endpoint security

Insights

BLOG

Make No Mistake — Microsoft Is A Security Company Now

Josh Zelonis March 22, 2019
Microsoft has announced support for macOS in its rebranded Microsoft Defender ATP product, taking this product from being an offering that could be considered an add-on for hardening its own operating system to a multiplatform security solution. While this is an early release, it is a clear signal of the investment Microsoft is making to […]
Read More
BLOG

New Tech Spotlight: Security Technology Takes Center Stage

Carlton Doty January 14, 2019
Venture capital and private equity spending on security technology reached an all-time high in 2018. Currently, this emerging technology market sector stands at about $31 billion in total funding. While that total may pale in comparison to other fast-growing markets such as fintech ($124 billion) or transportation tech ($150 billion), consider that 65% of that $31 […]
Read More
BLOG

Tainted Love: Understanding Tainted Detection In The MITRE ATT&CK Evaluation

Josh Zelonis December 17, 2018
In my previous blog post on the MITRE ATT&CK evaluations, I developed a scale for rating the individual vendor evaluations and provided source code to help make the results more generally consumable. Since publishing this blog, I’ve been having a number of conversations with clients about the “tainted” modifier in the recent MITRE ATT&CK evaluations, […]
Read More
BLOG

Quantifying Vendor Efficacy Using The MITRE ATT&CK Evaluation

Josh Zelonis December 5, 2018
I’ve been extremely excited about the MITRE ATT&CK evaluation since it decided to open it up to vendors earlier this year. The endpoint detection and response (EDR) market represents the direction of endpoint security, yet the state of endpoint efficacy testing has been underwhelming. • Antimalware testing has become a standard part of the endpoint […]
Read More
BLOG

The Fight For Cybersecurity Brand Dominance Intensifies

Jeff Pollard November 16, 2018
“Everything Is An Endpoint” Brings BlackBerry Back From The Dead For many, the fact that BlackBerry still exists — and the fact that it spent $1.4 billion of the $2.4 billion in capital it had — is the most surprising part of the Cylance acquisition. BlackBerry hasn’t shirked its mythological status as the case study of what […]
Read More
BLOG

Introducing Forrester’s Asset Intelligence Model (AIM) For Asset Management

Josh Zelonis May 7, 2018
During my presentation at RSA Conference 2018 this year, I discussed what I refer to as the “Heisenberg Uncertainty Principle of Asset Management,” which states that it’s impossible to maintain an asset inventory list in a constantly evolving environment. Think of it this way: Your IT infrastructure is probably a lot like a giant jelly […]
Read More
BLOG

EDR Convergence Into Traditional Endpoints Is Overblown And Misdirected

Josh Zelonis March 27, 2018
  I’m going to start this blog post by saying that if you only read one paragraph, scroll down and make it the last one. I’m frequently approached by vendors who want to know my thoughts on the convergence of endpoint detection and response (EDR) and endpoint protection (EP) into a single-agent solution. “It only […]
Read More
BLOG

CSI: Your Network – Reconstructing the Breach

Josh Zelonis October 5, 2017
September 2017 was a busy month. Three major breach notifications in Deloitte, the SEC, and Equifax… and my first Wave dropped, coincidentally on Digital Forensics & Incident Response Service Providers. Following all this commotion, I had a client reach out and ask me how… How are investigators able to reconstruct digital crime scenes to identify […]
Read More
BLOG

Equifax Does More Than Credit Scores

Jeff Pollard September 8, 2017
Our reaction to the Equifax breach was similar to what we imagine many people went through. First, we wanted to know if we were affected. Second, what about our spouse and other immediate family members? Third, better keep an eye on the old credit report or initiate a credit freeze. Since Forrester offers credit monitoring […]
Read More
BLOG

Endpoint Security Solutions Offer A First Line Of Defense Against Cyberthreats

Jennifer Adams August 24, 2017
The number and complexity of cyberthreats are increasing. Traditional antimalware tools may not be adequate to protect your organization. As hackers create new, more-sophisticated malware, endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. Why is this important? Because employee endpoints are the interface between employees and […]
Read More
BLOG

Calling All Endpoint Detection And Response Vendors

Josh Zelonis July 21, 2017
On July 25, we’re going to start sending out detailed questionnaires to vendors that qualify for our upcoming report entitled Vendor Landscape: Endpoint Detection And Response, 2017. This report will be a collaboration between Chris Sherman and myself, with an expected publication date in September. We will be approaching a product category that is about […]
Read More
BLOG

Answering The Question: What Are The Real And Frightening Risks Within Healthcare Security?

