Ted Schadler

Vice President, Principal Analyst serving Application Development & Delivery PROFESSIONALS

Ted serves Application Development & Delivery Professionals. He has 27 years of experience in the technology industry, focusing on the effects of disruptive technologies on people and on businesses. His current research agenda analyzes the expanding role of content and content delivery in a mobile-first, digital-always world, including the effects on web content management and digital experience delivery platforms.

Ted is the coauthor of The Mobile Mind Shift: Engineer Your Business to Win in the Mobile Moment (Groundswell Press, June 2014). Your customers now turn to their smartphones for everything. What's tomorrow's weather? Is the flight on time? Where's the nearest store, and is this product cheaper there? Whatever the question, the answer is on the phone. This Pavlovian response is the mobile mind shift — the expectation that I can get what I want, anytime, in my immediate context. Your new battleground for customers is this mobile moment — the instant in which your customer is seeking an answer. If you're there for them, they'll love you; if you're not, you'll lose their business. Both entrepreneurial companies like Dropbox and huge corporations like Nestlé are winning in that mobile moment. Are you?

Ted is also the coauthor of Empowered: Unleash Your Employees, Energize Your Customers, and Transform Your Business (Harvard Business Review Press, September 2010). Social, mobile, video, and cloud Internet services give consumers and business customers more information power than ever before. To win customer trust, companies must empower their employees to directly engage with customers using these same technologies.

Previous Work Experience

Previously, Ted analyzed the consumerization of IT and its impact on a mobile-first workforce, the future of file services in a mobile-first, cloud-enabled world, mobile collaboration tools, workforce technology adoption and use, and the rise of cognitive computing. In 2009, Ted launched Forrester's Workforce Technology Assessment, the industry's first benchmark survey of workforce technology adoption. This quantitative approach helps professionals and the teams they work with have a fact-based conversation about employees' technology adoption.

Prior to joining Forrester in April 1997, Ted was a cofounder of Phios, an MIT spinoff. Before that, Ted worked for eight years as CTO and director of engineering for a software company serving the healthcare industry. Early in his career, Ted was a singer and bass player for Crash Davenport, a successful Maryland-based rock-and-roll band.


Ted has a master's degree in management from the MIT Sloan School of Management. He also holds an M.S. in computer science from the University of Maryland and a B.A. with honors in physics from Swarthmore College.

Refine your results





Market Imperatives



34 results in Everything

  • John Kindervag
  • Past 12 months
  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 830
  • For Security & Risk Professionals

    Charts & Figures:Example Database Microcore And Perimeter

  • For Security & Risk Professionals

    Report:Quick Take: Cisco Acquires ThreatGrid, Bolstering Advanced Malware Protection

    Cisco Broadens A Strong Portfolio But Still Needs To Better Explain Its Overall Security Product Road Map

    On May 20, 2014, Cisco Systems announced its intention to acquire privately-held dynamic malware analysis company ThreatGrid for an undisclosed amount. This acquisition enhances Cisco Systems'...

    • Downloads: 95
  • For Security & Risk Professionals

    Report:Quick Take: Stem The "Heartbleed"

    How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs

    To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive information...

    • Downloads: 393
  • For Security & Risk Professionals

    Charts & Figures:Identify And Classify Your Toxic Data

  • For Technology Management Professionals

    Blog:If Dr. Seuss Could Comment Upon IoT, This Is What He Might Say...

    Things Run Amok by John Kindervag (To be read in the style of Dr. Seuss) We live in a world all interconnected But how in the world will it get all protected? Some bad boys and girls will try to...

    • For Security & Risk Professionals

      Charts & Figures:Example Microcore And Perimeter Integration With Security Analytics

    • For Security & Risk Professionals

      Report:Quick Take: The State Of Privacy In The Union

      President Obama Introduces Privacy Initiatives With High Merit But Low Potential

      United States President Barack Obama introduced several proposed privacy initiatives in his 2015 State of the Union address and in preview comments he made to the Federal Trade Commission (FTC) the...

