network security

In an increasingly connected world, excellent network security is a business imperative. Read our insights on how your business can protect its networks.

Insights

Blog

Our Newest Round Of ZTX Evaluations Is Out

Chase Cunningham 3 days ago
Today, we published our newest round of evaluations for the Zero Trust eXtended (ZTX) ecosystem, “The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020.” When we embarked on this journey, Research Associate Alexis Bouffard and I started with roughly 130 potential vendors. We narrowed that down to 38 vendors for the “Now Tech: […]
Read More
Blog

A Look Back At Zero Trust: Never Trust, Always Verify

Chase Cunningham August 24, 2020
What exactly is Zero Trust? For those of you who’ve been hiding away in a cave for the past decade, Zero Trust (ZT) is a concept founded by Forrester alum John Kindervag in 2009 that centers on the belief that trust is a vulnerability, and security must be designed with the strategy, “Never trust, always […]
Read More
Blog

There’s A Growing Blind Spot For Your Security Team During The Pandemic — IoT Devices

Christopher Sherman August 10, 2020
Businesses may not be able to dictate what devices employees keep on their home networks, there are still many options available to IT departments to protect company assets.
Read More
Blog

Smackdown! Enterprise Monitoring Vs. TLS 1.3 And DNS-Over-HTTPS

David Holmes August 3, 2020
Technically, the male praying mantis mates for life. If you know anything about the mating habits of the female sex of that particular insect, you now also understand the limitations of the word “technically.” Similarly, technically, TLS 1.3 and DNS-over-HTTPS (DoH) are improvements upon previous technologies that are supposed to improve security. But in reality, […]
Read More
Blog

Microsoft Purchases CyberX

Brian Kime June 22, 2020
Today, Microsoft announced that it has acquired Waltham, Massachusetts-based internet-of-things (IoT) and industrial control system (ICS) security vendor CyberX. While the purchase price was not disclosed, media reports are speculating that the purchase price was somewhere between $150–$165 million. Founded in 2013, CyberX has raised $48 million in venture capital, so this deal provides a good return to investors. CyberX’s core solution can monitor IoT and ICS environments […]
Read More
Blog

FW4: The Fourth Generation Of Firewalls

David Holmes April 23, 2020
The rapid work-from-home shift caused by the COVID-19 pandemic has accelerated the need for a new approach to firewalls. Senior Analyst David Holmes reviews the latest approach and provides insight into FW4.
Read More
Blog

The Coronavirus Crisis Puts Telcos Back On The Map As Strategic Providers

Dan Bieler April 20, 2020
The coronavirus crisis offers telcos an opportunity to reposition themselves. Over the medium and longer term, the stronger telcos will benefit from the crisis.
Read More
Blog

Six Aspects To Palo Alto’s Acquisition Of CloudGenix

Andre Kindness April 15, 2020
On March 31, Palo Alto Networks announced the intent to acquire CloudGenix, a software-defined WAN appliance vendor. This was another announcement in a long list from the security and networking industries about merging together SDWAN and security. Such combinations are inevitable because: SDWAN adoption hasn’t matched the hype. Here is a dirty little secret: SDWAN […]
Read More
Blog

Navigating The European 5G Security Debate

Paul McKay March 21, 2020
At present, it is difficult to remember life before the COVID-19 pandemic, but a key switch that has happened is the large-scale shifting of the population to work at home, as widely documented. Some mobile operators in the UK recently have had a bit of a bumpy ride, with spotty coverage and outages experienced as […]
Read More
Blog

Partner With Telecom And Networking Empowerers For Tech-Driven Innovation Gains

James Staten March 4, 2020
At the PTC’20 conference earlier this year, I hosted a session with Asian finance investment leaders on why tech-driven innovations should be prioritized to ensure your company’s future market leadership. My panelists in this session were: Carlos Katsuya, chief investment officer and head of telecom, media, and technology for Asia, Europe, and MENA regions at […]
Read More
Blog

Cloud, Edge, And Beyond

James Staten February 26, 2020
At the PTC’20 conference in Hawaii earlier this year, myself, Joe Weinman from XFORMA LLC, and Dave Temkin from Netflix conducted a power session on how new networking technologies (such as 5G), plus emerging software, computing, and storage approaches, are driving massive corporate IT transformations. These technologies are coming together to help clients drive up […]
Read More
Blog

A CISO’s Guide To Leading Change

Jinan Budge January 21, 2020
5 ways security chiefs can use internal politics to their advantage.
Read More
Blog

Decade Retrospective: Cybersecurity From 2010 To 2019

Jeff Pollard December 17, 2019
From the Intel-McAfee deal to the Sony Pictures breach, VP and Principal Analyst Jeff Pollard reviews the past decade’s cybersecurity highlights and lowlights.
Read More
Blog

Enterprise Security Vendors Need An Infusion Of Open Source Culture

Stephanie Balaouras November 21, 2019
Forrester VP and Group Director Stephanie Balaouras reviews the infusion of an open source development mentality in IBM Security and the impact on the broader security ecosystem.
Read More
Blog

Non-Public 5G Networks Will Be A Critical Building Block Of Your Enterprise Network Strategy

Dan Bieler September 6, 2019
Non-public 5G networks promise better privacy, data security, compliance, and cellular network performance; they also offer safer and more private features for dedicated user groups.
Read More
Blog

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Heidi Shey July 8, 2019
Does your organization have a strategy for protecting employees at home as a part of your overall cybersecurity program? Something that could include, but really goes to a place that is beyond, awareness training? If You Answered “No,” You’re Not Alone Employee privacy is a big reason why not. And yet, as the connected smart […]
Read More
Blog

The Realities Of Rural 5G Deployment In The US

Glenn O'Donnell May 28, 2019
Early last week, Ajit Pai, the chairman of the US Federal Communications Commission (FCC), announced his approval of the merger of T-Mobile and Sprint. This will result in a third megacarrier in the US mobile wireless market, which is a good move for consumers like you and me. I am glad this deal will now […]
Read More
Blog

Zero Trust Goes Mainstream In Europe

Paul McKay April 25, 2019
Over the Easter weekend, we released a new research report looking at implementing Zero Trust in Europe. When we started, we knew that a one-size-fits-all approach would not work in Europe. In addition, general awareness of the Zero Trust security model is much lower in Europe than in the US. Unheard of 12 months ago […]
Read More
Blog

Introducing Forrester’s Asset Intelligence Model (AIM) For Asset Management

Josh Zelonis May 7, 2018
During my presentation at RSA Conference 2018 this year, I discussed what I refer to as the “Heisenberg Uncertainty Principle of Asset Management,” which states that it’s impossible to maintain an asset inventory list in a constantly evolving environment. Think of it this way: Your IT infrastructure is probably a lot like a giant jelly […]
Read More
Blog

The Self-Licking Ice Cream Cone Of Misery For S&R Pros Starts With Startups

Chase Cunningham April 26, 2018
Over the past two weeks, I was at the annual shenanigan bonanza that is the RSA Conference and was also invited to sit on a “Shark Tank” panel for emerging technology startups in Miami. In the span of two weeks, I went from seeing big, well-established companies with massive marketing budgets and millions of dollars […]
Read More
More posts