MarketScope for Managed Security Services in Europe

Size: px
Start display at page:

Download "MarketScope for Managed Security Services in Europe"

Transcription

1 G MarketScope for Managed Security Services in Europe Published: 24 October 2011 Analyst(s): Carsten Casper The market for managed security services in Europe is mature and changes slowly. IT infrastructure and communications service providers dominate, security specialists fill a niche, and growth continues. What You Need to Know This document was revised on 27 October The document you are viewing is the corrected version. For more information, see the Corrections page on gartner.com. Managed security services (MSSs) in Europe show all the signs of a mature market, which continues to justify a Gartner MarketScope as the survey methodology. During the past 12 months, the European MSS market grew as anticipated, and will probably reach $2.5 billion by year-end We epect growth to continue, with a compound annual growth rate of 14% from 2011 to IT management is not the largest, but is still the fastest-growing segment of the security services market. Vendors Added or Dropped We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mi of vendors in any Magic Quadrant or MarketScope may change over time. A vendor appearing in a Magic Quadrant or MarketScope one year and not the net does not necessarily indicate that we have changed our opinion of that vendor. This may be a reflection of a change in the market and, therefore, changed evaluation criteria, or a change of focus by a vendor. Our "MarketScope for Managed Security Services in Europe" in May 2010 surveyed 16 European managed security service providers (MSSPs). For 2011, 17 MSSPs met our inclusion criteria and did not meet our eclusion criteria. Table 1 shows which providers we surveyed during the past four years. In 2011, Telefonica returned, T-Systems was dropped, and Open Systems was added for the first time. Dell acquired SecureWorks, and the company appears at a different position in the list. Apart from these changes, the provider landscape has been fairly stable.

2 Table 1. MSSPs Surveyed in MarketScopes May 2008 September 2009 September 2010 October 2011 AT&T AT&T AT&T AT&T Atos Origin Atos Origin Atos BT Global Services BT Global Services BT Global Services BT Global Services Cable & Wireless Computacenter Computacenter Computacenter CSC CSC Dell (SecureWorks) Getronics HCL Technologies HCL Technologies HCL Technologies HCL Technologies EDS, an HP Company HP HP IBM Internet Security Systems (ISS) IBM ISS IBM Global Technology Services IBM Security Services Integralis Integralis Integralis Integralis Open Systems Orange Business Services Orange Business Services Orange Business Services Orange Business Services SecureWorks Symantec Symantec Symantec Symantec Page 2 of 28 Gartner, Inc. G

3 May 2008 September 2009 September 2010 October 2011 Tata Communications Tata Communications Telefonica Telefonica T-Systems T-Systems T-Systems VeriSign VeriSign Verizon Business Verizon Business Verizon Business Verizon Wipro Technologies Wipro Technologies Wipro Technologies Wipro Technologies Source: Gartner (October 2011) Gartner, Inc. G Page 3 of 28

4 Geographic Scope, Inclusion and Eclusion Criteria Although the market grew in volume, we did not revise our inclusion criteria regarding the minimum number of managed devices (700 firewalls and intrusion detection system [IDS]/intrusion prevention system [IPS]) and the minimum number of customers in Europe in 2011 (50 eternal customers; for the complete inclusion criteria, see the Inclusion and Eclusion Criteria section). We did, however, amend the eclusion criteria in order to focus this market analysis on truly regional providers. As a result, Savvis (with a U.S. focus), SSP Europe and T-Systems (with a Germany focus) meet the eclusion criteria and have not been included in this research. Several other providers have a subregional focus in Europe: Atos in Benelu/France, Computacenter in the U.K./Germany, Open Systems in Germany/Austria/Switzerland, Orange Business Systems in Benelu/France/U.K., and Telefonica in Southern Europe. They have not been ecluded, because they have significantly more than 10% of their business outside their European home countries. They have sales staff in several European countries and can support clients with regional (rather than local) requirements. This MarketScope has a strong focus on European clients, but these clients have operations all over the world. While 100% of them demand coverage in Europe, 40% also ask their provider to manage devices in Asia/Pacific, and 30% want their provider to cover devices in North America. Overall, we track around 100 MSSPs worldwide, with about one-third of them in Europe. The ones that do not appear operate mostly in one country (for eample, S12sec in Spain), provide a very specialized security service (such as Qualys for vulnerability scanning) or do not provide standalone security services (for eample, Unisys). For eample, the following providers were considered, but not included: Boing Orange, CGI Group, CompuCom, Dimension Data, KPN/Getronics, Outpost24, Retarus, S21sec, S2 Grupo, Savvis, SecureIT, Sentor, SSP Europe, Telindus, Trustwave, T-Systems, United Service Providers and Unisys. Landscape of Different Types of Providers Remains Relatively Stable The market for managed and related security services continues to evolve, but the types of players are still the same. There are few stand-alone security players left in the Pan-European market. Most providers sell security services bundled with infrastructure management and outsourcing (for eample, Atos, Computacenter, CSC, Dell, IBM Security Services, HCL Technologies, HP and Wipro Technologies) or bundled with communications services (for eample, AT&T, BT Global Services, Orange Business Services, Tata Communications, Telefonica and Verizon). Only a few European providers focus on IT security (for eample, Integralis [now part of NTT Communications], Open Systems and Symantec). All providers in this MarketScope offer MSS as a discrete service. European security providers service approimately 6,500 clients in Europe, and operate about 28,000 firewall and unified threat management (UTM) devices, 5,500 network IPS/IDS and 14,000 server IPS/IDS as well as 2,400 secure message and Web gateways. They also manage or monitor hundreds of Web application firewalls and customer-owned security information and event management (SIEM)/log management products. The large European players serve the U.K. and Ireland; Benelu; Germany, Austria and Switzerland (DACH); France; and Southern and Eastern Europe in fairly equal proportions to the population and gross domestic products of those countries. Page 4 of 28 Gartner, Inc. G

5 Methodology We conducted our survey of MSSPs simultaneously in North America, Europe and Asia/Pacific. We contacted about 100 providers of MSS in these regions. Of them, 46 replied to our worldwide scoping questionnaire. They included information about all the regions in which they operate. Based on this information, we selected a subset of providers per region that met our inclusion criteria. These providers had to answer a more detailed questionnaire and provide references. The questionnaire was the same in all regions. In Europe, 17 providers met our European inclusion criteria. We also contacted reference clients and conducted phone interviews, as well as online surveys. Reference clients were not only asked for information about their providers, but also questioned about other providers on their shortlists. The assessment in this MarketScope was performed on the basis of survey data collected in May and June 2011, and client reference information collected in June, July and August Strategic Planning Assumption By 2015, 30% of enterprises that use public cloud infrastructure as a service will also use MSSPs for security monitoring. MarketScope This survey focuses on these security services (including managed customer premises equipment [CPE]), provider-hosted devices and cloud delivery. They are listed in order of popularity to European clients. Devices near the top of the list are managed and monitored most often, according to the reference clients contacted during this market analysis: Firewall Network IDS/IPS (see Note 1) Web application firewall Secure Web gateway devices (see Note 2) Vulnerability scan devices Secure message gateway devices (see Note 2) Server/directory/application/database management system log sources Server IDS/IPS Desktop/endpoint security client Gartner, Inc. G Page 5 of 28

6 Multifunction firewall/utm device Customer-owned SIEM/log management products Data loss prevention (DLP) devices Firewall management and monitoring are still the most widely consumed security services. However, the use of Web application firewalls, secure Web and gateway devices, vulnerability scanning, and log management has increased significantly now being consumed by roughly 30% to 40% of European clients. On the other hand, fewer organizations rely on network-based IDS/IPS services (only about half of them do, compared with 70% in 2010). Consumption of desktop/ endpoint security and SIEM management has increased only slightly. DLP still closes the list. European clients are not pressured to deploy DLP, and most discussions evolve around policy design and implementation, not the management of DLP devices. In addition to these infrastructure-based security services, most European providers offer complementary security services. The ones that are consumed most often are near the top of the list: On-site technical support for security products Security consulting (policy, organizations and architecture) Security system integration Threat intelligence information (vulnerability research) Application security (security testing and code review) Note: Identity-related services (authentication and token management) are not covered in this research. Pricing and Service-Level Agreements Pricing is difficult to compare from provider to provider and from year to year, because each client has different requirements regarding types of services (firewall, IPS, /web and so on), volume (from one firewall to several thousand firewalls), delivery model (CPE-based, hosted and cloud), geographic coverage, level of engagement (monitoring/management), integration (with IT infrastructure management or with communication services), service quality, response times, service-level agreements (SLAs) and language support. Price is a key factor in most purchase decisions, but comparisons are difficult outside of a specific RFP. Our observations on pricing for management and monitoring of virtualized security devices remain unchanged. There is still not best practice. Here are some approaches we encountered in Europe: The provider says that it will pass on benefits of virtualized infrastructure to the client, but no pricing details are revealed. The monitoring price for a virtualized device is the same as the monitoring price for a CPE device, but the management price for a virtualized device is less than the management price for a CPE device. Page 6 of 28 Gartner, Inc. G

7 Pricing for virtualized infrastructure is split into a device monitoring part (fied fee) and virtual firewall monitoring part (digressive fee for each virtual firewall). The same applies to management of virtualized infrastructure. SLAs have not changed significantly. Most providers offer 15 minutes or 30 minutes as the fastest possible response times (sometimes in the standard, sometimes only in the "premium" package). However, this only relates to the notification of the client. Resolution times vary widely, and obviously depend on the nature of the issue. A few providers even display an incident immediately on the customer portal, giving customers information in real time. Some providers make an attempt to innovate with SLAs and pricing. Below are some eamples: Firewall pricing depends on bandwidth commitments (not consumption). No minimal fied cost for usage-based pricing (for eample, vulnerability scans). Reduced pricing for permission to offshore security operations. Customers who bring new clients can benefit from a discount on the combined service volume. Client satisfaction is measured after each interaction as a key performance indicator. Outsourcer commits to a price decrease per year (such as 5%) rather than an upfront payment. In general, contracts have become more specific and concrete. Some providers have indicated that they now move from service-level objectives to service-level agreements. Clients that have been disappointed by a previous provider's performance push hard to include penalties in new contracts. Such a penalty typically amounts to a percentage of the monthly charge up to a maimum of one monthly charge of the service cost and is paid as a credit or an immediate payout (potentially with an "earn-back" clause for subsequent SLA compliance). Types of Services Offered Delivery models continue to change, and the topics "cloud computing" and "virtualization" dominate many discussions with European clients. However, the change is not massive; rather, it develops at varying speeds, depending on the service in question. Up to 5% of revenue is shifting from CPE to non-cpe delivered services every year, and non-cpe-based delivery is at approimately 10% for firewalls, UTMs and network IDS/IPS; more than 15% for Web application firewalls; and up to 35% for secure messaging. SIEM management, log sources and server IDS/IPS are still predominantly operated on customer premises. Vulnerability scanning is often eecuted remotely, but usually with the help of some additional devices installed on customers' premises. Virtualization also plays an increasing role. A concern raised by some clients is that monitoring capabilities for virtualized infrastructure are not as detailed as the ones for on-premises equipment. Moreover, a report might be available only on request, rather than through the portal. This will be acceptable for some clients, but impossible for others. This is similar to different customers' attitudes to determining the security product vendor. While some customers eplicitly require that the provider takes over the management of their eisting infrastructures (into which they invested Gartner, Inc. G Page 7 of 28

8 heavily), others accept whatever product the provider suggests and are also more open to virtualized versions of these products. Relationships Between Providers and Customers White-labeling of services (that is, offering security services under the brand name of another provider) seemed a trend in 2010, but did not gain in importance in The only eception continues to be vulnerability scanning where most European providers collaborate with Qualys (12 out of 17). In the area of threat intelligence and vulnerability notification services, the picture is less consistent, and European MSSPs collaborate with up to seven partners to provide this information. Integration of network/it services and security services also deserves particular attention. Client satisfaction can go both ways. Some clients said that they only consume the security services of this provider, because it's part of a larger outsourcing deal, and they did not have any choice but to include security. Other clients also criticize such an integrated approach, but in fact, they are happier with the security services than with the main part of the outsourcing deal. Clients also need to eercise caution regarding new types of security services. Some providers will fill the gap with third-party service offerings which is certainly acceptable but contract management can become an issue if the client is locked into a contract with the third party, rather than its own security provider. Once the incumbent provider starts offering the same service, the client must be allowed to quit the third-party contract and transition back to the legacy providers, which does not always seem to be the case. Some clients appreciate a clear segregation of duties, but few actually phrase it as a requirement. Overall, there are basically three types of security services: 1. Management of security infrastructure, including hosted or cloud-based security infrastructure. In-house infrastructure is still sometimes managed by an internal team, often by network operations. 2. Monitoring of security infrastructure, including log management, correlation, SIEM and advanced portal capabilities. Especially in large contracts, there is a tendency to let the MSSP do the monitoring while in-house staff or another partner (such as a telecommunication provider or an IT outsourcer) is managing the infrastructure. 3. Vulnerability scanning services. These are often provided by Qualys, sometimes by other vendors or the MSSP itself, and usually in a combination of all of the previous. In summary, clients engage up to three different providers for the different tasks. Alternatively, an inhouse team takes care of these tasks. This is often the case for infrastructure management, sometimes for monitoring and rarely for vulnerability scanning. Operational Concerns There are some indications that the follow-the-sun approach with which several providers operate is not always the best solution. Clients mentioned the following issues: Page 8 of 28 Gartner, Inc. G

9 There is the danger that difficult customer issues are passed from security operations center (SOC) to SOC like a hot potato. While the local SOC focuses on the immediate needs of local clients, the needs of remote clients receive a lower priority. Clients have eplained that their European SOC serves them very well, while the North American SOC does more harm than good. Given the increasing need to store data in the country (or at least the region) of origin, clients are concerned that sensitive data is sent to countries with less protection. This can already be a problem regarding backup data centers in other regions, but it is an immediate issue when data is passed around on a daily basis. Fortunately, this is critical for only very few clients, and while some might bring up this concern during contract negotiations, very few will actually make SOC location an eclusion criterion. Related to the location of the primary data center is another concern: cultural differences. Staff from other countries or even from other regions of the world may not only speak with a strong accent, but also have a different attitude toward service delivery and customer satisfaction. However, these differences are decreasing year over year. As one reference client epressed it: If you're going offshore, then you should plan for cultural adjustments. You can't epect everybody else to adapt to you you have to adapt as well. Decision Criteria The main drivers to engage an MSSP are still to reduce costs, to reduce capital ependitures, and to supplement or replace in-house epertise and in-house resources. In Europe, regulatory compliance plays less of a role than in the U.S. More specifically, we asked our European reference clients for their main reasons for choosing their service provider. Unlike last year, viewing the provider as a strategic partner is not as important a decision factor as in 2010 (28% in 2011 versus 52% in 2010). The enumeration below shows the decision factors in decreasing order of importance: Security epertise Pricing (total cost of contracted services) Understanding of business needs Industry eperience Quality of response to RFP or presentation of capabilities View as a strategic partner Perceived viability and/or financial strength Positive eperience with provider Good feedback from references Project implementation methodology Gartner, Inc. G Page 9 of 28

10 These priorities favor the specialist provider, the one that can show security, business and industry epertise, not the large incumbent provider of IT or network operations who likes to be preselected as a strategic partner. This is emphasized by the fact that the reason quoted most often for rejecting a provider's offer is "did not demonstrate understanding of business needs." Few providers know how to differentiate themselves from the competition. Many claim to be "trusted advisors" and to have "global coverage." Feedback from reference clients is different. Pricing, service quality and lack of SLAs are often reasons for dissatisfaction. Sometimes, mistakes are covered up, and documentation is bad. Clients often use two or more security providers (one for security and one for firewall management). They also compare the performance of the network provider against the performance of the security infrastructure monitoring provider. For eample, a firewall and a router, both managed by different providers, are connected. In case of an outage, the client sees and compares the reaction time of both companies. One client said: "Our network provider informed us that the router was down, and our firewall provider did not even notice. It also happened that penetration testing by a different provider has revealed that ports were not monitored." This has surfaced in 2010 and now again in Several reference clients were not willing to take this any longer and gave "fair" to "poor" ratings, although most clients are still happy with their provider, and one-quarter rated them as "ecellent." Purchasing Behavior The bulk of the contracts for MSS in the European region are valued from $150,000 to $750,000 per year (67% of contracts), while 11% of contracts are below the range, and 18% are above that range. The number of midsize contracts (versus large or small contracts) has increased compared with The typical contract size in Europe is still much greater than in Asia/Pacific, where 60% of the contracts have a value of less than $150,000 per year. On the other hand, the typical contract size in Europe is similar to the typical contract size in the U.S., where 11% of the contracts are more than $1.5 million in annual value. Only one-quarter of the European reference clients has been customers of their providers for less than one year; three-quarters have had their contracts for more than one year. The typical contract duration is still three years, but occasionally clients do not conduct a full tender with a detailed request for proposal when the contract epires after three years. If there are no major concerns, then they prefer to etend the contract for another three years, after which they would do a fullscale market analysis again. The question of whether it is a good or a bad thing to outsource security services to non-european providers came up less often in discussions with reference clients than last year. Gartner's clients are increasingly looking for advice on how to secure and control such offshoring, not whether this is the right option at all. Security Marketing The marketing message of a European MSSP often reflects the providers' attitude to service delivery. Some providers focus on technical details, insights about the changing threat landscape Page 10 of 28 Gartner, Inc. G

11 and security product innovations that cater to the needs of "lean in" customers that is, customers who want to get the maimum out of the security services for which they believe they pay a premium. Other providers market to the needs of the "lean back" customer that is, a customer who has very different core competencies (that is, not IT security) and simply wants the assurance that security has been taken care of. Such a provider emphasizes simplicity, costeffectiveness, global operations with local adjustments and integration (of networks and security or IT operations and security). Enterprise clients need to look beyond these marketing messages, because some providers cater to both types of audiences. Although there is no right or wrong, it is important that client epectations and provider capabilities match. Outlook The market for MSS is changing in various ways, including cloud delivery and virtualization. In 2012, the market for MSS in Europe will continue to grow significantly in volume and also in terms of breadth of features and services. New or enhanced services will include distributed denial of service (DDoS) detection and mitigation, malware/botnet detection, fraud detection, DLP selection and implementation, reputation-based services, tokenization, and mobile security. These services will continue to be complemented on occasion with various identity and access management (IAM) services (role management, authentication and privileged user monitoring), VPN services and more powerful log management services. Management of customer premises security devices will still be the dominant delivery model, but the percentage of hosted, security-as-a-service (SecaaS) and inthe-cloud security services will increase steadily. There is still no widely accepted standard for the pricing of monitoring and the management of virtualized security infrastructure, and given the variety of options, it may never come. However, clients should ask for a significant advantage over premises-based services and should keep pushing for lower price points. Pricing for the hardware and pricing for the logical service have to be separated and priced individually, whether or not management and monitoring are addressed together. The split of the MSS market into IT outsourcers that offer security services, network providers that offer security services, and security specialists has stabilized, and the market will continue this way in Pure-play security providers will continue to have their place and new players (for eample, from Europe or India) will increase in size and reach, and enter the regional European market, trying to differentiate themselves with innovative technology and a fleible portfolio of supported products. Market/Market Segment Description For the purposes of this research, Gartner defines "managed security services" as the remote management or monitoring of IT security functions delivered via remote security operations centers, not through personnel on-site. MSS does not, therefore, include staff augmentation or any consulting, development and integration services. MSS includes: Monitored or managed firewall or IPSs Gartner, Inc. G Page 11 of 28

12 Monitored or managed IPSs DDoS protection Managed secure messaging gateway Managed secure Web gateway Security information management Security event management Managed vulnerability scanning of networks, servers, databases or applications Security vulnerability or threat notification services Log management and analysis Reporting associated with monitored/managed devices and incident response This MarketScope evaluates service providers that offer monitored/managed firewall and intrusion detection/prevention functions, rather than those whose main focus is on other elements of the services listed. Inclusion and Eclusion Criteria Inclusion Criteria To be included in this MarketScope, an MSSP must have these qualifications: The ability to remotely monitor and/or manage firewalls and intrusion detection/prevention (IDP) devices from multiple vendors via discrete service offerings At least 700 firewall/idp devices under remote management or monitoring for eternal customers in Europe At least 50 eternal customers in Europe with those devices under management or monitoring Reference accounts in Europe relevant to Gartner customers Eclusion Criteria Providers were ecluded from this MarketScope of regional providers if they: Have more than 90% of their European customers and more than 90% of their devices installed in Europe in only one country Offer MSS only to end users that buy other, non-mss services Offer services that monitor or manage only the service provider's own technology For eample, vendors that have only MSS offerings, such as DDoS protection or vulnerability scanning, but not device monitoring and management, are not included. Providers of primarily Web Page 12 of 28 Gartner, Inc. G

13 and hygiene and trust services (for eample, certificate authorities) are not included. Other vendors offer MSS primarily to hosting customers, with limited offerings to others. As these providers epand the scope of their MSS offerings, they may be included in future MarketScopes. Rating for Overall Market/Market Segment Overall Market Rating: Positive With a portfolio of mature basic services and an array of innovative options, the MSS market in Europe is mature, with a solid growth perspective, despite or to some etent because of a continuously difficult global economic climate. Secure infrastructure management is a prerequisite for businesses that have to cut costs and operate under regulatory scrutiny and tight competition. Outsourcing of security to nearshore or offshore countries has become a normal business option for most organizations. Where security concerns remain, physical operations in Europe are an option for most providers in this MarketScope. MSS customers usually etend their outsourcing contracts and occasionally change providers, but they rarely move services back in-house, which is still considered the more costly option. These factors have resulted in the MSS market in Europe being forecast to grow at a 14% compound annual growth rate from 2011 to 2015 (with the market size for 2011 forecast at $2.5 billion), which means it is still one of the growth sectors in the IT industry. Gartner, Inc. G Page 13 of 28

14 Evaluation Criteria Table 2. Evaluation Criteria Evaluation Criteria Comment Weighting Overall Viability (Business Unit, Financial, Strategy, Organization) Geographic Strategy Product/ Service Marketing Strategy Customer Eperience Innovation Market Responsiveness and Track Record Viability includes an assessment of the provider's financial health, the financial and practical success of the MSS unit, and the likelihood that the MSS unit will continue investing in managed security services, and researching and developing innovative security services. Additional areas assessed include management eperience, the number of customers in Europe, investment in R&D, and understanding of business and technology trends. This includes the provider's strategy to direct resources, skills and offerings to meet the specific needs of regions outside the native area, directly or through partners, channels and subsidiaries, as appropriate for the region and market. We considered the vendor's ability to articulate the differences between the U.S. and European MSS markets, as well as differences within Europe. This is the provider's approach to service development and delivery, which emphasizes differentiation, functionality, methodology and feature sets as they map to current and future requirements. We considered the number of target platforms vendors can manage. This is a clear, differentiated set of messages, consistently communicated throughout the organization and eternalized through the website, advertising, customer programs and positioning statements. In addition, we considered how providers measure the effectiveness of marketing programs. This includes the ways customers receive technical and account support. These can include ancillary tools, customer support programs (and the quality thereof) and the availability of user groups, SLAs and so on. We also assessed providers' implementation processes and system integration and consulting capabilities. Reference client feedback was particularly important in the rating for this criterion. This takes into account capital and human resource investments, and the development of new services as displayed in the security service strategy and the road map. Ability to understand business and security technology trends and assess competitors. This includes the ability to respond, change direction, be fleible and achieve competitive success as new opportunities develop, competitors act, customer needs evolve and market dynamics change. High Standard Standard High High Standard Standard Source: Gartner (October 2011) Page 14 of 28 Gartner, Inc. G

15 Figure 1. MarketScope for Managed Security Services in Europe RATING Strong Negative Caution Promising Positive Strong Positive AT&T Atos BT Global Services Computacenter CSC Dell (SecureWorks) HCL Technologies HP IBM Security Services Integralis Open Systems Orange Business Services Symantec Tata Communications Telefonica Verizon Wipro Technologies As of 26 October 2011 Source: Gartner (October 2011) Vendor Product/Service Analysis AT&T AT&T is a venerable network service provider that tends to emphasize its global approach (it is present in more than 200 countries), rather than regional differentiation. It offers MSS to European multinational companies via SOCs in the U.S. and India, and plans to open another SOC in Eastern Europe. Its MSS strategy focuses on providing integrated network-based security to European-based customers that possess a global footprint, utilizing services such as virtualized firewall, intrusion prevention, Web filtering, DDoS and premises-based solutions. It is aggressively moving into cloud and software-as-a-service-based security services. Global coverage of communications and security services Gartner, Inc. G Page 15 of 28

16 Its ability to leverage eisting communications clients for upselling MSS Its tight bundling of security services with network services and capabilities in cloud security Variable response to customer service requests remains an issue Despite global brand and presence, rarely appears on MSS shortlists in Europe, and needs to improve its visibility as a security provider to etend beyond the multinational company market Rating: Promising Atos Atos (formerly Atos Origin) is an international IT services company with four primary service lines: business consulting, system integration, managed operations and transactional services. In July 2011, Atos completed its acquisition of the IT Solutions and Services subsidiary of Siemens. This analysis reflects the preacquisition situation. Its security services strategy focuses on Atos High Performance Security, an integrated SecaaS platform. The security portfolio includes endpoint security, server security, network security and IAM. Other focus areas are governance/risk/compliance and cloud security. Most of its MSSP contracts are part of larger IT outsourcing relationships. It targets the public sector, financial services (card payments) and healthcare sectors. Eperience in integrating security services with comple, large-scale IT programs (its IT security services for the Olympics are an eample) Ability to work effectively and collaboratively with other service providers (for eample, network service providers) that its clients have engaged Knowledge and skills of some of its technical MSS staff Pursuing information security with the same diligence as IT operations Improving collaboration among and consistency of different countries' and teams' operations Becoming more cost-efficient, reducing the tendency to overengineer security solutions Rating: Positive BT Global Services BT is an established name in network and communications services in Europe. Because of ongoing R&D investments and marketing that ehibits regional insights, BT also managed to shape a decent Page 16 of 28 Gartner, Inc. G

17 security service profile. Customer feedback in Europe has also been more positive over the past year. BT has an etensive security service portfolio with a focus on multifunction firewall/utm devices and secure message gateways. Its MSS differentiation focuses on security embedded in the network, skilled resources and a global infrastructure. Targeting mainly large enterprises, its key messages emphasize the basics simplicity, cost reduction, compliance and asset protection. A resilient operations infrastructure and BT's responsiveness in incident reporting The quality of its internal operational processes (for eample, quality assurance) The skills of its engineers and the ability to listen, respond and adjust to client requirements Sharing information more openly and making it available in real time, rather than on request Cost savings in order to keep pricing competitive must not result in staff shortage Rating: Strong Positive Computacenter Computacenter is a European provider of outsourcing, outtasking, consulting and support services. It operates primarily in the U.K. and in Germany, and has two SOCs in each of these two countries. Its MSS strategy emphasizes a holistic approach to security (client, network and data center), integrating MSS into other outsourcing deals and customer intimacy. It differentiates on agility, value for money and customer relationships. Its customer growth in 2010 was above average. Computacenter has had recent success in the automotive, pharmaceutical and finance industries. Providing cost-effective services from a European vendor Acting as a strategic partner, is able to understand infrastructure and business requirements Having the ability to leverage the eisting client base for upselling managed security services Reducing the perceived gap between promise and performance Improving service consistency and quality Gartner, Inc. G Page 17 of 28

18 Improving knowledge of industry-specific needs and requirements Rating: Positive CSC CSC is a global provider of IT-enabled business solutions and services. This ranges from consulting, to solution design through to implementation and management of the solution. Headquartered in the U.S., it provides MSS via security operations centers in the U.K., Australia, Malaysia and the U.S. It emphasizes the need to address security from a business risk perspective, not just a technology perspective. This is a message that tends to resonate with European client organizations. In Europe, its traditional customers are from within its outsourcing base, although more recently, it has targeted the public sector and financial services for its MSS. Most customers in Europe use CSC for the management of firewalls, customer-owned SIEM/log management and endpoint security clients. For cloud-based Web and , CSC chooses to work with partners. Having the capability to embed an information risk manager as a single point of contact in the client's organization Being able to work with partners to complete the security service portfolio Being able to leverage its eisting client base for upselling MSS Being more fleible (and less commercially rigorous) in its response to changing client requirements Aligning communications between security and other operational teams Improving the ability to leverage security and threat information from its large client base for the benefit of individual clients and delivering enhanced portal capabilities Rating: Positive Dell (SecureWorks) Dell SecureWorks Information Security Services is the result of Dell's acquisition of SecureWorks (U.S.). With this acquisition, Dell benefits from SecureWorks' previous acquisitions of VeriSign's MSS operations and dns (U.K.) in 2009 through Dell SecureWorks manages and/or monitors security devices all over Europe, predominantly in the U.K., especially log sources, firewalls, network IDS/IPSs and data loss prevention systems. Dell SecureWorks operates two SOCs in Europe, provides a comprehensive portal, and also offers support in Spanish and French. Page 18 of 28 Gartner, Inc. G

19 Its clearly articulated strategy in Europe, its understanding of the market and its increasing investments in R&D Its ability and willingness to adapt to the changing needs of large clients Its advanced portal (including asset information and various correlation capabilities) Mitigating the perception that a large vendor cannot provide customer intimacy Continuing to establish a brand presence in the European security market Ensuring consistency of service quality during acquisition integration Rating: Positive HCL Technologies HCL Technologies is an India-based offshore provider that has already gained some traction in Europe. HCL continues to show significant revenue growth in Europe. HCL is strong in server-based security services (IDS/IPS and log collection) as well as endpoint security client management. In addition, it offers application security services and IAM. It also claims comprehensive portal capabilities. HCL focuses on providing fleible services based on a large pool of skilled, eperienced resources and can support delivery in a large number of European languages. Consistent and mature service delivery, including a methodological, process-driven approach to security management Human resource management epertise of staff and relatively low staffing turnover rate Ability to pull in epertise, on demand, from a large resource pool Cost-effectiveness, especially for standard platforms in the HCL support portfolio, and for services that don't deviate from the standard offerings Improving management of nonstandard requests, specifically the ability to deal with requests and issues that fall outside the scope of the eisting formal processes Improving strategic planning clients would like to see more forward-thinking and innovative suggestions for dealing with a constantly changing security environment Gartner, Inc. G Page 19 of 28

20 Rating: Positive HP HP offers enterprise security products and enterprise security services. Its managed security services represent the capabilities of HP, EDS (acquired by HP in August 2008) and Vistorm (acquired by EDS in April 2008). Vistorm was an established security services and consulting vendor based in the U.K. With ArcSight, HP also owns one of the more widely deployed SIEM technologies. In Europe, HP targets enterprise accounts in various industries, including the public sector, financial services and utilities sectors, as well as organizations in the high-end small and midsize business scale. Its European security customer base is stable. HP's security service portfolio includes endpoint security, and firewall and network IPS management. HP recently announced enterprise cloud services: vulnerability scanning, vulnerability intelligence and endpoint threat management. It has five SOCs worldwide, two of which are in Europe (the U.K. and Spain). Its eperience in integrating security services with comple, large-scale enterprise IT solutions It takes the time to develop a detailed understanding of the technical, commercial and functional aspects of client business operations Willingness to reduce service pricing if customer accepts management handled in another country Improving the features and functionality of its MSS portal (which is currently available only in English) Ensuring that Vistorm's strengths are not lost in the HP enterprise Improving HP's visibility as a security player in the broader European MSS market Rating: Positive IBM Security Services IBM's security capabilities include managed security services and cloud-based security offerings complemented by a portfolio of professional security services with a slight emphasis on server and endpoint security (versus network security). IBM Security Services targets larger enterprises and eisting customers for its MSS. It emphasizes its reputation, global reach, and depth and breadth of its solution offerings as key differentiators. IBM is the MSS provider that appears most often on customer shortlists in Europe. Page 20 of 28 Gartner, Inc. G

MarketScope for Managed Security Services in Europe

MarketScope for Managed Security Services in Europe G00229872 MarketScope for Managed Security Services in Europe Published: 24 October 2012 Analyst(s): Carsten Casper The market for managed security services in Europe is mature. Offpremises-delivered services

More information

How To Understand The Security Services In Europe

How To Understand The Security Services In Europe Research Publication Date: 30 September 2010 ID Number: G00206878 MarketScope for Managed Security Services in Europe Carsten Casper, Tom Scholtz The market for managed security services in Europe is mature

More information

MarketScope for Managed Security Services in Europe

MarketScope for Managed Security Services in Europe Research Publication Date: 28 September 2009 ID Number: G00171027 MarketScope for Managed Security Services in Europe Carsten Casper, Tom Scholtz The market for managed security services in Europe has

More information

MarketScope for Managed Security Services in Europe

MarketScope for Managed Security Services in Europe Research Publication Date: 5 May 2008 ID Number: G00157248 MarketScope for Managed Security Services in Europe Carsten Casper, Tom Scholtz The managed security service market in Europe continues to grow.

More information

MarketScope for Managed Security Services in Asia/Pacific, 2012

MarketScope for Managed Security Services in Asia/Pacific, 2012 G00229367 MarketScope for Managed Security Services in Asia/Pacific, 2012 Published: 9 October 2012 Analyst(s): Andrew Walls The Asia/Pacific market for managed security services continues to grow through

More information

Magic Quadrant for MSSPs, North America

Magic Quadrant for MSSPs, North America Magic Quadrant for MSSPs, North America Gartner RAS Core Research Note G00208473, Kelly M. Kavanagh, John Pescatore, 29 November 2010, V2RA712042011 Enterprises face a wide range of options when selecting

More information

Magic Quadrant for MSSPs, North America

Magic Quadrant for MSSPs, North America Page 1 of 18 Magic Quadrant for MSSPs, North America 29 November 2010 Kelly M. Kavanagh, John Pescatore Gartner RAS Core Research Note G00208473 Enterprises face a wide range of options when selecting

More information

Magic Quadrant for Global MSSPs

Magic Quadrant for Global MSSPs Magic Quadrant for Global MSSPs 26 February 2014 ID:G00247003 Analyst(s): Kelly M. Kavanagh VIEW SUMMARY Managed security services is a mature market with offerings from established service providers.

More information

Magic Quadrant for Global MSSPs

Magic Quadrant for Global MSSPs G00247003 Magic Quadrant for Global MSSPs Published: 26 February 2014 Analyst(s): Kelly M. Kavanagh Managed security services is a mature market with offerings from established service providers. This

More information

1 of 8 3/18/2013 4:59 PM

1 of 8 3/18/2013 4:59 PM 1 of 8 3/18/2013 4:59 PM Advanced Latest Update: August 05, 2010 By Khalid Kark with Stephanie Balaouras, Nick Hayes 1950 downloads 1 comments Rating: quick scan full report resources WHY READ THIS REPORT

More information

The 2H05 Magic Quadrant for managed

The 2H05 Magic Quadrant for managed Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security

More information

Research. Magic Quadrant for MSSPs, North America

Research. Magic Quadrant for MSSPs, North America Research Publication Date: 16 April 2009 ID Number: G00166138 Magic Quadrant for MSSPs, North America Kelly M. Kavanagh, John Pescatore Several IT outsourcers entered or increased their presence in the

More information

Magic Quadrant for MSSPs, North America

Magic Quadrant for MSSPs, North America Magic Quadrant for MSSPs, North America Gartner RAS Core Research Note G00166138, Kelly M. Kavanagh, John Pescatore, 16 April 2009, R3053 04272010 Several IT outsourcers entered or increased their presence

More information

Managed Security Services

Managed Security Services NEAT EVALUATION FOR UNISYS: Managed Security Services Market Segment: Overall This document presents Unisys with the NelsonHall NEAT vendor evaluation for Managed Security Services (MSS) for the Overall

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

How To Compare Managed Security Services In Australia/Pb

How To Compare Managed Security Services In Australia/Pb Excerpt IDC ITMarketScape: Asia/Pacific Managed Security Services 2015 Vendor Assessment Cathy Huang IDC ITMARKETSCAPE FIGURE FIGURE 1 IDC ITMarketScape Asia/Pacific Managed Security Services Market Vendor

More information

Magic Quadrant for Global Enterprise Desktops and Notebooks

Magic Quadrant for Global Enterprise Desktops and Notebooks Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main

More information

MarketScope for IT Governance, Risk and Compliance Management, 2008

MarketScope for IT Governance, Risk and Compliance Management, 2008 MarketScope for IT Governance, Risk and Compliance Management, 2008 Gartner RAS Core Research Note G00154941, Paul E. Proctor, Mark Nicolett, French Caldwell, 11 February 2008, RA7 03032009 The IT GRCM

More information

- This study provides an in-depth analysis of MSS market with current and future trends to elucidate the imminent investment pockets in the market.

- This study provides an in-depth analysis of MSS market with current and future trends to elucidate the imminent investment pockets in the market. Brochure More information from http://www.researchandmarkets.com/reports/3197615/ Global Managed Security Services Market - Size, Share, Global Trends, Company Profiles, Demand, Insights, Analysis, Research,

More information

IDC MarketScape: Asia/Pacific Managed Security Services 2015 Vendor Assessment

IDC MarketScape: Asia/Pacific Managed Security Services 2015 Vendor Assessment IDC MarketScape IDC MarketScape: Asia/Pacific Managed Security Services 2015 Vendor Assessment Cathy Huang THIS IDC MARKETSCAPE EXCERPT FEATURES: CSC IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape Asia/Pacific

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

Analysis of the EMEA Managed Security Services Market Protection and Risk Mitigation from Targeted Cyber Attacks is Driving Market Growth

Analysis of the EMEA Managed Security Services Market Protection and Risk Mitigation from Targeted Cyber Attacks is Driving Market Growth Analysis of the EMEA Managed Security Services Market Protection and Risk Mitigation from Targeted Cyber Attacks is Driving Market Growth October 2013 Research Team Lead Analyst Mario Fernandez Senior

More information

Definition of the Market

Definition of the Market Markets, M. Halama Research Note 9 September 2003 Criteria for Pan-European Web Hosting Magic Quadrant, 2H03 Web hosting firms offer greatly differing services to a wide range of customers. Our criteria

More information

Ability to Execute. What You Need to Know

Ability to Execute. What You Need to Know 1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

SecureData grows through managed security services

SecureData grows through managed security services SecureData grows through managed security services How has SecureData grown its managed services business? SecureData has invested heavily in training and recruiting skilled security professionals to provide

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

MarketScope for Wireless LAN Intrusion Prevention Systems

MarketScope for Wireless LAN Intrusion Prevention Systems MarketScope for Wireless LAN Intrusion Prevention Systems Gartner RAS Core Research Note G00159301, John Pescatore, John Girard, 9 July 2008, R2802 10022008 The WLAN intrusion prevention system market

More information

Sophos Acquires Cyberoam

Sophos Acquires Cyberoam Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam

More information

Trustwave blocks Web-borne malware - guaranteed, or your money back

Trustwave blocks Web-borne malware - guaranteed, or your money back Trustwave blocks Web-borne malware - guaranteed, or your money back Analyst: Adrian Sanabria 16 Jul, 2014 Today, Trustwave makes a bold announcement a zero malware guarantee. The anti-malware market has

More information

IDC ITMarketScape: Worldwide Telecom Service Provider 2015 Vendor Assessment

IDC ITMarketScape: Worldwide Telecom Service Provider 2015 Vendor Assessment Capabilities Excerpt IDC ITMarketScape: Worldwide Telecom Service Provider 2015 Vendor Assessment Courtney Munroe THIS MARKETSCAPE EXCERPT FEATURES: NTT COMMUNICATIONS IDC ITMARKETSCAPE FIGURE FIGURE 1

More information

Small Businesses Ride the Cloud: SMB Cloud Watch U.S. Survey Results

Small Businesses Ride the Cloud: SMB Cloud Watch U.S. Survey Results Small Businesses Ride the Cloud: SMB Cloud Watch U.S. Survey Results Authors Stuart Taylor Andy Young James Macaulay February 2010 Cisco Internet Business Solutions Group (IBSG) Cisco IBSG 2010 Cisco and/or

More information

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor VENDOR PROFILE SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor Juan Sacchi IDC OPINION SecureData is a growing managed security services provider headquartered in the U.K. with

More information

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 1 EXECUTIVE SUMMARY INTRODUCING THE 2015 GLOBAL THREAT INTELLIGENCE REPORT Over the last several years, there has been significant security industry

More information

Managed Security Service Providers vs. SIEM Product Solutions

Managed Security Service Providers vs. SIEM Product Solutions White Paper The Business Case for Managed Security Services Managed Security Service Providers vs. SIEM Product Solutions www.solutionary.com (866) 333-2133 The Business Case for Managed Security Services

More information

IT OUTSOURCING STUDY GERMANY/AUSTRIA 2015 MANAGEMENT SUMMARY

IT OUTSOURCING STUDY GERMANY/AUSTRIA 2015 MANAGEMENT SUMMARY IT OUTSOURCING STUDY GERMANY/AUSTRIA 2015 MANAGEMENT SUMMARY Whitelane Research / Navisco AG - Sourcing Professionals 1 MANAGEMENT SUMMARY The 2015 German/Austrian IT Outsourcing Study, conducted by Whitelane

More information

MarketScope for IT Governance, Risk and Compliance Management, 2008

MarketScope for IT Governance, Risk and Compliance Management, 2008 Research Publication Date: 11 February 2008 ID Number: G00154941 MarketScope for IT Governance, Risk and Compliance Management, 2008 Paul E. Proctor, Mark Nicolett, French Caldwell The IT GRCM market was

More information

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa

More information

Security and Services

Security and Services Written by Maxine Holt, May 2005 TA000824SAS Technology Infrastructure Butler Group Subscription Services Security and Services TECHNOLOGY AUDIT Symantec Corporation Managed Security Service (MSS) Abstract

More information

Reduce Risk and Increase Speed Using Gartner's Guide for Salesforce.com Implementation Partners

