Joseph   Blankenship

Joseph Blankenship

Senior Analyst Serving Security & Risk Professionals

Joseph supports Security & Risk professionals, helping clients develop security strategies and make informed decisions to protect against risk. He covers security infrastructure and operations, including tools for the security operations center (SOC) such as security information and event management (SIEM), security analytics, and security automation and orchestration (SAO). He also covers security topics like artificial intelligence (AI) for cybersecurity, email security, distributed denial of service (DDoS), and network security. His research focuses on security monitoring, threat detection, insider threat, phishing prevention, operations, and management.

Joseph has presented at industry events, been quoted in the media, and has written on a variety of security topics.

Previous Work Experience

His more than 12 years of security experience include marketing leadership and product marketing roles at Solutionary (NTT Security), McAfee (Intel Security), Vigilar, and IBM (ISS), where he focused on managed security services, consulting services, email security, compliance, and network security. As a marketing leader, Joseph helped align client needs with marketing strategy, messaging, and go-to-market activities while educating users about security strategy. His background also includes extensive experience in the IT, telecommunications, and consulting industries with Nextel, IBM, Philips Electronics, and KPMG.

Education

Joseph holds an MBA from Kennesaw State University and a B.A. in English from Auburn University.

Joseph Blankenship

Senior Analyst Serving Security & Risk Professionals

Joseph supports Security & Risk professionals, helping clients develop security strategies and make informed decisions to protect against risk. He covers security infrastructure and operations, including tools for the security operations center (SOC) such as security information and event management (SIEM), security analytics, and security automation and orchestration (SAO). He also covers security topics like artificial intelligence (AI) for cybersecurity, email security, distributed denial of service (DDoS), and network security. His research focuses on security monitoring, threat detection, insider threat, phishing prevention, operations, and management.

Joseph has presented at industry events, been quoted in the media, and has written on a variety of security topics.

Previous Work Experience

His more than 12 years of security experience include marketing leadership and product marketing roles at Solutionary (NTT Security), McAfee (Intel Security), Vigilar, and IBM (ISS), where he focused on managed security services, consulting services, email security, compliance, and network security. As a marketing leader, Joseph helped align client needs with marketing strategy, messaging, and go-to-market activities while educating users about security strategy. His background also includes extensive experience in the IT, telecommunications, and consulting industries with Nextel, IBM, Philips Electronics, and KPMG.

Education

Joseph holds an MBA from Kennesaw State University and a B.A. in English from Auburn University.

Joseph Blankenship's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: The Forrester Tech Tide™: Zero Trust Threat Prevention, Q3 2018

    25 Technologies Underpin Zero Trust Threat Prevention

    July 12, 2018 Amy DeMartine, Chase Cunningham, Joseph Blankenship, Josh Zelonis

    Zero Trust (ZT) threat prevention is increasingly critical to deny malicious attackers' access to enterprise assets. To accelerate their performance in ZT threat prevention, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide report presents an analysis of the maturity and business value of the 25 technology categories that support ZT threat prevention. Security pros should read this report to shape their firm's investment approach to these technologies.

  • For Security & Risk Professionals

    REPORT: Now Tech: Security Automation And Orchestration (SAO), Q3 2018

    Forrester's Overview Of 17 SAO Providers

    July 5, 2018Joseph Blankenship

    You can use security automation and orchestration (SAO) to increase analyst capacity, shorten incident response times, and integrate disparate security technologies. But to access these benefits, you'll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. S&R professionals should use Forrester's Now Tech report to understand the value they can expect from a security automation and orchestration provider and select vendors based on size and functionality.

  • For Infrastructure & Operations Professionals

    REPORT: Reduce Risk And Improve Security Through Infrastructure Automation

    The Bad Guys Use Automation — Fight Fire With Fire

    June 22, 2018 Chris Gardner, Joseph Blankenship, Chase Cunningham

    Today's security initiatives are impossible to execute manually. As infrastructure-as-code (IaC), edge computing, and internet-of-things (IoT) solutions proliferate, organizations must leverage automation to protect their business technology strategies. To do this, the traditionally distinct silos of infrastructure and operations (I&O) and security professionals must fuse their talents to deliver efficient risk management and compliance throughout the entire solution stack — with unprecedented speed, agility, and dependability. This is an update of a previously published report; Forrester reviews and revises it periodically for continued relevance and accuracy.

  • For Security & Risk Professionals

    REPORT: Now Tech: DDoS Mitigation Solutions, Q2 2018

    Tools And Technology: The Security Architecture And Operations Playbook

    April 27, 2018Joseph Blankenship

    You can use DDoS mitigation solutions to ensure the availability of mission-critical services, preserve brand reputation, and maintain customers' experience with your digital assets. But to access these benefits, you'll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. Security and risk professionals should use Forrester's Now Tech report to understand the value they can expect from a DDoS mitigation provider and select vendors based on size and functionality.

  • For Security & Risk Professionals

    REPORT: CISOs, Get Ready To Pay More As Tech Titans Enter The Security Market

    Alphabet, Amazon, And Microsoft Seek To Remake The Cybersecurity Landscape

    April 24, 2018 Jeff Pollard, Joseph Blankenship

    Three tech giants are rushing in to disrupt the cybersecurity market the same way they disrupted retail, computing, and advertising. When computing was on-premises or in client-owned data centers, a point-product approach to security made sense (even if it didn't work all the time). However, Alphabet, Amazon, and Microsoft are now looking to circumvent existing security product vendors by delivering security capabilities to where client workloads are moving: the cloud. This report helps S&R pros prepare to work with these new security giants.

View all of Joseph Blankenship's Research

Clients Who Work With Joseph Blankenship Also Work With:

View all related analysts