Advanced Search
18 results in Reports
Sort by:
Refine
  • Joseph Blankenship

Search Results

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Security Analytics Platforms, Q1 2017

    Tools And Technology: The Security Architecture And Operations Playbook
    March 6, 2017 | Joseph Blankenship

    In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Security Analytics (SA)

    The SA Ecosystem Enables Rapid Detection And Response To Cyberthreats
    November 15, 2016 | Joseph Blankenship

    Enabling their teams to quickly detect and respond to internal and external cyberthreats is critical for security leaders. Security analytics (SA) solutions promise to provide an array of...

  • For Security & Risk Professionals

    Report

    Report Predictions 2017: Cybersecurity Risks Intensify

    Landscape: The S&R Practice Playbook
    November 1, 2016 | Amy DeMartine, Jeff Pollard

    The connected world has arrived; we live and work in it. In this new reality, the next 12 months will see battles rage that will determine the amount of control individuals have over their own data...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Zero Trust Network Threat Mitigation Technologies, Q4 2016

    Road Map: The Security Architecture And Operations Playbook
    October 28, 2016 | John Kindervag, Jeff Pollard

    This TechRadar™, the road map document of the security architecture and operations playbook, defines the use cases, business value, and outlook for the 20 technologies that comprise the most...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Poor Planning, Not An IoT Botnet, Disrupted The Internet

    Dyn Outage Underscores The Need To Plan For Failure
    October 24, 2016 | Jeff Pollard, Joseph Blankenship

    On October 21, internet users went through a real exercise in one way the internet could die. Critical infrastructure exists on the internet as well as in the real world, and this attack crippled...

  • For Security & Risk Professionals

    Report

    Report Brief: How To Meet November's Deadline And Build A Valuable Insider Threat Program

    Don't Just Check The NISPOM Change 2 Compliance Box
    September 26, 2016 | Joseph Blankenship, Claire O'Malley

    US Executive Order 13587 set the requirements for US government agencies to create an insider threat program to protect classified information. The US Department of Defense published Change 2 to...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Intel Spins Off McAfee As Synergies Fail To Materialize

    McAfee Is Better Off On Its Own Once Again
    September 9, 2016 | Jeff Pollard, Joseph Blankenship

    On September 7, Intel agreed to spin out Intel Security with a new, but old, name — McAfee. This acquisition winds up a cautionary tale to security leaders on what can happen when a tech giant...

  • For Security & Risk Professionals

    Report

    Report Rules Of Engagement: A Call To Action To Automate Breach Response

    August 3, 2016 | Joseph Blankenship, John Kindervag

    As the remediation costs, customer impacts, and reputational damage of a data breach continue to skyrocket, the security industry must find new ways to prevent the exfiltration of proprietary data...

  • For Security & Risk Professionals

    Report

    Report Hunting Insider Threats

    Forrester's Model For Establishing An Insider Threat Team
    July 20, 2016 | Joseph Blankenship

    Insider threats are a real risk to business because they threaten both customer and employee trust. Accidental or malicious misuse of the firm's most sensitive and valuable data can result in...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Security User Behavior Analytics (SUBA)

    Use SUBA To Enhance Security Analytics

    Protecting the enterprise against unknown internal and external cyberthreats is a critical priority on the agenda of every CISO. Security user behavior analytics (SUBA) solutions promise to provide...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Symantec Buys Its Way To Relevance With Blue Coat Acquisition

    June 14, 2016 | Kelley Mak, Andras Cser

    On June 12, 2016, Symantec agreed to buy web security company Blue Coat for $4.65 billion. With a fresh set of network and cloud technologies, a new CEO at the helm, and additional financial...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Your Next Security Analyst Could Be A Computer

    IBM Announces Watson For Cyber Security
    May 10, 2016 | Joseph Blankenship

    IBM announced on May 10 that it is launching a project to use its cognitive computing technology, Watson, in cybersecurity. Working with eight universities, IBM intends to train Watson on the...

  • For Security & Risk Professionals

    Report

    Report Counteract Cyberattacks With Security Analytics

    Platforms Offer Real-Time Monitoring, Rapid Detection, And Effective Response
    May 9, 2016 | Joseph Blankenship

    Security analytics (SA) has garnered a lot of attention during the past few years. However, marketing hype and misunderstandings regarding SA have confused the market, making it difficult for...

  • For Security & Risk Professionals

    Report

    Report Top 13 Technology Trends S&R Pros Should Watch: 2016

    Tools And Technology: The S&R Practice Playbook
    April 21, 2016 | Andras Cser, John Kindervag

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 40-plus research...

  • For Security & Risk Professionals

    Report

    Report Twelve Recommendations For Your Security Program In 2016

    Expanded Expectations Demand A Customer-Centric Focus
    April 21, 2016 | Heidi Shey, Jeff Pollard

    Each year, Forrester outlines important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and interactions,...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Security User Behavior Analytics (SUBA), 2016

    SUBA Helps S&R Pros Detect And Then Thwart Imminent Internal Attacks
    April 7, 2016 | Andras Cser, Joseph Blankenship

    Security and risk (S&R) leaders are struggling to prevent data breaches, threats from malicious insiders, and fraud. Solutions for security user behavior analytics (SUBA) aim to provide S&R pros...

  • For Security & Risk Professionals

    Report

    Report Brief: FireEye Is Evolving Into An Enterprise Security Vendor

    Recent Acquisitions Indicate FireEye Is Ready To Advance Security Automation
    March 30, 2016 | Jeff Pollard, Joseph Blankenship

    FireEye's acquisition of automation specialist Invotas International comes just 10 days after its acquisition of threat intelligence specialist iSight Partners. With these and prior acquisitions,...

  • For Security & Risk Professionals

    Report

    Report Quick Take: FireEye Acquires iSight Partners

    Deal Bolsters FireEye But Comes With Certain Customer Caveats
    January 22, 2016 | Joseph Blankenship, Jeff Pollard

    FireEye announced on January 20 the acquisition of threat intelligence vendor iSight Partners for $200 million, giving the antimalware vendor an entry into the crowded threat intelligence market....