We are in the planning stages of a new Forrester Wave on automated malware analysis/sandboxes. As we prepare for this research, we are looking for research interview candidates to discuss your experiences with automated malware analysis solutions. Please note we are not seeking feedback from vendors at this time. We are focused on the buyers of these offerings. We would like to talk to you about:
The most useful features
The least useful features
The most significant challenges
Preferred deployment model (physical appliance, virtual appliance, cloud)
Most useful integrations (e.g. endpoint integrations that validate sandbox alerts)
You don't have to be a Forrester client either. If you are willing to participate in a confidential research interview, we will provide you a free copy of the research when it publishes. If you are interested in speaking with us please contact Kelley Mak (kmak at forrester dot com) and Josh Blackborow (jblackborow at forrester dot com)
AR and VR technologies aren't new. Virtual reality first experienced a boom of interest in the early 1990s, spurred by the 1991 book Virtual Reality by Howard Rheingold. In 1995, Angelina Jolie starred in the movie Hackers, which introduced mass audiences to head-mounted VR display technology. But the early promise of the technology fell apart due to underperforming graphics, attention-jarring lag times, outlandish hardware requirements, and the lack of an application ecosystem. No VR market emerged (outside of niche categories like military usage) until Facebook acquired the Kickstarter startup Oculus for $2 billion in March, 2014.
Unfortunately, few CX programs pay as much attention to emotional experience as they do to functional experience. That’s partly because few people understand emotions very well. Conventional wisdom says that emotions are too unpredictable to manage. We disagree. True, we can’t control customer emotions (nor should we). But we can understand and influence them in a way that makes everyone happy.
To help security pros plan their next decade of investments in data security, last year myself, John Kindervag, and Heidi Shey, researched and assessed 20 of the key technologies in this market using Forrester's TechRadar methodology. The resulting report, TechRadar™: Data Security, Q2 2014, became one of the team’s most read research for the year. However, it’s been a year since we finalized and published our research and it’s time for a fresh look.
One can argue that the entirety of the information security market - its solutions, services, and the profession itself - focuses on the security of data. While this is true, there are solutions that focus on securing the data itself or securing access to the data itself - regardless of where data is stored or transmitted or the user population that wants to use it. As S&R pros continue to pursue a shift from a perimeter and device-specific security approach to a more data- and identity-centric security approach, it’s worthwhile to hyper focus on the technology solutions that allow you to do just that....
Last year, we included the following 20 technologies in our research:
We all share this sentiment that we want to protect our resources — our planet for generations to come — so that our children and their children can live happily ever after. It’s that warm and fuzzy feeling we get when we see a little girl holding a flower in her hand. I realize that we all share this sentiment every time the press reacts with irate reports criticizing the extent of pollution in China — or when “Reduce, Reuse, Recycle” became part of pop culture with Jack Johnson’s song of the same name (sorry if you have that song playing in your head now). Protecting the environment is the right thing to do. But how many times have you used disposable dishes or cutlery when there were other options that were just less convenient? And why do you do that? It’s easy: Life gets in the way.
As a customer experience (CX) professional, you’ll have noticed the parallels by now. You regularly try to share insights from CX measurement or the voice of the customer (VoC) program with your colleagues across the organization to tell them what important customers think about their experiences with the company and what their pain points are. Using these insights is the right thing to do. But how many times have you met polite but superficial interest? And why is that? Life gets in the way. Your colleagues are busy, don’t know why to care, or have other priorities. It’s no wonder then that 72% of CX pros we asked in our recent survey on the state of CX maturity said that their organizations have only been somewhat or not effective at all in improving customer experience.
I looked at ways that CX pros have managed to rally their organizations around CX metrics and found 10 tactics that companies like Avaya, Elsevier, Hampton Inn & Suites, Sage Software North America, and Verizon have proven to work in the real world.
Over the past seven years, mobile banking has gone from little more than an extension of online banking to what one digital banking executive now calls “the most important part of my job.” eBusiness and channel strategy professionals at banks are under intense pressure to differentiate by offering mobile features, content, and experiences that meet — or exceed — customers’ needs and expectations.
To help executives and digital leaders better understand where mobile banking is today — and where different banking providers stand in terms of their mobile offerings — Forrester conducts an annual mobile banking benchmark. This year, we evaluated 41 different banks from more than a dozen different countries across four continents. We recently published the findings in our 2015 Global Mobile Banking Benchmark report.
Once a month I use my blog to highlight some of S&R’s most recent and trending research. This month I’m focusing on application security and asking for your help with some of our upcoming research into the security and privacy risks associated with Internet of Things (IoT). IoT is any technology that enables devices, objects, and infrastructure to interact with monitoring, analytics, and control systems over the Internet. The illustrious and debonair, Tyler Shields (@txs), will lead our research into IoT security, but as the risks become more and more concrete for various verticals, you can expect the entire team to engage in this research.
Take our IoT security survey and talk with our analysts! If you contribute to the emerging IoT market, please fill out this brief survey (http://forr.com/2015-IoT-Security-Survey). Participants will receive a complimentary copy of the completed research report and we'd be happy to interview anyone who would like to discuss IoT and security in detail. Be sure to reach out to Tyler (firstname.lastname@example.org) or Jennie Duong (email@example.com) if you’re interested.
Business intelligence has gone through multiple iterations in the past few decades. While BI's evolution has addressed some of the technology and process shortcomings of the earlier management information systems, BI teams still face challenges. Enterprises are transforming only 40% of their structured data and 31% of their unstructured data into information and insights. In addition, 63% of organizations still use spreadsheet-based applications for more than half of their decisions. Many earlier and current enterprise BI deployments:
Have hit the limits of scalability.
Struggle to address rapid changes in customer and regulatory requirements.
Fail to break through waterfall's design limitations.
Suffer from mismatched business and technology priorities and languages.
Another week, another divestiture in the content management and collaboration market. A new - or more accurately, a re-newed - player enters the Enterprise Content Management market this week as iManage and HP make an apparently amicable split. Executives with longstanding roots in the iManage and Interwoven businesses, including Neil Araujo and Dan Carmel, have executed a management buyout to spin a revitalized iManage business out of HP’s Software division. iManage's press
When I think about data, I can't help but think about hockey. As a passionate hockey mom, it's hard to separate my conversations about data all week with clients from the practices and games I sit through, screaming encouragement to my son and his team (sometimes to the embarrassment of my husband!). So when I recently saw a documentary on the building of the Russian hockey team that our miracle US hockey team beat at the 1980 Olympics, the story of Anatoli Tarsov stuck with me.
Before the 1960s, Russia didn't have a hockey team. Then the Communist party determined that it was critical that Russia build one — and compete on the world stage. They selected Anatoli Tarsov to build the team and coach. He couldn't see films on hockey. He couldn't watch teams play. There was no reference on how to play the game. And yet, he built a world-class hockey club that not only beat the great Nordic teams but went on to crush the Canadian teams that were the standard for hockey excellence.
This is a lesson for us all when it comes to data. Do we stick with our standards and recipes from Inmon and Kimball? Do we follow check-box assessments from CMMI, DM-BOK, or TOGAF's information architecture framework? Do we rely on governance compliance to police our data?
Or do we break the rules and create our own that are based on outcomes and results? This might be the scarier path. This might be the riskier path. But do you want data to be where your business needs it, or do you want to predefine, constrain, and bias the insight?