CIO Update: The Gartner Firewall Magic Quadrant for 2H02

Size: px
Start display at page:

Download "CIO Update: The Gartner Firewall Magic Quadrant for 2H02"

Transcription

1 IGG R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market is evolving. Firewalls and intrusion prevention are converging, while security platforms are emerging. Two firewall vendors have left the market. As hacking attacks and cybercrime incidents continue to soar, enterprise security issues have come to the forefront on many CIOs agendas. In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market is evolving. Firewalls and intrusion prevention are converging, while security platforms are emerging. Two firewall vendors have left the market. The Role of a Firewall A firewall is placed at the gateway (or node) at which a secure network, such as the enterprise s internal network, and an insecure network, such as the Internet, meet. As a general rule, all network traffic, inbound and outbound, flows through the firewall, which screens all incoming traffic, and blocks any traffic that does not meet the restrictions of the enterprise s security policy. Simply, the role of the firewall is to restrict incoming traffic from the Internet into an enterprise s internal network according to certain parameters. Once a firewall is configured, it filters network traffic, examining packet headings, determining which packets should be forwarded or allowed to enter and which should be stopped. The challenge for firewalls is that it is fairly easy to monitor the initial connection from client to server, but it is more difficult to monitor the return connection. Firewall Market Dynamics Firewalls are the core of an enterprise s defense against cyberattacks. Gartner expects the firewall to remain the main ingredient to perimeter defense, and it will also contribute to hardening the inside network via enterprisewide firewall deployment to provide more granular control over who is allowed to view what is on the network. The firewall industry in 2002 continues to evolve and expand. A concomitant evolution of security threats and e-business deployments has continued to challenge firewall vendors, two of which have left the market: Secure Computing acquired Network Associates Gauntlet. Gartner Entire contents 2002 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 WatchGuard acquired RapidStream, an application-specific integrated circuitbased appliance that runs Check Point Software FireWall-1. Security Platforms Many vendors have introduced what Gartner calls security platforms. Security platforms have a carrier-class chassis, including the following: High-speed back planes Redundant power supplies On-board load balancing and high availability Multiple blades (essentially separate card-mounted servers) that can run best-of-breed security products Security platforms initially were targeted at carriers and Internet service providers (ISPs) to enable those providers to offer security services besides raw connectivity. Security platforms are being deployed in the enterprise data center, where they can separate multiple network segments that run gigabit backbones. The Firewall Magic Quadrant Many firewall vendors continue to expand their product lines to address a broad range of needs, from small office/home office to enterprise gateway. For example, a network interface card-based firewall from 3Com is powered by Secure Computing s Sidewinder. Managing that firewall from a single console is a key requirement for placement on the Completeness of Vision axis of the Gartner Firewall Magic Quadrant for 2H02 (see Figure 6). Figure 6 Firewall Magic Quadrant for 2H02

3 Challengers Leaders Microsoft Symantec Cisco Systems Check Point Software Ability to Execute Stonesoft Whale Communications CyberGuard NetScreen SonicWALL Secure Computing WatchGuard Source: Gartner Research Leaders BorderWare Niche Players Completeness of Vision As of August 2002 Visionaries Check Point Software is the market leader. Lacking an appliance product of its own, Check Point continues to expand the number of independent vendors whose hardware platforms support FireWall-1. FireWall-1 is the best-of-breed solution that runs on security platforms from Crossbeam Systems, Nortel Networks and Cosine Communications. Check Point s challenge is to continue to enhance its customer relationships and reputation for customer service, while facing pricing pressure from Cisco Systems and NetScreen. Cisco Systems has continued to broaden its line of PIX Firewall appliances with the introduction of two midrange boxes (the PIX 515E and 506E). Because of its competitive position in the carrier space, Cisco will have to stress its dominant position in the network backbone to compete with new security platform offerings from competitors. NetScreen has moved into the Leaders Quadrant. Some of the factors that contribute to NetScreen s positioning include a successful initial public offering and continued product enhancements, such as the introduction of a multigigabit NetScreen 5000 system with high port density and virtual LAN capabilities, which will make NetScreen a player in the enterprise data

