On the Radar: Pulse Secure
|
|
- Caitlin Francis
- 8 years ago
- Views:
Transcription
1 Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT Rik Turner
2 Summary Catalyst Pulse Secure is a developer of secure access technology for both corporate-owned and bring your own device (BYOD) endpoints. It relies on client software for the former and containerization for the latter, with plans to move its back-end server functionality into the cloud to offer secure access management as a service. It is not a start-up, having been spun out of Juniper Networks as a mature business. It is, however, a new name in the access management and endpoint security space. Key messages Pulse is the virtual private network (VPN) and network access control (NAC) business spun out of Juniper. It added BYOD security by acquiring MobileSpaces, which brought it containerization technology. Pulse is working on integration with the leading security incident and event management (SIEM) platforms, the first of which will be IBM QRadar. It is moving its back end into the cloud, offering it as a service from Microsoft Azure later this year. Ovum view Pulse will be a significant player in secure access management as that market evolves beyond laptops and remote desktops to support smartphones and tablets, with BYOD further complicating matters. Its challenge will be to stand out from the crowd with the breadth of its portfolio. Recommendations for enterprises Why put Pulse Secure on your radar? Pulse Secure has proven VPN and NAC technology that is used by its extensive customer base. It has added mobile containerization to address the BYOD challenge, with plans to offer its entire portfolio as cloud-based services later this year. It should be on your list of vendors to consider when choosing a secure access management platform. Highlights Pulse delivers VPN and NAC functionality via a software client downloaded to the endpoint, with support for Android, ios, and conventional laptop operating systems. When an endpoint logs onto a corporate network its technology checks whether it is compliant and imposes security policy based on its conclusion. For endpoints that do not belong to a company but are introduced into the work environment by an employee (i.e. in the BYOD scenario), MobileSpaces containerization technology enables it to separate personal and professional environments on the device and, if necessary, carry out a remote wipe of all corporate data, without affecting the user s personal information, contacts, Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 2
3 photos, and so on. It offers a single console from which companies can view their entire endpoint estate, both corporate and BYOD, called Pulse One, and is also working on integrations with SIEM platforms for customers who prefer to manage endpoint security and access from a broader, overarching console. Background Pulse Secure is the result of private equity firm Siris Capital s October 2014 acquisition of the VPN and NAC business from Juniper Networks. Pulse immediately acquired mobile endpoint security vendor MobileSpaces to add a BYOD security capability to its arsenal. As one might expect, Pulse s management team includes a number of former Juniper executives, but it is led by CEO Sudhakar Ramakrishna, who was previously senior vice-president and general manager for the Enterprise and Service Provider Division at Citrix, prior to which he held management positions at Polycom, Motorola, 3Com, and US Robotics. Current position Pulse debuted as an independent company with $100m in revenue, 20,000 enterprise customers, and some 20 million endpoints under management. It continues to leverage Juniper as a key route to market for its VPN technology. The company s roadmap features plans to offer what it terms its next-generation secure access technology as cloud-based services, with the Microsoft Azure cloud as the first target from which to launch later this year. It also plans integration with leading security incident and event management (SIEM) platforms, with IBM s QRadar scheduled for the next release of the Pulse platform. The challenge Pulse faces is not, of course, that of a start-up, in that it debuts with a major client base and a healthy run rate. Rather it is the need to differentiate itself in the crowded market for enterprise mobility management (EMM) and, more generally, for endpoint security and network access technology (see Ovum Decision Matrix: Selecting an Endpoint/Mobile Security Solution, for a selection of the leading providers in this market). The issue is liable, at least in part, to be one of market education; there is currently a confusing plethora of vendors, with some offering conventional VPN technology (e.g. F5 and Citrix), some NAC (such as ForeScout), and some EMM platforms (such as AirWatch and MobileIron). Pulse needs to inform potential new customers that it competes with all these companies, but with a broad portfolio that can also collaborate with their technologies if the customer already has one of them in its infrastructure. Data sheet Key facts Table 1: Data sheet: Pulse Secure Product name The Pulse Secure solution suite includes Pulse Connect Secure (VPN), Pulse Policy Secure (NAC), Pulse Workspace (Mobile Container), Pulse One Product classification Next-generation secure access Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 3
