Advanced Search
125 results in Reports
Sort by:
Refine
  • Data Security

Search Results

  • For Security & Risk Professionals

    Report

    Report Creating Actionable Security And Privacy Policy

    Policy: The Data Security And Privacy Playbook
    May 3, 2017 | Heidi Shey

    Data security and privacy policies are ineffective and can even hinder business processes without a clear understanding of the data — from what it is to where it exists. Data identity is the...

  • For Security & Risk Professionals

    Report

    Report Assess Your Data Privacy Practices With The Forrester Privacy And GDPR Maturity Model

    Assessment: The Data Security And Privacy Playbook
    April 21, 2017 | Enza Iannopollo, Renee Murphy

    Protecting customers' privacy is a priority for firms around the world. But data privacy standards differ widely from one country to the next — in fact, there are over 100 variations globally....

  • For CIO Professionals

    Report

    Report Healthcare Must Embrace Zero Trust To Address PHI Vulnerabilities

    March 6, 2017 | Kate McCarthy, Chris Sherman

    Healthcare payer and provider organizations invest in securing protected health information (PHI) but must also invest in strategies that holistically secure the whole environment. From POS systems...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From The World's Biggest Data Breaches And Privacy Abuses, 2016

    Continuous Improvement: The Data Security And Privacy Playbook
    January 9, 2017 | Stephanie Balaouras, Heidi Shey

    Breaking news of a massive customer breach or blatant privacy abuse dominates the headlines for days. However, months and even years later, affected customers still struggle with the aftermath and...

  • For Security & Risk Professionals

    Report

    Report Inquiry Spotlight: Security And Risk, Q3 2015 To Q3 2016

    December 27, 2016 | Stephanie Balaouras, Claire O'Malley

    Forrester's security and risk (S&R) research team fields hundreds of inquiries from our clients every month. These inquiries help us keep track of which areas our clients find most challenging and...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Data Security And Privacy: 2016 To 2017

    Benchmarks: The Data Security And Privacy Playbook
    December 7, 2016 | Heidi Shey

    Throughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...

  • For Enterprise Architecture Professionals

    Report

    Report Vendor Landscape: Data Governance Stewardship And Discovery Solutions

    Data Governance Stewardship And Discovery Solutions To Govern Systems Of Insight
    November 30, 2016 | Henry Peyret

    In 2015, Forrester identified a new market category: data governance stewardship. These offerings help companies navigate their journey toward data citizenship. The market is continuing to develop...

  • For Customer Insights Professionals

    Report

    Report Predictions 2017: Six Ways Privacy Will Rock Global Business

    Business Case: The Customer Trust And Privacy Playbook
    November 1, 2016 | Fatemeh Khatibloo

    From the ratification of Europe's new privacy law to high-profile privacy actions by the US Federal Trade Commission, 2016 was a turning point for the privacy industry. In 2017, customer insights...

  • For Security & Risk Professionals

    Report

    Report Forrester's 2016 Interactive Data Privacy Heat Map

    Landscape: The Data Security And Privacy Playbook
    October 31, 2016 | Chris Sherman, Enza Iannopollo

    To help security and risk professionals navigate the complex landscape of privacy laws around the world, Forrester created a data privacy heat map that highlights the data protection guidelines and...

  • For Security & Risk Professionals

    Report

    Report Rules Of Engagement: A Call To Action To Automate Breach Response

    August 3, 2016 | Joseph Blankenship, John Kindervag

    As the remediation costs, customer impacts, and reputational damage of a data breach continue to skyrocket, the security industry must find new ways to prevent the exfiltration of proprietary data...

  • For Security & Risk Professionals

    Report

    Report The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Vision: The Data Security And Privacy Playbook
    July 7, 2016 | John Kindervag, Heidi Shey

    Data is the lifeblood of today's digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits,...

  • For Security & Risk Professionals

    Report

    Report Employee Data Security And Privacy Matter More Than You Think

    Seven Recommendations To Address Employees' Data Security And Privacy
    June 28, 2016 | Enza Iannopollo

    Although firms understand that privacy is important to the customer experience, few appreciate its importance to the employee experience. Yet, employee privacy contributes greatly to the quality of...

  • For Security & Risk Professionals

    Report

    Report Protect Your Intellectual Property And Customer Data From Theft And Abuse

    Executive Overview: The Data Security And Privacy Playbook
    June 22, 2016 | Stephanie Balaouras, John Kindervag

    Data is the lifeblood of today's digital businesses, but sophisticated cybercriminals have given rise to a complex market for data security and privacy. Forrester's data security and privacy...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Your Next Security Analyst Could Be A Computer

    IBM Announces Watson For Cyber Security
    May 10, 2016 | Joseph Blankenship

    IBM announced on May 10 that it is launching a project to use its cognitive computing technology, Watson, in cybersecurity. Working with eight universities, IBM intends to train Watson on the...

  • For Application Development & Delivery Professionals

    Report

    Report Big Data Security Strategies For Hadoop Enterprise Data Lakes

    Apply Zero Trust To Your Big Data Security Strategy
    April 25, 2016 | Mike Gualtieri, John Kindervag

    The crown jewels must be protected. Data stored in Hadoop is no exception. As application development and delivery (AD&D) professionals rush to build data lakes using Hadoop, they often do so...

  • For Security & Risk Professionals

    Report

    Report Rethinking Data Loss Prevention With Forrester's DLP Maturity Grid

    April 18, 2016 | Heidi Shey, John Kindervag

    Data loss prevention (DLP) remains a key technology to help prevent the leakage and exfiltration of the firm's most sensitive data. Using client feedback, survey data, and input from security...

  • For Security & Risk Professionals

    Report

    Report Data Privacy Metrics That Matter To The Business

    Performance Management: The Data Security And Privacy Playbook
    March 15, 2016 | Enza Iannopollo

    A commitment to security and privacy enables firms to build trusted customer relationships that increase revenue. Security and privacy teams must establish data security and privacy programs that...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q1 2016

    Road Map: The Data Security And Privacy Playbook
    February 22, 2016 | Stephanie Balaouras, John Kindervag

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

  • For CIO Professionals

    Report

    Report Redefine IBM's Role In Your BT Strategy

    IBM Is A Great BT Partner If You Have Complexity Of Systems Or Complexity Of Tech Requirements
    February 9, 2016 | Andrew Bartels

    IBM is a major player in the enterprise technology landscape. Like most large tech vendors, it is navigating the transition from information technology (IT) that underpins business operations to...

  • For Security & Risk Professionals

    Report

    Report The Forrester Privacy Maturity Model

    January 29, 2016 | Enza Iannopollo, Renee Murphy

    The Forrester Privacy Maturity Model consists of four security domains (oversight, technology, process, and people), 11 privacy functions, and 37 privacy components. This model is a self-assessment...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Data Security And Privacy: 2015 To 2016

    January 8, 2016 | Heidi Shey

    Throughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...

  • For Security & Risk Professionals

    Report

    Report Forrester's 2015 Data Privacy Heat Map Supplement

    October 13, 2015 | Chris Sherman, Heidi Shey

    To help security and risk professionals navigate the complex landscape of privacy laws around the world, Forrester created a data privacy heat map that highlights the data protection guidelines and...

  • For Security & Risk Professionals

    Report

    Report CISOs Need To Add Customer Obsession To Their Job Description

    September 4, 2015 | Martin Whitworth

    Security is an essential component of doing business in today's digital world, and, increasingly, customers will not be willing to hand over their valuable personal information if they believe it...

  • For Security & Risk Professionals

    Report

    Report The Cybercriminal's Prize: Your Customer Data And Intellectual Property

    September 2, 2015 | Heidi Shey

    Protecting customer data such as credit card information, log-in credentials, and other personally identifiable information (PII) is one of the top priorities for both security and risk (S&R)...

  • For Security & Risk Professionals

    Report

    Report Sizing The Cloud Security Market

    Companies Will Spend $2 Billion Over The Next Five Years To Protect Data In The Cloud
    August 25, 2015 | Andras Cser, Michael Yamnitsky

    As enterprises embrace a diverse cloud ecosystem, a new generation of software is emerging to address the security requirements of highly distributed IT infrastructure. These new offerings make up...

Content categories

Refine your results

Date Range

Primary Role

Methodology

Industry

Market Imperatives

Region

Vendor

Analyst