The Business Value of Network-Based Intrusion Prevention Systems

Size: px
Start display at page:

Download "The Business Value of Network-Based Intrusion Prevention Systems"

Transcription

1 Sponsored by: Intel Security Authors: Elizabeth Corr Pete Lindstrom Matthew Marden February 2015 The Business Value of Network-Based Intrusion Prevention Systems EXECUTIVE SUMMARY Organizations depend on identifying, addressing, and remedying network-based security threats to support their IT users and to keep their businesses available and running. These threats continue to evolve at breakneck speed, but network-based intrusion prevention systems (IPSs) remain at the center of most organizations efforts to handle these threats. Companies count on IPS solutions to help them proactively identify more threats before Business Value Highlights More productive hours per user per year 1.9 Faster response time to network security threats 61% Improvement in IT security staff efficiencies 36% Five-year total business benefits $5.7M Five-year ROI: 463% Payback period: 7.2 months they become security events and move to resolution swiftly and with minimal business interruption. Organizations surveyed for this study use the McAfee Network Security Platform (NSP) as their IPS solution to help guard against sophisticated network-based attacks that can negatively impact their business operations. These Intel Security customers reported achieving significant IT and business benefits by leveraging the capabilities of McAfee NSP and integrating it with Intel Security s broader security architectures to identify more threats and limit their impact. As a result, these Intel Security customers are realizing the following benefits with McAfee NSP:» Identifying more network-based threats proactively» Preventing more threats from becoming security events that impact users and customers» Minimizing the amount of productive employee time lost due to security events» Making their IT security operations more efficient» Instilling greater confidence in security architectures and supporting business agility» Realizing efficiencies by integrating McAfee NSP with other security products Document # IDC. Page 1

2 In This Whitepaper This study presents IDC s analysis of the business value that seven Intel Security customers are achieving by using the McAfee Network Security Platform. These customers have an average of 11,386 employees and range in size from 200 to 30,000 employees. Although these organizations are mostly based in the United States, several have worldwide operations, with security threats having a diffuse geographical footprint. These organizations come from the energy, healthcare, government, IT outsourcing, technology service provider, real estate, and financial services industries. Table 1 provides an aggregate profile of the organizations interviewed for this white paper. TABLE 1 Demographics of Interviewed Organizations Average number of employees 11,386 Average number of IT staff 300 Average number of users (internal) 7,728 Average number of McAfee NSP devices 10 Average amount of time using McAfee NSP Industries Regions 3.3 years Energy, healthcare, government, IT outsourcing, technology service provider, real estate, and financial services United States, Turkey, and worldwide Situation Overview Amid all of the IT architecture changes occurring within and around enterprises today, there is one underlying constant the network will never go away. Of course, this is by definition a necessary means for communications, whether wired or wireless, within the datacenter or across the public cloud, or local or remote. As networks become more complex, organizations create more paths between resources clients and servers, servers to servers, and ultimately component to component that must be protected from direct and indirect attack. Document # IDC. Page 2

3 Meanwhile, attackers are getting smarter. Though they must follow the network paths available to them for inbound attacks and outbound compromise activities, they are constantly creating new ways of manipulating technology to avoid and evade the security put in place. They use polymorphic malware, impersonation that is often initiated through phishing, and other forms of obfuscation to accomplish their mission. Defenders must continue to evaluate and develop their security programs based on this information. Because the network provides fixed paths that connect resources, security solutions deployed on the network can gain economies of scale as well as logical separation by protecting many endpoints and/or many server-based resources. The benefits of a network approach are also reflected at the market level as companies look for their highest returns. IDC projects that network security will become the largest market in the security products category by 2018 and that the intrusion detection and prevention submarket will grow from $1.9 billion in 2013 to approximately $2.4 billion by But spending doesn t happen in a vacuum. As attackers continue to find ways to breach organizations, network security solutions must evolve to address these issues. But spending doesn t happen in a vacuum. As attackers continue to find ways to breach organizations, network security solutions must evolve to address these issues. To do this, they begin to integrate capabilities from adjacent products including advanced threat protection, endpoint security technologies, Web security, security intelligence and event management (SIEM), and antimalware functions. Perhaps even more importantly, today s network security solutions are centralizing management and monitoring functions to better handle all the data that is being created with these new advanced and integrated products. These centralized capabilities are better positioned to turn the data that is being aggregated and correlated into actionable intelligence. In the wake of many large companies experiencing public data breaches, companies are adjusting their security needs. The ability to incorporate multiple products into one product and integrate products leads to a better and broader understanding of the security network, which helps IT departments that may have limited staff, especially because it is difficult to find qualified IT specialists. Products that incorporate and prioritize the data and breaches for IT departments can help allocate IT staff time more effectively. These improvements lead to a more efficient IT department that is more effective at preventing attacks on companies. Mcafee Network Security Platform The McAfee Network Security Platform is a key solution in the network security market. It offers a number of capabilities to meet the needs of both network and security professionals. The number 1 rule of network security is you can t impede legitimate network traffic. This means even as security capabilities are being added, attention must be paid to the need for speeds and Document # IDC. Page 3

4 feeds on the network along with a focus on maintaining connectivity. This makes performance and high availability crucial to success. McAfee NSP is architected to support up to 40GB of traffic and can be deployed in both activeactive high-availability architectures and active-passive architectures. After organizations ensure a solution is unlikely to disrupt the network, their second area of need involves suitability to the task. That is, a solution must be adept at providing security capabilities by leveraging various techniques to detect and respond to attacks. McAfee NSP leverages signatures, behavioral heuristics, and related techniques to detect attacks. In addition, McAfee NSP leverages its Global Threat Intelligence capability to crowdsource the identification of potential attacks and malicious files across its network of customers. At this stage of security evolution, context is crucial. Successful network security solutions can integrate and share with other components of an architecture sensors on endpoints, aggregators, and other security solutions drive a holistic perspective that speeds up responses and drives program effectiveness. At this stage of security evolution, context is crucial. Successful network security solutions can integrate and share with other components of an architecture sensors on endpoints, aggregators, and other security solutions drive a holistic perspective that speeds up responses and drives program effectiveness. McAfee NSP offers integration with other McAfee components to share security-related information and build up the contextual understanding of an attack, providing more opportunity to separate out false positives and home in on the most important issues. Finally, network intrusion detection and prevention solutions must be manageable via a single console to maintain the necessary contextual continuity with a low total cost of ownership. McAfee NSP provides that important console through its centralized management capability and further in its integration with the epolicy Orchestrator (epo). It also leverages multitenancy capabilities to extend the flexibility in assigning tasks and security activities. The McAfee Network Security Platform is following many of the trends IDC is seeing in intrusion detection and prevention systems products. By incorporating SIEM features, endpoint features, malware detection attributes, and advanced threat protection attributes, this product helps companies see all of their security policies in one view. The product also allows the company to integrate with other Intel Security products, which leads to the same goal of providing a cohesive view of security policies and products as well as their effectiveness. Financial Benefits Analysis IDC asked Intel Security customers qualitative and quantitative questions about their use of McAfee NSP and aggregated data taken from these interviews to determine the product s Document # IDC. Page 4

