Trends Report

Your Data Protection Strategy Will Fail Without Strong Identity Context

Protecting Information Consistently With Identity Context (PICWIC) Is A Must

June 27th, 2011
With contributors:

Summary

According to Forrester survey data, "trusted" insiders and business partners, intentionally or unintentionally, are responsible for 43% of security breaches. The recent WikiLeaks breach illustrates how a trusted user with unrestricted access to vast amounts of sensitive information is the perfect recipe for an international scandal. Protecting against a breach is difficult because you have an enormous amount of data to protect stored in many silos and growing at an alarming rate. Security professionals often turn to technologies such as data leak prevention (DLP) and enterprise rights management (ERM), but these don't perform well alone without an identity context. You need to have a full understanding of how users join, move, and leave the enterprise so that you can assign and revoke access to sensitive data assets. Adding identity context for information protection, mapping Active Directory groups to file shares, and slowing the explosion of unstructured information are key to preventing a breach.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.