Zero Trust Model
As data security becomes a business imperative for every company and industry, leveraging a Zero Trust security framework (ZTX) can streamline the path to compliance. Learn more about Forrester’s Zero Trust research and framework here.
Insights
Blog
Data Security: The Time Is Now To Pioneer A New Strategy
Data security is both a high priority and struggle for many organizations. Find out why and get some next steps in this preview of our upcoming Security & Risk Summit, December 9–11 in Baltimore.
Blog
Ignite Ingenuity To Manage Insider Risk
In recognition of National Insider Threat Awareness Month, we’ve gathered up some helpful focus areas and next steps to reduce your exposure to insider risk. Learn more at our upcoming Security & Risk Summit in Baltimore on December 9–11.
Blog
Announcing The Forrester Wave™: Microsegmentation Solutions, Q3 2024
Forrester just published the second edition of The Forrester Wave™: Microsegmentation Solutions. Just over two years separates this research from the previous report, and the technological advances over that short time are stunning. The previous evaluation, The Forrester New Wave™: Microsegmentation, Q1 2022, was all about layer 3 microsegmentation in a data center (or private […]
Blog
The 10 Most Important Cloud Trends For 2024
Curious about the top cloud trends in 2024? Learn three of the top 10 cloud trends for 2024 in this preview of a new report.
Blog
Microsoft Enters (And Disrupts) The Burgeoning SSE Market
Learn what Microsoft Entra Suite will mean for the security service edge (SSE) market and how users and companies considering SSE solutions should respond.
Blog
Forrester’s Top 10 Emerging Technologies For 2024: As AI Dominates, Security Becomes Paramount
Forrester’s list of the top 10 emerging technologies for 2024 reflects the continued dominance of AI but also emphasizes the growing importance of security in our increasingly connected world. Get a deep dive on the top 10 list in this blog post.
Blog
Purge Network Myopathy With NAV
What is the definition of network analysis and visibility (NAV) and how does it fit into a Zero Trust framework? This post provides Forrester's definition of NAV and explains why visibility is so vital in today's security environment.
Jan. 30 Tech & Security Predictions Webinar
Join us to dive into the top 2025 predictions and discover their impact on your tech and security strategies — with exclusive insights from the analysts who conducted the research.
Blog
Announcing Forrester’s Security & Risk Enterprise Leadership Award
We have opened the call for our annual Security & Risk Enterprise Leadership Award. This award recognizes organizations that have transformed the security, privacy, and risk management functions into capabilities that fuel long-term success. Learn more about the award and how to apply.
Blog
Building A Zero Trust Roadmap: A Practical Guide
Successful Zero Trust implementations have to tackle some fundamental organizational and technology problems before embarking on ambitious transformation projects. Learn three common problems you may need to address during your Zero Trust implementation journey.
Blog
Key Learnings From The First-Ever Forrester Wave™ On Security Service Edge Solutions
Get a preview of Forrester's first-ever Wave for Security Service Edge Solutions evaluating the 11 most important vendors in this space.
Blog
The European Cybersecurity Consulting Services Market Is Ready For Disruption
As digital threats grow more sophisticated and European and international regulatory landscapes more intricate, the role of cybersecurity consulting services is critical. Hence, I’m excited to announce The Forrester Wave™: Cybersecurity Consulting Services In Europe, Q1 2024 (available for Forrester clients). In this report, my colleagues and I scrutinize the offerings of major players in […]
Blog
High-Performance IT: Security Enters The Chat
You've heard about high-performance IT. Now learn how the CISO and the security organization fits into this new technology model.
See What’s Next For Generative AI In Security Tools
The potential for AI in security tools is just beginning! Watch our webinar replay to learn how generative AI is transforming security tools and impacting security practitioners, along with the exciting innovations that lie ahead.
Blog
VMware Customers: Brace For Impact
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Podcast
Zero Trust Past, Present, And Future
Zero Trust has evolved since its earliest iterations, but it’s never been more vital than it is today. In this episode, Principal Analyst David Holmes discusses the origins of Zero Trust and its future impact on driving business value.
Blog
A Deep Dive Into The Forrester Wave™: Zero Trust Edge Solutions, Q3 2023
Get an inside look at the industry’s first evaluation of all-in-one Zero Trust Edge (ZTE) solutions, which some vendors call secure software-defined WAN (SD-WAN) and others call secure access service edge (SASE).
Blog
Introducing The Zero Trust Threat Detection And Response Tech Tide™
As a mariner, I know the value of paying attention to the tides to navigate complex waterways in previously untraveled waters. This Tech Tide™ enables security and risk pros to identify wasteful and redundant technologies while focusing on the current attack surface. As attacks increase in sophistication, Zero Trust threat detection and response has become […]
Blog
Decoding The New Zero Trust Terminology
Over the last year, I’ve been scared of two things. Our research teams have been planning and publishing a ton of research around Zero Trust, and since we’re analysts, new terminology, and comorbid acronyms, have emerged. My first fear was that all these new terms would confuse both the readers and the market. The second […]
Unleash Your Security Genius In Just 3 Days
Join us in Baltimore December 9–11 for our Security & Risk Summit, featuring 30-plus sessions, workshops, keynotes, case studies, and specialized tracks for targeted learning.
Blog
Asset Management May Make Minds Meander, But Mastery Is Core To Zero Trust
At some point in every organization’s security journey, the problem of asset management inevitably comes up. Solutions are often cosmetic and don’t tackle fundamental issues or provide real visibility. As more organizations chart their Zero Trust course, the asset management problem comes up a lot more, as you cannot mediate what you do not know, […]
Blog
All Aboard: Chart Your Course To Zero Trust Intermediate
Organizations around the world are embarking on their Zero Trust journeys. Often, these voyages are undertaken without a complete understanding of the destination: Zero Trust maturity. Reaching a level of Zero Trust maturity requires careful planning and a steady course to get there. Forrester recently published a report to help security and IT pros achieve […]
Blog
Zero Trust Comes Into The Mainstream In Europe
Until recently, discussions about Zero Trust (ZT) in Europe focused on the what and why. The last year has seen a significant shift in the market, and organizations have now begun focusing on the how. European organizations see significant value in adopting Zero Trust and have taken steps to prioritize adoption. This trend is driven […]
More posts