Blog
Last Wednesday, we released The Forrester Wave™: Workforce Identity Platforms, Q1 2024. We looked at the top 12 vendors in the market and evaluated them across 24 criteria. Workforce identity platforms energize a centripetal (inward) force necessary to combat the centrifugal (outward) forces that challenge identity and access management (IAM) deployments in organizations today. These […]
Blog
Get a preview of Forrester's first-ever Wave for Security Service Edge Solutions evaluating the 11 most important vendors in this space.
Blog
What is Broadcom planning to do with VMware’s Carbon Black unit? Find out in this blog covering the plan to integrate Carbon Black with Broadcom's existing product lineup.
Blog
As digital threats grow more sophisticated and European and international regulatory landscapes more intricate, the role of cybersecurity consulting services is critical. Hence, I’m excited to announce The Forrester Wave™: Cybersecurity Consulting Services In Europe, Q1 2024 (available for Forrester clients). In this report, my colleagues and I scrutinize the offerings of major players in […]
Blog
The US Cybersecurity and Infrastructure Security Agency (CISA) recently announced the 2024 cybersecurity priorities for the Joint Cyber Defense Collaborative (JCDC). Get a preview of them in this blog.
Blog
You've heard about high-performance IT. Now learn how the CISO and the security organization fits into this new technology model.
Blog
Find out how Broadcom's plan to divest VMware’s EUC And Carbon Black businesses could impact customers and the market overall.
Blog
Find which Forrester research can help navigate, manage, and prepare for the newly announced Australian Cyber Security Strategy.
Blog
With the VMware-Broadcom deal set for closing, what should you know? Learn five key things VMware customers can expect in the coming years.
Blog
Learn why breaches with a high impact on society, such as recent cyberattacks in Germany, bring more focus on concentration risk.
Blog
Learn why the news of Palo Alto Networks' intentions to acquire Talon Cyber Security demonstrates the importance of securing the browser.
Blog
Learn three key trends currently driving the endpoint security market in a preview of the new Wave report on endpoint security.
Blog
TL;DR: It gauges your vendor’s commitment. As some of you might have noticed, David Holmes and I released Forrester’s inaugural ZTE evaluation, The Forrester Wave™: Zero Trust Edge Solutions, Q3 2023. If you haven’t taken a look, please do. The research is the first in the industry to tackle the secure WAN space, with probably […]
Blog
Get an inside look at some of the highlights and findings from the new Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report.
Blog
Hans Christian Anderson’s classic tale of the emperor that gets duped into a fancy, new, and invisible wardrobe provides lessons in swindling, pride, and truth. It’s only when the emperor struts in front of the commoners that a child finally states, “Wait a minute — there’s nothing to this outfit. He’s not wearing anything.” As […]
Podcast
Zero Trust has evolved since its earliest iterations, but it’s never been more vital than it is today. In this episode, Principal Analyst David Holmes discusses the origins of Zero Trust and its future impact on driving business value.
Blog
Vulnerability risk management (VRM) solutions look very different today than they did in 2019. Learn what's changed in our new Wave report.
Blog
Curious about Zero Trust in the cloud? Learn more about it in this preview of our upcoming Security & Risk Forum.
Blog
Get an inside look at the industry’s first evaluation of all-in-one Zero Trust Edge (ZTE) solutions, which some vendors call secure software-defined WAN (SD-WAN) and others call secure access service edge (SASE).
Blog
As a mariner, I know the value of paying attention to the tides to navigate complex waterways in previously untraveled waters. This Tech Tide™ enables security and risk pros to identify wasteful and redundant technologies while focusing on the current attack surface. As attacks increase in sophistication, Zero Trust threat detection and response has become […]