Magic Quadrant for Intrusion Prevention

Size: px
Start display at page:

Download "Magic Quadrant for Intrusion Prevention"

Transcription

1 Page 1 of 10 Magic Quadrant for Intrusion Prevention Systems 16 November 2015 ID:G Analyst(s): Craig Lawson, Adam Hils, Claudio Neiva VIEW SUMMARY The network IPS market continues being absorbed by next-generation firewall placements at the perimeter. Next-generation IPSs offer the best protection and are responding to pressure coming from the uptake of advanced threat defense solutions and the requirement to provide cloud placements. Market Definition/Description The network intrusion prevention system (IPS) appliance market is composed of stand-alone physical and virtual appliances that inspect defined network traffic either on-premises or in the cloud. They are often located in the network to inspect traffic that has passed through perimeter security devices, such as firewalls, secure Web gateways and secure gateways. While intrusion detection systems (IDSs) are still often used for certain use cases, most IPS devices are deployed in-line and perform full-stream reassembly of network traffic. They provide detection via several methods for example, signatures, protocol anomaly detection, behavioral monitoring or heuristics, advanced threat defense (ATD) integration, and threat intelligence (TI). When deployed in-line, IPSs can also use various techniques to detect and block attacks that are identified with high confidence; this is one of the primary benefits of this technology. The capabilities of leading IPS products have adapted to changing threats, and nextgeneration IPSs (NGIPSs) have evolved incrementally in response to advanced targeted threats that can evade first-generation IPSs (see "Defining Next-Generation Network Intrusion Prevention"). This Magic Quadrant focuses on the market for stand-alone IPS appliances; however, IPS/IDS capabilities are also delivered as functionality in other network security products. Network IPSs are provided within a next-generation firewall (NGFW), which is the evolution of enterprise-class network firewalls, and include application awareness and policy control, as well as the integration of network IPSs (see "Magic Quadrant for Enterprise Network Firewalls"). IPS capability is available in unified threat management (UTM) "all in one" products that are used by small or midsize businesses (see "Magic Quadrant for Unified Threat Management"). We have also begun to see basic IPS functionality provided by a small number of network ATD prevention vendors. Gartner observes that the maturity of IPS modules embedded with ATD solutions has yet to be proven. So while the stand-alone IPS market is slowly shrinking, the technology itself is more widely deployed than ever before on various platforms and in multiple form factors. The technology is increasingly ubiquitous. In addition, some vendors offer IPS and IDS functionality in the public cloud in order to provide controls closer to the workloads that reside there. Gartner is tracking the growth of these deployments carefully, and will monitor their efficacy. Stand-alone IPS is deployed for the following use cases: When the staff managing the IPS does not manage the firewalls When best-of-breed protection is required or preferred As an IDS on parts of the internal network When high performance IPS throughput is required To provide network segmentation on parts of the internal network Magic Quadrant Figure 1. Magic Quadrant for Intrusion Prevention Systems STRATEGIC PLANNING ASSUMPTIONS Today, 40% of enterprises have implemented standalone IPSs. By year-end 2017, this will decline to 30% due to increased adoption of next-generation firewalls with an embedded IPS capability. Less than 35% of Internet connections today are secured using NGFWs. By year-end 2018, this will rise to at least 85% of the installed base, with 90% of new enterprise-edge purchases being NGFWs. In 2018, 10% of new stand-alone IPS placements will be in a public or private cloud. EVIDENCE Gartner used the following input to develop this Magic Quadrant: Results, observations and selections of IPSs, as reported via multiple analyst inquiries with Gartner clients A formal survey of IPS vendors Formal surveys of end-user references Gartner IPS market research data OASIS taking over the development of the STIX/TAXII standard:"oasis Advances Automated Cyber Threat Intelligence Sharing With STIX, TAXII, CybOX," oasis-open, 16 July Details on STIX ( and TAXII ( Wins Common Criteria: "Wins Technet Sniper IPS V5.0 E2000 Certification Report" and Common Criteria: Certified Products HP divests the TippingPoint division to Trend Micro: "Trend Micro Acquires HP TippingPoint, Establishing Game-Changing Network Defense Solution," Trend Micro, 21 October Intel Security divests its firewall products: S. Kuranda, "Intel Security to Sell McAfee NGFW, Firewall Enterprise Businesses to Raytheon/Websense," CRN, 27 October EVALUATION CRITERIA DEFINITIONS Ability to Execute Product/Service: Core goods and services offered by the vendor for the defined market. This includes current product/service capabilities, quality, feature sets, skills and so on, whether offered natively or through OEM agreements/partnerships as defined in the market definition and detailed in the subcriteria. Overall Viability: Viability includes an assessment of the overall organization's financial health, the financial and practical success of the business unit, and the likelihood that the individual business unit will continue investing in the product, will continue offering the product and will advance the state of the art within the organization's portfolio of products. Sales Execution/Pricing: The vendor's capabilities in all presales activities and the structure that supports them. This includes deal management, pricing and negotiation, presales support, and the overall effectiveness of the sales channel. Market Responsiveness/Record: Ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the vendor's history of responsiveness.

