Benjamin Ensor

Vice President, Research Director serving eBusiness & Channel Strategy PROFESSIONALS

Benjamin serves eBusiness & Channel Strategy Professionals. His research focuses on how consumers perceive, adopt, and use new technologies and what that means for business executives at consumer companies, encompassing topics like customer segmentation, business models, and managing multiple distribution channels.

His research explores how emerging technologies like the Internet and mobile phones affect consumers' behavior, what motivates their use of different channels for different tasks, and how new channels and technologies are changing consumers' media consumption and their relationships with consumer firms like retailers and financial services companies. In particular, he specializes in understanding the effect of the Internet and other new technologies on business models in retail financial services, including payments, banking, lending, investments, and insurance.

During his 16 years at Forrester, Benjamin has worked in the company's Consumer Technographics®, financial services, and eBusiness channel & product management professional teams. He is based in Forrester's London office.

Previous Work Experience

Before he joined Forrester, Benjamin was an analyst at Fletcher Research, the UK Internet research company that Forrester acquired. There, he researched the nascent online retail, online financial services, and online advertising markets. Before joining Fletcher Research, Benjamin worked as a financial journalist in London for four years.


Benjamin has a degree in modern history from Trinity College, Oxford.

Refine your results

Date Range




Market Imperatives



107 results in Everything

  • Rick Holland
  • For Security & Risk Professionals

    Report:Quick Take: HyTrust Acquires HighCloud To Strengthen Its Cloud Management And Security

    Acquisition Is A Harbinger Of A Cloud Security Feeding Frenzy

    On November 7, 2013, HyTrust, best known as a virtualization security and compliance specialist, announced its acquisition of HighCloud Security, a cloud encryption provider, for an undisclosed sum....

    • Downloads: 112
  • For Security & Risk Professionals

    Report:Use Actionable Threat Intelligence To Protect Your Digital Business

    Threat Intel Must Have Business Alignment, Relevance, And Integration To Be Effective

    Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will...

    • Downloads: 313
  • For Security & Risk Professionals

    Charts & Figures:The Targeted-Attack Hierarchy Of Needs

  • For Security & Risk Professionals

    Charts & Figures:Fundamental Missteps

  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1014
  • For Security & Risk Professionals

    Blog:Point Solutions Must Die

    Last year I wrote a blog post titled, “Incident Response Isn’t About Point Solutions; It Is About An Ecosystem."  This concept naturally extends beyond incident response to broader...

    • For Security & Risk Professionals

      Charts & Figures:Characteristics Of Actionable Threat Intelligence

    • For Security & Risk Professionals

      Blog:Are You Down With CIP (Critical Infrastructure Protection)?

      I am kicking off a new research series on critical infrastructure protection.  This first report is titled: “Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure.”...

      • For Security & Risk Professionals

        Report:Know Your Adversary

        Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program

        In February 2013, incident management and forensics expert Mandiant issued a report exposing the identities of three members of a cyberespionage group known as APT1. Then in May 2014, the US...

        • Downloads: 200
      • For Security & Risk Professionals

        Charts & Figures:Acting On Intelligence Overwhelms Analysts

      • For Security & Risk Professionals

        Charts & Figures:Technology Pillars Of Breach Detection

      • For Security & Risk Professionals

        Charts & Figures:Evaluated Vendors: Product Information And Selection Criteria

      • For Security & Risk Professionals

        Report:Quick Take: BAE Systems Buys SilverSky

        Acquisition Extends BAE's Analytics And Threat Intelligence Into Commercial Markets

        BAE Applied Intelligence — a subsidiary of BAE Systems — has made the next logical step to operationalize its security analytics and threat intelligence offerings by acquiring managed...

        • Downloads: 61
      • For Security & Risk Professionals

        Charts & Figures:How To Develop Intelligence Requirements

      • For Security & Risk Professionals

        Report:Quick Take: FireEye Acquires Mandiant

        FireEye Emerging As A Leader In A New Breed Of Security Companies

        On January 2, 2014, FireEye announced its acquisition of incident response and forensics specialist Mandiant for nearly $900 million in stock and $100 million in cash. With this acquisition, FireEye...

        • Downloads: 198
      • For Security & Risk Professionals

        Report:The Forrester Wave™: Email Content Security, Q4 2012

        The Nine Providers That Matter Most And How They Stack Up

        In Forrester's 47-criteria evaluation of email content security vendors, we identified the nine most significant vendors in the category and researched, analyzed, and scored them: Barracuda Networks,...

        • Downloads: 790
      • For Security & Risk Professionals

        Report:Quick Take: Symantec Splits In Two

        Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete

        On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will market...

        • Downloads: 134
      • For Security & Risk Professionals

        Charts & Figures:Take Advantage Of Executive Awareness

        Assessment: The Security Architecture And Operations Playbook

      • For Security & Risk Professionals

        Charts & Figures:The Intelligence Cycle

      • For Security & Risk Professionals

        Charts & Figures:Four Steps To Using And Sharing Threat Intelligence

      • For Security & Risk Professionals

        Blog:Observations From Black Hat - More Defense Please

        Last week I had the opportunity to attend the 15th annual Black Hat security conference in Las Vegas. I have attended DEFCON in the past, but never Black Hat. The conference has grown significantly...

        • For Security & Risk Professionals

          Report:Brief: Apple Throws Down The Privacy Gauntlet

          Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

          On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

          • Downloads: 64
        • For Security & Risk Professionals

          Blog:got STIX?

          The sharing of threat intelligence is a hot topic these days. When I do conference speeches, I typically ask how many organizations see value in sharing, and most in the room will raise their hand....