13 results in Reports
Sort by:
Refine
  • Telecommunications Services
  • Security & Risk

Search Results

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From The World's Biggest Data Breaches And Privacy Abuses, 2016

    Continuous Improvement: The Data Security And Privacy Playbook

    Breaking news of a massive customer breach or blatant privacy abuse dominates the headlines for days. However, months and even years later, affected customers still struggle with the aftermath and...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Data Loss Prevention

    DLP Suite Adoption Holds Steady As DLP Becomes A Feature And Managed Services Offer An Attractive Option
    May 2, 2016 | Heidi Shey

    Policies to control data use and movement require enforcement mechanisms. Data loss prevention (DLP) capabilities give security and risk (S&R) professionals the means to enforce those policies and...

  • For Security & Risk Professionals

    Report

    Report 2013 Forrester Mobile Security Predictions

    March 26, 2013 | Chenxi Wang

    The mobile market is evolving rapidly. Both the consumer and enterprise markets are experiencing major changes. Room exists for new innovations as well as for established players to develop new...

  • For Security & Risk Professionals

    Report

    Report Five Steps To Build An Effective Threat Intelligence Capability

    January 15, 2013 | Rick Holland

    Against today's mutating threat landscape and sophisticated cybercriminals, security and risk (S&R) professionals are outgunned and outmatched. The traditional strategy of waiting for an alert and...

  • For Security & Risk Professionals

    Report

    Report Charter A Mobility Council With Seven Tasks

    May 7, 2012 | Benjamin Gray, Ted Schadler, Chenxi Wang

    Smartphones, tablets, and the rise of bring-your-own-device (BYOD) programs have put tremendous pressure on IT to revamp and rethink its mobile strategy: everything from procurement and development...

  • For Security & Risk Professionals

    Report

    Report Japan Cloud Computing 2010: End User Adoption Trends

    September 1, 2010 | Masami Kashiwagi

    This document provides an overview of cloud computing end user adoption trends in Japan for vendor strategists. The report is based on findings from a cloud computing survey targeting Japanese...

  • For Security & Risk Professionals

    Report

    Report Japan SaaS Market Forecast And Update: 2009 To 2014

    May 1, 2010 | Masami Kashiwagi

    This document provides an overview of software-as-a-service (SaaS) in order to enable vendor strategists to better understand the SaaS market in Japan. The report compares SaaS market growth with...

  • For Security & Risk Professionals

    Report

    Report Understanding The Influential Information Worker

    The Changing Workforce Makes Understanding End User Habits Essential For Tech Vendors
    February 11, 2010 | Heidi Shey, TJ Keitt

    This is a graphical overview highlighting results from Forrester's Workforce Technographics®, US, Canada, And UK Survey, Q3 2009, a survey of 3,904 information workers (iWorkers) at companies with...

  • For Security & Risk Professionals

    Report

    Report Preparing For A Pandemic: What You Need To Know About H1N1

    The likelihood and impact of a pandemic are impossible to predict with much accuracy. Regardless, history tells us that there is a potential for widespread and costly disruption — especially for...

  • For Security & Risk Professionals

    Report

    Report Case Study: Vodafone UK Uses Business Continuity As A Competitive Advantage

    October 8, 2008 | Stephanie Balaouras

    In the highly competitive and regulated industry of mobile communications, business continuity preparedness is critical to ensuring the continuous availability of the wireless services and to...

  • For Security & Risk Professionals

    Report

    Report Case Study: Verizon Business Builds An Asset-Based Security Metrics Program

    July 22, 2008 | Khalid Kark

    In response to the evolving security threat environment and heightened attention to regulatory compliance, many companies started migrating from a purely reactive security program to a proactive...

  • For Security & Risk Professionals

    Report

    Report Extending Mobile Identity Beyond Authentication

    Banks, Mobile Operators, And Vendors Team Up For SIM Card-Based Security
    April 11, 2008 | Bill Nagel

    With mobile phones reaching saturation levels in many countries, banks and other service providers are taking a second look at providing financial and commercial services over the mobile channel....

  • For Security & Risk Professionals

    Report

    Report Mobile Authentication Marries Security With Convenience

    A Token-Killing Form Factor For Secure Consumer Online Banking
    November 16, 2007 | Bill Nagel

    Financial institutions seeking to expand their online and mobile banking offerings to their entire customer base face the age-old challenge of balancing security with usability. Many banks feel...