Advanced Search
63 results in Reports
Sort by:
Refine
  • Encryption

Search Results

  • For Security & Risk Professionals

    Report

    Report The Top Security Technology Trends To Watch, 2017

    Tools And Technology: The S&R Practice Playbook
    April 26, 2017 | Merritt Maxim, Jeff Pollard

    Each year, analysts from across Forrester's security and risk (S&R) research team draw insight from hundreds of client questions, vendor briefings, and consultations; the 40-plus research projects...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Internet Of Things Security, Q1 2017

    A Mix Of New And Existing Technologies Help Secure IoT Deployments
    January 19, 2017 | Merritt Maxim

    This TechRadar™ defines the use cases, business value, and outlook for the 13 most relevant and important technologies for delivering internet of things (IoT) security. This includes core...

  • For CIO Professionals

    Report

    Report Brief: Learning The Lessons From Two Major Disasters In The Blockchain Universe

    What The DAO Debacle And The Bitfinex Hack Mean For Enterprise Blockchain Initiatives
    August 25, 2016 | Martha Bennett

    Whether you followed the headlines about The DAO fiasco and the resultant Ethereum hard fork, or the disappearance of nearly 120,000 Bitcoins from cryptocurrency exchange Bitfinex — if you have...

  • For CIO Professionals

    Report

    Report Don't Get Confused By The Blockchain Hype In Banking

    The Reality Of Blockchain In Banking And Banking Platform Vendors' Views On Blockchain Don't Always Align
    June 16, 2016 | Martha Bennett, Jost Hoppermann

    Blockchain technology promises to give rise to new opportunities and exciting business models as well as revolutionize a number of the most expensive and complex systems and processes in banking....

  • For eBusiness & Channel Strategy Professionals

    Report

    Report Executive Q&A: Breaking Down Blockchain In Six Questions

    A Primer For eBusiness And Channel Strategy Professionals
    June 7, 2016 | Brendan Miller

    Many observers are heralding blockchain as an emerging economic force similar to the internet in the 1990s. Billions of dollars are flowing into blockchain startups, and eBusiness pros are...

  • For Security & Risk Professionals

    Report

    Report Top 13 Technology Trends S&R Pros Should Watch: 2016

    April 21, 2016 | Andras Cser, John Kindervag

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 40-plus research...

  • For CIO Professionals

    Report

    Report Q&A: Forrester's Top Five Questions About Blockchain

    Most Of What You Wanted To Know About Blockchain But Were Afraid To Ask
    April 20, 2016 | Martha Bennett

    "Blockchain" continues to generate plenty of headlines in both the specialist and mainstream press. If these — and vendor publicity materials — were anything to go by, we're on the cusp of...

  • For Enterprise Architecture Professionals

    Report

    Report TechRadar™: Big Data, Q1 2016

    Landscape: The Information Strategy and Architecture Playbook
    March 10, 2016 | Noel Yuhanna, Brian Hopkins

    To remain competitive, firms absolutely must mine insights from vast and diverse data sets. However, the complexity of the big data technology ecosystem can stall key initiatives to improve...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q1 2016

    Road Map: The Data Security And Privacy Playbook
    February 22, 2016 | Stephanie Balaouras, John Kindervag

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Data Security And Privacy: 2015 To 2016

    January 8, 2016 | Heidi Shey

    Throughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...

  • For Security & Risk Professionals

    Report

    Report Welcome To The New Era Of Encryption

    S&R Pros Must Use Encryption As The Technological Keystone Of Privacy
    September 10, 2015 | John Kindervag

    Talking about encryption is all the rage these days — from revelations about the National Security Agency's (NSA's) surveillance program to a new wave of movies and TV shows featuring hackers...

  • For Security & Risk Professionals

    Report

    Report Prioritize Tokenization To Secure The Payment Chain

    EMV Is Not A Panacea For Card Payment Vulnerabilities
    April 27, 2015 | Andras Cser, Ed Ferrara

    Is the credit card as US consumers know it dead? With the recent massive credit card data breaches at retailers such as Target and Home Depot, the payment industry is ripe for change. In this...

