Chris Rodriguez - Analyst Profile
Senior Industry Analyst
Information & Communication Technologies
Industry analyst experience, including primary research, consulting projects, video presentations, and speaking engagements at industry conferences and in webinars.
Experience working on special projects including:
-International expansion due diligence and go-to-market guidance for entering new regional markets
-Merger & Acquisition due diligence research including SWOT analysis, customer satisfaction review, new product/new market analysis and strategic guidance
-Identification of potential best channel partners followed by professional introductions
Experience base in the information and communication technologies (ICT) sector, leveraging long-standing relationships with Senior Executives working for leading industry participants in the areas of:
-Enterprise firewall, next generation firewall (NGFW) and unified threat management (UTM)
-Vulnerability management & vulnerability research
-Intrusion prevention systems (IPS)
-Network access control (NAC)
-Application security & patch management
What I bring to the Team
Experience helping Fortune 500 / Global 1000 clients with strategic market communication & education initiatives
Ability to communicate the business value of network security technologies to non-technical decision makers
Capacity to interact with and provide strategic business intelligence and guidance to C-Level executives
Worked directly with leading firms and organizations including:
Bachelor of Science in Computer Information Systems from University of the Incarnate Word, San Antonio, Texas
Recent items from Chris Rodriguez
Convergence Accelerates Market Maturity
An intrusion prevention system (IPS) provides valuable network protection capabilities. However, the IPS market faces growing competition from network security products that offer integrated IPS functionality such as next generation firewall (NGFW) and unified threat management (UTM). More and more businesses are choosing this integrated approach to network security. As a result, convergence is limiting the growth potential for pure-play IPS products. Vendors must solidify and implement decisive strategies for navigating this stage of the IPS market. --BEGIN PROMO--
|Published: Apr 20 2015||Market Research|
This SPIE examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
|Published: Mar 13 2015||Stratecast|
IT Mega Trends Drive Growth and Opportunities in IAM Market
Identity and access management (IAM) is the process of identification, authentication, authorization, and administration of digital users. IAM solutions are widely used by large businesses and enterprise organizations to manage thousands of user identities. However in recent years, information technology (IT) Mega Trends such as mass smartphone adoption and cloud services have changed how organizations manage identity and access requirements. Changing IT practices create demand for new IAM solutions and generate opportunities for growth by innovative companies.
|Published: Feb 05 2015||Market Research|
Prospects for a Crucial but Undervalued Security Technology
The Web Application Firewall (WAF) is an essential security tool for protecting Web applications and Web sites that are of ever-growing importance in today’s economy. The WAF market is primarily driven by regulatory requirements for WAF deployment and other mandatory steps to protect Web applications and end user data. However, the WAF market holds potential for significant growth as new threats and highly publicized data breaches drive interest in WAF and other Web application security practices. WAF vendors that understand and address the challenges facing this market can make significant progress in market penetration.
|Published: Oct 01 2014||Market Research|
|Published: Sep 01 2014||Best Practices|
This SPIE will analyze the value of bot detection in a security model; the perceived value of such features; the methods used to detect bots, and their respective effectiveness.
|Published: Aug 29 2014||Stratecast|
|Published: Jul 30 2014||Best Practices|
Rise of the DDoS Attack Spurs Demand for Comprehensive Solutions
Threat actors use DDoS attacks to block access to targeted websites for legitimate users. These attacks are becoming increasingly disruptive, frequent, and sophisticated. As a result, businesses require purpose-built solutions to detect and block the full array of DDoS attacks. Demand for DDoS mitigation solutions is growing, but the market faces a number of challenges going forward.
|Published: Jul 09 2014||Market Research|
This SPIE will explain the threats to information security posed by social media in business environments, followed by best practices to minimize risk.
|Published: Mar 14 2014||Stratecast|
Flexible Products Deliver Superior Protection and Customer Value
IT organizations today are challenged, more than ever, to secure valuable data and intellectual property from relentless hackers and threat actors. The network firewall is one important tool in a network security architecture. However, in recent years, firewalls have become ineffective against new hacking techniques. The advent of the unified threat management (UTM) and next generation firewall (NGFW) provide essential new functionality that represents an important next step in the market's evolution.
|Published: Mar 10 2014||Market Research|
It is entirely possible that the Black Hat Conference was set in Las Vegas simply as an ironic statement about the state of information security today. Everyone is gambling. For hackers, the buy-in cost to attack a massive number of websites through simple Web scripts, spam, and malware is minimal. But with a slightly larger investment of time an...
|29 Aug 2012||Blog post|
2011 ushered in a new breed of cyber threats that brought major organizations including Google, RSA, and Lockheed Martin to their knees and left many others searching for answers. These attacks were alarmingly sophisticated, effective, and elusive. Furthermore, the sophistication of these attacks indicates well organized crime syndicates and nation...
|30 Apr 2012||Blog post|
“Dude, you’re getting a SonicWALL!” On Tuesday, March 13, 2012, Dell announced its plan to acquire a leading vendor in the Unified Threat Management (UTM) market, SonicWALL. This will allow Dell to rapidly advance its security portfolio with the addition of next generation firewall, intrusion prevention (IPS) capabilities, SSL VPN, gateway anti-vi...
|13 Mar 2012||Blog post|
Bounty hunter. The term conjures up images of anti-heroes and rogues with awesome weapons and tactics in pursuit of the most dangerous criminals (or maybe just mullets). So it may be a surprise that the network security industry has its own version of these vigilantes for hire. Only, instead of searching out dangerous criminals, independent researc...
|03 Feb 2012||Blog post|
In recent years, the fiercely competitive UTM market has focused on increasing its penetration in the enterprise market. However, UTM has traditionally been considered a small business play due to limited performance and integration but compelling price points. After years of improvements and innovations, UTM vendors now offer enterprise-grade prod...
|17 Jan 2012||Blog post|