43 results in Everything
 
Sort by:
Refine
  • Application Security
  • Secure customers, protect the brand

Search Results

  • Forum Privacy & Security 2019

    The Technology of Trust
    September 12, 2019 | Washington, D.C. | Laura Koetzle, Stephanie Balaouras, Heidi Shey

    Privacy is the new competitive advantage. Your customers increasingly gravitate to brands they trust. How do you weave trust into the core of your brand promise and value proposition? How can you...

  • Webinar Protect Against Bad Bots That Are Trying To Kill Your Customer Experience

    Tuesday, June 18, 2019, 11:00 a.m.-12:00 p.m. Eastern time (16:00-17:00 GMT) | Amy DeMartine

    You may have heard about chatbots, but did you know that 38% of internet traffic comes from automated programs called bots and more than half of this is malicious? These bots are simple programs...

  • Report The Forrester Wave™: Identity-As-A-Service (IDaaS) For Enterprise, Q2 2019

    The 10 Providers That Matter Most And How They Stack Up
    June 12, 2019 | Andras Cser, Merritt Maxim

    In our 37-criterion evaluation of providers of identity-as-a-service (IDaaS) for enterprise, we identified the 10 most significant ones — Google, IBM, Idaptive, Microsoft, Okta, OneLogin, OpenText,...

  • Report The Forrester Wave™: Software Composition Analysis, Q2 2019

    The 10 Providers That Matter Most And How They Stack Up
    April 8, 2019 | Amy DeMartine

    In our 33-criterion evaluation of software composition analysis providers, we identified the 10 most significant ones — Flexera, FOSSA, GitLab, JFrog, Snyk, Sonatype, Synopsys, Veracode, WhiteHat...

  • Report Top Recommendations For Your Security Program, 2019

    Landscape: The S&R Practice Playbook
    March 25, 2019 | Paul McKay, Jeff Pollard, Jinan Budge

    Each year, Forrester outlines the most important recommendations for your security strategy for the coming 12 months. We base these recommendations on thousands of client inquiries and...

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Report Now Tech: Software Composition Analysis, Q1 2019

    Forrester's Overview Of 17 Software Composition Analysis Providers
    January 24, 2019 | Amy DeMartine

    You can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development life cycle (SDLC). But to...

  • Report Predictions 2019: Cybersecurity

    The US-China Trade War Will Revive Corporate Espionage Attacks Around The World
    November 5, 2018 | Amy DeMartine, Jeff Pollard, Heidi Shey

    The race to improve customer engagement compels companies to collect volumes of personal data, and this puts enormous pressure on security teams to protect customers from fraud, privacy abuses, and...

  • Report Gauge Your Data Security And Privacy Maturity

    Assessment: The Data Security And Privacy Playbook
    October 5, 2018 | Enza Iannopollo, Heidi Shey

    To transition from an organization that treats privacy and data security as compliance requirements to achieve the lowest possible cost, to one that champions privacy and uses its technology...

  • Report Now Tech: Container Security, Q4 2018

    Forrester's Overview Of 24 Container Security Providers
    October 3, 2018 | Amy DeMartine

    You can use container security tools to secure critical applications, speed development efforts, and tamperproof your containers. But to access these benefits, you'll first have to select from a...

  • Report The Forrester New Wave™: Bot Management, Q3 2018

    The 12 Providers That Matter Most And How They Stack Up
    September 20, 2018 | Amy DeMartine

    In Forrester's evaluation of the emerging bot management market, we identified the 12 most significant providers — Akamai Technologies, Alibaba Cloud, Cloudflare, DataDome, Distil Networks, Oracle...

  • Report Stop Bad Bots From Killing Customer Experience

    Strengthen Engagement And Budget By Securing Web Traffic
    September 6, 2018 | Amy DeMartine, Joseph Blankenship, Susan Bidel

    Automated internet traffic is on the rise, largely due to software programs called bots. Although some bots facilitate data sharing and customer engagement, many are tools that malicious attackers...

  • Report New Tech: Bot Management, Q3 2018

    Forrester's Landscape Overview Of 19 Providers
    September 6, 2018 | Amy DeMartine

    Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated,...

  • Report The Forrester Wave™: Web Application Firewalls, Q2 2018

    The 10 Vendors That Matter Most And How They Stack Up
    June 25, 2018 | Amy DeMartine

    In our 33-criteria evaluation of web application firewall (WAF) vendors, we identified the 10 most significant ones — Akamai Technologies, Amazon Web Services, Barracuda Networks, Cloudflare, F5...