2 Page 2 of 10 Source: Gartner (November 2015) Vendor and Cisco Cisco, which is headquartered in San Jose, California, has a broad security product portfolio and has had IPS offerings for many years. In 2013, Cisco acquired Sourcefire. Cisco has now completed the transition to make the Sourcefire IPS its sole IPS engine. Cisco has executed on its end-of-sale plan for the non-sourcefire IPS appliances, in keeping with the transition. The Sourcefire line currently does not share a management console with other Cisco security products. Cisco has IPSs available under the FirePOWER brand in the 7000 and 8000 Series Appliances, and a virtual appliance (NGIPSv). The top model runs up to 60 Gbps of inspected throughput. The same IPS is available in the Cisco Adaptive Security Appliance (ASA), labeled as "with FirePOWER Services." Additionally, the software-based IPS within the Cisco Internetwork Operating System (IOS)-based routers and Integrated Services Routers (ISRs) is also capable of using the Sourcefire IPS engine. Cisco has a phased plan aimed at introducing FirePOWER services across its Integrated Services Router (ISR) platforms. The Meraki platform also runs the Snort engine. Marketing Execution: The clarity, quality, creativity and efficacy of programs designed to deliver the organization's message to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This "mind share" can be driven by a combination of publicity, promotional initiatives, thought leadership, word of mouth and sales activities. Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups, service-level agreements and so on. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure, including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Completeness of Vision Market Understanding: Ability of the vendor to understand buyers' wants and needs and to translate those into products and services. Vendors that show the highest degree of vision listen to and understand buyers' wants and needs, and can shape or enhance those with their added vision. Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the website, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling products that uses the appropriate network of direct and indirect sales, marketing, service, and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: The vendor's approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature sets as they map to current and future requirements. Business Model: The soundness and logic of the vendor's underlying business proposition. Vertical/Industry Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including vertical markets. Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. Geographic Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market. Cisco is evaluated as a Leader because of its ability to lead the market with new features based on the former Sourcefire products, and because it has the highest visibility in Gartner client shortlists for IPSs. Cisco's adoption of the Sourcefire technology as its standard IPS greatly improves the quality of Cisco's IPS offering and preserves market-leading IPS capability. The combined lab teams provide a large vulnerability and signature research capability. Gartner assesses the acquisition as having been successful. Cisco has wide international support, an extremely strong channel and the broadest geographic coverage. Enterprises that already have a significant investment in Cisco security products, or that use Cisco Security Manager (CSM), often consider Cisco IPSs as a possible solution. The Advanced Malware Protection (AMP) products provide a quicker path to adding advanced threat capabilities to IPSs for Cisco than previous roadmaps. It is also now competing well against stand-alone and established advanced persistent threat (APT) solution vendors. Cisco has a large market share for specialized IPS appliances, providing a rich collection medium for observing threats in the wild. Current Cisco IPS clients looking to transition to newer products can do so, provided they accommodate having to use a different console. This limits the advantages of incumbent Cisco customers. Gartner believes a unified console will be available by mid Gartner recommends that negotiations include a discussion on extensive discounting or inclusion of the console where the current Cisco security management products are already in place, considering that the dual-console adoption will likely be temporary.

3 Page 3 of 10 Some clients have referred to performance impacts when enabling AMP for Networks services on existing sensors. Hewlett Packard Enterprise Based in Palo Alto, California, Hewlett Packard Enterprise (HPE) is a large, global, broad-based IT and service vendor that has now completed its split from HP. On 21 October 2015, HPE announced that it is divesting the TippingPoint division to Trend Micro. The Enterprise Security Products (HPE ESP) group is where the TippingPoint business resides until the divestiture becomes final. HPE ESP is already a Trend Micro partner, packaging its Deep Discovery advanced threat software on an HPE appliance under the name TippingPoint Advanced Threat Appliance. HPE ESP has announced its intention to continue to partner with Trend Micro after the divestiture becomes final, to help serve its customers' network security needs. The top IPS model only runs up to 20 Gbps of inspected throughput, and has IPS blades that run in HPE networking switches (which are not evaluated here). The TippingPoint IPS is also delivered in its enterprise firewall, first released in 3Q13, using an Intel-based platform. This is a move away from the traditional network processing unit (NPU) architecture used for a decade. This move from custom to more commodity Intel CPUs is also moving through the IPS line as well. IPS content updates are provided through TippingPoint's Digital Vaccine Labs (DVLabs) filters. The DVLabs team runs the Zero Day Initiative (ZDI) program, which continues to be an excellent source of vulnerability information for TippingPoint products, while also supporting independent vulnerability researchers. We expect the move of TippingPoint to Trend Micro to be an overall net positive for TippingPoint customers, as their IPS platforms will gain natively integrated advanced threat capabilities, a significantly larger channel with more expertise in selling security and access to Trend Micro's significant research resources. Trend Micro will enter the IPS market with a competitive solution. TippingPoint is assessed as a Challenger because HPE has not executed well operationally or on its roadmap with TippingPoint. It also has not yet positioned its IPS within a coherent overall network security story within the greater HPE, and has now divested it to Trend Micro. Customers describe easy, confident deployment of this IPS in blocking mode. Customers cite high-quality, timely malware detection and filter updates. Customer support earns high marks with customers. Support percentage is based on sales price, not list price, providing potential support savings for customers. The ability to integrate third-party vulnerability scanning data to speed up IPS policy workflow and the ThreatLinQ user portal for policy assistance are well-regarded. The SMS management console now has the ability to take and explore flow data from managed IPSs, giving users better visibility into the network. The divestiture of TippingPoint will be a net positive, for this business is going to a securityfocused company with a large reseller channel with no overlap in their existing product sets. Huawei TippingPoint has taken the OEM and third-party integration route with its advanced threat offering, relying on multiple third parties. HP lacked a strong network security channel, leaving some customers without the option for strong value-added reseller (VAR)-provided technical support. We expect Trend Micro will further build out its network security channel, providing TippingPoint customers with stronger channel support in the midterm. The highest-throughput TippingPoint IPS appliance has 20 Gbps throughput, which makes it one of the lowest-throughput high-end boxes. This disqualifies TippingPoint for some specific highthroughput use cases. The Trend Micro acquisition will be a big shift for TippingPoint staff and may cause the IPS roadmap to change. Headquartered in Shenzhen, China, Huawei, with a core strength in networking, offers a range of network security controls, including IPS, firewall and distributed denial of service (DDoS) mitigation appliances. Huawei introduced its IPS product line, called Network Intelligent Protection (NIP) System, in NIP includes eight physical appliances, ranging from 800 Mbps to 15 Gbps. Huawei's IPS currently does not come in the form of a virtual appliance, though this is expected to change. Secure Sockets Layer (SSL) decryption for visibility and threat intelligence (reputation)-based blocking is supported. Huawei is evaluated as a Niche Player because it operates mainly in one country or within the existing Huawei client base, addressing a specific segment of the IPS market. Customers like the NIP Manager interface, especially the ease of installation and policy templates. Huawei has a strong presence among Chinese midsize organizations looking for cost-effective IPS solutions. Users report good performance in the production environment, which is in line with the vendor's marketing material. Despite a large channel in EMEA, Huawei does not often appear in shortlists outside of China. Potential customers from other regions should first check local channel experience with NIP.

4 Page 4 of 10 IBM Huawei's IPS offers a lower number of IPS signatures and categories compared with leading vendors. While generic approaches are a good reason for low number of signatures, this could translate into less flexibility and a coverage gap for clients. Huawei has undertaken significant steps in the past to address concerns about relying on technology developed in China; however, for many prospective customers in the U.S., those concerns remain. Huawei does not have an embedded or cloud-based advanced threat detection, and sandbox options are not available. IBM, headquartered in Armonk, New York, has the IBM Security Network Protection XGS and Network Intrusion Prevention System GX products positioned within a recently unified product and services division. The division is headed by the former Q1 Labs CEO. This approach of a single security group for all IBM security products and services is a significant development, and it will improve IBM's focus and competitiveness. The Network IPS products has seen a substantial update with the newer XGS range (with four models) and in nine models of appliances within the heritage GX Series (which is in the process of being replaced by the XGS range), with inspected throughput ranging from 800 Mbps to 25 Gbps. IBM now has the XGS 3100, 4100, 5100 and 7100, which incorporate NGIPS capabilities at up to 25 Gbps of inspected throughput. The virtual network security platform is available as a VMware virtual appliance and is now based on the XGS product line. IBM does not have its own firewall yet, but is moving to implement basic routing and NAT functionality in the XGS, allowing it to be used for additional deployment use cases, such as data center segmentation and cloud (infrastructure as a service [IaaS]) deployment scenarios. IBM is rated as a Leader because it has solid NGIPS features and executes well in making integrated security sales in the IBM customer base. IBM's Protocol Analysis Module (PAM) IPS engine is still leading the market in its ability to provide low false positives and protection for entire classes of vulnerabilities, with the smallest number of signatures in the market. Customers often buy IBM IPS in conjunction with QRadar security information and event management (SIEM) to achieve deeper levels of security intelligence integration. IBM has a wide sales and distribution network, and customers with a strong IBM relationship are generally pleased with the IPS support they receive. Clients have remarked on IBM's thorough reporting, event metadata and rich level of security event detail for event-level drill-down. IBM IPS's presence on the IPS shortlists of Gartner customers has not been comparable to other Leaders. Many Gartner clients do not perceive IBM as a strategic supplier of network security products. IBM's highest-throughput IBM IPS appliance has 25 Gbps throughput, which makes it one of the lowest-throughput high-end boxes. This disqualifies IBM for some specific high-throughput use cases. IBM does not have an NGFW offering, which causes customers to migrate to perimeter NGFW offerings from other vendors that can offer a more comprehensive product set. IBM does not have its own ATD solution and relies on an OEM and other third-party integration opportunities. The centralized management solution (SiteProtector) has not had a credible update for some time, and it is deemed uncompetitive in comparison with other Leaders' tools. Intel Security (McAfee) Santa Clara, California-based McAfee, now part of Intel Security, is a large security vendor with a significant product portfolio across network, server, content, SIEM, vulnerability assessment and endpoint security. The McAfee Network Security Platform (NSP) is the stand-alone IPS model line, with appliance models that range from 100 Mbps to 40 Gbps of throughput. In addition, Intel Security (McAfee) acquired Stonesoft in 2013, which provided another IPS product and an enterprise-ready NGFW. Presently, Intel Security is selling the Stonesoft IPS only as a component in the NGFW, so only the NSP is evaluated in this research. Intel Security also has an IPS within the McAfee Firewall Enterprise. However, this is primarily a legacy IPS from Secure Computing, and is not within the scope of this Magic Quadrant. Intel Security offers three virtual VM-IPS models. Intel now has transitioned most of its product line to Intel CPU-based technology and has been aggressively executing on its roadmap. Intel Security (McAfee) is evaluated as a Leader because of its continued presence on customer shortlists and its feature leadership. Clients rate manageability and ease of use extremely well, and the IPS console scores well in competitive selections and independent tests. Customers cite Intel Security's thorough integration with other Intel Security products, including Advanced Threat Defense (ATD) and the Threat Intelligence Exchange (TIE), as a strong positive. In organizations concerned with false-positive rates coming from heavy use of signatures, Intel Security's multiple signatureless inspection techniques give it an advantage over more signaturebased IPS technologies.

5 Page 5 of 10 Intel Security is highly visible on Gartner client IPS shortlists, especially in government markets. According to the Magic Quadrant vendor survey, Intel Security is regarded as a leading competitor by a majority of its rivals. The necessity of deploying different management platforms for the IPS (Network Security Manager) and the NGFW (Network Security Management Center) for mixed deployments causes some customers to consider other vendors as they transition to NGFWs. Moreover, Intel Security has yet to unify the IPS function into a single code base. The Intel Security and McAfee brands are known more broadly for desktop security offerings, and often are not perceived by enterprises and channel partners as a strong network security provider. Now that McAfee has been rebranded as Intel Security, it is less likely to be perceived as a network security brand in the market. Some reference customers reported that customer service needs improvement. Intel Security's announced move to divest its multiple network firewall products (to Raytheon, announced in late October 2015), while keeping the IPS product line, makes the IPS range vulnerable to combined firewall plus IPS replacements from vendors such as Cisco, and dilutes Intel Security's overall network security brand. NSFOCUS NSFOCUS is headquartered in Beijing, China. NSFOCUS today is a large regional security vendor for Asia. It is expanding globally, and offers DDoS (called Anti-DDoS System, or ADS), secure Web gateway (called Web Vulnerability Scanning System, or WVSS), Web application firewall (WAF) and vulnerability management (called Remote Security Assessment System, or RSAS). It also offers MSS on a number of its products. Its IPS was released in The NSFOCUS IPS (NIPS) has a large range of appliances of 12 models, ranging from 100 Mbps to 20 Gbps of throughput, and a virtual appliance. NSFOCUS' IPS includes sandboxing capabilities, application control and anti-malware, and can also utilize reputation-based controls. NSFOCUS is assessed as a Niche Player because it sells its IPS almost exclusively in one region. NSFOCUS has faithful base of large Chinese organizations and often appears in final shortlists in the Asia/Pacific region. The NX Series integrates with NSFOCUS DDoS protection solutions. NSFOCUS customers like the vendor support timeliness and ability to provide extensive answers. NSFOCUS has a number of features that resonate in their primary regions of operation, such as advanced threat protection, URL filtering, application control, anti-malware and traffic shaping. Wins NSFOCUS is mostly visible in Asia/Pacific, and has yet to build a large channel for its IPS in the U.S. and other regions. NSFOCUS does not offer low-end IPS appliances at a list price that appeals to midmarket customers. NSFOCUS has lagged behind several competitors in the integration of sandboxing, and has little production experience with it. Gartner customers report that the reporting and alert view could be improved. Wins is headquartered in Seongnam, Gyeonggi Province, South Korea, and it was established in Its IPS was released on or before Wins has previously achieved common criteria certifications for its IPS technology. It is shipping six appliances between 400 Mbps to 40 Gbps in its range. The Sniper One series also supports SSL decryption. Gartner was unable to contact Wins for this research. Wins is assessed as a Niche Player because it sells its IPS in one region and lacks visibility with Gartner clients. Wins is successful in the South Korea and Japan region, where its Sniper IPS is marketed. It is one of the few IPSs that has support for some carrier mobile protocols around inspecting 3G/LTE encapsulated traffic. Wins supports the Snort standard, which allows clients to create custom signature content and to also reuse publicly available content. Wins is today regionally constrained to specific areas in Asia. Wins does not appear to discover original vulnerabilities, making it more of a "fast follower" in terms of security content creation. The chassis in its lineup do not support a high physical port density. Vendors Added and Dropped We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor appearing in a Magic Quadrant or MarketScope one year and not the next

