network security
In an increasingly connected world, excellent network security is a business imperative. Read our insights on how your business can protect its networks.
Insights
Blog
Thinking Ransomware Defense: Air Gaps?
Air Gaps Aren’t Effective; Scratch Them From Your List . . . The number of companies falling victim to ransomware attacks continues to grow each day. Ransomware inflicts extreme pain, leading to business closure or significant business disruptions. Vendors are developing technology architectures and approaches to solve for these challenges. Each technology and approach has […]
Read More
Blog
Predictions 2021: The Path To A New Normal Demands Increased Cybersecurity Resilience
In 2021, culture issues, budgets, and vendor shifts will be top priorities for cybersecurity leaders. Learn more in our 2021 cybersecurity predictions.
Read More
Blog
Our Newest Round Of ZTX Evaluations Is Out
Today, we published our newest round of evaluations for the Zero Trust eXtended (ZTX) ecosystem, “The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020.” When we embarked on this journey, Research Associate Alexis Bouffard and I started with roughly 130 potential vendors. We narrowed that down to 38 vendors for the “Now Tech: […]
Read More
Blog
A Look Back At Zero Trust: Never Trust, Always Verify
What exactly is Zero Trust? For those of you who’ve been hiding away in a cave for the past decade, Zero Trust (ZT) is a concept founded by Forrester alum John Kindervag in 2009 that centers on the belief that trust is a vulnerability, and security must be designed with the strategy, “Never trust, always […]
Read More
Blog
There’s A Growing Blind Spot For Your Security Team During The Pandemic — IoT Devices
Businesses may not be able to dictate what devices employees keep on their home networks, there are still many options available to IT departments to protect company assets.
Read More
Blog
Smackdown! Enterprise Monitoring Vs. TLS 1.3 And DNS-Over-HTTPS
Technically, the male praying mantis mates for life. If you know anything about the mating habits of the female sex of that particular insect, you now also understand the limitations of the word “technically.” Similarly, technically, TLS 1.3 and DNS-over-HTTPS (DoH) are improvements upon previous technologies that are supposed to improve security. But in reality, […]
Read More
Blog
Microsoft Purchases CyberX
Today, Microsoft announced that it has acquired Waltham, Massachusetts-based internet-of-things (IoT) and industrial control system (ICS) security vendor CyberX. While the purchase price was not disclosed, media reports are speculating that the purchase price was somewhere between $150–$165 million. Founded in 2013, CyberX has raised $48 million in venture capital, so this deal provides a good return to investors. CyberX’s core solution can monitor IoT and ICS environments […]
Read More
Blog
FW4: The Fourth Generation Of Firewalls
The rapid work-from-home shift caused by the COVID-19 pandemic has accelerated the need for a new approach to firewalls. Senior Analyst David Holmes reviews the latest approach and provides insight into FW4.
Read More
Blog
The Coronavirus Crisis Puts Telcos Back On The Map As Strategic Providers
The coronavirus crisis offers telcos an opportunity to reposition themselves. Over the medium and longer term, the stronger telcos will benefit from the crisis.
Read More
Blog
Six Aspects To Palo Alto’s Acquisition Of CloudGenix
On March 31, Palo Alto Networks announced the intent to acquire CloudGenix, a software-defined WAN appliance vendor. This was another announcement in a long list from the security and networking industries about merging together SDWAN and security. Such combinations are inevitable because: SDWAN adoption hasn’t matched the hype. Here is a dirty little secret: SDWAN […]
Read More
Blog
Navigating The European 5G Security Debate
At present, it is difficult to remember life before the COVID-19 pandemic, but a key switch that has happened is the large-scale shifting of the population to work at home, as widely documented. Some mobile operators in the UK recently have had a bit of a bumpy ride, with spotty coverage and outages experienced as […]
Read More
Blog
Partner With Telecom And Networking Empowerers For Tech-Driven Innovation Gains
At the PTC’20 conference earlier this year, I hosted a session with Asian finance investment leaders on why tech-driven innovations should be prioritized to ensure your company’s future market leadership. My panelists in this session were: Carlos Katsuya, chief investment officer and head of telecom, media, and technology for Asia, Europe, and MENA regions at […]
Read More
Blog
Cloud, Edge, And Beyond
At the PTC’20 conference in Hawaii earlier this year, myself, Joe Weinman from XFORMA LLC, and Dave Temkin from Netflix conducted a power session on how new networking technologies (such as 5G), plus emerging software, computing, and storage approaches, are driving massive corporate IT transformations. These technologies are coming together to help clients drive up […]
Read More
Blog
A CISO’s Guide To Leading Change
5 ways security chiefs can use internal politics to their advantage.
Read More
Blog
Decade Retrospective: Cybersecurity From 2010 To 2019
From the Intel-McAfee deal to the Sony Pictures breach, VP and Principal Analyst Jeff Pollard reviews the past decade’s cybersecurity highlights and lowlights.
Read More
Blog
Enterprise Security Vendors Need An Infusion Of Open Source Culture
Forrester VP and Group Director Stephanie Balaouras reviews the infusion of an open source development mentality in IBM Security and the impact on the broader security ecosystem.
Read More
Blog
Non-Public 5G Networks Will Be A Critical Building Block Of Your Enterprise Network Strategy
Non-public 5G networks promise better privacy, data security, compliance, and cellular network performance; they also offer safer and more private features for dedicated user groups.
Read More
Blog
Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home
Does your organization have a strategy for protecting employees at home as a part of your overall cybersecurity program? Something that could include, but really goes to a place that is beyond, awareness training? If You Answered “No,” You’re Not Alone Employee privacy is a big reason why not. And yet, as the connected smart […]
Read More
Blog
The Realities Of Rural 5G Deployment In The US
Early last week, Ajit Pai, the chairman of the US Federal Communications Commission (FCC), announced his approval of the merger of T-Mobile and Sprint. This will result in a third megacarrier in the US mobile wireless market, which is a good move for consumers like you and me. I am glad this deal will now […]
Read More
Blog
Zero Trust Goes Mainstream In Europe
Over the Easter weekend, we released a new research report looking at implementing Zero Trust in Europe. When we started, we knew that a one-size-fits-all approach would not work in Europe. In addition, general awareness of the Zero Trust security model is much lower in Europe than in the US. Unheard of 12 months ago […]
Read More
More posts