Magic Quadrant for Enterprise Network Firewalls
|
|
|
- Magdalene Hawkins
- 10 years ago
- Views:
Transcription
1 Research Publication Date: 21 November 2008 ID Number: G Magic Quadrant for Enterprise Network Firewalls Greg Young, John Pescatore The enterprise network firewall market experienced limited overall innovation from the majority of vendors. Incumbent vendors must offer innovation or lower prices, or they will be displaced by lower-cost competitors. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.
2 WHAT YOU NEED TO KNOW The enterprise firewall (see Note 1) market is one of the largest and most mature security markets. It is populated with mature vendors, and shortlists are fairly homogeneous among horizontal and vertical markets. Innovation has been limited, and opportunities for reducing firewall unit costs have increased because of fewer points of differentiation between competing products and virtualization. Organizations' final product selection decisions must be driven by their specific requirements, especially in the relative importance of management capabilities, ease and speed of the deployment, acquisition costs, IT organization support capabilities, and integration with the established security and network infrastructure. MAGIC QUADRANT Figure 1. Magic Quadrant for Enterprise Network Firewalls Source: Gartner (November 2008) Market Overview Firewalls are a necessary security control for policy enforcement at any network trust boundary, but changing business and threat conditions are putting pressure on growth in the firewall market. Enterprises are redesigning their demilitarized zones (DMZs) to react to the business realities of how staff and customers connect, which drives firewall demand up. However, the increasing requirement for network defense against more-complex threats has increased the deployment of Publication Date: 21 November 2008/ID Number: G Page 2 of 21
3 network intrusion prevention, and driven vendors to provide products that support complex deployments and rule sets that mix traditional port/protocol firewall defense with deep-packet inspection intrusion prevention. Because firewall-only products are not effective against the new breed of threats, price pressure has increased on those offerings. Virtualization has created the opportunity for new firewall platforms that enable many separate physical firewall appliances to be replaced with a single firewall switch, a blade server running multiple virtual firewalls or new virtual firewalls to be run within virtualized servers. This can increase the number of firewall units required and also increase pricing pressure enterprises expect software licenses to decrease in virtualized environments. Firewall technology has also not kept up with the security needs of virtualization (see "Limited Choices Are Available for Network Firewalls in Virtualized Servers"). Virtualization innovation has been mostly limited to the first level of virtualization support, a few products being VMware-certified, as with Astaro, Stonesoft and Check Point Software Technologies. Altor Networks ( has a VMware-only firewall that additionally controls VMotion migration. Business continues to drive DMZ change, with greater depth required to support multitier applications in at least three layers for Web, application and data servers, but also in breadth. The breadth is reflecting the requirement to support multiple methods or classes of Internet access, and also providing greater flexibility of support for connections not originating from the Internet. The management capability of firewalls continues to be a critical selection requirement for large data center and e-commerce deployments, especially to support the complexity of a rich DMZ and potentially thousands of rules. Reporting remains important, and new reporting is boosted by increasingly detailed audit requirements incorporating not only what change was made, but also who made it and why it was done. The pressure on pricing is evident in the slow growth of the firewall market in Gartner estimates that revenue for the enterprise network firewall market in 2007 reached approximately $2.8 billion for purpose-built hardware, approximately 6.5% growth over 2006 revenue. The average price per Gbps of enterprise firewall throughput was approximately $8,000, a slight decrease from last year. Note that revenue is not included in the enterprise totals for companies servicing only small and midsize businesses (SMBs) or using general-purpose server platforms as appliances but not sourced through a firewall vendor. For a detailed market share, see "Market Share: Enterprise Network Security Equipment, Worldwide, 2007." Most vendors include maintenance with support. Combined support and maintenance percentages were, on average, 19%, with the best rates being about 15% and the highest about 35%. These rates tended to correspond to the features offered, with the feature-rich products charging more. Enterprises need to look at the total cost of ownership (TCO) purchase price plus annual support plus full-time-equivalent needs throughout a five-year period when comparing products, because considerable differences exist among vendors about what is included. Small and lower-end midsize businesses (approximately 100 to 500 users) usually are served by the SMB multifunction firewall market (see "MarketScope for Multifunction Firewalls for Small and Midsize Businesses"). Using the same firewall vendor for main and branch offices provides a management and support advantage, rather than bringing in a second vendor focused on smaller appliances. Branch-office firewalls are distinct from SMB firewalls. The branch device is centrally managed, often has a WAN optimization controller (WOC), and does not use some safeguards that are already provided elsewhere in the enterprise (for example, anti-spam). The Next-Generation Firewall Changing business processes and threats are driving new requirements for network security. Increasing bandwidth and new application communication (such as Web 2.0) are changing how Publication Date: 21 November 2008/ID Number: G Page 3 of 21
