Endpoint Security

Devices connecting to networks is the bedrock of the digital economy and serve as a hacker’s bread and butter. Read our insights on endpoint security in an increasingly connected world.

Insights

Blog

Cisco Live EMEA 2024: Yes, AI Was Everywhere, And So Was A Surprising Amount of Innovation

Madelein van der Hout 2 days ago
Cisco Live EMEA 2024 was a different event than past years and provided some pleasant surprises. Read our key takeaways from the event based on presentations and personal interactions with some Cisco executives.
Blog

You Got Your Carbon Black In My Symantec! No, You Got Your Symantec In My Carbon Black!

Paddy Harrington March 13, 2024
What is Broadcom planning to do with VMware’s Carbon Black unit? Find out in this blog covering the plan to integrate Carbon Black with Broadcom's existing product lineup.

Stay Ahead Of Threats With Detection And Response Engineering

Enhance your security operations by learning the latest detection and response engineering practices.

Blog

EDR Is Officially Out, And XDR Still Won’t Solve Your SIEM Problems

Allie Mellen November 28, 2023
Forrester predicted that endpoint detection and response (EDR) as we know it would be replaced by extended detection and response (XDR). That day has finally come. Learn the implications of that shift in this blog post.
Blog

VMware Customers: Brace For Impact

Tracy Woo November 22, 2023
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Blog

Tremors Originating From A California Ripple In The Enterprise Browser Market

Paddy Harrington November 9, 2023
Learn why the news of Palo Alto Networks' intentions to acquire Talon Cyber Security demonstrates the importance of securing the browser.
Blog

Announcing The Forrester Wave™: Endpoint Security, Q4 2023

Paddy Harrington October 27, 2023
Learn three key trends currently driving the endpoint security market in a preview of the new Wave report on endpoint security.
Blog

The CISO And CIO Microsoft Security Dilemma: Fend Off Or Learn To Love?

Jeff Pollard September 28, 2023
Should CISOs fend off Microsoft to keep their preferred products or embrace consolidation? Find out in this blog.

Strenthen Security Operations With Agile SecOps

Read this report to learn how to apply agile software development lifecycle practices (SDLC) to detection and response to create engineering-driven detection operations.

Blog

It’s Time That We Activate Proactive Security

Erik Nost September 11, 2023
Learn how focusing on proactive security behaviors can relieve the ongoing security intrusions that reactive security teams must address.
Blog

Seize The Opportunity: The Security & Risk Enterprise Leadership Award 2023

David Levine August 22, 2023
Last month, Forrester announced its inaugural Security & Risk Enterprise Leadership Award. As former CISOs, my Forrester colleague Brian Wrozek and I are sharing our thoughts about why you should apply. There are tangible benefits to you, your team, your organization, and the greater security community. You should apply — and apply now — for […]
Blog

Black Hat USA 2023: Insights From Our Short Vegas Residency

Jeff Pollard August 21, 2023
Black Hat USA 2023: Insights From Our Short Vegas Residency Black Hat has gone from being RSAC’s smaller tech and practitioner-focused cousin to being a commercial showcase for cybersecurity vendors. A tightly packed, noisy Business Hall included over 300 vendors and 400 organizations with booths, which was great for swag but bad for anyone with […]
Blog

Announcing Forrester’s Security & Risk Enterprise Leadership Award

Stephanie Balaouras June 21, 2023
Forrester is thrilled to announce its inaugural Security & Risk Enterprise Leadership Award, which will recognize security organizations that have transformed the security, privacy, and risk management functions to fuel long-term success. Learn how to apply here.
Blog

Protecting Against The Top Cybersecurity Threats In 2023 Requires A Balanced Approach

Brian Wrozek May 1, 2023
Get a preview of the top five cybersecurity threats — established and emerging — for this year and learn how to defend against each.

Learn How AI Can Be Used In Detection And Response

Watch this video for a reality check on what can (and can’t) be done with AI and security.

Blog

Plan Now For Major Changes To Oracle Java Licensing Costs

Steven Russman April 10, 2023
Oracle has again changed licensing rules for its widely used Java product. On January 23, 2023, the company introduced a new license metric, the SE Universal Subscription. It offers all the benefits of the legacy Java SE subscription, plus universal use rights (desktop, server, and third-party cloud) and triage support for customers’ entire Java portfolio, […]
Blog

2023 Security Recommendations: Protect Your Ass(ets) And Lawyer Up

Jeff Pollard March 6, 2023
Forrester recently published Top Recommendations For Your Security Program, 2023 for CISOs and other senior cybersecurity and technology leaders. This year’s overarching theme involves protection (as you might expect) — but not exactly in the way you’d think in the context of security. In 2023, our recommendations fall into three major strategic themes for security […]
Blog

Get A Head Start On The National Cybersecurity Strategy

Jeff Pollard March 2, 2023
This blog outlines Forrester’s existing Security & Risk research to help organizations navigate, manage, and prepare their organizations for the implications of the National Cybersecurity Strategy.
Blog

Cybersecurity Risk Dashboards: No Value, Extreme Liability

Jeff Pollard January 30, 2023
Over the last 12 months, “risk dashboards” became all the rage in cybersecurity, with varied titles such as “risk index,” “security baseline,” “security posture,” and “risk posture.” These dashboards appear in a vendor’s user interface and purport to help security programs improve. Some even offer coveted “benchmark data” that leaders can share with boards and […]
Blog

Endpoint Management 2023: It’s Back To The Basics

Andrew Hewitt November 29, 2022
Tanium's Converge conference reveals how customers are tackling the most persistent challenges in endpoint management today.

Seven Ways To Bolster Network Security Using Zero Trust Edge

Learn how to implement ZTE across all endpoints in an enterprisewide networking fabric.

Blog

Enterprise Browsers Reignite The Browser Wars But This Time For Businesses

Paddy Harrington November 4, 2022
I’ve been in the IT industry long enough to remember the start of the “browser wars,” when Internet Explorer took on Netscape in the late 1990s. Product names such as Mosaic, Netscape, “IE,” and Mozilla (and its next iteration with Firefox) were all part of the browser market development. Safari came along for Mac in […]
Blog

Predictions 2023: Security Pros Face Greater Internal Risks

Heidi Shey October 31, 2022
On top of the usual challenges, in 2023, security pros will see more risk coming from internal forces, such as enabling anywhere work and the future of the office. Learn more in our 2023 predictions.
Blog

Redefining Data Security For The Modern Age

Heidi Shey August 30, 2022
Learn how to redefine data security in an age of multicloud, anywhere work, edge computing, and changing privacy regulations.
More posts