989 results in Reports
Sort by:
Refine
  • Security & Risk

Search Results

  • For Security & Risk Professionals

    Report

    Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    November 21, 2017 | Jeff Pollard

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Identity-As-A-Service, Q4 2017

    The Seven Vendors That Matter Most And How They Stack Up
    November 17, 2017 | Andras Cser, Merritt Maxim

    In our 41-criteria evaluation of IDaaS providers, we identified the seven most significant ones — Centrify, Gemalto, Microsoft, Okta, OneLogin, Oracle, and Ping Identity — and researched, analyzed,...

  • For Security & Risk Professionals

    Report

    Report Predictions 2018: Cybersecurity

    Landscape: The S&R Practice Playbook
    November 7, 2017 | Andras Cser, Jeff Pollard, Merritt Maxim

    In 2018, consumers and businesses will face challenges brought on by four primary forces: 1) rising tensions in international relations; 2) ubiquitous connectivity; 3) digital transformation...

  • For Security & Risk Professionals

    Report

    Report Construct A Business Case For Interactive Application Security Testing

    How Faster App Releases At Reduced Cost Make IAST Worthwhile
    November 3, 2017 | Amy DeMartine

    As software delivery times speed up, security professionals are trying to fit repeatable security testing into shrinking software delivery life cycles. Rather than depending on a crawler to assess...

  • For Security & Risk Professionals

    Report

    Report Assess Your Digital Risk Protection Maturity

    Use Forrester's Assessment To Structure How You Monitor And Mitigate Digital Risks That Expose Your Brand, Business, And People
    November 3, 2017 | Nick Hayes

    How well do you protect your external digital assets and thwart malicious lookalikes and activity? Most companies underestimate their digital risk exposure and lack monitoring and mitigation...

  • For Security & Risk Professionals

    Report

    Report Best Practices: Mitigating Insider Threats

    Processes: The Security Architecture And Operations Playbook
    November 2, 2017 | Joseph Blankenship, Claire O'Malley

    Whether accidental or malicious, insider threat incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It's difficult for security pros...

  • For Security & Risk Professionals

    Report

    Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook
    November 1, 2017 | Chase Cunningham, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros devote resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great way...

  • For Security & Risk Professionals

    Report

    Report Choose The Right Technologies To Support Your GRC Program

    Tools And Technology: The Governance, Risk, And Compliance Playbook
    October 31, 2017 | Renee Murphy, Claire O'Malley

    There comes a point in any GRC program when the massively complex efforts involved become too cumbersome to manage in separate systems and manual processes. Even if it were possible, there would be...

  • For Security & Risk Professionals

    Report

    Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Vision: The Data Security And Privacy Playbook
    October 25, 2017 | Heidi Shey, Enza Iannopollo

    Data is the lifeblood of today's digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every security and privacy leader. Hacked customer data can erase...

  • For Security & Risk Professionals

    Report

    Report The State Of Data Security And Privacy: 2017 To 2018

    Benchmarks: The Data Security And Privacy Playbook
    October 24, 2017 | Heidi Shey, Alexander Spiliotes

    Throughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Identity And Access Management: 2017 To 2018

    Benchmarks: The Identity And Access Management Playbook
    October 24, 2017 | Merritt Maxim, Andras Cser

    This report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing an organizationwide identity and access management (IAM) strategy....

  • For Security & Risk Professionals

    Report

    Report Assess Your GRC Program With Forrester's GRC Maturity Model

    Assessment: The Governance, Risk, And Compliance Playbook
    October 24, 2017 | Renee Murphy, Nick Hayes

    The Forrester GRC Maturity Model helps risk management professionals objectively assess their GRC efforts to identify areas of weakness as well as centers of excellence, then outline a strategy to...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Customer Data Breach Notification And Response Services, Q4 2017

    Tools And Technology: The Data Security And Privacy Playbook
    October 23, 2017 | Heidi Shey

    In our 18-criteria evaluation of customer breach notification and response service providers, we identified the seven most significant ones — AllClear ID, Epiq Systems, Equifax, Experian, ID...

