Magic Quadrant for Network Access Control VIEW SUMMARY Most NAC vendors provide good support for the BYOD use case. Now, the market is evolving to

Size: px
Start display at page:

Download "Magic Quadrant for Network Access Control VIEW SUMMARY Most NAC vendors provide good support for the BYOD use case. Now, the market is evolving to"

Transcription

1 Magic Quadrant for Network Access Control VIEW SUMMARY Most NAC vendors provide good support for the BYOD use case. Now, the market is evolving to address another use case, where NAC policy servers act as "warehouses of context" and share contextual data with firewalls and other security components to enable fine-grained policy enforcement. Market Definition/Description The BYOD phenomenon continues to be the primary driver for the adoption of network access control (NAC). Without NAC policies, corporate BYOD programs allow unchecked network access by a wide array of personally owned devices, thereby increasing the chances of security risks and network instability. To gain more visibility into the configuration of mobile devices, many organizations are integrating their enterprise mobility management (EMM) solutions with their NAC solutions. This is an important trend, and it enables network managers to enforce policies such as blocking devices (or limiting their network access) that are missing EMM agents. There is a wide discrepancy in the market between vendors that support multiple EMM partners (several support seven or more) and those that only support one or two. The ability to give customers choices for integrating with multiple EMM systems was an important factor this year in calculating Completeness of Vision scores. Another important NAC trend is the integration with other security components, such as next-generation firewalls, advanced threat defense (ATD) solutions and security information and advanced management (SIEM) solutions. Forwardthinking NAC vendors have positioned their solutions as "warehouses of context" to share contextual information with third-party security components. For example, NAC systems can send user identification to a firewall so that it can apply fine-grained policies based on this information. Contextual information can also be shared with SIEMs, sandboxes and other ATD solutions, where it is mapped to an IP address to provide context for security operations teams that are responding to alerts. Some enterprises use NAC to automatically remove endpoints from the network, in response to alerts from ATD systems. This use case is limited to highly security conscious organizations. Integrating with network and security solutions is not a primary driver for adopting NAC, but enterprises are progressively implementing these integrations after the initial rollout of NAC. Magic Quadrant Figure 1. Magic Quadrant for Network Access Control

2 Source: Gartner (December 2014) Vendor and Aruba Networks Aruba Networks, based in Sunnyvale, California, sells its ClearPass Access Management offering. It is a Remote Authentication Dial-In User Service (RADIUS)-based solution that is available in a family of hardware and virtual

3 appliances. Aruba's customers should consider ClearPass. ClearPass provides integration capabilities through the ClearPass Exchange API promoting contextual sharing integration with third-party security solutions. Examples include SIEM, EMM and next-generation firewalls. Aruba has a strong BYOD strategy. It integrates with AirWatch, MobileIron and several other EMM solutions. The ClearPass Onboard module, which includes a certificate authority, supports more operating systems (seven) than any other onboarding module in the NAC market. In supporting Chrome OS and Ubuntu, ClearPass is a strong option for the education vertical. ClearPass offers a strong guest network application. Granular policies allow employees to create Apple AirPrint and AirPlay and Google Chromecast dynamic policies for their guests. For example, printers and projectors can be shared with guests based on the time and location restrictions that are tied to that guest policy. In multivendor networks, ClearPass customers that have not implemented Aruba's Mobility Controllers lose advanced functionality, including Apple AirPlay visibility and support for Aruba's auto-sign-on feature. Gartner rarely sees ClearPass in wired LAN environments. ClearPass sales are driven primarily by Aruba wireless customers. Auconet Auconet, a privately held company, moved its headquarters from Germany to the U.S. (San Francisco) in The research and development team is still based in Germany. Auconet has been delivering NAC solutions since It is deployed most commonly as an agentless solution, because its RADIUS-based policy server supports native 802.1X supplicants embedded in multiple operating systems. Its Business Infrastructure Control Solution (BICS) is available as a hardware appliance, virtual appliance and SaaS. Auconet also offers an optional permanent agent on Windows, Unix/Linux platforms and Mac OS. Organizations that need to apply NAC policies to industrial and supervisory control and data acquisition (SCADA) environments, or that would benefit from a multitenant NAC solution, should consider Auconet. Large enterprises should also consider Auconet. Historically, Auconet has targeted the European market. Organizations outside of Europe should verify Auconet's ability to provide service and support. BICS' support for large-scale multitenancy appeals to managed security service providers (MSSPs) that offer managed NAC services. BICS enables NAC for industrial environments by implementing specific industrial protocols. For example, Siemens licenses BICS to help support SCADA environments that it manages. Customer references consistently commented favorably on the solution's agentless approach and its ease of administration. Auconet's BYOD strategy is limited. At the time of this report, it had only integrated with Citrix and MobileIron EMM solutions. Integrations with third-party security solutions are limited. Auconet has not completed integrations with any firewall or advanced threat defense vendors. Auconet has a limited geographic reach and only a small but growing presence in the U.S. Customers and prospects outside of Europe and Asia/Pacific may face challenges in obtaining presales and postsales support from the company.