4 (Management) Version number Pulse Connect Secure 8.1; Release date Pulse Policy Secure 5.2; Pulse Workspace 1.3; Pulse One 1.0 Currently in general availability Industries covered All markets Geographies covered Global Relevant company sizes Small, medium, and large enterprises Licensing options Perpetual and subscription URL Routes to market Channel and direct Company headquarters San Jose, California, US Number of employees 300 Source: Ovum Appendix On the Radar On the Radar is a series of research notes about vendors bringing innovative ideas, products, or business models to their markets. Although On the Radar vendors may not be ready for prime time, they bear watching for their potential impact on markets and could be suitable for certain enterprise and public sector IT organizations. Further reading Ovum Decision Matrix: Selecting an Endpoint/Mobile Security Solution, , IT (August 2014) Author Rik Turner, Senior Analyst, Infrastructure Solutions rik.turner@ovum.com Ovum Consulting We hope that this analysis will help you make informed and imaginative business decisions. If you have further requirements, Ovum s consulting team may be able to help you. For more information about Ovum s consulting capabilities, please contact us directly at consulting@ovum.com. Copyright notice and disclaimer The contents of this product are protected by international copyright laws, database rights and other intellectual property rights. The owner of these rights is Informa Telecoms and Media Limited, our affiliates or other third party licensors. All product and company names and logos contained within or appearing on this product are the trademarks, service marks or trading names of their respective owners, including Informa Telecoms and Media Limited. This product may not be copied, reproduced, distributed or transmitted in any form or by any means without the prior permission of Informa Telecoms and Media Limited. Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 4
5 Whilst reasonable efforts have been made to ensure that the information and content of this product was correct as at the date of first publication, neither Informa Telecoms and Media Limited nor any person engaged or employed by Informa Telecoms and Media Limited accepts any liability for any errors, omissions or other inaccuracies. Readers should independently verify any facts and figures as no liability can be accepted in this regard readers assume full responsibility and risk accordingly for their use of such information and content. Any views and/or opinions expressed in this product by individual authors or contributors are their personal views and/or opinions and do not necessarily reflect the views and/or opinions of Informa Telecoms and Media Limited. Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 5
6 CONTACT US INTERNATIONAL OFFICES Beijing Dubai Hong Kong Hyderabad Johannesburg London Melbourne New York San Francisco Sao Paulo Tokyo Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 6
On the Radar: CipherCloud
Cloud access security delivered on enterprise gateways Publication Date: 18 Feb 2015 Product code: IT0022-000305 Rik Turner Summary Catalyst CipherCloud develops cloud visibility and security technology
More informationHow To Use Syncplicity Panorama On A Mobile Device
On the Radar: Syncplicity Panorama New mobile content access tools for modern business work styles Publication Date: 11 Mar 2015 Product code: IT0021-000064 Richard Edwards Summary Catalyst The typical
More informationOvum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15
Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15 Excerpt prepared for Egnyte, Inc. Publication Date: 28 Aug 2014 Product code: IT0021-000018 Richard Edwards Summary Catalyst
More informationOn the Radar: Tamr. Applying machine learning to integrating Big Data. Publication Date: Sept. 2014 Product code: IT0014-002934.
Applying machine learning to integrating Big Data Publication Date: Sept. 2014 Product code: IT0014-002934 Tony Baer Summary Catalyst Traditional data integration approaches may not scale for Big Data.
More informationOn the Radar: ForgeRock
Identity management for B2C and the Internet of Things Publication Date: 03 Dec 2015 Product code: IT0022-000500 Rik Turner Summary Catalyst ForgeRock develops identity and access management (IAM) technology
More informationSWOT Assessment: BeyondTrust Privileged Identity Management Portfolio
SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 11 Jun 2015 Product code: IT0022-000387 Andrew Kellett
More informationAddressing Enterprise Needs with a Software Defined Network Platform
Addressing Enterprise Needs with a Software Defined Network Platform Dynamic, customizable approach meets customer demand Date: December 2015 Author: Mike Sapien Ovum view Enterprise customers have virtualized
