5 results in Everything
 
Sort by:
Refine
  • Sandy Carielli

Featured content

ForresterNow

FORRESTERNOW

ForresterFirst Insight

As the coronavirus dominates the global headlines, businesses should take the opportunity to develop business continuity plans specifically for pandemics—focusing on customer, employee, and partner needs. Read more »

Search Results

  • Report The Forrester New Wave™: Bot Management, Q1 2020

    The 13 Providers That Matter Most And How They Stack Up
    January 29, 2020 | Sandy Carielli, Amy DeMartine

    In Forrester's evaluation of the emerging market for bot management, we identified the 13 most significant providers in the category — Akamai Technologies, Alibaba Cloud, AppsFlyer, Cloudflare,...

  • Report Top Cybersecurity Threats In 2020

    Landscape: The Zero Trust Security Playbook
    January 24, 2020 | Josh Zelonis, Sandy Carielli

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this...

  • Report The State Of Government Application Security, 2020

    Government Must Invest Aggressively In Application Security To Protect Citizen Data
    January 7, 2020 | Sandy Carielli, Amy DeMartine

    Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data....

  • Report Now Tech: Web Application Firewalls, Q4 2019

    Forrester's Overview Of 31 WAF Providers
    December 20, 2019 | Sandy Carielli, Amy DeMartine

    You can use web application firewalls (WAFs) to protect applications, apply consistent and global security policies, and comply with regulations. But to realize these benefits, you'll first have to...

  • Report New Tech: Bot Management, Q4 2019

    Forrester's Landscape Overview Of 22 Providers
    December 13, 2019 | Sandy Carielli, Amy DeMartine

    Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated,...