6 Page 6 of 10 does not necessarily indicate that we have changed our opinion of that vendor. This may be a reflection of a change in the market and, therefore, changed evaluation criteria, or a change of focus by a vendor. Added Wins Dropped Stonesoft has been acquired by McAfee, and its IPS line has been deprecated in favor of the Intel (McAfee) NSP. FireEye's recent addition of IPS to the NX range has not yet met the minimum revenue criteria for inclusion in this research. Bricata is a new entrant to the enterprise IPS/IDS market, and has not yet met the minimum revenue criteria for inclusion in this research. Radware has changed direction; it is exclusively using its IPS technology for WAF and DDoS use cases and no longer markets an IPS offering. Inclusion and Exclusion Criteria Only products that met these criteria were included. They must: Meet Gartner's definition of a network IPS. Operate as an in-line network device that runs at wire speeds. Perform packet normalization, assembly and inspection. Apply rules based on several methodologies to packet streams, including (at a minimum) protocol anomaly analysis, signature analysis and behavior analysis. Drop malicious sessions they don't simply reset connections. The drop must not be a block of all subsequent user traffic. Have achieved network IPS product sales during the past year of more than $4 million within a customer segment that is visible to Gartner. Sell the product as a stand-alone IPS. Products and vendors were excluded if: The company has minimal or negligible apparent market share among Gartner clients, or it is not actively shipping products. The product is offered only or chiefly as a managed security service. The company hosts IPS software on servers and workstations, rather than on an in-line device on the network. Evaluation Criteria Ability to Execute Product or service and customer satisfaction in deployments: Performance in competitive assessments and having best-in-class detection and signature quality are highly rated. A vendor should compete effectively to succeed in a variety of customer placements. Overall business viability: This includes overall financial health and prospects for continuing operations. Sales execution/pricing: This includes dollars per Gbps, revenue, average deal size, market share change, installed base, presence in cloud deployments and use by managed security service providers (MSSPs). Winning in competitive shortlists versus other IPS vendors is also highly weighted. Market responsiveness/record: This includes delivering as promised on planned new customer-valued features. Marketing execution: This includes delivering on features and performance, customer satisfaction with those features, and those features beating competitors in selections. Delivering products that are low latency and multi-gbps, have solid internal security, behave well under attack, have high availability, and have available ports that meet connectivity demands are rated highly. Speed of vulnerability-based signature production, signature quality and dedicating internal resources to vulnerability discovery also are highly rated. Customer experience: This includes management experience and track record, as well as depth of staff experience, specifically in the security marketplace. Also important are low latency, rapid signature updates, overall low false-positive and false-negative rates, and how the product fared in attack events. Postdeployment customer satisfaction, where the IPS is actively managed, is another key criterion. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure, including skills, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Table 1. Ability to Execute Evaluation Criteria Evaluation Criteria Weighting Product or Service High

7 Page 7 of 10 Evaluation Criteria Overall Viability Sales Execution/Pricing Market Responsiveness/Record Marketing Execution Customer Experience Operations Source: Gartner (November 2015) Weighting High High Completeness of Vision Market understanding: These include providing the correct blend of detection and blocking technologies that at least meet and ideally exceed the requirements for NGIPS. Innovation, forecasting customer requirements, having a vulnerability rather than an individual exploit product focus, being ahead of competitors on new features and integration with other security solutions (such as advanced threat defense) are highly rated. Also included is an understanding of and commitment to the security market and, more specifically, to the network security market. Vendors that rely on third-party sources for signatures, have weak or "shortcut" detection technologies, and have limited ATD approaches score lower. Marketing strategy: A clear and differentiated set of messages consistently communicated throughout the organization and externalized through the Web presence, advertising, customer programs and positioning statements. Sales strategy: This includes prepurchase and postpurchase support, value for pricing, and providing clear explanations and recommendations for addressing detection events. Offering (product) strategy: This includes an emphasis on product roadmap, signature quality, performance and a clear differentiated advanced threat detection strategy. Successfully completing third-party testing such as the NSS Group IPS tests and Common Criteria evaluations is important. Vendors do not score well if they commonly reissue signatures, are overreliant on behavioral detection and are slow to issue quality signatures. Business model: This includes the process and success rate of developing new features and innovation. It also includes R&D spending. Vertical/industry strategy: The technology provider's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including vertical markets. Innovation: This includes R&D and quality differentiators, such as performance, management interface and clarity of reporting. Features that are aligned with the realities of network operators, such as those that reduce "gray lists" (for example, reputation and correlation), are rated as important. The roadmap should include moving IPS into new placement points and betterperforming devices, as well as incorporating advanced malware detection. Rich NGIPS features (beyond only reputation feed) are highly weighted, as are robust network sandboxing capabilities and the ability to provide placements in the cloud. Geographic strategy: The technology provider's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries, as appropriate for that geography and market. Table 2. Completeness of Vision Evaluation Criteria Evaluation Criteria Weighting Market Understanding Marketing Strategy Sales Strategy Offering (Product) Strategy Business Model Vertical/Industry Strategy Innovation Low High Not Rated High Geographic Strategy Source: Gartner (November 2015) Quadrant Descriptions Leaders Low Leaders demonstrate balanced progress and effort in all execution and vision categories. Their actions raise the competitive bar for all products in the market, and they can change the course of the industry. To remain Leaders, vendors must demonstrate a track record of delivering successfully in enterprise IPS deployments, and in winning competitive assessments. Leaders produce products that embody NGIPS capabilities, provide high signature quality and low latency, innovate with or ahead of customer challenges (such as providing associated ATD technologies to make enriched IPS intelligence), and have a wide range of models, including high throughput models. Leaders continually win selections and are

