100 results in Everything
 
Sort by:
Refine
  • Security & Risk
  • Now Tech

Search Results

  • Report Now Tech: Payment Tokenization, Q1 2019

    Forrester's Overview Of 21 Payment Tokenization Providers
    March 7, 2019 | Andras Cser

    You can use payment tokenization (PT) solutions to: 1) reduce the risk of fraud from stolen personal account numbers (PANs); 2) reduce the scope of PCI DSS compliance and audits; and 3) increase...

  • Report Now Tech: Software Composition Analysis, Q1 2019

    Forrester's Overview Of 17 Software Composition Analysis Providers
    January 24, 2019 | Amy DeMartine

    You can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development life cycle (SDLC). But to...

  • Report Now Tech: Security Awareness And Training Solutions, Q1 2019

    Forrester's Overview Of 20 Security Awareness And Training Solution Providers
    January 23, 2019 | Jinan Budge, Claire O'Malley

    You can use security awareness and training solutions to build the ever-important human firewall, prepare your workforce for recognizing and responding to phishing attacks, and rebrand security as...

  • Report Now Tech: Data Loss Prevention, Q1 2019

    Forrester's Overview Of 37 Data Loss Prevention (DLP) Providers
    January 18, 2019 | Heidi Shey

    You can use data loss prevention (DLP) capabilities to support compliance, protect intellectual property, and augment employee security awareness. But to access these benefits, you'll first have to...

  • Report Now Tech: Managed Security Services In Asia Pacific, Q1 2019

    Forrester's Overview Of 19 Managed Security Service Providers
    January 16, 2019 | Jinan Budge

    You can use managed security services to rapidly transform your security operations, improve your talent diversity, increase your breadth of skills, and support your global business. But to access...

  • Report Now Tech: Antiphishing Solutions, Q1 2019

    Processes: The Zero Trust Security Playbook
    January 8, 2019 | Joseph Blankenship, Nick Hayes, Claire O'Malley

    You can use antiphishing solutions to detect and block malicious emails, protect against impersonation attacks, and educate employees with training and phishing simulations. But to access these...

  • Report Now Tech: Crisis Communication And Mass Notification Solutions, Q4 2018

    Forrester's Overview Of 17 Crisis Communication And Mass Notification Providers
    December 18, 2018 | Merritt Maxim

    You can use crisis communication and mass notification solutions to improve your response to critical events and incidents that disrupt business, hamper employee productivity, or threaten physical...

  • Report Now Tech: Container Security, Q4 2018

    Forrester's Overview Of 24 Container Security Providers
    October 3, 2018 | Amy DeMartine

    You can use container security tools to secure critical applications, speed development efforts, and tamperproof your containers. But to access these benefits, you'll first have to select from a...

  • Report Now Tech: Authentication Management Solutions, Q3 2018

    Forrester's Overview Of 26 Authentication Management Providers
    August 7, 2018 | Andras Cser, Merritt Maxim

    You can use authentication management solutions to simplify and standardize credential processing for applications, reduce the operational costs of authentication, and improve the authentication...

  • Report Now Tech: eDiscovery Technologies, Q3 2018

    Forrester's Overview Of 30 eDiscovery Technology Providers
    August 6, 2018 | Heidi Shey

    You can use eDiscovery technologies to improve the speed and efficiency of eDiscovery activities and reduce the associated costs and risks. But to access these benefits, you'll first have to select...

  • Report Now Tech: Security Automation And Orchestration (SAO), Q3 2018

    Forrester's Overview Of 17 SAO Providers
    July 5, 2018 | Joseph Blankenship

    You can use security automation and orchestration (SAO) to increase analyst capacity, shorten incident response times, and integrate disparate security technologies. But to access these benefits,...

  • Report Now Tech: DDoS Mitigation Solutions, Q2 2018

    Forrester's Overview Of 21 DDoS Migration Solutions
    April 27, 2018 | Joseph Blankenship

    You can use DDoS mitigation solutions to ensure the availability of mission-critical services, preserve brand reputation, and maintain customers' experience with your digital assets. But to access...

  • Report Now Tech: Managed Detection And Response (MDR) Services, Q2 2018

    Forrester's Overview Of 18 Managed Detection And Response Providers
    April 26, 2018 | Jeff Pollard

    You can use MDR services to offer assurance that your business is not currently compromised, to turn internal investigations over to efficient experts, or to get on-demand access to a seasoned...

  • Report Now Tech: Mobile Security, Q1 2018

    Forrester's Overview Of 20 Mobile Security Providers
    March 15, 2018 | Chris Sherman

    You can use mobile security tools to enable employees to be productive, serve customers, generate revenue, and maintain a competitive edge, even as targeted attacks threaten your assets and...

  • Report Now Tech: Identity Verification, Q1 2018

    Forrester's Overview Of 38 Identity Verification Providers
    February 27, 2018 | Andras Cser, Merritt Maxim

    You can use identity verification (IDV) to support digital transformation, help comply with anti-money laundering, and stop account takeovers. But to access these benefits, you'll first have to...

  • Report Now Tech: Endpoint Detection And Response, Q1 2018

    Forrester's Overview Of 26 EDR Providers
    February 1, 2018 | Josh Zelonis

    You can use endpoint detection and response (EDR) offerings to improve endpoint visibility, orchestrate threat remediation, and achieve superior threat hunting. But to access these benefits, you'll...