Market Analysis. Overview 2013 NEXT GENERATION FIREWALLS. Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis, Mike Spanbauer

Size: px
Start display at page:

Download "Market Analysis. Overview 2013 NEXT GENERATION FIREWALLS. Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis, Mike Spanbauer"

Transcription

1 Market Analysis 2013 NEXT GENERATION FIREWALLS Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis, Mike Spanbauer Overview The term next generation firewall (NGFW) is as nebulous as the market that it represents. In today s nomenclature, the term denotes a firewall that provides functionality beyond the traditional capabilities of classic firewall port blocking. Over the years, numerous vendors and analyst firms have tried to attach a more specific definition to the term and thus differentiate NGFW from existing unified threat management (UTM) products. Today, any direct comparison of NGFW and UTM products is moot because customers are ignoring labels and choosing solutions strictly on features and functions. While vendor product marketing teams will continue to argue over the definitions of NGFW and UTM, the industry appears mostly content to apply the historical moniker of UTM to the small and medium- sized business (100 employees and under and NGFW to enterprise deployments of mid- sized companies and larger (1000 seats and up). Early attempts to combine multiple functions within a single device were plagued with problems. Today s devices are capable of performing at high throughputs with numerous functions enabled, which is encouraging many organizations to consolidate multiple features into a single device. The widespread acceptance of NGFW products by enterprises indicates a change in perception in the security market. Other significant trends driving the market are the need for application control and the need for advanced security that is applied consistently from branch offices to data centers to the cloud. These trends have led to a high- growth market as most organizations have replaced traditional gateway devices with NGFWs. While this market has been lucrative for many vendors and has caused significant changes in the infrastructure security landscape, the next several years are poised to provide numerous challenges and potential upheaval as organizations settle on specific vendors and NGFW refresh cycles become more predictable. The next few years will be key for NGFW vendors as they look for ways to differentiate their offerings and provide additional services in order to take market share from other technologies. Cloud- based sandboxing and endpoint protection are some of the new features in NGFWs, and the adoption rates of those technologies will change the market landscape for NGFW vendors and for other traditional security vendors. The concept of a common security platform is the driving message of NGFW vendors today, but some critics still argue that such an approach actually lowers security effectiveness since all of the security products from a given vendor are fed by a common back end. To address this challenge and to more quickly integrate new security features, NGFW vendors are expanding their technology partnerships and making third- party security software available on their platforms. A tactic some vendors, such as WatchGuard, tout as a competitive advantage.

2 The NGFW market has driven a great deal of change in the infrastructure security market and clearly is here to stay. However, considering most organizations by now have made their first and quite possible their largest purchase in the technology, the NGFW market is now entering its next phase, and it will be significantly affected by vendor choices regarding new technologies, alliances, and partnerships over the next three to five years. NSS Labs Findings In 2013, the NGFW market generated US$2.87 billion in revenues The NGFW market is showing strong revenue gains, with a growth rate of more than 17.9% in 2013 and a continued average growth rate of 15.3% expected for the next five years. While the NGFW market has shown exceptional growth, most enterprises have now performed their first replacements and are moving into more traditional three- to- five year replacement cycles. NGFW vendors are looking for new technologies to integrate in order to differentiate themselves from the competition. Subscription sales continue to climb as a percentage of overall sales, which indicates high vendor loyalty, but which can also cut into profit margins (services are more expensive to maintain). 2

3 Table of Contents Overview... 1 NSS Labs Findings... 2 Analysis... 5 Methodology... 5 Market Definition... 5 Top Market Drivers... 6 A More Complex Threat landscape... 6 Ongoing Proliferation of High- Profile Breaches... 6 Availability of High Performance Products... 6 Lower Total Cost of Ownership (TCO) Compared to Multiple Products... 6 Simplified Security Management through a Single Platform... 7 Interest in Protecting Cloud and Virtual Deployments... 7 Top Market Inhibitors... 7 Market Saturation of NGFW Products... 7 Performance and Vulnerability Concerns over Single Vendor Solution... 7 Changing Security Priorities within Organizations... 8 Difficulty in Showing ROI from Security... 8 Total Market Size and Growth Forecasts... 8 Products and Services Revenue... 9 Total Units Shipped Technology Trends Threat Intelligence Sandboxing and Breach Detection Technology Endpoint Protection Managed through NGFW Vertical Market Trends Horizontal Market Trends Mergers and Acquisitions Cisco Acquires Sourcefire Palo Alto Acquires Morta and Cyvera Sophos Acquires Cyberoam and Mojave Vendor Market Share Appendix A: Vendor List Reading List Contact Information

4 Table of Figures Figure 1 Market Drivers for the NGFW Market, Figure 2 Market Inhibitors for the NGFW Market, Figure 3 NGFW Total Market Revenues and Growth Rate, 2012 to 2018 (Base Year 2013)... 8 Figure 4 NGFW Total Market Revenues and Growth Rate (Graphic Representation), (Base Year 2013)... 9 Figure 5 NGFW Product and Service Breakouts, Figure 6 NGFW Average Selling Price Forecast (Base Year 2013) Figure 7 NGFW Vertical Market Forecast by Revenue Figure 8 NGFW Vertical Market Forecast by Percentage Figure 9 NGFW Horizontal Forecasts by Revenue Figure 10 NGFW Horizontal Forecast by Percentage Figure 11 NGFW Market Share, Product and Service Revenue, Base Year

5 Analysis Similar to its predecessor, the traditional firewall, NGFW technology is considered security table stakes. NGFW vendors combine diverse security technologies to serve as single infrastructure security providers. Enterprises and small business alike have also embraced the lower price points, greater processing power, and improved security that these products provide compared to best- of- breed products from a few years ago. Where protection of an attack surface once required several separate products, the same protection can be now be achieved with a single NGFW. Now that NGFW technology is mainstream, the vendor landscape must evolve to drive new revenue opportunities beyond initial deployment of these devices. NGFW vendors have adopted various innovative approaches to expand their technology footprints, including acquisitions and technology partnerships that are designed to reached past the perimeter and take on technologies such as breach detection and endpoint protection. Methodology The NSS Labs Market Analyses have a robust methodology that is designed to provide an accurate picture of the particular market being evaluated. Once a market has been identified by NSS as a candidate for a Market Analysis, the vendor landscape is evaluated to identify market participants, and a detailed questionnaire is submitted to vendors, resellers, and customers. Vendors have the opportunity to perform fact checking on any information that is published by NSS. NSS is using 2013 as the base year for all forecasts and financial data for this Market Analysis. Revenue calculations include product and services revenue, since NGFWs cannot operate without subscription services. Market Definition As the firewall market evolves, other security functions (such as network intrusion prevention systems, application control, full stack inspection and extra firewall intelligence sources) have become incorporated into the security appliance. Many vendors refer to these products as next generation firewalls (NGFWs) or unified threat management (UTM) products. NSS considers this category to include devices that can perform firewall, intrusion prevention, and application control functions at a minimum. Today s NGFW devices include functionality that is traditionally found in web security, security, breach detection, Secure Sockets Layer (SSL) VPN, and even endpoint security products. Across the industry, most vendors and customers differentiate UTM and NGFW products based on their ability to operate in conjunction with a centralized management system (CMS). 5

6 Top Market Drivers Figure 1 illustrates the top market drivers for the NGFW market for the forecast period Market Driver Market Impact More complex threat landscape Very High None Impact Change During Forecast Ongoing proliferation of high- profile breaches Very High Decreasing Availability of high performance products Very High None Lower total cost of ownership (TCO) compared to multiple products High Increasing Simplified security management through a single platform Medium None Interest in protecting cloud and virtual deployments Medium None A More Complex Threat landscape Figure 1 Market Drivers for the NGFW Market, The threat landscape continues to evolve as tools become easier to use and attackers continue to profit from their attacks. High- profile attacks against retailers such as Target, Inc. and Home Depot are raising awareness of the damage that can be wrought by determined attackers. Advanced attacks, along with the challenges posed by bring your own device (BYOD), make security challenging for organizations of all sizes. Ongoing Proliferation of High- Profile Breaches The steady drumbeat of high- profile breach reports in 2013 and 2014 has little chance of subsiding in the next few years. High- profile attacks have increased information security awareness amongst consumers and are driving spending on newer technology products. While NGFW technology is benefiting from this increased spend, the frustration with many traditional security products is driving some organizations to evaluate other security products, such as breach detection systems (BDS). Availability of High Performance Products One of the key inhibitors of the NGFW market traditionally has been performance. It was difficult to create a unified platform that had the processing power to operate at speeds most enterprises require. While the NGFW is now prevalent in the SMB and branch office, it is only in the last few years that it has proved sufficiently stable for enterprise customers. Today, many vendors offer devices that can perform at well over 10 Gbps. NGFWs will continue to improve performance as 40 Gbps and 100 Gbps interfaces become more common. Lower Total Cost of Ownership (TCO) Compared to Multiple Products Another key driver of the NGFW market is the lower TCO compared to purchasing a variety of products from multiple vendors. Traditionally organizations would purchase at least three devices, often from as many different vendors in order to secure their traffic. This led to various costs, including the support and maintenance costs from multiple vendors, and the significant cost of deploying multiple devices. By moving to an NGFW, organizations significantly reduce the number of devices deployed, and they pay only one support and subscription cost. 6

7 Simplified Security Management through a Single Platform Security products historically have faced challenges integrating data coming from different devices. The single platform approach used by NGFW technology allows NGFWs to normalize data and provide administrators access to security data across diverse functions. The approach minimizes the skill sets needed to manage the security of an organization and is critical for small and medium- sized enterprises that typically lack security staff. Interest in Protecting Cloud and Virtual Deployments There is strong interest in moving data and applications to the cloud. While security remains a key concern in cloud adoption, many organizations are searching for ways to extend existing security architectures into cloud deployments. This has prompted many NGFW vendors to create virtual versions of their products. And more recently, NGFW vendors have begun partnering with and offering dedicated solutions for platform- as- a- service (PaaS) providers. Amazon Web Services and Microsoft Azure are the most supported platforms. Top Market Inhibitors Figure 2 illustrates the top market inhibitors for the NGFW market for the forecast period Market Inhibitor Market Impact Change During Forecast Market saturation of NGFW products High Increasing Performance and vulnerability concerns High None Changing security priorities within organizations Medium Increasing Difficulty in showing ROI from security Medium None Market Saturation of NGFW Products Figure 2 Market Inhibitors for the NGFW Market, Many enterprises and even small business have switched to NGFWs and are now on a more consistent replacement cycle of three to five years. While NGFW vendors have worked to drive best practices regarding the use of NGFWs for segmentation gateways, many organizations are content with the solutions they have in place, and out- of- cycle purchases are occurring less frequently. Vendors are working quickly to introduce new features in order to drive new purchases, and customer adoption of features such as endpoint security and breach detection will determine whether NGFW vendors continue to post strong growth. Performance and Vulnerability Concerns over Single Vendor Solution Performance has improved significantly for NGFWs but inevitably is affected each time a new feature is enabled. For some applications and enterprises, NGFW performance is still not adequate and there remains a need for dedicated point solutions. Additionally, there is increasing concern that a single vendor platform may introduce more security flaws into a network than a multi- vendor architecture. Even though multiple technologies are enabled, the engines and intelligence all link to a single vendor any attack missed by that vendor will be propagated, regardless of the services that are enabled. Some NGFW vendors are attempting to address this challenge by offering customers technology choices from several third- party vendors. 7

8 Changing Security Priorities within Organizations Even though NGFWs have become table stakes for any organization implementing security, they are not always perceived as the highest priority spend. As more mission- critical assets are accessed via mobile devices, and as more data moves to the cloud, traditional network infrastructure is often outsourced to third- party providers. While this will drive spending at the enterprise and data center levels, it could be detrimental for vendors that traditionally have focused on the SMB segment. Difficulty in Showing ROI from Security Security vendors have long been challenged to prove a return on investment (ROI) from security spending. Over the years, there have been models to justify security spend, but ultimately this spending falls into the same category as insurance protection against a potential loss. While organizations and consumers are better acknowledging the importance of security, it is often an afterthought and likely will be considered a cost to be minimized rather than a revenue generating function. Total Market Size and Growth Forecasts Figures 3 and 4 depict the total market size, annual growth, and compound annual growth rate (CAGR) of the NGFW market from 2011 to Year NGFW Revenue (US$M) NGFW Growth 2012 $2, $2, % 2014 $3, % 2015 $3, % 2016 $4, % 2017 $5, % 2018 $5, % CAGR 15.3% Figure 3 NGFW Total Market Revenues and Growth Rate, 2012 to 2018 (Base Year 2013) By the close of 2013, the market for NGFW products had reached US$2,865 million. This number is expected to grow at a CAGR of 15.3 percent during the forecast period up to US$5,841 million in Although many organizations have transitioned from traditional firewalls to NGFWs, there is still growth potential, particularly for the enterprise and data center segments. 8

9 $6, % Revenue (Millions US$) $4,500 $3,000 $1, % 10.0% 5.0% Growth Rate (%) $ NGFW Revenue NGFW Growth 0.0% Figure 4 NGFW Total Market Revenues and Growth Rate (Graphic Representation), (Base Year 2013) Products and Services Revenue As with the BDS market, NGFW products rely heavily on updates for threat intelligence, antivirus, intrusion prevention system (IPS) signatures, and web protection, and application signatures. Vendors are bundling more services and in some cases, entire product suites, into their offerings. This is shifting revenues away from products and toward services. Figure 5 forecasts the shift in product and services revenue through Year Product (%) Product (US$M) Services (%) Services (US$M) , , , , , , , , , , , , ,692 Figure 5 NGFW Product and Service Breakouts,

10 Total Units Shipped Figure 6 depicts the total number of units shipped during the forecast period. Year Product Revenue (US$M) ASP (US$) ASP Growth Units 2012 $1,386 $16,160 85, $1,593 $16, % 94, $1,750 $17, % 100, $1,884 $18, % 104, $2,003 $18, % 106, $2,088 $19, % 107, $2,150 $20, % 107,303 Figure 6 NGFW Average Selling Price Forecast (Base Year 2013) NSS calculations are based on 94,875 units sold in 2013 at an average selling price (ASP) of US$16,805. Over the course of the forecast period, NSS estimates that the number of units sold will increase to 107,699 before starting to decline, and the ASP will increase to US$20,033. The features and additional functionality included in new products; the heightened focus on enterprise and data center customers; and the number of platform options offered for upsell will contribute to this higher ASP. It is important to keep the horizontal balance of sales in mind when reviewing the industry- wide ASP for NGFW. While many vendors offer products that cost less than US$1,000, the significant increase in mid- sized and large enterprise deals and the availability of products that cost well in excess of US$100,000 are driving the industry average for NGFW higher. Technology Trends NGFWs initially were criticized for being technology laggards. Early solutions aggregated multiple software solutions onto single appliances with little thought for compatibility or adding advanced (new) features. The need for application control changed this, and NGFW platforms suddenly began surpassing many other security products. Some NGFW vendors are leading the market in terms of innovation, adding diverse emerging technologies to existing platforms. Threat Intelligence As NGFWs replace dedicated web and security products as well as protect against application- specific attacks, the need for them to deliver real- time threat intelligence has increased dramatically. Many vendors have increased their threat research to enable their products to deliver more timely defense, and recent NSS tests illustrate the effectiveness of NGFW vendors against many traditional best- of- breed products. The increased cost of maintaining a topflight research team is one component of customer subscriptions. Sandboxing and Breach Detection Technology Sandboxing and breach detection technology are the newest technologies being added by most NGFW vendors, a trend which is driving their adoption into the mid- sized enterprise far more quickly than pure- play alternatives. Most solutions offered by NGFW vendors are cloud- based and can take hours to deliver results, but for many 10

11 smaller organizations, having the ability to flag suspicious files and submit them for analysis even if takes some time to receive the results is advantageous, and being able to include such capabilities as an add- on to their subscriptions is much more cost effective than purchasing a separate, dedicated product suite. Endpoint Protection Managed through NGFW The idea of adding endpoint protection to a network device is not new, and many vendors used this model during the early days of IPS. Over the last couple of years, several acquisitions have confirmed the trend toward integrated protection, from network to the endpoint McAfee s acquisition of Stonesoft; Sophos acquisition of Astaro and CyberRoam; and Palo Alto s acquisition of Cyvera. However, acceptance of this trend requires an organizational shift that many enterprises may not be prepared to embrace. Despite widespread belief in the ineffectiveness of existing endpoint protection suites, it is unclear whether organizations are ready to embrace endpoint protection as delivered by their NGFW vendor either. Vertical Market Trends Given the traditional focus on NGFW technology in smaller organizations, the vertical markets that have been strongest for NGFWs have been markets that were not traditionally security focused. This leads NGFW to have the highest sales in the others category a catchall that includes a wide variety of businesses and state and local governments. Retail traditionally has been the single largest vertical for NGFW owing to the large number of branch offices and locations that most retail organizations have to secure. Figures 7 and 8 illustrate the forecasted revenues and percentages by vertical for the NGFW market. In 2013, retail was the single largest vertical, followed by healthcare and education. Over the next five years, the more traditional security- focused verticals financial services and government will drive increases in NGFW spend. This increase is reflective of the increased acceptance of NGFW for enterprises both in terms of performance and effectiveness. Year Retail (US$M) Healthcare (US$M) Education (US$M) Financial (US$M) Government (US$M) Others (US$M) 2013 $573.1 $257.9 $257.9 $143.3 $143.3 $1, $641.9 $324.3 $337.8 $195.9 $182.4 $1, $706.6 $400.4 $431.8 $259.1 $227.7 $1, $768.8 $488.4 $542.7 $334.7 $280.4 $2, $824.9 $587.7 $670.2 $422.8 $340.3 $2, $876.2 $700.9 $817.8 $525.7 $408.9 $2,511.7 Figure 7 NGFW Vertical Market Forecast by Revenue

12 100% 90% 80% 70% 60% 50% 40% 30% Others Government Financial Educahon Healthcare Retail 20% 10% 0% Figure 8 NGFW Vertical Market Forecast by Percentage Horizontal Market Trends The horizontal market trend for the NGFW market is toward enterprise and very large enterprise users. This is a dramatic shift from the traditional SMB customer that has defined the market since its inception. Performance improvements have driven this push toward larger customers. Figures 9 and 10 depict the current and projected states of the NGFW horizontal markets. Year Small Business (<100 users) Medium Sized Business ( users) Enterprise (1,000 4,999 users) Large Enterprise (5,000+ users) 2013 $1,002.9 $859.6 $659.1 $ $1,128.4 $1,013.5 $810.8 $ $1,248.4 $1,177.7 $981.4 $ $1,365.8 $1,356.7 $1,175.8 $ $1,474.5 $1,546.7 $1,392.0 $ $1,577.1 $1,752.4 $1,635.5 $876.2 Figure 9 NGFW Horizontal Forecasts by Revenue

13 The most dramatic horizontal changes in this market are expected to be increased penetration into the large enterprise and data center. While the mid- sized enterprise has embraced NGFW, taking the next step will require significant work by NGFW vendors, and NSS expects that some NGFW vendors will be forced to focus their portfolios on specific segments as opposed to maintaining broad portfolios that attempt to meet the needs of all customers. 100% 90% 80% 70% 60% 50% 40% 30% 20% Large Enterprise (5,000+ users) Enterprise (1,000 4,999 users) Medium- Sized Business ( users) Small Business (<100 users) 10% 0% Figure 10 NGFW Horizontal Forecast by Percentage Mergers and Acquisitions While the NGFW technology is maturing, the integrated nature of these products is driving the search for emerging features that can be integrated into the platform. NSS expects several acquisitions in the next few years as NGFW vendors look to differentiate their platforms and pursue new revenue streams via unique services. Most customers have completed their initial NGFW installs, and traditional firewall replacements and NGFW vendors will need to diversify in order to drive new sales. Cisco Acquires Sourcefire The 2013 acquisition of Sourcefire by Cisco for nearly US$2.7 billion generally was assumed to be for Sourcefire s IPS technology. While Cisco has quickly driven Sourcefire IPS products into its channel, its September 2014 announcement of integration of Sourcefire services onto the ASA platform indicated that Sourcefire was intended as more than just a replacement IPS platform. Cisco had entered the NGFW space with the ASA X series firewalls, which allowed organizations to add application- aware services, and the addition of FirePOWER services for the ASA products gives customers several services choices for adding NG capabilities to the ASA platform. 13

14 Palo Alto Acquires Morta and Cyvera In January 2014, Palo Alto Networks acquired the startup Morta for an undisclosed amount. The technology was earmarked specifically for integration with the WildFire offering. In March, the vendor acquired endpoint security company Cyvera for US$200 million. Palo Alto s Advanced Endpoint Protection, announced in September 2014, clearly illustrates the trend of NGFW vendors adding product suites outside their core infrastructures in order to build revenue. Sophos Acquires Cyberoam and Mojave Traditionally known as an endpoint security company, Sophos made its first foray into the NGFW space in 2011 with the acquisition of Astaro networks. In 2014, Sophos made two additional acquisitions to bolster its NGFW product line: In February, the vendor acquired Cyberoam, an India- based NGFW vendor that brought both geographic and technical strengths to Sophos; and in October, the vendor acquired Mojave networks, a cloud security provider whose products are expected to improve web filtering and endpoint security through the NGFW products. Vendor Market Share The market share for NGFW has been shifting steadily for the last several years, and NSS expects some shakeup in the market leaders over the next few years. While Juniper Networks maintained its lead in 2013, the vendor s market share has since been declining. Its SRX series is still regarded as a strong brand in many enterprise circles, but increasing competition from vendors such as Fortinet (second place) and Palo Alto Networks has been significantly eroding Juniper s presence in the enterprise. Palo Alto Networks took third place in this market, achieving exemplary growth by focusing squarely on the mid- market and larger enterprises. The market is still highly competitive, with long- term traditional firewall competitors such as Cisco and Check Point remaining fully dedicated to the space, and relative newcomers, Dell and Sophos, making significant inroads. The race to the top is far from over. Figure 11 illustrates the 2013 market share percentages by vendor, combining product and services revenue. 14

15 Cisco/Sourcefire, 5% Others, 8% Juniper Networks, 21% Sophos, 5% WatchGuard, 5% Check Point, 9% Forhnet, 19% Dell SonicWALL, 11% Palo Alto Networks, 17% Figure 11 NGFW Market Share, Product and Service Revenue, Base Year

16 Appendix A: Vendor List NSS is currently tracking the following NGFW vendors: Barracuda Networks gateprotect Kerio Technologies Check Point Hillstone Networks Stormshield Cisco (Sourcefire) HP Palo Alto Networks Clavister Huawei Sophos/Cyberoam Dell Security Intel Security WatchGuard Fortinet Juniper Networks 16

17 Reading List Next Generation Firewall Test Methodology v5.4, NSS Labs generation- firewall- test- methodology- v54 Market Analysis: 2013 Intrusion Prevention Systems, NSS Labs analysis- intrusion- prevention- systems Market Analysis: 2013 Breach Detection Systems, NSS Labs analysis- breach- detection- systems 17

18 Contact Information NSS Labs, Inc. 206 Wild Basin Rd Building A, Suite 200 Austin, TX USA This analyst brief was produced as part of NSS Labs independent testing information services. Leading products were tested at no cost to the vendor, and NSS Labs received no vendor funding to produce this analyst brief NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, copied/scanned, stored on a retrieval system, e- mailed or otherwise disseminated or transmitted without the express written consent of NSS Labs, Inc. ( us or we ). Please read the disclaimer in this box because it contains important information that binds you. If you do not agree to these conditions, you should not read the rest of this report but should instead return the report immediately to us. You or your means the person who accesses this report and any entity on whose behalf he/she has obtained this report. 1. The information in this report is subject to change by us without notice, and we disclaim any obligation to update it. 2. The information in this report is believed by us to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at your sole risk. We are not liable or responsible for any damages, losses, or expenses of any nature whatsoever arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY US. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON- INFRINGEMENT, ARE HEREBY DISCLAIMED AND EXCLUDED BY US. IN NO EVENT SHALL WE BE LIABLE FOR ANY DIRECT, CONSEQUENTIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and/or software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet your expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners. 18

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda F800b Check Point 13500 Cisco ASA 5525-X Cisco ASA 5585-X SSP60 Cisco FirePOWER

More information

ENTERPRISE EPP COMPARATIVE REPORT

ENTERPRISE EPP COMPARATIVE REPORT ENTERPRISE EPP COMPARATIVE REPORT Security Stack: Socially Engineered Malware Authors Bhaarath Venkateswaran, Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3.15.539 ESET

More information

2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles

2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles FIREWALL COMPARATIVE ANALYSIS Total Cost of Ownership (TCO) 2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles Tested s Barracuda F800, Check Point 12600, Cyberoam CR2500iNG, Dell SonicWALL

More information

SSL Performance Problems

SSL Performance Problems ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation

More information

2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles

2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles FIREWALL COMPARATIVE ANALYSIS Performance 2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles Tested Products Barracuda F800, Check Point 12600, Cyberoam CR2500iNG, Dell SonicWALL NSA 4500,

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Total Cost of Ownership () 2014 Thomas Skybakmoen, Jason Pappalexis Tested s Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Security Value Map (SVM) 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Security 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Data Center Overview

More information

WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS

WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda Networks Web Application Firewall 960 Citrix NetScaler AppFirewall MPX 11520 Fortinet

More information

ENTERPRISE EPP COMPARATIVE ANALYSIS

ENTERPRISE EPP COMPARATIVE ANALYSIS ENTERPRISE EPP COMPARATIVE ANALYSIS Socially Engineered Malware Randy Abrams, Jayendra Pathak, Ahmed Garhy Tested Products Fortinet Fortigate 100D Management station Forticlient- 5.0.7.333 McAfee VirusScan

More information

How To Create A Firewall Security Value Map (Svm) 2013 Nss Labs, Inc.

How To Create A Firewall Security Value Map (Svm) 2013 Nss Labs, Inc. FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) 2013 Frank Artes, Thomas Skybakmoen, Bob Walder, Vikram Phatak, Ryan Liles Tested Products Barracuda F800, Check Point 12600, Cyberoam CR2500iNG,

More information

Cloud- Based Security Is Here to Stay

Cloud- Based Security Is Here to Stay ANALYST BRIEF Cloud- Based Security Is Here to Stay HOSTED SECURITY IS BECOMING A PART OF THE SECURITY INFRASTRUCTURE Author Rob Ayoub Overview As the popularity of cloud- based services has grown, so

More information

Mobile App Containers: Product Or Feature?

Mobile App Containers: Product Or Feature? ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating

More information

Analysis of the Global Unified Threat Management (UTM) Market Enterprise Features and Product Value Propel Market Growth

Analysis of the Global Unified Threat Management (UTM) Market Enterprise Features and Product Value Propel Market Growth Analysis of the Global Unified Threat Management (UTM) Market Enterprise Features and Product Value Propel Market Growth November 2012 Research Team Lead Analyst Chris Rodriguez Industry Analyst Network

More information

Breach Found. Did It Hurt?

Breach Found. Did It Hurt? ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many

More information

2016 Firewall Management Trends Report

2016 Firewall Management Trends Report 2016 Firewall Management Trends Report A survey of trends in firewall use and satisfaction with firewall management JANUARY 2016 Copyright 2016 Skybox Security, Inc. All rights reserved. Skybox is a trademark

More information

How To Sell Security Products To A Network Security Company

How To Sell Security Products To A Network Security Company Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that

More information

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security

More information

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Author Thomas Skybakmoen Tested Products Barracuda F800b Check Point 13500 Cisco ASA 5525-X Cisco ASA 5585-X SSP60 Cisco FirePOWER 8350 Cyberoam CR2500iNG-XP

More information

Multiple Drivers For Cyber Security Insurance

Multiple Drivers For Cyber Security Insurance ANALYST BRIEF Multiple Drivers For Cyber Security Insurance EXPECTATIONS PLACED ON INSURANCE CARRIERS RISE WITH MARKET GROWTH Author Andrew Braunberg Overview There has been considerable good news for

More information

BROWSER SECURITY COMPARATIVE ANALYSIS

BROWSER SECURITY COMPARATIVE ANALYSIS BROWSER SECURITY COMPARATIVE ANALYSIS Privacy Settings 2013 Randy Abrams, Jayendra Pathak Tested Vendors Apple, Google, Microsoft, Mozilla Overview Privacy is an issue on the front lines of the browser

More information

An Old Dog Had Better Learn Some New Tricks

An Old Dog Had Better Learn Some New Tricks ANALYST BRIEF An Old Dog Had Better Learn Some New Tricks PART 2: ANTIVIRUS EVOLUTION AND TECHNOLOGY ADOPTION Author Randy Abrams Overview Endpoint protection (EPP) products are ineffective against many

More information

Evolutions in Browser Security

Evolutions in Browser Security ANALYST BRIEF Evolutions in Browser Security TRENDS IN BROWSER SECURITY PERFORMANCE Author Randy Abrams Overview This analyst brief aggregates results from NSS Labs tests conducted between 2009 and 2013

More information

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos

More information

Compliance in the Age of Cloud

Compliance in the Age of Cloud ANALYST BRIEF Compliance in the Age of Cloud THE GOOD, THE BAD, AND THE UGLY Author Andrew Braunberg Overview Cloud is a nebulous term, but fundamentally, the term denotes that IT resources are delivered

More information

2010-2014. Sample Global Network Security Market. 1 technavio insights

2010-2014. Sample Global Network Security Market. 1 technavio insights 1 technavio insights About TechNavio Technavio is the research platform of Infiniti Research. Infiniti Research provides actionable market intelligence to leading companies worldwide. A team of 120 analysts

More information

High Performance NGFW Extended

High Performance NGFW Extended High Performance NGFW Extended Enrique Millán Country Manager Colombia emillan@fortinet.com 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material

More information

Emerging Trends in the Network Security Market in India, CY 2013

Emerging Trends in the Network Security Market in India, CY 2013 Emerging Trends in the Network Security Market in India, CY 2013 Advanced Threat Landscape will Give Rise to Increased Network Security Spending 9AC3-74 July 2014 Contents Section Slide Numbers Executive

More information

2012 North American Enterprise Firewalls Market Penetration Leadership Award

2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 Frost & Sullivan 1 We Accelerate Growth Market Penetration Leadership Award Enterprise Firewalls North America, 2012

More information

Global Endpoint Security Products Market: Protecting the Last Line of Defense from Emerging Threats. N922-74 July 2011

Global Endpoint Security Products Market: Protecting the Last Line of Defense from Emerging Threats. N922-74 July 2011 Global Endpoint Security Products Market: Protecting the Last Line of Defense from Emerging Threats July 2011 Table of Contents Executive Summary 12 Research Aim and Objectives 20 Research Scope, Definitions,

More information

How To Get A Fortinet Security System For Free

How To Get A Fortinet Security System For Free Fortinet FortiGate Appliances Earn Coveted Recommend Ratings from NSS Labs in Next Generation Firewall, IPS, and Network Firewall in NSS Labs Group Tests Fortinet s Enterprise-Class Triple Play Fortinet

More information

Data Center Security

Data Center Security Data Center Security Products Biannual Worldwide and Regional Market Share, Size, and Forecasts: Excerpts Data Center Security The Increasing Requirements for Data Center-Class Performance WHITE PAPER:

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

Market Guide for Network Sandboxing

Market Guide for Network Sandboxing G00271317 Market Guide for Network Sandboxing Published: 2 March 2015 Analyst(s): Lawrence Orans, Jeremy D'Hoinne Choosing a network sandboxing solution is challenging due to the wide array of options

More information

TEST METHODOLOGY. Distributed Denial-of-Service (DDoS) Prevention. v2.0

TEST METHODOLOGY. Distributed Denial-of-Service (DDoS) Prevention. v2.0 TEST METHODOLOGY Distributed Denial-of-Service (DDoS) Prevention v2.0 Table of Contents 1 Introduction... 4 1.1 The Need for Distributed Denial-of-Service Prevention... 4 1.2 About This Test Methodology

More information

Global Network Security Market 2015-2019

Global Network Security Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3505505/ Global Network Security Market 2015-2019 Description: About network security Network security comprises products and services

More information

Global Enterprise Network Security Market 2012-2016

Global Enterprise Network Security Market 2012-2016 Brochure More information from http://www.researchandmarkets.com/reports/2668090/ Global Enterprise Network Security Market 2012-2016 Description: The analysts forecast the Global Enterprise Network Security

More information

A Massively Scalable Approach to Network Security

A Massively Scalable Approach to Network Security A Massively Scalable Approach to Network Security A super massively scalable network firewall that delivers strong performance and security at a low TCO Abstract As network security requirements have evolved,

More information

FortiGuard Security Services

FortiGuard Security Services FortiGuard Security Services FORTIGUARD SECURITY SERVICES FortiGuard Labs: Securing Your Organization Extensive knowledge of the threat landscape combined with the ability to respond quickly at multiple

More information

Comstor Security Initiative. Comstor Security Initiative

Comstor Security Initiative. Comstor Security Initiative Comstor Comstor Work in partnership with Comstor and Cisco to unlock the potential of Cyber security Cyber security is projected to be a $170 billion market by 2020. There are 10 billion connected sensors

More information

Internet Advertising: Is Your Browser Putting You at Risk?

Internet Advertising: Is Your Browser Putting You at Risk? ANALYST BRIEF Is Your Browser Putting You at Risk? PART 2: CLICK FRAUD Authors Francisco Artes, Stefan Frei, Ken Baylor, Jayendra Pathak, Bob Walder Overview The US online advertising market in 2011 was

More information

The CISO s Guide to the Importance of Testing Security Devices

The CISO s Guide to the Importance of Testing Security Devices ANALYST BRIEF The CISO s Guide to the Importance of Testing Security Devices Author Bob Walder Overview Selecting security products is a complex process that carries significant risks if not executed correctly;

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

Secure Upgrade Plus. Customer Advantage Program. Secure Upgrade Plus. Customer Loyalty Bundles. Address other business needs

Secure Upgrade Plus. Customer Advantage Program. Secure Upgrade Plus. Customer Loyalty Bundles. Address other business needs Secure Upgrade Plus Straightforward upgrades and competitive trade-ins for Dell SonicWALL customers Secure Upgrade Plus offers an upgrade path from current Dell SonicWALL products, as well as a trade-in

More information

CORPORATE AV / EPP COMPARATIVE ANALYSIS

CORPORATE AV / EPP COMPARATIVE ANALYSIS CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,

More information

Global Enterprise Network Firewall Market 2012-2016

Global Enterprise Network Firewall Market 2012-2016 Brochure More information from http://www.researchandmarkets.com/reports/2644663/ Global Enterprise Network Firewall Market 2012-2016 Description: The analysts forecast the Global Enterprise Network Firewall

More information

Achieve Deeper Network Security and Application Control

Achieve Deeper Network Security and Application Control Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet

More information

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By: A Channel Company White Paper Online Security Beyond Malware and Antivirus Brought to You By: Abstract Security has always encompassed physical and logical components. But in the face of Bring Your Own

More information

Global Network Security Appliance Market 2015-2019

Global Network Security Appliance Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3280784/ Global Network Security Appliance Market 2015-2019 Description: About Network Security Appliance Network security appliances

More information

Improving Profitability for MSSPs Targeting SMBs

Improving Profitability for MSSPs Targeting SMBs Improving Profitability for MSSPs Targeting SMBs Using a Multi-tenant Virtual Domain (VDOM) Model to Deliver Cost-Effective Security Services Introduction In recent years the adoption of cloud services,

More information

Sophos Acquires Cyberoam

Sophos Acquires Cyberoam Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

Next-Generation Firewalls: CEO, Miercom

Next-Generation Firewalls: CEO, Miercom Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology

More information

FROM PRODUCT TO PLATFORM

FROM PRODUCT TO PLATFORM FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really

More information

Global Network Security Market 2014-2018

Global Network Security Market 2014-2018 Brochure More information from http://www.researchandmarkets.com/reports/2909136/ Global Network Security Market 2014-2018 Description: About Network Security Network security consists of products and

More information

WatchGuard: Your Security Partner of Choice. Carlos Vieira

WatchGuard: Your Security Partner of Choice. Carlos Vieira WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices

More information

Dell Advanced Network Monitoring Services Service Description

Dell Advanced Network Monitoring Services Service Description Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Monitoring: Network outages or network performance problems can cause significant economic impacts to your day to day

More information

Web Application Firewalls: The TCO Question

Web Application Firewalls: The TCO Question Web Application Firewalls: The TCO Question Ovum looks into total cost of ownership for WAFs Rik Turner Summary Catalyst Ovum has carried out a series of interviews with companies in North America, Europe,

More information

Software- Defined Networking: Beyond The Hype, And A Dose Of Reality

Software- Defined Networking: Beyond The Hype, And A Dose Of Reality ANALYST BRIEF Software- Defined Networking: Beyond The Hype, And A Dose Of Reality Author Mike Spanbauer Overview Server virtualization has brought the network to its knees. Legacy architectures are unable

More information

Customer Advantage Program

Customer Advantage Program Customer Advantage Program Straightforward upgrades and competitive trade-ins for Dell Security customers The Dell Security Customer Advantage Program offers an upgrade path from current Dell SonicWALL

More information

Data Warehouse Appliances: The Next Wave of IT Delivery. Private Cloud (Revocable Access and Support) Applications Appliance. (License/Maintenance)

Data Warehouse Appliances: The Next Wave of IT Delivery. Private Cloud (Revocable Access and Support) Applications Appliance. (License/Maintenance) Appliances are rapidly becoming a preferred purchase option for large and small businesses seeking to meet expanding workloads and deliver ROI in the face of tightening budgets. TBR is reporting the results

More information

Where Do I Start With Virtual Desktops?

Where Do I Start With Virtual Desktops? The Essentials Series: Important Questions in Implementing Virtual Desktops Where Do I Start With Virtual Desktops? sponsored by by W here Do I Start with Virtual Desktops?... 1 W hat Is a Virtual Desktop?...

More information

Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?

Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things? Securing your IOT journey and beyond Alvin Rodrigues Market Development Director South East Asia and Hong Kong 1 What is the internet of things? 2 1 Imagine if Meeting @ 9am 5 mins later Meeting delayed

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

The Evolution of the Enterprise And Enterprise Security

The Evolution of the Enterprise And Enterprise Security The Evolution of the Enterprise And Enterprise Security Introduction Today's enterprise is evolving rapidly, with new technologies such as consumer-grade mobile devices, internet-based applications and

More information

Intelligent Cybersecurity for the Real World. Cisco Cybersecurity Pocket Guide

Intelligent Cybersecurity for the Real World. Cisco Cybersecurity Pocket Guide Intelligent Cybersecurity for the Real World Cisco Cybersecurity Pocket Guide EMEA 2015 Content What an Opportunity! Security Investment is a Top Priority Why Cisco? Cisco is the Leading Security Company

More information

Securing Amazon It s a Jungle Out There

Securing Amazon It s a Jungle Out There ANALYST BRIEF Securing Amazon It s a Jungle Out There PART 1 CONTROLS AND OPTIONS OFFERED BY AMAZON Author Rob Ayoub Overview Infrastructure as a service (IaaS) is a foundational component of modern cloud

More information

TEST METHODOLOGY. Data Center Firewall. v2.0

TEST METHODOLOGY. Data Center Firewall. v2.0 TEST METHODOLOGY Data Center Firewall v2.0 Table of Contents 1 Introduction... 4 1.1 The Need for Firewalls in the Data Center... 4 1.2 About This Test Methodology and Report... 4 1.3 Inclusion Criteria...

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

10 easy steps to secure your retail network

10 easy steps to secure your retail network 10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015

More information

Why Is DDoS Prevention a Challenge?

