Benjamin Ensor

Vice President, Research Director serving eBusiness & Channel Strategy PROFESSIONALS

Benjamin serves eBusiness & Channel Strategy Professionals. His research focuses on how consumers perceive, adopt, and use new technologies and what that means for business executives at consumer companies, encompassing topics like customer segmentation, business models, and managing multiple distribution channels.

His research explores how emerging technologies like the Internet and mobile phones affect consumers' behavior, what motivates their use of different channels for different tasks, and how new channels and technologies are changing consumers' media consumption and their relationships with consumer firms like retailers and financial services companies. In particular, he specializes in understanding the effect of the Internet and other new technologies on business models in retail financial services, including payments, banking, lending, investments, and insurance.

During his 16 years at Forrester, Benjamin has worked in the company's Consumer Technographics®, financial services, and eBusiness channel & product management professional teams. He is based in Forrester's London office.

Previous Work Experience

Before he joined Forrester, Benjamin was an analyst at Fletcher Research, the UK Internet research company that Forrester acquired. There, he researched the nascent online retail, online financial services, and online advertising markets. Before joining Fletcher Research, Benjamin worked as a financial journalist in London for four years.

Education

Benjamin has a degree in modern history from Trinity College, Oxford.

Refine your results

Date Range

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

35 results in Reports

  • Rick Holland
  • For Security & Risk Professionals

    Report:Quick Take: Cisco's Acquisition Of Sourcefire Has Significant Potential

    But Only If Cisco Doesn't Strangle Innovation

    On July 23, 2013, Cisco announced its acquisition of network security specialist Sourcefire for $2.7 billion. With the acquisition of Sourcefire, Cisco confirms that customers do in fact want...

    • Downloads: 231
  • For Security & Risk Professionals

    Report:Know Your Adversary

    Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program

    In February 2013, incident management and forensics expert Mandiant issued a report exposing the identities of three members of a cyberespionage group known as APT1. Then in May 2014, the US...

    • Downloads: 187
  • For Security & Risk Professionals

    Report:Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure

    When Selecting Security Vendors, Look For Specialized Industry Expertise

    For years, security and risk (S&R) professionals have focused almost exclusively on protecting the organization's sensitive information resources, such as customer data, intellectual property, and...

    • Downloads: 158
  • For Security & Risk Professionals

    Report:Quick Take: HyTrust Acquires HighCloud To Strengthen Its Cloud Management And Security

    Acquisition Is A Harbinger Of A Cloud Security Feeding Frenzy

    On November 7, 2013, HyTrust, best known as a virtualization security and compliance specialist, announced its acquisition of HighCloud Security, a cloud encryption provider, for an undisclosed sum....

    • Downloads: 112
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Email Content Security, Q4 2012

    The Nine Providers That Matter Most And How They Stack Up

    In Forrester's 47-criteria evaluation of email content security vendors, we identified the nine most significant vendors in the category and researched, analyzed, and scored them: Barracuda Networks,...

    • Downloads: 784
  • For Security & Risk Professionals

    Report:Seven Habits Of Highly Effective Incident Response Teams

    Given the continued metastasizing of the threat landscape, it comes as no surprise that enterprises should possess mature incident response capabilities that are built on staff, augmented by...

    • Downloads: 616
  • For Security & Risk Professionals

    Report:Brief: S&R Pros Remain Unprepared To Address Virtualization And Cloud Security Risks

    S&R Pros Must Accelerate Their Knowledge, Skills, And Approach To Avoid Failure

    For years, infrastructure and operations (I&O) leaders have embraced virtualization as a means to achieve consolidation and cost savings. Today, virtualization offers more than just cost savings: It...

    • Downloads: 249
  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 816
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1002
  • For Security & Risk Professionals

    Report:Quick Take: Palo Alto Networks Acquires Cyvera

    Palo Alto Extends Its Reach To The Endpoint

    On March 24, 2014, Palo Alto Networks announced an agreement to acquire Cyvera, a privately held endpoint security company, for approximately $200 million. With the acquisition, Palo Alto Networks...

