{"id":51137,"date":"2023-03-22T16:00:00","date_gmt":"2023-03-22T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=126735"},"modified":"2023-03-22T16:00:00","modified_gmt":"2023-03-22T16:00:00","slug":"microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/","title":{"rendered":"Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023"},"content":{"rendered":"<p>Organizations need to protect their sensitive data including intellectual property, trade secrets, customer data, and personally identifiable information from both insiders and external cyber attackers. In fact, 80 percent of organizations experience more than one data breach in their lifetime.<sup>1<\/sup> With global, industry, and national-level regulations, the need to protect sensitive data and prevent data exfiltration has never been more urgent than it is now.<\/p>\n<p>To help our customers navigate this complex data landscape, we are focused on delivering&nbsp;secure, intelligent, and user-centric solutions that provide visibility, reduce complexity, and mitigate risk. Over the past few years, we significantly increased our investment in building our Microsoft Purview data security capabilities across our <a href=\"https:\/\/www.microsoft.com\/security\/business\/information-protection\/microsoft-purview-information-protection\">information protection<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/information-protection\/microsoft-purview-data-loss-prevention\">data loss prevention<\/a> (DLP), and <a href=\"https:\/\/www.microsoft.com\/security\/business\/risk-management\/microsoft-purview-insider-risk-management\">insider risk management<\/a> solutions, as well as our privacy solution: <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-priva\">Microsoft Priva<\/a>. A few recent capabilities are advanced ready-to-use <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-and-identity\/public-preview-of-new-source-code-classifier-and-general\/ba-p\/3732696\" target=\"_blank\" rel=\"noreferrer noopener\">machine learning-enabled classifiers<\/a>, <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-and-identity\/enable-adaptive-protection-with-microsoft-purview\/ba-p\/3731486\" target=\"_blank\" rel=\"noreferrer noopener\">Adaptive Protection<\/a>, a <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-and-identity\/easily-migrate-your-symantec-dlp-policies-to-microsoft-purview\/ba-p\/3710764\" target=\"_blank\" rel=\"noreferrer noopener\">DLP migration assistant<\/a> tool (<a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RWZOfK\" target=\"_blank\" rel=\"noreferrer noopener\">on-premises DLP to cloud-native DLP<\/a>), and <a href=\"https:\/\/learn.microsoft.com\/privacy\/priva\/subject-rights-requests-delete\" target=\"_blank\" rel=\"noreferrer noopener\">right to be forgotten<\/a>&nbsp;for&nbsp;<a href=\"https:\/\/aka.ms\/priva\/SRRblog\">Microsoft Priva Subject Rights Requests<\/a>.<\/p>\n<p>I am delighted to announce that Forrester listed Microsoft as a Leader in its\u202f 2023 Wave\u2122 for Data Security Platforms. The Forrester Wave\u2122 report evaluates the data security platform market and provides a detailed overview of the current offering, strategy, and market presence of these vendors. Microsoft received the highest possible score in the current offering category for data classification, data threat and risk visibility, data masking or redaction, encryption, rights management, privacy use cases, and integrations for Zero Trust criteria; and in the strategy category for the product vision, execution roadmap, and community engagement criteria. &nbsp;<\/p>\n<p>We believe our investments in advanced classification technology, data threats and risk visibility, rights management, and privacy resulted in this recognition.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"1024\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture2-2-728x1024.png\" alt=\"Forrester Wave Data Security Platforms Q1 2023 graphic.\" class=\"wp-image-126811\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture2-2-728x1024.png 728w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture2-2-213x300.png 213w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture2-2-768x1081.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture2-2-1092x1536.png 1092w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture2-2-1455x2048.png 1455w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture2-2.png 1572w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\"><\/figure>\n<p>The Forrester report also acknowledges: \u201cMicrosoft shines with its ecosystem approach\u2014if you go all in,\u201d wrote Heidi Shey, Forrester Principal Analyst, in the report. \u201cMicrosoft Purview brings together capabilities to 1. understand and govern data; 2. safeguard data; and 3. improve risk and compliance posture. But Microsoft\u2019s security capabilities go beyond Microsoft Purview. By design, the entire Microsoft ecosystem working together multiplies its value via telemetry from across the environment.\u201d She added, \u201cThe power of Microsoft\u2019s telemetry is evident in its capabilities for identifying data threats and risk visibility. These offer strong controls for data masking, encryption, and rights management.\u201d<\/p>\n<p>Our work isn\u2019t stopping there, however. We continue to work closely with our customers to gather feedback to help us build better products. Your input provides critical insights as we strive to create solutions to&nbsp;help you on your data security journey.<\/p>\n<h2>Learn more<\/h2>\n<p>Read this complimentary copy of&nbsp;<a href=\"https:\/\/reprints2.forrester.com\/#\/assets\/2\/108\/RES178465\/report\" target=\"_blank\" rel=\"noreferrer noopener\">The Forrester Wave\u2122: Data Security Platforms, Q1 2023<\/a> for the analysis behind Microsoft\u2019s position as a Leader.<\/p>\n<p>Read more about Microsoft\u2019s recognition as a leader in cloud security, email security, security analytics, and more:<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\">\n<p><sup>1<\/sup><a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">Cost of a Data Breach Report 2022<\/a>, IBM. 2022.<\/p>\n<p>The Forrester Wave\u2122 is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave\u2122 are trademarks of Forrester Research, Inc. The Forrester Wave\u2122 is a graphical representation of Forrester\u2019s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave\u2122. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/22\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is named as a Leader in Forrester\u2019s 2023 Wave for Data Security Platforms for Microsoft Purview Information Protection, data loss prevention, insider risk management, and Microsoft Priva.<br \/>\nThe post Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023 appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51138,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[941,9249,347,6871],"class_list":["post-51137","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-compliance","tag-compliance-series","tag-cybersecurity","tag-data-governance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-22T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture2-2-728x1024.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023\",\"datePublished\":\"2023-03-22T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/\"},\"wordCount\":619,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023.png\",\"keywords\":[\"compliance\",\"Compliance Series\",\"Cybersecurity\",\"Data governance\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/\",\"name\":\"Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023.png\",\"datePublished\":\"2023-03-22T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023.png\",\"width\":728,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"compliance\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/compliance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-22T16:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/Picture2-2-728x1024.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023","datePublished":"2023-03-22T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/"},"wordCount":619,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023.png","keywords":["compliance","Compliance Series","Cybersecurity","Data governance"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/","name":"Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023.png","datePublished":"2023-03-22T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023.png","width":728,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-recognized-as-a-leader-in-the-forrester-wave-data-security-platforms-q1-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"compliance","item":"https:\/\/www.threatshub.org\/blog\/tag\/compliance\/"},{"@type":"ListItem","position":3,"name":"Microsoft recognized as a Leader in The Forrester Wave\u2122: Data Security Platforms, Q1 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51137"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51137\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51138"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}