960 results in Reports
Sort by:
Refine
  • Security & Risk

Search Results

  • For Security & Risk Professionals

    Report

    Report Protect Your Digital Workforce With Browser Isolation Technology (BIT)

    BIT Helps S&R Pros Implement Zero Trust For Workforce Security
    July 21, 2017 | Chase Cunningham

    Employees today must use a browser to access most of their corporate applications, email, and collaboration tools. A variety of common threat vectors target basic user interactions as employees use...

  • For Security & Risk Professionals

    Report

    Report The Market For Managed Detection And Response Booms In 2017

    Cyberattacks And Skill Shortages Drive MDR Demand
    July 21, 2017 | Jeff Pollard

    Managed detection and response (MDR) has emerged as a specific category of managed security services (MSS) in the last 12 months. Security and risk (S&R) pros thinking about investing in MDR...

  • For Security & Risk Professionals

    Report

    Report Remove The Mystery From Security Metrics

    Performance Management: The S&R Practice Playbook
    July 18, 2017 | Jeff Pollard

    Difficulty creating meaningful metrics persists for chief information security officers (CISOs) despite a decade of discussion. Without good metrics, the security organization can't hope to...

  • For Security & Risk Professionals

    Report

    Report Honeypots 2.0: Deception Technology Lures Cybercriminals Into A Trap

    Hollywood Isn't The Only Industry Banking On Sequels
    July 18, 2017 | Josh Zelonis, Jeff Pollard

    Security and risk (S&R) professionals can leverage deception technologies that mimic real production applications and systems in an attempt to lure attackers into an intrusion. The concept isn't...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Risk-Based Authentication, Q3 2017

    ThreatMetrix Leads With Device Support And Flexible Case Management; Kount, IBM, And Easy Solutions Follow Closely Behind
    July 17, 2017 | Andras Cser

    In our 32-criteria evaluation of risk-based authentication (RBA) providers, we identified the eight most significant ones — CA Technologies, Easy Solutions, IBM, Kount, LexisNexis Risk Solutions,...

  • For Security & Risk Professionals

    Report

    Report Build A High-Performance, Customer-Obsessed Security Organization

    Executive Overview: The S&R Practice Playbook
    July 13, 2017 | Christopher McClean

    CISOs must rapidly evolve to become business managers who protect their firm's brand, strengthen its reputation, and build customer trust. To do so, CISOs need far more than just the latest...

  • For Security & Risk Professionals

    Report

    Report Protect Your Intellectual Property And Customer Data From Theft And Abuse

    Executive Overview: The Data Security And Privacy Playbook
    July 12, 2017 | Stephanie Balaouras

    Data is the lifeblood of today's digital businesses, and sophisticated cybercriminals are determined to steal it. Forrester's data security and privacy playbook shows S&R pros how to navigate the...

  • For Security & Risk Professionals

    Report

    Report Build A Governance, Risk, And Compliance Strategy Worthy Of Business Consideration

    Strategic Plan: The Governance, Risk, And Compliance Playbook
    July 11, 2017 | Renee Murphy

    Governance, risk, and compliance (GRC) are far too often functions of emergency response. To get your team and key stakeholders on board and to show that all your efforts are helping your business...

  • For Security & Risk Professionals

    Report

    Report Develop Identity And Access Management Metrics That Matter To The Business

    Performance Management: The Identity And Access Management Playbook
    July 7, 2017 | Andras Cser, Merritt Maxim

    Most security and risk (S&R) professionals struggle to ensure that identity and access management (IAM) remains a top business technology priority. S&R pros who succeed at nurturing their internal...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Application Security, Q3 2017

    Application Security Solutions Pivot To Meet Application Conditions
    July 6, 2017 | Amy DeMartine

    Applications are increasingly the face of interaction between companies and their customers; this includes customer-facing applications, differentiating mobile apps, internet-of-things (IoT) device...

  • For Security & Risk Professionals

    Report

    Report The Cloud Security Market Grows From $1.5 Billion In 2017 To $3.5 Billion In 2021

    Transitioning On-Premises Workloads To Hybrid Clouds Fuels Demand For Security
    July 6, 2017 | Andras Cser, Jennifer Adams

    As software, infrastructure, and platforms shift to the cloud, ensuring their security is critical. This has led to a new breed of security services that specifically address cloud security...

  • For Security & Risk Professionals

    Report

    Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Security Architecture And Operations Playbook
    July 5, 2017 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it is the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • For Security & Risk Professionals

    Report

    Report Building A Customer-Obsessed IAM Team

    Organization: The Identity And Access Management Playbook
    June 30, 2017 | Merritt Maxim, Andras Cser

    For security and risk (S&R) leaders building a comprehensive customer identity and access management (CIAM) strategy for their digital business, this report provides an overview of the skills and...

