Advanced Search
939 results in Reports
Sort by:
Refine
  • Security & Risk

Search Results

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Global Managed Security Services, 2017

    Converged Services Thrive While Isolated Offerings Go Extinct
    April 24, 2017 | Jeff Pollard

    For security pros looking to augment their programs with services partners, this is an age of abundance — abundant budget and abundant choice. But sometimes too many choices is just as bad as no...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Vulnerability Management, 2017

    Software Vulnerabilities Are The Leading Means Of External Attacks — It's Time To Do Something About It
    April 21, 2017 | Josh Zelonis

    Breaches can undermine customer trust, endanger revenue growth and profits, and permanently tarnish reputations. According to our data, software vulnerabilities are the single largest factor in...

  • For Security & Risk Professionals

    Report

    Report Assess Your Data Privacy Practices With The Forrester Privacy And GDPR Maturity Model

    Assessment: The Data Security And Privacy Playbook
    April 21, 2017 | Enza Iannopollo, Renee Murphy

    Protecting customers' privacy is a priority for firms around the world. But data privacy standards differ widely from one country to the next — in fact, there are over 100 variations globally....

  • For Security & Risk Professionals

    Report

    Report Breakout Vendors: Security Automation And Orchestration (SAO)

    SAO Will Gain Widespread Adoption In 24 Months
    April 18, 2017 | Joseph Blankenship

    Security and risk (S&R) professionals are under increasing strain as they struggle to keep pace with cyberthreats, manage a complex technology environment, and hire experienced staff. These factors...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Physical Security, Q2 2017

    New Technologies Emerging To Improve Physical Security
    April 17, 2017 | Merritt Maxim

    This Techradar defines the use cases, business value, and outlook for the 14 most relevant and important technologies for physical security. This includes core technologies, such as converged...

  • For Security & Risk Professionals

    Report

    Report Ten Basic Steps To Secure Software Containers

    Instructions For Safely Developing And Deploying Software In Containers
    April 14, 2017 | Amy DeMartine, Dave Bartoletti

    Software containers help developers incorporate new microservice application designs, build and release code faster, and push fixes through testing more frequently. Today, most organizations use...

  • For Security & Risk Professionals

    Report

    Report Cultivate Culture For Sustained GRC Performance

    Continuous Improvement: The Governance, Risk, And Compliance Playbook
    April 12, 2017 | Nick Hayes

    A corporate culture with strong values is integral to governance, risk, and compliance (GRC) programs — and, therefore, to the entire company. This report explains how significantly culture affects...

  • For Security & Risk Professionals

    Report

    Report Achieve Early Success In Threat Intelligence With The Right Collection Strategy

    S&R Pros Must Use Strategic Intelligence To Maximize Their Investment
    April 11, 2017 | Josh Zelonis

    Threat intelligence is a different animal than most security and risk (S&R) professionals are used to dealing with. For those new to the space, getting started can feel like an overwhelming...

  • For Security & Risk Professionals

    Report

    Report Top Seven Recommendations For Your Security Program In 2017

    April 7, 2017 | Jeff Pollard, Amy DeMartine

    Each year, Forrester outlines important recommendations for a successful security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook
    April 3, 2017 | Andras Cser, Merritt Maxim

    Your strategic plan for identity and access management (IAM) must establish and explain the business need and value of IAM to both technology management and business leaders. It must also describe...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Anti-Money-Laundering Solutions, 2017

    Digital Innovation And Stricter Regulations Reinvigorate The AML Market
    March 29, 2017 | Andras Cser, Nick Hayes

    Due to recent global terrorist attacks; corporate corruption; and worsening illicit markets such as drugs, guns, and human trafficking; governments realize the importance of countering criminal and...

  • For Security & Risk Professionals

    Report

    Report Jump-Start Zero Trust With Forrester's Reference Architecture

    A Blueprint For Protecting Customers And Employees With Zero Trust
    March 27, 2017 | Laura Koetzle, Andre Kindness

    Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security: In Zero Trust, all network traffic is inherently untrusted. In this report, we...

  • For Security & Risk Professionals

    Report

    Report The Top IAM Trends From The RSA Conference 2017

    March 24, 2017 | Andras Cser, Merritt Maxim

    Although maturing quickly and available in new virtualized and containerized forms, identity and access management (IAM) is undergoing fundamental changes in response to: 1) hybrid cloud access...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Biometric Authentication, Q1 2017

    Adoption Of User- And Mobile-Friendly Biometrics Will Kill The Password
    March 14, 2017 | Andras Cser, Alexander Spiliotes

    As users increasingly demand frictionless authentication everywhere, biometrics solutions have garnered significant attention for both authentication and fraud prevention — especially on mobile and...

  • For Security & Risk Professionals

    Report

    Report Best Practices For Privacy And GDPR In Financial Services

    March 14, 2017 | Enza Iannopollo

    It's the job of security and privacy professionals in financial services (FS) firms to strike the right balance between more stringent data privacy rules and pressing demand for more innovative and...

  • For Security & Risk Professionals

    Report

    Report Mature Cybersecurity Incident Response Requires Legal Advice

    Engage Legal To Help Your CEO Make Smart Decisions and Improve Breach Response
    March 13, 2017 | Josh Zelonis

    Business and technology leaders often dismiss lawyers as pedantic and obstacles to productivity. This is certainly something security and risk pros can relate to. However, it's important to get...

  • For Security & Risk Professionals

    Report

    Report Quick Take: The CIA — Good At Spying, Bad At Data Loss Prevention

    Key Takeaways From The WikiLeaks Revelations Of Widespread CIA Device-Hacking
    March 10, 2017 | Jeff Pollard

    This week, controversial media organization WikiLeaks released a trove of leaked documents purporting to prove the existence of a sophisticated covert US Central Intelligence Agency (CIA) hacking...

  • For Security & Risk Professionals

    Report

    Report Improve Physical Security And Customer Experience

    S&R Pros Must Develop Five Essential Capabilities In 2017
    March 9, 2017 | Merritt Maxim

    Every customer interaction plays a vital role in shaping that customer's confidence in your brand. While many businesses have heavily invested in optimizing the digital customer experience (CX),...

  • For Security & Risk Professionals

    Report

    Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...

  • For Security & Risk Professionals

    Report

    Report Combat GRC Skeptics With A Dynamic Road Map

    Road Map: The Governance, Risk, And Compliance Playbook
    March 8, 2017 | Nick Hayes

    Lofty GRC visions and strategies falter without prescriptive plans that illustrate how you will reach higher GRC maturity and why such efforts are important for your organization. To help foster...

  • For Security & Risk Professionals

    Report

    Report Quick Take: CA Technologies Fills Its DevOps Security Gap With Veracode

    March 7, 2017 | Amy DeMartine

    Security and risk (S&R) pros need the benefits of combining the development and operations (DevOps) automatic software delivery pipeline with application security testing to give developers early,...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Security Analytics Platforms, Q1 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    March 6, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman...

  • For Security & Risk Professionals

    Report

    Report Mobile Application Authentication Trends And Best Practices

    The Right Authentication Method Can Make Or Break A Great Digital Experience
    March 2, 2017 | Andras Cser, Michael Facemire

    Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...

  • For Security & Risk Professionals

    Report

    Report Structure Your Security Practice For Success

    Organization: The S&R Practice Playbook
    March 2, 2017 | Christopher McClean

    CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. While org structure can affect how well the security...

  • For Security & Risk Professionals

    Report

    Report Lessons From The Forrester Wave™: MSSPs, North America, Q3 2016

    The Characteristics Of Successful And Unsuccessful MSSP Engagements
    February 28, 2017 | Jeff Pollard, Claire O'Malley

    Despite the relative maturity of the managed security services provider (MSSP) market, customers and vendors far too often fail to sync up as true, successful partners. This report delves into the...

Content categories

Refine your results

Date Range

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst