Advanced Search

Save Or Share This Report

For Security & Risk Professionals

Kill Your Data To Protect It From Cybercriminals

July 12, 2012

Primary author headshot

Authors

Why Read This Report

As cybercriminals have become more skillful and sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape requires new defensive measures, one of which is the pervasive use of data encryption technologies. In the future, you will encrypt data — both in motion and at rest — by default. This data-centric approach to security is a much more effective way to keep up with determined cybercriminals. By encrypting, and thereby devaluing, your sensitive data, you can make cybercriminals bypass your networks and look for less robustly protected targets. Encryption will become a strategic cornerstone for security and risk (S&R) executives responsible for their organization's data security and privacy efforts. We designed this report to help you understand how to use encryption, tokenization, and other technologies to "kill your data."

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($499 USD).

Purchase

Table of Contents

  • If They Can't Sell It, They Won't Steal It
  • Encryption Already Exists Throughout Today's Enterprise
  • You Don't Have To Be A Cryptographer To Use Encryption
  • RECOMMENDATIONS

  • It's All About The Data
  • Supplemental Material
  • Related Research Documents

Recommended Research