505 results in Reports
Sort by:
Refine
  • Security Operations & Program Governance

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Data From Mutating Threats With A Zero Trust Network

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For CIO Professionals

    Report

    Report The Top 10 Technology Trends To Watch: 2018 To 2020

    Ten Trends Will Help You Maximize The Value Of Business Technology

    Maximizing the value of your business technology investments requires an understanding of trends — not just as interesting reading but as vital clues to your firm's future success and, possibly,...

  • For Security & Risk Professionals

    Report

    Report Use Forrester's CISO Strategic Canvas To Align Security With Business

    Strategic Plan: The S&R Practice Playbook
    October 16, 2017 | Jeff Pollard

    Security leaders know it's critical to align their efforts to the business, speak their business colleagues' language, and show support for business objectives. But with never-ending inbound...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Digital Forensics And Incident Response Service Providers, Q3 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    September 28, 2017 | Josh Zelonis

    In our 18-criteria evaluation of digital forensics and incident response service providers, we identified the 14 most significant ones — CrowdStrike, Cylance, Deloitte, KPMG, Mandiant, Optiv,...

  • For Security & Risk Professionals

    Report

    Report Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

    Executive Overview: The Security Architecture And Operations Playbook
    September 19, 2017 | Stephanie Balaouras, Heidi Shey

    In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

  • For Security & Risk Professionals

    Report

    Report Forrester's 2017 Interactive Data Privacy Heat Map

    Landscape: The Data Security And Privacy Playbook
    September 14, 2017 | Enza Iannopollo, Chris Sherman, Heidi Shey

    To help S&R professionals navigate the complex landscape of privacy laws around the world, Forrester created the Data Privacy Heat Map, which explains the data protection guidelines and practices...

  • For Security & Risk Professionals

    Report

    Report Calculate The Business Impact And Cost Of A Breach

    Business Case: The Data Security And Privacy Playbook
    August 31, 2017 | Heidi Shey

    The business impact and cost of a breach are notoriously difficult to measure. A data breach initiates a tangle of direct and indirect costs, with some accruing in the immediate aftermath and...

  • For Security & Risk Professionals

    Report

    Report Maintain Your Security Edge

    Continuous Improvement: The Security Architecture And Operations Playbook
    August 25, 2017 | Heidi Shey, Jeff Pollard

    New security objectives and approaches call for shifts in architecture and operations — but more importantly, for security leaders to reassess their investments in their most valuable asset:...

  • For Security & Risk Professionals

    Report

    Report Forrester Data: Endpoint Security Software Forecast, 2016 To 2021 (Global)

    ForecastView Document
    August 22, 2017 | Jennifer Adams, Chris Sherman

    Hackers are creating new, more sophisticated malware daily, and endpoint security solutions provide a critical line of defense to protect PCs, laptops, and servers from these malicious threats....

  • For Security & Risk Professionals

    Report

    Report Ransomware Protection: Five Best Practices

    Harden Your Defenses Now For This Growing Threat
    July 27, 2017 | Chris Sherman, Salvatore Schiano

    Ransomware is holding enterprises hostage. Recent outbreaks from variants such as WannaCry and Petya have many security and risk (S&R) pros wondering if they can prevent this growing threat. By...

  • For Security & Risk Professionals

    Report

    Report Measure GRC Performance To Show Processes And Data Reliability

    Performance Management: The Governance, Risk, And Compliance Playbook
    July 27, 2017 | Renee Murphy

    The more complex a program is, the more difficult it is to maintain it, and the faster and more devastating its breakdown can be. Strong performance management is a way for risk management...

  • For Security & Risk Professionals

    Report

    Report Assess Your Exposure To Geopolitical Cyber Risk

    How To Identify The Impacts Of Geopolitical Dynamics Across Your Organization

    Geopolitical tensions around the world are spawning nearly constant cyberattacks on unprepared private sector firms. These cyberattacks result in millions of dollars in lost customer trust, as well...

