Summary
Security and risk professionals are facing a growing concern: Sensitive data is stored on assets that the company does not own. Increased use of contractors and consultants, increased offshoring and outsourcing, and Tech Populism are driving this concern. Enterprises can begin solving this problem if they abolish the assumption that data control requires the enterprise to own its endpoints. When all endpoints are treated as hostile, enterprises can implement one of five design patterns to secure their sensitive information: thin client, thin device, protected process, protected data, and eye-in-the-sky. Enterprises should also seek to provide high-performance, friction-free alternatives to local data storage, insist that business partners are implementing technical controls where possible, and audit their partners regularly.
- Stay ahead of changing market and customer dynamics with the latest insights.
- Partner with expert analysts to make progress on your top initiatives.
- Get answers from trusted research using Izola, Forrester's genAI tool.