34 results in Reports
Sort by:
Refine
  • Jeff Pollard

Search Results

  • For Security & Risk Professionals

    Report

    Report Assess Your Exposure To Geopolitical Cyber Risk

    How To Identify The Impacts Of Geopolitical Dynamics Across Your Organization
    July 26, 2017 | Claire O'Malley, Jeff Pollard

    Geopolitical tensions around the world are spawning nearly constant cyberattacks on unprepared private sector firms. These cyberattacks result in millions of dollars in lost customer trust, as well...

  • For Security & Risk Professionals

    Report

    Report The Market For Managed Detection And Response Booms In 2017

    Cyberattacks And Skill Shortages Drive MDR Demand
    July 21, 2017 | Jeff Pollard

    Managed detection and response (MDR) has emerged as a specific category of managed security services (MSS) in the last 12 months. Security and risk (S&R) pros thinking about investing in MDR...

  • For Security & Risk Professionals

    Report

    Report Remove The Mystery From Security Metrics

    Performance Management: The S&R Practice Playbook
    July 18, 2017 | Jeff Pollard

    Difficulty creating meaningful metrics persists for chief information security officers (CISOs) despite a decade of discussion. Without good metrics, the security organization can't hope to...

  • For Security & Risk Professionals

    Report

    Report Honeypots 2.0: Deception Technology Lures Cybercriminals Into A Trap

    Hollywood Isn't The Only Industry Banking On Sequels
    July 18, 2017 | Josh Zelonis, Jeff Pollard

    Security and risk (S&R) professionals can leverage deception technologies that mimic real production applications and systems in an attempt to lure attackers into an intrusion. The concept isn't...

  • For Security & Risk Professionals

    Report

    Report Future-Proof Your Digital Business With Zero Trust Security

    Vision: The Security Architecture And Operations Playbook
    July 5, 2017 | Jeff Pollard

    As CIOs develop hybrid cloud strategies to help their organization become fast, flexible, and innovative, it is the perfect time to migrate to a Zero Trust security architecture. Security and risk...

  • For Security & Risk Professionals

    Report

    Report Top Competencies To Look For In An IAM Systems Integrator

    Cloud App Integration, Hosting, And Identity Management And Governance Skills Matter
    May 15, 2017 | Andras Cser, Merritt Maxim

    Systems integrators (SIs) are a crucial part of identity and access management (IAM) deployments. SIs bring valuable deployment and integration experience, and their vital advice on business...

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook
    April 26, 2017 | Merritt Maxim, Jeff Pollard

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Global Managed Security Services, 2017

    Converged Services Thrive While Isolated Offerings Go Extinct
    April 24, 2017 | Jeff Pollard

    For security pros looking to augment their programs with services partners, this is an age of abundance — abundant budget and abundant choice. But sometimes too many choices is just as bad as no...

  • For Security & Risk Professionals

    Report

    Report Top Seven Recommendations For Your Security Program In 2017

    April 7, 2017 | Jeff Pollard, Amy DeMartine

    Each year, Forrester outlines important recommendations for a successful security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Quick Take: The CIA — Good At Spying, Bad At Data Loss Prevention

    Key Takeaways From The WikiLeaks Revelations Of Widespread CIA Device-Hacking
    March 10, 2017 | Jeff Pollard

    This week, controversial media organization WikiLeaks released a trove of leaked documents purporting to prove the existence of a sophisticated covert US Central Intelligence Agency (CIA) hacking...

  • For Security & Risk Professionals

    Report

    Report Lessons From The Forrester Wave™: MSSPs, North America, Q3 2016

    The Characteristics Of Successful And Unsuccessful MSSP Engagements
    February 28, 2017 | Jeff Pollard, Claire O'Malley

    Despite the relative maturity of the managed security services provider (MSSP) market, customers and vendors far too often fail to sync up as true, successful partners. This report delves into the...

  • For Security & Risk Professionals

    Report

    Report Design Mobile Security Metrics With Mobile Moments In Mind

    Performance Management: The Mobile Security Playbook
    February 13, 2017 | Jeff Pollard

    Security leaders struggling to demonstrate business value need to incorporate mobile security metrics into their reports. As companies adopt the mobile mind shift, mobile security metrics are often...