  • For Security & Risk Professionals

    Report

    Report Windows 10 Finally Delivers On Microsoft's Security Promises

    A Guide For Taking Full Advantage Of Windows 10 Security And Privacy Features

    Microsoft Windows 10 offers many new native security and privacy capabilities that potentially reduce organizations' reliance on third-party endpoint security solutions. When taken together, these...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Third-Party Risk Intelligence

    Products Vie To Augment Your Survey-Based Program
    October 20, 2017 | Claire O'Malley, Nick Hayes

    Increasing business reliance on third-party ecosystems, coupled with worsening market volatility and threats, is forcing risk professionals to manage third-party risk at a new level. Point-in-time...

  • For Security & Risk Professionals

    Report

    Report Best Practices: Maximize The Business Value Of Biometrics

    Avoid Common Mistakes To Realize The Benefits Of Biometrics

    Biometrics helps your employees and customers engage more securely and seamlessly with your business. However, business leaders are often hesitant to consider biometrics because of unfamiliarity...

  • For Security & Risk Professionals

    Report

    Report Extend Compliance And Risk Management To What Really Matters For Your Business

    Landscape: The Governance, Risk, And Compliance Playbook
    October 16, 2017 | Renee Murphy

    Risk management professionals should concern themselves with two types of risk: those that threaten the company with losses and fines and those that threaten its long-term viability. To really...

  • For Security & Risk Professionals

    Report

    Report Use Forrester's CISO Strategic Canvas To Align Security With Business

    Strategic Plan: The S&R Practice Playbook
    October 16, 2017 | Jeff Pollard

    Security leaders know it's critical to align their efforts to the business, speak their business colleagues' language, and show support for business objectives. But with never-ending inbound...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Data Classification, Q3 2017

    Select The Right Tool To Advance Your Classification Initiative
    October 12, 2017 | Heidi Shey

    Data classification helps to define your data so the technology solutions and people you employ can better understand how to handle sensitive information. It's a capability you can acquire as a...

  • For Security & Risk Professionals

    Report

    Report Best Practices: Securing IoT Deployments

    Addressing The Most Common IoT Security Threats
    October 11, 2017 | Merritt Maxim

    IoT technology has the potential to improve customer outcomes and deliver significant business benefits. However, the highly interconnected nature of IoT deployments, coupled with their scale and...

  • For Security & Risk Professionals

    Report

    Report The Future Of Identity And Access Management

    Vision: The Identity And Access Management Playbook
    October 10, 2017 | Andras Cser, Merritt Maxim

    Identity and access management (IAM) technologies have become critical in the fight to protect customers from fraud, identity theft, and privacy abuses. Business leaders, CIOs, and CISOs use these...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: eCommerce And Retail Fraud Management Solutions, Q3 2017

    A Focus On Accepting Orders And Business Growth Transforms The Market
    October 6, 2017 | Andras Cser

    As security, risk, and fraud management professionals strive to secure every digital touchpoint of the customer journey, they've discovered that it's imperative to update eCommerce and retail fraud...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security And Privacy, Q4 2017

    Road Map: The Data Security And Privacy Playbook

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

  • For Security & Risk Professionals

    Report

    Report Forrester's IAM Maturity Assessment

    Assessment: The Identity And Access Management Playbook
    October 4, 2017 | Merritt Maxim, Andras Cser

    Security leaders often struggle to understand the gaps and potential security vulnerabilities related to the broad range of identity and access management (IAM) functional areas such as identity...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Runtime Application Self-Protection

    Protect Your Imperfect Code Until It Can Be Fixed
    September 29, 2017 | Amy DeMartine

    Even with the best prerelease security testing, developers will never write perfectly secure code. Zero-day attacks will continue to target vulnerable open source components, third-party...

Content categories

Refine your results

Date Range

Industry

Topics

Methodology

Region

Vendor

Analyst

Market Imperatives