4 protocols are used and how data is presented. Software as a service is moving critical data offsite, and an increasing reliance on critical IT is pushing security in new directions. Threats are focusing on getting vulnerable users to install targeted malicious executables that attempt to avoid detection. Simply enforcing proper protocol use on standard ports is no longer of sufficient value in this environment. If firewall vendors do not make these changes, enterprises will demand price concessions to reduce firewall costs substantially The next-generation firewall (NGFW) builds on the traditional enterprise firewall, and can include the following: Integrated Deep-Packet Inspection: Intrusion prevention systems (IPSs) and firewalls are complementary and can converge. Both are latency sensitive, often are co-located, are complementary (with firewalls allowing only specified traffic and IPS blocking only specified traffic) and are usually managed by the same operations staff. Beyond having IPS in the same appliance and management console as the firewall, the deep-packet inspection (DPI) properties of IPS can be integrated. An example of this integration would be the IPS initiating operator workflow or directly instructing the firewall to block a source of persisting attacks found via the computationally heavy load of DPI. Enterprises require an IPS that is of the same or better quality than that offered by stand-alone IPS appliances today. The low quality of IPSs offered in most firewalls has buoyed the stand-alone IPS market to approximately $1 billion, and threatens to commoditize the enterprise firewall market. Application Identification: With more communication going through fewer ports and via fewer protocols, port/protocol decisions become less relevant. Whereas IPSs inspect for known malware, application inspection can involve the identification of an application operating by using permitted ports and protocols, such as those for HTTP and HTTPS. Examples would be blocking or alerting on customized policy violations, such as the use of Web mail, anonymizers, peer-to-peer or PC remote control. Destination IP addresses are not enough, because redirectors make a definitive list impossible to achieve, and policy granularity requires the blocking of only some types of application communication to an otherwise permissible destination. Extra-Firewall Intelligence: Increasingly, the firewall will be able to use security-relevant information that is often available via other safeguards. One example is the information from URL filtering, where there are known hostile addresses, and neither the firewall nor the integrated IPS should waste time (subject to a configuration setting) performing any decision making other than rejecting traffic. Firewall Policy Management: A secondary market has emerged for products to better manage firewalls for compliance and reporting, especially where firewalls from multiple vendors are deployed. Large organizations can have many firewalls, products from multiple vendors or firewalls with extraordinarily large rule bases. The consoles and reporting tools from the firewall vendors are often found lacking, and third-party firewall policy management products from companies such as AlgoSec, Exaprotect, Tufin Technologies, Secure Passage and Skybox Security are being used for rule optimization and compliance-related activities, such as reporting workflow and better separation of duties (SOD). Market Definition/Description The enterprise network firewall market represented by this Magic Quadrant is composed of purpose-built software and appliances for securing corporate networks. Products must be able to Publication Date: 21 November 2008/ID Number: G Page 4 of 21
5 support single-firewall deployments, as well as large deployments and high throughput. These products are accompanied by branch-office firewalls and management and reporting products. As the firewall market evolves, other security functions, such as network IPS and malicious software prevention, will also be provided within an NGFW. The NGFW market will eventually subsume the stand-alone network IPS appliance market at the enterprise edge. This will not be immediate, however, because enterprise firewall vendors have been slow to imbue the IPS within their NGFW products with the same capabilities as the stand-alone firewall appliances they offer, and many IPS vendors do not have firewalls in their products that can compete with current enterprise-class firewalls. Additionally, new network security technologies are often provided through separate appliances before being included in other offerings. Although many firewalls may be accompanied by an IPS, close integration is not present in many of these products. As part of increasing the effectiveness and efficiency of firewalls, enterprises need to add more blocking capability to them as part of the base product, go beyond port/protocol identification and move toward a service view of traffic. Firewalls and intrusion-prevention products need to evolve as threats evolve, and provide mechanisms for detecting and blocking targeted attacks. Inclusion and Exclusion Criteria Inclusion Criteria Network firewall companies that meet Gartner's market definition and description were considered for this Magic Quadrant under the following conditions: Gartner has a generally favorable opinion about the vendor's ability to effectively compete in the enterprise market. Gartner clients generate inquiries about the vendor. The vendor regularly appears on enterprise shortlists for final selection. The vendor demonstrates competitive presence in enterprises and in worldwide sales. Gartner considers that aspects of the vendor's product execution and vision are important enough to merit inclusion. The vendor has achieved enterprise firewall product sales (not including maintenance) in the past year of more than $10 million within a customer segment that is visible to Gartner. Exclusion Criteria Companies with insufficient information for assessment or those that did not meet Gartner's inclusion criteria were excluded from the Magic Quadrant based on the following conditions: The vendor has minimal or negligible apparent market share among Gartner clients or is not actively shipping products. The vendor is not the original manufacturer of the firewall product, which includes hardware OEMs, resellers that repackage products that would qualify from their original manufacturers, and carriers and Internet service providers that offer managed services. We assess the breadth of OEM partners as part of the evaluation of the firewall and do not rate platform providers separately. Publication Date: 21 November 2008/ID Number: G Page 5 of 21
6 Products sold as network firewalls but do not have the capability, scalability and ability to directly compete with the larger firewall product/function view are not included. Products suited for SMBs, such as multifunction appliances or small office/home office products, are not targeted at the market this Magic Quadrant covers. Products that are primarily network IPSs and are without an enterprise-class firewall (not NGFW) are not included. Personal firewalls, host-based firewalls, host-based IPSs and Web application firewalls all of which are distinct markets are not included. Stand-alone network IPS appliances are a distinct market and are covered in "Magic Quadrant for Network Intrusion Prevention System Appliances, 1H08." Specific vendors assessed but not included: Added None Palo Alto Networks ( Palo Alto Networks did not meet the inclusion requirements for this iteration of the Magic Quadrant; however, Gartner continues to track and monitor its progress closely. Unlike established firewall vendors that have to integrate NGFW capabilities into their firewall products, Palo Alto had the advantage of developing an NGFW without legacy constraints. Palo Alto now offers three models of appliance. In the majority of placements, Gartner has previously seen Palo Alto taking an alternate sales path into enterprises: selling as a second-tier firewall, application inspection product, or a Secure Web Gateway (SWG). This does not indicate any trend in the firewall market, but is, rather, a strategy intended to allow deployments, whereby Palo Alto can increasingly replace the incumbent edge firewall vendors after showing value and having had time to get product certifications (see "Cool Vendors in Infrastructure Protection, 2008"). Tech Mahindra (ipolicy Networks; Tech Mahindra acquired the ipolicy firewall in The ipolicy firewall business does not meet the inclusion criteria, and we have seen considerable defection from the ipolicy product. However, the ipolicy firewall has maintained its business with a few large customers and can be considered by Tech Mahindra enterprise customers. Alcatel-Lucent ( The Alcatel-Lucent VPN Firewall Brick comes in four models. We have not observed the Brick on any Gartner customer shortlists for at least three years. Gartner assesses that most activity around the Brick is for incumbent customers, or with customers of Alcatel-Lucent network infrastructure equipment that have limited firewall requirements or want the firewall equipment to be part of a single invoice and service agreement. Dropped None Evaluation Criteria Ability to Execute Product or Service: This also includes customer satisfaction in deployments and considers factors related to getting products sold, installed, supported and in users' Publication Date: 21 November 2008/ID Number: G Page 6 of 21
7 hands. Strong execution means that a company has demonstrated to Gartner that its products are successfully and continuously deployed in enterprises and win a large percentage in competition with other vendors. Companies that execute strongly generate pervasive awareness and loyalty among Gartner clients, and generate a steady stream of inquiries to Gartner. Execution is not primarily about company size or market share, although those factors can affect a company's ability to execute. Sales are a factor; however, winning in competitive environments through innovation and quality of product is foremost over revenue. Key features, such as virtualization, console quality, low latency, range of models, secondary product capabilities (logging, event management and compliance), and being able to support complex deployments and modern DMZs, are weighted heavily. Overall Viability: This includes overall financial health, prospects for continuing operations, company history, and demonstrated commitment in the firewall and security market. Growth of the customer base and revenue derived from sales are also considered. All vendors were required to disclose comparable market data, such as firewall revenue, competitive wins vs. key competitors (which is compared to Gartner data on such competitions held by our customers) and devices in deployment. Firewalls shipped are not a key measure of execution. Instead, we consider use of these firewalls to protect the key business systems of Gartner enterprise clients. Sales Execution/Pricing: This includes pricing, deal size, the installed base and use by enterprises, carriers and managed security service provider (MSSPs) the strength of sales and distribution operations in the vendors. Pre- and post-sales support are evaluated. Pricing was compared in terms of a typical enterprise-class deployment, including the cost of all hardware, support, maintenance and installation. Low pricing will not guarantee high execution or client interest. Buyers want good results more than they want bargains. TCO over a typical firewall life cycle (three to five years) was assessed, as was the pricing model for conducting a refresh, while staying with the same product and replacing a competing product without intolerable costs or interruptions. Market Responsiveness and Track Record: This includes the ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the provider's history of responsiveness. Market Execution: This addresses awareness of the product in the market. We recognize companies that are consistently identified by Gartner clients and often appear on their preliminary shortlists. Customer Experience and Operations: This includes management experience and track record and the depth of staff experience specifically in the security marketplace. The greatest factor in this category is customer satisfaction throughout the sales and product life cycle. Also important is low latency, throughput of the IPS capability and how the firewall fared under attack conditions. Table 1. Ability to Execute Evaluation Criteria Evaluation Criteria Product/Service Overall Viability (Business Unit, Financial, Strategy, Organization) Sales Execution/Pricing Weighting High Standard Standard Publication Date: 21 November 2008/ID Number: G Page 7 of 21
8 Evaluation Criteria Market Responsiveness and Track Record Marketing Execution Customer Experience Operations Source: Gartner (November 2008) Weighting Standard Standard High Standard Completeness of Vision Market Understanding and Strategy: This includes providing a track record of delivering on innovation that precedes customer demand rather than an "us too" road map and an overall understanding and commitment to the security market (specifically the network security market). Gartner makes this assessment subjectively by several means, including interaction with vendors in briefings and feedback from Gartner customers on information they receive concerning road maps. Incumbent vendor market performance is reviewed yearly against specific recommendations that have been made to each vendor and against future trends identified in Gartner research. Vendors cannot merely state an aggressive future goal. They must put a plan in place, show that they are following their plan and modify their plan as they forecast that market directions will change. Sales Strategy: This includes pre- and post-product support, value for pricing, and clear explanations and recommendations for detection events. Building loyalty through credibility with full-time enterprise firewall staff demonstrates the ability to assess the next generation of requirements. Offering Strategy: The emphasis is on the vendor's product road map, current features, NGFW capabilities, virtualization and performance. Credible independent third-party certifications, such as Common Criteria, are included. Integrating with other security components is also weighted, as well as product integration into other IT systems. As threats change and become more targeted and complex, we highly weight vendors with road maps toward being able to move beyond pure signature-based, deep-packet inspection techniques. Business Model: This includes the process and success rate for developing new features and innovation, and R&D spending. Vertical, Industry and Geographic Strategy: This includes the ability and commitment to service geographies and vertical markets, such as international deployments, MSSPs, carriers or governments. Innovation: This includes product innovation, such as R&D, and quality differentiators, such as performance, virtualization, integration with other security products, a management interface and clarity of reporting. The more a product mirrors the workflow of the enterprise operation scenario, the better the vision. Products that are not intuitive in deployment, or operations that are difficult to configure or have limited reporting, are scored accordingly. Solving customer problems is a key element of this category. Reducing the rule base, offering interproduct support and leading competitors on features are foremost. Publication Date: 21 November 2008/ID Number: G Page 8 of 21
9 Table 2. Completeness of Vision Evaluation Criteria Evaluation Criteria Market Understanding Marketing Strategy Sales Strategy Offering (Product) Strategy Business Model Vertical/Industry Strategy Innovation Geographic Strategy Source: Gartner (November 2008) Weighting Standard Standard Low High Standard Standard High Standard Leaders The Leaders quadrant contains a mix of large and midsize vendors, with the common element of making products that are built for enterprise requirements. These requirements include a wide range of models, support for virtualization and virtual LANs, and a management and reporting capability that is designed for complex and high-volume environments, such as multitier administration and rules/policy minimization. NGFW capability is an important element as enterprises move away from having dedicated IPS appliances at their perimeter and remote locations. Vendors in this quadrant lead the market in offering new safeguarding features, providing expert capability rather than treating the firewall as a commodity and having a good track record of avoiding vulnerabilities in their security products. Common characteristics include handling the highest throughput with minimal performance loss and options for hardware acceleration. Challengers The Challengers quadrant contains vendors that have achieved a sound customer base, but they are not leading with features. Many challengers are slow to work toward or do not plan for NGFW capability, or they have other security products that are successful in the enterprise and are counting on the relationship, rather than the product, to win deals. Challenger products are often well-priced and because of their strength in execution, vendors can offer economic security product bundles that others cannot. Many challengers hold themselves back from becoming leaders because they are obligated to place security or firewall products as a lower priority in their overall product sets. Firewall market challengers will often have significant market share but trail smaller market share leaders in the release of features. Visionaries Visionaries have the right designs and features for the enterprise, but they lack the sales base, strategy or financial means to compete with leaders and challengers. Most visionary products have good NGFW capability but lack the performance capability and support network. Savings and high-touch support can be achieved for organizations willing to update products more frequently and switch vendors if required. Where firewalling is a competitive element for an enterprise, visionary vendors are good shortlist candidates. Publication Date: 21 November 2008/ID Number: G Page 9 of 21
10 Niche Players Most vendors in the Niche Players quadrant are smaller vendors of enterprise firewalls, makers of multifunction firewalls for SMBs, or branch-office-only product makers attempting to break into the enterprise market. Many niche companies are making larger SMB products, with the mistaken hope that this will satisfy enterprises. Some enterprises that have the firewall needs of an SMB (for example, some Type C "risk-averse" enterprises) may consider niche products, although other models from leaders and challengers may be more suited. If local geographic support is a critical factor, then niche products can be shortlisted. Vendor and Astaro Users like Astaro's ( clustering features and price, and ease of installation is reported as good. The Astaro Security Gateway supports a high number of concurrent connections. Astaro's leverage and integration of a wide range of open-source components provide an attractive price point. Astaro was early in having a VMware-certified version of its firewall. Additionally, the Astaro Security Gateway is available as an appliance or software load. Strong growth of the firewall business for Astaro, and having offerings for Web Security Gateway and Mail Gateway, supports enterprise buying behaviors. Astaro has limited visibility outside of Europe, the Middle East and Africa (EMEA) and outside of its Novell channel. Users report they don't like that Astaro does not offer a wider choice of other safeguards and that the vendor needs to improve reporting. Its unified threat management (UTM) focus is less a match for enterprises and better for SMBs (see "MarketScope for Multifunction Firewalls for Small and Midsize Businesses"). Astaro is short on enterprise features and competes usually with other SMB firewall vendors. Check Point Software Technologies Check Point Software Technologies ( is a well-known pure-play security company with a well-entrenched installed base and a strong, established channel. Check Point scored high as a significant enterprise competitive threat by the vendors Gartner surveyed. A large number of firewall administrators are invested with this vendor by being certified as a Check Point firewall administrator, and the value of these training certifications has been maintained. Publication Date: 21 November 2008/ID Number: G Page 10 of 21
11 Check Point has historically been a software provider, relying on third-party appliance providers, such as Nokia and Crossbeam Systems. Check Point has taken a major strategy shift by offering its own branded appliances. This offers not only greater revenue but should also allow for more updates and agility in not having to move at the rate of the slowest OEM partner. It has a strong field of product options, such as VSX for virtualized firewalling and its Eventia security information and event management (SIEM) product. SecurePlatform allows for a loading of the firewall, along with a hardened operating system onto off-theshelf server hardware. The wide availability of appliance and software options enables Check Point to meet the requirements for complex enterprise networks. Check Point has a strong and mature management interface with the ability to handle complex DMZ deployments and large numbers of devices. Provider-1 users we surveyed generally report a high level of satisfaction. The new Check Point-branded VPN Power-1 appliance offers a higher-end solution in two models, the 5070 and Check Point recently introduced VMware-certified versions for VPN Power-1 (VPN-1 VE) and VPN-1 UTM running in a container on ESX. Check Point has recently placed significant resources into its IPS unit, signaling that Smart Defense will be improved. Although Check Point has lowered prices on models aimed at small businesses, enterprise prices are high. Products may be expensive for enterprises with low-end requirements or static networks/users. Where Check Point was shortlisted but not selected, price was most often listed as the reason. The proposed sale by Nokia of its appliance unit (see "Nokia's Planned Security Sale Will Not Benefit Customers") could cause disruption to sales revenue in the short term. According to Gartner, Check Point on Nokia held the No. 2 position in market share in 2007 for hardware appliance firewalls, meaning that this is a significant channel. Any disruption during the sale gives competitors not based on Check Point an opening for replacing Nokia and Check Point. SmartDefense remains a weak competitor to the deep inspection options of competitors. Check Point still has not updated Smart Defense with the IPS capabilities it obtained with the NFR acquisition; however, Gartner expects it to do so in the near term. IPS-1 is still not integrated into the Smart Center management console, whereas most competing firewall vendors offer stand-alone IPS management under the same console as the firewall. Check Point remains overly secretive about its road map and longer-term strategies, leaving its customers guessing and leaving itself vulnerable to replacement by competitors. Check Point is challenged in succeeding with network security products outside the firewall market and has diluted its focus in this market as it tries to attack desktop security. Check Point is missing significant growth opportunities in and Web security and will continue to be challenged by replacement by competing vendors. Publication Date: 21 November 2008/ID Number: G Page 11 of 21
12 Cisco Cisco ( has significant market share in security, including having the largest market share for firewall appliances, and is viewed as a significant (second highest) enterprise competitive threat by the vendors we surveyed. Cisco offers a single invoice, high discounts and a vendor relationship for "all-cisco" networks, and it has a large market share. The Cisco support network is strong for larger customers. Adaptive Security Appliance (ASA) is a good replacement for the already-announced end-of-life Cisco PIX firewall, and an add-in IPS module (AIP-SSM) can replace a standalone IPS. The ASA is available in four editions, which clearly define what safeguards are being purchased. Cisco offers a wide choice in firewall platforms. The primary offering is the stand-alone firewall/virtual private network (VPN) ASA, with firewalls also available via the Firewall Services Module blade for Catalyst switches, and on Cisco IOS-based Integrated Services Router (ISR). Gartner believes that Cisco is in a strong position to launch "security as a service" offerings in the future. The vendor has strong channels, broad geographic support and the availability of other security products, such as the Cisco Security Agent (CSA), its Monitoring, Analysis and Response System (CS-MARS) SIEM; and IPS products (4200 series and IDSM). Within Cisco during the last year, the network security product groups have undergone a significant change. Ironport was acquired by Cisco in 2007, and the former Ironport CEO was appointed to head a consolidated security group, rather than a Cisco insider. This telegraphs that best-of-breed capabilities and more-direct competition with other security companies will be the new goal rather than operating solely as a supporting element for nonsecurity Cisco products. The value of Cisco security training certifications has greatly increased in general recognition, and has done well in maintaining operator loyalty. Cisco has one of the lowest basic support fees of the vendors we surveyed. Despite its large market share, Cisco is rarely seen on competitive firewall shortlists by Gartner customers. Cisco firewall products are selected more often when security offerings are added to Cisco's infrastructure, rather than when there is a shortlist with competing firewall appliances. Cisco was listed by competitors as the product they most replace, although this is less significant given Cisco's large market share. Where Cisco firewalls were shortlisted, but not selected, quality and usability of the management console, Cisco Security Manager (CSM), were the factors most often cited. In comparison with competitors, Cisco firewall products have one of the highest rates of product vulnerabilities. Although Cisco, like Microsoft and others, is a "big target," it must improve the internal security of its firewall products to more effectively compete in bestof-breed selections. Publication Date: 21 November 2008/ID Number: G Page 12 of 21
13 The requirement to add a hardware module (the AIP-SSM) to add IPS capability to the ASA firewall appliance is a barrier to deployment and a competitive disadvantage. The add-in module does, however, provide processing help with the deep inspection load. If the SSM module is used for IPS, then it cannot be used for other content inspection. Customers report that the road map for feature improvements for enterprise firewall products is not rich enough for their needs. This can provide openings for competitors after the initial successes of Cisco's ASA product, especially with the end-of-life of the Cisco PIX firewall. Fortunately for Cisco, competitors have not been effective in aggressively targeting PIX replacements and are allowing Cisco to effectively deploy ASA with incumbent PIX customers. Gartner customers report that the push of the CS-MARS product as part of Cisco firewall proposals leaves them the impression that Cisco must sell an additional product to compete with the console capability of competitors, such as Check Point and Juniper Networks. We also hear many comments that the performance of MARS does not live up to presales claims. Cisco has the highest product price in dollars per Gbps of the vendors we surveyed. Fortinet Users consistently like the continued pace of development and delivery of Fortinet's ( new features and products, and report easy deployment. Ease of installation is rated high. Fortinet has increased its wins against market leaders and gained additional footholds in emerging areas, such as in-the-cloud firewalls. It has good performance from purpose-built hardware and a wide model range, including bladed appliances for large enterprise and carriers, as well as SMB and branch-office solutions. The new dual application-specific integrated circuit (ASIC) strategy which is used in its FortiGate-310B and FortiGate-620B models, with one processor for network handling for the firewall and VPN and the other for content inspection is a significant performance enabler. The AMC expansion slot options for the enterprise-class models include an onboard security ASIC with additional ports, or a hard drive. Fortinet is price-competitive, especially when using multiple virtual domains. Where Fortinet was shortlisted but not selected in enterprises, the IPS was most often listed as the reason. Post-sales service and support did not get high ratings from users. Gartner believes this is because of the high growth rate of Fortinet and the challenge in growing the support network at the same pace. Marketing focused on using UTM undervalues its enterprise offerings and steers away larger customers. Publication Date: 21 November 2008/ID Number: G Page 13 of 21
