Control and Protect Sensitive Information in the Era of Big Data: Forrester Research Report

Security and Compliance Issues Around Enterprise Big Data

Forrester Report on Data Protection and Big Data: Control and Protect Sensitive Information in the Era of Big Data[Note: This whitepaper is no longer available from Proofpoint. For a similar, more recent Forrester report, please see, Understand the State Of Data Security and Privacy: 2012 To 2013]

In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decision-making capabilities.

But as organizations aggregate more and more data, they need to be aware that much of it could be financial, personal, and other types of sensitive data that are subject to global data protection laws and regulations. Security and risk professionals need to be aware of the security issues surrounding big data so they can take an active role early in these initiatives.

This July 2012 Forrester research report (by analyst John Kindervag) is designed to help security and risk professionals understand how to control and properly protect sensitive information in the era of big data.

Read this report to understand:

  • The risks associated with "toxic data" contained within large enterprise data stores -- including credit card numbers, personally identifiable information (PII, such as Social Security Numbers), and personal health information (PHI) -- and sensitive intellectual property.
  • A proposed framework for big data security and control.
  • Best practices for defending data from a wide array of today's threats.

Forrester Research report offer: Control and Protect Sensitive Information in the Era of Big Data

About Proofpoint, Inc.

Proofpoint, Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.
©2013 Proofpoint, Inc.