Skip to main content
238 results in Reports
Sort by:
  • Secure customers, protect the brand

Featured content



As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »

Search Results

  • Report Embed Cybersecurity And Privacy Everywhere To Secure Your Brand And Business

    May 10, 2021 | Heidi Shey, Amy DeMartine

    Meeting compliance requirements is the floor and not equivalent to creating robust cybersecurity and privacy practices that create the culture and conditions required to meet today's demands and...

  • Report The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q2 2021

    Seventeen Technologies Underpin Zero Trust Detection And Response

    Zero Trust threat detection and response is increasingly critical to firms' ability to win, serve, and retain customers. To accelerate their performance in threat detection and response, companies...

  • Report The Forrester Wave™: Enterprise Email Security, Q2 2021

    The 15 Providers That Matter Most And How They Stack Up

    In our 25-criterion evaluation of enterprise email security providers, we identified the 15 most significant ones — Agari, Area 1 Security, Barracuda Networks, Broadcom Symantec, Cisco, Forcepoint,...

  • Report New Tech: Zero Trust Network Access, Q2 2021

    Forrester's Landscape Overview Of 34 Providers
    April 19, 2021 | David Holmes

    Zero Trust network access (ZTNA) is the signature security technology of the pandemic. While modestly unchaining users from their antiquated VPN technology, it has inspired organizations to...

  • Report The Four Tenets Of SaaS Application Security And Protection

    Check For ZT Principles For Your SaaS Vendors' Security Stance
    April 16, 2021 | Andras Cser

    As costs of on-premises hosting increase and firms continue to deploy more SaaS apps, firms are now storing sensitive and personally identifiable information in SaaS apps — increasing the overall...

  • Report Now Tech: Cloud-Based Learning Technology Platforms, Q1 2021

    Forrester's Overview Of 24 Learning Technology Providers
    April 15, 2021 | Katy Tynan

    You can use cloud-based learning technology platforms to deliver on-demand learning opportunities, assess and upskill your workforce, and drive more efficient adoption of new technology. But to...

  • Report Physical Identity Document Verification Trends And Best Practices

    Increase Customer Acquisition By Verifying Physical Identity Documents Online
    April 15, 2021 | Andras Cser

    Physical identity document verification (PIDV) lets firms seamlessly and reliably vet and verify users' identities during the onboarding process in order to issue a digital (or another physical)...

  • Report The Forrester Tech Tide™: Threat Intelligence, Q2 2021

    Fifteen Technologies And Services Underpin Threat Intelligence
    April 13, 2021 | Brian Kime, Elsa Pikulik

    Threat intelligence is increasingly critical to firms' ability to manage cyber risk and build resilient security programs. To accelerate their threat intelligence performance, firms are evaluating...

  • Report Now Tech: Software Composition Analysis, Q2 2021

    Forrester's Overview Of 22 Software Composition Analysis Providers
    April 7, 2021 | Sandy Carielli

    You can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development lifecycle (SDLC). But to...

  • Report The State Of Data Security And Privacy, 2021

    Benchmarks: The Data Security And Privacy Playbook
    April 6, 2021 | Heidi Shey

    Organizations can learn from the patterns behind data breaches, exposure, and misuse to evaluate their current practices and controls for data protection. Key trends in data security and privacy...

  • Report Modernize Your Approach To Endpoint Governance

    Use Risk-Based Security Policies And Standards to Protect Your Evolving Workforce
    April 6, 2021 | Chris Sherman, Brian Kime

    Remote work has caused massive shifts in how workers use technology, and traditional approaches to endpoint governance have failed due to an outdated focus on protecting network-bound corporate...

  • Report A CISO's First 100 Days

    Few Wins But Big Losses At Stake Early In Your Tenure
    March 31, 2021 | Jeff Pollard, Paul McKay, Jinan Budge

    The energy and momentum created when a new leader takes the reins unlocks opportunities, but if CISOs don't handle their first 100 days well, they risk alienating stakeholders and isolating...

  • Report The Rise Of Anti-Surveillance Capitalism

    The Apparel, Cosmetics, And Technology Shaping Surveillance Resistance And Why It's Time For CISOs To Adopt Them

    Security and risk pros need to weigh surveillance capitalism as a risk to their enterprise. This report will explain how data collected, synthesized, and commercialized by tech companies, data...

