Trends Report

Selecting Data Protection Technologies

Answer Four Key Questions Before Spending Time And Treasure

October 28th, 2009
AJ
Andrew Jaquith
With contributors:
Alexander Crumb , Allison Viglianti , Margaret Ryan , Robert Whiteley III

Summary

Forrester enterprise customers have increasing needs to protect their enterprise data. Not every data protection challenge requires technology to address it. But when effective protection cannot be guaranteed by process compliance alone, technology can play an important supporting role. To narrow down the range of technologies available to them, enterprises should answer four questions about: 1) the business drivers prompting the initiative; 2) the type of data to be protected; 3) the sponsorship of the initiative; and 4) an honest assessment of the time and resources the organization can realistically commit. Enterprises seeking to prevent toxic data from being spilled should choose from full disk encryption (FDE), email encryption, DLP, and DLP Lite technologies. Enterprises seeking to keep their intellectual property secret should consider DLP, eDRM, and file encryption technologies. Regardless of the technologies selected, chances for success increase dramatically when data owners sponsor the solution.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.