For Security & Risk Professionals

Selecting Data Protection Technologies

Answer Four Key Questions Before Spending Time And Treasure

    Why Read This Report

    Forrester enterprise customers have increasing needs to protect their enterprise data. Not every data protection challenge requires technology to address it. But when effective protection cannot be guaranteed by process compliance alone, technology can play an important supporting role. To narrow down the range of technologies available to them, enterprises should answer four questions about: 1) the business drivers prompting the initiative; 2) the type of data to be protected; 3) the sponsorship of the initiative; and 4) an honest assessment of the time and resources the organization can realistically commit. Enterprises seeking to prevent toxic data from being spilled should choose from full disk encryption (FDE), email encryption, DLP, and DLP Lite technologies. Enterprises seeking to keep their intellectual property secret should consider DLP, eDRM, and file encryption technologies. Regardless of the technologies selected, chances for success increase dramatically when data owners sponsor the solution.
    US $ 499
    Become A Client

    Get objective, pragmatic guidance that helps you make tough decisions and succeed in a complex world. Contact us to learn more.

    Already A Client?
    Log in to read this document.

    TABLE OF CONTENTS

    • Which Data Protection Technologies Are Right For You?
    • Understanding Your Requirements: Toxic Data Versus Secrets
    • Technologies Used To Protect Data
    • Other Tools To Consider
    • Narrowing Your Scope: Deciding Which Technologies To Use
    • RECOMMENDATIONS

      Protecting Enterprise Data Means Using The Right Tool For The Job
    • Related Research Documents