8 Page 8 of 10 consistently visible on enterprise shortlists. However, a leading vendor is not a default choice for every buyer, and clients should not assume that they must buy only from vendors in the Leaders quadrant. Challengers Challengers have products that address the typical needs of the market, with strong sales, large market share, visibility and clout that add up to higher execution than Niche Players. Challengers often succeed in established customer bases; however, they do not often fare well in competitive selections, and they generally lag in new feature introduction. Visionaries Visionaries invest in leading-edge/"bleeding"-edge features that will be significant in next-generation products, and that give buyers early access to improved security and management. Visionaries can affect the course of technological developments in the market, especially new NGIPSs or novel antithreat capabilities, but they lack the execution skills to outmaneuver Challengers and Leaders. Niche Players Niche Players offer viable solutions that meet the needs of some buyers, such as those in a particular geography or vertical market. Niche Players are less likely to appear on shortlists, but they fare well when given the right opportunities. Although they generally lack the clout to change the course of the market, they should not be regarded as merely following the Leaders. Niche Players may address subsets of the overall market (for example, the small or midsize business segment, or a vertical market), and they often do so more efficiently than Leaders. Niche Players frequently are smaller vendors, and do not yet have the resources to meet all enterprise requirements. Context Current users of network IPSs highly prioritize next-generation network IPS capabilities at refresh time. Current users of NGFWs look at a next-generation network IPS as an additional defense layer, and expect best-of-breed signature quality. Enterprises with traditional network IPS and firewall offerings should build and plan to execute migration strategies to products that can identify and mitigate advanced threats. Market Overview According to Gartner market research, the worldwide IPS market in 2014 for stand-alone appliances was $1.53 billion. We forecast that the IPS market will start to decline in stand-alone revenue now, from $1.48 billion in 2015 to $1.1 billion by 2018 (see "Forecast: Information Security, Worldwide, , 2Q15 Update.") Data collected from vendors for this Magic Quadrant validates this range. Factors driving those estimates include the following: The threat landscape is currently aggressive, but major IPS vendors were initially slow to address botnet and advanced targeted threats. Some spending that would have gone to IPS products instead has gone to advanced threat detection and network forensics products (see "Five Styles of Advanced Threat Defense"). NGFWs are taking a significant portion of the stand-alone perimeter IPS market as NGIPSs are absorbed into firewall refreshes and become part of NGFWs. Some organizations are adopting public cloud IaaS platforms, reducing IPS vendor appliance revenue opportunity. As market penetration for these integrated and cloud-resident IPS form factors has advanced, the IPS appliance market has been declining. Threat intelligence integration is now almost persuasive in the IPS market. This has added significant context and visibility to both traditional and advanced threats. It has also added to the ability for third-party integrations to occur, extending the life of NGIPS by allowing it to perform the "block and tackling" role of outbound data exfiltration detection and prevention. IDS is still a valid use case, and Gartner is considering the further inclusion of newer delivery methods for example, fully managed and cloud that are not currently under consideration for this Magic Quadrant. As adjacent platforms continue to integrate IPS technology of various levels of efficacy, growth in the stand-alone IPS market will continue to slow. NGIPS Is Available From Leading Vendors The NGIPS has had two primary performance drivers: the handling of network traffic at near-wire speeds, and the deep inspection of the traffic based on more than just signatures, rules and policy. The first generation of IPSs were effectively a binary operation of "threat or no threat," based on signatures of known vulnerabilities. Rate shaping and quality of service were some of the first aspects that brought context to otherwise single-event views. As inspection depth has increased, digging deeper into the same silo of the traffic yields fewer benefits. This next generation of IPSs apply fuller stack inspection, but also apply new sources of intelligence to existing techniques: Standard first-generation signatures Develop and deploy rapidly in response to new threats, and are exploit-specific Vulnerability-generic signatures Focus entirely on providing coverage of the underlying vulnerability, and not the multitude of variants of exploits that are often created for that specific vulnerability Protocol analysis Inspects traffic for threats, regardless of the port that the traffic is traversing over Application awareness Provides specific application identification

