Advanced Search
929 results in Reports
Sort by:
Refine
  • Security & Risk

Search Results

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Biometric Authentication, Q1 2017

    Adoption Of User- And Mobile-Friendly Biometrics Will Kill The Password
    March 14, 2017 | Andras Cser, Alexander Spiliotes

    As users increasingly demand frictionless authentication everywhere, biometrics solutions have garnered significant attention for both authentication and fraud prevention — especially on mobile and...

  • For Security & Risk Professionals

    Report

    Report GDPR And Privacy Best Practices Of Financial Services Firms

    March 14, 2017 | Enza Iannopollo

    It's the job of security and privacy professionals in financial services (FS) firms to strike the right balance between more stringent data privacy rules and pressing demand for more innovative and...

  • For Security & Risk Professionals

    Report

    Report Mature Cybersecurity Incident Response Requires Legal Advice

    Engage Legal To Help Your CEO Make Smart Decisions and Improve Breach Response
    March 13, 2017 | Josh Zelonis

    Business and technology leaders often dismiss lawyers as pedantic and obstacles to productivity. This is certainly something security and risk pros can relate to. However, it's important to get...

  • For Security & Risk Professionals

    Report

    Report Quick Take: The CIA — Good At Spying, Bad At Data Loss Prevention

    Key Takeaways From The WikiLeaks Revelations Of Widespread CIA Device-Hacking
    March 10, 2017 | Jeff Pollard

    This week, controversial media organization WikiLeaks released a trove of leaked documents purporting to prove the existence of a sophisticated covert US Central Intelligence Agency (CIA) hacking...

  • For Security & Risk Professionals

    Report

    Report Improve Physical Security And Customer Experience

    S&R Pros Must Develop Five Essential Capabilities In 2017
    March 9, 2017 | Merritt Maxim

    Every customer interaction plays a vital role in shaping that customer's confidence in your brand. While many businesses have heavily invested in optimizing the digital customer experience (CX),...

  • For Security & Risk Professionals

    Report

    Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...

  • For Security & Risk Professionals

    Report

    Report Combat GRC Skeptics With A Dynamic Road Map

    Road Map: The Governance, Risk, And Compliance Playbook
    March 8, 2017 | Nick Hayes

    Lofty GRC visions and strategies falter without prescriptive plans that illustrate how you will reach higher GRC maturity and why such efforts are important for your organization. To help foster...

  • For Security & Risk Professionals

    Report

    Report Quick Take: CA Technologies Fills Its DevOps Security Gap With Veracode

    March 7, 2017 | Amy DeMartine

    Security and risk (S&R) pros need the benefits of combining the development and operations (DevOps) automatic software delivery pipeline with application security testing to give developers early,...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Security Analytics Platforms, Q1 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    March 6, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman...

  • For Security & Risk Professionals

    Report

    Report Mobile Application Authentication Trends And Best Practices

    The Right Authentication Method Can Make Or Break A Great Digital Experience
    March 2, 2017 | Andras Cser, Michael Facemire

    Authenticating users in native mobile applications is a key challenge for today's security and risk (S&R) professionals. They must ensure that the user experience is seamless and that the app...

  • For Security & Risk Professionals

    Report

    Report Structure Your Security Practice For Success

    Organization: The S&R Practice Playbook
    March 2, 2017 | Christopher McClean

    CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. While org structure can affect how well the security...

  • For Security & Risk Professionals

    Report

    Report Lessons From The Forrester Wave™: MSSPs, North America, Q3 2016

    The Characteristics Of Successful And Unsuccessful MSSP Engagements
    February 28, 2017 | Jeff Pollard, Claire O'Malley

    Despite the relative maturity of the managed security services provider (MSSP) market, customers and vendors far too often fail to sync up as true, successful partners. This report delves into the...

