35 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • IT Spending Forecasts
  • Secure customers, protect the brand

Search Results

  • Report Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

    Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process
    November 25, 2019 | Andras Cser, Sean Ryan

    With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically...

  • Report The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation
    February 27, 2019 | Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security...

  • Report The State Of Endpoint Security, 2019

    Buyers Demand Better Product Efficacy And Integrated Data Security
    January 22, 2019 | Chris Sherman, Salvatore Schiano

    Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns to help security...

  • Report The State Of Data Security And Privacy: 2018 To 2019

    Benchmarks: The Data Security And Privacy Playbook
    December 5, 2018 | Heidi Shey, Enza Iannopollo

    This data-driven report outlines budgeting and spending, technology adoption plans, and other key breach, data protection, and privacy trends in global firms for 2018 through 2019. Understanding...

  • Report The State Of Risk Management 2018

    Benchmarks: The Governance, Risk, And Compliance Playbook
    November 30, 2018 | Christopher McClean, Trevor Lyness

    Executives must take big bets on new technologies, business models, and emerging markets to stay ahead of the fast pace of competition. With so much at stake and so many public examples of...

  • Report The State Of Network Security: 2018 To 2019

    Benchmarks: The Zero Trust Security Playbook
    November 27, 2018 | Heidi Shey

    This data-driven report outlines budgeting and spending, security group responsibilities, network security technology, and services adoption in North American and European organizations for 2018 to...

Content Type

Apply

Filters

Methodology

Region