  • Report Now Tech: Data Masking, Q1 2021

    Forrester's Overview Of 18 Data Masking Providers
    March 29, 2021 | Heidi Shey, Noel Yuhanna

    You can use data masking to protect sensitive data by obfuscation, become significantly more productive, and support various compliance mandates. But to realize these benefits, you'll first have to...

  • Report Forrester Infographic: Global Security Budgets In 2021

    March 26, 2021 | Jeff Pollard

    Security and risk pros are entering 2021 in unclear circumstances. As the pandemic continues to wax and wane, economic uncertainty makes long-term planning almost impossible. Yet work-from-home...

  • Report Now Tech: Digital Signature And Trust Services, Q1 2021

    Forrester's Overview Of 19 Digital Signature And Trust Services Providers
    March 25, 2021 | Enza Iannopollo

    You can use digital signature and trust services providers to accelerate digital transformation, improve the experience of your employees and customers, while delivering strong compliance,...

  • Report Forrester Infographic: European Security Budgets In 2021

    March 24, 2021 | Paul McKay

    In 2021, security leaders continue to invest differentially in new security controls delivered from the cloud and will rely on security service providers to support their security programs until...

  • Report The Forrester Wave™: Managed Detection And Response, Q1 2021

    The 15 Providers That Matter Most And How They Stack Up
    March 24, 2021 | Jeff Pollard, Claire O'Malley

    In our 19-criterion evaluation of managed detection and response providers, we identified the 15 most significant ones — Arctic Wolf, Binary Defense, CrowdStrike, Cybereason, deepwatch, eSentire,...

  • Report UK CISO Career Paths

    UK CISOs' Tenure Is Shorter Than Their Peers In America, Hurting Their Ability To Build Sustainable Enterprise Security Programs
    March 24, 2021 | Paul McKay

    Forrester analyzed the career backgrounds of 74 CISOs with public profiles working for the UK Financial Times Stock Exchange 100 Index (FTSE 100) to understand several dimensions of their role and...

  • Report The Forrester Wave™: External Threat Intelligence Services, Q1 2021

    The 12 Providers That Matter Most And How They Stack Up
    March 23, 2021 | Brian Kime, Elsa Pikulik

    In our 26-criterion evaluation of external threat intelligence services providers, we identified the 12 most significant ones — CrowdStrike, Digital Shadows, FireEye, Flashpoint, Group-IB, IBM,...

  • Report The State Of Application Security, 2021

    Applications Remain A Key Attack Vector, But Signs Of Hope Emerge
    March 23, 2021 | Sandy Carielli

    Applications remain a top cause of external breaches, and the prevalence of open source, API, and containers only adds complexity to the security team. Happily, organizations have started to...

  • Report EU Cybersecurity Regulations Scanner, 2021

    EU Proposes Major Revisions Of Its Cyber Regulations And Invests In Homegrown European Security Solutions
    March 22, 2021 | Paul McKay

    At the end of 2020, the EU announced a new EU cybersecurity strategy package. As well as a new EU cyberstrategy, it proposes big changes to the NIS Directive, which will impact European...

  • Report How To Make The Shift To Sustainable Finance

    Vision: Financial Services Firms Will Mitigate New Risks With A Greater Focus On Sustainability
    March 18, 2021 | Oliwia Berdak, Luis Deya, Diane Deng

    Sustainability — with its focus on environmental, social, and governance (ESG) principles — is beginning to dominate political and business agendas worldwide. As allocators and stewards of capital...

  • Report Best Practices: Mitigating Insider Threat

    Processes: The Zero Trust Security Playbook

    Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros to...

  • Report Future Requirements For IaaS Platform Native Security In 2021 To 2022

    Essential Cross-Cloud Services That Should Be Part Of Your Cloud Strategy
    March 17, 2021 | Andras Cser

    Infrastructure-as-a-service platform native security (IPNS) plays a crucial role in securing data, workloads, and network communications in public cloud platforms such as Amazon Web Services (AWS),...

Content Type