Benjamin Ensor

Vice President, Research Director serving eBusiness & Channel Strategy PROFESSIONALS

Benjamin serves eBusiness & Channel Strategy Professionals. His research focuses on how consumers perceive, adopt, and use new technologies and what that means for business executives at consumer companies, encompassing topics like customer segmentation, business models, and managing multiple distribution channels.

His research explores how emerging technologies like the Internet and mobile phones affect consumers' behavior, what motivates their use of different channels for different tasks, and how new channels and technologies are changing consumers' media consumption and their relationships with consumer firms like retailers and financial services companies. In particular, he specializes in understanding the effect of the Internet and other new technologies on business models in retail financial services, including payments, banking, lending, investments, and insurance.

During his 16 years at Forrester, Benjamin has worked in the company's Consumer Technographics®, financial services, and eBusiness channel & product management professional teams. He is based in Forrester's London office.

Previous Work Experience

Before he joined Forrester, Benjamin was an analyst at Fletcher Research, the UK Internet research company that Forrester acquired. There, he researched the nascent online retail, online financial services, and online advertising markets. Before joining Fletcher Research, Benjamin worked as a financial journalist in London for four years.


Benjamin has a degree in modern history from Trinity College, Oxford.

Refine your results




Market Imperatives



72 results in Everything

  • Rick Holland
  • Past 18 months
  • For Security & Risk Professionals

    Report:Quick Take: HyTrust Acquires HighCloud To Strengthen Its Cloud Management And Security

    Acquisition Is A Harbinger Of A Cloud Security Feeding Frenzy

    On November 7, 2013, HyTrust, best known as a virtualization security and compliance specialist, announced its acquisition of HighCloud Security, a cloud encryption provider, for an undisclosed sum....

    • Downloads: 112
  • For Security & Risk Professionals

    Report:Use Actionable Threat Intelligence To Protect Your Digital Business

    Threat Intel Must Have Business Alignment, Relevance, And Integration To Be Effective

    Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will...

    • Downloads: 313
  • For Security & Risk Professionals

    Charts & Figures:The Targeted-Attack Hierarchy Of Needs

  • For Security & Risk Professionals

    Charts & Figures:Fundamental Missteps

  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1014
  • For Security & Risk Professionals

    Charts & Figures:Characteristics Of Actionable Threat Intelligence

  • For Security & Risk Professionals

    Blog:Are You Down With CIP (Critical Infrastructure Protection)?

    I am kicking off a new research series on critical infrastructure protection.  This first report is titled: “Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure.”...

    • For Security & Risk Professionals

      Report:Know Your Adversary

      Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program

      In February 2013, incident management and forensics expert Mandiant issued a report exposing the identities of three members of a cyberespionage group known as APT1. Then in May 2014, the US...

      • Downloads: 200
    • For Security & Risk Professionals

      Charts & Figures:Acting On Intelligence Overwhelms Analysts

    • For Security & Risk Professionals

      Charts & Figures:Technology Pillars Of Breach Detection

    • For Security & Risk Professionals

      Report:Quick Take: BAE Systems Buys SilverSky

      Acquisition Extends BAE's Analytics And Threat Intelligence Into Commercial Markets

      BAE Applied Intelligence — a subsidiary of BAE Systems — has made the next logical step to operationalize its security analytics and threat intelligence offerings by acquiring managed...

      • Downloads: 61
    • For Security & Risk Professionals

      Charts & Figures:How To Develop Intelligence Requirements

    • For Security & Risk Professionals

      Report:Quick Take: FireEye Acquires Mandiant

      FireEye Emerging As A Leader In A New Breed Of Security Companies

      On January 2, 2014, FireEye announced its acquisition of incident response and forensics specialist Mandiant for nearly $900 million in stock and $100 million in cash. With this acquisition, FireEye...

      • Downloads: 198
    • For Security & Risk Professionals

      Report:Quick Take: Symantec Splits In Two

      Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete

      On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will market...

      • Downloads: 134
    • For Security & Risk Professionals

      Charts & Figures:Four Steps To Using And Sharing Threat Intelligence

    • For Security & Risk Professionals

      Report:Brief: Apple Throws Down The Privacy Gauntlet

      Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

      On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

      • Downloads: 64
    • For Security & Risk Professionals

      Blog:got STIX?

      The sharing of threat intelligence is a hot topic these days. When I do conference speeches, I typically ask how many organizations see value in sharing, and most in the room will raise their hand....

      • For Security & Risk Professionals

        Blog:Kicking off the Forrester Web Content Security Wave

        We are about to kickoff our next Forrester Wave on web content security.  The inclusion criteria for vendor prequalification will be sent out within the next two weeks. We will be focusing on...

        • For Security & Risk Professionals

          Blog:Introducing Forrester’s Targeted-Attack Hierarchy Of Needs

          We recently published part 1 of a new series designed to help organizations build resiliency against targeted attacks. In the spirit of Maslow, we designed our Targeted-Attack Hierarchy Of...

          • For Security & Risk Professionals

            Blog:The Millennium Falcon And Breach Responsibility

            Do you remember the scene from The Empire Strikes Back where the Millennium Falcon is trying to escape an Imperial Star Destroyer? Han Solo says, “Let’s get out of here, ready for...

            • For Security & Risk Professionals

              Charts & Figures:The Targeted-Attack Hierarchy Of Needs

            • For Security & Risk Professionals

              Charts & Figures:Threat Intelligence Relevancy Tiers

            • For Security & Risk Professionals

              Report:Planning For Failure

              An Effective Incident Management Program Is Essential To Help You Stay In Business

              S&R pros, it's not a question of if — but when — your organization will experience a serious security breach. Cybercriminals are using more sophisticated and targeted attacks to steal...

              • Downloads: 1003