  • For CIO Professionals

    Report

    Report Did PRISM Cause An Exodus From US Clouds?

    Forrester Survey Suggests NSA Spying Has Driven More Use Of Encryption Than Migration
    April 1, 2015 | Ed Ferrara, James Staten

    Since Edward Snowden revealed the US National Security Agency's PRISM spying program, there has been widespread speculation that the announcement would ruin the fates of US cloud, hosting, and...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Use "Customer-Managed Keys" To Regain Control Of Your Data

    Your Digital Business Can Adopt Cloud Services Without Sacrificing Security Or Privacy
    February 10, 2015 | Tyler Shields, Heidi Shey

    On February 10, 2015, Box announced a new enterprise key management system for security of content stored in the Box cloud. This new key management offering adds support for external encryption,...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Endpoint Encryption, Q1 2015

    The Seven Providers That Matter Most And How They Stack Up
    January 16, 2015 | Chris Sherman

    Security and risk (S&R) professionals often turn to endpoint encryption technologies to protect corporate data, meet regulatory requirements, and prevent accidental data leaks. Full disk,...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From Global Customer Data Breaches And Privacy Incidents Of 2013-14

    November 14, 2014 | Stephanie Balaouras, Heidi Shey

    Frustrated security and risk (S&R) professionals once wished for more media coverage of customer data breaches and privacy abuses to help them raise the importance of security with naive business...

  • For Security & Risk Professionals

    Report

    Report Predictions 2015: Data Security And Privacy Are Competitive Differentiators

    Governments, Criminals, Tech Giants, Customers, And Enterprises Spar Over Protections And Rights
    November 12, 2014 | Heidi Shey, Nick Hayes

    Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

  • For Security & Risk Professionals

    Report

    Report The State Of Endpoint Security Adoption 2014 To 2015

    Adoption Of Proactive Security Tools Will Outpace Signature-Based Antimalware In 2015
    September 24, 2014 | Chris Sherman

    Every year, Forrester conducts a number of global surveys of security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q2 2014

    Tools To Define, Dissect, And Defend Your Data
    April 22, 2014 | Stephanie Balaouras, John Kindervag

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...

  • For Security & Risk Professionals

    Report

    Report Top 15 Trends S&R Pros Should Watch: 2014

    April 18, 2014 | Andras Cser, Andrew Rose

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Stem The "Heartbleed"

    How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs
    April 11, 2014 | John Kindervag, Tyler Shields

    To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive...

  • For CIO Professionals

    Report

    Report Protect Your Data In The Cloud

    New Vendors Emerge To Help You Define, Dissect, and Defend Your Data
    March 13, 2014 | Michael Yamnitsky

    Google and salesforce.com are improving security features, but their solutions inherently silo data and restrict some of technology management's ability to control the application. The complexity...

  • For Security & Risk Professionals

    Report

    Report An S&R Pro's Guide To Security To, In, And From The Cloud

    Embrace Cloud As Part Of The Shift To Business Technology
    December 31, 2013 | Andras Cser, Stephanie Balaouras

    As organizations rapidly adopt cloud-based infrastructure, platform, and application services, cloud security continues to be a major concern. Now, security and risk professionals need to provide a...

  • For CIO Professionals

    Report

    Report Predictions For 2014: Cloud Computing

    Cloud Formally Joins The IT Portfolio — Whether IT Likes It Or Not
    December 4, 2013 | James Staten, Dave Bartoletti

    As we head into 2014, cloud computing is no longer a "future" but a "now." Investments are up, enterprise use is widespread, and the hybrid cloud model has arrived. While the bulk of cloud...

  • For Security & Risk Professionals

    Report

    Report What You Must Know About Data Privacy Regulations In Asia Pacific

    Be Ready To Comply With Dynamic Regulatory Changes
    May 15, 2013 | Masami Kashiwagi, Andrew Rose

    Understanding the laws and regulations that govern data privacy across your organization is critical for any company, but it can be challenging. As a result, too many security and risk (S&R)...