Benjamin Ensor

Vice President, Research Director serving eBusiness & Channel Strategy PROFESSIONALS

Benjamin serves eBusiness & Channel Strategy Professionals. His research focuses on how consumers perceive, adopt, and use new technologies and what that means for business executives at consumer companies, encompassing topics like customer segmentation, business models, and managing multiple distribution channels.

His research explores how emerging technologies like the Internet and mobile phones affect consumers' behavior, what motivates their use of different channels for different tasks, and how new channels and technologies are changing consumers' media consumption and their relationships with consumer firms like retailers and financial services companies. In particular, he specializes in understanding the effect of the Internet and other new technologies on business models in retail financial services, including payments, banking, lending, investments, and insurance.

During his 16 years at Forrester, Benjamin has worked in the company's Consumer Technographics®, financial services, and eBusiness channel & product management professional teams. He is based in Forrester's London office.

Previous Work Experience

Before he joined Forrester, Benjamin was an analyst at Fletcher Research, the UK Internet research company that Forrester acquired. There, he researched the nascent online retail, online financial services, and online advertising markets. Before joining Fletcher Research, Benjamin worked as a financial journalist in London for four years.

Education

Benjamin has a degree in modern history from Trinity College, Oxford.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

47 results in Reports

  • Rick Holland
  • For Security & Risk Professionals

    Report:The State Of The Cyberthreat Intelligence Market

    As The Market Catches Fire, S&R Pros Must Make Careful Buying Decisions Or Fall Victim To Hype

    Cyberthreat intelligence (CTI) has emerged as a potentially powerful tool for S&R professionals who must defend their digital business from cybercriminals seeking to disrupt their operations and...

    • Downloads: 244
  • For Security & Risk Professionals

    Report:Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure

    When Selecting Security Vendors, Look For Specialized Industry Expertise

    For years, security and risk (S&R) professionals have focused almost exclusively on protecting the organization's sensitive information resources, such as customer data, intellectual property, and...

    • Downloads: 194
  • For Security & Risk Professionals

    Report:Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

    • Downloads: 78
  • For Security & Risk Professionals

    Report:Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Core Capabilities

    Assessment: The Security Architecture And Operations Playbook

    Targeted attacks continue to plague organizations, and these intrusions damage the brand, customer loyalty, and margins. Preparing for and responding to these attacks requires a focused and resolute...

    • Downloads: 808
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Email Content Security, Q4 2012

    The Nine Providers That Matter Most And How They Stack Up

    In Forrester's 47-criteria evaluation of email content security vendors, we identified the nine most significant vendors in the category and researched, analyzed, and scored them: Barracuda Networks,...

    • Downloads: 823
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2015

    Political Instability And Cyberterrorism Raise The Security Stakes For Digital Businesses

    Each winter, Forrester outlines 12 important recommendations for your security strategy for the coming year. We base these recommendations on thousands of client inquiries and interactions,...

    • Downloads: 590
  • For Security & Risk Professionals

    Report:RSAC Innovation Sandbox Finalists Spur Ingenuity In Security

    CISOs Should Look To Finalists For Future Direction And Investment

    The 2015 RSA Conference (RSAC) Innovation Sandbox marks the 10-year anniversary of its conception in North America. This contest has encouraged startups to demonstrate and share their security...

    • Downloads: 67
  • For Security & Risk Professionals

    Report:Quick Take: Rapid7 Pushes Into Application Security With Its NT Objectives Acquisition

    Over the past decade, penetration testing tools and vulnerability management vendors have continually commoditized the efforts of manual service offerings. Delivering automated, high-quality,...

    • Downloads: 37
  • For Application Development & Delivery Professionals

    Report:Improve Cybersecurity With DevOps

    DevOps Gives Security Professionals New Tools And Approaches

    Organizations use applications to compete for customers; the faster they deliver those applications, the better they compete. Many application development and delivery (AD&D) pros are turning to...

    • Downloads: 84
  • For Security & Risk Professionals

    Report:Quick Take: 12 Lessons For Security & Risk Pros From The US OPM Breach

    On June 4, the United States Office of Personnel Management (OPM) disclosed a cybersecurity incident affecting at least 4 million individuals, whose personally identifiable information (PII) may have...

    • Downloads: 237
  • For Security & Risk Professionals

    Report:The Forrester Wave™: SaaS Web Content Security, Q2 2015

    The Eight Providers That Matter Most And How They Stack Up

    In Forrester's 26-criteria evaluation of web content security delivered as a software-as-a-service (SaaS) solution, we identified the eight most significant providers in the category —...

