4 Leaders in the Forrester Wave: Cybersecurity Incident Response Services, Q1 2019




Disclaimer: The opinions described in this article belong to the researchers and editors of The Forrester Wave: Cybersecurity Incident Response Services, Q1 2019 report. Solutions Review does not expressly condone any individual solution or solution provider.


Cambridge, MA-based analyst house Forrester Research has recently released the latest iteration of its flagship Wave Report; the report is entitled “The Forrester Wave: Cybersecurity Incident Response Services, Q1 2019.”   




In an 11-criterion evaluation of incident response providers, researchers Josh Zelonis, Stephanie Balaouras, Madeline Cyr, Peggy Dostie identify what they consider the 15 most significant providers in the market space.


The 15 solution providers listed in the Forrester Wave: Cybersecurity Incident Response Services, Q1 2019 include Aon, Booz Allen Hamilton, CrowdStrike, Cylance, Deloitte, EY, FireEye, IBM, KPMG, NCC Group, Optiv, PwC, Secureworks, Trustwave, and Verizon.


The Wave Report describes Forrester’s findings; moreover, it examines how each provider meets its researchers’ evaluation criteria.


Additionally, with this information, Forrester’s researchers place each vendor in a graph, labeling them Leaders, Strong Performers, Contenders, and Challengers in relation to one another.


The editors of Solutions Review read the Forrester Wave IR report. Here’s what we found.


Key Capabilities in Incident Response Services


The Forrester Wave Report outlines some of the key capabilities of modern IR solution providers. These include:


  • Immersive training facilities for real-world breach training.

  • Capacity for outsourced capabilities.

  • Mapping for remediation implementations post-breach.

  • According to Forrester Research, 50% of global security decision makers suffered at least one breach within the past year. With this statistic in mind, the necessity of incident response for enterprises be ..

    Support the originator by clicking the read the rest link below.