497 results in Reports
Sort by:
Refine
  • Security Operations & Program Governance

Featured content

The Security Architecture And Operations Playbook For 2017

Defend Your Digital Business From Cyberattacks Using Forrester's Zero Trust Model

In today's threat landscape, skilled, well-funded, organized cybercriminals are working to steal your data — the lifeblood of your digital business — in pursuit of economic, political, or military...

Search Results

  • For Security & Risk Professionals

    Report

    Report Hardcoded For Failure

    Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
    June 21, 2017 | Chase Cunningham

    There is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...

  • For Security & Risk Professionals

    Report

    Report Identify Companywide Roles And Responsibilities To Support Your GDPR Compliance Efforts

    Many Teams Contribute To The Success Of Your Privacy And GDPR Strategy
    June 20, 2017 | Enza Iannopollo

    Privacy and security professionals preparing to comply with the European Union's General Data Protection Regulation (GDPR), by May 2018, need the support of their peers across the organization....

  • For Infrastructure & Operations Professionals

    Report

    Report Reduce Risk And Improve Security Through Infrastructure Automation

    The Bad Guys Use Automation — Fight Fire With Fire

    Security initiatives are becoming increasingly difficult, if not impossible, to execute manually. As infrastructure-as-code (IaC) and internet-of-things (IoT) solutions proliferate, organizations...

  • For Security & Risk Professionals

    Report

    Report Creating Actionable Security And Privacy Policy

    Policy: The Data Security And Privacy Playbook
    May 3, 2017 | Heidi Shey

    Data security and privacy policies are ineffective and can even hinder business processes without a clear understanding of the data — from what it is to where it exists. Data identity is the...

  • For Infrastructure & Operations Professionals

    Report

    Report Best Practices: Strategies For Making The Crucial Shift To DevSecOps

    May 1, 2017 | Milan Hanson

    Cybersecurity needs help from infrastructure and operations (I&O) teams. Threats are evolving faster than ever and becoming increasingly sophisticated. Consumers drive shorter release cycles by...

  • For Security & Risk Professionals

    Report

    Report Forrester's Guide To Drone Security Risks

    S&R Pros Must Prepare Their Businesses Today For Rapid Drone Adoption
    April 27, 2017 | Merritt Maxim, Salvatore Schiano

    Drones are no longer just a buzzword or hip gadget for amateur hobbyists. Organizations are increasingly deploying drones in a wide range of applications from agriculture to law enforcement. But...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook
    April 26, 2017 | Merritt Maxim, Jeff Pollard

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Best Practices For Minimizing Business Travel Risk

    Detailed Guides For Preventing Cybertheft, Espionage, And Physical Harm
    April 24, 2017 | Heidi Shey, Merritt Maxim

    Determined adversaries will stop at nothing to infiltrate your firm for its sensitive data, and employees who travel for business or take their devices on the road often become a vulnerability that...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Global Managed Security Services, 2017

    Converged Services Thrive While Isolated Offerings Go Extinct
    April 24, 2017 | Jeff Pollard

    For security pros looking to augment their programs with services partners, this is an age of abundance — abundant budget and abundant choice. But sometimes too many choices is just as bad as no...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Vulnerability Management, 2017

    Software Vulnerabilities Are The Leading Means Of External Attacks — It's Time To Do Something About It
    April 21, 2017 | Josh Zelonis

    Breaches can undermine customer trust, endanger revenue growth and profits, and permanently tarnish reputations. According to our data, software vulnerabilities are the single largest factor in...

  • For Security & Risk Professionals

    Report

    Report Breakout Vendors: Security Automation And Orchestration (SAO)

    SAO Will Gain Widespread Adoption In 24 Months
    April 18, 2017 | Joseph Blankenship

    Security and risk (S&R) professionals are under increasing strain as they struggle to keep pace with cyberthreats, manage a complex technology environment, and hire experienced staff. These factors...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Physical Security, Q1 2017

    New Technologies Emerging To Improve Physical Security
    April 17, 2017 | Merritt Maxim

    This TechRadar defines the use cases, business value, and outlook for the 14 most relevant and important technologies for physical security. This includes core technologies, such as converged...