5 average financial impact. IDC calculates that these organizations will capture average annual benefits worth $1.61 million over five years, or $20,811 per 100 users of the business applications protected by McAfee NSP. Intel Security customers attributed their ability to capture these financial benefits to a number of characteristics of McAfee NSP, including:» Consolidated nature. Customers benefit from the improved visibility achieved with McAfee NSP as a result of its consolidated nature.» Ability to integrate with security infrastructure. Customers view their ability to integrate McAfee NSP with their existing security architectures, including other McAfee products, as an advantage. McAfee NSP is a great system. It allows you to manage everything from one central console. So all of your updates come in, and they deploy in real time.» Ease of use. Customers praised the ease with which their teams can use McAfee NSP and the efficiencies this enables. As one customer explained, McAfee NSP is a great system. It allows you to manage everything from one central console. So all of your updates come in, and they deploy in real time. The financial benefits Intel Security customers using McAfee NSP are achieving fall into four main areas (see Figure 1):» IT staff productivity gains: Intel Security customers are making their IT security teams more efficient and productive. These teams can do more with McAfee NSP in place without a commensurate increase in staff size, or they save time that can be reallocated to innovation or improving security policies. IDC calculates that these time savings and efficiencies have an average annual value of $332,200 per organization over five years, or $4,298 per 100 users.» IT infrastructure cost reduction: Intel Security customers are creating and maintaining a scalable and secure environment with McAfee NSP while avoiding the costs associated with previous security solutions and certain other costs such as travel. This is saving Intel Security customers an average of $33,100 per organization per year over five years, or $428 per 100 users.» Risk mitigation user productivity benefits: Intel Security customers are identifying and remedying more network-related security threats before they cause user disruption. This has lowered the amount of productive employee time lost as a result of such security threats and events. IDC calculates that reducing productive employee time lost has an average annual value of $644,900 per organization over five years, or $8,346 per 100 users.» Business productivity benefits: Intel Security customers are maintaining a more secure and robust network environment. This carries through to the ability of the organizations to conduct business; they have more confidence in their security architectures and are more willing to take Document # IDC. Page 5

6 business risks, resulting in more revenue and improved business operations. These benefits are worth an average annual value of $598,100 per organization over five years, or $7,739 per 100 users. FIGURE 1 Average Annual Benefits per 100 Users 25,000 ($ per 100 users) 20,000 15,000 10,000 5,000 0 $4,298 IT staff productivity benefits $428 IT infrastructure cost reduction $8,346 Risk mitigation user productivity benefits $7,739 Business productivity benefits Total average annual benefits per 100 users: $20,811 IT Staff Productivity Benefits With NSP, all of the sensors go into NSP and it talks to the SIEM. So we have one point of collection versus 80. There s time savings with that, and data savings. I d say that, because of that, we re saving the SIEM guys 5 10 hours per week. Intel Security customers reported that they have leveraged McAfee NSP to make their IT security staff more efficient and productive, in addition to better serving their constituents by more quickly identifying and resolving network-related security threats. The IT security staff at these organizations spend less time responding to network-related security incidents and need less time to maintain and monitor their network security environments, enabling these customers to provide better security services at a lower cost while also freeing up IT security staff time to innovate and drive business. IDC calculates that McAfee NSP helps these organizations maintain an IT security team with an average of just over 6 employees compared with almost 10 employees required in companies without McAfee NSP. Intel Security customers referenced several advantages of using McAfee NSP for their IT security staff:» Simplified threat management. One customer summarized how McAfee NSP has simplified its network security efforts as follows: With NSP, all of the sensors go into NSP and it talks to the SIEM. So we have one point of collection versus 80. There s time savings with that, and data savings. I d say that, because of that, we re saving the SIEM guys 5 10 hours per week. Document # IDC. Page 6

7 » Time saved reviewing incident logs and data. As one customer explained, Because McAfee NSP has dashboards and alerts, I spend less time down in the trenches looking at raw data. So I have more time to look at overall policy and what it all means. Working with McAfee NSP, we can integrate it and connect it with our endpoint protection system. So when you re doing investigations, we can query and pull information together more quickly.» Easy integration with other McAfee security products. As one customer noted, Working with McAfee NSP, we can integrate it and connect it with our endpoint protection system. So when you re doing investigations, we can query and pull information together more quickly. The efficiencies achieved with McAfee NSP enable these organizations to provide superior network security and better support at a lower cost. IDC calculates that the IT security staff at these organizations are on average 36.1% more efficient with McAfee NSP. These efficiencies enable Intel Security customers to lower the cost of providing network security support or achieve better security postures without an increase in staff size while also opening up the possibility of reallocating IT staff time saved to innovating and improving other parts of IT operations (see Figure 2). FIGURE 2 IT Security Staff Costs and Savings 14,000 12,000 Total: $11,976 $1, % productivity gain / cost reduction ($ per 100 users per year) 10,000 8,000 6,000 4,000 $1,026 $855 $845 $7,715 $174 Total: $7,715 $7,715 IT security staff team with McAfee NSP IT security staff time savings Incident response time savings 2,000 IT security staff hires avoided IT security audit time savings 0 Without McAfee NSP With McAfee NSP Other IT security staff efficiencies and time savings Document # IDC. Page 7

8 Risk Mitigation Benefits We get a very complete view of what s going on in our network with McAfee NSP because we can see anything that comes into our network. Intel Security customers interviewed for this study praised McAfee NSP for providing them with the visibility they need to identify more network-related security threats and mitigate their impact. Improved visibility is the foundation for changing how these organizations approach network security threats and minimize the disruption these threats cause for users and operations when they become security events. As one customer explained, We get a very complete view of what s going on in our network with McAfee NSP because we can see anything that comes into our network. Intel Security customers using McAfee NSP have translated better visibility and integration of their network security operations to an improved ability to proactively identify security threats and reduce their threat response times. According to interviewed organizations, they proactively identify 47.7% more network-related threats with McAfee NSP. This means that, on average, they are now identifying almost two-thirds of networkbased threats proactively, which minimizes the number of security issues that cause disruption and lowers the likelihood of significant user-impacting events occurring. Meanwhile, these organizations have reduced their average threat response time from 15 minutes to 6 minutes, a 60.9% reduction, because they have better and more actionable information about threats. The result is that these customers are experiencing fewer user-impacting network-related security incidents and are resolving issues faster. One customer explained how McAfee NSP helps it reduce the impact of these incidents: We can identify threats before they become events with McAfee NSP because we see them come across as an event on there. We can then analyze it, and we can then go along with it, or we can create a policy for it, and we can restrict it at that point. As shown in Table 2 and Figure 3, these Intel Security customers have reduced the number of user-impacting security breaches and malware attacks substantially since deploying McAfee NSP. As a result, customers are losing 62.0% less productive time by incurring fewer security-related events. Document # IDC. Page 8

9 TABLE 2 Security KPIs Before McAfee After McAfee NSP NSP Benefit Advantage Proactively identifying threats 45.1% 66.6% 21.5 pp 47.7% before they become events Response time to threats (minutes) % User-impacting security breaches 1, % and malware incidents User-impacting network-related % downtime incidents Security-related productive time lost per user (hours) pp = percentage point Today, with McAfee NSP, we have about 50 malware attacks per month that require manual intervention. Before, all 2,000 malware attacks required manual intervention and were having an impact on users. Users of business applications running on the organizations networks are benefiting from fewer and less impactful disruptions from security events with McAfee NSP. Intel Security customers face relentless attacks that include advanced malware, zero-day threats, denial-ofservice (DoS) attacks, and botnets. McAfee NSP has enabled these customers to substantially reduce the number of user-impacting network security events they experience: 55.0% fewer downtime-causing incidents and 44.8% fewer user-impacting security breaches and malware incidents. As one customer explained, Today, with McAfee NSP, we have about 50 malware attacks per month that require manual intervention. Before, all 2,000 malware attacks required manual intervention and were having an impact on users. The bottom line for Intel Security customers using McAfee NSP is that their users now lose much less time to network-related downtime and performance degradation. Users are losing an average of 1.2 hours of productive time per year because of network-related security issues compared with 3.1 hours before deploying McAfee NSP. It is worth remembering that these are average figures across large user bases at some companies; some users gain back even more productive time. Intel Security customers have become more efficient as they reduce the cost that unproductive time exerts on their operations. In addition, Intel Security customers now finally understand the types of threats facing them. As one customer explained, We catch things with McAfee NSP and are like Gosh, this would have been bad. We see more and can analyze and either proactively address the situation or react in a quicker fashion. Document # IDC. Page 9

10 FIGURE 3 Cost of Unproductive Time Attributable to Network-Related Security Issues 15,000 Total: $13,123 ($ per 100 users per year) 12,000 9,000 6,000 3,000 0 $4,354 $4,565 $4,204 Before McAfee NSP 62% reduced impact Total: $4,992 $1,502 $1,372 $2,118 After McAfee NSP Security breaches Malware incidents Unplanned downtime Business Productivity Benefits Intel Security customers also reported leveraging improved network security outcomes with McAfee NSP to enhance their broader business positions. Fewer operational disruptions enable availability and continuity of operations providing organizations with the confidence they need to proactively address business opportunities. One customer described the impact of McAfee NSP as follows: I think we definitely have become more agile with NSP. We are more confident that we re protected, so we re able to do things within our network even when there are risks. Now that we know we re protected, and we know that we ve got our backs covered, we ll do more things than we would before. I think we definitely have become more agile with NSP. We are more confident that we re protected, so we re able to do things within our network even when there are risks. Now that we know we re protected, and we know that we ve got our backs covered, we ll do more things than we would before. Meanwhile, improved network performance with McAfee NSP can spur higher user productivity for some organizations as business applications perform better. Interviewed customers told IDC that an average of 15.1% of their users have become more productive with McAfee NSP, with the average impacted user gaining back more than four hours of productive time per year. Most interviewed Intel Security customers also said that improving their network security efforts with McAfee NSP either had enabled or likely had enabled them to capture more revenue. This revenue benefit accrues as these organizations face fewer operations-impacting Document # IDC. Page 10

11 downtime instances and other network-related outages, which helps them better serve their customers. For customers that depend on the performance of their networks to drive their businesses, minimizing disruptions is critical. As one Intel Security customer explained, We now handle probably one DoS attack manually per month compared with five before McAfee NSP. Our revenue can be impacted by these attacks, up to hundreds of thousands of dollars per attack. IDC assumes an operating margin of 20% on additional revenue to reflect the costs associated with gaining additional revenue. As a result, the $2,100,359 average annual revenue increase achieved by Intel Security customers using McAfee NSP is calculated as a financial benefit by applying a 20% operating margin, which results in a net revenue benefit of $420,072 (see Table 3). TABLE 3 Business Productivity Benefits Average per Organization Average per 100 Users Revenue increases Additional revenue with McAfee NSP $2,100,359 $27,179 Assumed operating margin 20% 20% Additional operating margin with McAfee NSP $420,072 $5,436 Productivity enhancements Users impacted 15.1% 15.1% Productivity increase 0.2% 0.2% User productivity gain $178,012 $2,304 Total business productivity benefits $598,084 $7,740 ROI Analysis IDC uses a discounted cash-flow methodology to calculate the return on investment (ROI) and payback period for the organizations investment in and use of McAfee NSP. ROI is the ratio of the net present value (NPV) and discounted investment. IDC has presented cost benefit and ROI analyses for both three- and five-year use cases for McAfee NSP (see Figure 4 and Table 4). Presenting results from both three- and five-year perspectives reflects the fact that Intel Security customers often view investment in McAfee NSP from a three-year perspective but consider it a five-year investment for purposes of accounting and depreciation. Document # IDC. Page 11

12 IDC assessed the cost, benefits, and value associated with the use of McAfee NSP by the seven Intel Security customers interviewed for this white paper. IDC calculates that these organizations are initially investing an average of $531,800 ($6,881 per 100 users) in McAfee NSP hardware, installation, consulting, and training. Annual costs for fees and support related to McAfee NSP total an average of $113,800 per organization ($1,472 per 100 users) over three years and $137,900 per organization ($1,784 per 100 users) over five years. IDC projects that in return, these Intel Security customers will achieve annual benefits worth an average of $1.47 million per organization ($19,062 per 100 users) over three years and $1.61 million per organization ($20,811 per 100 users) over five years (see Figure 4). FIGURE 4 Cost Benefit Analysis 100,000 80,000 Investment Benefits Cumulative net benefits $88,248 ($ per 100 users) 60,000 40,000 20,000 $15,738 $20,097 $45,884 $21,350 $22,704 $24, ,000 -$6,881 -$1,121 -$1,432 -$1,864 -$2,013 -$2,491 Initial Year 1 Year 2 Year 3 Year 4 Year 5 As shown in Table 4, Intel Security customers achieve substantial business value over both three- and five-year time frames. IDC s analysis shows that in terms of investment, the average organization interviewed for this white paper will spend $800,058 to implement and support McAfee NSP over three years ($10,353 per 100 users) and $1.01 million ($13,047 per 100 users) over five years. In return, the average organization will realize $3.50 million in benefits over three years ($45,270 per 100 users) and $5.67 million per organization ($73,411 per 100 users) over five years. Over three years, this results in a three-year net present value of $2.70 million per organization ($34,917 per 100 users) and an average ROI of 337%. This compares with a five-year net present value of $4.66 million per organization ($60,364) and an average Document # IDC. Page 12