4 Bradford Networks Bradford Networks is a privately held company based in Boston, Massachusetts, that has been delivering NAC solutions since Its Network Sentry/NAC product is available in hardware appliances, in a virtual appliance and as a cloud service. The Network Sentry/RTR (Rapid Threat Response) is an additional application that shares contextual information about endpoints and provides tools for security analysts to respond to alerts from next-generation firewalls, advanced threat defense solutions and other security products (Network Sentry/RTR is sold separately). Network Sentry/RTR can also respond to alerts automatically by quarantining compromised endpoints. Consider Bradford Networks' NAC products for heterogeneous networks and wide mixes of endpoint devices. Bradford Networks has one of the broadest sets of integration partners in the NAC market. Network Sentry integrates with multiple solutions in each of the following categories: EMM, firewall, SIEM, advanced threat defense and other security solutions. Bradford Networks partners with managed services providers (Windstream and DecisionOne) that offer the Network Sentry products as a cloud-based service. Bradford Networks offers a unique cloud-based analytics service that helps its customers analyze trends about devices and users that connect to their networks. Customers use this information to develop network access policies and to plan for wireless LAN capacity. Bradford has a strong presence in the education vertical. Network Sentry/NAC has several features (including device registration) and integrations (such as eduroam) that are important in education networks. The vast majority of Bradford Networks' customers are in North America. Prospective customers outside of North America should validate that its partners can provide an appropriate level of support in their respective regions. Some reference customers requested improvements in the Network Sentry/NAC reporting capabilities. Bradford Networks claims these issues have been addressed in its 2014 reporting updates. Gartner clients are advised to validate these enhancements. Cisco Cisco is headquartered in San Jose, California. Its Identity Services Engine (ISE) policy server is RADIUS-based, which enables Cisco to support authentication in heterogeneous network infrastructure environments (although advanced NAC features will require Cisco components). ISE is available in hardware appliances and also as a virtual server. Cisco packages ISE software in several licensing options, including a mobility-only license. Cisco customers should consider ISE, especially when the Cisco AnyConnect endpoint client will be in use. Cisco has a strong BYOD strategy. ISE integrates with AirWatch, MobileIron and solutions from several other EMM vendors. Version 1.3 of ISE supports an optional onboarding module that includes a certificate authority. This feature simplifies BYOD implementations, since enterprises do not need to implement a third-party certificate authority. ISE leverages technology that is embedded in Cisco network infrastructure components to provide unique benefits. For example, it uses endpoint

5 profiling data collected from Cisco switches and wireless controllers, eliminating the need to deploy stand-alone profiling sensors. TrustSec enables granular identity-based policies on many Cisco LAN, WLAN and firewall products. Cisco's pxgrid initiative enables network and security solutions to coordinate the sharing of contextual information (such as identity and location) through ISE. pxgrid also enables integrated technology partners to use ISE to execute mitigation actions in response to events. Early pxgrid partners include Splunk, Ping Identity, NetIQ, Tenable Network Security, Emulex and Bayshore Networks. Some Cisco Sourcefire products also support pxgrid. ISE includes a strong guest administration module that is highly customizable. Cisco's status as a network security vendor is an obstacle when it comes to partnering with other network security vendors. For example, mainstream firewall vendors and third-party sandboxing vendors have not yet integrated with pxgrid. ISE does not enforce advanced policies on Cisco Meraki wireless LAN access points (Meraki includes its own NAC functions). ISE is capable of enforcing basic authentication policies with Meraki. Enterprises that are interested in implementing TrustSec's role-based identity policies should perform careful testing in a lab environment. Adoption of TrustSec has been slow, as some key Cisco products have only recently added TrustSec support (for example, TrustSec support for ASA Security Appliances was added in July 2014). With TrustSec deployments, network teams may encounter challenges typical of early adopters of new technology. Extreme Networks Extreme Networks, based in San Jose, California, acquired Enterasys in 2013 and began selling its NAC solution and the broader Enterasys security product portfolio. Extreme's NAC appliance and NetSight NAC management system are available as virtual appliances or hardware appliances. The primary use case for Extreme NAC is its wired and wireless customers, since they benefit from Extreme's integrated functionality. Also, the solution is capable of supporting non-extreme environments. Extreme's NAC solution integrates with multiple solutions in each of the following categories: firewall, SIEM, advanced threat defense and other security solutions. Extreme has a good strategy for pursuing the K-12 environment. Its NAC solution integrates with secure Web gateway (SWG) vendors iboss Network Security and Lightspeed Systems, both of which target the K-12 vertical. Extreme has a good BYOD strategy. Its Mobile IAM component integrates with AirWatch, MobileIron and several other EMM solutions. Extreme's NAC solution integrates with several nonsecurity solutions, including OpenStack and Microsoft Lync. The Lync integration enables Extreme to apply dynamic policies per call (for example, prioritize voice traffic over the data network). Policy enforcement is inconsistent across Extreme switches and Enterasys switches. Policy controls are more granular with the Enterasys switches.

6 Extreme Networks suffers from limited brand awareness in the NAC market. Gartner clients rarely include Extreme on their shortlists when evaluating NAC vendors. ForeScout Technologies ForeScout Technologies is a privately held company based in Campbell, California, that sells the CounterACT family of hardware and virtual appliances. Although ForeScout offers optional agents, its clientless approach eases the support of Windows, OS X and Linux endpoints. ForeScout also offers a series of integration modules (for an additional fee) that share contextual information about endpoints. These tools enable security analysts to respond to alerts from next-generation firewalls, advanced threat defense solutions and other security products. The integration modules utilize ForeScout's ControlFabric API and enable CounterACT to respond to alerts automatically and initiate mitigation actions. At the time of this writing, the company has an interim CEO (as of June 2014). ForeScout should be considered for midsize and large NAC deployments. ForeScout has one of the broadest sets of integration partners in the NAC market. Using the ControlFabric series of APIs, CounterACT integrates with multiple solutions in the following categories: firewall, SIEM, advanced threat defense and other security solutions. ForeScout has a strong BYOD strategy. In addition to supporting integrations with several EMM vendors, it also sells a ForeScout-branded EMM solution (an OEM of IBM's offering), and it offers the ForeScout Mobile Security Module. The latter is an "EMM-lite" solution that enforces device policies and reports health and configuration status back to the CounterACT appliance. Users continue to cite ease of deployment, flexible enforcement methods and network visibility as primary selection criteria. ForeScout has some of the largest active deployments of all vendors. Obtaining postadmission threat protection (an optional feature) in distributed environments requires CounterACT appliances at each remote location, which drives up the cost of deployment. ForeScout customers have the option of implementing CounterACT appliances in a centralized approach, which is less expensive but reduces ForeScout's threat protection functionality. In its most commonly implemented approach, CounterACT is positioned on Switched Port Analyzer (SPAN) or "mirror" ports on core network switches. Network administrators need to ensure the availability of these ports in their networks. Impulse Point Based in Lakeland, Florida, and founded in 2004, Impulse Point continues its focus on the higher education and K-12 markets. Impulse Point delivers its flagship SafeConnect solution as a managed service, which includes system monitoring, problem determination and resolution, updates to device type, antivirus and OS profiling recognition, and remote backup of policy configuration data. All Impulse Point products can be implemented as a hardware or virtual appliance. Education institutions should consider Impulse. SafeConnect integrates with a wide range of EMM, SIEM, bandwidth management, firewall and advanced threat solutions via its Contextual Intelligence Publisher module. Integrations with iboss Network Security,

7 Exinda and Procera Networks strengthen Impulse's ability to target the education vertical. Feedback from Impulse Point customers continues to indicate that SafeConnect can be quickly implemented. Its optional Layer 3 approach to enforcement eliminates the need to test compatibility at Layer 2 (at the LAN switch level). Impulse Point customers consistently point to the company's service and support as strengths. SafeConnect's dashboard console is not as customizable or flexible as some competing offerings. SafeConnect's Layer 3-based enforcement technique does not meet the needs of most corporate environments. Customers have the option of using a new RADIUS-based 802.1X enforcement feature, although Impulse's RADIUS server is not as feature-rich as others in this market. Impulse has been primarily targeting North American customers, and has only recently expanded into Europe. Customers and prospects outside of North America may face challenges obtaining presales and postsales support from the company. InfoExpress Founded in 1993, InfoExpress is a privately held company based in Mountain View, California, that is largely focused on the NAC market. Its CGX solution is available as a hardware appliance and a virtual appliance. Enterprises that need a scalable solution that doesn't require hardware at remote sites should consider InfoExpress. CGX correlates data from multiple sources (for example, InfoExpress endpoint agents, Syslogs, Nmap data and MobileIron) to enable more-granular NAC policies. By analyzing when devices change state, CGX can enforce the appropriate policy. For example, when a mobile device reported as stolen reappears on the network, CGX can quarantine the device. InfoExpress offers endpoint agents for a wide variety of operating systems, including Windows, OS X, Apple ios, Android and Linux. InfoExpress does not require hardware at remote locations, due to its Dynamic NAC feature (an agent-based Address Resolution Protocol [ARP] enforcement solution). InfoExpress only integrates with one EMM vendor (MobileIron). InfoExpress has limited integrations with third-party security components. For example, it does not share contextual data about network endpoints with third-party security components, such as firewalls, SIEM and advanced threat defense solutions. InfoExpress' lack of marketing focus hampers its ability to differentiate its product and contributes to the company's low visibility among Gartner clients. Portnox Portnox moved its headquarters to the U.S. in 2014, and retained its research and development facilities in Israel. The company was founded in 2007 and is a pure-play NAC vendor. The Portnox solution is agentless and based on endpoint discovery. When a device connects to the network, Portnox checks the OS type and applies the appropriate policy to the network access point (LAN switch, WLAN controller or VPN gateway). Historically, the company has been focused on

8 the EMEA region. Organizations that can tolerate the risk of a startup and that are within the geographic range of Portnox's service and support coverage should consider this vendor. Portnox has a good BYOD strategy. It integrates with AirWatch, MobileIron and several other EMM solutions. Portnox integrates with a wide range of third-party firewall and advanced threat defense solutions. The company's customers consistently report that the Portnox solution is easy to deploy and manage. It attaches to any LAN switch port and does not require a "mirror" or SPAN port. Portnox can enforce NAC policies in a VMware environment. For example, it monitors and graphically represents the number of virtual machines (VMs) in use and enforces policies for these VMs by blocking or allowing access to virtual switches. To achieve the maximum benefits of Portnox at remote locations, the vendor suggests deployment of its Knoxer software (free of charge) at each location. Without Knoxer, the process of isolating and remediating endpoints may be inconsistent, as it will vary according to the infrastructure at the remote location. Customization of Portnox may be required to enable special-purpose endpoints, such as security cameras or videoconferencing systems, to gain network access. Because endpoint discovery is at the core of the Portnox solution, all endpoints must be accurately profiled. Some customers commented that Portnox's library of profiled devices could be larger to avoid the customization effort required to identify nonstandard endpoints. Portnox lacks a strong distribution channel in North America. Customers and prospects in North America may face challenges in obtaining presales and postsales support from the company. Pulse Secure Pulse Secure is a newly formed company that was created when private equity firm Siris Capital acquired the Junos Pulse business from Juniper Networks. In addition to its NAC solution, Pulse Secure also offers a VPN solution and a mobile security suite. In October 2014, Pulse Secure acquired MobileSpaces, a provider of virtual container technology for mobile devices. In the 2013 Network Access Control Magic Quadrant, Juniper was positioned in the Challengers section. This year, Pulse Secure is positioned in the Niche Players quadrant. The drop in Ability to Execute is due in part to the multiple challenges faced by establishing a new company, including branding, sales and distribution, and operational issues. Pulse Secure's NAC solution is based on a RADIUS platform and is available as a family of hardware and virtual appliances. Pulse Secure should be considered by Juniper and non-juniper customers. The Pulse Secure solution remains tightly integrated with Juniper's core security products (firewall, intrusion prevention system [IPS] and Secure Sockets Layer [SSL] VPN), network infrastructure offerings (LAN switches) and SIEM solution. When implemented with Pulse Secure, Juniper's network and security components provide strong support for identitybased policies (role-based policies). Pulse Secure's Unified Mobility Client reduces the number of agents required for network access by integrating an SSL VPN client and a NAC agent. The