  • For Security & Risk Professionals

    Report

    Report Achieve Early Success In Threat Intelligence With The Right Collection Strategy

    S&R Pros Must Use Strategic Intelligence To Maximize Their Investment
    April 11, 2017 | Josh Zelonis

    Threat intelligence is a different animal than most security and risk (S&R) professionals are used to dealing with. For those new to the space, getting started can feel like an overwhelming...

  • For Security & Risk Professionals

    Report

    Report Top Seven Recommendations For Your Security Program In 2017

    April 7, 2017 | Jeff Pollard, Amy DeMartine

    Each year, Forrester outlines important recommendations for a successful security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Jump-Start Zero Trust With Forrester's Reference Architecture

    A Blueprint For Protecting Customers And Employees With Zero Trust
    March 27, 2017 | Laura Koetzle, Andre Kindness

    Forrester's Zero Trust Model requires a simple but profound change in the way we think about information security: In Zero Trust, all network traffic is inherently untrusted. In this report, we...

  • For Security & Risk Professionals

    Report

    Report Mature Cybersecurity Incident Response Requires Legal Advice

    Engage Legal To Help Your CEO Make Smart Decisions and Improve Breach Response
    March 13, 2017 | Josh Zelonis

    Business and technology leaders often dismiss lawyers as pedantic and obstacles to productivity. This is certainly something security and risk pros can relate to. However, it's important to get...

  • For Security & Risk Professionals

    Report

    Report Improve Physical Security And Customer Experience

    S&R Pros Must Develop Five Essential Capabilities In 2017
    March 9, 2017 | Merritt Maxim

    Every customer interaction plays a vital role in shaping that customer's confidence in your brand. While many businesses have heavily invested in optimizing the digital customer experience (CX),...

  • For Security & Risk Professionals

    Report

    Report Assess Your Network Security Architecture With Forrester's Zero Trust Maturity Model

    Assessment: The Security Architecture And Operations Playbook

    As the number of breached records continues to climb, more than ever, security and risk (S&R) pros need to take steps to overhaul their business' traditional infrastructure and invest in Zero Trust...

  • For CIO Professionals

    Report

    Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities

    March 6, 2017 | Kate McCarthy, Chris Sherman

    Healthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Security Analytics Platforms, Q1 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    March 6, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman...

  • For Security & Risk Professionals

    Report

    Report Structure Your Security Practice For Success

    Organization: The S&R Practice Playbook
    March 2, 2017 | Christopher McClean

    CISOs are constantly evaluating the structure and make-up of their organization to make sure it aligns with business and risk management needs. While org structure can affect how well the security...

  • For CIO Professionals

    Report

    Report The Top Emerging Technologies For Digital Predators

    Tools And Technology: The CIO Digital Business Transformation Playbook
    March 1, 2017 | Nigel Fenwick, Ted Schadler

    CIOs must constantly evaluate an array of emerging technologies and determine where to incubate and where to increase investment. While the choices are as individual as the companies, the...

  • For Security & Risk Professionals

    Report

    Report Lessons From The Forrester Wave™: MSSPs, North America, Q3 2016

    The Characteristics Of Successful And Unsuccessful MSSP Engagements
    February 28, 2017 | Jeff Pollard, Claire O'Malley

    Despite the relative maturity of the managed security services provider (MSSP) market, customers and vendors far too often fail to sync up as true, successful partners. This report delves into the...

  • For Security & Risk Professionals

    Report

    Report Define A Road Map To Accelerate Your Security Program

    Road Map: The S&R Practice Playbook
    February 28, 2017 | Christopher McClean

    Turning a strategy into action is what really reveals a CISO's worth. A solid security road map is how you make this happen: guiding implementation activities, demonstrating an understanding of key...

  • For Security & Risk Professionals

    Report

    Report Build A Cross-Functional Mobile Security Team

    Organization: The Mobile Security Playbook
    February 22, 2017 | Chris Sherman

    As security leaders look to support business engagement with customers, partners, and employees through mobile, they often discover gaps in team expertise. To better organize talent, security execs...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

Analyst