13 five-year ROI of 463%. In either use case, interviewed organizations will have a time to value of just over seven months on average (i.e., the time it takes for them to break even on their investment in McAfee NSP). TABLE 4 ROI Analysis 3-Year Average 3-Year Average 5-Year Average 5-Year Average per Organization per 100 Users per Organization per 100 Users Benefit (discounted) $3.50 million $45,270 $5.67 million $73,411 Investment (discounted) $0.80 million $10,353 $1.01 million $13,047 Net present value (NPV) $2.70 million $34,917 $4.66 million $60,364 Return on investment (ROI) 337% 337% 463% 463% Payback period 7.2 months 7.2 months 7.2 months 7.2 months Discount rate 12% 12% 12% 12% Challenges/Opportunities Security markets can be fickle. Even while demonstrating benefits, product categories and individual solutions experience ups and downs associated with priorities as companies look to fill gaps in their coverage. As part of their strategic security programs, enterprises must evaluate network security as well. It is important for Intel Security to consider how its solution will fit in with the evolving network security architectures. Intel Security must ensure that its capabilities mirror the needs of changing architectures becoming more distributed and virtualized. In addition, integration with other security solutions is a must, including integration with other vendors solutions. As organizations work to optimize their full product portfolio, Intel Security must continue to develop this support in its solution. From an operational perspective, customers and vendors must work together for efficient implementations. While benefits are gained over the long term, there is some complexity associated with installing and configuring solutions as well as tuning their output. Careful consideration should be given to the old maxim garbage in, garbage out as enterprises increase the efficiency of their security programs. Document # IDC. Page 13

14 Conclusion As their networks grow more complex and connect more resources, organizations must be able to identify, deflect, and resolve as many security attacks as possible even as these attacks become smarter and more sophisticated. Failure to do so can create business interruptions that negatively affect employee productivity and ultimately organizations bottom lines. This IDC study demonstrates that Intel Security customers are achieving substantial business value by identifying more threats and limiting the impact of threats that turn into security events with McAfee NSP. As a result, these Intel Security customers have increased the efficiency of their IT security operations and reduced the amount of productive employee time lost while minimizing the possibility of security events that could harm their revenues or reputations. Appendix Methodology IDC utilized its standard ROI methodology for this project. This methodology is based on gathering data from current users of McAfee NSP as the foundation for the model. Based on these interviews, IDC performs a three-step process to calculate the ROI and payback period:» Measure the savings from reduced IT costs (staff, hardware, software, maintenance, and IT support), increased user productivity, and improved revenue over the term of the deployment.» Ascertain the investment made in deploying the solution and the associated training and support costs.» Project the costs and savings over a three-year period and a five-year period and calculate the ROI and payback for the deployed solution. IDC bases the payback period and ROI calculations on a number of assumptions, which are summarized as follows:» Time values are multiplied by burdened salary (salary + 28% for benefits and overhead) to quantify efficiency and manager productivity savings.» Downtime values are a product of the number of hours of downtime multiplied by the number of users affected.» The impact of unplanned downtime is quantified in terms of impaired end-user productivity and lost revenue. Document # IDC. Page 14

15 » Lost productivity is a product of downtime multiplied by burdened salary.» Lost revenue is a product of downtime multiplied by the average revenue generated per hour.» The net present value of the three- and five-year savings is calculated by subtracting the amount that would have been realized by investing the original sum in an instrument yielding a 12% return to allow for the missed opportunity cost. This accounts for both the assumed cost of money and the assumed rate of return. Because every hour of downtime does not equate to a lost hour of productivity or revenue generation, IDC attributes only a fraction of the result to savings. As part of our assessment, we asked each company what fraction of downtime hours to use in calculating productivity savings and the reduction in lost revenue. IDC then taxes the revenue at that rate. Further, because IT solutions require a deployment period, the full benefits of the solution are not available during deployment. To capture this reality, IDC prorates the benefits on a monthly basis and then subtracts the deployment time from the first-year savings. Note: All numbers in this document may not be exact due to rounding. IDC Global Headquarters 5 Speen Street Framingham, MA USA idc-insights-community.com Copyright Notice External Publication of IDC Information and Data Any IDC information that is to be used in advertising, press releases, or promotional materials requires prior written approval from the appropriate IDC Vice President or Country Manager. A draft of the proposed document should accompany any such request. IDC reserves the right to deny approval of external usage for any reason. Copyright 2015 IDC. Reproduction without written permission is completely forbidden. About IDC International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications and consumer technology markets. IDC helps IT professionals, business executives, and the investment community make fact-based decisions on technology purchases and business strategy. More than 1,100 IDC analysts provide global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries worldwide. For 50 years, IDC has provided strategic insights to help our clients achieve their key business objectives. IDC is a subsidiary of IDG, the world s leading technology media, research, and events company. Document # IDC. Page 15

The Business Value of VCE Vblock Systems: Leveraging Convergence to Drive Business Agility

The Business Value of VCE Vblock Systems: Leveraging Convergence to Drive Business Agility Sponsored by: VCE Authors: Richard L. Villars Randy Perry May 2015 Business Value Highlights 4.6 times more applications developed/delivered per year 41% less IT time spent keeping the lights on 4.4 times

More information

Allstate Getting Much More from Its IT Services with ServiceNow Cloud-Based IT Service Management Solution

Allstate Getting Much More from Its IT Services with ServiceNow Cloud-Based IT Service Management Solution IDC ExpertROI SPOTLIGHT Allstate Getting Much More from Its IT Services with ServiceNow Cloud-Based IT Service Management Solution Sponsored by: ServiceNow Matthew Marden March 2015 Overview The Allstate

More information

The Business Value of IT Certification

The Business Value of IT Certification Sponsored by: Microsoft Authors: Cushing Anderson Matthew Marden Randy Perry The Business Value of IT November 2015 EXECUTIVE SUMMARY Business Value Highlights Higher productivity for server, database,

More information

Achieving Organizational Transformation with HP Converged Infrastructure Solutions for SDDC

Achieving Organizational Transformation with HP Converged Infrastructure Solutions for SDDC IDC ExpertROI SPOTLIGHT Achieving Organizational Transformation with HP Converged Infrastructure Solutions for SDDC Sponsored by: HP Matthew Marden January 2014 Randy Perry Overview Seeking the business

