Skip navigation

Analyst Reports

  • 451 Research: Code42 Software Enlists Backup Data for eDiscovery Response and Security Detail
    451 Research reports on how Code42 CrashPlan simplifies the legal hold process by preserving data, allowing legal to control the legal hold process and providing full-text search functionality.
  • Hunting Insider Threats: Forrester's Model for Establishing an Insider Threat Team
    The potential for insider threat exists at all organizations. Whenever end users have access to privileged information, insider data exfiltration is a risk. The key to mitigating this risk is implementing a program to identify and remediate insider threats.
  • Endpoint Backup and DLP: A Synergystic Strategy for Managing Insider Threat
    With enterprise data now traveling to the far reaches of the globe on employee laptops, tablets and smartphones, maintaining control and visibility can be a challenge for IT. But given the high cost of insider theft, leakage or damage, inaction is not an option. Organizations must create a robust data protection strategy to prevent data loss. That strategy should include endpoint data protection and a security-aware culture.
    Get Report
  • Dangerous Threats Require Backup for Data Protection and Recovery
    Cyber criminal gangs motivated by money, espionage or hacktivism have grown their operations from a hit-or-miss shotgun approach to tightly targeted hits that pool the skill sets of professional villains. Attacks are precise and calculated. When successful, they field extraordinary ROI for hackers and often crippling damage and costs to businesses, government agencies and consumers. This IDC Spotlight stratifies threat actors into three categories and summarizes the ways in which criminal groups infiltrate enterprises to drain corporate accounts, steal IP, encrypt data and extort businesses for ransom.
    Read Report
  • 2016 Cyberthreat Defense Report
    CyberEdge Group’s third annual Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1000 IT security decision makers and practitioners conducted in November 2015, the report delivers insights IT security teams can use to compare their perceptions, priorities, and security postures to their peers.
    Get Report