4 center. NetScreen s acquisition of OneSecure demonstrates a vision that includes higher-level packet inspection and the application of more granular security rules at the gateway. Challengers Symantec is the largest and most successful security software vendor. However, it is burdened with a legacy firewall technology from its acquisition of Axent, which, although popular with its installed base, does not enjoy much market share. An array of firewall products includes Raptor Software, which runs on a general-purpose server (Solaris, Windows NT and HP-UX), the Velociraptor appliance, and a family of new, all-in-one security appliances that perform antivirus, intrusion detection and firewall functions. Gartner believes that the all-in-one appliance will perform well in the small and midsize business (SMB) area because it is from a trusted antivirus brand. Customer confusion regarding the rest of the product lineup makes it difficult for enterprises to work Symantec s firewalls into their security strategies. Microsoft offers the Internet Security Accelerator (ISA) Server, which has been in the market for more than a year. It still is viewed as the follow-on product to replace Microsoft Proxy Server. ISA Server, because it is a software-only product that runs on a single platform (Windows 2000), will not address all of an enterprise s needs for low cost, low maintenance, high availability and reliability that can be delivered on an appliance platform. Visionaries Secure Computing purchased Gauntlet from Network Associates, which Gartner previously dropped from the Magic Quadrant because it had lost traction in the market. Secure s flagship firewall, Sidewinder, had been a direct competitor to Gauntlet as well as Symantec s Raptor in the application proxy arena. The expansion of Secure s customer base by 3,000, and a well-executed product integration of the best qualities of Gauntlet and Sidewinder, could provide a long-term solution for enterprise buyers that want application proxy technologies. SonicWALL continues to introduce firewall appliances with good performance and easy manageability. However, it is struggling to gain market share. WatchGuard, while pioneering the brick firewall appliance market, has lost ground because of NetScreen s and SonicWALL s better remote management and broader product lineups. The acquisition of a Check Point FireWall-1 appliance company (RapidStream) gives WatchGuard an improved team of developers. WatchGuard s challenge is to avoid confusion in the channel, which it faces by selling both a Check Point-enabled appliance and its own technology. Niche Players Stonesoft is attempting to support a software-only firewall, StoneGate. StoneGate is a software firewall running on several platforms, with built-in solutions for clustering, load balancing, high availability and even balancing across multiple ISPs. For stand-alone e-business initiatives that require an always-on configuration and the flexibility of a full-fledged operating system, StoneGate offers a viable solution. The challenge is for this small company from Finland to be heard amid other activity in the firewall space.

5 CyberGuard has begun to push outside its mainline customer base of government into the SMB space. CyberGuard was one of the first firewalls to attain Common Criteria EAL4 (Evaluation Assurance Level 4) certification, and it has set the pace in certifications for other vendors. Whale Communications has succeeded in productizing its e-gap technology to offer applicationspecific firewalling capability. e-gap Webmail protects Web mail applications from layer-7 attacks. BorderWare offers the Firewall Server, which also has EAL4 certification. BorderWare s bundling of secure mail, FTP and Domain Name System servers provides SMBs with an all-in-one solution. Network-Based Vendors The security platforms that are garnering the most market attention are from Cosine, Crossbeam and Nortel. TippingPoint, ipolicy Networks, OmniCluster and BladeFusion have also introduced security platforms since Gartner believes that platforms able to run best-of-breed security applications are most likely to succeed. Bottom Line Because firewalls are key components of effective e-business, more demands are being placed on them. High availability, application defense, throughput and manageability are the key factors for successful enterprise firewalls. Enterprises should pick firewall platforms based on the firewall s ability to address these factors. By 1Q04, more than 50 percent of Fortune 1000 enterprises will have distributed firewalls internally (0.8 probability). Written by Edward Younker, Research Products Analytical source: Richard Stiennon, Gartner Research For related Inside Gartner articles, see: Management Update: Network Security Predictions for 2002, 13 February 2002 Management Update: Information Security Policies Are Critical, 6 February 2002

Firewall Market Trends

Firewall Market Trends Markets, R. Stiennon Research Note 19 June 2003 Magic Quadrant for Enterprise Firewalls, 1H03 Deep packet inspection technology is driving the firewall market to an inflection point that is characterized

More information

What Are Network Security Platforms?

