Julie A. Ask

Vice President, Principal Analyst serving eBusiness & Channel Strategy PROFESSIONALS

Julie serves eBusiness & Channel Strategy Professionals. Julie's 25 years of work experience is balanced between the engineering and management consulting work she did in the first half of her career and her work as an analyst for the past 12 years. The combination of technical and business expertise positions prepared her well to work with business leaders to identify new opportunities offered by mobile technology and to develop strategies to engage with consumers on mobile devices. She has worked with hundreds of clients across retail, travel, banking, insurance, CPG, healthcare, retail, and more to advise and guide the development of their mobile strategies.

Julie's research and analysis have been widely cited in publications including The Wall Street Journal, The New York Times, USA Today, BusinessWeek, RCR Wireless, and The Onion and on CBS, NBC, and PBS.

Previous Work Experience

Prior to becoming an analyst, Julie worked at a contextual services mobile startup in San Francisco and prior to that at Booz Allen & Hamilton.


Julie holds a B.S.E.E. and a Master of Science in electrical engineering and computer science from the Massachusetts Institute of Technology (MIT). She also holds an M.B.A. from the University of Michigan.

Refine your results




Market Imperatives



39 results in Everything

  • Security & Risk
  • Past 18 months
  • Stephanie Balaouras
  • For Security & Risk Professionals

    Report:Evolve Your Identity Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook

    The rapid adoption of mobile devices and cloud services, together with a multitude of new partnerships and customer-facing applications, has "extended" the identity boundary of today's digital...

    • Downloads: 977
  • For Security & Risk Professionals

    Report:Secure And Protect Mobile Moments

    Executive Overview: The Mobile Security Playbook

    The mobile mind shift is an expectation that an individual can get what she wants in her immediate context and moments of need. The shift is a global phenomenon that is happening now, not only with...

    • Downloads: 1157
  • For Security & Risk Professionals

    Blog:Security & Risk Consultant Spotlight Podcast With Todd Barnum

    For the past few months, we've been using our newsletter and podcast to highlight one of our analysts on Forrester's Security & Risk Team. This month, we decided to interview an S&R...

    • For Security & Risk Professionals

      Report:An S&R Pro's Guide To Security To, In, And From The Cloud

      Embrace Cloud As Part Of The Shift To Business Technology

      As organizations rapidly adopt cloud-based infrastructure, platform, and application services, cloud security continues to be a major concern. Now, security and risk professionals need to provide a...

      • Downloads: 727
    • For Security & Risk Professionals

      Report:Predictions 2015: Security Budgets Will Increase, As Will Breach Costs, Fines, And Lawsuits

      Landscape: The S&R Practice Playbook

      There are still a few months left in 2014, but it's safe to say this was a pivotal year in security and risk (S&R). The news of high-profile breaches felt less like a steady dribble and more like a...

      • Downloads: 257
    • For Security & Risk Professionals

      Report:Define A Compelling Strategy To Secure And Protect Mobile Moments

      Strategic Plan: The Mobile Security Playbook

      Forrester designed this report to help security and risk (S&R) leaders develop comprehensive strategic mobile security plans to secure and protect both employees' and customers' mobile moments...

      • Downloads: 787
    • For Security & Risk Professionals

      Report:Brief: Insights For S&R Pros From IBM's CIO Leadership Exchange

      The Time Is Now For CISOs To Move From The Back Office To The Front Office

      On March 13, 2014, IBM hosted close to 200 CIOs from North America for a two-day event in Chicago. Discussion focused on the impact that big data, cloud, and new customer engagement models such as...

      • Downloads: 109
    • For Security & Risk Professionals

      Charts & Figures:Agility Metrics

    • For Security & Risk Professionals

      Report:Defend Your Data From Cyberthreats With A Zero Trust Network

      Executive Overview: The Security Architecture And Operations Playbook

      We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

      • Downloads: 816
    • For Security & Risk Professionals

      Report:Twelve Recommendations For Your Security Program In 2014

      Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

      Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

      • Downloads: 1002
    • For Security & Risk Professionals

      Blog:More Money, More Problems For Security Organizations In 2015

      If you’re a security and risk leader, it’s either the best of times or the worst of times. Today, it feels as if not a week goes by without yet another revelation of a large scale...

      • For Security & Risk Professionals

        Report:The Forrester Mobile Security Maturity Model

        The Forrester Mobile Security Maturity Model distills the recommended functions and components of a comprehensive program into a single framework. With a three-tiered hierarchy, it also offers a...

        • Downloads: 49
      • For Security & Risk Professionals

        Blog:If You Are CEO Of A Consumer Organization, You Have A New Job Responsibility -- Security

        On May 5, 2014, Target announced the resignation of its CEO, Gregg Steinhafel, in large part because of the massive and embarrassing customer data breach that occurred just before the 2013 U.S....

        • For Security & Risk Professionals

          Charts & Figures:Service Metrics

        • For Security & Risk Professionals

          Blog:Just When We Thought Santa Forgot To Put CISOs On His “Nice List,” Along Comes The Sony Breach

          Security pros got the Target breach for Christmas last year. The breach hit the retailer during its busiest time of the year and cost them millions in lost business. For security pros desperate for...

          • For Security & Risk Professionals

            Charts & Figures:The 12 Domains Of The Technology Management Balanced Scorecard

          • For Security & Risk Professionals

            Report:Top Security And Risk Priorities For The Business Technology Agenda

            Fail To Preserve Customer Trust And Watch Your Firm's Competitive Strengths And Revenue Disappear

            Digital businesses cannot succeed in today's competitive environment if they don't protect their customers from cybercriminals and fraudsters, safeguard their firm's intellectual property from...

            • Downloads: 50
          • For Security & Risk Professionals

            Report:Rules Of Engagement: A Call To Action To Automate Breach Response

            Processes: The Security Architecture And Operations Playbook

            It seems that not a day goes by that there isn't another massive security breach in the news. Consumers around the globe hear about continual threats to their personal data while name brand retailers...

            • Downloads: 160
          • For Security & Risk Professionals

            Blog:Analyst Spotlight Podcast With John Kindervag

            It's February: time for another S&R Analyst Spotlight Podcast! This month, Forrester VP, principal analyst, and Zero-Trust creator, John Kindervag, joins us. Listen in to learn more about John...

            • For Security & Risk Professionals

              Charts & Figures:Four Perspectives Of Forrester's Tech Management Balanced Scorecard

            • For Security & Risk Professionals

              Blog:Symantec No Longer Wants To Be The Company Where Good Software Goes To Live A Life Of Quiet Desperation

              Yesterday, Symantec announced that it too was ordering up a bowl of the organizational strategy du jour and splitting itself into two independent, publicly traded companies, one focusing on security...

              • For Security & Risk Professionals

                Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

                Landscape: The Security Architecture And Operations Playbook

                Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

                • Downloads: 804
              • For Security & Risk Professionals

                Report:Quick Take: Symantec Splits In Two

                Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete

                On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will market...

                • Downloads: 129
              • For Security & Risk Professionals

                Report:Industry Spotlight: US Healthcare Security Budgets, Priorities, And Challenges

                Healthcare Providers Must Move Beyond Compliance To Improve Security

                Historically, IT security teams within US healthcare providers have had much smaller budgets than counterparts in other industries. As a result, they have struggled to implement advanced security...

                • Downloads: 403
              • For Security & Risk Professionals

                Report:Quick Take: Cisco Acquires ThreatGrid, Bolstering Advanced Malware Protection

                Cisco Broadens A Strong Portfolio But Still Needs To Better Explain Its Overall Security Product Road Map

                On May 20, 2014, Cisco Systems announced its intention to acquire privately-held dynamic malware analysis company ThreatGrid for an undisclosed amount. This acquisition enhances Cisco Systems'...

                • Downloads: 92