Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Forrester Analyst Perspective on DSPM Market Evolution

Fortra
05/11/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • DSPM consolidates data discovery, classification, and risk visibility across cloud and on-premises environments, with the market rapidly consolidating through acquisitions by diverse security vendors
  • Successful DSPM adoption requires defining specific use cases, understanding environment coverage and risk types, evaluating remediation workflows, and ensuring internal processes support operationalization
  • The market is evolving beyond regulated data protection toward intellectual property security, AI risk management, and post-quantum cryptography preparation, with convergence expected across security posture management categories
  • Fortra differentiates by combining DSPM discovery with integrated DLP controls for automated remediation, leveraging over a decade of data protection experience across cloud, on-premises, and endpoint environments
  • Key evaluation criteria include accuracy of classification, actionability of insights, integration dependencies, and whether DSPM exists standalone or within broader security platforms

Understanding the DSPM Market Landscape

Forrester Principal Analyst Heidi Shey provides a comprehensive overview of the Data Security Posture Management (DSPM) market, explaining how it combines existing capabilities like data discovery and classification with new risk visibility features. She clarifies that while underlying capabilities have existed, DSPM's innovation lies in consolidating visibility across cloud, SaaS, and increasingly on-premises environments into a unified risk assessment framework. The session addresses common misconceptions about DSPM being commoditized, emphasizing significant differences in accuracy, actionability, and integration capabilities across solutions. Shey highlights the rapid market consolidation through acquisitions by diverse players including cybersecurity platforms, endpoint providers, exposure management companies, and data resilience vendors, signaling DSPM's strategic importance across multiple security domains.

Practical Implementation and Use Case Considerations

The webinar explores critical evaluation criteria for DSPM adoption, starting with defining specific use cases rather than treating it as a checkbox capability. Shey outlines key questions around environment coverage (which clouds, which SaaS applications), risk types surfaced, and whether DSPM exists as standalone capability or integrated within broader platforms. She emphasizes the importance of understanding remediation workflows—whether risks can be automatically addressed or require manual intervention and integration with other tools. The discussion covers dependencies on internal processes like data governance, access control reviews, and staffing requirements to operationalize DSPM insights. Tony Kelly from Fortra demonstrates how their platform addresses the actionability gap by combining DSPM discovery with integrated DLP controls for automated remediation across cloud, on-premises, and endpoint environments.

Future Evolution and Emerging Capabilities

Shey projects DSPM's evolution beyond current focus on regulated data (PII, PHI, PCI) toward broader coverage including intellectual property, trade secrets, and AI-related risks. She anticipates convergence with other security posture management categories (CSPM, SSPM, AI SPM) as data and AI security become increasingly interrelated. Key emerging use cases include shadow AI detection, securing AI training data, and preparing for post-quantum cryptography migration through cryptographic discovery capabilities. The session concludes with Fortra's announcement of their DSPM offering, emphasizing their decade-plus heritage in data protection and comprehensive coverage across structured and unstructured data in cloud and on-premises environments. The platform's differentiation centers on end-to-end capability from automated discovery through classification to protection enforcement, addressing the common gap between risk identification and remediation.

Chapters

0:00 - Introduction and Speaker Overview
1:05 - What is DSPM? Defining the Category
3:36 - Current vs. Predictive Risk Assessment
5:57 - DSPM Challenges: Redundancy and Accuracy
8:59 - Market Consolidation and Acquisitions
10:17 - DSPM in Modern DLP and Zero Trust
13:34 - Key Considerations for DSPM Adoption
20:09 - Future of DSPM: What's Next
26:16 - Convergence with AI and Cloud Security
31:21 - Fortra's DSPM Platform Overview
35:52 - Q&A Session

Key Quotes

1:05 "It's like a bowl of alphabet soup these days, and DSPM is one of those, but what is it really? ..."
1:26 "Is this really a new thing to which I respond yes and no? ..."
5:39 "If the answer is, well, it's the hot topic or it's something that an executive is saying we have to look at, that's not good enough."
6:53 "It's very much customized, specific to your environment. And a lot of cases, it may be the rate that is trying to measure how things were done before and what that looked like within this particular enterprise versus what they look like now with this DSPM solution in place."
13:53 "The last thing we want is to treat this as like a checkbox capability, thinking that it is commoditized because it is not."
20:58 "DSPM has been a thing that really illuminates a path forward for people when it comes to understanding data in their environment, understanding risk and what to do about it."

Categories:
  • » Cybersecurity » Data Security
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Zero Trust
  • » Cybersecurity » Cloud Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Compliance & Governance
  • Webinar
  • Technical Deep Dive
  • AI & Machine Learning
  • Zero Trust
  • Data Security Posture Management
  • DSPM
  • Data Loss Prevention
  • DLP
  • Data Classification and Discovery
  • Zero Trust Data Security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Forrester Analyst Perspective on DSPM Market Evolution

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights
                https://www.truthinit.com/index.php/channel/1895/transforming-perceptions-of-ai-risks-and-threats-through-data-lineage-insights/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Data Lineage: Revealing AI Risks and Hidden Threats
                https://www.truthinit.com/index.php/channel/1894/transforming-data-lineage-revealing-ai-risks-and-hidden-threats/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Harnessing AI: Transitioning from Illusion to Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Data Lineage: Revealing AI Risks and Hidden Threats

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version