Zero Trust Model

As data security becomes a business imperative for every company and industry, leveraging a Zero Trust security framework (ZTX) can streamline the path to compliance. Learn more about Forrester’s Zero Trust research and framework here.

Insights

Blog

Our Newest Round Of ZTX Evaluations Is Out

Chase Cunningham 6 days ago
Today, we published our newest round of evaluations for the Zero Trust eXtended (ZTX) ecosystem, “The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020.” When we embarked on this journey, Research Associate Alexis Bouffard and I started with roughly 130 potential vendors. We narrowed that down to 38 vendors for the “Now Tech: […]
Read More
Blog

National Insider Threat Awareness Month: Stop Insiders With Zero Trust

Joseph Blankenship September 3, 2020
The National Counterintelligence and Security Center (NCSC) and the National Insider Threat Task force (NITTF) partnered with US government agencies to kick off the second National Insider Threat Awareness Month this September. National Insider Threat Awareness Month was started in September 2019 with the goal to educate federal and industry employees about the risks posed […]
Read More
Blog

A Look Back At Zero Trust: Never Trust, Always Verify

Chase Cunningham August 24, 2020
What exactly is Zero Trust? For those of you who’ve been hiding away in a cave for the past decade, Zero Trust (ZT) is a concept founded by Forrester alum John Kindervag in 2009 that centers on the belief that trust is a vulnerability, and security must be designed with the strategy, “Never trust, always […]
Read More
Video

Security And Productivity Don’t Have To Be At Odds

Andrew Hewitt August 5, 2020

Watch Now
Blog

Smackdown! Enterprise Monitoring Vs. TLS 1.3 And DNS-Over-HTTPS

David Holmes August 3, 2020
Technically, the male praying mantis mates for life. If you know anything about the mating habits of the female sex of that particular insect, you now also understand the limitations of the word “technically.” Similarly, technically, TLS 1.3 and DNS-over-HTTPS (DoH) are improvements upon previous technologies that are supposed to improve security. But in reality, […]
Read More
Video

Build Advocacy, Support, And Budget For Your Zero Trust Vision

Jinan Budge June 23, 2020

Watch Now
Blog

In A Crisis, People Want Dependable Technology

Glenn O'Donnell April 23, 2020
If there’s one thing the COVID-19 pandemic has taught businesses, it’s how vital core infrastructure and operations are to an organization’s resiliency and dependability. But where does innovation fit into the new normal?
Read More
Blog

Six Aspects To Palo Alto’s Acquisition Of CloudGenix

Andre Kindness April 15, 2020
On March 31, Palo Alto Networks announced the intent to acquire CloudGenix, a software-defined WAN appliance vendor. This was another announcement in a long list from the security and networking industries about merging together SDWAN and security. Such combinations are inevitable because: SDWAN adoption hasn’t matched the hype. Here is a dirty little secret: SDWAN […]
Read More
Blog

Navigating The European 5G Security Debate

Paul McKay March 21, 2020
At present, it is difficult to remember life before the COVID-19 pandemic, but a key switch that has happened is the large-scale shifting of the population to work at home, as widely documented. Some mobile operators in the UK recently have had a bit of a bumpy ride, with spotty coverage and outages experienced as […]
Read More
Blog

RSA Conference 2020: What I’ll Be Looking For At This Year’s Show

Paul McKay February 11, 2020
This year marks my first trip to RSA Conference in San Francisco. I wanted to take a step back and reflect on what I want to gain from the conference. Like many analysts attending, my diary looks like the baubles on a Christmas tree, hung resplendently with meetings, briefings, and everything in between. Here are […]
Read More
Blog

Decade Retrospective: Cybersecurity From 2010 To 2019

Jeff Pollard December 17, 2019
From the Intel-McAfee deal to the Sony Pictures breach, VP and Principal Analyst Jeff Pollard reviews the past decade’s cybersecurity highlights and lowlights.
Read More
Blog

Five Key Resources For Cybersecurity Awareness Month

David Holmes October 17, 2019
Get five new resources for cybersecurity threat management in your enterprise.
Read More