23 results in Reports
 

Sorry — your search returned 0 results, so we expanded the date range to "All".

Sort by:
Refine
  • Security & Risk
  • Vendor Landscape

Search Results

  • Report Vendor Landscape: Third-Party Risk Intelligence

    Products Vie To Augment Your Survey-Based Program
    October 20, 2017 | Claire O'Malley, Nick Hayes

    Increasing business reliance on third-party ecosystems, coupled with worsening market volatility and threats, is forcing risk professionals to manage third-party risk at a new level. Point-in-time...

  • Report Vendor Landscape: Data Classification, Q3 2017

    Select The Right Tool To Advance Your Classification Initiative
    October 12, 2017 | Heidi Shey

    Data classification helps to define your data so the technology solutions and people you employ can better understand how to handle sensitive information. It's a capability you can acquire as a...

  • Report Vendor Landscape: eCommerce And Retail Fraud Management Solutions, Q3 2017

    A Focus On Accepting Orders And Business Growth Transforms The Market
    October 6, 2017 | Andras Cser

    As security, risk, and fraud management professionals strive to secure every digital touchpoint of the customer journey, they've discovered that it's imperative to update eCommerce and retail fraud...

  • Report Vendor Landscape: Runtime Application Self-Protection

    Protect Your Imperfect Code Until It Can Be Fixed
    September 29, 2017 | Amy DeMartine

    Even with the best prerelease security testing, developers will never write perfectly secure code. Zero-day attacks will continue to target vulnerable open source components, third-party...

  • Report Vendor Landscape: Cloud Workload Security Solutions, Q3 2017

    New CWS Functionality Offers Better Breach Detection, Granular Control, And More Cloud Integration
    September 1, 2017 | Andras Cser

    As businesses continue to adopt both infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) cloud platforms, S&R pros struggle to protect their organization's valuable data while...

  • Report Vendor Landscape: Application Security Testing

    Choose The Right SAST, DAST, MAST, And IAST For Your Firm's Developers
    August 7, 2017 | Amy DeMartine

    Application releases are getting faster, especially as developers make use of DevOps methodologies to automate releases. Security pros can support and even drive these changes using continuous...

  • Report Vendor Landscape: External Threat Intelligence, 2017

    Look Beyond Your Own Perimeter To Understand And Prevent Threats
    June 26, 2017 | Josh Zelonis

    The threat intelligence market is muddled by confusing messaging that has hurt security and risk (S&R) pros' ability to succeed with their intelligence capabilities. This report provides a course...

  • Report Vendor Landscape: Global Managed Security Services, 2017

    Converged Services Thrive While Isolated Offerings Go Extinct
    April 24, 2017 | Jeff Pollard

    For security pros looking to augment their programs with services partners, this is an age of abundance — abundant budget and abundant choice. But sometimes too many choices is just as bad as no...

  • Report Vendor Landscape: Vulnerability Management, 2017

    Software Vulnerabilities Are The Leading Means Of External Attacks — It's Time To Do Something About It
    April 21, 2017 | Josh Zelonis

    Breaches can undermine customer trust, endanger revenue growth and profits, and permanently tarnish reputations. According to our data, software vulnerabilities are the single largest factor in...

  • Report Vendor Landscape: Anti-Money-Laundering Solutions, 2017

    Digital Innovation And Stricter Regulations Reinvigorate The AML Market
    March 29, 2017 | Andras Cser, Nick Hayes

    Due to recent global terrorist attacks; corporate corruption; and worsening illicit markets such as drugs, guns, and human trafficking; governments realize the importance of countering criminal and...

  • Report Vendor Landscape: Web Application Firewalls

    WAFs Remain Relevant With Machine Learning Features
    January 20, 2017 | Amy DeMartine

    Security pros started widely adopting web application firewalls (WAFs) back in 2006. During the past 10 years, WAF vendors have evolved their products to make them easier to maintain, more...

  • Report Vendor Landscape: Incident Response Service Providers

    IR Services Are Vital To Mitigating The Consequences Of A Breach
    December 21, 2016 | Josh Zelonis

    A mature incident response (IR) is essential to your business. Breaches are inevitable, and the costs and damage to reputation can be massive. As a result, IR-as-a-service has fully graduated into...

