Peter Sheldon

VP, Principal Analyst serving eBusiness & Channel Strategy PROFESSIONALS

Peter serves eBusiness & Channel Strategy Professionals. He focuses on eCommerce technologies and solutions, including B2C and B2B eCommerce platforms, mobile commerce solutions, digital in-store technologies, and digital commerce. Peter has specific expertise helping eBusiness leaders understand the integration challenges between eCommerce and back-office technologies across channels and touchpoints. His interests focus on mobile and tablet commerce trends, digital in-store experiences, multichannel retail, social commerce, and digital media.

Previous Work Experience

Peter has extensive experience working with an ecosystem of eCommerce technologies, including eCommerce platforms, mobile commerce solutions, content management, web analytics, search engine marketing (SEM), search engine optimization (SEO), digital asset management, payment systems, and social media, to name a few. Peter has more than 13 years of experience in eCommerce and web technologies. Most recently, Peter held both product management and product marketing positions at Elastic Path, a leading eCommerce platform vendor. He also worked as a senior business analyst at JP Morgan and Ford Motor Company, where he started his career in eCommerce developing a direct online channel for new vehicle sales in the UK. Peter's experience spans both business and technology, including business analysis, product management, product marketing, solution architecture, user experience, and online marketing.


Peter holds a BEng in manufacturing systems engineering from the University of Strathclyde in Scotland.

Refine your results

Date Range




Market Imperatives



107 results in Everything

  • Rick Holland
  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 830
  • For Security & Risk Professionals

    Charts & Figures:Forrester Wave™: Email Content Security, Q4 '12

    The Nine Providers That Matter Most And How They Stack Up

  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: Q2 2013

    From frantic security operations problems to the changing threat landscape, CISOs, senior security leaders, and other IT risk management leaders consistently have trouble keeping up with key trends...

    • Downloads: 933
  • For Security & Risk Professionals

    Charts & Figures:Build Your Circle Of Trust

  • For Security & Risk Professionals

    Report:Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

    • Downloads: 63
  • For Security & Risk Professionals

    Report:Quick Take: Cisco Acquires Neohapsis

    Deal Will Expand Cisco's Capabilities In Application, Cloud, And Mobile Security

    Cisco Systems announced this week its intent to acquire closely held Chicago-based Neohapsis, a decision that will substantially broaden Cisco's consulting capabilities. Most notably, the acquisition...

    • Downloads: 39
  • For Security & Risk Professionals

    Report:Quick Take: Bit9 And Carbon Black Merge

    Bit9 With Carbon Credits Is An Impressive Endpoint Security Play

    On February 13, 2014, Bit9 announced that it had merged with endpoint incident response startup Carbon Black, for an undisclosed amount. Bit9 also announced that it had raised $38.25 million to fuel...

    • Downloads: 108
  • For Security & Risk Professionals

    Blog:Hackers Vs. Executives Is Back

    Our next installment of "Hackers vs. Executives" is just weeks away.  Join us at the Forrester Security Forum and sit in on one of the most popular sessions of the event each year. We have a...

    • For Security & Risk Professionals

      Report:Brief: S&R Pros Remain Unprepared To Address Virtualization And Cloud Security Risks

      S&R Pros Must Accelerate Their Knowledge, Skills, And Approach To Avoid Failure

      For years, infrastructure and operations (I&O) leaders have embraced virtualization as a means to achieve consolidation and cost savings. Today, virtualization offers more than just cost savings: It...

      • Downloads: 255
    • For Security & Risk Professionals

      Blog:Shoulder Surfing The Friendly Skies

      FAIL at 30,000ish feet  When you fly nearly every week, you can get pretty bored on a plane.  When I am sick of working, playing games, or watching movies, my latest distraction is checking...

      • For Security & Risk Professionals

        Report:Quick Take: IBM Buys Trusteer And, With It, Better, More-Intelligent Data-Centric Security

        Prospects Are Good For This Acquisition, Which Matches Complementary Strengths

        On August 15, 2013, IBM announced its acquisition, for an undisclosed sum, of Trusteer, a fraud protection and cybersecurity firm focused primarily on providing services to banking customers. With...

        • Downloads: 194
      • For Security & Risk Professionals

        Blog:Observations From Black Hat - More Defense Please

        Last week I had the opportunity to attend the 15th annual Black Hat security conference in Las Vegas. I have attended DEFCON in the past, but never Black Hat. The conference has grown significantly...

        • For Security & Risk Professionals

          Report:Quick Take: Symantec Splits In Two

          Splitting Is Symantec's Best Opportunity To Refocus, Innovate, And Compete

          On October 9, 2014, Symantec announced that it will separate into two independent, publicly traded companies. Recently appointed CEO, Michael Brown, will stay on as CEO of Symantec, which will market...

          • Downloads: 133
        • For Security & Risk Professionals

          Charts & Figures:DHS STIX Threat Actor Profile

        • For Security & Risk Professionals

          Report:Five Steps To Build An Effective Threat Intelligence Capability

          Against today's mutating threat landscape and sophisticated cybercriminals, security and risk (S&R) professionals are outgunned and outmatched. The traditional strategy of waiting for an alert and...

          • Downloads: 1052
        • For Security & Risk Professionals

          Blog:Are You Down With CIP (Critical Infrastructure Protection)?

          I am kicking off a new research series on critical infrastructure protection.  This first report is titled: “Brief: S&R Pros Can No Longer Ignore Threats To Critical Infrastructure.”...

          • For Security & Risk Professionals

            Report:Quick Take: Cisco Acquires ThreatGrid, Bolstering Advanced Malware Protection

            Cisco Broadens A Strong Portfolio But Still Needs To Better Explain Its Overall Security Product Road Map

            On May 20, 2014, Cisco Systems announced its intention to acquire privately-held dynamic malware analysis company ThreatGrid for an undisclosed amount. This acquisition enhances Cisco Systems'...

            • Downloads: 95
          • For Security & Risk Professionals

            Report:The Forrester Wave™: Email Content Security, Q4 2012

            The Nine Providers That Matter Most And How They Stack Up

            In Forrester's 47-criteria evaluation of email content security vendors, we identified the nine most significant vendors in the category and researched, analyzed, and scored them: Barracuda Networks,...

            • Downloads: 789
          • For Security & Risk Professionals

            Charts & Figures:Targeted Attacks

          • For Security & Risk Professionals

            Charts & Figures:Threat Intelligence Capabilities Adoption Is Low

            Tools And Technology: The Security Architecture And Operations Playbook

          • For Security & Risk Professionals

            Report:Job Description: Security Architect

            Organization: The Security Architecture And Operations Playbook

            We designed this report for security and risk (S&R) executives who are rethinking their security architecture and working to improve the effectiveness of their operations, to help them hire one of...

            • Downloads: 908
          • For Security & Risk Professionals

            Charts & Figures:Example Vendors With OT-Specific Security Solutions

          • For Security & Risk Professionals

            Charts & Figures:: Firms Increasingly Prefer Software-As-A-Service For Email Security Management

            The Nine Providers That Matter Most And How They Stack Up

          • For Security & Risk Professionals

            Blog:Avoid The Information Security Squirrel

            "My master made me this collar. He is a good and smart master and he made me this collar so that I may speak. Squirrel!"   In the Pixar film Up, squirrels frequently distract Dug the talking...

            • For Security & Risk Professionals

              Charts & Figures:Acting On Intelligence Overwhelms Analysts