Market Overview: Secure File Sharing And Collaboration TechnologiesApril 2014
"Whether the organization's interest in file sharing and collaboration solutions comes from BYOD initiatives, workforce demands, or peer and partner collaboration requirements, security and risk (S&R) pros are increasingly asked to weigh in or lead efforts to securely enable this critical business process. S&R pros should consider such solutions as tools to help augment and support a holistic data protection strategy. This report (part 2 in a series of three) showcases workforce behaviors and trends that are hastening demand for secure file sharing and collaboration solutions and identifies key data control feature functions that S&R pros have available today.
The Business Case For PrivacyJune 2014
In this report, Forrester examines the business and financial impact of protecting customer privacy on the business' ability to win, serve, and retain customers.
Spotlight: The CISO/Chief Privacy Officer RelationshipJune 2014
In this report, Forrester examines how the chief information security officer and the chief privacy officer collaborate to operationalize the successful implementation of a privacy progam that safeguards both employee and customer data in order to achieve regulatory compliance without sacrificing business outcomes.
Q&A: The Top Ten Most Important Changes To The EU Privacy DirectiveJune 2014
Major changes to the EU Data Privacy Directive are expected to be voted on and finalized this May. The changes will have far-reaching impacts on how technology management and business leaders can collect, store, access, use and transmit personal data.
Spotlight: The CMO/Chief Privacy Officer RelationshipAugust 2014
In this report, Forrester examines how the CMO and the chief privacy officer collaborate to safeguard customer data while achieving business outcomes.
Consumer Security And Privacy Technology LandscapeMay 2014
This report will examine trends in consumer security and privacy that will affect enterprise security strategy. It will also examine how trends in BYO device and applications, emergence of wearable technology and other "Internet of Things" technologies together with shifts in consumer perpections of personal security and privacy affect enterprise security strategy and security during product and app development.
Lessons Learned From The World's Biggest Breaches, Privacy Abuses, And Risk Management Failures, Q2 2014June 2014
In this annual report, Forrester analysts examine the response from the five most notable customer security breaches and incidents of the past year to glean and share critical lessons for security pros responsible for protecting customer data, threat and vulnerability management, as well as incident management and forensics. This report will also examine the financial cost and brand/reputation impact to the enterprise.