9 NAC component provides authentication and endpoint configuration assessment. Pulse Secure has established full FIPS compliance and EAL3 certification for its NAC products. These certifications provide an advantage in government procurements, because most other NAC vendors have yet to meet these qualifications. Pulse Secure lags many competitors in its ability to integrate with solutions from other security vendors. The Policy Secure policy server does not integrate with non-juniper firewalls, and it does not integrate with any network-based advanced threat detection solutions (for example, sandboxes). Pulse Secure does not own device profiling technology. It relies on an OEM partner for this functionality. Pulse Secure only provides two options for third-party EMM integration AirWatch or MobileIron. Pulse Secure is missing some features that are important in 802.1X environments. It lacks a standards-based approach for Change of Authorization (CoA), a feature that enables a policy server to communicate policy changes to the network infrastructure. Also, Pulse Secure does not offer an embedded certificate authority. Customers must implement an external certificate authority to enable 802.1X-based device authentication. Vendors Added and Dropped We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor's appearance in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may be a reflection of a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor. Added None Dropped StillSecure After being acquired by private equity firm Versata in 2013, StillSecure shifted its focus to the small-to-midsize market business segment. The company still retains support for its legacy U.S. Department of Defense customers. Inclusion and Exclusion Criteria To be included in this Magic Quadrant, a vendor's solution must be able to enforce NAC policies in a heterogeneous infrastructure environment. In addition, vendors' solutions must include the policy, baseline and access control elements of NAC, as defined by the following criteria: Policy The NAC solution must include a dedicated policy management server with a management interface for defining and administering security configuration requirements, and for specifying the access control actions (for example, allow or quarantine) for compliant and noncompliant endpoints. Because policy administration and reporting functions are key areas of NAC innovation and differentiation, vendors must own the core policy function to be included in this Magic Quadrant. Baseline A baseline determines the security state of an endpoint that is attempting a network connection, so that a decision can be made about

10 the level of access that will be allowed. Baselining must work in heterogeneous endpoint environments (for example, Windows, Mac OS X, Apple ios and Android). It must include the ability to assess policy compliance (for example, up-to-date patches and antivirus signatures for Windows PCs, or the presence of an EMM agent for mobile devices). Various technologies may be used for the baseline function, including agentless solutions (such as vulnerability assessment scans), dissolvable agents and persistent agents. NAC solutions must include a baseline function, but "reinventing the wheel" is not necessary. Baseline functionality may be obtained via an OEM or licensing partnership. Access control The NAC solution must include the ability to block, quarantine or grant partial (limited access) or full access to an endpoint. The solution must be flexible enough to enforce access control in a multivendor network infrastructure, and it must be able to enforce access in wired LAN, wireless LAN and remote access environments. Enforcement must be accomplished either via the network infrastructure (for example, 802.1X, virtual LANs or access control lists [ACLs]) or via the vendor's NAC solution (for example, dropping/filtering packets or ARP spoofing). Vendors that rely solely on agent-based endpoint self-enforcement do not qualify as NAC solutions. Additional criteria include: Vendors must integrate with one or more EMM solutions. Network infrastructure vendors must have demonstrated their ability in 2013 and 2014 to sell NAC solutions beyond their installed base of infrastructure customers. NAC vendors must consistently target and show wins at enterprises with 5,000 endpoints and above to be included. This Magic Quadrant does not analyze solutions that only target the small to midsize (SMB) market. Vendors must have an installed base of at least 100 customers or an aggregate endpoint coverage of 500,000 endpoints. The vendor must have at least $5 million in NAC sales during the 12 months leading up to 1 November Solutions that do not directly generate revenue for the vendor, such as those that embed basic NAC functionality in other products at no extra charge, have been excluded from this analysis. The NAC solutions had to be generally available as of 1 November Evaluation Criteria Ability to Execute Product or Service: An evaluation of the features and functions of the vendor's NAC solution, including the ability to integrate with solutions that provide network visibility and event monitoring. Due to the influence of the BYOD trend on NAC, this criterion heavily weights the ability to establish and enforce policies in heterogeneous endpoint environments (Windows, Mac OS X, Apple ios and Android). Other BYOD-related NAC functions, such as profiling of endpoints and guest networking services, have been heavily weighted. Overall Viability: An assessment of the vendor's overall financial health, the financial and practical success of the business unit, and the likelihood of the individual business unit to continue to invest in an NAC solution. Market Responsiveness/Record: The speed in which the vendor has spotted a market shift and produced a product that is sought after by potential customers. This criterion includes an assessment of how quickly NAC vendors have added