What Are Network Security Platforms? Markets, J. Pescatore, M. Easley, R. Stiennon Research Note 7 November 2002 Network Security Platforms Will Transform Security Markets An integrated network security platform approach will increase network

More information

CIO Update: Enterprise Security Moves Toward Intrusion Prevention

CIO Update: Enterprise Security Moves Toward Intrusion Prevention IGG-06042003-03 J. Pescatore, R. Stiennon Article 4 June 2003 CIO Update: Enterprise Security Moves Toward Intrusion Prevention As targeted hacker attacks increase, intrusion prevention is gaining importance

More information

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

Hierarchy of Needs for Content Networking

Hierarchy of Needs for Content Networking Technology, M. Fabbi Research Note 28 October 2002 Hierarchy of Needs for Content Networking Enterprises should understand the hierarchy of needs for content networking, which is illustrated by examining

More information

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM 1 of 5 10/11/2010 9:44 AM 27 April 2010 Mark Fabbi Gartner RAS Core Research Note G00200313 With the completion of the 3Com acquisition, HP will become a formidable competitor across the entire enterprise

More information

How to build a Carrier-Grade Defense-Shield. Dr. Antonio Nucci Chief Technology Officer, Narus Inc.

How to build a Carrier-Grade Defense-Shield. Dr. Antonio Nucci Chief Technology Officer, Narus Inc. How to build a Carrier-Grade Defense-Shield Dr. Antonio Nucci Chief Technology Officer, Narus Inc. Agenda Security Market Landscape Approach to Efficiently and Shortly Detect DDoS/Worms 2 Take a walk on

More information

Magic Quadrant for Application Platform Suites, 2Q03

Magic Quadrant for Application Platform Suites, 2Q03 Markets, Y. Natis, M. Pezzini, G. Phifer, C. Haight, M. Driver Research Note 5 May 2003 Magic Quadrant for Application Platform Suites, 2Q03 Application platform suites are incrementally assembled or bought

More information

Magic Quadrant for Corporate Telephony in EMEA, 2003

Magic Quadrant for Corporate Telephony in EMEA, 2003 Markets, S. Blood, C. Lock Research Note 2 September 2003 Magic Quadrant for Corporate Telephony in EMEA, 2003 Cisco and Alcatel continue to offer the market's most comprehensive corporate propositions.

More information

Vendor Classification

Vendor Classification Markets, L. Geishecker, F. Buytendijk Research Note 2 October 2002 Introducing the CPM Suites Magic Quadrant Vendors are developing a wide range of new functionality for corporate performance management.

More information

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite

More information

Your Security Partner of Choice

Your Security Partner of Choice Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide

More information

SSL VPN 1H03 Magic Quadrant Evaluation Criteria

SSL VPN 1H03 Magic Quadrant Evaluation Criteria Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and

More information

Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant

Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant IGG-02192003-03 R. Matlus Article 19 February 2003 Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant The North American help desk outsourcing market is growing despite a down economy.

More information

Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant.

Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant. Markets, M. Halpern Research Note 18 March 2003 Defining the PLM Magic Quadrant by Criteria and Use We provide the methodology used in developing our product life cycle management Magic Quadrant. Core

More information

Virtualized Security: The Next Generation of Consolidation

Virtualized Security: The Next Generation of Consolidation Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the

More information

NGFWs will be most effective when working in conjunction with other layers of security controls.

NGFWs will be most effective when working in conjunction with other layers of security controls. Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such

More information

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are

More information

2003 Desktop Software Distribution Magic Quadrant

2003 Desktop Software Distribution Magic Quadrant Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic

More information

First North American Magic Quadrant: CRM Suites for SMBs

First North American Magic Quadrant: CRM Suites for SMBs Markets, J. Outlaw Research Note 6 February 2002 First North American Magic Quadrant: CRM Suites for SMBs Customer relationship management application suites have become the most-popular form of CRM technology

More information

CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02

CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 IGG-01152003-02 J. Pescatore, R. Wagner Article 15 January 2003 CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 CIOs and many other executives are interested in insights on how

More information

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance

More information

The Magic Quadrant Framework

The Magic Quadrant Framework Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship

More information

SSL VPN 1H03 Magic Quadrant

SSL VPN 1H03 Magic Quadrant Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant The emerging Secure Sockets Layer virtual private network market is standards-based, with good short-term return on investment

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow

CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow IGG-03192003-03 D. Vecchio Article 19 March 2003 CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow The conversion of aging applications to more modern architectures

More information

Firewall and VPN Top Level Selected Products: Directory & Buyer's Guide

Firewall and VPN Top Level Selected Products: Directory & Buyer's Guide Brochure More information from http://www.researchandmarkets.com/reports/45717/ Firewall and VPN Top Level Selected Products: Directory & Buyer's Guide Description: Firewalls are an integral part of any

More information

SAN Management Software Magic Quadrant

SAN Management Software Magic Quadrant Markets, C. DiCenzo, R. Paquet, N. Allen, R. Passmore Research Note 22 April 2003 SAN Management Software Magic Quadrant In the storage area network management software market, expect increased competition

More information

Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002

Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 IGG-10232002-03 J. Holincheck Article 23 October 2002 Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 The market for large-enterprise human resources management system (HRMS)

More information

Market Trends in 2002 and 2003

Market Trends in 2002 and 2003 Markets, J. Pescatore, R. Wagner Research Note 8 January 2003 Extranet Access Management 2H02 Magic Quadrant Inside-the-firewall (intraenterprise) integration to reduce costs dominated the extranet access

More information

Managed Remote-Access 1H03 Leaders, Challengers

Managed Remote-Access 1H03 Leaders, Challengers Markets, J. Girard, E. Paulak Research Note 19 March 2003 Managed Remote-Access 1H03 Leaders, Challengers Owning networks no longer drives remote-access market leadership. Vendors that aggregate other

More information

By 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability).

By 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability). Page 1 of 5 Magic Quadrant for Unified Communications, 2005 14 February 2005 Bern Elliot Steve Blood Drew Kraus Source: Gartner Note Number: G00125707 Unified communications technology and applications

More information

Management Update: CRM Suites Magic Quadrant for North American Midsize Businesses

Management Update: CRM Suites Magic Quadrant for North American Midsize Businesses Article 16 April 2003 Management Update: CRM Suites Magic Quadrant for North American Midsize Businesses In the Gartner CRM Suites Magic Quadrant for North American Midsize Businesses, Onyx Software, Pivotal

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

Recognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership

Recognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership Recognition of Websense Leadership Industry Analysts Validate Websense Market and Technological Leadership Analysts Recognize Websense 2011 Secure Web Gateway MQ: Leaders Quadrant 2011 Content-Aware Data

More information

How To Make A Call Center More Independent From The Physical Infrastructure

How To Make A Call Center More Independent From The Physical Infrastructure Market Analysis Software Suites Will Dominate Europe's Call Center Market Abstract: By 2006, sales of IP-based call centers in Europe will exceed those of TDM systems, but adoption of independent server-based

More information

Vendors strongly focused on WCM

Vendors strongly focused on WCM Markets, M. Gilbert, N. Drakos, L. Latham Research Note 28 August 2001 The Web Content Management Magic Quadrant for 2001 The Gartner Web content management Magic Quadrant for 2001 has three leaders and

More information

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional

More information

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear

More information

How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary

How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary Publication Date: 2 January 2004 Author Bruce M. Caldwell This document has been published to the following

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT Open Space Security Cyber-attacks are real. Today alone, Lab technology prevented nearly 3 million of them aimed at our customers worldwide.

More information

Strategic Sourcing Magic Quadrant Criteria: An Explanation

Strategic Sourcing Magic Quadrant Criteria: An Explanation Markets, D. Hope-Ross, J. Woods Research Note 14 March 2003 Strategic Sourcing Magic Quadrant Criteria: An Explanation A new Gartner Magic Quadrant for strategic sourcing applications is being introduced.

