Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Forrester

Below you will find reports with the source of “Forrester”

image from The Total Economic Impact Of Mimecast

The Total Economic Impact Of Mimecast

This study documents and quantifies how Mimecast protects organizations against threats. Cybercrime affects every organization no matter the size or type, and it’s a threat that is growing and changing constantly. (more available)
Added: January 30, 2023
image from Hiscox Cyber Readiness Report 2021

Hiscox Cyber Readiness Report 2021

This annual cyber readiness report focusing on the threats and losses as reported via a survey of over 6,000 organizations.
Added: April 22, 2021
image from The Rise of the Business-Aligned Security Executive

The Rise of the Business-Aligned Security Executive

This report takes a look at the gap between business and cybersecurity, showing how the two have been aligning.
Added: September 2, 2020
image from The Risk of the Business-Aligned Security Executive

The Risk of the Business-Aligned Security Executive

A survey of 416 security and 425 business executives, combined with telephone interviews of five business and security executives to explore the strategies and practices and medium and large enterprises. (more available)
Added: August 5, 2020
image from Hiscox Cyber Readiness Report 2020

Hiscox Cyber Readiness Report 2020

The fourth annual report from Hiscox. This survey based report collected responses from IT managers, executives, and other professionals across multiple sectors and countries. (more available)
Added: June 25, 2020
image from The State of Application Security, 2020

The State of Application Security, 2020

This report from Forrester goes into the state of application security for 2020, detailing changes in the external attack methods, and changes companies should make to their application security efforts. (more available)
Added: June 24, 2020
image from Data Security Portfolio Vendors, Q2 2019

Data Security Portfolio Vendors, Q2 2019

In our 25-criterion evaluation of data security portfolio providers, we identified the 13 most significant ones — Dell, Digital Guardian, Forcepoint, Google, GTB Technologies, IBM, Imperva, McAfee, Micro Focus, Microsoft, Oracle, Symantec, and Varonis — and researched, analyzed, and scored them. (more available)
Added: February 12, 2020
image from Best Practices: Mitigating Insider Threats

Best Practices: Mitigating Insider Threats

Whether accidental or malicious, insider incidents can result in financial fraud, privacy abuses, intellectual property theft, or damage to infrastructure. It’s difficult for security pros to detect this suspicious activity because insiders need to have privileged access to data to do their jobs. (more available)
Added: September 18, 2019
image from The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

The Forrester Tech Tide: Zero Trust Threat Detection And Response, Q1 2019

Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm’s brand. To accelerate their performance in threat detection and response, companies are evaluating and adopting a range of contributing technologies. (more available)
Added: March 26, 2019
image from Take Control Of Vendor Risk Management Through Continuous Monitoring

Take Control Of Vendor Risk Management Through Continuous Monitoring

This survey, conducted by Forrester Consulting on behalf of BitSight, offers insight in to the critical role that Vendors play in key business functions and how they can create security risks and issues. (more available)
Added: February 17, 2019
image from The Forter/MRC Fraud Attack Index

The Forter/MRC Fraud Attack Index

From the report, “The report also looks at the trends in the usage by fraudsters of specific methods or directions of attack (e. (more available)
Added: February 13, 2019
image from Global Fraud Attack Index: October 2016

Global Fraud Attack Index: October 2016

From the report, “Forter and PYMNTS.com have partnered to track, analyze and report on important fraud trends in the world of payments and online commerce. (more available)
Added: February 13, 2019
image from Global Fraud Attack Index: Third Quarter 2016

Global Fraud Attack Index: Third Quarter 2016

From the report, “Forter and PYMNTS.com have partnered to track, analyze and report on the important trends happening in the world of fraud as it relates to payments and commerce online. (more available)
Added: February 13, 2019
image from Global Fraud Attack Index: Second Quarter 2016

Global Fraud Attack Index: Second Quarter 2016

Forter and PYMNTS.com partnered together to track, analyze and report on the important trends happening in the world of fraud as it relates to payments and commerce online. (more available)
Added: February 13, 2019
image from 2016 The Forter/MRC Fraud Attack Index

2016 The Forter/MRC Fraud Attack Index

From the report, “Overall, 2016 saw a steady rise in online fraud attack rate, which increased 8.9% over the course of the year. (more available)
Added: February 13, 2019
image from Profile of A Fraudster

Profile of A Fraudster

This report offers insight into 6 different fraud profiles in the online world.
Added: February 13, 2019
image from Fraud Attack Index Fifth Edition

Fraud Attack Index Fifth Edition

From the report, “As such, Forter creates a biannual Fraud Attack Index to highlight these changes as they affect e-commerce and mobile merchants and to provide anti-fraud professionals with the context they need to succeed. (more available)
Added: February 13, 2019
image from Security Budgets 2019: The Year Of Services Arrives

Security Budgets 2019: The Year Of Services Arrives

From the report, “This report compares the budgets of global security decision makers at firms spending up to 10%, 11% to 20%, and 21% to 30% of their IT budget on information security. (more available)
Added: February 8, 2019
image from Quantifying The Point Solution Nightmare

Quantifying The Point Solution Nightmare

In March 2018, Tanium commissioned Forrester to conduct a study that analyzes the current state of security and operations tools and how security and operations teams are aligned to manage and support those tools. (more available)
Added: December 29, 2018
image from Top Consumer Authentication Pitfalls To Avoid

Top Consumer Authentication Pitfalls To Avoid

Digital businesses must manage, govern, and secure customers’ access to systems without hurting the customer experience. As firms increase the digital channels for customer interaction, they also increase the number of potentially confusing consumer authentication experiences. (more available)
Added: November 27, 2018
image from The Forester Wave: Emerging Managed Security Services Providers (MSSPs), Q3 2018

The Forester Wave: Emerging Managed Security Services Providers (MSSPs), Q3 2018

In our 24-criterion evaluation of the emerging managed security services providers (MSSPs) market, we identified the 10 most significant providers, and researched, analyzed, and scored them. (more available)
Added: November 20, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 1, 2023 04:08 UTC (build 051771c)