63 results in Reports
Sort by:
Refine
  • Data Loss Prevention (DLP)

Search Results

  • For Security & Risk Professionals

    Report

    Report Rethinking Data Discovery And Classification Strategies

    Strategic Plan: The Data Security And Privacy Playbook
    June 9, 2017 | Heidi Shey

    Security and risk (S&R) pros can't expect to adequately protect customer, employee, and sensitive corporate data and IP if they don't know what data exists, where it resides, how valuable it is to...

  • For Security & Risk Professionals

    Report

    Report Quick Take: The CIA — Good At Spying, Bad At Data Loss Prevention

    Key Takeaways From The WikiLeaks Revelations Of Widespread CIA Device-Hacking
    March 10, 2017 | Jeff Pollard

    This week, controversial media organization WikiLeaks released a trove of leaked documents purporting to prove the existence of a sophisticated covert US Central Intelligence Agency (CIA) hacking...

  • For Security & Risk Professionals

    Report

    Report The Forrester Wave™: Data Loss Prevention Suites, Q4 2016

    Tools And Technology: The Data Security And Privacy Playbook
    November 8, 2016 | Heidi Shey

    In our 30-criteria evaluation of data loss prevention suite providers, we identified the seven most significant ones — Clearswift, DeviceLock, Digital Guardian, Forcepoint, GTB Technologies, Intel...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Intel Spins Off McAfee As Synergies Fail To Materialize

    McAfee Is Better Off On Its Own Once Again
    September 9, 2016 | Jeff Pollard, Joseph Blankenship

    On September 7, Intel agreed to spin out Intel Security with a new, but old, name — McAfee. This acquisition winds up a cautionary tale to security leaders on what can happen when a tech giant...

  • For Security & Risk Professionals

    Report

    Report Vendor Landscape: Data Loss Prevention Solutions

    Key Vendors For Email, Endpoint, Network, Web, And Cloud DLP Capabilities
    August 4, 2016 | Heidi Shey

    Policies to control data use and movement require enforcement mechanisms. Data loss prevention (DLP) capabilities give security and risk (S&R) professionals the means to enforce those policies and...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Data Loss Prevention

    DLP Suite Adoption Holds Steady As DLP Becomes A Feature And Managed Services Offer An Attractive Option
    May 2, 2016 | Heidi Shey

    Policies to control data use and movement require enforcement mechanisms. Data loss prevention (DLP) capabilities give security and risk (S&R) professionals the means to enforce those policies and...

  • For Security & Risk Professionals

    Report

    Report Rethinking Data Loss Prevention With Forrester's DLP Maturity Grid

    April 18, 2016 | Heidi Shey, John Kindervag

    Data loss prevention (DLP) remains a key technology to help prevent the leakage and exfiltration of the firm's most sensitive data. Using client feedback, survey data, and input from security...

  • For Enterprise Architecture Professionals

    Report

    Report TechRadar™: Information Governance Enabling Technologies, Q2 2016

    Pursue Business Value And Not Just Risk Reduction When Making Technology Investments
    April 13, 2016 | Cheryl McKinnon

    Information governance (IG) is a hot topic. Yet it suffers from an identity crisis, as definitions differ across the technology landscape. Enterprise architect (EA) professionals are on the hook to...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Mobile Security, Q1 2016

    Tools And Technology: The Mobile Security Playbook
    March 28, 2016 | Chris Sherman

    Security and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q1 2016

    Road Map: The Data Security And Privacy Playbook
    February 22, 2016 | Stephanie Balaouras, John Kindervag

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

  • For Security & Risk Professionals

    Report

    Report Privacy, Data Protection, And Cross-Border Data Transfer Trends In Asia Pacific

    Prepare Your Strategy As Regulations Tighten And Challenges Intensify
    February 1, 2016 | Heidi Shey, Enza Iannopollo

    Data protection and privacy are top-of-mind concerns for business and technology decision-makers globally. This is particularly true for companies operating in Asia Pacific, where data protection...

  • For Security & Risk Professionals

    Report

    Report Understand The State Of Data Security And Privacy: 2015 To 2016

    January 8, 2016 | Heidi Shey

    Throughout the year, Forrester analysts engage in hundreds of discussions about data security and privacy. This data-driven report outlines budgeting and spending, technology adoption plans, and...

  • For Security & Risk Professionals

    Report

    Report Lessons Learned From The World's Biggest Customer Data Breaches And Privacy Incidents, 2015

    December 2, 2015 | Stephanie Balaouras, Heidi Shey

    Breaking news of a massive customer breach dominates headlines for days. However, months and even years later, affected customers still struggle with the aftermath and firms are still absorbing the...

  • For Security & Risk Professionals

    Report

    Report Brief: What Dell's EMC Acquisition Means For Security And Risk Pros

    If The New Dell Pulls Off A Thorny IAM Integration And Adds Native-Cloud Security, Add It To Your Shortlist
    October 23, 2015 | Andras Cser, Merritt Maxim

    With Dell announcing its $67 billion intent to acquire EMC, security and risk (S&R) pros need to pay close attention to three factors: 1) the shape of the final company; 2) the integration of the...

  • For Security & Risk Professionals

    Report

    Report The Cybercriminal's Prize: Your Customer Data And Intellectual Property

    September 2, 2015 | Heidi Shey

    Protecting customer data such as credit card information, log-in credentials, and other personally identifiable information (PII) is one of the top priorities for both security and risk (S&R)...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Fifteen Lessons For Security & Risk Pros From The IRS Get Transcript Breach

    Cybercriminals Are Using Customer Intelligence To Commit High-Value Fraud
    May 28, 2015 | Merritt Maxim, Rick Holland

    On May 27, the US Internal Revenue Service (IRS) disclosed that cybercriminals had gained access to the tax returns of approximately 104,000 individuals. This breach is notable because it...

  • For Security & Risk Professionals

    Report

    Report Quick Take: Sony Breach — A Sad Tale Of Epic Failure That Could Have Been Avoided

    Businesses Must Prepare For Politically And Socially Motivated Cyberattacks And Cyberespionage
    December 18, 2014 | Rick Holland, Renee Murphy

    Although we are in the early stages of Sony Pictures Entertainment's (SPE's) catastrophically embarrassing intrusion, there are still many lessons that security and risk (S&R) professionals can...

  • For Security & Risk Professionals

    Report

    Report Predictions 2015: Data Security And Privacy Are Competitive Differentiators

    Governments, Criminals, Tech Giants, Customers, And Enterprises Spar Over Protections And Rights
    November 12, 2014 | Heidi Shey, Nick Hayes

    Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

  • For Security & Risk Professionals

    Report

    Report The State Of Endpoint Security Adoption 2014 To 2015

    Adoption Of Proactive Security Tools Will Outpace Signature-Based Antimalware In 2015
    September 24, 2014 | Chris Sherman

    Every year, Forrester conducts a number of global surveys of security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Brand Monitoring And Protection

    Tools To Monitor Your External Environment, Enhance Risk Intelligence, And Secure Your Brand
    July 18, 2014 | Nick Hayes

    Your brand is incredibly distributed online today, spread across a wide range of websites, media outlets, search engines, marketplaces, social networks, forums, mobile apps, and online ads —...

  • For Security & Risk Professionals

    Report

    Report Market Overview: Secure File Sharing And Collaboration

    Key Questions For S&R To Ask When Creating A Short List
    May 5, 2014 | Heidi Shey

    User-driven, person-to-person secure file sharing and collaboration is a hot space today with vendors of all shapes and stripes offering solutions to enable these capabilities. These solutions not...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Data Security, Q2 2014

    Tools To Define, Dissect, And Defend Your Data
    April 22, 2014 | Stephanie Balaouras, John Kindervag

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming...

  • For B2C Marketing Professionals

    Report

    Report Publishers Must Invest In First-Party Data Protection

    Safeguard Your Single Most Important Asset
    February 3, 2014 | Susan Bidel

    First-party data is a publisher's single most important asset. It represents the trust that a publisher builds with a loyal audience. It embodies the very essence of a publisher's brand, and it is...

  • For Security & Risk Professionals

    Report

    Report TechRadar™: Enterprise Mobile Security, Q4 2013

    December 13, 2013 | Tyler Shields

    There are an ever-expanding number of approaches to enterprise mobile security. The current and emerging plethora of technologies span the stack from the network layer to the application layer,...

  • For Infrastructure & Operations Professionals

    Report

    Report Navigating The Legal And Compliance Implications Of BYOD

    A Practical Guide For The I&O Professional
    December 4, 2013 | David K. Johnson

    Consumerization of IT helps drive better employee engagement and innovation because it gives people in your firm the freedom to choose the tools that work best for them and find better...