More information

Management Update: Powerhouse Vendors Implement Document Management

Management Update: Powerhouse Vendors Implement Document Management IGG-10302002-04 G. Landers, K. Shegda, D. Logan Article 30 October 2002 Management Update: Powerhouse Vendors Implement Document Management Interest within enterprises is growing in the management of unstructured

More information

Business Applications and Infrastructure Entwined

Business Applications and Infrastructure Entwined Markets, S. Hayward, B. Burton, J. Comport, Y. Genovese, T. Bittman Research Note 9 July 2003 Business and Infrastructure Entwined Oracle's bid for PeopleSoft encompasses more than applications. It illustrates

More information

2003 Enterprise Backup/Restore Magic Quadrant

2003 Enterprise Backup/Restore Magic Quadrant Markets, C DiCenzo, R Paquet Research Note 9 May 2003 2003 Enterprise Backup/Restore Magic Quadrant The backup/restore software market is maturing, with a limited number of vendors competing for the bulk

More information

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network

More information

WatchGuard: Your Security Partner of Choice. Carlos Vieira

WatchGuard: Your Security Partner of Choice. Carlos Vieira WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices

More information

Definition of the Market

Definition of the Market Markets, M. Halama Research Note 9 September 2003 Criteria for Pan-European Web Hosting Magic Quadrant, 2H03 Web hosting firms offer greatly differing services to a wide range of customers. Our criteria

More information

Management Update: CRM Success Lies in Strategy and Implementation, Not Software

Management Update: CRM Success Lies in Strategy and Implementation, Not Software IGG-03122003-01 D. Hagemeyer, S. Nelson Article 12 March 2003 Management Update: CRM Success Lies in Strategy and Implementation, Not Software A customer relationship management (CRM) package doesn t ensure

More information

CIO Update: Microsoft's Business Intelligence Strategy Is a Work in Progress

CIO Update: Microsoft's Business Intelligence Strategy Is a Work in Progress IGG-05282003-04 B. Hostmann, K. Strange Article 28 May 2003 CIO Update: Microsoft's Business Intelligence Strategy Is a Work in Progress Microsoft s SQL Server and related business intelligence (BI) products

More information

Partner Relationship Management: 2003 Magic Quadrant

Partner Relationship Management: 2003 Magic Quadrant Markets, R. DeSisto, C. Marcus Research Note 11 February 2003 Partner Relationship Management: 2003 Magic Quadrant In the latest Gartner PRM Magic Quadrant, Siebel remains the sole PRM leader. Allegis,

More information

Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03

Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 Markets, H. Dresner, B. Hostmann, F. Buytendijk, A. Tiedrich Research Note 25 August 2003 Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 The business intelligence technology markets continue

More information

The 2H05 Magic Quadrant for managed

The 2H05 Magic Quadrant for managed Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security

More information

Management Update: How to Implement a Successful ERP II Project

Management Update: How to Implement a Successful ERP II Project IGG-09252002-02 B. Zrimsek, P. Phelan Article 25 September 2002 Management Update: How to Implement a Successful ERP II Project Gartner provides insights and recommendations on how enterprises can make

More information

Sophos Acquires Cyberoam

Sophos Acquires Cyberoam Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam

More information

Management Update: The Eight Building Blocks of CRM

Management Update: The Eight Building Blocks of CRM IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

The Internet Security And Intrusion Detection Market

The Internet Security And Intrusion Detection Market The Internet Security And Intrusion Detection Market Serge-Paul Carrasco December 1998 asiliconvalleyinsider.com Contents 1) The Internet Security Market 2) The Intrusion Detection and Response Market

More information

Upheaval in the CRM Services Market

Upheaval in the CRM Services Market Markets, J. Kirkby Research Note 24 October 2002 Upheaval in the CRM Services Market The customer relationship management services market is in upheaval: Competitive changes will strongly influence trends.

More information

Market Guide for Network Sandboxing

Market Guide for Network Sandboxing G00271317 Market Guide for Network Sandboxing Published: 2 March 2015 Analyst(s): Lawrence Orans, Jeremy D'Hoinne Choosing a network sandboxing solution is challenging due to the wide array of options

More information

Management Alert: Microsoft Will Be a Strong Force in the CRM Market

Management Alert: Microsoft Will Be a Strong Force in the CRM Market IGG-02052003-01 E. Thompson, J. Outlaw Article 5 February 2003 Management Alert: Microsoft Will Be a Strong Force in the CRM Market Microsoft is poised to have a major impact on the customer relationship

More information

Firewalls: The Next Generation. Rick Coloccia Network Manager coloccia@geneseo.edu

Firewalls: The Next Generation. Rick Coloccia Network Manager coloccia@geneseo.edu Firewalls: The Next Generation Rick Coloccia Network Manager coloccia@geneseo.edu Session Overview Evolution of the Firewall Packet Filters Stateful Firewalls Application Firewalls Single Appliance No