    • Downloads: 145
  • For Security & Risk Professionals

    Report:Quick Take: FireEye Acquires Mandiant

    FireEye Emerging As A Leader In A New Breed Of Security Companies

    On January 2, 2014, FireEye announced its acquisition of incident response and forensics specialist Mandiant for nearly $900 million in stock and $100 million in cash. With this acquisition, FireEye...

    • Downloads: 215
  • For Security & Risk Professionals

    Report:Quick Take: Cisco's Acquisition Of Sourcefire Has Significant Potential

    But Only If Cisco Doesn't Strangle Innovation

    On July 23, 2013, Cisco announced its acquisition of network security specialist Sourcefire for $2.7 billion. With the acquisition of Sourcefire, Cisco confirms that customers do in fact want...

    • Downloads: 237
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: 2014

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research projects...

    • Downloads: 711
  • For Security & Risk Professionals

    Report:Quick Take: Symantec Splits In Two

    Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete

    On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will market...

    • Downloads: 156
  • For Security & Risk Professionals

    Report:Forrester's Targeted-Attack Hierarchy Of Needs: Assess Your Advanced Capabilities

    Multiple Technologies Are Required For Breach Detection

    In part 1 of our research series, we detailed the foundational requirements for building the necessary resiliency to targeted cyberattacks. With the foundational requirements in place, security and...

    • Downloads: 496
  • For Security & Risk Professionals

    Report:Know Your Adversary

    Five Steps To Incorporate Adversary Intelligence Into Your Cybersecurity Program

    In February 2013, incident management and forensics expert Mandiant issued a report exposing the identities of three members of a cyberespionage group known as APT1. In May 2014, the US Department of...

    • Downloads: 363
  • For Security & Risk Professionals

    Report:Planning For Failure

    An Effective Incident Management Program Is Essential To Help You Stay In Business

    S&R pros, it's not a question of if — but when — your organization will experience a serious security breach. Cybercriminals are using more sophisticated and targeted attacks to steal...

    • Downloads: 1147
  • For Security & Risk Professionals

    Report:Brief: S&R Pros Remain Unprepared To Address Virtualization And Cloud Security Risks

    S&R Pros Must Accelerate Their Knowledge, Skills, And Approach To Avoid Failure

    For years, infrastructure and operations (I&O) leaders have embraced virtualization as a means to achieve consolidation and cost savings. Today, virtualization offers more than just cost savings: It...

    • Downloads: 282
  • For Security & Risk Professionals

    Report:Quick Take: Fifteen Lessons For Security & Risk Pros From The IRS Get Transcript Breach

    Cybercriminals Are Using Customer Intelligence To Commit High-Value Fraud

    On May 27, the US Internal Revenue Service (IRS) disclosed that cybercriminals had gained access to the tax returns of approximately 104,000 individuals. This breach is notable because it...

    • Downloads: 125
  • For Security & Risk Professionals

    Report:Use Actionable Threat Intelligence To Protect Your Digital Business

    Threat Intel Must Have Business Alignment, Relevance, And Integration To Be Effective

    Threat intelligence is one of the most over-hyped capabilities within information security today. Ask five different security vendors what actionable threat intelligence means and you will...

    • Downloads: 364
  • For Security & Risk Professionals

    Report:The Forrester Wave™: DDoS Services Providers, Q3 2015

    Nine Vendors That Can Help You Protect Your Presence On The Web

    In Forrester's 36-criteria evaluation of distributed denial of service (DDoS) services providers, we identified nine of the most significant companies — Akamai Technologies CenturyLink,...

    • Downloads: 116
  • For Security & Risk Professionals

    Report:Quick Take: Proofpoint Acquires Nexgate

    Acquisition Signals A Maturing Social Risk And Compliance Market, But Proofpoint Still Has 'Points To Prove'

    On October 23, 2014, Proofpoint announced that it had acquired social risk and compliance (SRC) vendor Nexgate for approximately $35 million. While smaller than other security or social media vendor...

    • Downloads: 58
  • For Security & Risk Professionals

    Report:Quick Take: Cisco Acquires Neohapsis

    Deal Will Expand Cisco's Capabilities In Application, Cloud, And Mobile Security

    Cisco Systems announced this week its intent to acquire closely held Chicago-based Neohapsis, a decision that will substantially broaden Cisco's consulting capabilities. Most notably, the acquisition...

    • Downloads: 52
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1046