Forrester Research

Forrester Research - News, Features, and Slideshows

News

  • How to Secure Big Data in Hadoop

    The promise of big data is enormous, but it can also become an albatross around your neck if you don't make security of both your data and your infrastructure a key part of your big data project from the beginning. Here are some steps you can take to avoid big data pitfalls.

  • Forrester to security pros: Think before rushing to fix security holes

    Forrester Research this week published a report that <a href="http://www.networkworld.com/news/2011/110911-banks-hacker-raids-252944.html">advises security professionals</a> not to jump the gun on fixing security deficiencies immediately after a <a href="http://www.networkworld.com/community/tech-debate-data-breach">data breach</a> is identified since that could destroy valuable evidence needed to prosecute cyber-criminals.

  • Unified Communications Success Depends on Changing Habits

    Disrupting the way employees interact is often risky. And deploying <a href="http://www.cio.com/article/686657/Social_World_Law_Firm_Taps_Cisco_Quad_to_Unify_Global_Workforce">unified communications (UC) tools</a> can be riskier than other enterprise software rollouts because it affects employees' ingrained habits. "People move at their own pace around [this] technology," observes Barry Libenson, CIO of Land O'Lakes. "It's not like a new ERP system."

  • Forrester's iPad Security Tips

    Market researcher Forrester has some unpleasant news for those of you running iPad apps in your enterprise. Forrester's iPad take: Chances are good that commercial apps don't protect sensitive data on an iPad or iPhone.

  • Numbers You Need to Know: Employees Take Tech to Work

    More than ever, workers want to take advantage of the <a href="http://www.theinfoboom.com/articles/the-complicated-new-face-of-personal-computing/">technology they use in their everyday lives</a> to help them do their jobs better. Forrester Research's first-quarter Forrsights for Business Technology survey shows that although the practice isn't widespread, employees are increasingly using applications and devices for work that have not been approved by their companies.

[]