More informationSWOT Assessment: BMC Remedy v9
SWOT Assessment: BMC Remedy v9 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 17 Aug 2015 Product code: IT0022-000489 Adam Holtby Summary Catalyst BMC Software is an
More informationSWOT Assessment: Alfresco, Alfresco One, v5.0
SWOT Assessment: Alfresco, Alfresco One, v5.0 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: May 5 th, 2015 Product code: IT0014-003012 Sue Clarke Summary Catalyst When
More informationWeb Application Firewalls: The TCO Question
Web Application Firewalls: The TCO Question Ovum looks into total cost of ownership for WAFs Rik Turner Summary Catalyst Ovum has carried out a series of interviews with companies in North America, Europe,
More informationRe-architecting Legacy Systems is the Keystone for Transformation
Re-architecting Legacy Systems is the Keystone for Transformation Legacy modernization lays the groundwork for the modern enterprise An Ovum White Paper Contents Executive summary... Introduction... Key
More informationCase Study: Vitamix. Improving strategic business integration using IT service management practices and technology
Improving strategic business integration using IT service management practices and technology Publication Date: 17 Sep 2014 Product code: IT0022-000180 Adam Holtby Summary Catalyst For Vitamix, a key driver
More informationFinancial services perspectives on the role and real impact of cloud
Financial services perspectives on the role and real impact of cloud Executive Summary Ovum has recently concluded an independent and in-depth survey of 400 senior CIOs within financial services institutions
More informationHP s revitalized workforce optimization suite is worth a fresh look
HP s revitalized workforce optimization suite is worth a fresh look Publication Date: 27 Jul 2015 Product code: IT0020-000139 Keith Dawson Ovum view Summary When contact center buyers look to acquire workforce
More informationHybrid WAN Services emerging as a viable network option
Hybrid WAN Services emerging as a viable network option Customers now going beyond MPLS-based services Date: December 2015 Author: Mike Sapien Summary In a nutshell Business customers have relied on MPLS-based
More informationOn the Radar: Alation harnesses crowdsourcing and machine learning to speed data access
On the Radar: Alation harnesses crowdsourcing and machine learning to speed data access Summary Catalyst As organizations widen their net and analyze more data sources, it becomes all too easy for business
More informationEnterprise Content Management: The Suite Perspective
Enterprise Content Management: The Suite Perspective Publication Date: 04 Dec 2015 Product code: IT0014-003079 Sue Clarke Summary Catalyst The Ovum Decision Matrix: Selecting an Enterprise Content Management
More informationOn the Radar: JReport
Embedded reporting and analytics Publication Date: April 30 th, 2015 Product code: IT0014-003010 Surya Mukherjee Summary Catalyst Jinfonet Software, through its reporting and dashboarding applications,
More informationOn the Radar: Apperian MAM
Mobile application management and enterprise app store Publication Date: 12 May 2015 Product code: IT0021-000082 Richard Absalom Summary Catalyst There is a massive opportunity for enterprises to develop,
More informationSWOT Assessment: CoreMedia, CoreMedia Platform
SWOT Assessment: CoreMedia, CoreMedia Platform Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 12 May 2016 Product code: IT0014-003122 Sue Clarke Summary Catalyst Organizations
More informationFinancial Institutions and the cloud: moving from BAU to business transformation
Financial Institutions and the cloud: moving from BAU to business transformation Summary Catalyst The role of cloud technology among banks and insurers has been hotly debated over the last 5 years, creating
More informationPublic Sector Enterprises and Cloud Computing: Realizing Efficiencies
Public Sector Enterprises and Cloud Computing: Realizing Efficiencies Summary Catalyst Cloud technology, and its suitability for public services, continues to be a subject that polarizes CIOs. For some,
More informationLMS and Student Success at Greenville College: A Case Study
LMS and Student Success at Greenville College: A Case Study Overcoming hurdles to improve student retention Publication Date: 23 May 2014 Product code: IT0008-000200 Navneet Johal SUMMARY Catalyst Confusion
More informationWinning with Emerging CRM Channels. An Ovum White Paper
Winning with Emerging CRM Channels An Ovum White Paper Introduction If there has been one constant over the past five years, it is the shift in how consumers interact not just with each other, but how
More informationThe Future of Payments 2015: Financial Institutions. The Payments Value Chain is Driven by Customers
The Future of Payments 2015: Financial Institutions The Payments Value Chain is Driven by Customers 1 Catalyst Payments Are at a Crossroads The payments market is changing. From cash to checks, to charge
More information2015 Global Payments Insight: Bill Pay Services. With big change comes big opportunity