Why Is DDoS Prevention a Challenge? ANALYST BRIEF Why Is DDoS Prevention a Challenge? PROTECTING AGAINST DISTRIBUTED DENIAL-OF-SERVICE ATTACKS Authors Andrew Braunberg, Mike Spanbauer Overview Over the past decade, the threat landscape has

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

IDENTITY SOLUTIONS: Security Beyond the Perimeter

IDENTITY SOLUTIONS: Security Beyond the Perimeter IDENTITY SOLUTIONS: Security Beyond the Perimeter 2016 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud

More information

SURVEY REPORT SPON. Small and Medium Business: IT/Security Priorities and Preferences. Published September 2015. An Osterman Research Survey Report

SURVEY REPORT SPON. Small and Medium Business: IT/Security Priorities and Preferences. Published September 2015. An Osterman Research Survey Report SURVEY REPORT N sponsored by An Osterman Research Survey Report Published September 2015 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 253 630

More information

CHANGING THE RULES OF NETWORKING. Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011

CHANGING THE RULES OF NETWORKING. Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011 CHANGING THE RULES OF NETWORKING Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011 FORWARD LOOKING STATEMENTS This presentation may contain forward-looking statements that

More information

Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market

Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market May 2015 1 Contents Section Slide Number Executive Summary 3 Market Overview 9 Total Web

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

Enterprise Communications Research 2013

Enterprise Communications Research 2013 Frost & Sullivan Enterprise Communications Research 2013 Analysis of the Australian Mobile Device Management (MDM) Market 2013 Disclaimer Frost & Sullivan takes no responsibility for any incorrect information

More information

HP floats cloud-managed Wi-Fi offering for campus unified wired/wireless network access

HP floats cloud-managed Wi-Fi offering for campus unified wired/wireless network access HP floats cloud-managed Wi-Fi offering for campus unified wired/wireless network access Analyst: Christian Renaud 17 Apr, 2014 At Interop Las Vegas, Hewlett-Packard announced products for both on-premises

More information

Global Cloud Email Security Software Market - By End User Industry, Vendors and Geography - Market Shares, Forecasts And Trends (2015-2020)

Global Cloud Email Security Software Market - By End User Industry, Vendors and Geography - Market Shares, Forecasts And Trends (2015-2020) Brochure More information from http://www.researchandmarkets.com/reports/3421395/ Global Cloud Email Security Software Market - By End User Industry, Vendors and Geography - Market Shares, Forecasts And

More information

Delivering Vertical Solutions to a Global Market

Delivering Vertical Solutions to a Global Market PARTNERSHIP Microsoft Dynamics AX Microsoft Dynamics Industry Solutions Delivering Vertical Solutions to a Global Market White Paper July 2007 http://www.microsoft.com/dynamics/ax/product/industrysolutions.mspx

More information

Unified Threat Management Throughput Performance

Unified Threat Management Throughput Performance Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did

More information

2011 Latin American Network Security Markets. N991-74 July 2011

2011 Latin American Network Security Markets. N991-74 July 2011 2011 Latin American Network Security Markets July 2011 Table of Contents Methodology and Market Definitions Methodology.. Market Definitions Market Overview Market Overview... Market Engineering Measurements.

More information

Worldwide Specialized Threat Analysis and Protection Market Shares, 2014: Rapidly Evolving Security Defenses

Worldwide Specialized Threat Analysis and Protection Market Shares, 2014: Rapidly Evolving Security Defenses Market Share Worldwide Specialized Threat Analysis and Protection Market Shares, 2014: Rapidly Evolving Security Defenses Robert Westervelt Rob Ayoub Pete Lindstrom Elizabeth Corr IDC MARKET SHARE FIGURE

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection

More information

White Paper. ZyWALL USG Trade-In Program

White Paper. ZyWALL USG Trade-In Program White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...

More information

An Oracle White Paper February 2012. Oracle Human Capital Management: Leadership that Drives Business Value. How HR Increases Value

An Oracle White Paper February 2012. Oracle Human Capital Management: Leadership that Drives Business Value. How HR Increases Value An Oracle White Paper February 2012 Oracle Human Capital Management: Leadership that Drives Business Value How HR Increases Value Introduction Joyce Westerdahl shares the story of how Oracle s HR organization

More information

WEB APPLICATION FIREWALL PRODUCT ANALYSIS

WEB APPLICATION FIREWALL PRODUCT ANALYSIS WEB APPLICATION FIREWALL PRODUCT ANALYSIS F5 Big-IP ASM 10200 v11.4.0 Authors Ryan Liles, Orlando Barrera Overview NSS Labs performed an independent test of the F5 Big-IP ASM 10200. The product was subjected

More information

Executive Summary: Navigant Research Leaderboard Report: Smart City Suppliers

Executive Summary: Navigant Research Leaderboard Report: Smart City Suppliers RESEARCH REPORT Executive Summary: Navigant Research Leaderboard Report: Assessment of Strategy and Execution for 16 NOTE: This document is a free excerpt of a larger report. If you are interested in purchasing

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

Cloud VPN & The Role of the Service Provider in Disrupting the VPN Market

Cloud VPN & The Role of the Service Provider in Disrupting the VPN Market Cloud VPN & The Role of the Service Provider in Disrupting the VPN Market Delivering Winning Customer Experiences With SDN/NFV Easier Is Better Delivering a compelling user experience has become increasingly

More information

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

Analysis of the Web Application Firewall Market

Analysis of the Web Application Firewall Market Analysis of the Web Application Firewall Market Asia-Pacific March 2013 1 Research Team Research Manager Edison Yu Research Manager ICT Practice (65) 6890-0928 edison.yu@frost.com Lead Analyst/Strategic

More information

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond

More information

Braindumps.700-295.50.QA

Braindumps.700-295.50.QA Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me

More information

How WAN Design Needs to Change

How WAN Design Needs to Change How WAN Design Needs to Change Ashton, Metzler & Associates Introduction While some organizations continue to make use of WAN services such as Frame Relay and ATM, the use of those services is quickly

More information