Chris Rodriguez - Analyst Profile
Senior Industry Analyst
Information & Communication Technologies
Industry analyst experience, including primary research, consulting projects, video presentations, and speaking engagements at industry conferences and in webinars.
Experience working on special projects including:
-International expansion due diligence and go-to-market guidance for entering new regional markets
-Merger & Acquisition due diligence research including SWOT analysis, customer satisfaction review, new product/new market analysis and strategic guidance
-Identification of potential best channel partners followed by professional introductions
Experience base in the information and communication technologies (ICT) sector, leveraging long-standing relationships with Senior Executives working for leading industry participants in the areas of:
-Enterprise firewall, next generation firewall (NGFW) and unified threat management (UTM)
-Vulnerability management & vulnerability research
-Intrusion prevention systems (IPS)
-Network access control (NAC)
-Application security & patch management
What I bring to the Team
Experience helping Fortune 500 / Global 1000 clients with strategic market communication & education initiatives
Ability to communicate the business value of network security technologies to non-technical decision makers
Capacity to interact with and provide strategic business intelligence and guidance to C-Level executives
Worked directly with leading firms and organizations including:
Bachelor of Science in Computer Information Systems from University of the Incarnate Word, San Antonio, Texas
Recent items from Chris Rodriguez
This SPIE will explain the threats to information security posed by social media in business environments, followed by best practices to minimize risk.
|Published: Mar 14 2014||Stratecast|
Flexible Products Deliver Superior Protection and Customer Value
IT organizations today are challenged, more than ever, to secure valuable data and intellectual property from relentless hackers and threat actors. The network firewall is one important tool in a network security architecture. However, in recent years, firewalls have become ineffective against new hacking techniques. The advent of the unified threat management (UTM) and next generation firewall (NGFW) provide essential new functionality that represents an important next step in the market's evolution.
|Published: Mar 10 2014||Market Research|
Mass Smartphone Adoption Increases Risk and Drives Demand for Innovative Security Products
The mobile security challenge is complex and multi-faceted. Mobile devices can be infected by malicious software called malware, enabling hackers to gain access or control. Mobile applications (simply called “apps”) on the device can perform unwanted, high-risk actions. Sensitive data stored on the device can also be lost or stolen. This study focuses on mobile endpoint protection products designed to secure the device against malware, cyber attacks, high risk applications, and physical loss or theft.
|Published: Oct 31 2013||Market Research|
The Future of Intrusion Prevention System (IPS) in Peril - Can Next Generation Firewall Replace Network IPS?
In this insight, Frost & Sullivan examines the challenges facing the IPS market, and identifies potential opportunities for network IPS vendors in an increasingly security savvy and value conscious world.
|Published: Aug 07 2013||Stratecast|
A Growing Threat Landscape Fuels Vulnerability Research
The Frost & Sullivan analysis of the global public vulnerability research market in 2012 is part of a series of studies compiled from various public sources to analyze the vulnerability landscape from 2004 to the present. Vulnerability data is collected, queried, and segmented, resulting in a wealth of information that is intended to provide qualitative commentary on the research industry and to recognize the most prolific disclosers of new vulnerability reports. The top research companies are interviewed to provide industry and technology trends. Within this analysis, Frost & Sullivan has identified key market trends, competitive analysis, and growth opportunities to quantify and evaluate the vulnerability research market.
|Published: Jun 21 2013||Market Insights|
Enterprise Bring-Your-Own-Device Strategies Stimulate NAC Adoption
The NAC market is emerging from a period of customer disillusionment that has limited growth and forced many vendors out of the market. However, the market is poised for significant market growth resulting from strong customer interest in bring-your-own-device (BYOD) security practices. NAC offers unique functionality that represents compelling value to enterprise organizations seeking to enable guest and employee mobility and connectivity. The shift in the NAC value proposition indicates promising potential for market growth in coming years, for competitors that understand the lessons taught by the shortcomings of previous generation NAC products.
