20 results in Reports
Sort by:
Refine
  • Enterprise Collaboration
  • Security & Risk

Featured content

The Enterprise Collaboration Playbook For 2018

Gain A Competitive Advantage Through Enterprise Collaboration

Many of today's collaboration technology initiatives fall well short of their transformational potential. But a properly executed enterprise collaboration strategy engages employees and connects...

Search Results

  • For Security & Risk Professionals

    Report

    Report CISO Career Paths: Plot Your Course For Advancement

    Look Up And Out For Your Next Promotion
    December 7, 2017 | Jeff Pollard

    The CISO role is evolving rapidly, so there is no standard guidebook to getting hired, progressing, or succeeding as a CISO. To understand the skills, experience, and education that qualify leaders...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Use "Customer-Managed Keys" To Regain Control Of Your Data

    Your Digital Business Can Adopt Cloud Services Without Sacrificing Security Or Privacy
    February 10, 2015 | Tyler Shields, Heidi Shey

    On February 10, 2015, Box announced a new enterprise key management system for security of content stored in the Box cloud. This new key management offering adds support for external encryption,...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Secure File Sharing And Collaboration

    Key Questions For S&R To Ask When Creating A Short List
    May 5, 2014 | Heidi Shey

    User-driven, person-to-person secure file sharing and collaboration is a hot space today with vendors of all shapes and stripes offering solutions to enable these capabilities. These solutions not...

  • For Security & Risk Professionals

    Report

    Report Market Trends: Secure File Sharing And Collaboration In The Enterprise, Q1 2014

    What You Need To Know About Workforce Behavior And Available Data Controls
    February 4, 2014 | Heidi Shey

    Whether the organization's interest in file sharing and collaboration solutions comes from BYOD initiatives, workforce demands, or peer and partner collaboration requirements, security and risk...

  • For Security & Risk Professionals

    Report

    Report Tech Spotlight: Enterprise File Sharing

    The State Of Enterprise File Sharing In 2013 And What It Means For S&R Pros
    December 20, 2013 | Heidi Shey

    Much of the information used in the course of doing business today exists in a digital format, and there comes a point when it's necessary to share this data with other employees or key business...

  • For Security & Risk Professionals

    Report

    Report Aim To Empower The Anytime, Anywhere Workforce

    May 3, 2012 | Benjamin Gray, TJ Keitt

    With two-thirds of the North American and European workforce reporting that they work outside of their corporate office at least occasionally every month, it's imperative that business leaders...

  • For Security & Risk Professionals

    Report

    Report Understanding Legal And Regulatory Risks In Social Media

    January 5, 2012 | Brian W. Hill

    Even as social media adoption surges across the enterprise, security and risk (S&R) professionals have yet to fully understand and mitigate associated legal, compliance, and security risks. S&R...

  • For Security & Risk Professionals

    Report

    Report Your Anti-Social Behavior Stops Here — Set Guidelines To Adopt Social Media And Reduce Risk

    A Framework For Building Your Social Media Policy
    July 19, 2011 | Chenxi Wang

    Social media is becoming increasingly prevalent within the workplace. Although many security and risk professionals will be quick to set restrictions to proactively avoid risks related to social...

  • For Security & Risk Professionals

    Report

    Report It's Time To Include Social Technology In Your Crisis Communication Strategy

    Among risk professionals who have successfully navigated their organization through a crisis, almost all will say that they had grossly underestimated the difficulty of communicating effectively...

  • For Security & Risk Professionals

    Report

    Report Dial "H" For Hack

    An Empowered Report: Understanding The Threats To Unified Communication And VoIP Deployments
    April 11, 2011 | John Kindervag

    In many companies, the worlds of data networking and telecommunications have merged, and voice and video traffic travels with other enterprise data on the same corporate network. Often known...

  • For Security & Risk Professionals

    Report

    Report Content Security Predictions: 2011 And Beyond

    Grading Last Year's Predictions, Plus Three Trends For Next Year
    November 10, 2010 | Chenxi Wang

    Forrester predicted four major content security trends entering 2009. So how'd we do? We got three right, one half-right, and none wrong. As predicted, the market saw a tremendous amount of...

  • For Security & Risk Professionals

    Report

    Report Japan SaaS Market Forecast And Update: 2009 To 2014 Data Tables

    May 1, 2010 | Masami Kashiwagi

    These are the data tables for the report, Japan SaaS Market Forecast And Update: 2009 To 2014." The report provides an overview of software-as-a-service (SaaS) in order to enable vendor strategists...

  • For Security & Risk Professionals

    Report

    Report Japan SaaS Market Forecast And Update: 2009 To 2014

    May 1, 2010 | Masami Kashiwagi

    This document provides an overview of software-as-a-service (SaaS) in order to enable vendor strategists to better understand the SaaS market in Japan. The report compares SaaS market growth with...

  • For Security & Risk Professionals

    Report

    Report Understanding The Influential Information Worker

    The Changing Workforce Makes Understanding End User Habits Essential For Tech Vendors
    February 11, 2010 | Heidi Shey, TJ Keitt

    This is a graphical overview highlighting results from Forrester's Workforce Technographics®, US, Canada, And UK Survey, Q3 2009, a survey of 3,904 information workers (iWorkers) at companies with...

  • For Security & Risk Professionals

    Report

    Report Case Study: Intel Implements People As The New Perimeter To Mitigate Social Computing Risks

    December 9, 2009 | Khalid Kark

    Intel, a large global technology provider, has more than 86,000 employees worldwide. It's only natural that, working for a technology provider, Intel's employees are generally ahead of the curve in...

  • For Security & Risk Professionals

    Report

    Report Supporting Regulatory Requirements: A Growing Concern For Enterprise Buyers

    December 2, 2009 | Brian W. Hill

    This data chart, based on data from Forrester's Enterprise And SMB Software Survey, North America And Europe, Q4 2009, highlights the importance of supporting regulatory requirements in software...

  • For Security & Risk Professionals

    Report

    Report Shift In Ownership: Protecting Data Outside Your Four Walls

    October 28, 2009 | Robert Whiteley III

    In September 2009, Forrester hosted a two-day event designed to help security and risk professionals understand the top three shifts impacting their job heading. This document summarizes the key...

  • For Security & Risk Professionals

    Report

    Report Heavy Consolidation Among The Content Security Vendors Signals Market Maturity

    Users Now Have Broader Functionality Suites To Choose From
    June 17, 2009 | Chenxi Wang

    In late 2008, the content security market saw a number of mergers and acquisitions. McAfee acquired Secure Computing, Symantec acquired MessageLabs, Marshal merged with 8e6, and Sophos acquired...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Content Security, Q1 2009

    January 29, 2009 | Chenxi Wang

    Content security is an issue that is consistently on the minds of IT security professionals. As organizations increasingly move toward collaboration, Web 2.0, and open architectures, content...

  • For Security & Risk Professionals

    Report

    Report Information Classification Must Reach Beyond Knowledge Management

    There Are Many Faces Of Information Classification
    October 2, 2007 | Paul Stamp, Barry Murphy, Stephanie Balaouras

    Information and knowledge management (I&KM) professionals incorrectly assume that information classification is all about making information easier to find. This narrow vision ignores other...