109 results in Reports
 
Sort by:
Refine
  • Data & Information Protection

Search Results

  • Report Tackle The California Consumer Privacy Act Now

    Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
    February 8, 2019 | Enza Iannopollo

    In less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...

  • Report The ROI Of Privacy

    Business Case: The Customer Trust And Privacy Playbook
    February 5, 2019 | Fatemeh Khatibloo, Reggie Lau

    Organizations have traditionally focused investment and resources on preventing data breaches, but consumers are growing more aware of privacy breaches and creepy experiences. B2C marketers must...

  • Report Use Advanced Encryption For Data Security

    Landscape: The Data Security And Privacy Playbook
    January 30, 2019 | Chase Cunningham

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders...

  • Report Benchmark Your Cybersecurity And Privacy Maturity, 2019

    The Benchmark Report In The Cybersecurity And Privacy Playbook
    January 30, 2019 | Christopher McClean, Trevor Lyness, Stephanie Balaouras

    This data-driven report examines the maturity of security and privacy programs at companies around the world. It then goes further to examine how and why firms that are mature look different from...

  • Report Optimize Cybersecurity And Privacy Oversight

    Advanced Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Renee Murphy, Nick Hayes, Paul McKay

    Firms with advanced-level oversight for cybersecurity and privacy are rare, but despite their strong efforts, they can't become complacent. Regulatory requirements, threats, business models, and...

  • Report Elevate Cybersecurity And Privacy Oversight

    Intermediate Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Paul McKay, Renee Murphy, Nick Hayes

    Firms with intermediate cybersecurity and privacy oversight have a solid foundation and are seeking to extend their influence in the organization. By strengthening strategy, governance, adherence...

  • Report Establish Your Cybersecurity And Privacy Oversight Foundation

    Beginner Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Paul McKay, Renee Murphy, Nick Hayes

    CIOs and technology leaders just starting to build their cybersecurity and privacy oversight will struggle to keep up with the speed and scope the business expects from their program. In this...

  • Report Now Tech: Data Loss Prevention, Q1 2019

    Forrester's Overview Of 37 Data Loss Prevention (DLP) Providers
    January 18, 2019 | Heidi Shey

    You can use data loss prevention (DLP) capabilities to support compliance, protect intellectual property, and augment employee security awareness. But to access these benefits, you'll first have to...

  • Report Facebook: The Myth Of The Monopoly

    A Consumer Energy Index Analysis
    January 18, 2019 | Anjali Lai

    2018 was a challenge for Facebook, Inc.: Between the Cambridge Analytica scandal in Q1 and a security bug in Q4, the headlines revealed that its largest partners had access to users' personal data...

  • Report Build A Strong Process Foundation For Cybersecurity And Privacy

    Beginner Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Claire O'Malley

    To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and clearly defined processes for critical areas ranging from internal data security...

  • Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success

    Advanced Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Stephanie Balaouras

    CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect the brand, they help their firms drive growth and long-term success. This report — the third of three in the...

  • Report Elevate Cybersecurity And Privacy With Process Metrics

    Intermediate Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Salvatore Schiano

    The intermediate phase of the journey to cybersecurity and privacy maturity turns on establishing metrics and collecting data to drive process improvement. This report — the second of three in the...

  • Report Now Tech: Antiphishing Solutions, Q1 2019

    Processes: The Security Architecture And Operations Playbook
    January 8, 2019 | Joseph Blankenship, Nick Hayes, Claire O'Malley

    You can use antiphishing solutions to detect and block malicious emails, protect against impersonation attacks, and educate employees with training and phishing simulations. But to access these...

  • Report Top Research For Marketers: The Impact Of Privacy

    January 7, 2019 | Mary Pilecki, Stephanie Liu

    Privacy regulations such as the General Data Protection Regulation (GDPR) are changing companies' approaches to privacy and technology vendors' approaches to marketing and analytics. This report...

  • Report The New Privacy: It's All About Context

    Vision: The Customer Trust And Privacy Playbook
    January 4, 2019 | Fatemeh Khatibloo

    "Privacy is dead" is a trope so often repeated that you might actually think it's true. But in the age of smartphones and sensors, privacy is actually essential for building trust. Context is key —...

  • Report New Tech: Blockchain Identity (BCI) Management, Q1 2019

    Forrester's Landscape Overview Of 22 Providers
    January 3, 2019 | Andras Cser, Martha Bennett

    A new crop of blockchain identity (BCI) technologies, and the solutions they power, stand poised to unleash new paradigms in identity verification (IDV) and access policy enforcement, leading to...

  • Report The Forrester Tech Tide™: Zero Trust Threat Detection And Response, Q1 2019

    Tools And Technology: The Security Architecture And Operations Playbook
    January 2, 2019 | Josh Zelonis, Joseph Blankenship

    Zero Trust threat detection and response technologies are increasingly critical to securing customers and protecting the firm's brand. To accelerate their performance in threat detection and...

  • Report Partner With European Security Startups To Protect Your Business

    How To Capitalize On The Market's Best New Innovations
    December 28, 2018 | Paul McKay

    In addition to more-traditional venture funding, investors and governments across Europe have spent big to set up security incubators and accelerators, and their efforts have resulted in some true...

  • Report The Five Milestones To GDPR Success

    Road Map: The Data Security And Privacy Playbook
    December 24, 2018 | Enza Iannopollo

    May 25, 2018 marked the beginning of GDPR enforcement, but many firms are still behind on their compliance road map. We believe that fines and enforcement actions are just weeks ahead and that...

  • Report The Mechanics Of Trust

    Processes: The Customer Trust And Privacy Playbook
    December 20, 2018 | Fatemeh Khatibloo

    In today's always-on world of modern marketing, consumers are skeptical of even their favorite brands, so marketers' old methods of building trust simply don't work anymore. This report outlines a...

  • Report New Tech: Secure Communications, Q4 2018

    Forrester's Landscape Overview Of 22 Providers
    December 11, 2018 | Heidi Shey

    This report presents an overview of the emerging vendors in the secure communications market. These are vendors whose offerings include a mix of encrypted messaging/text and additional...

  • Report The State Of Data Security And Privacy: 2018 To 2019

    Benchmarks: The Data Security And Privacy Playbook
    December 5, 2018 | Heidi Shey, Enza Iannopollo

    This data-driven report outlines budgeting and spending, technology adoption plans, and other key breach, data protection, and privacy trends in global firms for 2018 through 2019. Understanding...

  • Report Quantum Is Not An Immediate Security Threat

    Start Educating Your Team On The Long-Term Security Implications Of Quantum Computing
    November 30, 2018 | Brian Hopkins

    Headline grabbing statements about the near-term threat of quantum computers to security contain truth that is often disguised by hype. This report separates fact from fiction. CIOs need this...

  • Report The Forrester New Wave™: GDPR And Privacy Management Software, Q4 2018

    The 12 Providers That Matter Most And How They Stack Up
    November 27, 2018 | Enza Iannopollo

    In Forrester's evaluation of the emerging market for EU General Data Protection Regulation (GDPR) and privacy management software, we identified the 12 most significant providers in the category —...

  • Report New Tech: GDPR And Privacy Management Software, Q4 2018

    Tools And Technology: The Data Security And Privacy Playbook
    November 20, 2018 | Enza Iannopollo

    The EU's General Data Protection Regulation (GDPR) is the most dramatic change in data protection and governance in the last 20 years — and jurisdictions around the world are using it as a model...

Content Type

Apply

Filters

Region

Vendor