Charts & Figures
-
Now Tech Market Presence Segments: Mobile Security, Q1 2018
March 15, 2018
-
Now Tech Functionality Segments: Mobile Security, Q1 2018
March 15, 2018
-
Now Tech Midsize Vendors: Mobile Security, Q1 2018
March 15, 2018
Search Results
-
Report The Future Of Endpoint Protection, 2019 To 2024
Endpoint Security Will Focus On Apps' And Users' Behavior
January 24, 2019 | Chris ShermanSecurity leaders have struggled for the past 20 years to balance effective endpoint security with good employee experience, and this challenge will only get tougher as attacks and technologies...
-
Report The State Of Endpoint Security, 2019
Buyers Demand Better Product Efficacy And Integrated Data Security
Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns to help security...
-
Report The Forrester Wave™: Unified Endpoint Management, Q4 2018
The 12 Providers That Matter Most And How They Stack Up
In our 28-criterion evaluation of unified endpoint management (UEM) providers, we identified the 12 most significant ones — BlackBerry, Cisco, Citrix Systems, IBM, Ivanti, Jamf, Kaspersky Lab,...
-
Report The Forrester Wave™: Endpoint Security Suites, Q2 2018
The 15 Providers That Matter Most To Enterprises And How They Stack Up
In our 21-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bitdefender, Carbon Black, Check Point, Cisco, CrowdStrike, Cylance, ESET, Ivanti,...
-
Report Now Tech: Mobile Security, Q1 2018
Forrester's Overview Of 20 Mobile Security Providers
March 15, 2018 | Chris ShermanYou can use mobile security tools to enable employees to be productive, serve customers, generate revenue, and maintain a competitive edge, even as targeted attacks threaten your assets and...
-
Report The State Of Endpoint Security, 2018
New Threats Are Driving Technology Consolidation
Every year, Forrester surveys thousands of security decision makers and information workers around the world. This report examines endpoint security spending and adoption patterns, helping security...
-
Report The US Healthcare Security Benchmark 2017 To 2018
Healthcare Providers Must Improve Security For Digital Transformation
IT security budgets at US healthcare organizations have lagged behind other industries. In a highly regulated industry, budget constraints have made compliance challenging and impeded security...
-
Blog Microsoft Is Making Good On Security Promises With Windows 10, But You May Not Be Maximizing Its Potential
October 23, 2017 | Chris ShermanWindows 10 is quickly conquering the enterprise OS market. In 2017, over a third of global infrastructure decision makers reported that their firms have already deployed Windows 10, and another 14%...
-
Report Windows 10 Finally Delivers On Microsoft's Security Promises
A Guide For Taking Full Advantage Of Windows 10 Security And Privacy Features
Microsoft Windows 10 offers many new native security and privacy capabilities that potentially reduce organizations' reliance on third-party endpoint security solutions. When taken together, these...
-
Report Forrester's 2017 Interactive Data Privacy Heat Map
To help S&R professionals navigate the complex landscape of privacy laws around the world, Forrester created the Data Privacy Heat Map, which explains the data protection guidelines and practices...
-
Report Forrester Data: Endpoint Security Software Forecast, 2016 To 2021 (Global)
ForecastView Document
Hackers are creating new, more sophisticated malware daily, and endpoint security solutions provide a critical line of defense to protect PCs, laptops, and servers from these malicious threats....
-
Report Ransomware Protection: Five Best Practices
Harden Your Defenses Now For This Growing Threat
Ransomware is holding enterprises hostage. Recent outbreaks from variants such as WannaCry and Petya have many security and risk (S&R) pros wondering if they can prevent this growing threat. By...
-
Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities
March 6, 2017 | Kate McCarthy, Chris ShermanHealthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...
-
Report Build A Cross-Functional Mobile Security Team
Evolve Services To Keep Up With Customer Needs
February 22, 2017 | Chris ShermanAs security leaders look to support business engagement with customers, partners, and employees through mobile, they often discover gaps in team expertise. To better organize talent, security execs...