972 results in Reports
Sort by:
Refine
  • Security & Risk

Search Results

  • For Security & Risk Professionals

    Report

    Report Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook
    September 19, 2017 | Stephanie Balaouras, Heidi Shey

    In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • For Security & Risk Professionals

    Report

    Report Secure The Rise Of Intelligent Agents

    Securing Intelligent Agents Will Stress Application Security Basics
    September 14, 2017 | Amy DeMartine, Jennifer Wise

    Early-stage intelligent agents (IAs) have arrived and are gaining traction among consumers. Leaving behind the direct, detailed commands of their virtual assistant predecessors, IAs will soon see...

  • For Security & Risk Professionals

    Report

    Report Artificial Intelligence Will Revolutionize Cybersecurity

    But Security Leaders Must View All Vendor Claims With Skepticism

    Security vendors are inundating CISOs with products purporting to use artificial intelligence to dramatically improve the accuracy and speed of both threat detection and response. However, much of...

  • For Security & Risk Professionals

    Report

    Report Assess The Maturity Of Your Application Security Program

    Know What Application Security Functions To Prioritize, And How
    September 14, 2017 | Amy DeMartine

    Successful attacks on applications continue to prove the ubiquity of software vulnerabilities, and now that applications are releasing faster than ever, the problem will grow much worse if not...

  • For Security & Risk Professionals

    Report

    Report Forrester's 2017 Interactive Data Privacy Heat Map

    Landscape: The Data Security And Privacy Playbook
    September 14, 2017 | Enza Iannopollo, Chris Sherman, Heidi Shey

    To help S&R professionals navigate the complex landscape of privacy laws around the world, Forrester created the Data Privacy Heat Map, which explains the data protection guidelines and practices...

  • For Security & Risk Professionals

    Report

    Report Security Strength And Ease Benchmark: US Most-Visited Federal Government Websites, 2017

    Only 33% of federal customers are confident that the government keeps their personal information secure, and almost 50% rate federal website ease of use as neutral or poor. In this report for S&R...

  • For Security & Risk Professionals

    Report

    Report Top Trends That Will Shape CIAM In 2018 And Beyond

    Landscape: The Identity And Access Management Playbook
    September 7, 2017 | Merritt Maxim, Andras Cser

    Digital businesses must manage, govern, and secure customers' access to systems and data without hurting the customer experience. Customer identity and access management (CIAM) is a compelling...

  • For Security & Risk Professionals

    Report

    Report Four Scenarios To Build The Business Case For Enterprise Fraud Management

    Determine The Best Scenario To Reduce Fraud Losses And Increase ROI At Your Firm
    September 5, 2017 | Andras Cser

    The business case for enterprise fraud management (EFM) depends on reducing fraud loss across multiple transaction types (typically payments). We looked at fraud loss, investigation labor, as well...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Cloud Workload Security Solutions, Q3 2017

    New CWS Functionality Offers Better Breach Detection, Granular Control, And More Cloud Integration
    September 1, 2017 | Andras Cser

    As businesses continue to adopt both infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) cloud platforms, S&R pros struggle to protect their organization's valuable data while...

  • For Security & Risk Professionals

    Report

    Report Calculate The Business Impact And Cost Of A Breach

    Business Case: The Data Security And Privacy Playbook
    August 31, 2017 | Heidi Shey

    The business impact and cost of a breach are notoriously difficult to measure. A data breach initiates a tangle of direct and indirect costs, with some accruing in the immediate aftermath and...

  • For Security & Risk Professionals

    Report

    Report Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook
    August 25, 2017 | Heidi Shey, Jeff Pollard

    New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...

  • For Security & Risk Professionals

    Report

    Report Forrester Data: Endpoint Security Software Forecast, 2016 To 2021 (Global)

    ForecastView Document
    August 22, 2017 | Jennifer Adams, Chris Sherman

    Hackers are creating new, more sophisticated malware daily, and endpoint security solutions provide a critical line of defense to protect PCs, laptops, and servers from these malicious threats....

  • For Security & Risk Professionals

    Report

    Report Evolve Your IAM Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook
    August 18, 2017 | Andras Cser, Merritt Maxim

    New partnership and customer engagement models have extended the identity boundary of today's digital businesses: Security pros must manage identities and access across a variety of populations...

