
In our 20-criterion evaluation of endpoint detection and response providers, we identified the 15 most significant ones and researched, analyzed, and scored them.
Get access to a single webinar that is currently outside of your subscription.
Price: $300 (USD)
Partner with Forrester Research to get access to webinars, insights and frameworks aligned to your role. Shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer.
In our 20-criterion evaluation of endpoint detection and response (EDR) providers, we identified the 15 most significant ones — Bitdefender, BlackBerry Cylance, Check Point Software Technologies, CrowdStrike, Cybereason, Elastic, FireEye, Fortinet, McAfee, Microsoft, Palo Alto Networks, SentinelOne, Sophos, Trend Micro, and VMware Carbon Black — and researched, analyzed, and scored them. This webinar reviews the results of this research and shows how each provider measures up and helps security professionals select the right one for their needs.
Key takeaways:
Vendors mentioned: Bitdefender, BlackBerry Cylance, Check Point Software Technologies, CrowdStrike, Cybereason, Elastic, FireEye, Fortinet, McAfee, Microsoft, Palo Alto Networks, SentinelOne, Sophos, Trend Micro, and VMware Carbon Black.
Target audience level: intermediate
You'll receive an email with dialing and Webex instructions prior to the Webinar.
See the Webinar FAQs for answers to technical and other Webinar questions.
Accelerate innovation with deeper insights about why autonomous mobility is important, when it will likely pay off, and how others are using it; we feature the latest expert insights, practical tips, and key steps you and your team can take with this rapidly evolving technology. Autonomous mobility can potentially transform transportation, logistics, and urban planning over a mid- to long-term horizon. Join this session to learn more about how this technology will mature and steps you can take to maximize your investment in it.Key takeaways: Learn how autonomous vehicles are shaping the future of transportation.Understand the regulatory and technical challenges.Explore pilot projects and adoption trends.Target audience level: all levels
End-to-end automation means different things to different people. At its narrowest, it’s going from compile to staging. More broadly, it can encompass the entire software development lifecycle, from collecting requirements to eventual retirement of the product and the infrastructure it runs on. Join Naveen, Chris, and Andrew to learn where to best end — and start — your automation journey.Key takeaways: Learn what end-to-end automation means.Discover how to redefine the boundaries of automation.Target audience level: intermediate and advanced
Disruptive technologies are a double-edged sword for environmental sustainability, offering both crucial enablers and significant challenges. On the positive side, technology innovations accelerate energy and resource efficiency, aid in climate adaptation and risk mitigation, monitor crucial sustainability metrics, and even help in environmental conservation. However, the necessary compute power, volume of waste, types of materials needed, and scale of implementing these technologies can offset their benefits.In this webinar, we discuss our latest report, which explores the dual roles of six disruptive technologies, and illustrate the beneficial use cases to guide sustainability and technology leaders on how to use them for good.Key takeaways: Explore the case studies and examples on leveraging disruptive technologies to focus on optimization.Learn about the disruptive technologies that will make the most impact in sustainability in 2025.Target audience level: beginner and intermediate
Generative AI (genAI) has distinct security-, efficiency-, and agility-boosting effects in customer identity and access management (IAM), anti-money laundering (AML), and fraud management. This webinar highlights how to use these capabilities.Key takeaways: Learn the uses of genAI in customer IAM.Discover the uses of genAI in fraud management and AML.Explore the risks of genAI and how to overcome them.Target audience level: intermediate and advanced
The CISO is the arbiter of confidence and protection for the business in a world of geopolitical strife and shifting allegiances; regulatory hurdles and changes to AI and tech; quickly emerging and changing technologies in generative AI (genAI); and constantly evolving cybercriminal activity, including deepfakes. In 2025, five threats will affect security teams more than any other: global regulatory disruptions, high-quality deepfakes, tech exuberance over genAI, job loss radicalization, and genAI-driven extortion. Security pros need to prepare in advance.Key takeaways: Global regulatory disruptions: Data-related policies, regulations, and standards are becoming less aligned between domains and across countries.High-quality deepfakes: Attackers are increasingly using deepfakes because of their ability to cast doubt on security, trust in the media, and brand reputation. Deepfakes impact verification and authentication for almost every user group, including customers, business partners, and workforce members.Tech exuberance over genAI: Enterprise adoption of genAI continues to accelerate as models proliferate, training costs come down, and deployment options increase. But tech and security leaders are learning hard lessons about how different models behave — and the work required to make them secure — as new models emerge.Job loss radicalization: A new economic reality has emerged in 2025 with a flurry of activity that saw job cuts to 4% of the US federal government workforce, massive tech layoffs, and job cuts in Europe. Employees who remain after layoffs are not happy.GenAI-driven extortion: Between continued law enforcement disruption of ransomware gangs and enterprises’ greater focus on business resilience and data backups, ransomware became less lucrative for cybercriminals in 2024. Before genAI, stealing data was only so useful — reviewing millions of emails takes far too much time. Now, with genAI, attackers can perform a quick sentiment analysis on troves of stolen data for extortion schemes.Target audience level: intermediate
If you couldn’t attend RSAC Conference 2025 (or even if you did), the Forrester Security & Risk Team has you covered. Join us for a roundtable on the key themes from the conference, takeaways from the show floor, and insights from some of the biggest sessions.Key takeaways: Learn about the most prominent technology and security themes at the conference.Discover which products and markets are dominating the show floor (and which ones have gone quiet).Hear our takeaways from the RSAC Innovation Sandbox.Explore expo trends: animals, nostalgia, and experiences.Target audience level: all levels