Trend Report

Your Data Protection Strategy Will Fail Without Strong Identity Context

Protecting Information Consistently With Identity Context (PICWIC) Is A Must

 and  two contributors
Jun 27, 2011

Summary

According to Forrester survey data, "trusted" insiders and business partners, intentionally or unintentionally, are responsible for 43% of security breaches. The recent WikiLeaks breach illustrates how a trusted user with unrestricted access to vast amounts of sensitive information is the perfect recipe for an international scandal. Protecting against a breach is difficult because you have an enormous amount of data to protect stored in many silos and growing at an alarming rate. Security professionals often turn to technologies such as data leak prevention (DLP) and enterprise rights management (ERM), but these don't perform well alone without an identity context. You need to have a full understanding of how users join, move, and leave the enterprise so that you can assign and revoke access to sensitive data assets. Adding identity context for information protection, mapping Active Directory groups to file shares, and slowing the explosion of unstructured information are key to preventing a breach.

Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.
Purchase this report
This report is available for individual purchase ($1495).