  • For Security & Risk Professionals

    Report

    Report The Okta IPO And The IDaaS Opportunity

    ForecastView Document

    Identity-as-a-service (IDaaS) vendor Okta recently moved into the spotlight with a successful IPO that raised $187 million of equity capital. The IPO filings gave investors and industry observers...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Application Security Testing

    Choose The Right SAST, DAST, MAST, And IAST For Your Firm's Developers
    August 7, 2017 | Amy DeMartine

    Application releases are getting faster, especially as developers make use of DevOps methodologies to automate releases. Security pros can support and even drive these changes using continuous...

  • For Security & Risk Professionals

    Report

    Report Ransomware Protection: Five Best Practices

    Harden Your Defenses Now For This Growing Threat
    July 27, 2017 | Chris Sherman, Salvatore Schiano

    Ransomware is holding enterprises hostage. Recent outbreaks from variants such as WannaCry and Petya have many security and risk (S&R) pros wondering if they can prevent this growing threat. By...

  • For Security & Risk Professionals

    Report

    Report Measure GRC Performance To Show Processes And Data Reliability

    Performance Management: The Governance, Risk, And Compliance Playbook
    July 27, 2017 | Renee Murphy

    The more complex a program is, the more difficult it is to maintain it, and the faster and more devastating its breakdown can be. Strong performance management is a way for risk management...

  • For Security & Risk Professionals

    Report

    Report Assess Your Exposure To Geopolitical Cyber Risk

    How To Identify The Impacts Of Geopolitical Dynamics Across Your Organization

    Geopolitical tensions around the world are spawning nearly constant cyberattacks on unprepared private sector firms. These cyberattacks result in millions of dollars in lost customer trust, as well...

  • For Security & Risk Professionals

    Report

    Report The IAM Market Will Surpass $13 Billion By 2021

    Customer-Facing IAM Leads Growth

    New digital business and customer engagement models have extended today's identity boundaries. In response, security pros must now manage identities and access across a variety of populations...

  • For Security & Risk Professionals

    Report

    Report Protect Your Digital Workforce With Browser Isolation Technology (BIT)

    BIT Helps S&R Pros Implement Zero Trust For Workforce Security
    July 21, 2017 | Chase Cunningham

    Employees today must use a browser to access most of their corporate applications, email, and collaboration tools. A variety of common threat vectors target basic user interactions as employees use...

  • For Security & Risk Professionals

    Report

    Report The Market For Managed Detection And Response Booms In 2017

    Cyberattacks And Skill Shortages Drive MDR Demand
    July 21, 2017 | Jeff Pollard

    Managed detection and response (MDR) has emerged as a specific category of managed security services (MSS) in the last 12 months. Security and risk (S&R) pros thinking about investing in MDR...

  • For Security & Risk Professionals

    Report

    Report Remove The Mystery From Security Metrics

    Performance Management: The S&R Practice Playbook
    July 18, 2017 | Jeff Pollard

    Difficulty creating meaningful metrics persists for chief information security officers (CISOs) despite a decade of discussion. Without good metrics, the security organization can't hope to...

  • For Security & Risk Professionals

    Report

    Report Honeypots 2.0: Deception Technology Lures Cybercriminals Into A Trap

    Hollywood Isn't The Only Industry Banking On Sequels
    July 18, 2017 | Josh Zelonis, Jeff Pollard

    Security and risk (S&R) professionals can leverage deception technologies that mimic real production applications and systems in an attempt to lure attackers into an intrusion. The concept isn't...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Risk-Based Authentication, Q3 2017

    ThreatMetrix Leads With Device Support And Flexible Case Management; Kount, IBM, And Easy Solutions Follow Closely Behind
    July 17, 2017 | Andras Cser

    In our 32-criteria evaluation of risk-based authentication (RBA) providers, we identified the eight most significant ones — CA Technologies, Easy Solutions, IBM, Kount, LexisNexis Risk Solutions,...

  • For Security & Risk Professionals

    Report

    Report Build A High-Performance, Customer-Obsessed Security Organization

    Executive Overview: The S&R Practice Playbook
    July 13, 2017 | Christopher McClean

    CISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...

Content categories

Refine your results

Date Range

Industry

Topics

Methodology

Region

Vendor

Analyst

Market Imperatives