14 Juniper Networks Ease of management and technical support were most often listed by users as what they like about Juniper ( firewalls. Post-sales support was rated highly by users, although first-line support satisfaction is more mixed. Users don't like the split between its Integrated Security Gateway and Secure Services Gateway (SSG) model ranges, and would like a unified line of models. Firewall deep inspection is rated as satisfactory by users but is not competitive with stand-alone IPS market leaders. Juniper Networks has a strong enterprise option in Juniper SSG for high-end, purposebuilt appliances, and expresses a clear road map for firewall and security customers. Juniper has good branch-office firewalls, complementing the enterprise products, and recognizes that enterprises want the same vendor for central and branch deployments. Its branch-office firewalls include WOC and an Avaya voice gateway. It has good networking support for routing, protocols and port composition. Juniper's price/management/performance blend is the strongest of the competitors. Juniper recently released two new high-end, chassis-based products the SRX 5600 and 5800 models. The SRX combines firewall, IPS and nonsecurity functions, such as routing. Juniper's OEM deal with Q1 Labs gives Juniper a competitive single-vendor SIEM offering. Juniper was identified as the greatest network firewall competitor by the majority of companies surveyed. As a network infrastructure vendor, rather than a pure-play security vendor, Juniper faces heavy competition from Cisco networks, where buying any Juniper equipment can be resisted as a Cisco network equipment replacement. Like most competitors, integration between IPS and the firewall is limited, although Juniper has the best in-the-firewall IPS in the market. Juniper is generally high-priced and often allows competitors an opening on price alone; however, customers report that they recognize the value/price proposition. Users commented that they would like more Web security products from Juniper. The replacement of ScreenOS with JUNOS could be problematic if Juniper does not maintain strict quality control, and keep JUNOS free from vulnerabilities. Although JUNOS has had more vulnerabilities than ScreenOS, JUNOS has had few vulnerabilities in comparison with other network infrastructure operating systems. Publication Date: 21 November 2008/ID Number: G Page 14 of 21
15 NETASQ NETASQ ( has a good mix of features in comparison to competitors in class. Users report that they like its policy-based management and real-time policy warning. NETASQ is focused on the requirements of midsize customers and provides good channel support. Users report that the appliance throughput lives up to performance claims, including when the IPS is enabled. EMEA customers looking for an EMEA-based vendor are attracted to NETASQ. phion NETASQ has a narrow international base, with almost all its deployments in EMEA. The product focus is less a match for enterprises and better for SMBs. Like most SMBfocused firewall companies, NETASQ does not offer a high end of appliances for larger enterprises; however, its sales success has been on serving organizations of less than 1,000 employees (see "MarketScope for Multifunction Firewalls for Small and Midsize Businesses"). NETASQ follows competitors in some enterprise features, such as number of virtual LANs supported. NETASQ scored low as a significant enterprise competitive threat by the vendors we surveyed. Designed for enterprises, phion ( is a good alternative to established large competitors. Enterprise customers have well-established local support in Germany, Switzerland and Austria, and increasingly elsewhere in EMEA. The phion firewall has features that make it an MSSP-friendly design. It has developed NGFW capabilities, although with a limited IPS signature set, and phion has some unique instant messaging protection features. Post-sales service is strong, and the quality of its technical support is rated high. Users rate phion's IPS capability low. Users don't like that phion does not offer a wider choice of other safeguards beyond firewall. It has a narrow international base, with most customers buying products in EMEA. The vendor has limited market visibility for its netfence firewall. Publication Date: 21 November 2008/ID Number: G Page 15 of 21
16 Its product family includes Web application firewall capabilities, which may divert resources from its primary firewall business. Secure Computing The announced acquisition of Secure Computing ( by McAfee could provide a strong NGFW by combining the Sidewinder firewall with the McAfee IPS, although this combination was not identified as a driver for this deal and will take some time. The wider sales reach of McAfee will be beneficial. (see "Secure Computing Buy Will Strengthen McAfee Network Security"). The TrustedSource feature blocks known bad IP addresses from connecting to the firewall and is a differentiating feature. Secure Computing has increased its market visibility, product set and potential for execution after its CipherTrust acquisition (see "CipherTrust Buy a Bold but Challenging Move for Secure Computing"). It offers strong features for government, military and other "security first" requirements. The vendor's integration of reputation services across network, Web and security product lines provides a strong cross-selling opportunity. It has a reputation of producing secure products, having greatly improved support and being a well-established firewall player. Secure Computing appliances have good product prices in terms of dollars per Gbps in comparison with many competitors. The announced acquisition by McAfee will be disruptive for the Secure Computing firewall unit. Gartner believes that firewall manageability will be decreased if McAfee tries to focus on migrating firewall and IPS management under its desktop-oriented Enterprise Policy Orchestrator (epo) console; however, McAfee has not done this with its other network security products. Secure Computing is slow to innovate and respond to the wider firewall market from its established base. The company has more emphasis on the former Ironmail and WebWasher products. It has low market visibility against market leaders as a result of positioning itself as a second-line firewall and as an alternative to stateful inspection firewalls. Gartner does not often see Secure Computing firewalls competing in enterprise customer shortlists. Secure Computing has one of the highest support fee rates of the vendors we surveyed. It scored low as a significant enterprise threat to competitors. SonicWALL SonicWALL's ( competitive prices have resulted in strong solutions for wide remote-office deployments (such as in retail outlets) and SMBs. Publication Date: 21 November 2008/ID Number: G Page 16 of 21
