Gartner Expert

Chris Silva

VP Analyst

Chris Silva is a Vice President, Analyst supporting Gartner clients with workspace security strategy as part of the Infrastructure Security research cohort.

Chris's background in advisory, consulting and IT support offer a unique perspective to support Gartner's clients. Chris's research and advisory work supports end-user organizations optimizing technology investments and architectures, while helping technology vendors tune products to current market needs. Chris also supports investors with insights on market trends and predictions.

Outside of work, Chris can often be found cycling, hiking or paddling in and around New England.

Previous experience

Chris has dedicated his career to providing trusted advice on IT strategy for end users and market and product strategy for IT vendors. His experience spans network infrastructure, IT Operations and endpoint security topics.

Chris has interwoven his analyst work with experience in market sizing and forecasting for private equity clients, product strategy for financial services clients, IT support and product marketing roles throughout his career.

His professional background includes work in scoping and managing complex, research-backed consulting engagements, conducting primary research to inform strategic private equity investments and running marketing and PR functions for a boutique analyst firm focused on SaaS software.

Professional background

Altimeter Group

Senior Analyst

The Institute for Applied Network Security

Senior Vice President, Research and Service Delivery

Forrester Research

Senior Analyst

Areas of coverage

Digital Workplace Infrastructure and IT Operations

Security of Applications and Data

Infrastructure Security

Education

B.S., Marketing, Isenberg School of Management, University of Massachusetts at Amherst

Read More Read Less

Top Issues That I Help Clients Address

1Endpoint protection platforms (EPP) Endpoint Detection and Response (EDR)

2Endpoint security strategy to defend against ransomware

3Bring Your Own Device (BYOD) Protections and Policies

4Mobile Threat Defense (MTD)

5Mobile device security and management (UEM, Mobile Device Management, MDM)