Benjamin Ensor

Vice President, Research Director serving eBusiness & Channel Strategy PROFESSIONALS

Benjamin serves eBusiness & Channel Strategy Professionals. His research focuses on how consumers perceive, adopt, and use new technologies and what that means for business executives at consumer companies, encompassing topics like customer segmentation, business models, and managing multiple distribution channels.

His research explores how emerging technologies like the Internet and mobile phones affect consumers' behavior, what motivates their use of different channels for different tasks, and how new channels and technologies are changing consumers' media consumption and their relationships with consumer firms like retailers and financial services companies. In particular, he specializes in understanding the effect of the Internet and other new technologies on business models in retail financial services, including payments, banking, lending, investments, and insurance.

During his 16 years at Forrester, Benjamin has worked in the company's Consumer Technographics®, financial services, and eBusiness channel & product management professional teams. He is based in Forrester's London office.

Previous Work Experience

Before he joined Forrester, Benjamin was an analyst at Fletcher Research, the UK Internet research company that Forrester acquired. There, he researched the nascent online retail, online financial services, and online advertising markets. Before joining Fletcher Research, Benjamin worked as a financial journalist in London for four years.

Education

Benjamin has a degree in modern history from Trinity College, Oxford.

Refine your results

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

72 results in Everything

  • Rick Holland
  • Past 18 months
  • For Security & Risk Professionals

    Blog:Introducing Forrester’s Targeted-Attack Hierarchy Of Needs

    We recently published part 1 of a new series designed to help organizations build resiliency against targeted attacks. In the spirit of Maslow, we designed our Targeted-Attack Hierarchy Of...

    • For Security & Risk Professionals

      Blog:LG Is Learning An Embarrassing Privacy Lesson In The Age Of The Customer

      In a recent report titled “Technology Management In The Age Of The Customer,” Forrester defines the Age of the Customer as: "A 20-year business cycle in which the most successful...

      • For Security & Risk Professionals

        Blog:Are You Down With CIP (Critical Infrastructure Protection)?

        I am kicking off a new research series on critical infrastructure protection.  This first report is titled: “Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure.”...

        • For Security & Risk Professionals

          Report:Know Your Adversary

          Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program

          In February 2013, incident management and forensics expert Mandiant issued a report exposing the identities of three members of a cyberespionage group known as APT1. Then in May 2014, the US...

          • Downloads: 188
        • For Security & Risk Professionals

          Charts & Figures:NAV Considerations, Key Evaluation Criteria, And Solutions

        • For Security & Risk Professionals

          Report:Defend Your Data From Cyberthreats With A Zero Trust Network

          Executive Overview: The Security Architecture And Operations Playbook

          We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

          • Downloads: 817
        • For Security & Risk Professionals

          Report:Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure

          When Selecting Security Vendors, Look For Specialized Industry Expertise

          For years, security and risk (S&R) professionals have focused almost exclusively on protecting the organization's sensitive information resources, such as customer data, intellectual property, and...

          • Downloads: 159
        • For Security & Risk Professionals

          Report:Quick Take: HyTrust Acquires HighCloud To Strengthen Its Cloud Management And Security

          Acquisition Is A Harbinger Of A Cloud Security Feeding Frenzy

          On November 7, 2013, HyTrust, best known as a virtualization security and compliance specialist, announced its acquisition of HighCloud Security, a cloud encryption provider, for an undisclosed sum....

          • Downloads: 112
        • For Security & Risk Professionals

          Blog:The Militarization Of Information Security

          Does something like this sound familiar? "We need to find, fix, finish, exploit, analyze, & disseminate this intrusion set along the kill chain via force multipliers so we can observe, orient,...

          • For Security & Risk Professionals

            Charts & Figures:The Targeted-Attack Hierarchy Of Needs

          • For Security & Risk Professionals

            Blog:Kicking off the Forrester Web Content Security Wave

            We are about to kickoff our next Forrester Wave on web content security.  The inclusion criteria for vendor prequalification will be sent out within the next two weeks. We will be focusing on...

            • For Security & Risk Professionals

              Report:Quick Take: BAE Systems Buys SilverSky

              Acquisition Extends BAE's Analytics And Threat Intelligence Into Commercial Markets

              BAE Applied Intelligence — a subsidiary of BAE Systems — has made the next logical step to operationalize its security analytics and threat intelligence offerings by acquiring managed...

              • Downloads: 59
            • For Security & Risk Professionals

              Report:Use Actionable Threat Intelligence To Protect Your Digital Business

              Threat Intel Must Have Business Alignment, Relevance, And Integration To Be Effective

              Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will...

              • Downloads: 297
            • For Security & Risk Professionals

              Blog:You Should Attend Next Year’s RSA Conference Innovation Sandbox

              Last week I attended the RSA Conference (RSAC) Innovation Sandbox for the first time.  Not only was I an attendee, but I also was fortunate enough to host a CTO panel during the event. For...

              • For Security & Risk Professionals

                Report:Job Description: Security Architect

                Organization: The Security Architecture And Operations Playbook

                We designed this report for security and risk (S&R) executives who are rethinking their security architecture and working to improve the effectiveness of their operations, to help them hire one of...

                • Downloads: 897
              • For Security & Risk Professionals

                Blog:Actionable Intelligence, Meet Terry Tate, Office Linebacker

                sdfasdfaasdfThe #Forrester Security & Risk team is hiring. We are looking for consultants to join our team bit.ly/M9gWS5 #infosecasdfasdasdfasdddsadfas We are now less than two weeks away from our...

                • For Security & Risk Professionals

                  Report:Planning For Failure

                  An Effective Incident Management Program Is Essential To Help You Stay In Business

                  S&R pros, it's not a question of if — but when — your organization will experience a serious security breach. Cybercriminals are using more sophisticated and targeted attacks to steal...

                  • Downloads: 928
                • For Security & Risk Professionals

                  Blog:Say “Small Footprint” Again. I Dare You, I Double Dare You.

                  During the past 18 months or so, we have seen the emergence of innovative endpoint security solutions. The list is long; it is hard to keep track of all the solutions in the space. In no particular...

                  • For Security & Risk Professionals

                    Charts & Figures:Security Analytics Considerations, Key Evaluation Criteria, And Solutions

                  • For Security & Risk Professionals

                    Report:Brief: S&R Pros Remain Unprepared To Address Virtualization And Cloud Security Risks

                    S&R Pros Must Accelerate Their Knowledge, Skills, And Approach To Avoid Failure

                    For years, infrastructure and operations (I&O) leaders have embraced virtualization as a means to achieve consolidation and cost savings. Today, virtualization offers more than just cost savings: It...

                    • Downloads: 249
                  • For Security & Risk Professionals

                    Charts & Figures:Technology Pillars Of Breach Detection

                  • For Security & Risk Professionals

                    Report:Twelve Recommendations For Your Security Program In 2014

                    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

                    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

                    • Downloads: 1003
                  • For Security & Risk Professionals

                    Report:Quick Take: Palo Alto Networks Acquires Cyvera

                    Palo Alto Extends Its Reach To The Endpoint

                    On March 24, 2014, Palo Alto Networks announced an agreement to acquire Cyvera, a privately held endpoint security company, for approximately $200 million. With the acquisition, Palo Alto Networks...

                    • Downloads: 96