Chris Rodriguez - Analyst Profile
Senior Industry Analyst
Information & Communication Technologies
Industry analyst experience, including primary research, consulting projects, video presentations, and speaking engagements at industry conferences and in webinars.
Experience working on special projects including:
-International expansion due diligence and go-to-market guidance for entering new regional markets
-Merger & Acquisition due diligence research including SWOT analysis, customer satisfaction review, new product/new market analysis and strategic guidance
-Identification of potential best channel partners followed by professional introductions
Experience base in the information and communication technologies (ICT) sector, leveraging long-standing relationships with Senior Executives working for leading industry participants in the areas of:
-Enterprise firewall, next generation firewall (NGFW) and unified threat management (UTM)
-Vulnerability management & vulnerability research
-Intrusion prevention systems (IPS)
-Network access control (NAC)
-Application security & patch management
What I bring to the Team
Experience helping Fortune 500 / Global 1000 clients with strategic market communication & education initiatives
Ability to communicate the business value of network security technologies to non-technical decision makers
Capacity to interact with and provide strategic business intelligence and guidance to C-Level executives
Worked directly with leading firms and organizations including:
Bachelor of Science in Computer Information Systems from University of the Incarnate Word, San Antonio, Texas
Recent items from Chris Rodriguez
Prospects for a Crucial but Undervalued Security Technology
The Web Application Firewall (WAF) is an essential security tool for protecting Web applications and Web sites that are of ever-growing importance in today’s economy. The WAF market is primarily driven by regulatory requirements for WAF deployment and other mandatory steps to protect Web applications and end user data. However, the WAF market holds potential for significant growth as new threats and highly publicized data breaches drive interest in WAF and other Web application security practices. WAF vendors that understand and address the challenges facing this market can make significant progress in market penetration.
|Published: Oct 01 2014||Market Research|
|Published: Sep 01 2014||Best Practices|
This SPIE will analyze the value of bot detection in a security model; the perceived value of such features; the methods used to detect bots, and their respective effectiveness.
|Published: Aug 29 2014||Stratecast|
|Published: Jul 30 2014||Best Practices|
Rise of the DDoS Attack Spurs Demand for Comprehensive Solutions
Threat actors use DDoS attacks to block access to targeted websites for legitimate users. These attacks are becoming increasingly disruptive, frequent, and sophisticated. As a result, businesses require purpose-built solutions to detect and block the full array of DDoS attacks. Demand for DDoS mitigation solutions is growing, but the market faces a number of challenges going forward.
|Published: Jul 09 2014||Market Research|
This SPIE will explain the threats to information security posed by social media in business environments, followed by best practices to minimize risk.
|Published: Mar 14 2014||Stratecast|
Flexible Products Deliver Superior Protection and Customer Value
IT organizations today are challenged, more than ever, to secure valuable data and intellectual property from relentless hackers and threat actors. The network firewall is one important tool in a network security architecture. However, in recent years, firewalls have become ineffective against new hacking techniques. The advent of the unified threat management (UTM) and next generation firewall (NGFW) provide essential new functionality that represents an important next step in the market's evolution.
|Published: Mar 10 2014||Market Research|
Mass Smartphone Adoption Increases Risk and Drives Demand for Innovative Security Products
The mobile security challenge is complex and multi-faceted. Mobile devices can be infected by malicious software called malware, enabling hackers to gain access or control. Mobile applications (simply called “apps”) on the device can perform unwanted, high-risk actions. Sensitive data stored on the device can also be lost or stolen. This study focuses on mobile endpoint protection products designed to secure the device against malware, cyber attacks, high risk applications, and physical loss or theft.
|Published: Oct 31 2013||Market Research|
The Future of Intrusion Prevention System (IPS) in Peril - Can Next Generation Firewall Replace Network IPS?
In this insight, Frost & Sullivan examines the challenges facing the IPS market, and identifies potential opportunities for network IPS vendors in an increasingly security savvy and value conscious world.
|Published: Aug 07 2013||Stratecast|
A Growing Threat Landscape Fuels Vulnerability Research
The Frost & Sullivan analysis of the global public vulnerability research market in 2012 is part of a series of studies compiled from various public sources to analyze the vulnerability landscape from 2004 to the present. Vulnerability data is collected, queried, and segmented, resulting in a wealth of information that is intended to provide qualitative commentary on the research industry and to recognize the most prolific disclosers of new vulnerability reports. The top research companies are interviewed to provide industry and technology trends. Within this analysis, Frost & Sullivan has identified key market trends, competitive analysis, and growth opportunities to quantify and evaluate the vulnerability research market.
|Published: Jun 21 2013||Market Insights|
It is entirely possible that the Black Hat Conference was set in Las Vegas simply as an ironic statement about the state of information security today. Everyone is gambling. For hackers, the buy-in cost to attack a massive number of websites through simple Web scripts, spam, and malware is minimal. But with a slightly larger investment of time an...
|29 Aug 2012||Blog post|
2011 ushered in a new breed of cyber threats that brought major organizations including Google, RSA, and Lockheed Martin to their knees and left many others searching for answers. These attacks were alarmingly sophisticated, effective, and elusive. Furthermore, the sophistication of these attacks indicates well organized crime syndicates and nation...
|30 Apr 2012||Blog post|
“Dude, you’re getting a SonicWALL!” On Tuesday, March 13, 2012, Dell announced its plan to acquire a leading vendor in the Unified Threat Management (UTM) market, SonicWALL. This will allow Dell to rapidly advance its security portfolio with the addition of next generation firewall, intrusion prevention (IPS) capabilities, SSL VPN, gateway anti-vi...
|13 Mar 2012||Blog post|
Bounty hunter. The term conjures up images of anti-heroes and rogues with awesome weapons and tactics in pursuit of the most dangerous criminals (or maybe just mullets). So it may be a surprise that the network security industry has its own version of these vigilantes for hire. Only, instead of searching out dangerous criminals, independent researc...
|03 Feb 2012||Blog post|
In recent years, the fiercely competitive UTM market has focused on increasing its penetration in the enterprise market. However, UTM has traditionally been considered a small business play due to limited performance and integration but compelling price points. After years of improvements and innovations, UTM vendors now offer enterprise-grade prod...
|17 Jan 2012||Blog post|