Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Forrester

Below you will find reports with the source of “Forrester”

image from The Total Economic Impact  Of 1Password Business

The Total Economic Impact Of 1Password Business

1Password Business is an encrypted password solution that provides users with secure access via autofill logins, autogenerated strong passwords, and vault features. For the purposes of this study, Forrester aggregated the interviewees’ experiences and combined the results into a single composite organization. Forrester took a multistep approach to evaluate the impact that 1Password can have on an organization.

(more available)
Added: October 30, 2024
image from The Total Economic Impact Of Mimecast

The Total Economic Impact Of Mimecast

This study documents and quantifies how Mimecast protects organizations against threats. Cybercrime affects every organization no matter the size or type, and it’s a threat that is growing and changing constantly.

(more available)
Added: January 30, 2023
image from Hiscox Cyber Readiness Report 2021

Hiscox Cyber Readiness Report 2021

This annual cyber readiness report focusing on the threats and losses as reported via a survey of over 6,000 organizations.

(more available)
Added: April 22, 2021
image from The Risk of the Business-Aligned Security Executive

The Risk of the Business-Aligned Security Executive

A survey of 416 security and 425 business executives, combined with telephone interviews of five business and security executives to explore the strategies and practices and medium and large enterprises. Covers board level visibility, explaining the company’s risk posture, risk management, and the role of cybersecurity in business strategy.

(more available)
Added: August 5, 2020
image from Hiscox Cyber Readiness Report 2020

Hiscox Cyber Readiness Report 2020

The fourth annual report from Hiscox. This survey based report collected responses from IT managers, executives, and other professionals across multiple sectors and countries. Focuses on assessing the cyber readiness of firms, budget spend, and losses experienced.

(more available)
Added: June 25, 2020
image from The State of Application Security, 2020

The State of Application Security, 2020

This report from Forrester goes into the state of application security for 2020, detailing changes in the external attack methods, and changes companies should make to their application security efforts.

(more available)
Added: June 24, 2020
image from Data Security Portfolio Vendors, Q2 2019

Data Security Portfolio Vendors, Q2 2019

In our 25-criterion evaluation of data security portfolio providers, we identified the 13 most significant ones — Dell, Digital Guardian, Forcepoint, Google, GTB Technologies, IBM, Imperva, McAfee, Micro Focus, Microsoft, Oracle, Symantec, and Varonis — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals understand the respective strengths of each vendor’s portfolio.

(more available)
Added: February 12, 2020
image from Best Practices: Mitigating Insider Threats

Best Practices: Mitigating Insider Threats

Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It’s difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data to do their jobs. Since insiders are people and, therefore, entitled to privacy and due process, security pros must handle these incidents with greater care than external threats. This report describes how to build an insider threat program.

(more available)
Added: September 18, 2019
image from The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm’s brand. To accelerate their performance in threat detection and response, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide™ report presents an analysis of the maturity and business value of the 18 technology categories that support Zero Trust threat detection and response. Security professionals should read this report to shape their firm’s investment approach to these technologies.

(more available)
Added: March 26, 2019
image from Take Control Of Vendor Risk Management Through Continuous Monitoring

Take Control Of Vendor Risk Management Through Continuous Monitoring

This survey, conducted by Forrester Consulting on behalf of BitSight, offers insight in to the critical role that Vendors play in key business functions and how they can create security risks and issues.

(more available)
Added: February 17, 2019
image from The Forter/MRC Fraud Attack Index

The Forter/MRC Fraud Attack Index

From the report, “The report also looks at the trends in the usage by fraudsters of specific methods or directions of attack (e.g. location manipulation, account takeover, etc.). This is to provide insight into the various techniques commonly employed by today’s savvy fraudster. The increased sophistication of the online criminal underworld, where a huge and connected marketplace exists to provide numerous services that make theft easier (and where stolen data can be found easily and cheaply following the massive data breaches of the last few years), means that fraudsters have direct access to the tools and information they need to commit online fraud. This has lowered the barrier to entry for new fraudsters to enter, and enabled experienced fraudsters to increase the scale, sophistication and speed of their attacks. This report is designed to reflect the current patterns in that scene and help merchants to understand further and prepare for the attacks they are seeing or are likely to face.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Global Fraud Attack Index: October 2016

Global Fraud Attack Index: October 2016

From the report, “Forter and PYMNTS.com have partnered to track, analyze and report on important fraud trends in the world of payments and online commerce. Every quarter, we monitor fraud attempts on U.S. merchant websites to give you the latest insights on what’s going on. (Note: For each of the Indexes in 2016, we’re using 2015’s fraud rates as a benchmark.) Our take-home this quarter: Fraud rates are climbing. They climbed last quarter and are still climbing this quarter. In fact, overall fraud rates have increased by 14 percent from last quarter to this quarter. To find out how fraudsters are doing it and what methods they favor, keep reading.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Global Fraud Attack Index: Third Quarter 2016

Global Fraud Attack Index: Third Quarter 2016

From the report, “Forter and PYMNTS.com have partnered to track, analyze and report on the important trends happening in the world of fraud as it relates to payments and commerce online. Every quarter, we are monitoring fraud attempts, reflected as a percent of U.S. sales transactions , on U.S. merchant websites. How big is the storm? Where is it? How is it changing? Read on to find out. For each of the Index editions in 2016, we are using the fraud rates observed in 2015 as a benchmark for comparing the state of fraud each quarter.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Global Fraud Attack Index: Second Quarter 2016

Global Fraud Attack Index: Second Quarter 2016

Forter and PYMNTS.com partnered together to track, analyze and report on the important trends happening in the world of fraud as it relates to payments and commerce online. Every quarter we will monitor how fraud attempts, reflected as a percent of U.S. sales transactions, on U.S. merchant websites are trending. Up? Down? Stable? Time to panic? Hopefully not.

(more available)
Added: February 13, 2019
image from 2016 The Forter/MRC Fraud Attack Index

2016 The Forter/MRC Fraud Attack Index

From the report, “Overall, 2016 saw a steady rise in online fraud attack rate, which increased 8.9% over the course of the year. The frightening “tsunami” of fraud attempts that many merchants experienced at the end of 2015 was not repeated, but the moderate rate of increase was sustained. For several industries, primarily apparel, digital goods and travel, 2016 was a year of dramatic fluctuations, affected by numerous fraudsters who were looking for new vulnerabilities they can exploit.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Profile of A Fraudster

Profile of A Fraudster

This report offers insight into 6 different fraud profiles in the online world.

Added: February 13, 2019
image from Fraud Attack Index Fifth Edition

Fraud Attack Index Fifth Edition

From the report, “As such, Forter creates a biannual Fraud Attack Index to highlight these changes as they affect e-commerce and mobile merchants and to provide anti-fraud professionals with the context they need to succeed. This report leverages Forter’s data to examine the trends in online fraud attacks across industries, comparing the different fraud experienced by different verticals. The report also looks at the prevalence of specific fraud methods or directions of attack (e.g. location manipulation, botnets, etc.). This is to provide insights into the various techniques commonly employed by today’s cunning fraudsters.” Read on to find out more.

(more available)
Added: February 13, 2019
image from Security Budgets 2019: The Year Of Services Arrives

Security Budgets 2019: The Year Of Services Arrives

From the report, “This report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. Security leaders can use these budget ranges as a starting point to evaluate their own programs, then compare their product, service, staffing, and other allocations with those of similar firms.” Read on to find out more.

(more available)
Added: February 8, 2019
image from Quantifying The Point Solution Nightmare

Quantifying The Point Solution Nightmare

In March 2018, Tanium commissioned Forrester to conduct a study that analyzes the current state of security and operations tools and how security and operations teams are aligned to manage and support those tools. The study surveyed 200 IT security and operations decision makers in North America responsible for endpoint solutions at their organization.

(more available)
Added: December 29, 2018
image from Top Consumer Authentication Pitfalls To Avoid

Top Consumer Authentication Pitfalls To Avoid

Digital businesses must manage, govern, and secure customers’ access to systems without hurting the customer experience. As firms increase the digital channels for customer interaction, they also increase the number of potentially confusing consumer authentication experiences. As a result, they’re hemorrhaging customers and suffering increased support costs related to password and authentication. This report outlines 10 barriers to authentication success — and how S&R pros can improve online security without sacrificing experience.

(more available)
Added: November 27, 2018
image from The Forester Wave: Emerging Managed Security Services Providers (MSSPs), Q3 2018

The Forester Wave: Emerging Managed Security Services Providers (MSSPs), Q3 2018

In our 24-criterion evaluation of the emerging managed security services providers (MSSPs) market, we identified the 10 most significant providers, and researched, analyzed, and scored them. This report shows how each provider measures up to help security leaders make the right choice.

(more available)
Added: November 20, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)