Joseph   Blankenship

Joseph Blankenship

Principal Analyst Serving Security & Risk Professionals

Joseph supports security and risk professionals, helping clients develop security strategies and make informed decisions to protect against risk. He covers security infrastructure and operations, including tools for the security operations center (SOC) such as security information and event management (SIEM), security analytics, and security automation and orchestration (SAO). He also covers security topics like artificial intelligence (AI) for cybersecurity, email security, distributed denial of service (DDoS), and network security. His research focuses on security monitoring, threat detection, insider threat, phishing prevention, operations, and management.

Joseph has presented at industry events, been quoted in the media, and written on a variety of security topics.

Previous Work Experience

His more than 12 years of security experience include marketing leadership and product marketing roles at Solutionary (NTT Security), McAfee (Intel Security), Vigilar, and IBM (ISS), where he focused on managed security services, consulting services, email security, compliance, and network security. As a marketing leader, Joseph helped align client needs with marketing strategy, messaging, and go-to-market activities while educating users about security strategy. His background also includes extensive experience in the IT, telecommunications, and consulting industries with Nextel, IBM, Philips Electronics, and KPMG.

Education

Joseph holds an MBA from Kennesaw State University and a B.A. in English from Auburn University.

Joseph Blankenship

Principal Analyst Serving Security & Risk Professionals

Joseph supports security and risk professionals, helping clients develop security strategies and make informed decisions to protect against risk. He covers security infrastructure and operations, including tools for the security operations center (SOC) such as security information and event management (SIEM), security analytics, and security automation and orchestration (SAO). He also covers security topics like artificial intelligence (AI) for cybersecurity, email security, distributed denial of service (DDoS), and network security. His research focuses on security monitoring, threat detection, insider threat, phishing prevention, operations, and management.

Joseph has presented at industry events, been quoted in the media, and written on a variety of security topics.

Previous Work Experience

His more than 12 years of security experience include marketing leadership and product marketing roles at Solutionary (NTT Security), McAfee (Intel Security), Vigilar, and IBM (ISS), where he focused on managed security services, consulting services, email security, compliance, and network security. As a marketing leader, Joseph helped align client needs with marketing strategy, messaging, and go-to-market activities while educating users about security strategy. His background also includes extensive experience in the IT, telecommunications, and consulting industries with Nextel, IBM, Philips Electronics, and KPMG.

Education

Joseph holds an MBA from Kennesaw State University and a B.A. in English from Auburn University.

Joseph Blankenship's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Defend Your Data As Insiders Monetize Their Access

    How The Dark Web Provides A Marketplace For Your Firm's Stolen Data

    July 30, 2018Joseph Blankenship

    Financial gain is one of the primary reasons malicious insiders steal valuable data or sell access to sensitive systems. The internet connects buyers and sellers of sensitive data, making it easy for them to find each other, negotiate the terms, and conduct the transaction. This report focuses on the marketplace for insider information and how security and risk leaders can protect their firms' sensitive data.

  • For Security & Risk Professionals

    REPORT: The Forrester Tech Tide™: Zero Trust Threat Prevention, Q3 2018

    Tools And Technology: The Security Architecture And Operations Playbook

    July 12, 2018 Amy DeMartine, Chase Cunningham, Joseph Blankenship, Josh Zelonis

    Zero Trust (ZT) threat prevention is increasingly critical to deny malicious attackers' access to enterprise assets. To accelerate their performance in ZT threat prevention, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide report presents an analysis of the maturity and business value of the 25 technology categories that support ZT threat prevention. Security pros should read this report to shape their firm's investment approach to these technologies.

  • For Security & Risk Professionals

    REPORT: Now Tech: Security Automation And Orchestration (SAO), Q3 2018

    Forrester's Overview Of 17 SAO Providers

    July 5, 2018Joseph Blankenship

    You can use security automation and orchestration (SAO) to increase analyst capacity, shorten incident response times, and integrate disparate security technologies. But to access these benefits, you'll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. S&R professionals should use Forrester's Now Tech report to understand the value they can expect from a security automation and orchestration provider and select vendors based on size and functionality.

  • For Infrastructure & Operations Professionals

    REPORT: Reduce Risk And Improve Security Through Infrastructure Automation

    The Bad Guys Use Automation — Fight Fire With Fire

    June 22, 2018 Chris Gardner, Joseph Blankenship, Chase Cunningham

    Today's security initiatives are impossible to execute manually. As infrastructure-as-code (IaC), edge computing, and internet-of-things (IoT) solutions proliferate, organizations must leverage automation to protect their business technology strategies. To do this, the traditionally distinct silos of infrastructure and operations (I&O) and security professionals must fuse their talents to deliver efficient risk management and compliance throughout the entire solution stack — with unprecedented speed, agility, and dependability. This is an update of a previously published report; Forrester reviews and revises it periodically for continued relevance and accuracy.

  • For Security & Risk Professionals

    REPORT: Now Tech: DDoS Mitigation Solutions, Q2 2018

    Forrester's Overview Of 21 DDoS Migration Solutions

    April 27, 2018Joseph Blankenship

    You can use DDoS mitigation solutions to ensure the availability of mission-critical services, preserve brand reputation, and maintain customers' experience with your digital assets. But to access these benefits, you'll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. Security and risk professionals should use Forrester's Now Tech report to understand the value they can expect from a DDoS mitigation provider and select vendors based on size and functionality.

View all of Joseph Blankenship's Research

Clients Who Work With Joseph Blankenship Also Work With:

View all related analysts