      • Downloads: 70
    • For Security & Risk Professionals

      Report:Develop A Two-Phased DDoS Mitigation Strategy

      Protect Yourself From Hacktivists And Other Cybercriminals

      Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

      • Downloads: 587
    • For Security & Risk Professionals

      Report:Understand The Business Impact And Cost Of A Breach

      Business Case: The Security Architecture And Operations Playbook

      We are in the midst of a golden age of hacking. The information security threat landscape is changing rapidly, and security organizations are struggling to keep up with the changing nature,...

      • Downloads: 1284
    • For Security & Risk Professionals

      Report:Predictions 2015: Data Security And Privacy Are Competitive Differentiators

      Landscape: The Data Security And Privacy Playbook

      Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

      • Downloads: 412
    • For Security & Risk Professionals

      Charts & Figures:Centralized Key Management Adoption

    • For Security & Risk Professionals

      Report:Know Your Data To Create Actionable Policy

      Policy: The Data Security And Privacy Playbook

      Data defense is the fundamental purpose of information security. To defend your data, there are only four levers you can pull — controlling access, inspecting data usage patterns for abuse,...

      • Downloads: 791
    • For Security & Risk Professionals

      Charts & Figures:"Trusted" And "Untrusted" Interface Ports On Today's Security Appliances

    • For Security & Risk Professionals

      Report:TechRadar™: Zero Trust Network Threat Mitigation Technology, Q1 2015

      Road Map: The Security Architecture And Operations Playbook

      Not a week goes by without news of network attacks and stolen data. Consumers routinely undergo the stress of fraudulent charges or compromised credit cards. Digital businesses lose millions in...

      • Downloads: 276
    • For Security & Risk Professionals

      Charts & Figures:Network Storage And Database Encryption Adoption

    • For Security & Risk Professionals

      Report:The Future Of Data Security: A Zero Trust Approach

      Vision: The Data Security And Privacy Playbook

      Data is the lifeblood of today's digital businesses, and protecting it from theft, misuse, and abuse is the No. 1 responsibility of every S&R leader. Hacked customer data can erase millions in...

      • Downloads: 2509
    • For Security & Risk Professionals

      Report:Top 15 Trends S&R Pros Should Watch: 2014

      Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research projects...

      • Downloads: 672
    • For Security & Risk Professionals

      Charts & Figures:Example Data Flow Mapping

    • For Security & Risk Professionals

      Report:No More Chewy Centers: The Zero Trust Model Of Information Security

      Vision: The Security Architecture And Operations Playbook

      There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For a generation of security and risk (S&R) professionals,...

      • Downloads: 2356
    • For Security & Risk Professionals

      Report:Rethinking DLP: Introducing The Forrester DLP Maturity Grid

      Assessment Framework: The Data Security And Privacy Playbook

      Data loss prevention or protection (DLP) remains one of the hottest topics and most difficult challenges among S&R executives today. It's a key technology to help prevent the leakage and exfiltration...

      • Downloads: 1635
    • For Security & Risk Professionals

      Charts & Figures:Forrester's Targeted-Attack Hierarchy Of Needs

    • For Security & Risk Professionals

      Report:Protect Your Intellectual Property And Customer Data From Theft And Abuse

      Executive Overview: The Data Security And Privacy Playbook

      Data is the lifeblood of today's digital businesses, but for economic and even political gain, highly skilled cybercriminals and malicious insiders are determined to steal it. Meanwhile, customers...

      • Downloads: 974
    • For Security & Risk Professionals

      Report:Rethinking Data Discovery And Data Classification

      Strategic Plan: The Data Security And Privacy Playbook

      Defining data via data discovery and classification is an often overlooked, yet critical, component of data security and control. Security and risk (S&R) pros can't expect to adequately protect data...

      • Downloads: 719
    • For Security & Risk Professionals

      Charts & Figures:The Most Common Breach Vector Is From The Inside