Chris Sherman

Analyst serving Security & Risk PROFESSIONALS

Chris is an analyst serving Security & Risk (S&R) Professionals. His research focuses on helping S&R Pros make strategic decisions regarding endpoint security (laptops, PCs, smartphones, and tablets) and data privacy, such as how to secure employee-owned devices while meeting industry compliance standards. Chris also works closely with Forrester's Infrastructure & Operations team to help integrate security operations with traditional endpoint management.

Previous Work Experience

Prior to his role as analyst, Chris was a researcher on the S&R team, where he helped Forrester clients with insights and best practices in endpoint security, mobile security, cloud security, and data privacy. Chris joined Forrester from Harvard Medical School, where he served as a research associate based at Massachusetts General Hospital. He brings with him an extensive background in scientific research, quantitative analysis, and project management.

Education

Chris received his B.A. degree in psychology from the University of Maine.

Refine your results

Date Range

Role

Industry

Topics

Market Imperatives

Region

Vendor

16 results in Reports

  • Chris Sherman
  • Business Technographics
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1013
  • For Security & Risk Professionals

    Report:Executive Spotlight: Top Priorities For Security And Risk Leaders, 1H 2011

    Insights From Forrester's Security & Risk Council

    Every six months, Forrester's security and risk (S&R) team fields a survey to the members of its Security & Risk Council to ascertain their top priorities for the following six months. Forrester's...

    • Downloads: 1037
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Endpoint Security, Q1 2013

    Endpoint Security Suites Take Center Stage In The Enterprise

    In Forrester's 50 criteria evaluation of endpoint security vendors, we identified nine top providers in the category — F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec,...

    • Downloads: 1007
  • For Security & Risk Professionals

    Report:Charter A Mobility Council With Seven Tasks

    Smartphones, tablets, and the rise of bring-your-own-device (BYOD) programs have put tremendous pressure on IT to revamp and rethink its mobile strategy: everything from procurement and development...

    • Downloads: 988
  • For Security & Risk Professionals

    Report:Endpoint Security Adoption Trends, Q2 2011 To Q4 2012

    How Your Peers Are Spending For Endpoint Security Through 2012

    Effective protection of user endpoints remains a challenge for enterprises and small and medium-size businesses (SMBs) alike. Trends such as workforce mobility and bring-your-own-device (BYOD)...

    • Downloads: 841
  • For Security & Risk Professionals

    Report:The State Of Enterprise Mobile Security, Q1 2014: Strategies Shift From Devices To Apps

    Benchmark: The Mobile Security Playbook

    Even as more and more firms adopt and grow more comfortable with bring-your-own-device (BYOD) strategies, security and risk (S&R) pros remain vigilant — particularly as firms seek to empower...

    • Downloads: 630
  • For Security & Risk Professionals

    Report:Survey Employees To Target Mobility Improvements

    This report outlines the benchmarks of Forrester's solution for security and risk (S&R) executives working on mobile security and operations initiatives. This report provides a benchmark of budgets,...

    • Downloads: 616
  • For Security & Risk Professionals

    Report:Endpoint Security Trends, Q2 2013 To Q4 2014

    New Disruptors For Endpoint Security Through 2014

    Every year, Forrester conducts a number of global surveys of IT security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...

    • Downloads: 524
  • For Security & Risk Professionals

    Report:Endpoint Security Suite Market Update: Q2 2013

    Forrester's Post-Wave™ Evaluation Of New Product Updates

    In Q1 2013, Forrester published the Endpoint Security Wave™, a 50-criteria evaluation of the top nine endpoint security vendors. As part of our mission to keep our clients informed of important...

    • Downloads: 483
  • For Security & Risk Professionals

    Report:It's Time To Level Up Your Mobile Application Security Program

    Processes: The Mobile Security Playbook

    Security and risk (S&R) professionals face many challenges when looking to develop a mobile security strategy that effectively balances the requirements of their digital workforce with the need to...

    • Downloads: 525
  • For Security & Risk Professionals

    Report:Market Overview: Endpoint Encryption Technologies, Q1 2013

    Protect Your Sensitive Data With Endpoint Encryption

    Security and risk (S&R) professionals often turn to endpoint encryption technologies to protect corporate data, meet regulatory requirements, and prevent accidental data leaks. Full disk and...

    • Downloads: 497
  • For Security & Risk Professionals

    Report:The State Of Endpoint Security Adoption 2014 To 2015

    Adoption Of Proactive Security Tools Will Outpace Signature-Based Antimalware In 2015

    Every year, Forrester conducts a number of global surveys of security decision-makers and information workers from a wide range of organization industries and sizes. In this report, we present the...

    • Downloads: 316
  • For Security & Risk Professionals

    Report:Prepare For The Post-AV Era Part 1: Five Alternatives To Endpoint Antivirus

    S&R Pros Are Shifting AV Spend To More Proactive Security Technologies

    As malware increases in sophistication and the number of new variants rises, antivirus (AV) technologies have steadily become less effective at stopping advanced threats to employee endpoints and...

    • Downloads: 342
  • For Security & Risk Professionals

    Report:Prepare For The Post-AV Era Part 2: Layer Your Endpoint Security Tools For Max Protection

    In this second report covering the post-antivirus (AV) era, we discuss how a layered approach to endpoint security can help decrease the risk of attack significantly beyond what antivirus alone can...

    • Downloads: 237
  • For Infrastructure & Operations Professionals

    Report:Market Overview: Enterprise Endpoint Backup And Recovery Solutions

    Protect And Enable The Anytime, Anywhere Worker With Client Data Protection

    The information workers of today look very different from those just a few years ago. Today, they work in more places on more devices and expect services to be available 24x7. They create data on...

    • Downloads: 207
  • For Security & Risk Professionals

    Report:Brief: Stolen And Lost Devices Are Putting Personal Healthcare Information At Risk

    It's Time For Healthcare CISOs To Close The Faucet Of Data Loss From Endpoints

    Amid a rising tide of compliance pressures, employee mobility, and high black-market values for personally identifiable information (PII) and personal healthcare information (PHI), security and risk...

    • Downloads: 158