Christopher Sherman December 15, 2015
Connected medical devices are transforming healthcare. Unfortunately, security is too often an afterthought for the clinical engineering and business technology (BT) management teams implementing these revolutionary new technologies. In a recent report, Forrester predicted that 2016 will be the year we see ransomware for a medical device or wearable. This is a delicate thought, considering: […]
Read More
BLOG

Forrester’s Security & Risk Spotlight – Chris Sherman

Stephanie Balaouras September 9, 2015
Forrester’s Security & Risk Analyst Spotlight – Chris Sherman The title hasn’t yet been put to client vote, but Chris Sherman may be the renaissance man of Forrester’s S&R team. As an analyst, Chris advises clients on data security across all endpoints, giving him a broad perspective on current security trends. His experience as a […]
Read More
BLOG

It’s Time For Healthcare CISOs To Close The Faucet Of Data Loss

Christopher Sherman September 4, 2014
By all accounts, we’re approaching a new order of integration between technology and medicine. Real-time medical diagnostic data obtained from our mobile phones will soon be integrated directly into our electronic medical records where clinicians can use the data to make more-accurate (and potentially dynamic) treatment plans. Hospital staff can communicate and react to changing […]
Read More
BLOG

Say “Small Footprint” Again. I Dare You, I Double Dare You.

Rick Holland July 24, 2014
During the past 18 months or so, we have seen the emergence of innovative endpoint security solutions. The list is long; it is hard to keep track of all the solutions in the space. In no particular order, here is a sampling:  Bromium, Invincea, IBM Trusteer, Cylance, Palo Alto Networks Next-Gen Endpoint Protection (Cyvera), Microsoft […]
Read More
BLOG

Was AirWatch Running Out Of Runway?!

Tyler Shields January 28, 2014
It's hard to believe that a company could burn through $225 MILLION dollars in 11 months, but it looks like that may have been exactly what AirWatch did. According to data released by AirWatch and written by financial analysts (links to all data sources at bottom of post), AirWatch likely had burned through nearly all […]
Read More
BLOG

And The Next Punch Is Thrown By …. VMware?!

Tyler Shields January 23, 2014
After reading this blog post, if you would like more detail, fellow Forrester analyst Christian Kane and I have collaborated on two short reports describing the acquisition of AirWatch through the lens of mobile workforce enablement and a second report through the lens of mobile security. Enjoy the reports, and as always… we love to read your comments! On January 22, 2014, a […]
Read More
BLOG

Still On Windows XP? Time To Review Your Options

Christopher Sherman November 25, 2013
Does your organization have a significant number of endpoints still running Windows XP? Don’t worry, you’re not alone: Forrester's Forrsights Hardware Survey, Q3 2013 shows that the average organization still has 20% of their employee endpoints running XP. Considering that most organizations spend 18 to 32 months when migrating to newer versions of Windows, many […]
Read More
BLOG

Orange Business Services Analyst Event 2013: The Cobbler Sticks To His Last

Christopher Sherman July 23, 2013
Brownlee Thomas, Ph.D., Dan Bieler, Henning Dransfeld, Ph.D., Bryan Wang, Clement Teo, Fred Giron, Michele Pelino, Ed Ferrara, Chris Sherman, Jennifer Belissent, Ph.D. Orange Business Services (Orange) hosted its annual analyst event in Paris July 9th & 10th. Our main observations are: Orange accelerates programmes to get through tough market conditions. Orange’s’ vision in 2013 is essentially […]
Read More
BLOG

Defining The Mobile Security Market

Tyler Shields July 9, 2013
Understanding the terms and technologies in the mobile security market can be a daunting and difficult task. The mobile ecosystem is changing at a very rapid pace, causing vendors to pivot their product direction to meet the needs of the enterprise. These changes in direction are creating a merging and twisting of technology descriptions being […]
Read More
More posts