Forrester's Annual ECM Panel Survey, 2015. Call for Participation — Deadline July 31, 2015

Cheryl McKinnon

Forrester's survey for ECM decision-makers is open, and we're looking for your participation! Take this opportunity to provide your perspectives on the key vendors, the challenges, and the opportunities you see in this technology market. This survey is intended for ECM decision-makers or influencers in end user organizations. This is not for ECM vendors or systems integrators . . . but vendors and consultants — we would love it if you could share this survey invitation with your customers. The survey will remain open until end of day Friday, July 31, 2015.

Why is your input important? Forrester uses this data to:

Read more

Automated Malware Analysis Wave - Call for feedback

Rick Holland

We are in the planning stages of a new Forrester Wave on automated malware analysis/sandboxes. As we prepare for this research, we are looking for research interview candidates to discuss your experiences with automated malware analysis solutions. Please note we are not seeking feedback from vendors at this  time. We are focused on the buyers of these offerings. We would like to talk to you about: 

  1. The most useful features
  2. The least useful features
  3. The most significant challenges
  4. Preferred deployment model (physical appliance, virtual appliance, cloud)
  5. Most useful integrations (e.g. endpoint integrations that validate sandbox alerts)
  6. Feedback on vendors (e.g. FireEye, Trend Micro, Palo Alto Networks ...)

You don't have to be a Forrester client either. If you are willing to participate in a confidential research interview, we will provide you a free copy of the research when it publishes. If you are interested in speaking with us please contact Kelley Mak (kmak at forrester dot com) and Josh Blackborow (jblackborow at forrester dot com) 

In the meantime, if you are interested in learning more about Forrester's perspective on automated malware analysis, please check out Pillar No. 1: Malware Analysis from Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities

Augmented And Virtual Reality Are Ready For Prime Time

JP Gownder

I've just released a major new report on Augmented Reality (AR) and Virtual Reality (VR), Augmented And Virtual Reality Should Be Part Of The Innovator's Toolkit. My research finds that it's time to give AR and VR their due consideration when solving business problems involving either workers or for customer interactions.

AR and VR technologies aren't new. Virtual reality first experienced a boom of interest in the early 1990s, spurred by the 1991 book Virtual Reality by Howard Rheingold. In 1995, Angelina Jolie starred in the movie Hackers, which introduced mass audiences to head-mounted VR display technology. But the early promise of the technology fell apart due to underperforming graphics, attention-jarring lag times, outlandish hardware requirements, and the lack of an application ecosystem. No VR market emerged (outside of niche categories like military usage) until Facebook acquired the Kickstarter startup Oculus for $2 billion in March, 2014.

Read more

Help Us Define The Data Security Market In 2015!

Stephanie Balaouras

To help security pros plan their next decade of investments in data security, last year myself, John Kindervag, and Heidi Shey, researched and assessed 20 of the key technologies in this market using Forrester's TechRadar methodology. The resulting report, TechRadar™: Data Security, Q2 2014, became one of the team’s most read research for the year. However, it’s been a year since we finalized and published our research and it’s time for a fresh look.

One can argue that the entirety of the information security market - its solutions, services, and the profession itself - focuses on the security of data. While this is true, there are solutions that focus on securing the data itself or securing access to the data itself - regardless of where data is stored or transmitted or the user population that wants to use it. As S&R pros continue to pursue a shift from a perimeter and device-specific security approach to a more data- and identity-centric security approach, it’s worthwhile to hyper focus on the technology solutions that allow you to do just that....

Last year, we included the following 20 technologies in our research:

  • Archiving
  • Backup encryption
  • Cloud encryption gateways
  • Data classification
  • Data discovery
  • Data loss prevention (DLP)
  • Database encryption and masking
  • Database monitoring and auditing
  • Email encryption
  • Enterprise key management
  • Enterprise rights management
  • File-level encryption
  • Full-disk encryption
  • Identity and access management 
  • Managed file transfer
Read more

Forrester’s Security & Risk Research Spotlight: Application Security and IoT Security

Stephanie Balaouras

Once a month I use my blog to highlight some of S&R’s most recent and trending research. This month I’m focusing on application security and asking for your help with some of our upcoming research into the security and privacy risks associated with Internet of Things (IoT). IoT is any technology that enables devices, objects, and infrastructure to interact with monitoring, analytics, and control systems over the Internet. The illustrious and debonair, Tyler Shields (@txs), will lead our research into IoT security, but as the risks become more and more concrete for various verticals, you can expect the entire team to engage in this research.

Take our IoT security survey and talk with our analysts! If you contribute to the emerging IoT market, please fill out this brief survey ( Participants will receive a complimentary copy of the completed research report and we'd be happy to interview anyone who would like to discuss IoT and security in detail. Be sure to reach out to Tyler ( or Jennie Duong ( if you’re interested.

Read more

Systems Of Insight: Next Generation Business Intelligence

Boris Evelson

Earlier Generation BI Needs A Tune Up

Business intelligence has gone through multiple iterations in the past few decades. While BI's evolution has addressed some of the technology and process shortcomings of the earlier management information systems, BI teams still face challenges. Enterprises are transforming only 40% of their structured data and 31% of their unstructured data into information and insights. In addition, 63% of organizations still use spreadsheet-based applications for more than half of their decisions. Many earlier and current enterprise BI deployments:

  • Have hit the limits of scalability.
  • Struggle to address rapid changes in customer and regulatory requirements.
  • Fail to break through waterfall's design limitations.
  • Suffer from mismatched business and technology priorities and languages.
Read more

The Rebirth Of iManage: A New Company With A Familiar Name Re-Enters The ECM Market

Cheryl McKinnon

Another week, another divestiture in the content management and collaboration market. A new - or more accurately, a re-newed - player enters the Enterprise Content Management market this week as iManage and HP make an apparently amicable split. Executives with longstanding roots in the iManage and Interwoven businesses, including Neil Araujo and Dan Carmel, have executed a management buyout to spin a revitalized iManage business out of HP’s Software division. iManage's press

Read more

Let's Break All The Data Rules!

Michele Goetz

When I think about data, I can't help but think about hockey. As a passionate hockey mom, it's hard to separate my conversations about data all week with clients from the practices and games I sit through, screaming encouragement to my son and his team (sometimes to the embarrassment of my husband!). So when I recently saw a documentary on the building of the Russian hockey team that our miracle US hockey team beat at the 1980 Olympics, the story of Anatoli Tarsov stuck with me. 

Before the 1960s, Russia didn't have a hockey team. Then the Communist party determined that it was critical that Russia build one — and compete on the world stage. They selected Anatoli Tarsov to build the team and coach. He couldn't see films on hockey. He couldn't watch teams play. There was no reference on how to play the game. And yet, he built a world-class hockey club that not only beat the great Nordic teams but went on to crush the Canadian teams that were the standard for hockey excellence.

This is a lesson for us all when it comes to data. Do we stick with our standards and recipes from Inmon and Kimball? Do we follow check-box assessments from CMMI, DM-BOK, or TOGAF's information architecture framework? Do we rely on governance compliance to police our data?

Or do we break the rules and create our own that are based on outcomes and results? This might be the scarier path. This might be the riskier path. But do you want data to be where your business needs it, or do you want to predefine, constrain, and bias the insight?

Read more

Microsoft Acquires Cloud Access Security Intelligence vendor Adallom

Andras Cser

Microsoft is doubling down on its cloud strategy and announced the acquisition of Adallom. Adallom offers transparent, cloud-based monitoring and alerting of cloud application use. It can detect if a user is performing suspicious actions (e.g. downloading the CRM database on a Friday afternoon). This signifies that cloud service provider vendors can no longer only offer IaaS security (see our Wave at ) but also help with understanding risks around non-sanctioned and sanctioned SaaS applications. Microsoft's success of incorporating Adallom's assets into the Azure portfolio will depend on the following:

1. How well will Azure AD premium work with Adallom?

2. How well will Office 365 work with Adallom?

3. How well  will Azure IaaS work with Adallom?

4. How Adallom will be able to support data protection and encryption?

5. How well Adallom will continue to work vendor agnostically with non-Microsoft IaaS and SaaS envrionments?

We will be publishing a Market Overview on Cloud Access Security Intelligence vendors (including Adallom) in Q3 of 2015. Stay tuned!

When it Comes To Site Search, Don't Make Your Customers Play 'Hide-and-Seek'

Dominique Whittaker
Picture this: you're on a website looking for this must-have item for someone special and you know that the product exists on the website but every time you search for it you can't find it for the life you! If you've never had trouble searching for a product or information on a website---well, you're lying. We know that customers are demanding effective and relevant search results in addition to a easy-to-use interface. If they don't get it, they're likely to look elsewhere for what they need---and nobody wants that.
Site search sounds like a no-brainer functionality that every website has and is an easy thing to do but relatively few companies have actually mastered site search. Done well, it: 
  • Promotes customer self-service. If your visitors are able to successfully find what they need, then you’ve done your job while also deflecting calls away from the more expensive contact center.
  • Increases time-on-site. When customers find what they’re looking for in a painless manner, they’re more likely to spend more time on your site, looking for additional information or products. 
  • Provides overall better customer experiences. Let’s be honest, site search isn’t  top-of-mind. But if you can not only make the functionality an accurate, seamless experience for your visitors and provide recommended solutions based on search terms---well you’ve hit the site search jackpot. 
Read more