Reference Technology Roadmap

Size: px
Start display at page:

Download "Reference Technology Roadmap"

Transcription

1 Information Security: Wave 16 Reference Technology Roadmap Allowing comparison of all 48 technologies tracked in the study, this high-level reference contains the Technology Heat Index, the Adoption Index, leading vendor tables, overall technology roadmap and spending charts. It also indicates what is included in the more detailed reports based on each technology segment covered in the study. NEW YORK BOSTON WASHINGTON DC SAN FRANCISCO SEATTLE DENVER LONDON SAO PAULO DUBAI SINGAPORE Research, LLC.

2 About TheInfoPro s Information Security Study TheInfoPro s Information Security Study takes an in-depth look at key industry trends and tracks the performance of individual vendors. Now in its eleventh year, this study was finalized in December 2013 and is based on 207 interviews. TheInfoPro s methodology uses extensive interviews with a proprietary network of IT professionals and key decision-makers at large and midsize enterprises. Each interview explores several fundamental areas, including the implementation and spending plans for technologies, evaluations of vendors observed from business and product perspectives, macro IT influences transforming the sector, and factors affecting decision processes. Results are collated into comprehensive research reports providing business intelligence in the form of technological roadmaps, budget trends and vendor spending plans and performance ratings. Examples of Vendors Covered in the Study Aruba Networks Blue Coat Systems Check Point Cisco Dell EMC (RSA) FireEye Fortinet Guidance Software Hewlett-Packard About the Author Imperva Juniper Networks McAfee Microsoft Palo Alto Networks Qualys Sophos Sourcefire Symantec Websense This report was written by Daniel Kennedy, Research Director for Networking and Information Security. Daniel Kennedy is an experienced information security professional. Prior to joining 451 Research, he was a partner in the information security consultancy Praetorian Security LLC, where he directed strategy on risk assessment and security certification. Before that, he was Global Head of Information Security for D.B. Zwirn & Co., as well as Vice President of Application Security and Development Manager at Pershing LLC, a division of the Bank of New York. Kennedy has written for both Forbes online and Ziff Davis, has provided commentary to numerous news outlets, including The New York Times and The Wall Street Journal, and his personal blog, Praetorian Prefect, which was recognized as one of the top five technical blogs in information security by the RSA 2010 Conference. Kennedy holds a master of science degree in information systems from Stevens Institute of Technology, a master of science in information assurance from Norwich University, and a bachelor of science in information management and technology from Syracuse University. He is certified as a CEH (Certified Ethical Hacker) from the EC-Council, is a CISSP, and has a NASD Series 7 license Research, LLC.

3 Guide to Information Security Study Reports A wave of research produces a series of reports that are published approximately in this order: 2014 INFORMATION SECURITY OUTLOOK INFORMATION SECURITY METRICS REFERENCE TECHNOLOGY ROADMAP APPLICATION SECURITY TECHNOLOGY ROADMAP INFRASTRUCTURE SECURITY TECHNOLOGY ROADMAP NETWORK SECURITY TECHNOLOGY ROADMAP SECURITY MANAGEMENT TECHNOLOGY ROADMAP VENDOR VULNERABILITY AND SPENDING VENDOR MARKET WINDOWS AND RATINGS CUSTOMER ASSESSMENTS FOR INDIVIDUAL VENDORS NARRATIVES MARKET DYNAMICS IT professionals describe how 2014 looks for budgets, projects and pain points with time series charts to give perspective to the coming year. Benchmarking organization efficiency, this report contains metrics about staffing, organization structure, the existence of written policies, compliance and internal security. Allowing comparison of all 48 technologies tracked in the study, this high-level reference contains the Technology Heat Index, the Adoption Index, leading vendor tables, overall technology roadmap and spending charts. It also indicates what is included in the more detailed reports based on each technology segment covered in the study. Capturing IT professionals adoption plans, projected spending and vendor short-lists, the in-depth roadmap covers five technologies including: Web application firewalls, application security testing and database security. Capturing IT professionals adoption plans, projected spending and vendor short-lists, the in-depth roadmap covers 17 technologies including: endpoint and network data-loss prevention (DLP), mobile device security and tokenization. Capturing IT professionals adoption plans, projected spending and vendor short-lists, the in-depth roadmap covers 12 technologies including: firewalls, NIPS, NAC, UTM, anti-spam and SSL VPNs. Capturing IT professionals adoption plans, projected spending and vendor short-lists, the in-depth roadmap covers 14 technologies including: Mobile device management, SIEM, event log management, IT GRC, threat intelligence and computer forensics. This report allows you to compare IT professionals spending intentions and loyalty ratings for 16 vendors. TheInfoPro s unique Market Window uses IT professionals ratings of vendors on 14 separate criteria to calculate scores for Vendor Promise and Vendor Fulfillment, allowing comparison of vendors effectiveness at strategy, marketing, delivery and execution. Summarizing IT professionals assessments for each of 16 vendors, this report profiles individual vendors based on spending, vulnerability, and ratings on 14 categories. Time series are included. Compiling open-ended commentary from in-depth interviews with IT professionals, you hear the direct voice of the customer discussing technology, their industry and the future of this sector. Designed for IT professionals, this report captures highlights from the complete study, and provides business intelligence in the form of technological roadmaps, budget trends and voice-of-the-customer narratives. Source: Information Security Wave Research, LLC.

4 Table of Contents About TheInfoPro Information Security Study 2 Principal Findings 5 Implementation Plans 6 Spending Plans 7 Technology Heat Index and Leading Vendors 9 Appendixes Methodology, Sample Variation, Demographics 17 How to Interpret the Data 18 Source: Information Security Wave Research, LLC.

5 Principal Findings Mobile device management (MDM) had the strongest spending intentions in 2013; 4 of respondents said their enterprises increased spending as a management response to employees bringing your own devices (BYOD) to work. Spending on MDM is expected to improve in 2014, with 46% of respondents planning to increase spending. Cloud-specific security solutions are implemented in less than 15% of enterprises now, but expect that to change, potentially doubling in penetration over the next 18 months. Forty-three percent (4) of security managers say securing the hybrid cloud is a priority. Firewalls, both standard stateful ones and newer application-aware products, both had healthy spending allocations in 2013, placing second and third respectively in the list of technologies the greatest percentage of security managers increased spending on. Next year, security information and event management (SIEM) climbs to second place behind only MDM in spending, as security managers continue their renewed focus on proactive monitoring and reaction to security incidents in addition to preventative controls. According to TheInfoPro s proprietary Heat Index, a measure of the immediacy of user needs around a security technology, endpoint data-loss prevention (DLP) takes the pole position. Compliance concerns around both customer custodial information and firm intellectual property continue to drive DLP adoption, currently led by endpoint security titans Symantec and Intel s McAfee. The aforementioned phenomenon of employees connecting personal devices to the company network, BYOD, sees MDM climb to third in the Heat Index and has also driven network access control (NAC) from a more stagnant technology to sixth place. Source: Information Security Wave Research, LLC.

6 Information Security Technology Roadmap Anti-virus Network Firewalls Anti-spam/ Security Patch Management SSL VPNs Network Intrusion Detection and/or Prevention (NIDS/NIPS) Vulnerability/Risk Assessment/Scanning (of Infrastructure) Penetration Testing Web Content Filtering Anti-spyware Laptop Encryption Event Log Management System Two-factor (Strong) Authentication for Infrastructure (e.g., VPN, Remote Access) Encryption Secure File Transfer Security Information Event Management (SIEM) /Messaging Archiving/Compliance Hard Drive Encryption Mobile Device Management Computer Forensics Identity Management Single Sign-on Host Intrusion Detection and/or Prevention (HIDS/HIPS) Key Management and/or Public Key Infrastructure Policy and Configuration Management IT Security Training/Education/Awareness Application-aware Firewall Secure Instant Messaging Web Application Firewall (WAF) Anti-botnet Application Security Testing Code or Binary Analysis-based Vulnerability Assessment Managed Security Service Provider (MSSP) IT GRC (Governance, Risk, Compliance) Endpoint Data-loss Prevention Solutions Database Security Threat Intelligence Application Security Testing External Interface Fuzzing or Testing Vulnerability Assessment Advanced Anti-malware Response File Integrity Monitoring Multifactor Authentication for Web-based Applications Network Access Control (NAC) Virtualization Security Network Data-loss Prevention Solutions Mobile Device Security (Not MDM) Unified Threat Management (UTM) Tokenization Information or Digital Rights Management Cloud Security 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 55% 60% 65% 70% 75% 80% 85% 90% 95% 100% In Use Now (Not Including Pilots) In Pilot/Evaluation (Budget Has Already Been Allocated) In Near-term Plan (In Next 6 Months) In Long-term Plan (6-18 Months) Past Long-term Plan (Later Than 18 Months Out) Not in Plan Don't Know Q. What is your status of implementation for this technology? n= Source: Information Security Wave Research, LLC.

7 2013 vs Spending Change for Information Security Technologies Mobile Device Management Network Firewalls Application-aware Firewall Network Data-loss Prevention Solutions Security Information Event Management (SIEM) Identity Management IT GRC (Governance, Risk, Compliance) Network Intrusion Detection and/or Prevention (NIDS/NIPS) Event Log Management System Managed Security Service Provider (MSSP) IT Security Training/Education/Awareness Network Access Control (NAC) Endpoint Data-loss Prevention Solutions Tokenization Unified Threat Management (UTM) Mobile Device Security (Not MDM) Application Security Testing Code or Binary Analysis-based Web Application Firewall (WAF) Anti-botnet SSL VPNs Cloud Security Web Content Filtering Computer Forensics Advanced Anti-malware Response Virtualization Security Two-factor (Strong) Authentication for Infrastructure (e.g., Policy and Configuration Management Application Security Testing External Interface Fuzzing or Single Sign-on Secure Instant Messaging Vulnerability/Risk Assessment/Scanning (of Infrastructure) Multifactor Authentication for Web-based Applications Database Security Secure File Transfer Key Management and/or Public Key Infrastructure /Messaging Archiving/Compliance Encryption Information or Digital Rights Management Patch Management Laptop Encryption Threat Intelligence Penetration Testing Anti-virus File Integrity Monitoring Anti-spam/ Security Anti-spyware Hard Drive Encryption Host Intrusion Detection and/or Prevention (HIDS/HIPS) 5% % 59% % 6 65% 65% 65% 66% 69% % % % 7 56% 80% 7 80% 77% 75% 79% % 85% 86% 87% 8 89% 4 39% % 30% 29% 29% 27% 26% 26% 25% 25% % 20% 20% 19% 18% 17% 17% 16% 16% % 9% 9% 7% Less Spending About the Same More Spending Q. How will your spending on this technology change in 2013 as compared to 2012? n= Data from respondents not using the technology or that don't know about spending are hidden. Source: Information Security Wave Research, LLC.

8 2014 vs Spending Change for Information Security Technologies Mobile Device Management Security Information Event Management (SIEM) Cloud Security Network Access Control (NAC) Endpoint Data-loss Prevention Solutions Unified Threat Management (UTM) Identity Management Application-aware Firewall Virtualization Security Event Log Management System Network Firewalls Network Intrusion Detection and/or Prevention (NIDS/NIPS) Mobile Device Security (Not MDM) Application Security Testing Code or Binary Analysis-based Network Data-loss Prevention Solutions IT GRC (Governance, Risk, Compliance) Web Application Firewall (WAF) Tokenization Policy and Configuration Management Managed Security Service Provider (MSSP) Advanced Anti-malware Response Database Security Information or Digital Rights Management Multifactor Authentication for Web-based Applications Anti-botnet IT Security Training/Education/Awareness Single Sign-on Two-factor (Strong) Authentication for Infrastructure (e.g., Threat Intelligence Web Content Filtering Key Management and/or Public Key Infrastructure Application Security Testing External Interface Fuzzing or Encryption Secure Instant Messaging SSL VPNs File Integrity Monitoring Vulnerability/Risk Assessment/Scanning (of Infrastructure) /Messaging Archiving/Compliance Computer Forensics Secure File Transfer Host Intrusion Detection and/or Prevention (HIDS/HIPS) Anti-virus Laptop Encryption Hard Drive Encryption Anti-spyware Penetration Testing Patch Management Anti-spam/ Security 7% 8% 10% 6% 8% 5% 1 5% 5% 9% 1 9% 6% 5% 5% 8% 5% 10% % 5 48% 50% 46% % 49% 5 60% 6 66% % 68% % 65% 7 70% % 7 76% 79% 7 76% 78% 80% % 46% % 40% 39% 37% 37% 36% 36% 35% % 29% 29% 28% 27% 26% 26% 26% % 20% 19% 18% 17% 16% 15% % 10% 10% 7% Less Spending About the Same More Spending Q. How will your spending on this technology change in 2014 as compared to 2013? n= Data from respondents not using the technology or that don't know about spending are hidden. Source: Information Security Wave Research, LLC.

9 Information Security Technologies: Heat Index vs. Adoption Index Heat Rank Technology Heat Score Adoption Score Heat Rank Technology Heat Score Adoption Score 1 Endpoint Data-loss Prevention Solutions Information or Digital Rights Management Application-aware Firewall Laptop Encryption Mobile Device Management Tokenization Security Information Event Management (SIEM) /Messaging Archiving/Compliance Identity Management Multifactor Authentication for Web-based Applications Network Access Control (NAC) Hard Drive Encryption Event Log Management System Key Management and/or Public Key Infrastructure Network Data-loss Prevention Solutions Database Security Unified Threat Management (UTM) Single Sign-on Application Security Testing Code or Binary Analysis-based Vulnerability Assessment Network Firewalls IT GRC (Governance, Risk, Compliance) Web Content Filtering Policy and Configuration Management Two-factor (Strong) Authentication for Infrastructure (e.g., VPN, Remote Access) Application Security Testing External Interface Fuzzing or Testing Vulnerability Assessment File Integrity Monitoring IT Security Training/Education/Awareness Vulnerability/Risk Assessment/Scanning (of Infrastructure) Advanced Anti-malware Response Secure File Transfer Network Intrusion Detection and/or Prevention (NIDS/NIPS) SSL VPNs Virtualization Security Penetration Testing Encryption Computer Forensics Web Application Firewall (WAF) Secure Instant Messaging Mobile Device Security (Not MDM) Anti-spyware Anti-botnet Host Intrusion Detection and/or Prevention (HIDS/HIPS) Threat Intelligence Patch Management Cloud Security Anti-virus Managed Security Service Provider (MSSP) Anti-spam/ Security 0 82 Technology Heat Index : measures user demand for a technology based on several factors including: usage or planned usage, changes in planned spending, an organization s budget for the relevant IT sector, and future changes in the organization s budget. A high score means a technology is expected to see significant growth. Technology Adoption Index: measures aggregate investment in a technology based on several factors including: usage or planned usage, changes in planned spending, and an organization s budget for the relevant IT sector. A high score means the technology is already experiencing healthy adoption. n=207. Source: Information Security Wave Research, LLC.

10 Information Security Technologies: Heat Index Ranking and Leading Vendors (1 of 2) Heat Rank Heat Score Technology Lead in Plan 2nd in Plan Lead in Use 2nd in Use Endpoint Data-loss Prevention Solutions Symantec! McAfee Symantec! McAfee 2 97 Application-aware Firewall Palo Alto Ntwks Check Point Palo Alto Ntwks Imperva 3 95 Mobile Device Management MobileIron! Good Tech Good Tech MobileIron 4 87 Security Information Event Management (SIEM) LogRhythm IBM HP IBM 5 85 Identity Management Oracle! EMC; CA Tech Microsoft Oracle 6 78 Network Access Control (NAC) Cisco! Aruba Ntwks Cisco! ForeScout 7 76 Event Log Management System LogRhythm! McAfee Splunk HP 8 73 Network Data-loss Prevention Solutions Symantec McAfee Symantec! Websense; EMC 9 72 Unified Threat Management (UTM) Fortinet Palo Alto Ntwks; Check Point Palo Alto Ntwks; Fortinet Check Point Application Security Testing Code or Binary Analysis-based Vulnerability Assessment Veracode WhiteHat Sec IBM HP IT GRC (Governance, Risk, Compliance) EMC! IBM EMC! Homegrown Policy and Configuration Management Microsoft! Symantec; Open Source; FireMon Microsoft! Tripwire Two-factor (Strong) Authentication for Infrastructure (e.g., VPN, Remote Access) EMC! Symantec EMC! SafeNet IT Security Training/Education/Awareness SANS Inst! Wombat Homegrown! SANS Inst Advanced Anti-malware Response FireEye! Check Point; Palo Alto Ntwks FireEye Symantec Network Intrusion Detection and/or Prevention (NIDS/NIPS) Palo Alto Ntwks Check Point Cisco! McAfee; HP Virtualization Security VMware Check Point VMware! Microsoft Encryption Microsoft Symantec Microsoft Cisco Web Application Firewall (WAF) F5 Ntwks! Check Point F5 Ntwks Imperva Mobile Device Security (Not MDM) MobileIron AirWatch MobileIron Good Tech Anti-botnet Check Point Palo Alto Ntwks FireEye Symantec Threat Intelligence CrowdStrike Symantec Symantec IBM Cloud Security CipherCloud! Ping Identity Amazon Web Svcs Oracle; Homegrown Managed Security Service Provider (MSSP) Dell AT&T Symantec Dell Technology Heat Index : measures user demand for a technology based on several factors including: usage or planned usage, changes in planned spending, an organization s budget for the relevant IT sector, and future changes in the organization s budget. A high score means a technology is expected to see significant growth. A! vendor has at least twice the number of selections as the closest competitor. A! vendor has at least twice the number of responses as the closest competitor. n=207. Source: Information Security Wave Research, LLC.

11 Information Security Technologies: Heat Index Ranking and Leading Vendors (2 of 2) Heat Rank Heat Score Technology Lead in Plan 2nd in Plan Lead in Use 2nd in Use Information or Digital Rights Management Microsoft! WatchDox Microsoft! EMC Laptop Encryption Microsoft! Dell Microsoft McAfee Tokenization Agilysys SafeNet; Protegrity SafeNet; Homegrown; Paymetric; Oracle; EMC Microsoft; CyberSource /Messaging Archiving/Compliance Google! HP Symantec Microsoft Multifactor Authentication for Web-based Applications Symantec; EMC - EMC! Microsoft Hard Drive Encryption Microsoft! McAfee Microsoft! McAfee Key Management and/or Public Key Infrastructure Microsoft Venafi Microsoft! Symantec Database Security Imperva IBM Oracle Imperva Single Sign-on Okta; Microsoft Ping Identity Microsoft Oracle Network Firewalls - - Cisco Check Point Web Content Filtering Websense! Blue Coat Websense Blue Coat Application Security Testing External Interface Fuzzing or Testing Vulnerability Assessment WhiteHat Sec Veracode IBM! WhiteHat Sec File Integrity Monitoring Tripwire Symantec Tripwire! Symantec; Open Source Vulnerability/Risk Assessment/Scanning (of Infrastructure) Tenable; McAfee Core Security Qualys! Open Source Secure File Transfer Box! Google; AppSense; Accellion Homegrown IBM SSL VPNs Juniper Networks! Citrix; Cisco Cisco Juniper Networks Penetration Testing - - Homegrown Trustwave Computer Forensics Guidance Sftw! Symantec; AccessData Guidance Sftw! AccessData Secure Instant Messaging Microsoft Google Microsoft! IBM 44 8 Anti-spyware - - Symantec McAfee 44 8 Host Intrusion Detection and/or Prevention (HIDS/HIPS) McAfee! Trend Micro Symantec; McAfee! IBM 46 6 Patch Management Microsoft! - Microsoft! Symantec 47 4 Anti-virus Trend Micro Symantec McAfee 48 0 Anti-spam/ Security - - Cisco Symantec Technology Heat Index : measures user demand for a technology based on several factors including: usage or planned usage, changes in planned spending, an organization s budget for the relevant IT sector, and future changes in the organization s budget. A high score means a technology is expected to see significant growth. A! vendor has at least twice the number of selections as the closest competitor. A! vendor has at least twice the number of responses as the closest competitor. n=207. Source: Information Security Wave Research, LLC.

12 Information Security Technologies: Heat Index Ranking and Leading Inuse Vendors Time Series (1 of 2) Heat Rank Technology 2H 12 Lead In-use Vendor 2H 13 Lead In-use Vendor 2H 12 2nd In-use Vendor 2H 13 2nd In-use Vendor 1 Endpoint Data-loss Prevention Solutions Symantec! Symantec! McAfee McAfee 2 Application-aware Firewall Palo Alto Ntwks Palo Alto Ntwks Imperva Imperva 3 Mobile Device Management Good Tech Good Tech MobileIron MobileIron 4 Security Information Event Management (SIEM) HP! HP IBM IBM 5 Identity Management Microsoft Microsoft Oracle Oracle 6 Network Access Control (NAC) Cisco! Cisco! Juniper ForeScout 7 Event Log Management System HP Splunk Splunk HP 8 Network Data-loss Prevention Solutions Symantec! Symantec! McAfee Websense; EMC 9 Unified Threat Management (UTM) Check Point Palo Alto Ntwks; Fortinet Fortinet; McAfee; Palo Alto Check Point 10 Application Security Testing Code or Binary Analysis-based Vulnerability Assessment HP IBM IBM HP 11 IT GRC (Governance, Risk, Compliance) EMC! EMC! Homegrown Homegrown 12 Policy and Configuration Management Microsoft Microsoft! Tripwire Tripwire 13 Two-factor (Strong) Authentication for Infrastructure (e.g., VPN, Remote Access) EMC! EMC! Cisco SafeNet 13 IT Security Training/Education/Awareness Homegrown! Homegrown! SANS Inst SANS Inst 15 Advanced Anti-malware Response FireEye FireEye McAfee Symantec 15 Network Intrusion Detection and/or Prevention (NIDS/NIPS) Cisco; HP Cisco! Sourcefire McAfee; HP 17 Virtualization Security - VMware! - Microsoft 18 Encryption Cisco Microsoft Microsoft Cisco 19 Web Application Firewall (WAF) Imperva F5 Ntwks F5 Ntwks Imperva 20 Mobile Device Security (Not MDM) Good Tech; RIM MobileIron MobileIron Good Tech 20 Anti-botnet FireEye FireEye McAfee; Symantec Symantec 20 Threat Intelligence Symantec! Symantec IBM IBM 23 Cloud Security - Amazon Web Svcs - Oracle; Homegrown 23 Managed Security Service Provider (MSSP) Dell Symantec Symantec Dell Technology Heat Index : measures user demand for a technology based on several factors including: usage or planned usage, changes in planned spending, an organization s budget for the relevant IT sector, and future changes in the organization s budget. A high score means a technology is expected to see significant growth. A! vendor has at least twice the number of selections as the closest competitor. A! vendor has at least twice the number of responses as the closest competitor. 2H 12, n=200; 2H 13, n=207. Source: Information Security Wave Research, LLC.

13 Information Security Technologies: Heat Index Ranking and Leading Inuse Vendors Time Series (2 of 2) Heat Rank Technology 2H 12 Lead In-use Vendor 2H 13 Lead In-use Vendor 2H 12 2nd In-use Vendor 2H 13 2nd In-use Vendor 25 Information or Digital Rights Management Microsoft! Microsoft! Homegrown EMC 26 Laptop Encryption Microsoft Microsoft McAfee McAfee 26 Tokenization Homegrown SafeNet; Homegrown; EMC EMC Paymetric; Oracle; Microsoft; CyberSource 28 /Messaging Archiving/Compliance Symantec Symantec Microsoft Microsoft 29 Multifactor Authentication for Web-based Applications EMC! EMC! SafeNet Microsoft 30 Hard Drive Encryption Microsoft Microsoft! McAfee McAfee 31 Key Management and/or Public Key Infrastructure Microsoft Microsoft! Symantec Symantec 32 Database Security Oracle Oracle Imperva Imperva 33 Single Sign-on Microsoft Microsoft Homegrown Oracle 34 Network Firewalls - Cisco - Check Point 35 Web Content Filtering - Websense - Blue Coat 36 Application Security Testing External Interface Fuzzing or Testing Vulnerability Assessment IBM IBM! HP WhiteHat Sec 37 File Integrity Monitoring Tripwire Tripwire! Open Source Symantec; Open Source 38 Vulnerability/Risk Assessment/Scanning (of Infrastructure) Qualys Qualys! Open Source Open Source 38 Secure File Transfer - Homegrown - IBM 38 SSL VPNs - Cisco - Juniper Networks 41 Penetration Testing Homegrown Homegrown IBM Trustwave 41 Computer Forensics Guidance Sftw! Guidance Sftw! AccessData AccessData 41 Secure Instant Messaging Microsoft! Microsoft! Cisco IBM 44 Anti-spyware Symantec Symantec McAfee McAfee 44 Host Intrusion Detection and/or Prevention (HIDS/HIPS) McAfee Symantec; McAfee! Symantec IBM 46 Patch Management Microsoft! Microsoft! Emerson Symantec 47 Anti-virus - Symantec - McAfee 48 Anti-spam/ Security - Cisco - Symantec Technology Heat Index : measures user demand for a technology based on several factors including: usage or planned usage, changes in planned spending, an organization s budget for the relevant IT sector, and future changes in the organization s budget. A high score means a technology is expected to see significant growth. A! vendor has at least twice the number of selections as the closest competitor. A! vendor has at least twice the number of responses as the closest competitor. 2H 12, n=200; 2H 13, n=207. Source: Information Security Wave Research, LLC.

14 Information Security Technologies: Heat Index Ranking and Leading Inplan Vendors Time Series (1 of 2) Heat Rank Technology 2H 12 Lead In-plan Vendor 2H 13 Lead In-plan Vendor 2H 12 2nd In-plan Vendor 2H 13 2nd In-plan Vendor 1 Endpoint Data-loss Prevention Solutions Symantec! Symantec! McAfee McAfee 2 Application-aware Firewall Palo Alto Ntwks! Palo Alto Ntwks F5 Ntwks Check Point 3 Mobile Device Management Good Tech MobileIron! MobileIron Good Tech 4 Security Information Event Management (SIEM) HP LogRhythm IBM IBM 5 Identity Management Microsoft Oracle! Oracle EMC; CA Tech 6 Network Access Control (NAC) Cisco! Cisco! Juniper Aruba Ntwks 7 Event Log Management System HP LogRhythm! IBM McAfee 8 Network Data-loss Prevention Solutions Symantec! Symantec McAfee McAfee 9 Unified Threat Management (UTM) Palo Alto Ntwks Fortinet Check Point Palo Alto Ntwks; Check Point 10 Application Security Testing Code or Binary Analysis-based Vulnerability Assessment HP!; IBM!; Qualys! Veracode ESET WhiteHat Sec 11 IT GRC (Governance, Risk, Compliance) EMC! EMC! Symantec IBM 12 Policy and Configuration Management Microsoft Microsoft! Qualys Symantec; Open Source; FireMon 13 Two-factor (Strong) Authentication for Infrastructure (e.g., VPN, Remote Access) EMC EMC! PhoneFactor Symantec 13 IT Security Training/Education/Awareness Wombat SANS Inst! SANS Inst Wombat 15 Advanced Anti-malware Response FireEye FireEye! EMC Check Point; Palo Alto Ntwks 15 Network Intrusion Detection and/or Prevention (NIDS/NIPS) Cisco Palo Alto Ntwks Open Source Check Point 17 Virtualization Security - VMware - Check Point 18 Encryption Google Microsoft Microsoft Symantec 19 Web Application Firewall (WAF) F5 Ntwks! F5 Ntwks! Imperva Check Point 20 Mobile Device Security (Not MDM) Good Tech MobileIron MobileIron AirWatch 20 Anti-botnet FireEye Check Point Palo Alto Ntwks Palo Alto Ntwks 20 Threat Intelligence Symantec! CrowdStrike Symantec! Symantec 23 Cloud Security - CipherCloud! - Ping Identity 23 Managed Security Service Provider (MSSP) Verizon! Dell AT&T; Dell AT&T Technology Heat Index : measures user demand for a technology based on several factors including: usage or planned usage, changes in planned spending, an organization s budget for the relevant IT sector, and future changes in the organization s budget. A high score means a technology is expected to see significant growth. A! vendor has at least twice the number of selections as the closest competitor. A! vendor has at least twice the number of responses as the closest competitor. 2H 12, n=200; 2H 13, n=207. Source: Information Security Wave Research, LLC.

15 Information Security Technologies: Heat Index Ranking and Leading Inplan Vendors Time Series (2 of 2) Heat Rank Technology 2H 12 Lead In-plan Vendor 2H 13 Lead In-plan Vendor 2H 12 2nd In-plan Vendor 2H 13 2nd In-plan Vendor 25 Information or Digital Rights Management Microsoft! Microsoft! CloudLock WatchDox 26 Laptop Encryption Microsoft Microsoft! Symantec Dell 26 Tokenization FireEye Agilysys Ingenico SafeNet; Protegrity 28 /Messaging Archiving/Compliance Symantec! Google! Microsoft; EMC HP 29 Multifactor Authentication for Web-based Applications EMC! Symantec; EMC Zoho; Swivel; Ping Identity; Novell; Experian 30 Hard Drive Encryption Microsoft Microsoft! Symantec McAfee 31 Key Management and/or Public Key Infrastructure Homegrown; IBM; Microsoft Microsoft Protegrity; Symantec; Venafi Venafi 32 Database Security Imperva Imperva IBM IBM 33 Single Sign-on Microsoft Okta; Microsoft Open Source Ping Identity 34 Network Firewalls Web Content Filtering - Websense! - Blue Coat 36 Application Security Testing External Interface Fuzzing or Testing Vulnerability Assessment Qualys! WhiteHat Sec ESET Veracode 37 File Integrity Monitoring McAfee; Dell Tripwire Varonis Symantec 38 Vulnerability/Risk Assessment/Scanning (of Infrastructure) Accuvant; Dell; MANDIANT; McAfee; Qualys; Rapid7; Symantec Tenable; McAfee HID Global Core Security 38 Secure File Transfer - Box! - Google; AppSense; Accellion 38 SSL VPNs - Juniper Networks! - Citrix; Cisco 41 Penetration Testing Accuvant; MANDIANT; Open Source; Qualys - HID Global - 41 Computer Forensics Guidance Sftw! Guidance Sftw! AccessData Symantec; AccessData 41 Secure Instant Messaging Microsoft Microsoft - Google 44 Anti-spyware Sophos! - ESET; Palo Alto; Symantec - 44 Host Intrusion Detection and/or Prevention (HIDS/HIPS) Symantec McAfee! McAfee Trend Micro 46 Patch Management Microsoft; Symantec Microsoft! BMC Software - 47 Anti-virus - Trend Micro Anti-spam/ Security Technology Heat Index : measures user demand for a technology based on several factors including: usage or planned usage, changes in planned spending, an organization s budget for the relevant IT sector, and future changes in the organization s budget. A high score means a technology is expected to see significant growth. A! vendor has at least twice the number of selections as the closest competitor. A! vendor has at least twice the number of responses as the closest competitor. 2H 12, n=200; 2H 13, n=207. Source: Information Security Wave Research, LLC.

16 Appendixes

17 Demographics Industry Verticals Enterprise Revenue Energy/Utilities 5% Materials/Chemicals 6% Telecom/Technology 7% Transportation Public Sector Financial Services 2 $30B-$40B $20B-$29.99B 7% > $40B 9% < $499.99M 16% $500M-$999.99M 7% Education 7% Services: Business/Accounting/E ngineerin 8% > 10,000 55% Other 8% Industrial/Manufacturi ng 9% Employee Size < % Consumer Goods/Retail 1 Healthcare/Pharmaceu ticals 1 1,000-4,999 20% $10B-$19.99B 1 $10M-$19.9M 1 $7M-$9.9M $5B-$9.99B 15% > $30M $20M-$30M 6% $1B-$4.99B 29% Information Security Budget Level < $500K 19% $500K-$999K 9% 5,000-10,000 17% $4M-$6.9M 1 $2M-$3.9M 18% $1M-$1.9M 1 Top Left Chart: n=207; Top Right Chart, n=207; Bottom Left Chart, n=207; Bottom Right Chart, n=141. Source: Information Security Wave Research, LLC.

18 Methodology and Sample Variation METHODOLOGY The Information Security Study relies on a proprietary network of IT professionals and is based on in-depth interviews with 207 information security professionals conducted from April 2013 through October TheInfoPro s interviewers are current and former IT managers and executives. They ask open-ended questions that enable TheInfoPro to gain an excellent understanding of the issues and decision-making process related to strategic planning, technology benchmarking, and vendor selection and negotiation. The Commentator Network has a variety of industry types and levels of technology adoption. TheInfoPro screens potential commentators to ensure that they can discuss in detail their enterprises technology roadmap and relationships with pertinent vendors. To participate, a commentator had to work for a large or midsize enterprise. For the purposes of this study, large enterprises have more than $1bn of revenue and midsize enterprises have annual revenue of $100m to $999m. SAMPLE SIZE VARIATION Because the interviews are designed to be flexible to the needs and knowledge of the commentator, not every interviewee is asked every question. As a result, many charts have a sample size varying from the total number of interviews. RECENT CHANGES TO THE STUDY Many respondents have detailed knowledge of all technology areas, but some do not. Beginning this year we are reporting percentages based upon the full survey sample of respondents, and showing the percentage of respondents who indicated that they did not have detailed status knowledge for certain technologies. TheInfoPro s Technology Heat Index and Adoption Index have been updated. The indexes were re-engineered to provide a stronger picture of user demand and investment in technologies. The calculations now account for planned changes in a technology s spending and the relevant sector s budgets. Source: Information Security Wave Research, LLC.

19 How to Interpret the Data DATA IN STANDARD BAR AND COLUMN CHARTS Bar and column charts represent the percentage of commentators that gave a particular response. When relevant, Don t Know responses are included on charts. If a stacked bar or column chart does not equal 100%, it is because Don t Know or Not Using responses are hidden. For questions with multiple responses per interview, the totals for some charts may exceed 100%. TECHNOLOGY ROADMAP AND INDEXES The Technology Roadmaps highlight the percentage of respondents with a technology in use, the percentage that are likely to use the technology for the first time in the next two years, and those who have no plans. The size of the gap between 'in use' and 'not in plan' status indicates the potential opportunity for a technology in the next two years. For each roadmap technology, respondents are asked about their implementation status and plans, the vendors in use or consideration, and expectations for spending changes. This data is combined with spending and budget data to calculate the Heat and Adoption index values for each technology. The Technology Heat Index measures user demand for a technology based on several factors including: usage or planned usage, changes in planned spending, an organization s budget for the relevant IT sector, and future changes in the organization s budget. A high score means a technology is expected to see significant growth. The Technology Adoption Index measures aggregate investment in a technology based on several factors including: usage or planned usage, changes in planned spending, and an organization s budget for the relevant IT sector. A high score means the technology is already experiencing healthy adoption. Technologies with a high Heat Index score and a low Adoption Index score have the largest near-term market opportunity for vendors. Technologies with a high Heat Index score and a high Adoption Index score are experiencing near-term growth but have limited opportunities for new market entrants. A low Heat Index paired with a low Adoption Index indicates a technology with limited near-term growth potential. CUSTOMER RATINGS Respondents rated vendors on 14 criteria using a 1-5 scale, with 1 being poor and 5 being excellent. The Market Window is TheInfoPro's unique methodology to visualize comparative vendor ratings on a single chart. It plots the Promise and Fulfillment Indexes to compare vendors effectiveness at marketing and execution. A vendor placing in the upper right quadrant is rated highly for both its promise and ability to execute underpromising and overdelivering relative to its peers. Conversely, a vendor in the lower left quadrant rates poorly on the same criteria. The Vendor Promise Index is designed as a measure of marketing effectiveness. It uses four of the 14 customer ratings criteria (competitive positioning, technical innovation, management s strategic vision and brand/reputation), which are related to global concepts conveyed to potential customers prior to actual product/service delivery and use. The Vendor Fulfillment Index is designed as a measure of execution effectiveness. It uses four of the 14 customer ratings criteria (value for the money, product quality, delivery as promised and technical support quality), which are related to the physical product/service delivery and customer experience of using the product or service. Source: Information Security Wave Research, LLC.

20 Each individual report summarizes interesting portions of TheInfoPro s Wave 16 Information Security Study and does not comprehensively review the hundreds of pages of research that form the full study. For access to TheInfoPro s reports and services, please contact sales@451research.com. Methodology questions may be addressed to client.services@451research.com. 451 Research, a division of The 451 Group, is focused on the business of enterprise IT innovation. The company s analysts provide critical and timely insight into the competitive dynamics of innovation in emerging technology segments. Business value is delivered via daily concise and insightful published research, periodic deeper-dive reports, data tools, marketsizing research, analyst advisory, and conferences and events. Clients of the company at vendor, investor, service-provider and end-user organizations rely on 451 Research s insight to support both strategic and tactical decision-making. TheInfoPro, a service of 451 Research, is widely regarded as The Voice of the Customer, providing independent, real world intelligence on key IT sectors including Servers and Virtualization, Information Security, Networking, Storage and Cloud Computing. Using one-onone interviews conducted within a proprietary network composed of the world s largest buyers and users of IT, TheInfoPro provides data and insights that are used for strategic planning, technology benchmarking, competitive analysis, and vendor selection and negotiation. Reproduction and distribution of this publication, in whole or in part, in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. 451 Research disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although 451 Research may discuss legal issues related to the information technology business, 451 Research does not provide legal advice or services and their research should not be construed or used as such. 451 Research shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice. TheInfoPro and logo are registered trademarks and property of 451 Research, LLC Research, LLC and/or its Affiliates. All Rights Reserved West 37th Street, 3rd Floor, New York, NY P F Research, LLC.

Reference Technology Roadmap

Reference Technology Roadmap Information Security Study: Wave 17 Reference Technology Roadmap Comparing all 42 technologies tracked in the study, this high-level reference contains the Technology Index, the Adoption Index, leading

More information

Network Management Software Technology Roadmap

Network Management Software Technology Roadmap Networking Study: Wave 10 Network Management Software Technology Roadmap Capturing networking professionals adoption plans, projected spending and vendor short-lists, the indepth roadmap covers six technologies

More information

Data Networking Technology Roadmap

Data Networking Technology Roadmap Networking Study: Wave 10 Data Networking Technology Roadmap Capturing networking professionals adoption plans, projected spending and vendor short-lists, the indepth roadmap covers 17 technologies including:

More information

Big Data and Business Analytics

Big Data and Business Analytics Servers and Virtualization Study: Wave 14 Big Data and Business Analytics This report captures IT professionals adoption plans, projected spending, vendor short-lists and considerations in decision-making

More information

Virtualization Drives New Approaches to Backup. PRESENTATION TITLE GOES HERE Nikolay Yamakawa 451 Research

Virtualization Drives New Approaches to Backup. PRESENTATION TITLE GOES HERE Nikolay Yamakawa 451 Research Virtualization Drives New Approaches to Backup PRESENTATION TITLE GOES HERE Nikolay Yamakawa 451 Research Nikolay Yamakawa Analyst Nikolay is an analyst for 451 Research's TheInfoPro service, where he

More information

State of the Market for Security Information Event Management and Log File Management Solutions

State of the Market for Security Information Event Management and Log File Management Solutions This research paper from TheInfoPro (TIP) delivers findings on over 140 in-depth interviews with Fortune 1000 Information Security professionals conducted in 2008, plus another 300 interviews conducted

More information

INFORMATION SECURITY STUDY

INFORMATION SECURITY STUDY WAVE 16 MARKET DYNAMICS INFORMATION SECURITY STUDY Designed for IT professionals, this report captures highlights from the complete study, and provides business intelligence in the form of technological

More information

The Cyber Threat Landscape

The Cyber Threat Landscape The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without

More information

TOTAL DATA WAREHOUSING: 2013-2018

TOTAL DATA WAREHOUSING: 2013-2018 TOTAL DATA WAREHOUSING: 2013-2018 Analytic Database and Hadoop Market Sizing and Forecasts This report examines the marketplace for Total Data Warehousing including competing players, revenue generation

More information

Cloud Management Platform Market Map 2016

Cloud Management Platform Market Map 2016 MARKET MAP Cloud Management Platform Market Map 2016 MAY 2016 William Fellows, Research Vice President A cloud management platform should operate like a cloud Uber app for IT consumption and delivery that

More information

MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING "IT" ALONE

MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING IT ALONE MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING "IT" ALONE August 2014 Derek E. Brink, CISSP, Vice President and Research Fellow, IT Security and IT GRC Report Highlights p2 p3 p6 p7 Security is

More information

BMS Consulting Cyber Security and IT Technology Team

BMS Consulting Cyber Security and IT Technology Team BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the

More information

CLOUD CLIENTS AND VIRTUAL CLIENTS

CLOUD CLIENTS AND VIRTUAL CLIENTS CLOUD CLIENTS AND VIRTUAL CLIENTS The Transformation of Virtual Desktops Through Mobility and Cloud Computing Over the past three years, the technology we used to know as virtual desktop infrastructure

More information

MANAGED INFRASTRUCTURE MARKET OVERVIEW 2013

MANAGED INFRASTRUCTURE MARKET OVERVIEW 2013 EXECUTIVE OVERVIEW MANAGED INFRASTRUCTURE MARKET OVERVIEW 2013 Global Perspectives KEY FINDINGS Managed hosting as a subset of managed infrastructure remains the overwhelming bulk of the market opportunity

More information

Social Intranets and the Supply Chain

Social Intranets and the Supply Chain THOUGHT LEADERSHIP Social Intranets and the Supply Chain EXECUTIVE OVERVIEW SEP 2015 Alan Pelz-Sharpe, Research Director, Business Applications Matt Mullen, Senior Analyst, Business Applications In one

More information

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

With Cloud Defender, Alert Logic combines products to deliver outcome-based security With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,

More information

OF THE CLOUD, FOR THE CLOUD

OF THE CLOUD, FOR THE CLOUD EXECUTIVE OVERVIEW OF THE CLOUD, FOR THE CLOUD The State of the Art in IT Performance Management IT performance management tools are following application and infrastructure workloads to the cloud, giving

More information

Data Platforms and Analytics Market Map 2016

Data Platforms and Analytics Market Map 2016 MARKET MAP Data Platforms and Analytics Market Map 2016 APRIL 2016 Matt Aslett, Research Director, Data Management & Analytics Krishna Roy, Senior Analyst, Data Platforms & Analytics James Curtis, Senior

More information

On the Radar: Pulse Secure

On the Radar: Pulse Secure Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT0022-000431 Rik Turner Summary Catalyst Pulse Secure is a developer of secure

More information

Telco Multi-Play and Content Strategies

Telco Multi-Play and Content Strategies THOUGHT LEADERSHIP Telco Multi-Play and Content Strategies APR 2016 Declan Lonergan, VP, Research As telecom operators extend their convergence strategies and launch multi-play landline/mobile/tv services,

More information

TCS Managed Security Services

TCS Managed Security Services IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...

More information

Software and Data Are Reshaping the Advertising Market

Software and Data Are Reshaping the Advertising Market THOUGHT LEADERSHIP Software and Data Are Reshaping the Advertising Market APR 2016 Scott Denne, Analyst Matt Mullen, Senior Analyst, Social Business The growth of digital media and mobile connectivity

More information

The State of the European Public Cloud Market

The State of the European Public Cloud Market The State of the European Public Cloud Market 2015 UPDATE A year ago, startups, early adopters, and test and development professionals were the key markets for European public cloud service providers.

More information

2016 Trends in Service Providers

2016 Trends in Service Providers PREVIEW 2016 Trends in Service Providers NOV 2015 Al Sadowski, Research Director Liam Eagle, Senior Analyst Carl Brooks, Analyst Jim Davis, Senior Analyst Selling generic technology resources is no way

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes

More information

Web and Application Hosting 2015

Web and Application Hosting 2015 MARKET FORECAST Web and Application Hosting 2015 SEP 2015 Liam Eagle, Senior Analyst, Service Providers Web and application hosting, a mature IT market, is facing changes to the variety of services on

More information

THE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS

THE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS EXECUTIVE OVERVIEW THE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS KEY FINDINGS The IaaS market is currently about 20% the size of the managed hosting market; however, it

More information

A Closer Look At The Second Largest Cybersecurity M&A Transaction In History

A Closer Look At The Second Largest Cybersecurity M&A Transaction In History 1 acquires A Closer Look At The Second Largest Cybersecurity M&A Transaction In History Advisors & Dealmakers In Cybersecurity. Momentum Partners, LLC Advise. Network. Invest. Symantec Acquires Blue Coat

More information

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security

More information

Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15

Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15 Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15 Excerpt prepared for Egnyte, Inc. Publication Date: 28 Aug 2014 Product code: IT0021-000018 Richard Edwards Summary Catalyst

More information

Global Security Software Market 2015-2019

Global Security Software Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security

More information

The Data Management of Things

The Data Management of Things The Data Management of Things THE IMPLICATIONS OF IOT FOR DATA ANALYTICS The Internet of Things (IoT) is placing new demands on data storage, networking, processing and analytics. For end users, vendors

More information

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013 Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory

More information

Global Security Testing Market 2015-2019

Global Security Testing Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3175798/ Global Security Testing Market 2015-2019 Description: About Security Testing Companies around the world are witnessing

More information

Seattle EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET

Seattle EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET Seattle MULTI-TENANT DATACENTER MARKET This report provides an overview of the competitive dynamics in the Seattle market, a 451 Research Market Map of the competitors in the area, market share of the

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T W o r l d w i d e W e b S e c u r i t y 2 0 1 1-2 0 1 5 F o r e c a s t a n d 2 0 1

More information

End-to-End Application Security from the Cloud

End-to-End Application Security from the Cloud Datasheet Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed

More information

Cloud Based Security Services - Global Strategic Business Report

Cloud Based Security Services - Global Strategic Business Report Brochure More information from http://www.researchandmarkets.com/reports/3301150/ Cloud Based Security Services - Global Strategic Business Report Description: This report analyzes the worldwide markets

More information

Are Small Consultancies Best for Big Data Projects?

Are Small Consultancies Best for Big Data Projects? Are Small Consultancies Best for Big Data Projects? Big data is attracting the attention of all types of buy-side organizations. But because the technologies involved are immature and there is a lack of

More information

THE CHANGING LINUX LANDSCAPE. The cloud, community distributions and devops are dramatically impacting the market

THE CHANGING LINUX LANDSCAPE. The cloud, community distributions and devops are dramatically impacting the market THE CHANGING LINUX LANDSCAPE The cloud, community distributions and devops are dramatically impacting the market Trends such as cloud computing and devops whereby application development and deployment

More information

2016 Trends in Enterprise Mobility

2016 Trends in Enterprise Mobility PREVIEW 2016 Trends in Enterprise Mobility OCT 2015 Chris Hazelton, Research Director Brian Partridge, Vice President Raúl Castañón-Martínez, Senior Analyst Rich Karpinski, Principal Analyst Sheryl Kingstone,

More information

SSL VPN 1H03 Magic Quadrant Evaluation Criteria

SSL VPN 1H03 Magic Quadrant Evaluation Criteria Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and

More information

2016 Trends in Datacenter Technologies

2016 Trends in Datacenter Technologies PREVIEW 2016 Trends in Datacenter Technologies OCT 2015 Rhonda Ascierto, Research Director Andy Lawrence, Research Vice President Andrew Donoghue, European Research Manager Daniel Bizo, Senior Analyst

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE. Monitoring, Managing and Optimizing the Datacenter

DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE. Monitoring, Managing and Optimizing the Datacenter Analyzing the Business of Enterprise IT Innovation DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE Monitoring, Managing and Optimizing the Datacenter As datacenters become bigger, denser and more complex,

More information

THE CYBER-SECURITY PLAYBOOK

THE CYBER-SECURITY PLAYBOOK THE CYBER-SECURITY PLAYBOOK Selling Into the Global Defense Market The federal cyber-security space is becoming a hotbed of incubation, acquisition and opportunity, but how to sell into this complicated

More information

CLOUDSCAPE. IT SERVICES Tooling up for ITaaS KEY FINDINGS

CLOUDSCAPE. IT SERVICES Tooling up for ITaaS KEY FINDINGS IT SERVICES Tooling up for ITaaS IT as a service (ITaaS) is an operational model where the enterprise IT department acts and operates as a distinct business entity, creating services for the other lines

More information

Market Guide for Network Sandboxing

Market Guide for Network Sandboxing G00271317 Market Guide for Network Sandboxing Published: 2 March 2015 Analyst(s): Lawrence Orans, Jeremy D'Hoinne Choosing a network sandboxing solution is challenging due to the wide array of options

More information

2015 Services Catalog. IT Security Training & Solutions I(TS) ²

2015 Services Catalog. IT Security Training & Solutions I(TS) ² 2015 Services Catalog IT Security Training & Solutions I(TS) ² CONSULTING Compliance Services Gap Analysis The gap analysis is a fast track assessment to establish understanding on an organization s current

More information

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if

More information

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness

More information

The table below shows the satisfaction and scale scores that determine vendor placement on the Grid.

The table below shows the satisfaction and scale scores that determine vendor placement on the Grid. Best CRM Products G2 Crowd rated these products highest based on reviews and data gathered by June 9, 2013: n Leaders: Salesforce.com and Microsoft Dynamics CRM n High Performers: Workbooks, SugarCRM,

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Grid for CRM Summer 13

Grid for CRM Summer 13 Best CRM Products G2 Crowd rated these products highest based on reviews and data gathered by June 9, 2013. CRM vendors are listed within each category in order of highest to lowest G2 score: Leaders:

More information

SIEM and IAM Technology Integration

SIEM and IAM Technology Integration SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

VMware Integrated Partner Solutions for Networking and Security

VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security Networking and Security are complex, dynamic areas, and VMware recognizes

More information

Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology

Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology An Executive Brief Frank Dickson Research Director Information & Network Security 1 Key Findings Advanced persistent

More information

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020)

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends (2015-2020) Brochure More information from http://www.researchandmarkets.com/reports/3421382/ Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends

More information

What to Look for When Evaluating Next-Generation Firewalls

What to Look for When Evaluating Next-Generation Firewalls What to Look for When Evaluating Next-Generation Firewalls Using independent tests to compare performance, cost and functionality Table of Contents Why Use Independent Tests in Evaluations?... 3 What to

More information

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

WHITE PAPER. BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013 14

WHITE PAPER. BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013 14 BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013 14 BMC Software Evaluation for Selecting a Cloud Management Solution Technology Decision Matrix, 2013

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide

More information

Tom Reilly President & CEO, ArcSight

Tom Reilly President & CEO, ArcSight Tom Reilly President & CEO, ArcSight ArcSight Company Background Founded May 2000 2000+ customers 500+ employees, offices worldwide NASDAQ: ARST 20% Revenue growth year over year Analyst Recognition SIEM

More information

BI Platforms User Survey, 2011: Customers Rate Their BI Platform Vendors

BI Platforms User Survey, 2011: Customers Rate Their BI Platform Vendors BI Platforms User Survey, 2011: Customers Rate Their BI Platform Vendors Gartner RAS Core Research Note G00211769, Rita L. Sallam, 4 April 2011, RA1 07132011 Gartner recently surveyed business intelligence

More information

Global Endpoint Security Market 2015-2019

Global Endpoint Security Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3097865/ Global Endpoint Security Market 2015-2019 Description: About Endpoint Security Endpoint security is a methodology that

More information

APPENDIX C AMENDMENT # 3 PRICING INDEX DIR CONTRACT NO. DIR-SDD-1855. Solid Border, Inc.

APPENDIX C AMENDMENT # 3 PRICING INDEX DIR CONTRACT NO. DIR-SDD-1855. Solid Border, Inc. APPENDIX C AMENDMENT # 3 PRICING INDEX DIR CONTRACT NO. DIR-SDD-1855 DESCRIPTION Solid Border, Inc. CUSTOMER DISCOUNT ITS PRODUCTS Accellion Lab Gear 50% Accellion Appliance Bundles/Software 13.75% AppNeta

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E XCERPT M A R K E T A N A L Y S I S W o r l d w i d e S e c u r i t y a n d V u l n e r a b i l i

More information

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa

More information

Security Services. 30 years of experience in IT business

Security Services. 30 years of experience in IT business Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3

More information

Global Enterprise Network Security Market 2012-2016

Global Enterprise Network Security Market 2012-2016 Brochure More information from http://www.researchandmarkets.com/reports/2668090/ Global Enterprise Network Security Market 2012-2016 Description: The analysts forecast the Global Enterprise Network Security

More information

Click to edit Master title style. How To Choose The Right MSSP

Click to edit Master title style. How To Choose The Right MSSP How To Choose The Right MSSP Meet Eric Eric Devansky Director of Global Security Services 15 Years of experience in the Cyber Security industry CISSP Palo Alto CNSE VMWare VCP Connect with me: @TruShield

More information

IT Security. Muscat 15+ ABOUT US IN A GLANCE

IT Security. Muscat 15+ ABOUT US IN A GLANCE www.insight.co.om insightoman insightoman insightoman insight-information-technology www.insight.co.om insightoman insightoman insightoman insight-information-technology ABOUT US LOCATION Visit us at

More information

2016 Trends in Cloud and IT Services Markets

2016 Trends in Cloud and IT Services Markets PREVIEW 2016 Trends in Cloud and IT Services Markets DEC 2015 William Fellows, Research Vice President Owen Rogers, Research Director Agatha Poon, Research Manager Katy Ring, Research Director Cloud transformation

More information

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance

More information

BACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments

BACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments BACKUP IN A VIRTUAL WORLD Data-Protection Challenges in Virtual Server Environments Data protection for virtual environments became crucial when end users began virtualizing tier-one, mission-critical

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences Health & Life sciences breach security program David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences Overview 1. Healthcare Security Research / Directions 2. Healthcare

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform

More information

2003 Desktop Software Distribution Magic Quadrant

2003 Desktop Software Distribution Magic Quadrant Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic

More information

G-Cloud Service Definition. Atos Security Professional Services SCS

G-Cloud Service Definition. Atos Security Professional Services SCS G-Cloud Service Definition Atos Security Professional Services SCS Atos Security Professional Services SCS Security Professional Services delivered by experienced certified professionals empowered by market

More information

Cloud Brokers EXECUTIVE OVERVIEW MAKING ITAAS A PRACTICAL REALITY?

Cloud Brokers EXECUTIVE OVERVIEW MAKING ITAAS A PRACTICAL REALITY? Cloud Brokers MAKING ITAAS A PRACTICAL REALITY? This report examines what a cloud broker is, its components and functions, its role(s), its audience and how it supports the delivery of ITaaS by turning

More information

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion

More information

Collecting and Sharing Security Metrics the End of Security by Obscurity

Collecting and Sharing Security Metrics the End of Security by Obscurity Collecting and Sharing Security Metrics the End of Security by Obscurity a.k.a Communicating Security Performance to Non-Security Professionals Jim Acquaviva ncircle Session ID: SPO2-204 Session Classification:

More information

Mexico EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET

Mexico EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET Mexico MULTI-TENANT DATACENTER MARKET This report provides an overview of the competitive dynamics in the Mexico market, a 451 Research Market Map of the competitors in the area, market share of the dominant

More information

MOBILE APP LIFECYCLE

MOBILE APP LIFECYCLE MOBILE APP LIFECYCLE Design and Development As enterprises invest in developing or externally sourcing mobile apps, they are finding the need to integrate this process into the overall software development

More information

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market

More information

Windows Hard Disk Encryption

Windows Hard Disk Encryption Windows Hard Disk Encryption Usage Analysis September 2010 Windows Hard Disk Encryption Usage Analysis Introduction This is the first OPSWAT usage report for hard disk encryption products. Because Microsoft

More information

Utility Modernization Cyber Security City of Glendale, California

Utility Modernization Cyber Security City of Glendale, California Utility Modernization Cyber Security City of Glendale, California Cyber Security Achievements Cyber Security Achievements (cont) 1. Deploying IT Security Awareness training program Q4 2012 2. Purchased

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

TOTAL DATA INTEGRATION

TOTAL DATA INTEGRATION The Impact of Big Data on Integration and Governance Big data and Total Data have the potential to change the face of the data integration market. This report outlines the key drivers shaping this sector

More information

Realize That Big Security Data Is Not Big Security Nor Big Intelligence

Realize That Big Security Data Is Not Big Security Nor Big Intelligence G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Best Practices for Mitigating Advanced Persistent Threats

Best Practices for Mitigating Advanced Persistent Threats G00256438 for Mitigating Advanced Persistent Threats Published: 12 September 2013 Analyst(s): Lawrence Pingree, Neil MacDonald, Peter Firstbrook This document provides information security practitioners

More information

Global Cyber Security Industry Report 2015

Global Cyber Security Industry Report 2015 Global Cyber Security Industry Report 2015 Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com Global Cyber Security Industry Report 2015 Date: September 1, 2015 Pages: 158 Price:

More information

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor VENDOR PROFILE SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor Juan Sacchi IDC OPINION SecureData is a growing managed security services provider headquartered in the U.K. with

More information

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions. Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information

More information

VMware vcloud Air Security TECHNICAL WHITE PAPER

VMware vcloud Air Security TECHNICAL WHITE PAPER TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects

More information

How to Get to Single Sign-On

How to Get to Single Sign-On How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in

More information