56 results in Reports
Sort by:
Refine
  • Chris Sherman

Search Results

  • For Security & Risk Professionals

    Report

    Report Ransomware Protection: Five Best Practices

    Harden Your Defenses Now For This Growing Threat
    July 27, 2017 | Chris Sherman, Salvatore Schiano

    Ransomware is holding enterprises hostage. Recent outbreaks from variants such as WannaCry and Petya have many security and risk (S&R) pros wondering if they can prevent this growing threat. By...

  • For CIO Professionals

    Report

    Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities

    March 6, 2017 | Kate McCarthy, Chris Sherman

    Healthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...

  • For Security & Risk Professionals

    Report

    Report Build A Cross-Functional Mobile Security Team

    Organization: The Mobile Security Playbook
    February 22, 2017 | Chris Sherman

    As security leaders look to support business engagement with customers, partners, and employees through mobile, they often discover gaps in team expertise. To better organize talent, security execs...

  • For Security & Risk Professionals

    Report

    Report Define A Compelling Strategy To Secure And Protect Mobile Moments

    Strategic Plan: The Mobile Security Playbook
    February 14, 2017 | Laura Koetzle, Chris Sherman

    This report helps security and risk (S&R) leaders develop comprehensive strategic mobile security plans to secure and protect both employees' and customers' mobile moments — without degrading the...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Endpoint Security, Q1 2017

    Consolidation Will Lead To A Less Fragmented Market
    January 27, 2017 | Chris Sherman

    Security professionals face a fragmented market when selecting enterprise endpoint security tools; current and emerging technologies each offer benefits and challenges, a different employee...

  • For Security & Risk Professionals

    Report

    Report Master The Mobile Security Landscape

    Landscape: The Mobile Security Playbook
    January 12, 2017 | Chris Sherman

    For security and risk (S&R) professionals who must empower a digital workforce while protecting the firm's data, the basic management functionality of mobile device management (MDM) solutions is...

  • For Security & Risk Professionals

    Report

    Report The State Of Enterprise Mobile Security: 2016 To 2017

    Benchmarks: The Mobile Security Playbook
    January 12, 2017 | Chris Sherman

    To increase the productivity of information workers, particularly customer-facing employees, security and risk (S&R) leaders must provide them with access to business apps, collaboration tools, and...

  • For Security & Risk Professionals

    Report

    Report Assess The Maturity Of Your Mobile Security Program

    Assessment: The Mobile Security Playbook
    November 21, 2016 | Chris Sherman, Stephanie Balaouras

    When developing a mobile security strategy for today's digital business, security and risk (S&R) executives must consider both how they will enable a digital workforce that expects to work anytime...

  • For Security & Risk Professionals

    Report

    Report Forrester's 2016 Interactive Data Privacy Heat Map

    Landscape: The Data Security And Privacy Playbook
    October 31, 2016 | Chris Sherman, Enza Iannopollo

    To help security and risk professionals navigate the complex landscape of privacy laws around the world, Forrester created a data privacy heat map that highlights the data protection guidelines and...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Endpoint Security Suites, Q4 2016

    The 15 Providers That Matter Most And How They Stack Up
    October 19, 2016 | Chris Sherman

    In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea,...

  • For Security & Risk Professionals

    Report

    Report Best Practices For Securing And Empowering A Mobile Workforce

    Road Map: The Mobile Security Playbook
    August 17, 2016 | Christian Kane, Chris Sherman

    Companies launch small bring-your-own-device (BYOD) deployments, but these programs often stall when they expand to include both a larger percentage of the workforce and more corporate apps and...

  • For Security & Risk Professionals

    Report

    Report Healthcare's IoT Dilemma: Connected Medical Devices

    Separating Fact From Fiction: The Real Risks Connected Medical Devices Pose
    May 20, 2016 | Chris Sherman

    The healthcare industry is coming off its worst year for data breaches, leaving patients and consumers wondering just how healthcare delivery organizations (HDOs) plan to turn things around....

  • For Security & Risk Professionals

    Report

    Report The 2016 State Of Endpoint Security Adoption

    Investments In Advanced Endpoint Controls Are Poised To Accelerate Over The Coming Year
    April 25, 2016 | Chris Sherman

    Every year, Forrester surveys thousands of security decision-makers and information workers globally from a wide range of industries and organization sizes. This report presents the most relevant...

  • For Security & Risk Professionals

    Report

    Report Top 13 Technology Trends S&R Pros Should Watch: 2016

    April 21, 2016 | Andras Cser, John Kindervag

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 40-plus research...

  • For Security & Risk Professionals

    Report

    Report Four Ways To Make Mobile Security A Competitive Differentiator

    Business Case: The Mobile Security Playbook

    Firms of all sizes in all industries now realize that mobile technology will transform how they interact with customers, and mobile channels are untenable without a robust security strategy. Still,...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Mobile Security, Q1 2016

    Tools And Technology: The Mobile Security Playbook
    March 28, 2016 | Chris Sherman

    Security and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...

  • For Security & Risk Professionals

    Report

    Report It's Time To Level Up Your Mobile Application Security Program

    Processes: The Mobile Security Playbook
    March 25, 2016 | Chris Sherman

    Security leaders must balance the requirements of their digital workforce with the need to protect corporate data. This report helps security and risk (S&R) professionals better evaluate the...

  • For Security & Risk Professionals

    Report

    Report Industry Spotlight: US Healthcare Security Budgets And Priorities, Q4 2015 To Q3 2016

    Healthcare Technology Innovation Continues To Outpace Security
    February 2, 2016 | Chris Sherman, Stephanie Balaouras

    IT security teams within US healthcare providers historically have had much smaller budgets than in other industries. As a result, they have struggled to implement advanced security capabilities...

  • For Security & Risk Professionals

    Report

    Report Brief: top 10 Security Priorities For US Healthcare Organizations

    Tips To Handle Healthcare's Aggressive Threat Landscape, Financial Pressures, And Regulatory Burden
    October 22, 2015 | Chris Sherman

    The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is...

  • For Security & Risk Professionals

    Report

    Report Forrester's 2015 Data Privacy Heat Map Supplement

    October 13, 2015 | Chris Sherman, Heidi Shey

    To help security and risk professionals navigate the complex landscape of privacy laws around the world, Forrester created a data privacy heat map that highlights the data protection guidelines and...

  • For Security & Risk Professionals

    Report

    Report Brief: Endpoint Security Innovation Is Intensifying

    The Time Is Now To Protect Your Digital Workforce With A Reinvigorated Endpoint Security Strategy
    September 18, 2015 | Rick Holland, Chris Sherman

    For your employees to do their very best work, they need access to a wide range of business applications and sensitive information — often from whatever endpoint device they deem appropriate....

  • For Security & Risk Professionals

    Report

    Report Top 11 Trends S&R Pros Should Watch: 2015

    June 23, 2015 | Heidi Shey, Andras Cser

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; research projects that we...

  • For Security & Risk Professionals

    Report

    Report Q&A: EU Privacy Regulations

    S&R Pros Must Help Their Leaders Embrace Privacy Before Massive Changes To EU Law Take Effect
    June 14, 2015 | Chris Sherman, Enza Iannopollo

    As a consequence of increasing global commerce, security and risk (S&R) professionals face the complexity of navigating data privacy regulations from around the world. Forrester clients frequently...

  • For Security & Risk Professionals

    Report

    Report Market Update: Security Remains A Key Component To Enterprise Mobile Management

    Tools And Technology: The Mobile Security Playbook
    June 2, 2015 | Chris Sherman, Christian Kane

    In September 2014, we published The Forrester Wave™: Enterprise Mobile Management, Q3 2014, which evaluated 15 vendors using 27 criteria. Our findings showed how well each vendor met the breadth...

  • For Security & Risk Professionals

    Report

    Report The State Of Enterprise Mobile Security, Q2 2015: Strategies Continue To Focus On Mobile Apps

    May 13, 2015 | Chris Sherman, Jennie Duong

    Even as more firms adopt and grow comfortable with bring-your-own-device (BYOD) strategies, security and risk (S&R) pros need to remain vigilant, particularly as firms seek to empower employees...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor