27 results in Reports
 
Sort by:
Refine
  • Business & IT Alignment
  • Secure customers, protect the brand

Featured content

ForresterNow

FORRESTERNOW

Forrester First Insight

As the coronavirus dominates the global headlines, businesses should take the opportunity to develop business continuity plans specifically for pandemics—focusing on customer, employee, and partner needs. Read more »

Search Results

  • Report The Top Trends Shaping IAM In 2020

    Landscape: The Identity And Access Management Playbook
    January 29, 2020 | Andras Cser, Sean Ryan

    Identity is a core building block of a robust Zero Trust security ecosystem and infrastructure. In this report, we look at the eight most important trends that will shape the identity and access...

  • Report Justify Security Budget By Its Impact On Maturity

    Business Case: The S&R Practice Playbook
    January 9, 2020 | Jeff Pollard, Paul McKay

    Security leaders face challenges articulating which projects generate the most value for their organization. They often struggle to justify existing budgets, as well. To help you build the business...

  • Report Build The Business Case For GRC

    Business Case: The Governance, Risk, And Compliance Playbook
    January 7, 2020 | Alla Valente, Renee Murphy

    The business case for governance, risk management, and compliance (GRC) efforts too often relies on the fear of costly events or regulatory action. This report helps GRC leaders elevate the...

  • Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

    Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
    November 25, 2019 | Andras Cser, Sean Ryan

    With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...

  • Report The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019

    The 14 Providers That Matter Most And How They Stack Up
    October 29, 2019 | Chase Cunningham

    In our 16-criterion evaluation of Zero Trust eXtended (ZTX) ecosystem providers, we identified the 14 most significant ones — Akamai Technologies, Check Point, Cisco, Cyxtera Technologies,...

  • Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Zero Trust Security Playbook
    September 25, 2019 | Chase Cunningham, David Holmes, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros are devoting resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great...

  • Report Refine Customer Communication For Strong Customer Authentication Success

    Best Practices For Communicating Upcoming Changes To Customer Authentication For Online Payments And Banking In Europe

    The European Union's Strong Customer Authentication (SCA) requirements will change how Europeans make online payments and use online banking. In theory, these changes will apply from September 14,...

  • Report The Zero Trust eXtended (ZTX) Ecosystem

    Strategic Plan: The Zero Trust Security Playbook
    July 11, 2019 | Chase Cunningham

    In the past two years, Forrester's Zero Trust security has exploded in awareness and plans for adoption. We've reached this market inflection thanks to the categorical realization from both...

  • Report The Canadian Tech Market Outlook For 2019 To 2020

    Canadian Tech Spending Will Moderate After Strong Growth In 2017 And 2018
    July 10, 2019 | Andrew Bartels, Cheryl McKinnon, Nate Meneer

    The Canadian tech market will see moderate growth in 2019 and 2020. Near-term prospects for Canadian economic growth appear shaky due to the collapse of oil prices in Q4 of 2018 and persistent...

  • Report How To Implement Zero Trust Security In Europe

    Large technology companies and the US Federal Government have adopted Zero Trust (ZT) as their next-generation security model. 2019 is the year that Zero Trust hits the mainstream in Europe....

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

  • Report The Global Tech Market Outlook For 2019 To 2020

    Tougher Times Are Ahead As We Move Away From 2018's Peak Growth Rates
    February 11, 2019 | Andrew Bartels

    When CIOs look back in five years, they will probably mark 2018 as the best year for tech budgets over that period. To help CIOs navigate these shifting tech waters and prepare for tougher times,...

  • Report Widen Your Risk Taxonomy To Remove Blind Spots

    Landscape: The Governance, Risk, And Compliance Playbook
    February 8, 2019 | Renee Murphy

    The way enterprises categorize risk has important implications for how they assess, measure, and treat it. Antiquated categories of risk — such as legal, operational, financial, and strategic — may...

  • Report 2019 US Tech Budgets: Industry Outlook

    CIOs Should Make Their 2019 Plans With A Solid Understanding Of What's Going On In Their Industry
    February 6, 2019 | Andrew Bartels

    The US tech budget outlook for 2019 is generally positive, with projected growth of 6.1% only slightly slower than its 2018 growth. But in that broad picture, different industries will face very...

  • Report Build A Strong Process Foundation For Cybersecurity And Privacy

    Beginner Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Claire O'Malley

    To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and clearly defined processes for critical areas ranging from internal data security...

  • Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success

    Advanced Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Stephanie Balaouras

    CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect the brand, they help their firms drive growth and long-term success. This report — the third of three in the...

  • Report Elevate Cybersecurity And Privacy With Process Metrics

    Intermediate Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Salvatore Schiano

    The intermediate phase of the journey to cybersecurity and privacy maturity turns on establishing metrics and collecting data to drive process improvement. This report — the second of three in the...

  • Report The Zero Trust eXtended Ecosystem: Networks

    The Network Continues To Be A Critical Point Of Control In ZTX
    January 2, 2019 | Chase Cunningham

    Anywhere packets pass is a place that can offer cybercriminals command and control of critical network assets, but it can also enable better security and ultimately help to build a Zero Trust...

  • Report How To Talk To Your Board About Cybersecurity

    Best Practices And Template For Board Presentations
    December 28, 2018 | Jeff Pollard, Jinan Budge, Paul McKay

    Whether there to answer questions, give a status update, or build support, security leaders need to make the most out of each opportunity they get in front of their board of directors. This report...

  • Report Predictions 2019: CIO

    A Year Of Rebuilding Foundations And Measured Innovation
    November 5, 2018 | Matthew Guarini, Pascal Matzke

    Technology is a key differentiator for how companies deliver superior customer and employee experiences. CIOs that can take advantage of this opportunity will strengthen their position in the...

  • Report Lead The Design-Minded Evolution Of Your Firm

    Master Three Design Competencies To Be Successful
    November 2, 2018 | Gordon Barnett

    Design is a key determinant in the success of the modern organization. Though firms are building a competency in design, their efforts are piecemeal and unstructured. CIOs and other tech leaders...

  • Report The Q4 Global Tech Market Outlook For 2018 To 2019

    2019 Will See Good Growth But Also Risks Coming Off The Highs Of 2018
    October 26, 2018 | Andrew Bartels

    Despite threats of trade wars, Brexit uncertainties, Turkey's meltdown, and other disruptions, 2018 is turning out to be a very good year for the global tech market. While some of the positives...

  • Report European Tech Market Outlook By Country, 2018 To 2019

    Benelux And The Nordic Nations Lead, While The Big Four Sputter With Weakening Economies
    October 18, 2018 | Andrew Bartels, Nate Meneer

    People often view Western and Central Europe as a single regional tech market, but as every European CIO knows, it is also a collection of 28 separate national markets. This report details...

  • Report Zero Trust Outside The Wire: Combatting Cyber Influence And Espionage Threats

    Computational Propaganda, Fake News, And Viral Videos Represent A New Type Of Business Attack With Devastating Consequences
    September 25, 2018 | Chase Cunningham, Nick Hayes, Jeff Pollard

    Direct cyberattacks that take a bank offline or steal millions of customer records are alarming, but there's an even larger, more dangerous specter of attacks security leaders are unprepared to...

  • Report The Algorithm Of You: Meet Your Personal Digital Twin

    Continuous Improvement: The Customer Trust And Privacy Playbook
    September 10, 2018 | Fatemeh Khatibloo

    Algorithms are all around us, guiding business decisions, social policy, and life choices. But the algorithms that organizations use today don't account for individual human objectives, resulting...