11 partnerships with other security vendors. Marketing Execution: The effectiveness of the vendor's marketing programs and its ability to create awareness and mind share in the NAC market. Vendors that frequently appear on client shortlists are succeeding in marketing execution. Customer Experience: Quality of the customer experience based on input from Gartner clients and vendor references. Input is gathered via reference calls and an online survey. Table 1. Ability to Execute Evaluation Criteria Criteria Weight Product or Service High Overall Viability High Sales Execution/Pricing Not Rated Market Medium Responsiveness/Record Marketing Execution Medium Customer Experience Operations Medium Not Rated Source: Gartner (December 2014) Completeness of Vision Market Understanding: The ability to anticipate market trends, such as the impact of BYOD, and to quickly adapt via partnerships, acquisitions or internal development. Marketing Strategy: An analysis of whether the vendor's marketing strategy succeeds in differentiating its NAC solution from its competitors. Sales Strategy: The vendor's strategy for selling to its target audience, including an analysis of the appropriate mix of direct and indirect sales channels. Offering (Product) Strategy: An evaluation of the vendor's strategic product direction and its road map for NAC. The product strategy should address trends that are reflected in Gartner's client inquiries. Vertical/Industry Strategy: The vendor's strategy for meeting the specific needs of individual vertical markets and market segments. For example, does the vendor have an effective strategy for pursuing vertical markets that have been aggressive adopters of NAC, such as higher education, healthcare and financial services? Innovation: An assessment of product leadership and the ability to deliver NAC features and functions that distinguish the vendor from its competitors. Geographic Strategy: The vendor's strategy for penetrating geographies outside its home or native market. Table 2. Completeness of Vision Evaluation Criteria Evaluation Criteria Weighti ng Market Understanding High Marketing Strategy Medium Sales Strategy Medium Offering (Product) High Strategy Business Model Not Rated Vertical/Industry Low Strategy

12 Innovation Geographic Strategy Medium Low Source: Gartner (December 2014) Quadrant Descriptions Leaders Leaders are successful in selling large NAC implementations (10,000 nodes and greater) to multiple large enterprises. Leaders are pure-play NAC vendors or networking and/or security companies that have been first to market with enhanced capabilities as the market matures. Leaders have the resources to maintain their commitment to NAC, have strong channel strength and have financial resources. They have also demonstrated a strong understanding of the future direction of NAC, including the impact of BYOD. Leaders should not equate to a default choice for every buyer, and clients should not assume that they must buy only from vendors in the Leaders quadrant. Challengers Challengers are networking and/or security companies that have been successful in selling NAC to their installed bases, although they are generally unsuccessful in selling NAC to the broader market. Challengers are generally not NAC innovators, but are large enough and diversified enough to continue investing in their NAC strategies. They are able to withstand challenges and setbacks more easily than Niche Players. Visionaries Visionaries have led the market in product innovation and/or displayed an early understanding of market forces and trends. They are smaller pure-play NAC vendors or larger networking and/or security companies. A common theme among Visionary vendors is that they don't have significant channel strength in the NAC market and have not succeeded in building installed bases as large as those of vendors in the Leaders quadrant. Niche Players Niche Players are typically strong in strategic NAC verticals (for example, education and healthcare) and certain geographies. They don't often appear on Gartner clients' shortlists, but they are valid options for organizations within those key geographies and vertical industries. Context If your organization faces BYOD challenges, consider solutions that can easily profile personally owned mobile devices, and apply controls that are consistent with your organization's mobile device policies. Because there are multiple approaches for enforcing NAC policies (for example, virtual LANs, firewalls and access control lists), look for solutions that best fit your network infrastructure. Market Overview Gartner estimates that the size of the 2014 NAC market will be approximately $460 million, an increase of about 36% over In 2015, we expect growth to be more conservative, at approximately 20%. The slower growth is a result of many highly security-conscious organizations already implementing NAC to address the BYOD trend. Organizations with less demanding security requirements are taking a "good enough" approach to controlling BYOD by implementing EMM, but are not integrating it with NAC. The "good enough" strategy (EMM-only) enables organizations to enforce policies on mobile devices, but without NAC integration there is no ability to enforce network access policies. The downside to this scenario is that noncompliant mobile devices (for example, a tablet without an EMM agent) could still gain access to the network.

13 There are no Challengers in the Magic Quadrant this year. Network infrastructure vendors could fit the profile of a Challenger. For example, if a network infrastructure vendor highly visible in the NAC market with many NAC customers had difficulty selling NAC beyond its installed base, the vendor would be a candidate for the Challengers quadrant. The pool of candidates for the Challengers quadrant is small. Many network infrastructure vendors still do not own NAC technology (although many partner with NAC vendors), so they are not eligible for inclusion in this Magic Quadrant. In 2014, the smaller NAC vendors did not grow quickly enough to be positioned in the Challengers quadrant. EVALUATION CRITERIA DEFINITIONS Ability to Execute Product/Service: Core goods and services offered by the vendor for the defined market. This includes current product/service capabilities, quality, feature sets, skills and so on, whether offered natively or through OEM agreements/partnerships as defined in the market definition and detailed in the subcriteria. Overall Viability: Viability includes an assessment of the overall organization's financial health, the financial and practical success of the business unit, and the likelihood that the individual business unit will continue investing in the product, will continue offering the product and will advance the state of the art within the organization's portfolio of products. Sales Execution/Pricing: The vendor's capabilities in all presales activities and the structure that supports them. This includes deal management, pricing and negotiation, presales support, and the overall effectiveness of the sales channel. Market Responsiveness/Record: Ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the vendor's history of responsiveness. Marketing Execution: The clarity, quality, creativity and efficacy of programs designed to deliver the organization's message to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This "mind share" can be driven by a combination of publicity, promotional initiatives, thought leadership, word of mouth and sales activities. Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups, service-level agreements and so on. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure, including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis.

14 Completeness of Vision Market Understanding: Ability of the vendor to understand buyers' wants and needs and to translate those into products and services. Vendors that show the highest degree of vision listen to and understand buyers' wants and needs, and can shape or enhance those with their added vision. Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the website, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling products that uses the appropriate network of direct and indirect sales, marketing, service, and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: The vendor's approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature sets as they map to current and future requirements. Business Model: The soundness and logic of the vendor's underlying business proposition. Vertical/Industry Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including vertical markets. Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or preemptive purposes. Geographic Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market.

Magic Quadrant for Network Access Control

Magic Quadrant for Network Access Control 1 of 7 23-12-2014 9:30 x` Magic Quadrant for Network Access Control 10 December 2014 ID:G00262737 Analyst(s): Lawrence Orans, Claudio Neiva VIEW SUMMARY Most NAC vendors provide good support for the BYOD

More information

Magic Quadrant for Network Access Control

Magic Quadrant for Network Access Control G00262737 Magic Quadrant for Network Access Control Published: 10 December 2014 Analyst(s): Lawrence Orans, Claudio Neiva Most NAC vendors provide good support for the BYOD use case. Now, the market is

More information

How To Understand The Gartner'S Network Access Control (Nac) Index

How To Understand The Gartner'S Network Access Control (Nac) Index Page 1 of 10 Magic Quadrant for Network Access Control 12 December 2013 ID:G00249599 Analyst(s): Lawrence Orans VIEW SUMMARY NAC vendors are beginning to differentiate their solutions through their breadth

More information

Ability to Execute. What You Need to Know

Ability to Execute. What You Need to Know 1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact

More information

Magic Quadrant for Global Enterprise Desktops and Notebooks

Magic Quadrant for Global Enterprise Desktops and Notebooks Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main

More information

How To Choose An Access Control System

How To Choose An Access Control System G00219752 Magic Quadrant for Network Access Control Published: 8 December 2011 Analyst(s): Lawrence Orans, John Pescatore The BYOD phenomenon is driving growth in the NAC market as organizations seek to

More information

Case Study & POC & Demos Information

Case Study & POC & Demos Information Case Study & POC & Demos Information Type: Case Study Name: Multichannel Campaign Management (MCCM) Description: The IBM Company seeks, as vendor, through the multichannel campaign management (MCCM) services,

More information

Magic Quadrant for Network Access Control

Magic Quadrant for Network Access Control Research Publication Date: 27 March 2009 ID Number: G00166224 Magic Quadrant for Network Access Control Lawrence Orans, John Pescatore, Mark Nicolett Network infrastructure, endpoint protection and network

More information

Unlike the general notebook market, in which

Unlike the general notebook market, in which Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools Magic Quadrant for Client Management Tools 22 May 2014 ID:G00260863 Analyst(s): Kevin Knox, Terrence Cosgrove VIEW SUMMARY EVALUATION CRITERIA DEFINITIONS New client management tool capabilities have emerged

More information

Cisco Secure BYOD Solution

Cisco Secure BYOD Solution Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice

More information

ForeScout Technologies Is A Leader Among Network Access Control Vendors

ForeScout Technologies Is A Leader Among Network Access Control Vendors For ForeScout Technologies Is A Leader Among Network Access Control Vendors Excerpted From The Forrester Wave : Network Access Control, Q2 2011 by John Kindervag with Stephanie Balaouras, Robert Whiteley,

More information

How To Improve Your Network Security

How To Improve Your Network Security Matthias Meier VP Engineering, bw digitronik 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1 Inadequate Visibility Inadequate Collaboration Inadequate Automation 2013 ForeScout

More information

Magic Quadrant for CRM Service Providers, North

Magic Quadrant for CRM Service Providers, North Magic Quadrant for CRM Service Providers, North America 30 August 2010 Matthew Goldman, Ed Thompson Gartner RAS Core Research Note G00205524 Demand for CRM project-based consulting and implementation services

More information

On the Radar: Pulse Secure

On the Radar: Pulse Secure Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT0022-000431 Rik Turner Summary Catalyst Pulse Secure is a developer of secure

More information

Cisco TrustSec Solution Overview

Cisco TrustSec Solution Overview Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...

More information

The 2H05 Magic Quadrant for managed

The 2H05 Magic Quadrant for managed Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

Secure Your Mobile Device Access with Cisco BYOD Solutions

Secure Your Mobile Device Access with Cisco BYOD Solutions Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple

More information

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Paul Cochran - Account Manager. Chris Czerwinski System Engineer Paul Cochran - Account Manager Chris Czerwinski System Engineer Next-Generation NAC Fast and easy deployment No infrastructure changes or network upgrades No need for endpoint agents 802.1X is optional

More information

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...

More information

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Addressing BYOD Challenges with ForeScout and Motorola Solutions Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

INSERT COMPANY LOGO HERE

INSERT COMPANY LOGO HERE INSERT COMPANY LOGO HERE 2014 Frost & Sullivan 1 We Accelerate Growth Technology Innovation Leadership Award Network Security Global, 2014 Frost & Sullivan s Global Research Platform Frost & Sullivan is

More information

2012 North American Enterprise Firewalls Market Penetration Leadership Award

2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 Frost & Sullivan 1 We Accelerate Growth Market Penetration Leadership Award Enterprise Firewalls North America, 2012

More information

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius 1 The Evolving Security World The Easy Internet High Degree of IT control Slow rate of change

More information

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...

More information

MarketScope for IT Governance, Risk and Compliance Management, 2008

MarketScope for IT Governance, Risk and Compliance Management, 2008 MarketScope for IT Governance, Risk and Compliance Management, 2008 Gartner RAS Core Research Note G00154941, Paul E. Proctor, Mark Nicolett, French Caldwell, 11 February 2008, RA7 03032009 The IT GRCM

More information

Magic Quadrant for IT Vendor Risk Management

Magic Quadrant for IT Vendor Risk Management (http://www.gartner.com/home) LICENSED FOR DISTRIBUTION Magic Quadrant for IT Vendor Risk Management 29 October 2014 ID:G00263243 Analyst(s): Christopher Ambrose, Gayla Sullivan, Kris Doering Summary The

More information

Magic Quadrant for the Wired and Wireless LAN Access Infrastructure

Magic Quadrant for the Wired and Wireless LAN Access Infrastructure Magic Quadrant for the Wired and Wireless LAN Access Infrastructure 26 June 2014 ID:G00261463 Analyst(s): Tim Zimmerman, Andrew Lerner, Bill Menezes VIEW SUMMARY We evaluate a variety of LAN vendors providing

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools G00247238 Magic Quadrant for Client Management Tools Published: 9 April 2013 Analyst(s): Terrence Cosgrove The client management tool market is maturing and evolving to adapt to consumerization, desktop

More information

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges

More information

Check Point Positions

Check Point Positions Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.

More information

ClearPass: Understanding BYOD and today s evolving network access security requirements

ClearPass: Understanding BYOD and today s evolving network access security requirements ClearPass: Understanding BYOD and today s evolving network access security requirements ClearPass: Understanding BYOD and today s evolving network access security requirements Chapter 1: Introduction............................

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation

ForeScout CounterACT. Continuous Monitoring and Mitigation Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time

More information

Readiness Assessments: Vital to Secure Mobility

Readiness Assessments: Vital to Secure Mobility White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats

More information

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization

More information

Network Access Control in Virtual Environments. Technical Note

Network Access Control in Virtual Environments. Technical Note Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved

More information

Magic Quadrant for Energy and Utilities Enterprise Asset Management Software

Magic Quadrant for Energy and Utilities Enterprise Asset Management Software Magic Quadrant for Energy and Utilities Enterprise Asset Management Software 29 September 2014 ID:G00263205 Analyst(s): Leif Eriksen, Kristian Steenstrup VIEW SUMMARY For energy and utility (including

More information

2014 Cisco and/or its affiliates. All rights reserved.

2014 Cisco and/or its affiliates. All rights reserved. 2014 Cisco and/or its affiliates. All rights reserved. Cisco Meraki: a complete cloud-managed networking solution - Wireless, switching, security, and MDM, centrally managed over the web - Built from the

More information

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

Meraki: Introduction to Cloud Networking

Meraki: Introduction to Cloud Networking Meraki: Introduction to Cloud Networking April 30, 2014 Sharif Kotb Meraki Business Manager KSA, UAE, Turkey, & Qatar Agenda About Cisco s Cloud Managed Networking Cloud Architecture Solution Overview

More information

Magic Quadrant for Intrusion Prevention

Magic Quadrant for Intrusion Prevention Page 1 of 9 Magic Quadrant for Intrusion Prevention Systems 5 July 2012ID:G00222572 Analyst(s): Greg Young, John Pescatore VIEW SUMMARY The network intrusion prevention system market is undergoing a period

More information

Magic Quadrant for Storage Professional and Support Services

Magic Quadrant for Storage Professional and Support Services Magic Quadrant for Storage Professional and Support Services Gartner RAS Core Research Note G00157182, Adam W. Couture, Robert E. Passmore, 30 July 2008 Gartner evaluates storage service providers and

More information

ControlFabric Interop Demo Guide

ControlFabric Interop Demo Guide ControlFabric Interop Demo Guide Featuring The ForeScout ControlFabric Interop Demo at It-Sa 2014 showcases integrations with our partners and other leading vendors that can help you achieve continuous

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

SSL VPN 1H03 Magic Quadrant Evaluation Criteria

SSL VPN 1H03 Magic Quadrant Evaluation Criteria Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and

More information

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software

More information

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management Magic Quadrant for Security Information and Event Management 25 June 2014 ID:G00261641 Analyst(s): Kelly M. Kavanagh, Mark Nicolett, Oliver Rochford VIEW SUMMARY EVIDENCE Broad adoption of SIEM technology

More information

Personal firewalls extend company firewall

Personal firewalls extend company firewall Magic Quadrant for Personal Firewalls, 1Q06 Gartner RAS Core Research Note G00139942, John Girard, 27 June 2006, R1901 06302007 Personal firewalls extend company firewall policy to block attacks against

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Bitdefender GravityZone Sales Presentation

Bitdefender GravityZone Sales Presentation 6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility

More information

IT Security. Muscat 15+ ABOUT US IN A GLANCE

IT Security. Muscat 15+ ABOUT US IN A GLANCE www.insight.co.om insightoman insightoman insightoman insight-information-technology www.insight.co.om insightoman insightoman insightoman insight-information-technology ABOUT US LOCATION Visit us at

More information

Technical Note. CounterACT: 802.1X and Network Access Control

Technical Note. CounterACT: 802.1X and Network Access Control CounterACT: 802.1X and Contents Introduction...3 What is 802.1X?...3 Key Concepts.... 3 Protocol Operation...4 What is NAC?...4 Key Objectives.... 5 NAC Capabilities.... 5 The Role of 802.1X in NAC...6

More information

Strategic Road Map for Network Access Control

Strategic Road Map for Network Access Control G00219087 Strategic Road Map for Network Access Control Published: 11 October 2011 Analyst(s): Lawrence Orans, John Pescatore Long derided as an overhyped concept, network access control (NAC) has emerged

More information

Delivering Control with Context Across the Extended Network

Delivering Control with Context Across the Extended Network Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or

More information

Magic Quadrant for Secure Web Gateways

Magic Quadrant for Secure Web Gateways Magic Quadrant for Secure Web Gateways 28 May 2015 ID:G00267241 Analyst(s): Lawrence Orans, Peter Firstbrook VIEW SUMMARY The market for SWG solutions is still dominated by traditional on premises appliances.

