network security

In an increasingly connected world, excellent network security is a business imperative. Read our insights on how your business can protect its networks.

Discover how Forrester supports IT leaders.

Insights

Blog

Key Learnings From The First-Ever Forrester Wave™ On Security Service Edge Solutions

David Holmes March 21, 2024
Get a preview of Forrester's first-ever Wave for Security Service Edge Solutions evaluating the 11 most important vendors in this space.
Blog

Cisco Is Getting Back Into The Game

Andre Kindness December 21, 2023
Big changes have started to ripple through Cisco as it slims down one of the industry’s largest routing, switching, and wireless product portfolios. Learn more about its updated networking strategy.

Conquer Your GenAI Security, Risk & Privacy Fears

Watch our webinar to learn how security leaders can identify and manage enterprise genAI risk across models, APIs, and applications — and follow paths to secure, trusted adoption.

Blog

VMware Customers: Brace For Impact

Tracy Woo November 22, 2023
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Blog

Announcing The Forrester Wave™: Zero Trust Platform Providers, Q3 2023

Carlos Rivera October 19, 2023
Get an inside look at some of the highlights and findings from the new Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report.
Podcast

Zero Trust Past, Present, And Future

What It Means October 12, 2023
Zero Trust has evolved since its earliest iterations, but it’s never been more vital than it is today. In this episode, Principal Analyst David Holmes discusses the origins of Zero Trust and its future impact on driving business value.
Blog

The CISO And CIO Microsoft Security Dilemma: Fend Off Or Learn To Love?

Jeff Pollard September 28, 2023
Should CISOs fend off Microsoft to keep their preferred products or embrace consolidation? Find out in this blog.
Webinar

Enhance Your Security Operations Practice With Agile And Detection Engineering

Get a deep dive on detection engineering in security operations. Hear Forrester advice on best practices and the use of detection–as–code. 

Stay Ahead Of Threats With Detection And Response Engineering

Enhance your security operations by learning the latest detection and response engineering practices.

Blog

2003 Called, And It Doesn’t Want Its Email Security Appliances Back

Joseph Blankenship August 24, 2023
Email security appliances have come a long way in the past 20 years. Learn the benefits of cloud-delivered email security.
Blog

Seize The Opportunity: The Security & Risk Enterprise Leadership Award 2023

David Levine August 22, 2023
Last month, Forrester announced its inaugural Security & Risk Enterprise Leadership Award. As former CISOs, my Forrester colleague Brian Wrozek and I are sharing our thoughts about why you should apply. There are tangible benefits to you, your team, your organization, and the greater security community. You should apply — and apply now — for […]
Blog

Announcing Forrester’s Security & Risk Enterprise Leadership Award

Stephanie Balaouras June 21, 2023
Forrester is thrilled to announce its inaugural Security & Risk Enterprise Leadership Award, which will recognize security organizations that have transformed the security, privacy, and risk management functions to fuel long-term success. Learn how to apply here.
Blog

Shift-Everywhere Is The Bullet Train To Secure Software

Janet Worthington June 20, 2023
Application security is in the spotlight with continued breaches due to the vast attack surface applications and their ecosystems provide.
Blog

The Microsegmentation Plot Thickens

David Holmes May 10, 2023
Inquiries about microsegmentation (also called Zero Trust segmentation) have been rising steadily, especially since the start of the year. This is great, because it means people are getting serious about Zero Trust (microsegmentation is the super-serious part). All these phone calls are prompting me to share my latest thoughts on the subject, so here we […]

Strenthen Security Operations With Agile SecOps

Read this report to learn how to apply agile software development lifecycle practices (SDLC) to detection and response to create engineering-driven detection operations.

Blog

Protecting Against The Top Cybersecurity Threats In 2023 Requires A Balanced Approach

Brian Wrozek May 1, 2023
Get a preview of the top five cybersecurity threats — established and emerging — for this year and learn how to defend against each.
Blog

The EU Cyber Solidarity Act Will Fail If It Is Stunted By Geopolitics And Protectionism

Tope Olufon April 19, 2023
On 18 April 2023, the European Commission adopted a proposal for the EU Cyber Solidarity Act to strengthen cybersecurity capabilities in the EU. The proposed act will support detection and awareness of cybersecurity threats, bolster preparedness of critical entities, reinforce solidarity, and improve crisis management and response capabilities across member states. Additionally, the Commission presented […]
Blog

Get A Head Start On The National Cybersecurity Strategy

Jeff Pollard March 2, 2023
This blog outlines Forrester’s existing Security & Risk research to help organizations navigate, manage, and prepare their organizations for the implications of the National Cybersecurity Strategy.
Blog

Introducing Forrester’s Network Analysis And Visibility Landscape, Q1 2023

Heath Mullins March 1, 2023
In today’s Zero Trust (ZT) world, organizations have been heavily focused on Zero Trust edge identity solutions. In some cases, however, they’ve neglected visibility across all the connections, endpoints, and applications in the enterprise. Network analysis and visibility (NAV) solutions have become almost an afterthought to ZT, but they are actually central to a robust […]
Blog

A Zero Trust Paradox: Which Comes First, Microsegmentation Or Microperimeter?

Carlos Rivera February 21, 2023
The common trope, “What came first, the chicken or the egg?” is a question about origins and paradoxical relationships. Security and risk conversations about microsegmentation and microperimeters suffer from a similar dilemma. These two concepts are heavily emphasized in Zero Trust conversations as key components to advance maturity. Security and risk pros confuse the usage […]

Learn How AI Can Be Used In Detection And Response

Watch this video for a reality check on what can (and can’t) be done with AI and security.

Blog

Cybersecurity Risk Dashboards: No Value, Extreme Liability

Jeff Pollard January 30, 2023
Over the last 12 months, “risk dashboards” became all the rage in cybersecurity, with varied titles such as “risk index,” “security baseline,” “security posture,” and “risk posture.” These dashboards appear in a vendor’s user interface and purport to help security programs improve. Some even offer coveted “benchmark data” that leaders can share with boards and […]
Blog

Enterprise Firewalls: The Security Tech That Keeps On Ticking

David Holmes December 20, 2022
Learn the three approaches enterprise firewall vendors are taking to work around a shortage of network security techs.
Blog

Has Zero Trust Killed Defense in Depth? Or “DiD” It Refine It?

Carlos Rivera December 12, 2022
Zero Trust (ZT) continues to make waves (no pun intended), with US federal agencies now publishing guidance, such as the OMB’s M-22-09 or the DoD’s ZT strategy, for effective implementations, allowing for the government to be viewed as a source of trust in cybersecurity — although ZT is still mired in myths, and these can […]
More posts