  • For Security & Risk Professionals

    Report

    Report Define A Road Map To Accelerate Your Security Program

    Road Map: The S&R Practice Playbook
    February 28, 2017 | Christopher McClean

    Turning a strategy into action is what really reveals a CISO's worth. A solid security road map is how you make this happen: guiding implementation activities, demonstrating an understanding of key...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Data Classification For Security And Privacy

    Firms That Understand The Value Of Data Classify Their Data
    February 24, 2017 | Heidi Shey

    Data classification is a core component of defining and understanding data that security and risk (S&R) pros must protect, as well as identifying the way employees should handle it and the types of...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Software Composition Analysis, Q1 2017

    The Six Providers That Matter Most And How They Stack Up
    February 23, 2017 | Amy DeMartine

    In our 38-criteria evaluation of software composition analysis (SCA) providers, we identified the six most significant ones — Black Duck Software, Flexera Software, Sonatype, Synopsys, Veracode,...

  • For Security & Risk Professionals

    Report

    Report Build A Cross-Functional Mobile Security Team

    Organization: The Mobile Security Playbook
    February 22, 2017 | Chris Sherman

    As security leaders look to support business engagement with customers, partners, and employees through mobile, they often discover gaps in team expertise. To better organize talent, security execs...

  • For Security & Risk Professionals

    Report

    Report Define A Compelling Strategy To Secure And Protect Mobile Moments

    Strategic Plan: The Mobile Security Playbook
    February 14, 2017 | Laura Koetzle, Chris Sherman

    This report helps security and risk (S&R) leaders develop comprehensive strategic mobile security plans to secure and protect both employees' and customers' mobile moments — without degrading the...

  • For Security & Risk Professionals

    Report

    Report Build The Business Case For GRC

    Business Case: The Governance, Risk, And Compliance Playbook
    February 14, 2017 | Nick Hayes

    Before you can build a GRC program capable of addressing today's top business threats, you first need to obtain the necessary budget and leadership support to turn your GRC vision into reality....

  • For Security & Risk Professionals

    Report

    Report The Best Of Website Experiences And Security Strength: US Online Retail Banks 2017

    Continuous Improvement: The Identity And Access Management Playbook
    February 14, 2017 | Andras Cser, Merritt Maxim

    In a race to meet customer acquisition and retention targets while reducing account takeover (ATO) fraud, financial service firms have strived to ensure that their sites are both secure and easy to...

  • For Security & Risk Professionals

    Report

    Report Design Mobile Security Metrics With Mobile Moments In Mind

    Performance Management: The Mobile Security Playbook
    February 13, 2017 | Jeff Pollard

    Security leaders struggling to demonstrate business value need to incorporate mobile security metrics into their reports. As companies adopt the mobile mind shift, mobile security metrics are often...

  • For Security & Risk Professionals

    Report

    Report How To Become A Superstar Security Leader

    Vision: The S&R Practice Playbook
    February 13, 2017 | Christopher McClean, Claire O'Malley

    As companies seek to innovate and engage customers through digital channels, they need superstar security leaders — business executives who know how to protect, support, and drive performance. This...

  • For Security & Risk Professionals

    Report

    Report Zero Trust Security Metrics That Matter To The Business

    Performance Management: The Security Architecture And Operations Playbook
    February 9, 2017 | Stephanie Balaouras

    Forrester's Zero Trust (ZT) Model of information security demands that security teams eliminate the dangerous trust assumptions underpinning perimeter-based security architectures. When you embrace...

  • For Security & Risk Professionals

    Report

    Report Secure And Protect Mobile Moments

    Executive Overview: The Mobile Security Playbook
    February 6, 2017 | Christopher McClean

    The mobile mind shift is an expectation that an individual can get what she wants in her immediate context and moment of need. This shift applies to your customers and your employees....

  • For Security & Risk Professionals

    Report

    Report Navigate The Future Of Mobile Security

    Vision: The Mobile Security Playbook
    February 6, 2017 | Stephanie Balaouras, Andras Cser

    The speed at which: 1) employees have adopted mobile applications and 2) DevOps methodologies are increasing application releases has forced security and risk (S&R) pros to revamp how they approach...

  • For Security & Risk Professionals

    Report

    Report GRC Vision 2017-2022: Customer Demands Escalate As Regulators Falter

    Vision: The Governance, Risk, And Compliance Playbook
    February 2, 2017 | Christopher McClean, Nick Hayes

    In reaction to sweeping regulations and massive corporate failures, governance, risk management, and compliance (GRC) efforts have evolved slowly over the past 15 years. However, in the next five...

Content categories

Refine your results

Date Range

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst