46 results in Everything

Sorry — your search returned 0 results, so we expanded the date range to "All".

Sort by:
  • Security & Risk
  • Office Productivity

Featured content

The Employee Experience Playbook For 2019

Transform The Employee Experience To Drive Business Performance

Missing from most workforce technology strategies today is an understanding of what makes employees truly engaged and productive — and how this directly affects customer experience and financial...

Search Results

  • Report Protect Your Digital Workforce With Browser Isolation Technology (BIT)

    BIT Helps S&R Pros Implement Zero Trust For Workforce Security
    July 21, 2017 | Chase Cunningham

    Employees today must use a browser to access most of their corporate applications, email, and collaboration tools. A variety of common threat vectors target basic user interactions as employees use...

  • Report Brief: Five Key Capabilities For Microsoft Office 365 Email Security

    Microsoft Takes Steps In The Right Direction, But Microsoft Alone Might Not Be Enough
    June 29, 2016 | Kelley Mak

    Productivity and collaboration tools are an essential technology component of workforce enablement, and because of its economics, scale, and familiar interfaces, Microsoft's Office 365 online...

  • Report The State Of Enterprise Mobile Security, Q1 2014: Strategies Shift From Devices To Apps

    February 3, 2014 | Chris Sherman

    Even as more and more firms adopt and grow more comfortable with bring-your-own-device (BYOD) strategies, security and risk (S&R) pros remain vigilant — particularly as firms seek to empower...

  • Report Tech Spotlight: Enterprise File Sharing

    The State Of Enterprise File Sharing In 2013 And What It Means For S&R Pros
    December 20, 2013 | Heidi Shey

    Much of the information used in the course of doing business today exists in a digital format, and there comes a point when it's necessary to share this data with other employees or key business...

  • Report 2013 Forrester Mobile Security Predictions

    March 26, 2013 | Chenxi Wang

    The mobile market is evolving rapidly. Both the consumer and enterprise markets are experiencing major changes. Room exists for new innovations as well as for established players to develop new...

  • Report Show Me The Loot!

    Determine The Right Practices For Your Organization's BYOD Stipends
    February 15, 2013 | Brownlee Thomas, Ph.D.

    In this age of the empowered, tech-savvy worker, more and more employees are bringing their unsecured devices to work and using them for work activities. To prepare for this tide of devices,...

  • Report Mobile Authentication: Is This My App? Is This My User?

    Strategy Deep Dive: The Mobile Security And Operations Playbook
    December 5, 2012 | Andras Cser, Chenxi Wang

    Mobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to...

  • Report Aim To Empower The Anytime, Anywhere Workforce

    May 3, 2012 | Benjamin Gray, TJ Keitt

    With two-thirds of the North American and European workforce reporting that they work outside of their corporate office at least occasionally every month, it's imperative that business leaders...

  • Report Survey Employees To Target Mobility Improvements

    This report outlines the benchmarks of Forrester's solution for security and risk (S&R) executives working on mobile security and operations initiatives. This report provides a benchmark of...

  • Report Tablets Pave Way For Mobile Development: Security Pros Must Get Ahead Of App Dev Wave

    Security Is A Core Mobile App Dev Concern
    June 22, 2011 | Chenxi Wang

    Enterprise business leaders have been quick to adopt mobile devices within their organizations, often leaving security professionals in the dark. When this happens, it may expose the organization...

  • Report Managing The Security And Risk Challenges Of Personal Devices In The Workplace

    An Empowered Report: Security Pros Must Work Inside And Outside Of IT To Address The Challenges
    April 13, 2011 | Chenxi Wang

    Amid the rising trend of personally owned smartphone and tablet use in the workplace, security professionals face the tough question of how to properly manage and secure these devices. Secure...

  • Report Securing An Empowered Organization

    An Empowered Report: Run At The Threat, Shape The Future Of Your Company
    October 29, 2010 | Chenxi Wang

    Employees are provisioning themselves with consumer and cloud technology. Forrester's study of US information workers reveals that 37% are doing something with technology without permission. And...

  • Report Understanding The Influential Information Worker

    The Changing Workforce Makes Understanding End User Habits Essential For Tech Vendors
    February 11, 2010 | Heidi Shey, TJ Keitt

    This is a graphical overview highlighting results from Forrester's Workforce Technographics®, US, Canada, And UK Survey, Q3 2009, a survey of 3,904 information workers (iWorkers) at companies with...

  • Report Man-In-The-Browser: Emerging Attacks Exploit Browser Vulnerabilities

    April 17, 2007 | Chenxi Wang

    A new form of man-in-the-middle attack, called "man-in-the-browser," has surfaced. These attacks can bypass current browser security mechanisms to read, insert, and modify transaction data....

Content Type