Reduce Risk and Increase Speed Using Gartner's Guide for Salesforce.com Implementation Partners G00255286 Reduce Risk and Increase Speed Using Gartner's Guide for Salesforce.com Implementation Partners Published: 21 August 2013 Analyst(s): Frances Karamouzis, Patrick J. Sullivan The adoption of salesforce.com

More information

Outlook overcast and bright: How the cloud is transforming IT for SMBs

Outlook overcast and bright: How the cloud is transforming IT for SMBs 9 01 Outlook overcast and bright: How the cloud is transforming IT for SMBs Cloud computing ranks near the top of the most floated buzz phrases in the world of IT and telecoms. While the concept has certainly

More information

Magic Quadrant for Global Network Service Providers

Magic Quadrant for Global Network Service Providers Magic Quadrant for Global Network Service Providers Gartner RAS Core Research Note G00210009, Neil Rickard, Robert F. Mason, 31 March 2011, RA1 07052011 Competition in the global network service provider

More information

Achieving Unified Oversight of Your Mission-critical IT Infrastructure

Achieving Unified Oversight of Your Mission-critical IT Infrastructure Achieving Unified Oversight of Your Mission-critical IT Infrastructure By Jim Huebner, Director, CompuCom Network Solutions Portfolio Big Data, cloud, mobility, social interaction: These mutually reinforcing

More information

W H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d a y ' s T h r e a t L a n d s c a p e

W H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d a y ' s T h r e a t L a n d s c a p e Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

India Managed Security Services Market Forecast and Opportunities, 2019

India Managed Security Services Market Forecast and Opportunities, 2019 Brochure More information from http://www.researchandmarkets.com/reports/2909507/ India Managed Security Services Market Forecast and Opportunities, 2019 Description: Managed security services offer a

More information

It s critical to be able to correlate threats pre-emptively and respond to them immediately.

It s critical to be able to correlate threats pre-emptively and respond to them immediately. Security has become a much deeper executive discussion because of the modern diversity of channels through which businesses can be attacked. Mobility, bring your own device, virtualisation, the cloud,

More information

Emerging Trends in the Network Security Market in India, CY 2013

Emerging Trends in the Network Security Market in India, CY 2013 Emerging Trends in the Network Security Market in India, CY 2013 Advanced Threat Landscape will Give Rise to Increased Network Security Spending 9AC3-74 July 2014 Contents Section Slide Numbers Executive

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING "IT" ALONE

MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING IT ALONE MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING "IT" ALONE August 2014 Derek E. Brink, CISSP, Vice President and Research Fellow, IT Security and IT GRC Report Highlights p2 p3 p6 p7 Security is

More information

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

August 4, 2010 The Forrester Wave : Managed Security Services, Q3 2010

August 4, 2010 The Forrester Wave : Managed Security Services, Q3 2010 August 4, 2010 The Forrester Wave : Managed Security Services, Q3 2010 by Khalid Kark for Security & Risk Professionals Making Leaders Successful Every Day August 4, 2010 The Forrester Wave : Managed Security

More information

A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives

A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives A Blueprint to the Future of Managed Services Direction of Managed Services with Cloud Initiatives Key Takeaways Economic pressures and the new expectations of users, which are being driven by the growth

More information

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications.

Tata Communications Security Outsourcing. A Must-have for Entry into the Global Economy. www.tatacommunications.com. www.tatacommunications. Tata Communications Security Outsourcing A Must-have for Entry into the Global Economy www.tatacommunications.com www.tatacommunications.com 2 Tata Communications Security Outsourcing A Must-have for Entry

More information

AN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT

AN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT WHITE PAPER AN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT COST ANALYSIS OF TWO DELIVERY MODELS: SELF-MANAGED SIEM VS. MANAGED SIEM SERVICES AN EXECUTIVE S GUIDE TO BUDGETING

More information

Can Cloud Database PaaS Solutions Replace In-House Systems?

Can Cloud Database PaaS Solutions Replace In-House Systems? Can Cloud Database PaaS Solutions Replace In-House Systems? Abstract: With the advent of Platform-as-a-Service as a viable alternative to traditional database solutions, there is a great deal of interest

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

$ Drive awareness and increase participation. National account program. Flexible managed Security Solutions for hospitality

$ Drive awareness and increase participation. National account program. Flexible managed Security Solutions for hospitality National Account Program Managed Security Solutions for Hospitality National account program Flexible managed Security Solutions for hospitality The Trustwave National Account Program is designed with

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Aligning CFO and CIO Priorities

Aligning CFO and CIO Priorities whitepaper economics Aligning and Priorities Forward-thinking organizations are viewing computing as an investment in business transformation, not just a way to cut costs for IT. Thanks to the, s and s

More information

2015 Global Identity and Access Management (IAM) Market Leadership Award

2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Contents Background and Company Performance... 3 Industry Challenges... 3 Market Leadership of IBM... 3 Conclusion... 6 Significance

More information

How To Make Money On Security For A Large Organization

How To Make Money On Security For A Large Organization SecureOps Cost-optimized Operational Information Security for Large Organizations Operational Information Security SecureOps is a pure-play security outsourcer that near-shores operational information

More information

Building a Security Operations Center (SOC)

Building a Security Operations Center (SOC) Building a Security Operations Center (SOC) Ben Rothke, CISSP CISM Wyndham Worldwide Corp. Session ID: TECH-203 Session Classification: Advanced About me Ben Rothke, CISSP, CISM, CISA Manager - Information

More information

Bringing Continuous Security to the Global Enterprise

Bringing Continuous Security to the Global Enterprise Bringing Continuous to the Global Enterprise Asset Discovery Network Web App Compliance Monitoring Threat Protection The Most Advanced Platform 3+ Billion IP Scans/Audits a Year 1+ Trillion Events The

More information

How to Reduce Network Equipment Maintenance Costs

How to Reduce Network Equipment Maintenance Costs G00264020 How to Reduce Network Equipment Maintenance Costs Published: 13 May 2014 Analyst(s): Andrew Lerner, Mark Fabbi Each year, maintenance costs swallow 15% to 25% of total enterprise IT budgets,

More information

BEST PRACTICES RESEARCH

BEST PRACTICES RESEARCH 2013 Frost & Sullivan 1 We Accelerate Growth Market Leadership Award Vulnerability Management Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year of business with

More information

Nokia Siemens Networks Network management to service management - A paradigm shift for Communications Service Providers

Nokia Siemens Networks Network management to service management - A paradigm shift for Communications Service Providers White paper Nokia Siemens Networks Network management to service management - A paradigm shift for Communications Service Providers Service management solutions enable service providers to manage service

More information

UiBScfs Cloud Financial Services

UiBScfs Cloud Financial Services UiBScfs Cloud Financial HEAD OFFICE 1 Agias Zonis Str. Pentadromos Centre Office B401 CY-3026 Limassol, Cyprus P.O. Box 52208 CY-4062 Limassol, Cyprus Call Center: Tel: +357 7777 UIBS (8427) Tel: +357

More information

TRANSITIONING YOUR BUSINESS MODEL INTO MANAGED SERVICES FOR LONG-TERM PROFIT AND GROWTH

TRANSITIONING YOUR BUSINESS MODEL INTO MANAGED SERVICES FOR LONG-TERM PROFIT AND GROWTH TRANSITIONING YOUR BUSINESS MODEL INTO MANAGED SERVICES FOR LONG-TERM PROFIT AND GROWTH AS DEMAND FOR EXTERNAL TECHNOLOGY SERVICES INCREASES, MANAGED SERVICES PRESENT AN ATTRACTIVE OPPORTUNITY FOR IT RESELLERS

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

IDC MarketScape: Canadian Managed Security Services 2015 Vendor Assessment

IDC MarketScape: Canadian Managed Security Services 2015 Vendor Assessment IDC MarketScape IDC MarketScape: Canadian Managed Security Services 2015 Vendor Assessment Kevin Lonergan David Senf IN THIS EXCERPT The content for this excerpt was taken directly from the IDC MarketScape:

More information

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200

More information

White Paper: An Evaluation Framework For Selecting an Enterprise Cloud Provider

White Paper: An Evaluation Framework For Selecting an Enterprise Cloud Provider White Paper: An Evaluation Framework For Selecting an Enterprise Cloud Provider Introduction 3 Enterprise Cloud Evaluation Framework Overview 4 Enterprise-Grade and Industry-Standard Comprehensive and

More information

WHAT S ON YOUR CLOUD? Workload Deployment Strategies for Private and Hybrid Clouds RESEARCH AND ANALYSIS PROVIDED BY TECHNOLOGY BUSINESS RESEARCH

WHAT S ON YOUR CLOUD? Workload Deployment Strategies for Private and Hybrid Clouds RESEARCH AND ANALYSIS PROVIDED BY TECHNOLOGY BUSINESS RESEARCH WHAT S ON YOUR CLOUD? Workload Deployment Strategies for Private and Hybrid Clouds RESEARCH AND ANALYSIS PROVIDED BY TECHNOLOGY BUSINESS RESEARCH Contents I. Private Cloud: Making IT a business partner

More information

How To Get A Better At Developing An Application

How To Get A Better At Developing An Application Whitepaper Rethink application possibilities and align to desired business outcomes EALA results January 2014 2014 Avanade Inc. All rights reserved. Executive summary It s a new world of applications.

More information

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

With Cloud Defender, Alert Logic combines products to deliver outcome-based security With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

Hosted Private Cloud Services PEAK Matrix Assessment and Profiles Compendium

Hosted Private Cloud Services PEAK Matrix Assessment and Profiles Compendium Hosted Private Cloud Services PEAK Matrix Assessment and Profiles Compendium Cloud & Infrastructure Services Market Report: December 2015 Preview Deck EGR-2015-4-PD-1649 Our research offerings for global

More information

ICT budget and staffing trends in Healthcare

ICT budget and staffing trends in Healthcare ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936

More information

IDC MarketScape: Worldwide Telecom Service Provider 2013 Vendor Assessment

IDC MarketScape: Worldwide Telecom Service Provider 2013 Vendor Assessment IDC MARKETSCAPE IDC MarketScape: Worldwide Telecom Service Provider 2013 Vendor Assessment Courtney Munroe Melanie Posey THIS IDC MARKETSCAPE EXCERPT FEATURES: BT GLOBAL SERVICES IDC MARKETSCAPE FIGURE

More information

Rose Business Technologies

Rose Business Technologies Data Center Outsourcing Services The Data Center is an environment that provides the centralized support of computer equipment in a secure facility, the underlying network infrastructure, and the processes

More information

Cloud Call Centre. itouch Vision. This document gives an overview of the cloud call Centre and discusses the different features and functionality.

Cloud Call Centre. itouch Vision. This document gives an overview of the cloud call Centre and discusses the different features and functionality. itouch Vision Cloud Call Centre This document gives an overview of the cloud call Centre and discusses the different features and functionality. For further information, about implementation and pricing

More information

Network Management Services: A Cost-Effective Approach to Complexity

Network Management Services: A Cost-Effective Approach to Complexity Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F Network Management Services: A Cost-Effective Approach to Complexity

More information

The Magic Quadrant Framework

The Magic Quadrant Framework Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship

More information

1. Economic factors: Positive global market for IDS/IPS security solutions and services.

1. Economic factors: Positive global market for IDS/IPS security solutions and services. Brochure More information from http://www.researchandmarkets.com/reports/2831830/ Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Market (Host Based, Network Based, Wireless, On-premise

More information

Outsourcing. What is it and what are the options? LODESTAR

Outsourcing. What is it and what are the options? LODESTAR Outsourcing What is it and what are the options? LODESTAR Executive summary Since it first emerged as an option in the mid eighties, outsourcing has been one of the most hotly debated issues in IT. These

More information

HP and netforensics Security Information Management solutions. Business blueprint

HP and netforensics Security Information Management solutions. Business blueprint HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization

More information

IDC MarketScape Excerpt: Worldwide Life Science R&D ITO 2013 Vendor Assessment

IDC MarketScape Excerpt: Worldwide Life Science R&D ITO 2013 Vendor Assessment IDC MarketScape IDC MarketScape Excerpt: Worldwide Life Science R&D ITO 2013 Vendor Assessment Alan S. Louie, Ph.D. THIS IDC MARKETSCAPE EXCERPT FEATURES: ACCENTURE IDC MARKETSCAPE FIGURE FIGURE 1 IDC

More information

Leading Providers of Application Management in Germany 2013

Leading Providers of Application Management in Germany 2013 Application Management I Germany I 2013 Leading Providers of Application Management in Germany 2013 SITSI I Vendor Analysis I PAC RADAR Scoring results Accenture - Unlimited reprint rights - SITSI I Vendor

More information

New Channels Create New Growth Opportunities for Insurers. North American Insurance Distribution Survey Findings

New Channels Create New Growth Opportunities for Insurers. North American Insurance Distribution Survey Findings New Channels Create New Growth Opportunities for Insurers North American Insurance Distribution Survey Findings Introduction After a period marked by disruption of the financial systems and heightened

More information

For personal use only

For personal use only Integrated Research Limited (IRI) FY2015 Annual General Meeting 13 November, 2015 ABN: 76 003 588 449 9 of the top 10 US banks 4 of the world s 10 largest companies 6 of the 10 biggest stock exchanges

More information

2010-2014. Sample Global Network Security Market. 1 technavio insights

2010-2014. Sample Global Network Security Market. 1 technavio insights 1 technavio insights About TechNavio Technavio is the research platform of Infiniti Research. Infiniti Research provides actionable market intelligence to leading companies worldwide. A team of 120 analysts

More information

Hosting and cloud services both provide incremental and complementary benefits to the organization

Hosting and cloud services both provide incremental and complementary benefits to the organization 33 Yonge St., Suite 420, Toronto, Ontario Canada, M5E 1G4 W H I T E P A P E R I D C a n d T E L U S E n t e r p r i s e C l o u d S t u d y, 2 0 1 3 : C a p i t a l i z i n g on C l o u d ' s W i n d o

More information

What is the Role of an Application Service Provider (ASP)/Host?

What is the Role of an Application Service Provider (ASP)/Host? CHAPTER 9 What is the Role of an Application Service Provider (ASP)/Host? There are many areas you should consider when determining if application outsourcing is the best approach for your business. This

More information