Skip to main content

Save or Share this Report

For Security & Risk Professionals

Your Data Protection Strategy Will Fail Without Strong Identity Context

Protecting Information Consistently With Identity Context (PICWIC) Is A Must

June 27, 2011

Primary author headshot


Why Read This Report

According to Forrester survey data, "trusted" insiders and business partners, intentionally or unintentionally, are responsible for 43% of security breaches. The recent WikiLeaks breach illustrates how a trusted user with unrestricted access to vast amounts of sensitive information is the perfect recipe for an international scandal. Protecting against a breach is difficult because you have an enormous amount of data to protect stored in many silos and growing at an alarming rate. Security professionals often turn to technologies such as data leak prevention (DLP) and enterprise rights management (ERM), but these don't perform well alone without an identity context. You need to have a full understanding of how users join, move, and leave the enterprise so that you can assign and revoke access to sensitive data assets. Adding identity context for information protection, mapping Active Directory groups to file shares, and slowing the explosion of unstructured information are key to preventing a breach.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($745 USD).


Table of Contents

  • You Will Have A Data Breach, And It Could Cost You $7.2 Million
  • DLP Technology By Itself Is Not Enough To Protect Information
  • Enter PICWIC: Protecting Information Consistently With Identity Context
  • Apply PICWIC To Shared Folders And SharePoint
  • Don't Forget About Your Business Partners — Apply PICWIC To Them, Too

  • Beyond Processes, Your Data Protection Is Only As Good As Your People
  • Related Research Documents

Recommended Research