  • For Security & Risk Professionals

    Report

    Report Security Budgets 2017: Increases Help But Remain Reactionary

    Benchmarks: The S&R Practice Playbook
    November 23, 2016 | Jeff Pollard

    Skyrocketing budget numbers might lead security leaders to believe that good times have finally arrived. But security spending's continued climb as a percentage of IT budgets hides the disruption...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Symantec Injects New Life Into Its Consumer Security With LifeLock Acquisition

    Symantec Becomes One Of The Few Firms To Bridge Enterprise And Consumer Security And Privacy
    November 22, 2016 | Andras Cser, Jeff Pollard

    On November 21, Symantec announced its acquisition of LifeLock for $2.3 billion. This signals a significant reinvestment in Symantec's consumer security portfolio and an expansion into new consumer...

  • For Security & Risk Professionals

    Report

    Report Predictions 2017: Cybersecurity Risks Intensify

    Landscape: The S&R Practice Playbook
    November 1, 2016 | Amy DeMartine, Jeff Pollard

    The connected world has arrived; we live and work in it. In this new reality, the next 12 months will see battles rage that will determine the amount of control individuals have over their own data...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Zero Trust Network Threat Mitigation Technologies, Q4 2016

    Road Map: The Security Architecture And Operations Playbook
    October 28, 2016 | John Kindervag, Jeff Pollard

    This TechRadar™, the road map document of the security architecture and operations playbook, defines the use cases, business value, and outlook for the 20 technologies that comprise the most...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Poor Planning, Not An IoT Botnet, Disrupted The Internet

    Dyn Outage Underscores The Need To Plan For Failure
    October 24, 2016 | Jeff Pollard, Joseph Blankenship

    On October 21, internet users went through a real exercise in one way the internet could die. Critical infrastructure exists on the internet as well as in the real world, and this attack crippled...

  • For Security & Risk Professionals

    Report

    Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    October 18, 2016 | Jeff Pollard

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • For Security & Risk Professionals

    Report

    Report The IoT Attack Surface Transcends The Digital-Physical Divide

    Security Leaders Must Prepare For High-Impact Attacks
    October 13, 2016 | Jeff Pollard, Merritt Maxim

    The internet of things (IoT) has evolved beyond a hyped buzzword into commercially available technologies that can significantly improve customer outcomes and deliver business benefits. However,...

  • For Security & Risk Professionals

    Report

    Report Your Security Products Aren't Secure

    What To Do When Trusted Technology Becomes The Target
    October 4, 2016 | Amy DeMartine, Jeff Pollard

    The nightmare scenario becomes reality as trusted security brands and technologies fail when facing attacks that target them directly. It's time to replace your bias toward trusting security...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Lessons For Security And Risk Pros From The Yahoo Breach

    Don't Prioritize Corporate Damage Control Over Customers' Interests
    September 23, 2016 | Stephanie Balaouras, Jeff Pollard

    On Thursday, Yahoo announced that cybercriminals had compromised the personal information including names, email addresses, dates of birth, phone numbers, and, in some instances, security questions...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Intel Spins Off McAfee As Synergies Fail To Materialize

    McAfee Is Better Off On Its Own Once Again
    September 9, 2016 | Jeff Pollard, Joseph Blankenship

    On September 7, Intel agreed to spin out Intel Security with a new, but old, name — McAfee. This acquisition winds up a cautionary tale to security leaders on what can happen when a tech giant...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Managed Security Services Providers, North America, Q3 2016

    The 11 Providers That Matter Most And How They Stack Up
    August 30, 2016 | Jeff Pollard

    In our 36-criteria evaluation of the managed security services market, we identified the 11 most significant providers — Alert Logic, AT&T, BAE Systems, CenturyLink, Hewlett Packard Enterprise,...

  • For Security & Risk Professionals

    Report

    Report The State Of Security Services 2016

    On-Demand Expertise And Agility Drive Continued Service Growth
    August 4, 2016 | Jeff Pollard

    Security leaders continue to get a larger share of the technology budget and a larger share of attention from the board of directors. As these security leaders allocate budget to categories and...

  • For Security & Risk Professionals

    Report

    Report Plan Your Security Sourcing Strategy For The Next Five Years

    A Strategic Methodology Based On Business Need
    August 2, 2016 | Jeff Pollard

    Security leaders cede control of capabilities they offer the enterprise by misallocating resources and putting too much emphasis on technology. This report guides CISOs through a methodology to...