network security
In an increasingly connected world, excellent network security is a business imperative. Read our insights on how your business can protect its networks.
Insights
Blog
Modernize Your Cloud Governance To Match Today’s Cloud Strategy
As the cloud landscape adapts to new changes, there is a renewed interest in cloud governance programs. But implementation of cloud governance may prove to be more difficult than expected. Find out why.
Blog
Key Learnings From The First-Ever Forrester Wave™ On Security Service Edge Solutions
Get a preview of Forrester's first-ever Wave for Security Service Edge Solutions evaluating the 11 most important vendors in this space.
Conquer Your GenAI Security, Risk & Privacy Fears
Watch our webinar to learn how security leaders can identify and manage enterprise genAI risk across models, APIs, and applications — and follow paths to secure, trusted adoption.
Blog
Cisco Is Getting Back Into The Game
Big changes have started to ripple through Cisco as it slims down one of the industry’s largest routing, switching, and wireless product portfolios. Learn more about its updated networking strategy.
Blog
VMware Customers: Brace For Impact
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Blog
Announcing The Forrester Wave™: Zero Trust Platform Providers, Q3 2023
Get an inside look at some of the highlights and findings from the new Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report.
Podcast
Zero Trust Past, Present, And Future
Zero Trust has evolved since its earliest iterations, but it’s never been more vital than it is today. In this episode, Principal Analyst David Holmes discusses the origins of Zero Trust and its future impact on driving business value.
Blog
The CISO And CIO Microsoft Security Dilemma: Fend Off Or Learn To Love?
Should CISOs fend off Microsoft to keep their preferred products or embrace consolidation? Find out in this blog.
Webinar
Enhance Your Security Operations Practice With Agile And Detection Engineering
Get a deep dive on detection engineering in security operations. Hear Forrester advice on best practices and the use of detection–as–code.
Blog
2003 Called, And It Doesn’t Want Its Email Security Appliances Back
Email security appliances have come a long way in the past 20 years. Learn the benefits of cloud-delivered email security.
Blog
Seize The Opportunity: The Security & Risk Enterprise Leadership Award 2023
Last month, Forrester announced its inaugural Security & Risk Enterprise Leadership Award. As former CISOs, my Forrester colleague Brian Wrozek and I are sharing our thoughts about why you should apply. There are tangible benefits to you, your team, your organization, and the greater security community. You should apply — and apply now — for […]
Blog
Announcing Forrester’s Security & Risk Enterprise Leadership Award
Forrester is thrilled to announce its inaugural Security & Risk Enterprise Leadership Award, which will recognize security organizations that have transformed the security, privacy, and risk management functions to fuel long-term success. Learn how to apply here.
Blog
Shift-Everywhere Is The Bullet Train To Secure Software
Application security is in the spotlight with continued breaches due to the vast attack surface applications and their ecosystems provide.
Strenthen Security Operations With Agile SecOps
Read this report to learn how to apply agile software development lifecycle practices (SDLC) to detection and response to create engineering-driven detection operations.
Blog
The Microsegmentation Plot Thickens
Inquiries about microsegmentation (also called Zero Trust segmentation) have been rising steadily, especially since the start of the year. This is great, because it means people are getting serious about Zero Trust (microsegmentation is the super-serious part). All these phone calls are prompting me to share my latest thoughts on the subject, so here we […]
Blog
Protecting Against The Top Cybersecurity Threats In 2023 Requires A Balanced Approach
Get a preview of the top five cybersecurity threats — established and emerging — for this year and learn how to defend against each.
Blog
The EU Cyber Solidarity Act Will Fail If It Is Stunted By Geopolitics And Protectionism
On 18 April 2023, the European Commission adopted a proposal for the EU Cyber Solidarity Act to strengthen cybersecurity capabilities in the EU. The proposed act will support detection and awareness of cybersecurity threats, bolster preparedness of critical entities, reinforce solidarity, and improve crisis management and response capabilities across member states. Additionally, the Commission presented […]
Blog
Get A Head Start On The National Cybersecurity Strategy
This blog outlines Forrester’s existing Security & Risk research to help organizations navigate, manage, and prepare their organizations for the implications of the National Cybersecurity Strategy.
Blog
Introducing Forrester’s Network Analysis And Visibility Landscape, Q1 2023
In today’s Zero Trust (ZT) world, organizations have been heavily focused on Zero Trust edge identity solutions. In some cases, however, they’ve neglected visibility across all the connections, endpoints, and applications in the enterprise. Network analysis and visibility (NAV) solutions have become almost an afterthought to ZT, but they are actually central to a robust […]
Learn How AI Can Be Used In Detection And Response
Watch this video for a reality check on what can (and can’t) be done with AI and security.
Blog
A Zero Trust Paradox: Which Comes First, Microsegmentation Or Microperimeter?
The common trope, “What came first, the chicken or the egg?” is a question about origins and paradoxical relationships. Security and risk conversations about microsegmentation and microperimeters suffer from a similar dilemma. These two concepts are heavily emphasized in Zero Trust conversations as key components to advance maturity. Security and risk pros confuse the usage […]
Blog
Cybersecurity Risk Dashboards: No Value, Extreme Liability
Over the last 12 months, “risk dashboards” became all the rage in cybersecurity, with varied titles such as “risk index,” “security baseline,” “security posture,” and “risk posture.” These dashboards appear in a vendor’s user interface and purport to help security programs improve. Some even offer coveted “benchmark data” that leaders can share with boards and […]
Blog
Enterprise Firewalls: The Security Tech That Keeps On Ticking
Learn the three approaches enterprise firewall vendors are taking to work around a shortage of network security techs.
More posts