Trend Report

Own Nothing. Control Everything.

Five Security Patterns For Securing Data On Devices You Don't Own

Andrew Jaquith
 and  two contributors
Jan 22, 2010

Summary

Security and risk professionals are facing a growing concern: Sensitive data is stored on assets that the company does not own. Increased use of contractors and consultants, increased offshoring and outsourcing, and Tech Populism are driving this concern. Enterprises can begin solving this problem if they abolish the assumption that data control requires the enterprise to own its endpoints. When all endpoints are treated as hostile, enterprises can implement one of five design patterns to secure their sensitive information: thin client, thin device, protected process, protected data, and eye-in-the-sky. Enterprises should also seek to provide high-performance, friction-free alternatives to local data storage, insist that business partners are implementing technical controls where possible, and audit their partners regularly.

Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.
Purchase this report
This report is available for individual purchase ($1495).