Aberdeen Announces Data Protection Survey

Greg Galitzine : Greg Galitzine's VoIP Authority Blog
Greg Galitzine

Aberdeen Announces Data Protection Survey

AberdeenGroup is undertaking a survey on the “value of Data Protection to control and monitor endpoint security in an organization.”
 
According to the opening page of the research survey, “Users access, manipulate, download and store sensitive data constantly on their desktops and laptops. The availability of cheap high-capacity portable media, including CD-R disks, USB thumb drives, and firewire hard disks, make unauthorized copying of large amounts of data a trivial task. Even legitimate users can have a laptop stolen or lose a media storage device containing critical data. This second study in Endpoint Security will explore the approaches organizations are using to protect data accessed and stored on the endpoint.”
 
AberdeenGroup will send a free copy of the final report to those who complete the survey.
 
The report authors hope to identify
 
  • The business and security drivers that press for adoption of endpoint data protection solutions.
  • The types of solutions being adopted to address end-point data protection security risks.
  • The impact of these solutions on risk management and business operations.
  • Key aspects of functionality that technology managers seek in their endpoint data protection solutions.
 
In the end, AberdeenGroup believes the successful completion of this research will yield the findings that provide insights into:
 
  • The risks to endpoint security.
  • The business and financial impact of these risks.
  • The types of solutions that are in use and the impact these solutions have on increasing security as well as improving operational efficiency.
  • The types of solutions that are being considered to address new risk.
  • The types of solutions that are not being considered to address risk, and why.
  • The technologies and processes that are being used by best in class organizations.
 
The research will target an end-user audience including CIOs, CSOs, privacy officers, CTOs, CFOs risk managers, and corporate executives.
 
To access the Endpoint Security Benchmark Survey Part II: Data Protection simply click here.


Featured Events