17 The company has the reputation and track record of strong channel support. The Aventail Secure Sockets Layer (SSL) VPN acquisition brought an enterprise sales force in which SonicWALL has avoided attrition through good merger and acquisition management, providing a base for a potential SonicWALL move into the enterprise market. The new NSA series is a good option for nontraditional deployments, such as an all-inone firewall for an in-the-cloud provider. SonicWALL recently added application identification/inspection as an included feature, under the name Application Firewall. Being a public company allows SonicWALL transparency for customers rating its viability. SonicWALL's firewall product line is primarily SMB-focused and not competitive in most enterprises. "Enterprise" has really meant a midsize company in SonicWALL's product portfolio (see "MarketScope for Multifunction Firewalls for Small and Midsize Businesses"). Like most SMB-focused firewall companies, SonicWALL does not offer a high end of appliances for larger enterprises. SonicWall scored low as a significant enterprise competitive threat by the vendors we surveyed. Stonesoft An enterprise focus makes Stonesoft ( firewalls distinct from most European competitors, which focus on SMBs. Although the majority of Stonesoft's business is in EMEA, North American sales and visibility have been growing. Stonesoft has a pragmatic range of security offerings that reflect the buying and operations realities in enterprises, with firewall with IPsec VPNs, stand-alone IPSs, and SSL VPNs. Stonesoft offers a virtualized StoneGate version that is certified for VMware. Both can be run under the StoneGate Management Center. Stonesoft offers support for clustering and high availability for the few enterprises that do not provide for this in the infrastructure outside the firewall. Support pricing is slightly lower than the industry average. Its appliances have a robust performance and feature set relative to company resources, and it has a loyal customer base, especially those looking for high availability. Its software quality is reported as being high, with no vulnerability-related patches in Stonesoft has limited market visibility outside of EMEA. Its company size is small relative to competitors in the enterprise market. Publication Date: 21 November 2008/ID Number: G Page 17 of 21
18 It's missing a few features that bigger competitors have, such as Layer 2 support. WatchGuard Technologies WatchGuard Technologies' ( competitive prices have resulted in strong solutions for wide remote-office deployments. WatchGuard has been active in developing new features and models, such as HTTPS inspection. Users report a high satisfaction with the reporting function in the WatchGuard management console. The WatchGuard management team has taken a customer-focused approach. Having a specific management console for MSSPs is a competitive factor. A software key to unlock appliance performance for some models can minimize appliance downtime when upgrading. WatchGuard continues to push a proposition of an all-in-one firewall or UTM for enterprises, which does not match customer requirements. The new XTM line could have been a departure from SMB offerings and a new model range focused on enterprise requirements. Instead, WatchGuard is going counter to the requirements for enterprises and offering gateway antivirus and anti-spam in the XTM firewalls. WatchGuard scored low as a significant enterprise competitive threat by the vendors we surveyed. RECOMMENDED READING "Magic Quadrant for Network Intrusion Prevention System Appliances, 1H08" "Magic Quadrants and MarketScopes: How Gartner Evaluates Vendors Within a Market" Acronym Key and Glossary Terms ASA ASIC DMZ DPI EMEA IPS MSSP NGFW SIEM SMB SSG Adaptive Security Appliance application-specific integrated circuit demilitarized zone deep-packet inspection Europe, the Middle East and Africa intrusion prevention system managed security service provider next-generation firewall security information and event management small or midsize business Secure Services Gateway Publication Date: 21 November 2008/ID Number: G Page 18 of 21
19 SSL TCO UTM VPN WOC Secure Sockets Layer total cost of ownership unified threat management virtual private network WAN optimization controller Note 1 Why Firewalls? The enterprise firewall market is driven primarily by the requirement to provide network policy enforcement and intrusion prevention at trust boundary points. Network firewalls are often the first line of defense and the primary implementers of a positive security model policy of "deny all except that which is expressly allowed." They are the enforcement points for creating DMZs for external connections. Vendors Added or Dropped We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor appearing in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. This may be a reflection of a change in the market and, therefore, changed evaluation criteria, or a change of focus by a vendor. Evaluation Criteria Definitions Ability to Execute Product/Service: Core goods and services offered by the vendor that compete in/serve the defined market. This includes current product/service capabilities, quality, feature sets and skills, whether offered natively or through OEM agreements/partnerships, as defined in the market definition and detailed in the subcriteria. Overall Viability (Business Unit, Financial, Strategy, Organization): Viability includes an assessment of the overall organization's financial health, the financial and practical success of the business unit, and the likelihood of the individual business unit to continue investing in the product, to continue offering the product and to advance the state of the art within the organization's portfolio of products. Sales Execution/Pricing: The vendor's capabilities in all pre-sales activities and the structure that supports them. This includes deal management, pricing and negotiation, pre-sales support and the overall effectiveness of the sales channel. Market Responsiveness and Track Record: Ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the vendor's history of responsiveness. Publication Date: 21 November 2008/ID Number: G Page 19 of 21