9 Page 9 of 10 Context awareness Brings multiple sources together to provide more context around decisions to block sessions Threat intelligence services Provide intelligence on malicious or disruptive activity that can then be acted upon Content awareness Inspects and classifies inbound executables and other similar file types, as well as outbound communications User extensibility Supports user-generated IPS signature content Advanced threat detection Identifies and sends suspicious payloads to another device or cloud sandbox to execute and identify potential malicious files These advances are discussed in detail in "Defining Next-Generation Network Intrusion Prevention." Best-of-breed NGIPS is still found in stand-alone appliances, but has recently been incorporated in some NGFW platforms. Advanced Threat Detection Is Now Available From NGIPSs Along with SSL decryption, Gartner IPS Magic Quadrant customer references most often mentioned advanced threat detection as the key feature in future IPS selections. To compete effectively, NGIPS vendors must more deeply integrate advanced threat defense capabilities to step up their targeted attack detection capabilities for malware detection, anomaly detection, and also for outgoing communication with command-and-control servers from infected endpoints. Gartner notes that FireEye, a well-known vendor in the specialized advanced threat detection area, has evolved its product capabilities to deliver very basic network IPS capabilities to complement its advanced threat solutions. If FireEye or other advanced threat vendors bring "good enough" IPS capabilities to market, clients will have more options and new IPS approaches to choose from. IPS Appliance Market Consolidation Continues, but Cloud and Pure Managed Security Service Offerings Gain Traction In 2013, McAfee acquired Stonesoft, and Cisco acquired Sourcefire. Both of these acquiring vendors had their own IPS technologies before they made their purchases. Both vendors have streamlined their IPS portfolios to offer one stand-alone solution. Additionally, both have continued to execute well in the IPS market despite other changes and acquisitions in their respective businesses. Bricata is a new IPS/IDS vendor that has an additional focus on postbreach features by supporting large amounts of on-chassis storage capacity, allowing for investigation use cases and the ability to replay old traffic, but with up-todate signatures and intelligence to help detect breaches. As the IPS market growth rate slowly decreases, we expect the strongest NGIPS providers to grow their market shares, driving weaker players from the market and leaving buyers with a stable set of vendors from which to choose. Mostly cloud-based IDS solutions, such as Alert Logic, are today outside the scope of this Magic Quadrant's selection criteria, as are pure IPS managed sensors, such as those from Dell SecureWorks and Trustwave. Such solutions are gaining momentum, and Gartner will monitor their progress. We are considering the inclusion of such options in future IPS Magic Quadrants. More IPSs Get Absorbed by NGFWs; However, the Stand-Alone IPS Market Will Persist With the improvement in availability and quality of the IPS within the NGFW, NGFW adoption reduces the need for a network IPS in many enterprises. However, the stand-alone IPS market will persist to serve several scenarios: The incumbent firewall does not offer a viable NGIPS option. Clients continue to report significant performance impact of enabling IPS in their NGFWs. This impact, in real-world feedback from Gartner clients, is frequently in the 40% to 80% range, depending on the traffic profile. For environments that require sustained throughput of 10 Gbps to 20 Gbps and higher, a separate NGFW and NGIPS is a sensible architecture to pursue. Separation of the firewall and IPS is desired for organizational or operational reasons, such as where firewalls are a network team function and IPS/IDS is run by the security team. A best-of-breed IPS is desired, meaning a stand-alone NGIPS is required. Niche designs exist (as in certain internal segmentation scenarios) where an IPS is desired, but without a firewall. For internal segmentation projects. NGIPS deploys at Layer 2 transparently, with more reliability and higher-quality security content than a transparent NGFW, and therefore is considerably easier to deploy while providing the best protection available. While the trend is toward IPS consolidation on NGFWs, Gartner sees anecdotal examples of organizations switching back from an NGFW to a stand-alone IPS, where improved blocking quality and performance are required. IDS Is Still Widely Deployed and Effective Gartner continues to see a credible percentage of user organizations that are still deploying IDS (or IPSs in IDS mode) technology purely for monitoring and visibility use cases, and not for blocking, especially in the network core or where an IPS cannot be deployed. While going "in-line" with this technology is preferred as it at least offers the capability to block should the need arise, IDS is still a staple in a large number of environments. As the adaptive security architecture highlights (see "Designing an Adaptive Security Architecture for Protection From Advanced

10 Page 10 of 10 Attacks"), detection is a critical capability. The number of breaches in recent history highlights clearly that organizations, large and small, are failing in their ability to perform detection and response once threats are active inside the network. IDS is still very effective at delivering threat detection capabilities in familiar ways to organizations' security teams. Some organizations are getting additional life out of older IPS/IDS investments (or by making new investments in IDS) by enabling IPS in the NGFW and moving their IPS/IDS elsewhere in the environment. So rather than decommission stand-alone IPSs, they instead deploy in "IDS mode" internally on other parts of the network for monitoring of what is generally called "east/west traffic," versus the traditional network traffic profile of north/south close to the Internet perimeter. Detecting vulnerability exploitation, service brute forcing, botnet command and control channel activity, application identification, and so on, are all standard features of modern IPS/IDSs and still have utility. Developments in Threat Intelligence Have Implications for IPS/IDS Threat intelligence or reputation feeds have provided much-needed additional visibility, threat context and blocking opportunities for IDS/IPS deployments. In the last few years, all IPS vendors have added these "feeds" to their existing product lines. TI feeds have the following strengths and challenges: : Time to coverage for example, a piece of malware can be inspected and TI feeds updated with detection/blocking metadata like IP address, DNS host name or URL, which is considerably faster than the deep-soak signature testing cycle that IPS vendors require to ship IPS security content. Improved context and visibility on the threat landscape for fast-moving threats, particularly malware and botnets. Most feeds have the concept of not only the threat (botnet), but also a score (often from 0 to 100, for example), allowing users to define the threshold of when alerting versus blocking occurs. Allow for the use of relatively accurate geographic IP details for context and blocking opportunities. Allow for third-party integration via IPS vendor APIs of other feeds. This normally requires additional work. Challenges: TI feeds are proprietary in nature, and users cannot use open standards such as Structured Threat Information Expression (STIX)/Trusted Automated Exchange of Indicator Information (TAXII) without additional software. Like all security content, TI feeds are prone to a level of false positives, meaning clients often have to tune policies to avoid blocking nonmalicious traffic Most vendors, without third parties creating their own integrations or from additional products, generally only use their own TI feeds. These are limited in scope and coverage of the threat landscape from that vendor only. STIX/TAXII standards are now at a point that they have the momentum of security organizations, including Computer Emergency Response Teams (CERTs), global information sharing and analysis centers (ISAC), vendors, and end users. While nascent, in the coming two to three years, we expect to see an acceleration of "block and tackle" vendors such as firewall, intrusion prevention, secure Web gateway (SWG), endpoint threat detection and response (ETDR), and SIEM tools all supporting full implementations of these open standards. These two standards in particular will accelerate the ability to consume threat information and then act on it at time scales not previously possible, and will do so in an end user's environment that has a mixed ecosystem of vendors. Finally, while not meeting the definition of NGIPS, and therefore inclusion in this research, in-line "threat intelligence" appliances have appeared on the market. These are not fully featured IPS/IDSs per se; they only offer blocking around source, destination IP address, DNS and URLs, meaning they are based purely on TI feeds. However, they often support much larger TI databases than available from leading IPS vendors. Example vendors are Centripetal Networks and Norse Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity. About Gartner Careers Newsroom Policies Site Index IT Glossary Contact Gartner

Magic Quadrant for Intrusion Prevention

Magic Quadrant for Intrusion Prevention Magic Quadrant for Intrusion Prevention Systems 16 December 2013 ID:G00253078 Analyst(s): Adam Hils, Greg Young, Jeremy D'Hoinne VIEW SUMMARY Market Definition/Description The network intrusion prevention

More information

Magic Quadrant for Intrusion Prevention

Magic Quadrant for Intrusion Prevention Page 1 of 9 Magic Quadrant for Intrusion Prevention Systems 5 July 2012ID:G00222572 Analyst(s): Greg Young, John Pescatore VIEW SUMMARY The network intrusion prevention system market is undergoing a period

More information

Magic Quadrant for Global Enterprise Desktops and Notebooks

Magic Quadrant for Global Enterprise Desktops and Notebooks Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main

More information

Ability to Execute. What You Need to Know

Ability to Execute. What You Need to Know 1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact

More information

Case Study & POC & Demos Information

Case Study & POC & Demos Information Case Study & POC & Demos Information Type: Case Study Name: Multichannel Campaign Management (MCCM) Description: The IBM Company seeks, as vendor, through the multichannel campaign management (MCCM) services,

More information

Unlike the general notebook market, in which

Unlike the general notebook market, in which Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook

More information

McAfee Next Generation Firewall

McAfee Next Generation Firewall McAfee Next Generation Firewall Services solutions for Managed Service Providers (MSPs) McAfee Next Generation Firewall offers the advanced security, flexibility, and multitenant control needed to protect

More information

Market Guide for Network Sandboxing

Market Guide for Network Sandboxing G00271317 Market Guide for Network Sandboxing Published: 2 March 2015 Analyst(s): Lawrence Orans, Jeremy D'Hoinne Choosing a network sandboxing solution is challenging due to the wide array of options

More information

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance,

More information

What Are Network Security Platforms?

