113 results in Reports
 
Sort by:
Refine
  • Data & Information Protection

Search Results

  • Report The Digital Risk Protection Market In 2019

    The First Cyber Intelligence Capability You Should Invest In
    April 19, 2019 | Josh Zelonis, Trevor Lyness

    This report is a deep dive into the digital risk protection market. We review where we see the market evolving as well as the different types of buyers and use cases for digital risk protection...

  • Report Protect Your Intellectual Property And Customer Data From Theft And Abuse

    Executive Overview: The Data Security And Privacy Playbook
    April 16, 2019 | Stephanie Balaouras

    Data is the lifeblood of today's digital businesses. Sophisticated cybercriminals are determined to steal it, and employees can abuse it. IP theft erases competitive advantage, and privacy...

  • Report Avoid Corporate Scandal Caused By The Surveillance Economy

    A Guide For CISOs To Stop Unethical Surveillance Tactics Before They Start
    April 12, 2019 | Jeff Pollard, Claire O'Malley

    Welcome to the era of widespread personal surveillance. Organizations have joined the government in collecting, analyzing, and storing oceans of personal data. The private sector is fully engaged...

  • Report Show That Digital Insurance Is Private And Secure

    Digital Feature Fix: Reassure Prospects About How You Protect Them
    March 26, 2019 | Benjamin Ensor, August Du Pont

    Consumers have plenty of reasons to worry about the privacy and security of their personal financial information, yet we often find that insurance sites and apps are not transparent and fail to...

  • Report Top Research For CIOs: Security

    Realize The Value That Excellent Security Delivers
    March 15, 2019 | Matthew Guarini

    Security no longer lives exclusively in the IT department. Now, thanks to ever-escalating attacks, boards and C-suites have become all too familiar with the risks of breaches, and they demand...

  • Report Security For Profit

    Generating Revenue And Profit From Tighter Security Is No Pipe Dream
    March 14, 2019 | Andras Cser, Jeff Pollard

    More and more companies recognize the critical importance of security to earning and maintaining customer trust, securing intellectual property, and protecting the brand. Security is no longer just...

  • Report Build A Road Map For Personal Identity And Data Management

    March 8, 2019 | Fatemeh Khatibloo

    The era of personal identity and data management (PIDM) is here, spurred by increasingly privacy-aware consumers, new privacy regulations, and a crop of Silicon Valley advocates for data ethics. To...

  • Report Second-Party Data Powers Customer-Focused Advertising

    Another Marketer's First-Party Data Complements And Extends Yours
    March 8, 2019 | Joanna O'Connell, Susan Bidel

    In the age of the customer, marketers require solid, reliable data upon which to build individual IDs, segment profiles, and models to reach prospects. First-party data lies at the core of these...

  • Report Now Tech: Payment Tokenization, Q1 2019

    Forrester's Overview Of 21 Payment Tokenization Providers
    March 7, 2019 | Andras Cser

    You can use payment tokenization (PT) solutions to: 1) reduce the risk of fraud from stolen personal account numbers (PANs); 2) reduce the scope of PCI DSS compliance and audits; and 3) increase...

  • Report The Top Trends For Healthcare Providers In 2019

    2019 marks a year of transition for healthcare delivery as a bevy of market forces will catalyze change. Providers are under threat from new entrants and disruptors, being pushed to take on more...

  • Report Build The Business Case For Cybersecurity And Privacy

    Business Case: The Cybersecurity And Privacy Playbook
    February 28, 2019 | Andras Cser, Christopher McClean

    With security and privacy breaches constantly in the news, attaining budget for cybersecurity and privacy functions is not the struggle it once was. However, it's impossible to maintain a...

  • Report The Top Trends For Healthcare Insurers In 2019

    February 27, 2019 | Jeff Becker, Arielle Trzcinski

    In 2019, market consolidation and disruptive new entrants will force health plans to expand their core competencies if they hope to attract new members, reduce medical costs, and drive growth....

  • Report The Forrester Wave™: Cloud Security Gateways, Q1 2019

    The 10 Providers That Matter Most And How They Stack Up
    February 20, 2019 | Andras Cser

    In our 34-criterion evaluation of cloud security gateway providers, we identified the 10 most significant ones — Bitglass, CensorNet, CipherCloud, Cisco, Forcepoint, McAfee, Microsoft, Netskope,...

  • Report Tackle The California Consumer Privacy Act Now

    Use Your GDPR Compliance Programs To Prepare For The New CCPA Requirements
    February 8, 2019 | Enza Iannopollo

    In less than one year's time, regulators in California will start enforcing the requirements of the California Consumer Privacy Act (CCPA). Brazil has just passed new privacy regulations, and India...

  • Report The ROI Of Privacy

    Business Case: The Customer Trust And Privacy Playbook
    February 5, 2019 | Fatemeh Khatibloo, Reggie Lau

    Organizations have traditionally focused investment and resources on preventing data breaches, but consumers are growing more aware of privacy breaches and creepy experiences. B2C marketers must...

  • Report Use Advanced Encryption For Data Security

    Landscape: The Data Security And Privacy Playbook
    January 30, 2019 | Chase Cunningham

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data — the fundamental currency of digital businesses. Most security and risk (S&R) leaders...

  • Report Benchmark Your Cybersecurity And Privacy Maturity, 2019

    The Benchmark Report In The Cybersecurity And Privacy Playbook
    January 30, 2019 | Christopher McClean, Trevor Lyness, Stephanie Balaouras

    This data-driven report examines the maturity of security and privacy programs at companies around the world. It then goes further to examine how and why firms that are mature look different from...

  • Report Optimize Cybersecurity And Privacy Oversight

    Advanced Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Renee Murphy, Nick Hayes, Paul McKay

    Firms with advanced-level oversight for cybersecurity and privacy are rare, but despite their strong efforts, they can't become complacent. Regulatory requirements, threats, business models, and...

  • Report Elevate Cybersecurity And Privacy Oversight

    Intermediate Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Paul McKay, Renee Murphy, Nick Hayes

    Firms with intermediate cybersecurity and privacy oversight have a solid foundation and are seeking to extend their influence in the organization. By strengthening strategy, governance, adherence...

  • Report Establish Your Cybersecurity And Privacy Oversight Foundation

    Beginner Level: Oversight For Cybersecurity And Privacy
    January 25, 2019 | Paul McKay, Renee Murphy, Nick Hayes

    CIOs and technology leaders just starting to build their cybersecurity and privacy oversight will struggle to keep up with the speed and scope the business expects from their program. In this...

  • Report Now Tech: Data Loss Prevention, Q1 2019

    Forrester's Overview Of 37 Data Loss Prevention (DLP) Providers
    January 18, 2019 | Heidi Shey

    You can use data loss prevention (DLP) capabilities to support compliance, protect intellectual property, and augment employee security awareness. But to access these benefits, you'll first have to...

  • Report Facebook: The Myth Of The Monopoly

    A Consumer Energy Index Analysis
    January 18, 2019 | Anjali Lai

    2018 was a challenge for Facebook, Inc.: Between the Cambridge Analytica scandal in Q1 and a security bug in Q4, the headlines revealed that its largest partners had access to users' personal data...

  • Report Build A Strong Process Foundation For Cybersecurity And Privacy

    Beginner Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Claire O'Malley

    To ensure long-term success in cybersecurity and privacy, CIOs and technology leaders must establish repeatable and clearly defined processes for critical areas ranging from internal data security...

  • Report Optimize Your Cybersecurity And Privacy Process To Maximize Business Success

    Advanced Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Stephanie Balaouras

    CIOs who pursue cybersecurity and privacy excellence not only reduce risk and protect the brand, they help their firms drive growth and long-term success. This report — the third of three in the...

  • Report Elevate Cybersecurity And Privacy With Process Metrics

    Intermediate Level: Process For Cybersecurity And Privacy
    January 10, 2019 | Nick Hayes, Salvatore Schiano

    The intermediate phase of the journey to cybersecurity and privacy maturity turns on establishing metrics and collecting data to drive process improvement. This report — the second of three in the...

Content Type

Apply

Filters

Region

Vendor