  • For Security & Risk Professionals

    Report

    Report Breakout Vendors: Internet Of Things (IoT) Security

    CENTRI, Device Authority, Mocana, And Rubicon Labs Stand Out
    June 29, 2017 | Merritt Maxim

    Security and risk (S&R) professionals are under increasing pressure to secure IoT deployments to minimize the risk of data breaches, disruptive cyberattacks, and even physical attacks. As a result,...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: External Threat Intelligence, 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    June 26, 2017 | Josh Zelonis

    The threat intelligence market is muddled by confusing messaging that has hurt security and risk (S&R) pros' ability to succeed with their intelligence capabilities. This report provides a course...

  • For Security & Risk Professionals

    Report

    Report Hardcoded For Failure

    Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
    June 21, 2017 | Chase Cunningham

    There is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...

  • For Security & Risk Professionals

    Report

    Report Identify Companywide Roles And Responsibilities To Support Your GDPR Compliance Efforts

    Many Teams Contribute To The Success Of Your Privacy And GDPR Strategy
    June 20, 2017 | Enza Iannopollo

    Privacy and security professionals preparing to comply with the European Union's General Data Protection Regulation (GDPR), by May 2018, need the support of their peers across the organization....

  • For Security & Risk Professionals

    Report

    Report Security Strength And Ease Benchmark: US Online Retailers 2017

    Continuous Improvement: The Identity And Access Management Playbook
    June 15, 2017 | Andras Cser, Alexander Spiliotes

    According to Forrester Data Online Retail Forecast, 2016 to 2021 (US), online retail sales have grown 15% year-over-year since 2015. As retailers expand their digital offerings and work to attract...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Customer Identity and Access Management, Q2 2017

    Tools And Technology: The Identity And Access Management Playbook
    June 15, 2017 | Merritt Maxim

    In our 20-criteria evaluation of customer IAM (CIAM) providers, we identified the eight most significant ones — Auth0, ForgeRock, Gigya, Janrain, LoginRadius, Microsoft, Ping Identity, and...

  • For Security & Risk Professionals

    Report

    Report Rethinking Data Discovery And Classification Strategies

    Strategic Plan: The Data Security And Privacy Playbook
    June 9, 2017 | Heidi Shey

    Security and risk (S&R) pros can't expect to adequately protect customer, employee, and sensitive corporate data and IP if they don't know what data exists, where it resides, how valuable it is to...

  • For Security & Risk Professionals

    Report

    Report A Secure Blockchain Will Transform Security And Risk Management

    Secure Payments, Cryptocurrencies, Anti-Money Laundering, Identity Verification Demand New, Distributed, And Tamper-Evident Transaction Databases
    June 9, 2017 | Andras Cser, Martha Bennett

    Secure blockchains will become the foundation for verifiable transactions — both business and operational — running the gamut from payments, financial transfers, and shipment tracking to identity...

  • For Security & Risk Professionals

    Report

    Report Forrester Data: Cloud Security Solutions Forecast, 2016 To 2021 (Global)

    ForecastView Document
    June 8, 2017 | Jennifer Adams, Andras Cser

    As software, infrastructure, and platforms shift to the cloud, a new breed of security services is emerging and growing to address the security requirements. This data-driven report gives a...

  • For Security & Risk Professionals

    Report

    Report Data Privacy Metrics That Matter To The Business

    Performance Management: The Data Security And Privacy Playbook
    June 1, 2017 | Enza Iannopollo

    A commitment to security and privacy enables firms to build trusted customer relationships that increase revenue. Security and privacy teams must establish data security and privacy programs that...

  • For Security & Risk Professionals

    Report

    Report Top Competencies To Look For In An IAM Systems Integrator

    Cloud App Integration, Hosting, And Identity Management And Governance Skills Matter
    May 15, 2017 | Andras Cser, Merritt Maxim

    Systems integrators (SIs) are a crucial part of identity and access management (IAM) deployments. SIs bring valuable deployment and integration experience, and their vital advice on business...

  • For Security & Risk Professionals

    Report

    Report Creating Actionable Security And Privacy Policy

    Policy: The Data Security And Privacy Playbook
    May 3, 2017 | Heidi Shey

    Data security and privacy policies are ineffective and can even hinder business processes without a clear understanding of the data — from what it is to where it exists. Data identity is the...

Content categories

Refine your results

Date Range

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst