125 results in Reports
 
Sort by:
Refine
  • Data & Information Protection

Search Results

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Build A Road Map For Personal Identity And Data Management

    March 8, 2019 | Fatemeh Khatibloo

    The era of personal identity and data management (PIDM) is here, spurred by increasingly privacy-aware consumers, new privacy regulations, and a crop of Silicon Valley advocates for data ethics. To...

  • Report Second-Party Data Powers Customer-Focused Advertising

    Another Marketer's First-Party Data Complements And Extends Yours
    March 8, 2019 | Joanna O'Connell, Susan Bidel

    In the age of the customer, marketers require solid, reliable data upon which to build individual IDs, segment profiles, and models to reach prospects. First-party data lies at the core of these...

  • Report Now Tech: Payment Tokenization, Q1 2019

    Forrester's Overview Of 21 Payment Tokenization Providers
    March 7, 2019 | Andras Cser

    You can use payment tokenization (PT) solutions to: 1) reduce the risk of fraud from stolen personal account numbers (PANs); 2) reduce the scope of PCI DSS compliance and audits; and 3) increase...

  • Report The Top Trends For Healthcare Providers In 2019

    2019 marks a year of transition for healthcare delivery as a bevy of market forces will catalyze change. Providers are under threat from new entrants and disruptors, being pushed to take on more...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

  • Report The Top Trends For Healthcare Insurers In 2019

    February 27, 2019 | Jeff Becker, Arielle Trzcinski

    In 2019, market consolidation and disruptive new entrants will force health plans to expand their core competencies if they hope to attract new members, reduce medical costs, and drive growth....

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report Tackle The California Consumer Privacy Act Now

    Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
    February 8, 2019 | Enza Iannopollo

    In less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...

  • Report The ROI Of Privacy

    Business Case: The Customer Trust And Privacy Playbook
    February 5, 2019 | Fatemeh Khatibloo, Reggie Lau

    Organizations have traditionally focused investment and resources on preventing data breaches, but consumers are growing more aware of privacy breaches and creepy experiences. B2C marketers must...

  • Report Use Advanced Encryption For Data Security

    January 30, 2019 | Chase Cunningham

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders...

  • Report Benchmark Your Cybersecurity And Privacy Maturity, 2019

    The Benchmark Report In The Cybersecurity And Privacy Playbook
    January 30, 2019 | Christopher McClean, Trevor Lyness, Stephanie Balaouras

    This data-driven report examines the maturity of security and privacy programs at companies around the world. It then goes further to examine how and why firms that are mature look different from...

  • Report Optimize Cybersecurity And Privacy Oversight

    Advanced Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Renee Murphy, Nick Hayes, Paul McKay

    Firms with advanced-level oversight for cybersecurity and privacy are rare, but despite their strong efforts, they can't become complacent. Regulatory requirements, threats, business models, and...

  • Report Elevate Cybersecurity And Privacy Oversight

    Intermediate Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Paul McKay, Renee Murphy, Nick Hayes

    Firms with intermediate cybersecurity and privacy oversight have a solid foundation and are seeking to extend their influence in the organization. By strengthening strategy, governance, adherence...

  • Report Establish Your Cybersecurity And Privacy Oversight Foundation

    Beginner Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Paul McKay, Renee Murphy, Nick Hayes

    CIOs and technology leaders just starting to build their cybersecurity and privacy oversight will struggle to keep up with the speed and scope the business expects from their program. In this...

  • Report Now Tech: Data Loss Prevention, Q1 2019

    Forrester's Overview Of 37 Data Loss Prevention (DLP) Providers
    January 18, 2019 | Heidi Shey

    You can use data loss prevention (DLP) capabilities to support compliance, protect intellectual property, and augment employee security awareness. But to access these benefits, you'll first have to...

  • Report Facebook: The Myth Of The Monopoly

    A Consumer Energy Index Analysis
    January 18, 2019 | Anjali Lai

    2018 was a challenge for Facebook, Inc.: Between the Cambridge Analytica scandal in Q1 and a security bug in Q4, the headlines revealed that its largest partners had access to users' personal data...

  • Report Build A Strong Process Foundation For Cybersecurity And Privacy

    Beginner Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Claire O'Malley

    To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and clearly defined processes for critical areas ranging from internal data security...

  • Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success

    Advanced Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Stephanie Balaouras

    CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect the brand, they help their firms drive growth and long-term success. This report — the third of three in the...

  • Report Elevate Cybersecurity And Privacy With Process Metrics

    Intermediate Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Salvatore Schiano

    The intermediate phase of the journey to cybersecurity and privacy maturity turns on establishing metrics and collecting data to drive process improvement. This report — the second of three in the...

  • Report Now Tech: Antiphishing Solutions, Q1 2019

    Processes: The Zero Trust Security Playbook
    January 8, 2019 | Joseph Blankenship, Nick Hayes, Claire O'Malley

    You can use antiphishing solutions to detect and block malicious emails, protect against impersonation attacks, and educate employees with training and phishing simulations. But to access these...

  • Report Top Research For Marketers: The Impact Of Privacy

    January 7, 2019 | Mary Pilecki, Stephanie Liu

    Privacy regulations such as the General Data Protection Regulation (GDPR) are changing companies' approaches to privacy and technology vendors' approaches to marketing and analytics. This report...

  • Report The New Privacy: It's All About Context

    Vision: The Customer Trust And Privacy Playbook
    January 4, 2019 | Fatemeh Khatibloo

    "Privacy is dead" is a trope so often repeated that you might actually think it's true. But in the age of smartphones and sensors, privacy is actually essential for building trust. Context is key —...

  • Report New Tech: Blockchain Identity (BCI) Management, Q1 2019

    Forrester's Landscape Overview Of 22 Providers
    January 3, 2019 | Andras Cser, Martha Bennett

    A new crop of blockchain identity (BCI) technologies, and the solutions they power, stand poised to unleash new paradigms in identity verification (IDV) and access policy enforcement, leading to...

  • Report The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q1 2019

    Tools And Technology: The Zero Trust Security Playbook
    January 2, 2019 | Josh Zelonis, Joseph Blankenship

    Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm's brand. To accelerate their performance in threat detection and...

Content Type

Apply

Filters

Region

Vendor