  • For Security & Risk Professionals

    Report

    Report The Market For Managed Detection And Response Booms In 2017

    Cyberattacks And Skill Shortages Drive MDR Demand
    July 21, 2017 | Jeff Pollard

    Managed detection and response (MDR) has emerged as a specific category of managed security services (MSS) in the last 12 months. Security and risk (S&R) pros thinking about investing in MDR...

  • For Security & Risk Professionals

    Report

    Report Remove The Mystery From Security Metrics

    Performance Management: The S&R Practice Playbook
    July 18, 2017 | Jeff Pollard

    Difficulty creating meaningful metrics persists for chief information security officers (CISOs) despite a decade of discussion. Without good metrics, the security organization can't hope to...

  • For Security & Risk Professionals

    Report

    Report Honeypots 2.0: Deception Technology Lures Cybercriminals Into A Trap

    Hollywood Isn't The Only Industry Banking On Sequels
    July 18, 2017 | Josh Zelonis, Jeff Pollard

    Security and risk (S&R) professionals can leverage deception technologies that mimic real production applications and systems in an attempt to lure attackers into an intrusion. The concept isn't...

  • For Security & Risk Professionals

    Report

    Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Security Architecture And Operations Playbook
    July 5, 2017 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it is the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: External Threat Intelligence, 2017

    Look Beyond Your Own Perimeter To Understand And Prevent Threats
    June 26, 2017 | Josh Zelonis

    The threat intelligence market is muddled by confusing messaging that has hurt security and risk (S&R) pros' ability to succeed with their intelligence capabilities. This report provides a course...

  • For Security & Risk Professionals

    Report

    Report Hardcoded For Failure

    Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
    June 21, 2017 | Chase Cunningham

    There is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...

  • For Security & Risk Professionals

    Report

    Report Identify Companywide Roles And Responsibilities To Support Your GDPR Compliance Efforts

    Organization: The Data Security And Privacy Playbook
    June 20, 2017 | Enza Iannopollo

    Privacy and security professionals preparing to comply with the European Union's General Data Protection Regulation (GDPR), by May 2018, need the support of their peers across the organization....

  • For Infrastructure & Operations Professionals

    Report

    Report Reduce Risk And Improve Security Through Infrastructure Automation

    The Bad Guys Use Automation — Fight Fire With Fire

    Security initiatives are becoming increasingly difficult, if not impossible, to execute manually. As infrastructure-as-code (IaC) and internet-of-things (IoT) solutions proliferate, organizations...

  • For Security & Risk Professionals

    Report

    Report Creating Actionable Security And Privacy Policy

    Policy: The Data Security And Privacy Playbook
    May 3, 2017 | Heidi Shey

    Data security and privacy policies are ineffective and can even hinder business processes without a clear understanding of the data — from what it is to where it exists. Data identity is the...

  • For Infrastructure & Operations Professionals

    Report

    Report Best Practices: Strategies For Making The Crucial Shift To DevSecOps

    May 1, 2017 | Milan Hanson

    Cybersecurity needs help from infrastructure and operations (I&O) teams. Threats are evolving faster than ever and becoming increasingly sophisticated. Consumers drive shorter release cycles by...

  • For Security & Risk Professionals

    Report

    Report Forrester's Guide To Drone Security Risks

    S&R Pros Must Prepare Their Businesses Today For Rapid Drone Adoption
    April 27, 2017 | Merritt Maxim, Salvatore Schiano

    Drones are no longer just a buzzword or hip gadget for amateur hobbyists. Organizations are increasingly deploying drones in a wide range of applications from agriculture to law enforcement. But...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Best Practices For Minimizing Business Travel Risk

    Detailed Guides For Preventing Cybertheft, Espionage, And Physical Harm

    Determined adversaries will stop at nothing to infiltrate your firm for its sensitive data, and employees who travel for business or take their devices on the road often become a vulnerability that...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Global Managed Security Services, 2017

    Converged Services Thrive While Isolated Offerings Go Extinct
    April 24, 2017 | Jeff Pollard

    For security pros looking to augment their programs with services partners, this is an age of abundance — abundant budget and abundant choice. But sometimes too many choices is just as bad as no...

Content categories

Refine your results

Date Range

Industry

Primary Role

Topics

Methodology

Region

Vendor

Analyst

Market Imperatives