What Are Network Security Platforms? Markets, J. Pescatore, M. Easley, R. Stiennon Research Note 7 November 2002 Network Security Platforms Will Transform Security Markets An integrated network security platform approach will increase network

More information

Magic Quadrant for Network Intrusion Prevention Systems

Magic Quadrant for Network Intrusion Prevention Systems Magic Quadrant for Network Intrusion Prevention Systems Gartner RAS Core Research Note G00208628, Greg Young, John Pescatore, 06 Dec 2010, R3524 12082011 Deep inspection network-based intrusion prevention

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

The 2H05 Magic Quadrant for managed

The 2H05 Magic Quadrant for managed Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

SourceFireNext-Generation IPS

SourceFireNext-Generation IPS D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture

More information

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius 1 The Evolving Security World The Easy Internet High Degree of IT control Slow rate of change

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

2012 North American Enterprise Firewalls Market Penetration Leadership Award

2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 Frost & Sullivan 1 We Accelerate Growth Market Penetration Leadership Award Enterprise Firewalls North America, 2012

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

IBM Advanced Threat Protection Solution

IBM Advanced Threat Protection Solution IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain

More information

How To Sell Network Intrusion Prevention System Appliances

How To Sell Network Intrusion Prevention System Appliances Magic Quadrant for Network Intrusion Prevention System Appliances, 2H06 Gartner RAS Core Research Note G00144735, Greg Young, John Pescatore, 22 December 2006 R2130 12282007 The network intrusion prevention

More information

Magic Quadrant for Network Intrusion Prevention System Appliances, 1H08

Magic Quadrant for Network Intrusion Prevention System Appliances, 1H08 Magic Quadrant for Network Intrusion Prevention System Appliances, 1H08 Gartner RAS Core Research Note G00154849, Greg Young, John Pescatore, 4 February 2008, R2688 04022009 The network intrusion prevention

More information

The 2014 Next Generation Firewall Challenge

The 2014 Next Generation Firewall Challenge Network World and Robin Layland present The 2014 Next Generation Firewall Challenge Guide to Understanding and Choosing a Next Generation Firewall to Combat Today's Threats 2014 The 2014 Next Generation

More information

Next Generation IPS and Reputation Services

Next Generation IPS and Reputation Services Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become

More information

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services MSSP you us are a Managed Security Service Provider looking to offer Advanced Malware Protection Services Lastline is the only company with 10+ years of academic research focused on detecting advanced

More information

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS Traditionally, IT risk management has balanced security investment and the impact of the threat, allowing each business

More information

Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.

Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary. Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and

More information

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency. Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High

More information

Magic Quadrant for Storage Professional and Support Services

Magic Quadrant for Storage Professional and Support Services Magic Quadrant for Storage Professional and Support Services Gartner RAS Core Research Note G00157182, Adam W. Couture, Robert E. Passmore, 30 July 2008 Gartner evaluates storage service providers and

More information

NGFWs will be most effective when working in conjunction with other layers of security controls.

NGFWs will be most effective when working in conjunction with other layers of security controls. Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

The Magic Quadrant Framework

The Magic Quadrant Framework Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship

More information

Sophos Acquires Cyberoam

Sophos Acquires Cyberoam Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam

More information

Threat-Centric Security for Service Providers

Threat-Centric Security for Service Providers Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product

More information

Realize That Big Security Data Is Not Big Security Nor Big Intelligence

Realize That Big Security Data Is Not Big Security Nor Big Intelligence G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM 1 of 5 10/11/2010 9:44 AM 27 April 2010 Mark Fabbi Gartner RAS Core Research Note G00200313 With the completion of the 3Com acquisition, HP will become a formidable competitor across the entire enterprise

More information

Braindumps.700-295.50.QA

Braindumps.700-295.50.QA Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me

More information

Personal firewalls extend company firewall

Personal firewalls extend company firewall Magic Quadrant for Personal Firewalls, 1Q06 Gartner RAS Core Research Note G00139942, John Girard, 27 June 2006, R1901 06302007 Personal firewalls extend company firewall policy to block attacks against

More information

High Performance NGFW Extended

High Performance NGFW Extended High Performance NGFW Extended Enrique Millán Country Manager Colombia emillan@fortinet.com 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material

More information

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Iain Davison Chief Technology Officer Bricata, LLC WWW.BRICATA.COM The Need for Multi-Threaded, Multi-Core

More information

Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant.

Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant. Markets, M. Halpern Research Note 18 March 2003 Defining the PLM Magic Quadrant by Criteria and Use We provide the methodology used in developing our product life cycle management Magic Quadrant. Core

More information

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO

More information

Moving Beyond Proxies

Moving Beyond Proxies Moving Beyond Proxies A Better Approach to Web Security January 2015 Executive Summary Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

Magic Quadrant for Global MSSPs

Magic Quadrant for Global MSSPs G00247003 Magic Quadrant for Global MSSPs Published: 26 February 2014 Analyst(s): Kelly M. Kavanagh Managed security services is a mature market with offerings from established service providers. This

More information

Next Generation Firewall Capabilities Assessment

Next Generation Firewall Capabilities Assessment Next Generation Firewall Capabilities Assessment 1. Introduction Comparison of Next Generation Firewall offerings from Cisco, Intel Security and Palo Alto Next generation firewalls, commonly abbreviated

More information

Решения HP по информационной безопасности

Решения HP по информационной безопасности Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms

Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Gartner RAS Core Research Note G00158295, French Caldwell, Tom Eid, 30 June 2008, R2799 07092009 The market for enterprise governance,

