John Kindervag

Vice President, Principal Analyst serving Security & Risk PROFESSIONALS

John serves Security & Risk Professionals. He is a leading expert on wireless security, network security, security information management, and PCI data security.

Previous Work Experience

John is a 25-year veteran of the high-tech world. He holds numerous industry certifications, including CISSP, CEH, QSA, and CCNA. Prior to joining Forrester, John was the senior security architect with security consultancy Vigilar, and he started the security practice for a Cisco Gold VAR, Flair Data Systems, where he was a principal security consultant. He has particular expertise in the areas of wireless security, intrusion detection and prevention, and voice over IP hacking. He has been interviewed and published in numerous magazines, including Hospitality Technology Magazine, SecurityFocus.com, and Techtarget.com. John has spoken at many security conferences and events, including ToorCon, ShmoCon, and InfoSec World.

Education

John has a Bachelor of Arts degree in communications from the University of Iowa.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

11 results in Reports

  • John Kindervag
  • Tech Sector Economics
  • For CIO Professionals

    Report:Predictions For 2014: Cloud Computing

    Cloud Formally Joins The IT Portfolio — Whether IT Likes It Or Not

    As we head into 2014, cloud computing is no longer a "future" but a "now." Investments are up, enterprise use is widespread, and the hybrid cloud model has arrived. While the bulk of cloud...

    • Downloads: 1506
  • For Security & Risk Professionals

    Report:Rethinking DLP: Introducing The Forrester DLP Maturity Grid

    Assessment Framework: The Data Security And Privacy Playbook

    Data loss prevention or protection (DLP) remains one of the hottest topics and most difficult challenges among S&R executives today. It's a key technology to help prevent the leakage and exfiltration...

    • Downloads: 1592
  • For Security & Risk Professionals

    Report:Kill Your Data To Protect It From Cybercriminals

    As cybercriminals have become more skillful and sophisticated, they have eroded the effectiveness of our traditional perimeter-based security controls. The constantly mutating threat landscape...

    • Downloads: 1166
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1002
  • For Security & Risk Professionals

    Report:Market Overview: Intrusion Prevention Systems, Q2 2011

    A Mature Space, IPS Is Still The Bulwark Of Network Security

    An intrusion prevention system (IPS) complements traditional firewalls by inspecting the entire network packet looking for malicious traffic that is often invisible to Layer 3 firewalls. While...

    • Downloads: 1053
  • For Security & Risk Professionals

    Report:TechRadar™: Data Security, Q2 2014

    Road Map: The Data Security And Privacy Playbook

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming a...

    • Downloads: 703
  • For Security & Risk Professionals

    Report:Rethinking Data Discovery And Data Classification

    Strategic Plan: The Data Security And Privacy Playbook

    Defining data via data discovery and classification is an often overlooked, yet critical, component of data security and control. Security and risk (S&R) pros can't expect to adequately protect data...

    • Downloads: 695
  • For Security & Risk Professionals

    Report:Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

    • Downloads: 577
  • For Security & Risk Professionals

    Report:Dissect Data To Gain Actionable INTEL

    Forrester's Data Security And Control Framework

    Forrester segments the problem of securing and controlling data into three areas: 1) defining the data; 2) dissecting and analyzing the data; and 3) defending and protecting the data. We refer to...

    • Downloads: 430
  • For Security & Risk Professionals

    Report:Quick Take: Cisco's Acquisition Of Sourcefire Has Significant Potential

    But Only If Cisco Doesn't Strangle Innovation

    On July 23, 2013, Cisco announced its acquisition of network security specialist Sourcefire for $2.7 billion. With the acquisition of Sourcefire, Cisco confirms that customers do in fact want...

    • Downloads: 231
  • For Security & Risk Professionals

    Report:Quick Take: FireEye Acquires Mandiant

    FireEye Emerging As A Leader In A New Breed Of Security Companies

    On January 2, 2014, FireEye announced its acquisition of incident response and forensics specialist Mandiant for nearly $900 million in stock and $100 million in cash. With this acquisition, FireEye...

    • Downloads: 196