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

vsrx Services Gateway: Protecting the Hybrid Data Center

vsrx Services Gateway: Protecting the Hybrid Data Center Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud

More information

Cisco & Big Data Security

Cisco & Big Data Security Cisco & Big Data Security 巨 量 資 料 的 傳 輸 保 護 Joey Kuo Borderless Networks Manager hskuo@cisco.com The any-to-any world and the Internet of Everything is an evolution in connectivity and collaboration that

More information

Magic Quadrant for Intrusion Prevention

Magic Quadrant for Intrusion Prevention Magic Quadrant for Intrusion Prevention Systems 16 December 2013 ID:G00253078 Analyst(s): Adam Hils, Greg Young, Jeremy D'Hoinne VIEW SUMMARY Market Definition/Description The network intrusion prevention

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security... WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive

More information

Whitepaper. Securing Visitor Access through Network Access Control Technology

Whitepaper. Securing Visitor Access through Network Access Control Technology Securing Visitor Access through Contents Introduction 3 The ForeScout Solution for Securing Visitor Access 4 Implementing Security Policies for Visitor Access 4 Providing Secure Visitor Access How it works.

More information

Magic Quadrant for Higher Education Administrative Suites, 2005

Magic Quadrant for Higher Education Administrative Suites, 2005 Industry Research Publication Date: 21 November 2005 ID Number: G00131715 Magic Quadrant for Higher Education Administrative Suites, 2005 Marti Harris, Michael Zastrocky With Oracle's acquisition of PeopleSoft,

More information

Ability to Execute. 1 von 22 15.06.2010 17:55. What You Need to Know

Ability to Execute. 1 von 22 15.06.2010 17:55. What You Need to Know 1 von 22 15.06.2010 17:55 13 May 2010 Mark Nicolett, Kelly M. Kavanagh Gartner RAS Core Research Note G00176034 Broad adoption of SIEM technology is driven by compliance and security needs. New use cases

More information

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...

More information

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document

More information

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2 WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

Sample - Cloud Storage Layer. explore@researchfox.com +1-408-469-4380 +91-80-6134-1500 www.researchfox.com

Sample - Cloud Storage Layer. explore@researchfox.com +1-408-469-4380 +91-80-6134-1500 www.researchfox.com Sample - Cloud Storage Layer explore@researchfox.com +1-408-469-4380 +91-80-6134-1500 www.researchfox.com 1 ResearchFox Consulting is an Indian market research and consulting firm based in Bangalore. We

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

OneFabric Connect. Overview. Extend the OneFabric architecture to 3rd party applications DATA SHEET BENEFITS BUSINESS ALIGNMENT

OneFabric Connect. Overview. Extend the OneFabric architecture to 3rd party applications DATA SHEET BENEFITS BUSINESS ALIGNMENT DATA SHEET OneFabric Connect Extend the OneFabric architecture to 3rd party applications BUSINESS ALIGNMENT Embrace BYOD by mixing and matching managed and unmanaged devices on the same infrastructure

More information

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

Cisco Meraki solution overview. 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Meraki solution overview. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Meraki solution overview 2010 Cisco and/or its affiliates. All rights reserved. Cisco Meraki: a complete cloud-managed networking solution - Wireless, switching, security, WAN optimization, and MDM,

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms

Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Gartner RAS Core Research Note G00158295, French Caldwell, Tom Eid, 30 June 2008, R2799 07092009 The market for enterprise governance,

More information

Evolving Network Security with the Alcatel-Lucent Access Guardian

Evolving Network Security with the Alcatel-Lucent Access Guardian T E C H N O L O G Y W H I T E P A P E R Evolving Network Security with the Alcatel-Lucent Access Guardian Enterprise network customers encounter a wide variety of difficulties and complexities when designing

More information

FASTER, SIMPLER AND SMARTER NETWORKS THROUGH SDN INNOVATION

FASTER, SIMPLER AND SMARTER NETWORKS THROUGH SDN INNOVATION DATA SHEET OneFabric Connect SDN Technology Solution Partners FASTER, SIMPLER AND SMARTER NETWORKS THROUGH SDN INNOVATION Today s highly distributed wired and wireless networks are designed for increased

More information

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Sophos Acquires Cyberoam

Sophos Acquires Cyberoam Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam

More information

The PC life cycle configuration management Market Overview

The PC life cycle configuration management Market Overview Magic Quadrant for PC Life Cycle Configuration Management, 2005 Gartner RAS Core Research Note G00131185, 17 October 2005, Ronni J. Colville, Michael A. Silver, R1580 05052006. The PC life cycle configuration

More information

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management Magic Quadrant for Security Information and Event Management Gartner RAS Core Research Note G00212454, Mark Nicolett, Kelly M. Kavanagh, 12 May 2011, RA 1-2494611471 05132012 Broad adoption of SIEM technology

More information

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Cisco IT Article December 2013 End-to-End Security Policy Control Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Identity Services Engine is an integral

More information

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through

More information

Securing Healthcare Data on Mobile Devices

Securing Healthcare Data on Mobile Devices Securing Healthcare Data on Mobile Devices Michelle Cook, Healthcare Mobility Specialist Keith Glynn, CISSP, Sr. Technical Solutions Engineer October 31, 2013 Poll Question #1 Has your organization deployed

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Your Security Partner of Choice

Your Security Partner of Choice Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools Magic Quadrant for Client Management Tools 31 January 2012 ID:G00225953 Analyst(s): Terrence Cosgrove VIEW SUMMARY We have renamed the Magic Quadrant for PC Configuration Life Cycle Management due to the

More information