1011 results in Reports
Sort by:
Refine
  • Security & Risk

Search Results

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Governance, Risk, And Compliance Platforms, Q1 2018

    The 14 Providers That Matter Most And How They Stack Up
    February 15, 2018 | Renee Murphy, Claire O'Malley

    In our 23-criteria evaluation of governance, risk, and compliance (GRC) platforms, we identified the 14 most significant ones — ACL, Enablon, IBM, LogicManager, MetricStream, Nasdaq, NAVEX Global,...

  • For Security & Risk Professionals

    Report

    Report Protect Your Executives From Cybercriminals, Fraudsters, And Themselves

    Key Steps To Shield Business Leaders From Cyberattacks, Social Engineering, And Virtual Imposters

    Business executives are frequent, easy, and attractive targets for cybercriminals. In this report, we explain how cybercriminals and fraudsters target business leaders and how those executives' own...

  • For Security & Risk Professionals

    Report

    Report The State Of Endpoint Security, 2018

    New Threats Are Driving Technology Consolidation
    February 5, 2018 | Chris Sherman, Salvatore Schiano

    Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns, helping security...

  • For Security & Risk Professionals

    Report

    Report Harden Your Human Firewall

    Continuous Improvement: The S&R Practice Playbook
    February 2, 2018 | Nick Hayes, Claire O'Malley

    Human mistakes can render even the most sophisticated technical security controls useless. However, you can reduce the inherent vulnerability of your workforce and even turn staff into a strong...

  • For Security & Risk Professionals

    Report

    Report Now Tech: Endpoint Detection And Response, Q1 2018

    Tools And Technology: The Security Architecture And Operations Playbook
    February 1, 2018 | Josh Zelonis

    You can use endpoint detection and response (EDR) offerings to improve endpoint visibility, orchestrate threat remediation, and achieve superior threat hunting. But to access these benefits, you'll...

  • For Security & Risk Professionals

    Report

    Report The State Of GDPR Readiness

    GDPR Readiness Progresses, But Strategies Depend Too Heavily On IT
    January 31, 2018 | Enza Iannopollo

    With the deadline for GDPR compliance looming in May 2018, it's a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of...

  • For Security & Risk Professionals

    Report

    Report Define And Articulate The Role Of Risk Management

    Processes: The Governance, Risk, And Compliance Playbook
    January 25, 2018 | Christopher McClean

    As a risk professional, you are now in a position to exert more influence on your firm and increase the value your team offers, but if your efforts are unfocused, determining success will be...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From The World's Most Notable Privacy Abuses And Security Incidents, 2017

    Continuous Improvement: The Data Security And Privacy Playbook
    January 23, 2018 | Heidi Shey, Josh Zelonis

    Breaking news of a massive customer breach or blatant privacy abuse dominates the headlines for days. However, months and even years later, affected customers still struggle with the aftermath and...

  • For Security & Risk Professionals

    Report

    Report Security Budgets 2018: Uncertainty Trumps Normalcy

    Benchmarks: The S&R Practice Playbook
    January 23, 2018 | Jeff Pollard

    Security leaders will find no escape from the pressures that shape their budgets this year. Data breaches, stiff competition for talent, and decentralized technology spending are still major...

  • For Security & Risk Professionals

    Report

    Report The State Of Application Security, 2018

    Application Security Is Worsening, But Automation Offers Hope
    January 23, 2018 | Amy DeMartine

    In 2017, applications rolled out the welcome mat to malicious hackers, topping the list of successful external attack targets. Why? Developers continue transitioning from perfect to fast to provide...

  • For Security & Risk Professionals

    Report

    Report The Zero Trust eXtended (ZTX) Ecosystem

    Extending Zero Trust Security Across Your Digital Business
    January 19, 2018 | Chase Cunningham

    Security pros are still scrambling for new and effective ways to protect their networks and combat the impacts of hacking and exploitation. With Forrester's Zero Trust Model of information...

  • For Security & Risk Professionals

    Report

    Report The US Healthcare Security Benchmark 2017 To 2018

    Healthcare Providers Must Improve Security For Digital Transformation
    January 17, 2018 | Salvatore Schiano, Chris Sherman

    IT security budgets at US healthcare organizations have lagged behind other industries. In a highly regulated industry, budget constraints have made compliance challenging and impeded security...

  • For Security & Risk Professionals

    Report

    Report Top Trends Shaping IAM In 2018

    Landscape: The Identity And Access Management Playbook
    January 9, 2018 | Andras Cser, Merritt Maxim

    For today's digital businesses, identity and access management (IAM) involves more than just provisioning and enforcing employee access to corporate applications and data. Security and risk (S&R)...