2015 Global Payments Insight: Bill Pay Services With big change comes big opportunity Catalyst Payments are at a crossroads The payments market is changing. From cash to checks, to charge and credit cards,
More informationMaking analytics a first-class healthcare citizen: lessons from Oracle customers
Making analytics a first-class healthcare citizen: lessons from Oracle customers Publication Date: 21 Nov 2014 Product code: IT0011-000335 Charlotte Davies Ovum view Summary Technology is being increasingly
More informationOvum Decision Matrix: Selecting an Enterprise Mobility Management Solution, 2014 15
Ovum Decision Matrix: Selecting an Enterprise Mobility Management Solution, 2014 15 Publication Date: 17 Sep 2014 Product code: IT0021-000023 Richard Absalom Summary Catalyst Organizations of all shapes
More informationHow To Understand The Implications Of Outsourced Testing
Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 2015 Author: Thomas Reuner Summary Catalyst The emergence of comprehensive outsourced testing of software applications, in which
More information2015 Trends to Watch: Higher Education
2015 Trends to Watch: Higher Education Leveraging IT to benefit the institutional mission Publication Date: 05 Nov 2014 Product code: IT0008-000217 Navneet Johal Summary Catalyst The higher education industry
More informationOvum Decision Matrix: Selecting an Enterprise Mobility Management Solution, 2014 15
Ovum Decision Matrix: Selecting an Enterprise Mobility Management Solution, 2014 15 Publication Date: 17 Sep 2014 Product code: IT0021-000023 Richard Absalom Summary Catalyst Organizations of all shapes
More informationOvum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution, 2015 16
Ovum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution, 2015 16 Publication Date: 29 Jul 2015 Product code: IT0022-000410 Roy Illsley Summary Catalyst The role and purpose
More informationHow To Rank Customer Analytics Vendors
Ovum Decision Matrix: Selecting a Customer Analytics Solution for Telcos, 2015 16 Publication Date: 10 Sep 2015 Product code: IT0012-000135 Adaora Okeleke Summary Catalyst Telcos quest for a competitive
More informationRealising possibilities in the cloud: The need for a trusted broker
Realising possibilities in the cloud: The need for a trusted broker Sponsored by BT and Cisco Camille Mendler Summary Catalyst This report draws on a custom study of the cloud experiences and plans of
More informationOvum Decision Matrix: Selecting a Customer Interaction Analytics Vendor, 2014 15
Ovum Decision Matrix: Selecting a Customer Interaction Analytics Vendor, 2014 15 Publication Date: 15 Sep 2014 Product code: IT0020-000050 Aphrodite Brinsmead Summary Catalyst Contact centers are more
More informationData Center Automation: Market Landscape and Maturity Model
Data Center Automation: Market Landscape and Maturity Model Assessing the organizational readiness and market in data center automation Publication Date: 16 Dec 2015 Product code: IT0022-000569 Roy Illsley
More informationCA Service Management Solutions 14.1
CA Service Management Solutions 14.1 CA Technologies Publication Date: 06 Apr 2016 Product code: IT0022-000623 Adam Holtby Summary Catalyst IT functions are subject not only to the enterprise-wide mandate
More informationOvum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 15
Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 15 Publication Date: 06 Jan 2015 Product code: IT0019-003398 Thomas Reuner Summary Catalyst The emergence of comprehensive outsourced
More informationSWOT Assessment: Eccentex AppBase v5.0
SWOT Assessment: Eccentex AppBase v5.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002764 Publication Date: 29 Jul 2013 Author: Sue Clarke SUMMARY Catalyst Eccentex
More informationRethinking Cloud Content Collaboration in Financial Services
Rethinking Cloud Content Collaboration in Financial Services Executive Summary The financial services sector generally prefers to take a risk-averse approach to new technology trends, with the need for
More informationThe Critical Role for Cloud in the Transformation of Retail Banks
The Critical Role for Cloud in the Transformation of Retail Banks Kieran Hines, Practice Leader, Financial Services Technology Executive summary The merits of cloud technology in retail banking have been
More informationOn the Radar: Truphone
Publication Date: 05 Sep 2013 Product code: TE007-000702 Pauline Trotter SUMMARY In a nutshell Truphone started out as a mobile VoIP player, but is mostly known as a specialist that has concentrated on
More informationThe Critical Impact of Cloud for Insurance on Business Transformation
The Critical Impact of Cloud for Insurance on Business Transformation Charles Juniper, Senior Insurance Analyst Executive summary Cloud technology and its role within the insurance industry has generated
More informationHow To Understand The Internet Of Things
www.ovum.com The Internet of Things: Understanding the evolving value chain Jamie Moss, Senior Analyst, Consumer Technology & IoT Gary Barnett, Chief Analyst, Software, Ovum Ovum s Internet of Things (IoT)
More informationOn the Case: HCL News Corp (News UK)