More information

WHITE PAPER Linux Management with Red Hat Network Satellite Server: Measuring Business Impact and ROI

WHITE PAPER Linux Management with Red Hat Network Satellite Server: Measuring Business Impact and ROI WHITE PAPER Linux Management with Red Hat Network Satellite Server: Measuring Business Impact and ROI Sponsored by: Red Hat Tim Grieser Randy Perry October 2009 Eric Hatcher Global Headquarters: 5 Speen

More information

Pulsant Delivers Agile and Cost-Effective Hybrid Cloud Services with Cisco ACI

Pulsant Delivers Agile and Cost-Effective Hybrid Cloud Services with Cisco ACI IDC ExpertROI SPOTLIGHT Pulsant Delivers Agile and Cost-Effective Hybrid Cloud Services with Cisco ACI Sponsored by: Cisco Matthew Marden December 2015 Overview Pulsant is a United Kingdom-based IT infrastructure

More information

Quantifying the Business Benefits of Red Hat Enterprise Linux Solutions

Quantifying the Business Benefits of Red Hat Enterprise Linux Solutions WHITE PAPER Quantifying the Business Benefits of Red Hat Enterprise Linux Solutions Sponsored by: Red Hat Al Gillen April 2014 Randy Perry EXECUTIVE SUMMARY Enterprises are increasingly adopting Linux

More information

The Business Value of Connected Support from HP

The Business Value of Connected Support from HP Sponsored by: HP and Intel Authors: Elaina Stergiades Rob Brothers Matthew Marden March 2015 The Business Value of Connected Support from HP EXECUTIVE SUMMARY As IT environments increasingly adopt new

More information

WHITE PAPER JBoss Operations Network: Measuring Business Impact and ROI

WHITE PAPER JBoss Operations Network: Measuring Business Impact and ROI WHITE PAPER JBoss Operations Network: Measuring Business Impact and ROI Sponsored by: Red Hat Tim Grieser August 2010 Randy Perry INTRODUCTION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA

More information

Equinix Increases IT and Employee Productivity with ServiceNow Cloud-Based IT Service Automation Solution

Equinix Increases IT and Employee Productivity with ServiceNow Cloud-Based IT Service Automation Solution IDC ExpertROI SPOTLIGHT Equinix Increases IT and Employee Productivity with ServiceNow Cloud-Based IT Service Automation Solution Sponsored by: ServiceNow Matthew Marden April 2014 Randy Perry Overview

More information

WHITE PAPER Using SAP Solution Manager to Improve IT Staff Efficiency While Reducing IT Costs and Improving Availability

WHITE PAPER Using SAP Solution Manager to Improve IT Staff Efficiency While Reducing IT Costs and Improving Availability WHITE PAPER Using SAP Solution Manager to Improve IT Staff Efficiency While Reducing IT Costs and Improving Availability Sponsored by: SAP Elaina Stergiades November 2009 Eric Hatcher EXECUTIVE SUMMARY

More information

WSSC Building on Oracle Engineered Systems to Become a Smart, Real-Time Utility Provider

WSSC Building on Oracle Engineered Systems to Become a Smart, Real-Time Utility Provider IDC ExpertROI SPOTLIGHT WSSC Building on Oracle Engineered Systems to Become a Smart, Real-Time Utility Provider Sponsored by: Oracle Corp. Matthew Marden August 2015 Overview Washington Suburban Sanitary

More information

Assessing the Business Value of SDN Datacenter Security Solutions

Assessing the Business Value of SDN Datacenter Security Solutions IDC SOLUTION BRIEF Assessing the Business Value of SDN Datacenter Security Solutions Sponsored by: Cisco Pete Lindstrom Matthew Marden May 2015 Richard L. Villars Overview CTOs, CIOs, and application architects

More information

Assessing the Business Value of the Secured Datacenter

Assessing the Business Value of the Secured Datacenter IDC SOLUTION BRIEF Assessing the Business Value of the Secured Datacenter Sponsored by: Cisco Pete Lindstrom Matthew Marden December 2014 Richard L. Villars OVERVIEW The world of IT is in the midst of

More information

Nimble Storage Leverages Operational Data to Drive Its Business with Analytics Delivered by HP Vertica

Nimble Storage Leverages Operational Data to Drive Its Business with Analytics Delivered by HP Vertica IDC ExpertROI SPOTLIGHT Nimble Storage Leverages Operational Data to Drive Its Business with Analytics Delivered by HP Vertica Sponsored by: HP Matthew Marden September 2014 Overview Nimble Storage (Nimble)

More information

Schiphol Telematics Moves to Avanade to Achieve More Value Through Business Partnership

Schiphol Telematics Moves to Avanade to Achieve More Value Through Business Partnership IDC ExpertROI SPOTLIGHT Schiphol Telematics Moves to Avanade to Achieve More Value Through Business Partnership Sponsored by: Avanade Matthew Marden September 2014 Overview Schiphol Telematics (ST) has

More information

AT&T Leverages HP Vertica Analytics Platform to Change the Economics of Providing Actionable Insights to Decision Makers

AT&T Leverages HP Vertica Analytics Platform to Change the Economics of Providing Actionable Insights to Decision Makers IDC ExpertROI SPOTLIGHT AT&T Leverages HP Vertica Analytics Platform to Change the Economics of Providing Actionable Insights to Decision Makers Sponsored by: HP Matthew Marden November 2014 Overview AT&T

More information

WHITE PAPER Business Value of JBoss Enterprise Application Platform

WHITE PAPER Business Value of JBoss Enterprise Application Platform WHITE PAPER Business Value of JBoss Enterprise Application Platform Sponsored by: Red Hat Inc. Maureen Fleming December 2010 Randy Perry EXECUTIVE SUMMARY Global Headquarters: 5 Speen Street Framingham,

More information

Using Converged Infrastructure to Enable Rapid, Cost-Effective Private Cloud Deployments

Using Converged Infrastructure to Enable Rapid, Cost-Effective Private Cloud Deployments Sponsored by: VCE Authors: Richard L. Villars Matthew Marden June 2014 Business Value Highlights Customers using Vblock Systems as a platform for deploying private cloud workloads are realizing significant

More information

How To Know The Roi Of Cesp Workload Automation Software

How To Know The Roi Of Cesp Workload Automation Software WHITE PAPER CA ESP Workload Automation Software: Measuring Business Impact and ROI Sponsored by: CA Tim Grieser Eric Hatcher September 2009 Randy Perry Global Headquarters: 5 Speen Street Framingham, MA

More information

Calculating the Business Value of Next Generation Firewall

Calculating the Business Value of Next Generation Firewall Sponsored by: Intel Security Authors: John Grady Randy Perry October 2014 Calculating the Business Value of Next Generation Firewall EXECUTIVE SUMMARY Companies today are facing a difficult dilemma. Unprecedented

More information

W H I T E P A P E R T h e R O I o f C o n s o l i d a t i n g B a c k u p a n d A r c h i v e D a t a

W H I T E P A P E R T h e R O I o f C o n s o l i d a t i n g B a c k u p a n d A r c h i v e D a t a Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e R O I o f C o n s o l i d a t i n g B a c k u p a n d A r c h i v e D a

More information

Reducing Cost While Simplifying Administration: Monetizing the Benefits of SAP ASE

Reducing Cost While Simplifying Administration: Monetizing the Benefits of SAP ASE WHITE PAPER Reducing Cost While Simplifying Administration: Monetizing the Benefits of SAP ASE Sponsored by: SAP Carl W. Olofson June 2014 Randy Perry EXECUTIVE SUMMARY In 2011, SAP asked IDC to study

More information

Quantifying the Business Value of Amazon Web Services

Quantifying the Business Value of Amazon Web Services Sponsored by: Amazon Authors: Larry Carvalho Matthew Marden May 2015 Business Value Highlights 560% Five-year ROI $1.54M Average five-year discounted business benefits per application 64.3% Lower TCO 68.1%

More information

University of Kentucky Leveraging SAP HANA to Lead the Way in Use of Analytics in Higher Education

University of Kentucky Leveraging SAP HANA to Lead the Way in Use of Analytics in Higher Education IDC ExpertROI SPOTLIGHT University of Kentucky Leveraging SAP HANA to Lead the Way in Use of Analytics in Higher Education Sponsored by: SAP Matthew Marden April 2014 Randy Perry Overview Founded in 1865

More information

Metro Health Giving Time Back to Its Care Providers with VMware Horizon View

Metro Health Giving Time Back to Its Care Providers with VMware Horizon View IDC ExpertROI Spotlight Metro Health Giving Time Back to Its Care Providers with VMware Horizon View Sponsored by: VMware Matthew Marden January 2014 Randy Perry Overview Metro Health is an integrated

More information

How To Understand Cloud Economics

How To Understand Cloud Economics WHITE PAPER Cloud Economics: A Financial Analysis of Information Management IT Delivery Models Sponsored by: Viewpointe LLC Michael Versace October 2013 Randy Perry IDC OPINION Executive Summary Cost optimization

More information

Converged and Integrated Datacenter Systems: Creating Operational Efficiencies

Converged and Integrated Datacenter Systems: Creating Operational Efficiencies Insight Converged and Integrated Datacenter Systems: Creating Operational Efficiencies Rob Brothers IDC OPINION Enterprise IT has moved away from siloed servers, storage, information, and processes and

More information

Impact of Juniper Training and Certification on Network Management Activities

Impact of Juniper Training and Certification on Network Management Activities WHITE PAPER Impact of Juniper Training and Certification on Network Management Activities Sponsored by: Juniper Networks Cushing Anderson January 2014 IDC OPINION IDC believes sufficient training and appropriate

More information

W H I T E P A P E R L i n u x M a n a g e m e n t w i t h R e d H a t S a t e l l i t e : M e a s u r i n g B u s i n e s s I m p a c t a n d R O I

W H I T E P A P E R L i n u x M a n a g e m e n t w i t h R e d H a t S a t e l l i t e : M e a s u r i n g B u s i n e s s I m p a c t a n d R O I Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R L i n u x M a n a g e m e n t w i t h R e d H a t S a t e l l i t e : M e a s

More information

W H I T E P A P E R B u s i n e s s V a l u e o f M a n a g e d S e r v i c e s

W H I T E P A P E R B u s i n e s s V a l u e o f M a n a g e d S e r v i c e s Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R B u s i n e s s V a l u e o f M a n a g e d S e r v i c e s Sponsored by: IBM

More information

I D C A N A L Y S T C O N N E C T I O N

I D C A N A L Y S T C O N N E C T I O N I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com EXECUTIVE SUMMARY The ROI of Windows and Linux Server Consolidation on IBM eserver iseries: Analysis

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World: IBM DB2 purescale

Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World: IBM DB2 purescale WHITE PAPER Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World: IBM DB2 purescale Sponsored by: IBM Carl W. Olofson December 2014 IN THIS WHITE PAPER This white paper discusses the concept

More information

W H I T E P A P E R T h e B u s i n e s s V a l u e o f t h e H P P r o a c t i v e I n s i g h t E x p e r i e n c e

W H I T E P A P E R T h e B u s i n e s s V a l u e o f t h e H P P r o a c t i v e I n s i g h t E x p e r i e n c e Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e B u s i n e s s V a l u e o f t h e H P P r o a c t i v e I n s i g h t

More information

Enterprise Workloads on the IBM X6 Portfolio: Driving Business Advantages

Enterprise Workloads on the IBM X6 Portfolio: Driving Business Advantages WHITE PAPER Enterprise Workloads on the IBM X6 Portfolio: Driving Business Advantages Sponsored by: IBM Jed Scaramella January 2014 EXECUTIVE SUMMARY Enterprise information technology (IT) leaders are

More information

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Meeting the Needs of Database Management for SaaS: Oracle Database 12c

Meeting the Needs of Database Management for SaaS: Oracle Database 12c WHITE PAPER Meeting the Needs of Database Management for SaaS: Oracle Database 12c Sponsored by: Oracle Corp. Carl W. Olofson September 2014 IDC OPINION The move of ISV applications to the cloud is growing

More information

ScienceLogic Offers Unified Infrastructure Monitoring and Analytics for Hybrid IT

ScienceLogic Offers Unified Infrastructure Monitoring and Analytics for Hybrid IT VENDOR PROFILE ScienceLogic Offers Unified Infrastructure Monitoring and Analytics for Hybrid IT Mary Johnston Turner David Immerman IDC OPINION Enterprise datacenter infrastructure environments are becoming

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking

More information

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Mobile Device and Application Trends Are Mobile Applications Moving to the Cloud?

Mobile Device and Application Trends Are Mobile Applications Moving to the Cloud? White Paper Mobile Device and Application Trends Are Mobile Applications Moving to the Cloud? Sponsored by: Cisco Denise Lund April 2014 IDC OPINION The use of mobile devices across job levels and functions

More information

IDC ExpertROI SPOTLIGHT

IDC ExpertROI SPOTLIGHT IDC ExpertROI SPOTLIGHT New Relic Yields 314% ROI for Global Technology Manufacturer Sponsored by New Relic Randy Perry September 2013 Overview As this global technology manufacturer has aggressively embraced

More information

DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified

DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified Insight DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified Stephen Elliot IDC OPINION Based on a research survey conducted during October and November of 2014 across multiple

More information

WHITE PAPER ROI and Market Opportunity of Datacenter Print Environments

WHITE PAPER ROI and Market Opportunity of Datacenter Print Environments Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER ROI and Market Opportunity of Datacenter Print Environments Sponsored by: Canon Riley

More information

WHITE PAPER Determining the Return-on-Investment from Deploying Consolidated Event and Performance Management

WHITE PAPER Determining the Return-on-Investment from Deploying Consolidated Event and Performance Management WHITE PAPER Determining the Return-on-Investment from Deploying Consolidated Event and Performance Management Sponsored by: Hewlett-Packard Elisabeth Rainge Morris Edwards April 2006 Randy Perry Global

More information

DEMONSTRATING THE ROI FOR SIEM

DEMONSTRATING THE ROI FOR SIEM DEMONSTRATING THE ROI FOR SIEM Tales from the Trenches HP Enterprise Security Business Whitepaper Introduction Security professionals sometimes struggle to demonstrate the return on investment for new

More information

Demonstrating the ROI for SIEM: Tales from the Trenches

Demonstrating the ROI for SIEM: Tales from the Trenches Whitepaper Demonstrating the ROI for SIEM: Tales from the Trenches Research 018-101409-01 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com info@arcsight.com Corporate Headquarters:

More information

Enterprises Adopting Mobile Messaging to Enhance Customer Service and Improve Customer Experience

Enterprises Adopting Mobile Messaging to Enhance Customer Service and Improve Customer Experience WHITE PAPER Enterprises Adopting Mobile Messaging to Enhance Customer Service and Improve Customer Experience Sponsored by: OpenMarket Greg Girard December 2014 IN THIS WHITE PAPER This white paper examines

More information

The ROI of an Integrated Management Solution for the Mobile Enterprise

The ROI of an Integrated Management Solution for the Mobile Enterprise Sponsored by: LANDESK Authors: Robert Young Randy Perry March 2014 The ROI of an Integrated Management Solution for the Mobile Enterprise EXECUTIVE SUMMARY Business Value Highlights Organizations in this

More information

Data Management: Foundational Technologies for Health Insurance Exchange Success

Data Management: Foundational Technologies for Health Insurance Exchange Success INDUSTRY BRIEF Data Management: Foundational Technologies for Health Insurance Exchange Success Sponsored by: Informatica Janice W. Young November 2013 IN THIS INDUSTRY BRIEF U.S. health plans have been

More information

Solutions Brochure. Security that. Security Connected for Financial Services

Solutions Brochure. Security that. Security Connected for Financial Services Solutions Brochure Security that Builds Equity Security Connected for Financial Services Safeguard Your Assets Security should provide leverage for your business, fending off attacks while reducing risk

More information

IDC MarketScape: Worldwide Hydrocarbon Accounting Software 2013 Vendor Assessment

IDC MarketScape: Worldwide Hydrocarbon Accounting Software 2013 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Hydrocarbon Accounting Software 2013 Vendor Assessment Jill Feblowitz THIS IDC MARKETSCAPE EXCERPT FEATURES: TIETO IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

IDC MarketScape: Worldwide Life Science Manufacturing and Supply Chain ITO 2015 Vendor Assessment

IDC MarketScape: Worldwide Life Science Manufacturing and Supply Chain ITO 2015 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Life Science Manufacturing and Supply Chain ITO 2015 Vendor Assessment Eric Newmark THIS IDC MARKETSCAPE EXCERPT FEATURES HCL TECHNOLOGIES, LTD. (INDIA) IDC MARKETSCAPE

More information

WHITE PAPER Assessing the Business Impact of Network Management on Small and Midsize Enterprises

WHITE PAPER Assessing the Business Impact of Network Management on Small and Midsize Enterprises Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Assessing the Business Impact of Network Management on Small and Midsize Enterprises Sponsored

More information

IDC MarketScape Excerpt: Worldwide Life Science R&D Strategic Consulting Services 2014 Vendor Assessment

IDC MarketScape Excerpt: Worldwide Life Science R&D Strategic Consulting Services 2014 Vendor Assessment IDC MarketScape IDC MarketScape Excerpt: Worldwide Life Science R&D Strategic Consulting Services 2014 Vendor Assessment Alan S. Louie, Ph.D. THIS IDC MARKETSCAPE EXCERPT FEATURES: ACCENTURE IDC MARKETSCAPE

More information

IDC MarketScape: Worldwide Life Science Sales and Marketing ITO 2015 Vendor Assessment

IDC MarketScape: Worldwide Life Science Sales and Marketing ITO 2015 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Life Science Sales and Marketing ITO 2015 Vendor Assessment Eric Newmark THIS IDC MARKETSCAPE EXCERPT FEATURES: IMS HEALTH IDC MARKETSCAPE FIGURE FIGURE 1 IDC

More information

The Advantages of Converged Infrastructure Management

The Advantages of Converged Infrastructure Management SOLUTION BRIEF Converged Infrastructure Management from CA Technologies how can I deliver innovative customer services across increasingly complex, converged infrastructure with less management effort

More information

IBM Security QRadar Vulnerability Manager

IBM Security QRadar Vulnerability Manager IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk

More information

Long Term Care Group Deploys Zerto for Data Protection and Recovery for Virtual Environments

Long Term Care Group Deploys Zerto for Data Protection and Recovery for Virtual Environments BUYER CASE STUDY Long Term Care Group Deploys Zerto for Data Protection and Recovery for Virtual Environments Iris Feng Eric Sheppard IDC OPINION Today's datacenter is dominated by virtualized workloads

More information

Reduce IT Costs by Simplifying and Improving Data Center Operations Management

Reduce IT Costs by Simplifying and Improving Data Center Operations Management Thought Leadership white paper Reduce IT Costs by Simplifying and Improving Data Center Operations Management By John McKenny, Vice President of Worldwide Marketing for Mainframe Service Management, BMC

More information

IDC MarketScape: U.S. Population Health Management 2014 Vendor Assessment

IDC MarketScape: U.S. Population Health Management 2014 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: U.S. Population Health Management 2014 Vendor Assessment Cynthia Burghard THIS IDC MARKETSCAPE EXCERPT FEATURES: WELLCENTIVE IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

PPM Maturity Value Assessment for Your Company

PPM Maturity Value Assessment for Your Company PPM Maturity Value Assessment for Your Company Date Sponsored by: Prepared For: Valued Customer Name Third party model, methodology and data provided by: Disclaimer: NOTICE - THIS INFORMATION IS PROVIDED

More information

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

WHITE PAPER IN THIS WHITE PAPER EXECUTIVE SUMMARY. Sponsored by: Salesforce. August 2015

WHITE PAPER IN THIS WHITE PAPER EXECUTIVE SUMMARY. Sponsored by: Salesforce. August 2015 WHITE PAPER The Salesforce Economy: How Salesforce, Its Ecosystem of Partners, and Its Customers Will Create More Than 1 Million Jobs and Add $272 Billion to Local Economies in the Next Four Years Sponsored

More information

IDC MarketScape Excerpt: Worldwide HR BPO 2014 Vendor Assessment

IDC MarketScape Excerpt: Worldwide HR BPO 2014 Vendor Assessment IDC MarketScape IDC MarketScape Excerpt: Worldwide HR BPO 2014 Vendor Assessment Lisa Rowan THIS IDC MARKETSCAPE EXCERPT FEATURES: ADP IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape HR Business Process

More information

Perspective: Cloud Solutions and Deployment for Healthcare Payers in 2014

Perspective: Cloud Solutions and Deployment for Healthcare Payers in 2014 Perspective Perspective: Cloud Solutions and Deployment for Healthcare Payers in 2014 Lynne A. Dunbrack Judy Hanover IN THIS PERSPECTIVE This IDC Health Insights Perspective examines the current status

More information

Virtualization in Healthcare: Less Can Be More

Virtualization in Healthcare: Less Can Be More HEALTH INDUSTRY INSIGHTS EXECUTIVE BRIEF Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.935.4445 F.508.988.7881 www.healthindustry-insights.com Virtualization in Healthcare: Less Can

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

W H I T E P A P E R T h e I m p a c t o f A u t o S u p p o r t: Leveraging Advanced Remote and Automated Support

W H I T E P A P E R T h e I m p a c t o f A u t o S u p p o r t: Leveraging Advanced Remote and Automated Support W H I T E P A P E R T h e I m p a c t o f A u t o S u p p o r t: Leveraging Advanced Remote and Automated Support Sponsored by: NetApp Brad Nisbet December 2008 Matt Healey IDC OPINION Global Headquarters:

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

IDC MarketScape: Worldwide Digital Enterprise Strategy Consulting Services 2015 Vendor Assessment

IDC MarketScape: Worldwide Digital Enterprise Strategy Consulting Services 2015 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Digital Enterprise Strategy Consulting Services 2015 Vendor Assessment Cushing Anderson Mette Ahorlu THIS IDC MARKETSCAPE EXCERPT FEATURES PWC IDC MARKETSCAPE

More information

McAfee Server Security

McAfee Server Security Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or

More information

Executive Summary... 2. Factors Affecting Benefits And Costs... 4. Disclosures... 5. TEI Framework And Methodology... 6. Analysis...

Executive Summary... 2. Factors Affecting Benefits And Costs... 4. Disclosures... 5. TEI Framework And Methodology... 6. Analysis... TABLE OF CONTENTS Executive Summary... 2 Factors Affecting Benefits And Costs... 4 Disclosures... 5 TEI Framework And Methodology... 6 Analysis... 7 Interview Highlights... 7 Costs... 9 Benefits... 10

More information

Understanding the Business Value of Migrating to Windows Server 2012

Understanding the Business Value of Migrating to Windows Server 2012 WHITE PAPER Understanding the Business Value of Migrating to Windows Server 2012 Sponsored by: Microsoft and Intel Simon Piff February 2015 EXECUTIVE SUMMARY In December 2014, IDC Asia/Pacific undertook

More information

IT as a Service Emerges as a New Management Paradigm in the Software-Defined Datacenter Era

IT as a Service Emerges as a New Management Paradigm in the Software-Defined Datacenter Era Customer Needs and Strategies IT as a Service Emerges as a New Management Paradigm in the Software-Defined Datacenter Era Mary Johnston Turner IDC OPINION IT as a service (ITaaS) represents a fundamentally

More information

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance,

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Quantifying the Business Benefits of IT Service Management Sponsored by: Hewlett-Packard

More information

Symantec Messaging Gateway powered by Brightmail

Symantec Messaging Gateway powered by Brightmail The first name in messaging security powered by Brightmail Overview, delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus protection, advanced

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Business Value of Microsoft System Center 2012 Configuration Manager

Business Value of Microsoft System Center 2012 Configuration Manager Business Value of Microsoft System Center 2012 Configuration Manager Sponsored by: Microsoft Corporation Publish date: February 2013 Abstract: Microsoft System Center 2012 Configuration Manager ( Configuration

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Network Consulting Services Lead Enterprise Transformation Sponsored by: HP Leslie Rosenberg February 2011 Curtis Price Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

Assessing the Business Value of Cisco s Desktop and Application Virtualization Solution

Assessing the Business Value of Cisco s Desktop and Application Virtualization Solution Sponsored by: Cisco Authors: Robert Young Randy Perry October 2015 Assessing the Business Value of Cisco s Desktop and Application Virtualization Solution EXECUTIVE SUMMARY IDC predicts that by 2018, there

More information

"Why Didn't We Do It Sooner?" Deployment of a New BI Solution at The Pain Center of Arizona

Why Didn't We Do It Sooner? Deployment of a New BI Solution at The Pain Center of Arizona Buyer Case Study "Why Didn't We Do It Sooner?" Deployment of a New BI Solution at The Pain Center of Arizona Dan Vesset IDC OPINION Investment in analytics, business intelligence, and big data technologies

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Networking Skills in North America: Trends, Gaps, and Strategies Sponsored by: Cisco Learning Institute Cushing Anderson Marianne Kolding May 2008 Susan Lee Global Headquarters: 5 Speen Street

More information

IDC MarketScape: Worldwide Life Science Sales and Marketing BPO 2015 Vendor Assessment

IDC MarketScape: Worldwide Life Science Sales and Marketing BPO 2015 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Life Science Sales and Marketing BPO 2015 Vendor Assessment Eric Newmark THIS IDC MARKETSCAPE EXCERPT FEATURES: IMS HEALTH IDC MARKETSCAPE FIGURE FIGURE 1 IDC

More information

IDC MarketScape Excerpt: Worldwide Life Science R&D ITO 2013 Vendor Assessment

IDC MarketScape Excerpt: Worldwide Life Science R&D ITO 2013 Vendor Assessment IDC MarketScape IDC MarketScape Excerpt: Worldwide Life Science R&D ITO 2013 Vendor Assessment Alan S. Louie, Ph.D. THIS IDC MARKETSCAPE EXCERPT FEATURES: ACCENTURE IDC MARKETSCAPE FIGURE FIGURE 1 IDC

More information

Network Management Services: A Cost-Effective Approach to Complexity

Network Management Services: A Cost-Effective Approach to Complexity Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F Network Management Services: A Cost-Effective Approach to Complexity

More information