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Unified Communications MQ Selection Criteria for 2003

Unified Communications MQ Selection Criteria for 2003 Decision Framework, B. Elliot Research Note 22 January 2003 Unified Communications MQ Selection Criteria for 2003 Unified communications enable enterprises to control their communication options, leveraging

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

Business Value Drives VoIP and IP-Telephony Layering

Business Value Drives VoIP and IP-Telephony Layering Decision Framework, B. Elliot Research Note 16 July 2003 Business Value Drives VoIP and IP-Telephony Layering Enterprises must view IP telephony and voice over IP projects as functional layers composed

More information

White Paper. ZyWALL USG Trade-In Program

White Paper. ZyWALL USG Trade-In Program White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...

More information

SharePoint 2013 Infrastructure Planning

SharePoint 2013 Infrastructure Planning SharePoint 2013 Infrastructure Planning SharePoint Configuration March 3, 2014 SharePoint 2013 Infrastructure Planning Confidential and Proprietary Information Entire contents Scholantis Learning Software

More information

The growing focus on managing information security risk is challenging

The growing focus on managing information security risk is challenging InSide Gartner This Week Vol. XIX, No. 27 2 July 2003 Management Update: Information Security Risk Best Practices The growing focus on managing information security risk is challenging most enterprises

More information

Economic conditions and vendor consolidations

Economic conditions and vendor consolidations Magic Quadrant for the ERP Manufacturing Midmarket, 2005 Source: Gartner RAS Core Research Note G00127115, Billy Maynard, Yvonne Genovese, 30 June 2005, R1483 07142006. Economic conditions and vendor consolidations

More information

What CIOs Want to Know About Microsoft Active Directory

What CIOs Want to Know About Microsoft Active Directory IGG-01222003-01 J. Enck Article 22 January 2003 What CIOs Want to Know About Microsoft Active Directory Active Directory deployments are increasing and so are questions about the technology. Gartner addresses

More information

Net Optics and Cisco NAM

Net Optics and Cisco NAM When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco

More information

BroadScan. Security Appliances. in-one Security Solution for SMB Combining Performance, ease of use and affordability. A Breakthrough all-in

BroadScan. Security Appliances. in-one Security Solution for SMB Combining Performance, ease of use and affordability. A Breakthrough all-in BroadScan TM Security Appliances A Breakthrough all-in in-one Security Solution for SMB Combining Performance, ease of use and affordability 1 BroadScan Security Appliances Security with superior ROI Lower

More information

Enterprise Resource Planning Software Market: Europe, 2002 (Executive Summary) Executive Summary

Enterprise Resource Planning Software Market: Europe, 2002 (Executive Summary) Executive Summary Enterprise Resource Planning Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Fabrizio Biscotti Chris Pang Chad Eschinger This document has been published

More information

Web Security Firewall Setup. Administrator Guide

Web Security Firewall Setup. Administrator Guide Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

Small and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary

Small and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary Small and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary Publication Date: 15 January 2004 Author Robert H. Brown This document has been published to the

More information

Magic Quadrant for Integrated Document Management, 2003

Magic Quadrant for Integrated Document Management, 2003 Magic Quadrant for Integrated Document Management, 2003 Document management has moved to the forefront of many enterprises' purchasing lists. Our 2003 Magic Quadrant explains the complexities of the integrated

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

Predicts 2004: Supplier Relationship Management

Predicts 2004: Supplier Relationship Management Strategic Planning, D. Hope-Ross Research Note 17 November 2003 Predicts 2004: Supplier Relationship Management Enterprises using technology to improve supplier relationships should pay attention to changes

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Oracle Collaboration Suite

Oracle Collaboration Suite Oracle Collaboration Suite Firewall and Load Balancer Architecture Release 2 (9.0.4) Part No. B15609-01 November 2004 This document discusses the use of firewall and load balancer components with Oracle

More information

Securing and Optimizing the Next Generation Branch Office

Securing and Optimizing the Next Generation Branch Office Securing and Optimizing the Next Generation Branch Office 1 Global Organizations Current state of affairs 3 Globally distributed enterprises rely on the WAN for day to day operations to stay competitive

More information

Management Update: The Cornerstones of Business Intelligence Excellence

Management Update: The Cornerstones of Business Intelligence Excellence G00120819 T. Friedman, B. Hostmann Article 5 May 2004 Management Update: The Cornerstones of Business Intelligence Excellence Business value is the measure of success of a business intelligence (BI) initiative.

