Skip to main content
Josh   Zelonis

Josh Zelonis

Principal Analyst Serving Security & Risk Professionals

Josh Zelonis is a principal analyst at Forrester, serving security and risk professionals with a focus on the people, processes, and technology necessary for effective cyberthreat detection and response. In this role, he helps clients continuously adapt to evolving threats while developing robust incident response capabilities that limit the impact of breaches. His research coverage includes enterprise detection and response (EDR), extended detection and response (XDR), security information and event management (SIEM), security orchestration automation and response (SOAR), network analysis and visibility (NAV), security operations, and cybersecurity incident response.

Previous Work Experience

Prior to joining Forrester, Josh accumulated over 13 years of experience as a security practitioner with demonstrated success in product architecture, engineering, and security assessment roles. As a product architect, Josh helped design and build innovative technologies in the breach detection space, architecting both endpoint and appliance products with a focus on data collection and analytics. His background also includes extensive experience in security assessment roles including red team, vulnerability research, and compliance.

Education

Josh holds a BS in computer science from the California State University, San Marcos.

Josh Zelonis

Principal Analyst Serving Security & Risk Professionals

Josh Zelonis is a principal analyst at Forrester, serving security and risk professionals with a focus on the people, processes, and technology necessary for effective cyberthreat detection and response. In this role, he helps clients continuously adapt to evolving threats while developing robust incident response capabilities that limit the impact of breaches. His research coverage includes enterprise detection and response (EDR), extended detection and response (XDR), security information and event management (SIEM), security orchestration automation and response (SOAR), network analysis and visibility (NAV), security operations, and cybersecurity incident response.

Previous Work Experience

Prior to joining Forrester, Josh accumulated over 13 years of experience as a security practitioner with demonstrated success in product architecture, engineering, and security assessment roles. As a product architect, Josh helped design and build innovative technologies in the breach detection space, architecting both endpoint and appliance products with a focus on data collection and analytics. His background also includes extensive experience in security assessment roles including red team, vulnerability research, and compliance.

Education

Josh holds a BS in computer science from the California State University, San Marcos.

Josh Zelonis's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Every CISO Is Now A Transformational CISO

    Lead During Turbulent Times Using The Traits Of This CISO Type

    May 1, 2020 Jeff Pollard, Josh Zelonis

    Transformational CISOs love overhauling a struggling security program and seeing long-term improvements take shape. Retooling, restaffing, and rebuilding from the ground up inspires them. Not every security leader is a transformational leader, but they can all emulate and borrow the behaviors and skills that transformational leaders possess. This report will show security and risk (S&R) pros how doing so will help your security program — and team — endure the pandemic in a way that enhances your reputation and brand with senior leaders in your company.

  • For Security & Risk Professionals

    REPORT: The Forrester Wave™: Enterprise Detection And Response, Q1 2020

    The 12 Providers That Matter Most And How They Stack Up

    March 18, 2020Josh Zelonis

    In our 14-criterion evaluation of enterprise detection and response providers, we identified the 12 most significant ones — Bitdefender, BlackBerry Cylance, CrowdStrike, Cybereason, Elastic, Kaspersky, McAfee, Microsoft, Palo Alto Networks, SentinelOne, Trend Micro, and VMware Carbon Black — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk professionals select the right one for their needs.

  • For Security & Risk Professionals

    REPORT: Now Tech: European Cybersecurity Incident Response Services, Q1 2020

    Forrester's Overview Of 19 European Cybersecurity Incident Response Providers

    March 10, 2020 Paul McKay, Josh Zelonis

    You can use European cybersecurity incident response (IR) providers to help you recover from a cybersecurity breach, stress test your cybersecurity IR plan, and support post-breach remediation steps. To realize these benefits, you'll first have to select from a diverse set of vendors that vary by size, functionality, geography, and vertical market focus. Security and risk professionals should use this report to understand the value they can expect from a European cybersecurity incident response provider and to select one based on size and capability.

  • For Security & Risk Professionals

    REPORT: Now Tech: Enterprise Detection And Response, Q1 2020

    Forrester's Overview Of 29 Enterprise Detection And Response Providers

    February 5, 2020Josh Zelonis

    You can use enterprise detection and response (EDR) offerings to improve detection, investigate alerts, and provide remote remediation of compromised systems. But to realize these benefits, you'll first have to select from a diverse set of vendors that vary by size, functionality, geography, and vertical market focus. Security and risk professionals should use this report to understand the value they can expect from an enterprise detection and response provider and to select one based on size and functionality.

  • For Security & Risk Professionals

    REPORT: Top Cybersecurity Threats In 2020

    Landscape: The Zero Trust Security Playbook

    January 24, 2020Josh Zelonis, Sandy Carielli

    Security and risk (S&R) pros have the challenging task of using finite budgets to protect their business from every type of attack in the threat landscape. One strategy for approaching this challenge is to use historical trends to prioritize protections against attacks that are the most probable. This report analyzes common attack patterns responsible for 2019 breaches.

View all of Josh Zelonis's Research

Clients Who Work With Josh Zelonis Also Work With:

View all related analysts

Connect

Brief Our Analysts

Upcoming Events

Webinar: Top Security Technologies To Watch, 2020

Date: June 23, 2020
Time: 11:00 AM-12:00 PM Eastern Standard Time
Register
View all upcoming events