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

SSL Performance Problems

SSL Performance Problems ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture

More information

Content-ID. Content-ID URLS THREATS DATA

Content-ID. Content-ID URLS THREATS DATA Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and

More information

Magic Quadrant for CRM Service Providers, North

Magic Quadrant for CRM Service Providers, North Magic Quadrant for CRM Service Providers, North America 30 August 2010 Matthew Goldman, Ed Thompson Gartner RAS Core Research Note G00205524 Demand for CRM project-based consulting and implementation services

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

IBM Internet Security Systems

IBM Internet Security Systems IBM Global Services IBM Internet Security Systems Norberto Gazzoni Italy Channel Manager norberto_gazzoni@it.ibm.com +39 347 3499617 IBM Internet Security Systems Ahead of the threat. 2006 IBM Corporation

More information

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond

More information

SSL VPN 1H03 Magic Quadrant Evaluation Criteria

SSL VPN 1H03 Magic Quadrant Evaluation Criteria Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

Next Generation Enterprise Network Security Platform

Next Generation Enterprise Network Security Platform Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The

More information

How to Choose the Right Security Information and Event Management (SIEM) Solution

How to Choose the Right Security Information and Event Management (SIEM) Solution How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence

More information

BEST PRACTICES RESEARCH

BEST PRACTICES RESEARCH 2013 Frost & Sullivan 1 We Accelerate Growth Market Leadership Award Vulnerability Management Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year of business with

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

IBM Security Intrusion Prevention Solutions

IBM Security Intrusion Prevention Solutions IBM Security Intrusion Prevention Solutions Sarah Cucuz sarah.cucuz@spyders.ca IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints

More information

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING? A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking

More information

Load Balancing Security Gateways WHITE PAPER

Load Balancing Security Gateways WHITE PAPER Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...

More information

Virtual Patching: a Proven Cost Savings Strategy

Virtual Patching: a Proven Cost Savings Strategy Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes

More information

Magic Quadrant for Global MSSPs

Magic Quadrant for Global MSSPs Magic Quadrant for Global MSSPs 26 February 2014 ID:G00247003 Analyst(s): Kelly M. Kavanagh VIEW SUMMARY Managed security services is a mature market with offerings from established service providers.

More information

How To Sell Security Products To A Network Security Company

How To Sell Security Products To A Network Security Company Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that

More information

Check Point Positions

Check Point Positions Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.

More information

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools Magic Quadrant for Client Management Tools 22 May 2014 ID:G00260863 Analyst(s): Kevin Knox, Terrence Cosgrove VIEW SUMMARY EVALUATION CRITERIA DEFINITIONS New client management tool capabilities have emerged

More information

Magic Quadrant for Higher Education Administrative Suites, 2005

Magic Quadrant for Higher Education Administrative Suites, 2005 Industry Research Publication Date: 21 November 2005 ID Number: G00131715 Magic Quadrant for Higher Education Administrative Suites, 2005 Marti Harris, Michael Zastrocky With Oracle's acquisition of PeopleSoft,

More information

Magic Quadrant for IT Vendor Risk Management

Magic Quadrant for IT Vendor Risk Management (http://www.gartner.com/home) LICENSED FOR DISTRIBUTION Magic Quadrant for IT Vendor Risk Management 29 October 2014 ID:G00263243 Analyst(s): Christopher Ambrose, Gayla Sullivan, Kris Doering Summary The

More information

MarketScope for IT Governance, Risk and Compliance Management, 2008

MarketScope for IT Governance, Risk and Compliance Management, 2008 MarketScope for IT Governance, Risk and Compliance Management, 2008 Gartner RAS Core Research Note G00154941, Paul E. Proctor, Mark Nicolett, French Caldwell, 11 February 2008, RA7 03032009 The IT GRCM

More information

Breach Found. Did It Hurt?

Breach Found. Did It Hurt? ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many

More information

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi Cisco and Sourcefire AGILE SECURITY : Security for the Real World Stefano Volpi SOURCEfire Worldwide John Chambers statement Security is the TOP issue for Cisco and many of the CIO s in the industry. We

More information

Joshua Beeman University Information Security Officer October 17, 2011

Joshua Beeman University Information Security Officer October 17, 2011 Joshua Beeman University Information Security Officer October 17, 2011 1 June, 2011- NPTF Security Presentation on FY 12 InfoSec goals: Two Factor Authentication Levels of Assurance Shibboleth InCommon

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

QRadar SIEM and FireEye MPS Integration

QRadar SIEM and FireEye MPS Integration QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving

More information

Secure Your Success. Intel Security Partner Program

Secure Your Success. Intel Security Partner Program Secure Your Success Intel Security Partner Program Today s digital security threats are more sophisticated and complex than ever. At the same time, computing advancements are opening up new possibilities

More information

HP TIPPINGPOINT ADAPTIVE REAL-WORLD SECURITY. Stefan Schmid Sales Manager Central & Eastern Europe & Middle East s.schmid@hp.com

HP TIPPINGPOINT ADAPTIVE REAL-WORLD SECURITY. Stefan Schmid Sales Manager Central & Eastern Europe & Middle East s.schmid@hp.com HP TIPPINGPOINT ADAPTIVE REAL-WORLD SECURITY Stefan Schmid Sales Manager Central & Eastern Europe & Middle East s.schmid@hp.com 2010 2011 Hewlett-Packard Development Company, L.P. The information contained

More information

Achieve Deeper Network Security and Application Control

Achieve Deeper Network Security and Application Control Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet

More information

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents

More information

Blind as a Bat? Supporting Packet Decryption for Security Scanning

Blind as a Bat? Supporting Packet Decryption for Security Scanning Sponsored by VSS Monitoring Blind as a Bat? Supporting Packet Decryption for Security Scanning November 2012 A SANS Whitepaper Written by: Dave Shackleford Options for SSL Inspection Page 2 Implementing

More information

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets

More information

HP S Intrusion Prevention System (IPS) Series

HP S Intrusion Prevention System (IPS) Series HP S Intrusion Prevention System (IPS) Series Data sheet Product overview The HP S Intrusion Prevention System (IPS) Series is optimized for performance and reliability at 20, 100, and 300 Mbps with very

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com About Palo Alto Networks We are the network security company World-class

More information

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon

More information

Unified Security, ATP and more

Unified Security, ATP and more SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users

More information