Trend Report

Client Security Purchases Miss The Mark

Enterprise Security Technology Adoption Does Not Protect Against Data Loss

Natalie Lambert
 and  three contributors
Apr 04, 2008

Summary

Security operations managers seem to be stuck in the past — in a time when viruses and worms dominated the security threatscape. Think back over 2007 — even 2006 — can you think of any widespread piece of malicious code that truly disrupted business? Instead, 2007 showed a constant parade of CNN headlines outing the latest data security breach. So, why the focus on malicious code? Because the security operations group is handcuffed by problems they can tactically solve. Implementing personal firewalls and patch management have a proven business case — the threats are real, and the products work. Because the threat seems more remote, making a business case for encryption and information leak prevention is a much harder sell. And unfortunately, we have yet to speak to an enterprise that was able to justify the cost of full disk encryption or client-side information leak prevention without having a breach first.

Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.
Purchase this report
This report is available for individual purchase ($1495).