Advanced Search
492 results in Reports
Sort by:
Refine
  • Security Operations & Program Governance

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report Forrester's Guide To Drone Security Risks

    S&R Pros Must Prepare Their Businesses Today For Rapid Drone Adoption
    April 27, 2017 | Merritt Maxim, Salvatore Schiano

    Drones are no longer just a buzzword or hip gadget for amateur hobbyists. Organizations are increasingly deploying drones in a wide range of applications from agriculture to law enforcement. But...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook
    April 26, 2017 | Merritt Maxim, Jeff Pollard

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Best Practices For Minimizing Business Travel Risk

    Detailed Guides For Preventing Cybertheft, Espionage, And Physical Harm
    April 24, 2017 | Heidi Shey, Merritt Maxim

    Determined adversaries will stop at nothing to infiltrate your firm for its sensitive data, and employees who travel for business or take their devices on the road often become a vulnerability that...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Global Managed Security Services, 2017

    Converged Services Thrive While Isolated Offerings Go Extinct
    April 24, 2017 | Jeff Pollard

    For security pros looking to augment their programs with services partners, this is an age of abundance — abundant budget and abundant choice. But sometimes too many choices is just as bad as no...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Vulnerability Management, 2017

    Software Vulnerabilities Are The Leading Means Of External Attacks — It's Time To Do Something About It
    April 21, 2017 | Josh Zelonis

    Breaches can undermine customer trust, endanger revenue growth and profits, and permanently tarnish reputations. According to our data, software vulnerabilities are the single largest factor in...

  • For Security & Risk Professionals

    Report

    Report Breakout Vendors: Security Automation And Orchestration (SAO)

    SAO Will Gain Widespread Adoption In 24 Months
    April 18, 2017 | Joseph Blankenship

    Security and risk (S&R) professionals are under increasing strain as they struggle to keep pace with cyberthreats, manage a complex technology environment, and hire experienced staff. These factors...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Physical Security, Q1 2017

    New Technologies Emerging To Improve Physical Security
    April 17, 2017 | Merritt Maxim

    This TechRadar defines the use cases, business value, and outlook for the 14 most relevant and important technologies for physical security. This includes core technologies, such as converged...

  • For Security & Risk Professionals

    Report

    Report Achieve Early Success In Threat Intelligence With The Right Collection Strategy

    S&R Pros Must Use Strategic Intelligence To Maximize Their Investment
    April 11, 2017 | Josh Zelonis

    Threat intelligence is a different animal than most security and risk (S&R) professionals are used to dealing with. For those new to the space, getting started can feel like an overwhelming...

  • For Security & Risk Professionals

    Report

    Report Top Seven Recommendations For Your Security Program In 2017

    April 7, 2017 | Jeff Pollard, Amy DeMartine

    Each year, Forrester outlines important recommendations for a successful security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Jump-Start Zero Trust With Forrester's Reference Architecture

    A Blueprint For Protecting Customers And Employees With Zero Trust
    March 27, 2017 | Laura Koetzle, Andre Kindness

    Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security: In Zero Trust, all network traffic is inherently untrusted. In this report, we...

  • For Security & Risk Professionals

    Report

    Report Mature Cybersecurity Incident Response Requires Legal Advice

    Engage Legal To Help Your CEO Make Smart Decisions and Improve Breach Response
    March 13, 2017 | Josh Zelonis

    Business and technology leaders often dismiss lawyers as pedantic and obstacles to productivity. This is certainly something security and risk pros can relate to. However, it's important to get...

  • For Security & Risk Professionals

    Report

    Report Improve Physical Security And Customer Experience

    S&R Pros Must Develop Five Essential Capabilities In 2017
    March 9, 2017 | Merritt Maxim

    Every customer interaction plays a vital role in shaping that customer's confidence in your brand. While many businesses have heavily invested in optimizing the digital customer experience (CX),...

  • For Security & Risk Professionals

    Report

    Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...

  • For CIO Professionals

    Report

    Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities

    March 6, 2017 | Kate McCarthy, Chris Sherman

    Healthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Security Analytics Platforms, Q1 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    March 6, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman...

  • For Security & Risk Professionals

    Report

    Report Structure Your Security Practice For Success

    Organization: The S&R Practice Playbook
    March 2, 2017 | Christopher McClean

    CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. While org structure can affect how well the security...

  • For CIO Professionals

    Report

    Report The Top Emerging Technologies For Digital Predators

    Tools And Technology: The CIO Digital Business Transformation Playbook
    March 1, 2017 | Nigel Fenwick, Ted Schadler

    CIOs must constantly evaluate an array of emerging technologies and determine where to incubate and where to increase investment. While the choices are as individual as the companies, the...

  • For Security & Risk Professionals

    Report

    Report Lessons From The Forrester Wave™: MSSPs, North America, Q3 2016

    The Characteristics Of Successful And Unsuccessful MSSP Engagements
    February 28, 2017 | Jeff Pollard, Claire O'Malley

    Despite the relative maturity of the managed security services provider (MSSP) market, customers and vendors far too often fail to sync up as true, successful partners. This report delves into the...

  • For Security & Risk Professionals

    Report

    Report Define A Road Map To Accelerate Your Security Program

    Road Map: The S&R Practice Playbook
    February 28, 2017 | Christopher McClean

    Turning a strategy into action is what really reveals a CISO's worth. A solid security road map is how you make this happen: guiding implementation activities, demonstrating an understanding of key...

  • For Security & Risk Professionals

    Report

    Report Build A Cross-Functional Mobile Security Team

    Organization: The Mobile Security Playbook
    February 22, 2017 | Chris Sherman

    As security leaders look to support business engagement with customers, partners, and employees through mobile, they often discover gaps in team expertise. To better organize talent, security execs...

  • For Security & Risk Professionals

    Report

    Report Define A Compelling Strategy To Secure And Protect Mobile Moments

    Strategic Plan: The Mobile Security Playbook
    February 14, 2017 | Laura Koetzle, Chris Sherman

    This report helps security and risk (S&R) leaders develop comprehensive strategic mobile security plans to secure and protect both employees' and customers' mobile moments — without degrading the...

  • For Security & Risk Professionals

    Report

    Report Design Mobile Security Metrics With Mobile Moments In Mind

    Performance Management: The Mobile Security Playbook
    February 13, 2017 | Jeff Pollard

    Security leaders struggling to demonstrate business value need to incorporate mobile security metrics into their reports. As companies adopt the mobile mind shift, mobile security metrics are often...

  • For Security & Risk Professionals

    Report

    Report How To Become A Superstar Security Leader

    Vision: The S&R Practice Playbook
    February 13, 2017 | Christopher McClean, Claire O'Malley

    As companies seek to innovate and engage customers through digital channels, they need superstar security leaders — business executives who know how to protect, support, and drive performance. This...

  • For Security & Risk Professionals

    Report

    Report Zero Trust Security Metrics That Matter To The Business

    Performance Management: The Security Architecture And Operations Playbook
    February 9, 2017 | Stephanie Balaouras

    Forrester's Zero Trust (ZT) Model of information security demands that security teams eliminate the dangerous trust assumptions underpinning perimeter-based security architectures. When you embrace...

  • For Security & Risk Professionals

    Report

    Report Maximize Business Performance With A World-Class GRC Program

    Executive Overview: The Governance, Risk, And Compliance Playbook
    February 2, 2017 | Claire O'Malley, Renee Murphy

    Governance, risk, and compliance (GRC) programs are essential for protecting business value and maximizing business performance. However, too many organizations lack well-defined GRC programs or...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst