecurity
Governments, enterprises, and, unfortunately, attackers, all end the second decade of the 21st century in a better place than the one in which they began it. Like any escalating conflict that...
-
Report The Top Security Technology Trends To Watch, 2019
Eight Security And Risk Technologies Will Disrupt Security And Risk Practices
Analysts from Forrester's security and risk (S&R) research team drew insight from client inquiries, research projects, and industry perspectives to uncover the top eight security technologies to...
-
Report Hybrid Cloud Security Best Practices
Focus On The Five C's: Console, Configuration, Connectivity, Cloud Data, And Containers
June 20, 2019 | Andras CserHybrid cloud security is a must for firms moving their critical data from on-premises to cloud workloads. This report, based on a small, 20-respondent panel survey, looks at cloud security best...
-
Report Security For Profit
Generating Revenue And Profit From Tighter Security Is No Pipe Dream
More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...
-
Report Now Tech: Payment Tokenization, Q1 2019
Forrester's Overview Of 21 Payment Tokenization Providers
March 7, 2019 | Andras CserYou can use payment tokenization (PT) solutions to: 1) reduce the risk of fraud from stolen personal account numbers (PANs); 2) reduce the scope of PCI DSS compliance and audits; and 3) increase...
-
Report The Forrester Wave™: Cloud Security Gateways, Q1 2019
The 10 Providers That Matter Most And How They Stack Up
February 20, 2019 | Andras CserIn our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...
-
Report New Tech: Blockchain Identity (BCI) Management, Q1 2019
Forrester's Landscape Overview Of 22 Providers
A new crop of blockchain identity (BCI) technologies, and the solutions they power, stand poised to unleash new paradigms in identity verification (IDV) and access policy enforcement, leading to...
-
Report Best Practices: Selecting And Deploying Cloud Security Gateways
Select Vendors Based On Breadth, Depth, And Fit For Existing Cloud Applications
March 20, 2018 | Andras CserSecurity pros must protect the organization's critical business apps and sensitive data regardless of hosting model. For cloud apps and data, cloud security gateway (CSG) solutions augment and...