  • For Security & Risk Professionals

    Report

    Report The State Of IoT Security 2018

    There Is Growing Awareness Of IoT Threats, But Deployments Are Still At Risk
    January 9, 2018 | Merritt Maxim

    IoT technology enables businesses to optimize processes, enhance product offerings, and transform the customer experience. While business leaders are excited about the business insights they will...

  • For Security & Risk Professionals

    Report

    Report Best Practices: Selecting, Deploying, And Managing Enterprise Password Managers

    Solutions Reduce The Risk Of Breaches From Compromised Credentials
    January 8, 2018 | Merritt Maxim, Andras Cser

    Despite the known risks, passwords remain the most common method of user authentication. The increased number of apps employees need for their jobs, coupled with the effort required to migrate to...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Fatal Chip Flaws Set Security Back Decades

    CISOs And CIOs Must Act Immediately To Weather The Chip-Ocalypse

    This week, researchers revealed two critical flaws, Meltdown and Spectre, that impact billions of mobile phones, laptops, servers, and cloud services running on chips from suppliers including AMD,...

  • For Security & Risk Professionals

    Report

    Report Equifax Exposed Two Massive Systemic Risks

    Flaws In The Data Economy Will Make Future Breaches Even More Frequent And Damaging
    December 19, 2017 | Amy DeMartine, Jeff Pollard, Heidi Shey

    In September 2017, Equifax announced a breach of sensitive personal information of 143 million US consumers, as well as consumers in the UK and Canada. The scale and scope of the breach foretell...

  • For Security & Risk Professionals

    Report

    Report Five Steps To A Zero Trust Network

    Road Map: The Security Architecture And Operations Playbook

    A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. Zero Trust mandates the creation of microperimeters of control around an enterprise's...

  • For Security & Risk Professionals

    Report

    Report The Forrester Tech Tide™: Identity And Access Management, Q4 2017

    Road Map: The Identity And Access Management Playbook
    December 12, 2017 | Andras Cser, Merritt Maxim

    Identity and access management (IAM) is critical to protecting customers from identify theft and privacy abuses, limiting the potential for and impact of a cyberattack, and streamlining numerous...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Static Application Security Testing, Q4 2017

    The 10 Vendors That Matter Most And How They Stack Up
    December 12, 2017 | Amy DeMartine

    In our 29-criteria evaluation of the static application security testing (SAST) market, we identified the 10 most significant vendors — CAST, CA Veracode, Checkmarx, IBM, Micro Focus, Parasoft,...

  • For Security & Risk Professionals

    Report

    Report Designate Clear Lines Of Risk And Compliance Accountability With Forrester's RASCI Tool

    Organization: The Governance, Risk, And Compliance Playbook
    December 8, 2017 | Nick Hayes

    Without clearly defined GRC responsibilities, stakeholder involvement flounders, risks go unnoticed and untreated, and company exposure to large fines and devastating crises grows. This report...

  • For Security & Risk Professionals

    Report

    Report CISO Career Paths: Plot Your Course For Advancement

    Look Up And Out For Your Next Promotion
    December 7, 2017 | Jeff Pollard

    The CISO role is evolving rapidly, so there is no standard guidebook to getting hired, progressing, or succeeding as a CISO. To understand the skills, experience, and education that qualify leaders...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: DDoS Mitigation Solutions, Q4 2017

    The 11 Providers That Matter Most And How They Stack Up
    December 7, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of DDoS mitigation providers, we identified 11 of the most significant ones — Akamai Technologies, Arbor Networks, Cloudflare, F5 Networks, Fortinet, Huawei...

  • For Security & Risk Professionals

    Report

    Report The State Of Risk Management 2017

    Benchmarks: The Governance, Risk, And Compliance Playbook
    December 5, 2017 | Christopher McClean

    Executives must take big bets on new technologies, business models, and emerging markets to stay ahead of the fast pace of competition. With so much at stake and so many public examples of...

  • For Security & Risk Professionals

    Report

    Report Develop Your Zero Trust Workforce Security Strategy

    Strategic Plan: The Security Architecture And Operations Playbook
    December 5, 2017 | Chase Cunningham

    The concepts and practices that enable a Zero Trust network are well established. While your extended networks and infrastructure are more secure, you still have a final hurdle to clear to achieve...

Content categories

Refine your results

Date Range

Industry

Topics

Methodology

Region

Vendor

Analyst

Market Imperatives