    • Downloads: 96
  • For Security & Risk Professionals

    Report:Five Steps To Build An Effective Threat Intelligence Capability

    Against today's mutating threat landscape and sophisticated cybercriminals, security and risk (S&R) professionals are outgunned and outmatched. The traditional strategy of waiting for an alert and...

    • Downloads: 1032
  • For Security & Risk Professionals

    Report:Four Best Practices To Maximize The Value Of Using And Sharing Threat Intelligence

    Threat intelligence continues to dominate both the headlines and the attention of security and risk (S&R) professionals looking for viable options in their escalating battle against advanced...

    • Downloads: 373
  • For Security & Risk Professionals

    Report:Introducing Forrester's Prioritized Patching Process (P3)

    Leverage Predictive Threat Modeling And Data Value For A Context-Based Approach To Patch Prioritization

    Criminals want access to your valuable assets, and one of their preferred methods is to exploit vulnerabilities lurking in your software and systems. Typically, these vulnerabilities have available...

    • Downloads: 317
  • For Security & Risk Professionals

    Report:Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

    • Downloads: 577
  • For Security & Risk Professionals

    Report:Quick Take: IBM Buys Trusteer And, With It, Better, More-Intelligent Data-Centric Security

    Prospects Are Good For This Acquisition, Which Matches Complementary Strengths

    On August 15, 2013, IBM announced its acquisition, for an undisclosed sum, of Trusteer, a fraud protection and cybersecurity firm focused primarily on providing services to banking customers. With...

    • Downloads: 194
  • For Security & Risk Professionals

    Report:Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

    • Downloads: 61
  • For Security & Risk Professionals

    Report:Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities

    Multiple Technologies Are Required For Breach Detection

    In part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and...

    • Downloads: 412
  • For Security & Risk Professionals

    Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    Landscape: The Security Architecture And Operations Playbook

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

    • Downloads: 804
  • For Security & Risk Professionals

    Report:Quick Take: Sony Breach — A Sad Tale Of Epic Failure That Could Have Been Avoided

    Businesses Must Prepare For Politically And Socially Motivated Cyberattacks And Cyberespionage

    Although we are in the early stages of Sony Pictures Entertainment's (SPE's) catastrophically embarrassing intrusion, there are still many lessons that security and risk (S&R) professionals can take...

    • Downloads: 264
  • For Security & Risk Professionals

    Report:Quick Take: Symantec Splits In Two

    Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete

    On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will market...

    • Downloads: 129
  • For Security & Risk Professionals

    Report:Quick Take: Cisco Acquires ThreatGrid, Bolstering Advanced Malware Protection

    Cisco Broadens A Strong Portfolio But Still Needs To Better Explain Its Overall Security Product Road Map

    On May 20, 2014, Cisco Systems announced its intention to acquire privately-held dynamic malware analysis company ThreatGrid for an undisclosed amount. This acquisition enhances Cisco Systems'...

    • Downloads: 92
  • For Security & Risk Professionals

    Report:Brief: Proofpoint Strengthens Its Targeted Attack Defense With NetCitadel Acquisition

    Acquisition Is Proof That You Must Integrate Advanced Detection With Incident Response

    On May 20, 2014, Proofpoint announced that it had acquired Silicon-Valley-based startup NetCitadel, a privately owned incident response company, for approximately $24 million in cash. While small,...

    • Downloads: 65
  • For Security & Risk Professionals

    Report:Job Description: Security Architect

    Organization: The Security Architecture And Operations Playbook

    We designed this report for security and risk (S&R) executives who are rethinking their security architecture and working to improve the effectiveness of their operations, to help them hire one of...

    • Downloads: 897
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: 2014

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research projects...

    • Downloads: 652
  • For Security & Risk Professionals

    Report:Quick Take: BAE Systems Buys SilverSky

    Acquisition Extends BAE's Analytics And Threat Intelligence Into Commercial Markets

    BAE Applied Intelligence — a subsidiary of BAE Systems — has made the next logical step to operationalize its security analytics and threat intelligence offerings by acquiring managed...

    • Downloads: 59