|Published: Jun 05 2013||Market Research|
Advanced Features Combat the Next Generation of Network Threats
The network intrusion prevention system is an indispensable component in an enterprise security architecture. While legacy IPS functionality does protect against the majority of cyber threats, vendors are challenged to adapt to emerging threats. Next generation IPS (NGIPS) has the protection features, flexibility, and scalability to empower enterprise customers to defend their networks and data from the most stealthy and sophisticated cyber attacks. Consequently, NGIPS features will elevate IPS market sales.
|Published: Feb 14 2013||Market Research|
Enterprise Features and Product Value Propel Market Growth
Organizations in every industry are challenged to secure their network systems and data. UTM products consolidate multiple security technologies such as next generation firewall, intrusion prevention, anti-virus, anti-spyware, anti-spam, and content filtering into a single network device. This converged product provides businesses with lower total cost of ownership compared to the large investment required to deploy multiple point products from specialized vendors. This also provides centralized management and deeper integration between complementary security technologies. UTM vendors are challenged to remain innovative as customers seek to adopt new technologies such as cloud computing, virtualization, and mobile devices.
|Published: Nov 28 2012||Market Research|
Next-generation Technologies Protect Businesses from Advanced Threats
This research service delivers insight into the enterprise firewall market, which provides products that block, allow, or optimize network traffic based on policy definitions. This global and regional market analysis includes forecasts for 2012 to 2016. Valuable information provided includes the market’s technology and pricing trends and its key drivers and restraints. Further detailed is market information regarding key competitors, leading industries, and main distribution channels. This research service also includes analysis and comparison of product features and values. The combined information reveals the market’s key growth opportunities.
|Published: Sep 24 2012||Market Research|
It is entirely possible that the Black Hat Conference was set in Las Vegas simply as an ironic statement about the state of information security today. Everyone is gambling. For hackers, the buy-in cost to attack a massive number of websites through simple Web scripts, spam, and malware is minimal. But with a slightly larger investment of time an...
|29 Aug 2012||Blog post|
Innovative products and imminent threats cause surge in vendor growth
This research service provides insight into the vulnerability management market, which provides products that scan enterprise network infrastructure and identify and prioritize critical security issues so customers can address them. This global and regional market analysis includes forecasts for 2012-2016. Valuable information provided includes the market’s technology and pricing trends and its key drivers and restraints. Further detailed is market information regarding key competitors, leading industries, and main distribution channels. The combined information reveals the market’s key growth opportunities.
|Published: May 09 2012||Market Research|
2011 ushered in a new breed of cyber threats that brought major organizations including Google, RSA, and Lockheed Martin to their knees and left many others searching for answers. These attacks were alarmingly sophisticated, effective, and elusive. Furthermore, the sophistication of these attacks indicates well organized crime syndicates and nation...
|30 Apr 2012||Blog post|
“Dude, you’re getting a SonicWALL!” On Tuesday, March 13, 2012, Dell announced its plan to acquire a leading vendor in the Unified Threat Management (UTM) market, SonicWALL. This will allow Dell to rapidly advance its security portfolio with the addition of next generation firewall, intrusion prevention (IPS) capabilities, SSL VPN, gateway anti-vi...
|13 Mar 2012||Blog post|
Bounty hunter. The term conjures up images of anti-heroes and rogues with awesome weapons and tactics in pursuit of the most dangerous criminals (or maybe just mullets). So it may be a surprise that the network security industry has its own version of these vigilantes for hire. Only, instead of searching out dangerous criminals, independent researc...
|03 Feb 2012||Blog post|
In recent years, the fiercely competitive UTM market has focused on increasing its penetration in the enterprise market. However, UTM has traditionally been considered a small business play due to limited performance and integration but compelling price points. After years of improvements and innovations, UTM vendors now offer enterprise-grade prod...
|17 Jan 2012||Blog post|