On the Case: HCL News Corp (News UK) HCL s feasibility assessment framework reduces cloud migration complexities Publication Date: 28 Nov 2014 Product code: IT0021-000045 Kedar Mohite Summary Catalyst
More informationEnterprise Mobility: The Impact of Changing Employee Behaviour
Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility richard.absalom@ovum.com / @RichAbsalom 23 April 2015 1 About Ovum Leading independent
More informationDare to Share: Putting the Data into Data-Driven Services. Adopting master data management technology to rise to the challenge of austerity
Dare to Share: Putting the Data into Data-Driven Services Adopting master data management technology to rise to the challenge of austerity SUMMARY Catalyst Local authorities across the UK are being tasked
More informationOn the Radar: Esri UK
On the Radar: Esri UK Geographic information reveals the determinants of better health Reference Code: IT011 000316 Publication Date: 30 May 2013 Author: Cornelia Wels Maug SUMMARY Catalyst The adoption
More informationCore Operations Modernization in the Global Insurance Industry
Core Operations Modernization in the Global Insurance Industry An Ovum White Paper Publication Date: October 2015 Sponsored by Summary In brief The need to transform core operations environments is the
More informationOSS/BSS market overview and vendor landscape, 2Q13-1Q14
www.ovum.com OSS/BSS market overview and vendor landscape, 2Q13-1Q14 Market overview 2 Publicly announced OSS/BSS contracts, 2Q13 1Q14 Source: Ovum 3 The global OSS/BSS market, 2Q13 1Q14 Overall, the number
More informationSecuring BYOD With Network Access Control, a Case Study
Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device
More information2016 Global Payments Insight Survey: Merchants and Retailers. Changing the merchant experience
2016 Global Payments Insight Survey: Merchants and Retailers Changing the merchant experience 1 Catalyst Payment players need to rethink roles and relationships The payments industry has always been an
More informationOn the Radar: NextPlane
On the Radar: NextPlane Unified communications federation delivered via the cloud Reference Code: IT016-001534 Publication Date: 24 Sep 2013 Author: Saurabh Sharma SUMMARY Catalyst NextPlane UC Exchange
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationBest Practices for Secure Mobile Access
Best Practices for Secure Mobile Access A guide to the future. Abstract Today, more people are working from more locations using more devices than ever before. Organizations are eager to reap the benefits
More informationOn the Radar: EMC Supplier Exchange
On the Radar: EMC Supplier Exchange Addressing key issues for managers of complex contracts in energy and engineering Reference Code: IT023-000006 Publication Date: 11 Jun 2014 Author: Warren Wilson SUMMARY
More informationWHITE PAPER. BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013 14
BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013 14 BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013
More informationImageWare Systems, Inc.
ImageWare Systems, Inc. Delivering next-generation biometrics as an interactive and scalable cloud-based service SUMMARY Catalyst ImageWare Systems, Inc. (IWS) is a developer of leading-edge, identity-based,
More informationThe Mobilisation of Workspace Services
The Mobilisation of Workspace Services Summary Catalyst The consumerization and ubiquitous availability of smartphones and tablets are having a major impact on employees expectations of enterprise IT.
More informationSecunia Corporate Software Inspector (Secunia CSI) ver.5.0
TECHNOLOGY AUDIT Secunia Corporate Software Inspector (Secunia CSI) ver.5.0 Secunia Reference Code: OI00070-107 Publication Date: December 2011 Author: Andy Kellett SUMMARY Catalyst Organizations need
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationMobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More information2015 Trends to Watch: Enterprise Collaboration and Productivity
2015 Trends to Watch: Enterprise Collaboration and Productivity Adopting next-generation mobility, collaboration, and productivity tools for an empowered workforce Publication Date: 01 Dec 2014 Product
More informationCA Performance Management Solution for Communications Service Providers
CA Performance Management Solution for Communications Service Providers CA Technologies Publication Date: 23 Mar 2015 Product code: IT0012-000102 Peter Dykes Summary Catalyst Flexible and cost-effective
More informationSupporting Workforce Mobility: Best Practices in Enterprise Mobility Management
Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationSWOT Assessment: CoreMedia, CoreMedia 7
SWOT Assessment: CoreMedia, CoreMedia 7 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002848 Publication Date: 09 Dec 2013 Author: Sue Clarke SUMMARY Catalyst Web
More informationSWOT Assessment: FireMon Security Manager Suite v7.0
SWOT Assessment: FireMon Security Manager Suite v7.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT017-004174 Publication Date: 12 Aug 2013 Author: Andrew Kellett SUMMARY