  • Report Vendor Landscape: Security Analytics (SA)

    The SA Ecosystem Enables Rapid Detection And Response To Cyberthreats
    November 15, 2016 | Joseph Blankenship

    Enabling their teams to quickly detect and respond to internal and external cyberthreats is critical for security leaders. Security analytics (SA) solutions promise to provide an array of...

  • Report Vendor Landscape: Software Composition Analysis

    Security, Legal, And App Dev Pros Find Common Value In Dependency Management
    October 21, 2016 | Amy DeMartine

    Software composition analysis (SCA) tools provide valuable data to security pros, legal pros, and app developers by identifying software vulnerabilities and exposing licenses for open source...

  • Report Vendor Landscape: Behavioral Biometrics

    Security Pros Can Reduce Fraud Without Damaging Customers' Digital Experience
    October 4, 2016 | Andras Cser, Merritt Maxim

    Behavioral biometrics continuously monitors user behavior, such as typing speed, mouse movements, and touchscreen interactions, to build a baseline profile from which security and risk...

  • Report Vendor Landscape: Global Legal Privacy And Cybersecurity Services

    Nine Law Firms Marry Legal Expertise And Business Acumen To Solve Privacy And Cybersecurity Challenges
    August 12, 2016 | Enza Iannopollo

    In the past, security and risk (S&R) and privacy professionals might have left engaging with external law firms to their own legal departments. However, changes to the regulatory and business...

  • Report Vendor Landscape: Data Loss Prevention Solutions

    Key Vendors For Email, Endpoint, Network, Web, And Cloud DLP Capabilities
    August 4, 2016 | Heidi Shey

    Policies to control data use and movement require enforcement mechanisms. Data loss prevention (DLP) capabilities give security and risk (S&R) professionals the means to enforce those policies and...

  • Report Vendor Landscape: Identity And Access Management Solutions For The Internet Of Things

    Scale, Real-Time Performance, And Data Protection Differentiate IAM IoT Solutions
    May 31, 2016 | Andras Cser, Merritt Maxim

    The internet of things (IoT) presents huge opportunities for today's digital businesses to use connected objects, sensors, and devices for engaging with customers in new ways and streamlining...

  • Report Vendor Landscape: Global Privacy And Data Protection Consulting Services

    As Consulting Services Proliferate And Privacy Stakes Increase, S&R Pros Must Be Especially Cautious In Their Selection
    April 6, 2016 | Enza Iannopollo

    In light of substantial fines for noncompliance and growing pressure from courts, competitors, and customers, security and risk (S&R) professionals must now orchestrate new privacy and data...

  • Report Vendor Landscape: Active Directory Security And Governance Solutions

    Solutions To Help You Secure And Monitor Your Active Directory Infrastructure
    January 5, 2016 | Merritt Maxim, Andras Cser

    Microsoft's Active Directory (AD) has evolved into the most widely used enterprise repository for digital identities. AD's growing importance also means it's a tempting target for hackers who...

  • Report Vendor Landscape: Cloud Access Security Intelligence (CASI) Solutions

    S&R Pros Can Use CASI To Discover Cloud Apps, Monitor Employee Behavior, And Prevent Data Leaks
    December 9, 2015 | Andras Cser

    To support their firms' cloud strategy without compromising security or compliance, security and risk (S&R) pros need to develop a number of important capabilities. They need the capability to: 1)...

  • Report Vendor Landscape: S&R Pros Turn To Cyberthreat Intelligence Providers For Help

    CTI Providers Must Support Every Phase Of The Intelligence Cycle
    November 3, 2015 | Rick Holland

    The overwhelming threat landscape, coupled with the desire to transition from reactive to proactive security, is driving interest in cyberthreat intelligence. Organizations are looking to...

  • Report Vendor Landscape: Identity Verification Solutions

    Identity Verification Stops Customer Identity Theft And Fraud Without Affecting The Customer Experience Across Channels
    September 22, 2015 | Andras Cser, Merritt Maxim

    Because customers are spending more and more time online and engaging with you using digital channels, it's becoming much easier for criminals to commit fraud and identity theft. As your firm seeks...

Content Type

Apply

Filters

Industry

Vendor