network security

In an increasingly connected world, excellent network security is a business imperative. Read our insights on how your business can protect its networks.

Insights

BLOG

Non-Public 5G Networks Will Be A Critical Building Block Of Your Enterprise Network Strategy

Dan Bieler September 6, 2019
Non-public 5G networks promise better privacy, data security, compliance, and cellular network performance; they also offer safer and more private features for dedicated user groups.
Read More
BLOG

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Heidi Shey July 8, 2019
Does your organization have a strategy for protecting employees at home as a part of your overall cybersecurity program? Something that could include, but really goes to a place that is beyond, awareness training? If You Answered “No,” You’re Not Alone Employee privacy is a big reason why not. And yet, as the connected smart […]
Read More

Five Steps To Zero Trust Security

How to achieve and maintain Zero Trust.

BLOG

The Realities Of Rural 5G Deployment In The US

Glenn O'Donnell May 28, 2019
Early last week, Ajit Pai, the chairman of the US Federal Communications Commission (FCC), announced his approval of the merger of T-Mobile and Sprint. This will result in a third megacarrier in the US mobile wireless market, which is a good move for consumers like you and me. I am glad this deal will now […]
Read More
BLOG

Zero Trust Goes Mainstream In Europe

Paul McKay April 25, 2019
Over the Easter weekend, we released a new research report looking at implementing Zero Trust in Europe. When we started, we knew that a one-size-fits-all approach would not work in Europe. In addition, general awareness of the Zero Trust security model is much lower in Europe than in the US. Unheard of 12 months ago […]
Read More
BLOG

Introducing Forrester’s Asset Intelligence Model (AIM) For Asset Management

Josh Zelonis May 7, 2018
During my presentation at RSA Conference 2018 this year, I discussed what I refer to as the “Heisenberg Uncertainty Principle of Asset Management,” which states that it’s impossible to maintain an asset inventory list in a constantly evolving environment. Think of it this way: Your IT infrastructure is probably a lot like a giant jelly […]
Read More
BLOG

The Self-Licking Ice Cream Cone Of Misery For S&R Pros Starts With Startups

Chase Cunningham April 26, 2018
Over the past two weeks, I was at the annual shenanigan bonanza that is the RSA Conference and was also invited to sit on a “Shark Tank” panel for emerging technology startups in Miami. In the span of two weeks, I went from seeing big, well-established companies with massive marketing budgets and millions of dollars […]
Read More
PODCAST

The Zen Of Zero Trust

What It Means April 26, 2018
Forrester Principal Analyst Chase Cunningham explains Zero Trust: The concept behind the framework and how companies should implement it to protect their business.
Listen Now

Zero Trust In Practice

The theory of Zero Trust was penned by Forrester almost a decade ago. Now, we help you put it in practice.

BLOG

CSI: Your Network – Reconstructing the Breach

Josh Zelonis October 5, 2017
September 2017 was a busy month. Three major breach notifications in Deloitte, the SEC, and Equifax… and my first Wave dropped, coincidentally on Digital Forensics & Incident Response Service Providers. Following all this commotion, I had a client reach out and ask me how… How are investigators able to reconstruct digital crime scenes to identify […]
Read More
BLOG

You Deserve What You Tolerate . . .

Chase Cunningham August 18, 2017
After reading through some other blogs and strategy papers over the weekend (don’t judge me; to some of us, this activity constitutes a good time . . . yes, lame . . . I know), I saw what appeared to be an underlying theme across the narratives I’d read: Security tolerates failure. It’s understandable that […]
Read More
BLOG

Simplicity is a strategy that works.

Chase Cunningham June 19, 2017
This last week I was fortunate enough to be invited out to Hollywood to participate in a large exercise for the entertainment industry focusing on cyber security planning and threat management.  There were folks in attendance from a variety of organizations, all of which were very interested in just how exposed they might be to […]
Read More
BLOG

Automated Malware Analysis Technologies Central To Defense Strategies

Jeff Pollard April 21, 2016
"The most important security alerts we see." That’s how one customer described the importance of Automated Malware Analysis technologies in their security workflow. After months of demonstrations, reference calls, and analysis we are thrilled that The Forrester Wave™: Automated Malware Analysis, Q2 2016 is live! Many clients we talked to used multiple vendors to analyze […]
Read More
BLOG

Large Telecoms Offer A Full Menu Of Security Services, But Not Without A Little Indigestion

Forrester August 15, 2012
Guest Post From Researcher Chris Sherman  Last month, Ed and I spent a couple days in Paris with Orange's management team for their annual analyst event. Overall I was impressed with Orange’s innovation in business service offerings as well as their extensive global reach. Many of the large telecoms (Verizon, AT&T, Sprint, etc.) have had […]
Read More

Future-Proof Your Business With Zero Trust

Prioritize your next steps towards a Zero Trust strategy and architecture.

BLOG

Epsilon’s Data Breach Raises Awareness Of Cyber Crime

Shar VanBoskirk April 22, 2011
By now, you've all heard about Epsilon's April 1 data breach — an unauthorized party accessed a subset of Epsilon's email clients' data. My colleague Dave Frankland outlines the circumstances of the incident and its implications on Customer Intelligence and data security in his blog post immediately following the incident. I attended Epsilon's Customer Symposium in Naples, Fla., […]
Read More
BLOG

Cyber Security Roundtable: Security In The Cyber World

Forrester August 10, 2010
 I had the pleasure of attending Open Group Conference Boston just two weeks ago. Historically, this conference aims at bringing enterprise architects together from various industries to talk about important architectural issues. This time around, they dedicated track sessions to the security topic. Among other things, I had an opportunity to record a podcast with Dana Gardner, […]
Read More
BLOG

Hacking The Building Information Management And Vehicle Communication Systems

Forrester June 4, 2010
In the past week or so, I have seen many interesting articles about vulnerabilities in control systems. Just last week I came across one about security issues in the Cisco Network Building Mediator, a product from Cisco’s acquisition of Richards-Zeta. There was another interesting piece about exploiting vulnerabilities in the modern automobile networks. Cisco issued a […]
Read More
BLOG

Security For Industrial Control Systems — Is It A Missing Link To Critical Infrastructure Security?

Forrester May 11, 2010
I was just reading the recent Elinor Mills interview with Joe Weiss, and I wanted to share a few of my thoughts on the subject of securing industrial control system (ICS). Security for industrial control systems is an important topic in the modernization of critical infrastructure components. Sometimes we get too hung up on concepts […]
Read More
BLOG

What Did We Learn From The Cyber Shockwave…March Madness Can Cripple Our Infrastructure

Forrester February 19, 2010
Just this Tuesday, February 16th 2010, the Bipartisan Policy Center hosted a mock cyber attack called Cyber Shockwave. The aim of this simulation was to understand the impacts of a cyber attack and assess infrastructure capability during such an incident. There are many articles explaining the motive and results of this simulation, and post mortem is still […]
Read More
BLOG

Plain speaking about industrial spying

Forrester January 25, 2010
Or: why “advanced persistent threat” is the wrong phrase Google's revelation that it was hacked by (likely) Chinese actors has helped propel another round of stories, blog posts, and analyses about What It Means. I have participated in some of these discussions, and my colleague Chenxi Wang has written several illuminating posts about the nature […]
Read More
BLOG

Forrester’s latest Security Survey findings published

Forrester January 25, 2010
I wanted to announce that the reports based on our annual Security Survey of nearly 2,000 organizations are live as of Monday, January 25th. These are among our most widely read security reports, with insight into IT security priorities, challenges, state of compliance efforts, and of course adoption of security technologies and services. The two […]
Read More
BLOG

Cyber security sees the light of day in the NIST smart grid interoperability standard

Forrester January 22, 2010
Just this week on Tuesday, NIST published release 1.0 of the smart grid interoperability standards. Most notably, this is the first attempt to address cyber security in smart grid deployments. This release points to various standards that can be used for implementing interoperability and security controls, and it’s fair to say that it plants the […]
Read More
More posts