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationOn the Radar: Tessella
On the Radar: Tessella Creating an archive for the long-term preservation of digital content Reference Code: IT014-002789 Publication Date: 04 Sep 2013 Author: Sue Clarke SUMMARY Catalyst Ensuring that
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationSecuring Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
More informationCityNext: Microsoft's Future City Market Proposition
CityNext: Microsoft's Future City Market Proposition Driving a "people-first" approach with the right technology Reference Code: IT007-000728 Publication Date: 30 Oct 2013 Author: Joe Dignan SUMMARY Catalyst
More informationStaying agile with Big Data
An Ovum white paper for Red Hat Publication Date: 09 Sep 2014 Tony Baer Summary Catalyst Like any major technology project, organizations implementing Big Data projects face challenges with aligning business
More informationSWOT Assessment: dotcms dotcms v2.5
SWOT Assessment: dotcms dotcms v2.5 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002855 Publication Date: 13 Dec 2013 Author: Sue Clarke SUMMARY Catalyst Traditional
More informationThe Forrester Wave : Enterprise Mobile Management, Q4 2015
The Forrester Wave : Enterprise Mobile Management, Q4 2015 by Christian Kane Why Read This Report In Forrester s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the
More informationOvum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 15
Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 15 Publication Date: 06 Jan 2015 Product code: IT0019-003398 Thomas Reuner Summary Catalyst The emergence of comprehensive outsourced
More informationSA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
More informationData Networking Technology Roadmap
Networking Study: Wave 10 Data Networking Technology Roadmap Capturing networking professionals adoption plans, projected spending and vendor short-lists, the indepth roadmap covers 17 technologies including:
More informationMobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
More informationCitrix announces 50% YoY revenue growth from cloud partners, Workspace Services
Citrix announces 50% YoY revenue growth from cloud partners, Workspace Services Analyst: Scott Ottaway Michael Coté 5 Jun, 2014 At Synergy, Citrix announced 50% YoY revenue growth via Citrix Service Providers,
More informationCase Study: Unifying ITSM Practices and Technology
Case Study: Unifying ITSM Practices and Technology SBM Offshore Reference Code: EI025-000007 Publication Date: 17 Jun 2014 Author: Adam Holtby SUMMARY Catalyst As a result of corporate expansions, mergers,
More informationNetwork Management Software Technology Roadmap
Networking Study: Wave 10 Network Management Software Technology Roadmap Capturing networking professionals adoption plans, projected spending and vendor short-lists, the indepth roadmap covers six technologies
More informationHow To Get A Better Desktop Management System
IDC MARKETSCAPE IDC MarketScape Excerpt: Worldwide Client Virtualization Software 2013 Vendor Assessment Brett Waldman Iris Feng THIS IDC MARKETSCAPE EXCERPT FEATURES: NCOMPUTING IDC MARKETSCAPE FIGURE
More informationMobile Security Without Barriers
SAP Mobile Secure Mobile Security Without Barriers Securing your enterprise for all the new and expanding mobile use cases is similar to protecting your home. Merely locking your doors won t suffice. You
More informationRESEARCH NOTE. Workplace Service. Hot Vendors in Video Conferencing, 2015
June 11, 2015 Author: David Mario Smith Hot Vendors in Video Conferencing, 2015 Summary: Videoconferencing is at an inflection point: emerging software-based offerings are disrupting traditional hardware
More informationHow To Be A Cloud Leader In The Telecoms World Through Cloud Success
Cloud Strategy Snapshot: T-Systems Standing out in the telecoms world through cloud success Publication Date: 01 May 2015 Product code: TE0005-000706 Adrian Ho Ovum view Summary T-Systems has long been
More informationSECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationThe Case for Mobile Experience Virtualization: Citrix HDX Mobile SDK Creates New Opportunities for Partners
BUYER CASE STUDY The Case for Mobile Experience Virtualization: Citrix HDX Mobile SDK Creates New Opportunities for Partners Brett Waldman IDC OPINION This IDC Buyer Case Study is based on a conversation
More informationOvum Decision Matrix: Selecting a Mobile App Development Platform Solution, 2015 16
Ovum Decision Matrix: Selecting a Mobile App Development Platform Solution, 2015 16 Publication Date: 16 Feb 2015 Product code: IT0022-000223 Michael Azoff Summary Catalyst Mobile device software is where
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationSecunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
More informationSpecializing in visualizing and analyzing clinical trials data
ON THE RADAR Comprehend Systems Specializing in visualizing and analyzing clinical trials data Reference Code: OI00193-012 Publication Date: February 2012 Author: Andrew Brosnan and Cornelia Wels-Maug
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More information