More information

Firewall Market Opportunities, Strategies, and Forecasts, 2004 to 2009. Firewall. Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY

Firewall Market Opportunities, Strategies, and Forecasts, 2004 to 2009. Firewall. Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY Firewall Market Opportunities, Strategies, and Forecasts, 2004 to 2009 Firewall Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY WinterGreen Research, Inc. Lexington, Massachusetts www.wintergreenresearch.com

More information

McAfee Next Generation Firewall

McAfee Next Generation Firewall McAfee Next Generation Firewall Services solutions for Managed Service Providers (MSPs) McAfee Next Generation Firewall offers the advanced security, flexibility, and multitenant control needed to protect

More information

Vertical Data Warehouse Solutions for Financial Services

Vertical Data Warehouse Solutions for Financial Services Decision Framework, M. Knox Research Note 24 July 2003 Vertical Data Warehouse Solutions for Financial Services Packaged DW financial services solutions differ in degree of and approach to verticalization,

More information

Gartner Magic Quadrant Update Dedicated IPS Field & Partner Talking Points

Gartner Magic Quadrant Update Dedicated IPS Field & Partner Talking Points Gartner Magic Quadrant Update Dedicated IPS Field & Partner Talking Points Check Point Analyst Relations & Product Teams Heather Haas (AR), Darrell Burkey (PM), Gene Manyak (PMM) May 18, 2009 WHAT: Gartner

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

Firewall (networking) - Wikipedia, the free encyclopedia

Firewall (networking) - Wikipedia, the free encyclopedia Firewall (networking) From Wikipedia, the free encyclopedia In computing, a firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden

More information

Magic Quadrant for the IT Service Desk, 2003

Magic Quadrant for the IT Service Desk, 2003 Markets, K. Brittain Research Note 14 May 2003 Magic Quadrant for the IT Service Desk, 2003 Vendors in the IT service desk market Magic Quadrant have suffered through a depressed economy, vendor financial

More information

Symantec Security Information Manager Version 4.7

Symantec Security Information Manager Version 4.7 Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM

More information

CONTENTS. 1.0 Introduction

CONTENTS. 1.0 Introduction CONTENTS 1.0 Introduction 2.0 Why we are different? 2.1 What can a Firewall do? 2.2 What can an Intrusion Detection System do? 2.3 What can a Mail Security System do? 2.4 What can Defencity NetSecure do?

More information

Forefront Threat Management Gateway (TMG) Whitepaper The Solution.

Forefront Threat Management Gateway (TMG) Whitepaper The Solution. Forefront Threat Management Gateway (TMG) Whitepaper The Solution. Find out more about our business on www.exertismicro-psecurity.com Introduction Last year Microsoft announced changes to the roadmaps

More information

WAGs Must Meet Multichannel Access Gateway Criteria

WAGs Must Meet Multichannel Access Gateway Criteria Markets, W. Clark Research Note 16 December 2003 WAGs Must Meet Multichannel Access Gateway Criteria Most wireless application gateway functionality will be absorbed into other mobile development platforms

More information

APS/SES combination. Traditional package

APS/SES combination. Traditional package Markets, G. Phifer, R. Valdes, D. Gootzit Research Note 26 March 2003 The Horizontal Portal Product 2003 Magic Quadrant The portal product market is undergoing significant segmentation. Gartner presents

More information

Firewall Strategies June 2003 (Updated May 2009)

Firewall Strategies June 2003 (Updated May 2009) Firewall Strategies June 2003 (Updated May 2009) 1 Table of Content Executive Summary...4 Brief survey of firewall concepts...4 What is the problem?...4 What is a firewall?...4 What skills are necessary

More information

The Future Of The Firewall

The Future Of The Firewall SECURITY The Future Of The Firewall Jeff Wilson Jeff Wilson is principal analyst, VPNs and security with Infonetics Research (www.infonetics.com), specializing in firewalls, IDS/IPS, VPNs, integrated security

More information

Check Point Positions

Check Point Positions Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.

More information