20 Marketing Execution: The clarity, quality, creativity and efficacy of programs designed to deliver the organization's message to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This "mind share" can be driven by a combination of publicity, promotional, thought leadership, word-of-mouth and sales activities. Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups and service-level agreements. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Completeness of Vision Market Understanding: Ability of the vendor to understand buyers' wants and needs and to translate those into products and services. Vendors that show the highest degree of vision listen and understand buyers' wants and needs, and can shape or enhance those with their added vision. Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the Web site, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling product that uses the appropriate network of direct and indirect sales, marketing, service and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: The vendor's approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature set as they map to current and future requirements. Business Model: The soundness and logic of the vendor's underlying business proposition. Vertical/Industry Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including verticals. Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. Geographic Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market. Publication Date: 21 November 2008/ID Number: G Page 20 of 21
21 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 21 November 2008/ID Number: G Page 21 of 21
Magic Quadrant for Enterprise Network Firewalls
Magic Quadrant for Enterprise Network Firewalls Gartner RAS Core Research Note G00162592, Greg Young, John Pescatore, 21 November 2008, R2942 06102009 The enterprise network firewall market experienced
Magic Quadrant for Enterprise Network Firewalls
Magic Quadrant for Enterprise Network Firewalls Gartner RAS Core Research Note G00174908, Greg Young, John Pescatore, 15 March 2010, RA1 09192010 The enterprise network firewall market has entered an evolutionary
Magic Quadrant for Enterprise Network Firewalls
Magic Quadrant for Enterprise Network Firewalls 15 March 2010 Greg Young, John Pescatore Gartner RAS Core Research Note G00174908 The enterprise network firewall market has entered an evolutionary period,
Magic Quadrant for Global Enterprise Desktops and Notebooks
Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main
Ability to Execute. What You Need to Know
1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact
CIO Update: The Gartner Firewall Magic Quadrant for 2H02
IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market
Magic Quadrant for Enterprise Network Firewalls
G00219235 Magic Quadrant for Enterprise Network Firewalls Published: 14 December 2011 Analyst(s): Greg Young, John Pescatore The enterprise network firewall market is undergoing a period dynamic evolution,
Unlike the general notebook market, in which
Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook
The 2H05 Magic Quadrant for managed
Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security
Case Study & POC & Demos Information
Case Study & POC & Demos Information Type: Case Study Name: Multichannel Campaign Management (MCCM) Description: The IBM Company seeks, as vendor, through the multichannel campaign management (MCCM) services,
Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius
Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius 1 The Evolving Security World The Easy Internet High Degree of IT control Slow rate of change
Magic Quadrant for Intrusion Prevention
Page 1 of 9 Magic Quadrant for Intrusion Prevention Systems 5 July 2012ID:G00222572 Analyst(s): Greg Young, John Pescatore VIEW SUMMARY The network intrusion prevention system market is undergoing a period
NGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
Check Point Positions
Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.
Firewall Market Trends
Markets, R. Stiennon Research Note 19 June 2003 Magic Quadrant for Enterprise Firewalls, 1H03 Deep packet inspection technology is driving the firewall market to an inflection point that is characterized
Magic Quadrant for Unified Threat Management
G00245469 Magic Quadrant for Unified Threat Management Published: 19 July 2013 Analyst(s): Greg Young, Jeremy D'Hoinne Unified threat management devices provide small or midsize businesses with multiple
EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02
Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
Magic Quadrant for SMB Multifunction Firewalls
Research Publication Date: 10 July 2009 ID Number: G00168918 Magic Quadrant for SMB Multifunction Firewalls Adam Hils, Greg Young This research examines the small-and-midsize-business multifunction firewall
Magic Quadrant for Corporate Telephony in EMEA, 2003
Markets, S. Blood, C. Lock Research Note 2 September 2003 Magic Quadrant for Corporate Telephony in EMEA, 2003 Cisco and Alcatel continue to offer the market's most comprehensive corporate propositions.
How To Sell Network Intrusion Prevention System Appliances
Magic Quadrant for Network Intrusion Prevention System Appliances, 2H06 Gartner RAS Core Research Note G00144735, Greg Young, John Pescatore, 22 December 2006 R2130 12282007 The network intrusion prevention
SSL VPN 1H03 Magic Quadrant Evaluation Criteria
Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and
Magic Quadrant for Intrusion Prevention
Magic Quadrant for Intrusion Prevention Systems 16 December 2013 ID:G00253078 Analyst(s): Adam Hils, Greg Young, Jeremy D'Hoinne VIEW SUMMARY Market Definition/Description The network intrusion prevention
Magic Quadrant for Network Intrusion Prevention Systems
Magic Quadrant for Network Intrusion Prevention Systems Gartner RAS Core Research Note G00208628, Greg Young, John Pescatore, 06 Dec 2010, R3524 12082011 Deep inspection network-based intrusion prevention
Analysis of the Global Unified Threat Management (UTM) Market Enterprise Features and Product Value Propel Market Growth
Analysis of the Global Unified Threat Management (UTM) Market Enterprise Features and Product Value Propel Market Growth November 2012 Research Team Lead Analyst Chris Rodriguez Industry Analyst Network
CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader
IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven
IP Contact Centers Approach Maturity
Decision Framework, S. Blood, T. Wright Research Note 11 December 2002 IP Contact Centers Approach Maturity Enterprises should evaluate IP-based contact-center applications and next-generation architecture
Magic Quadrant for Unified Threat Management
G00226111 Magic Quadrant for Unified Threat Management Published: 5 March 2012 Analyst(s): John Pescatore, Greg Young Unified threat management devices provide small and midsize businesses with multiple
Magic Quadrant for Storage Professional and Support Services
Magic Quadrant for Storage Professional and Support Services Gartner RAS Core Research Note G00157182, Adam W. Couture, Robert E. Passmore, 30 July 2008 Gartner evaluates storage service providers and
Magic Quadrant for CRM Service Providers, North
Magic Quadrant for CRM Service Providers, North America 30 August 2010 Matthew Goldman, Ed Thompson Gartner RAS Core Research Note G00205524 Demand for CRM project-based consulting and implementation services
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
McAfee Next Generation Firewall
McAfee Next Generation Firewall Services solutions for Managed Service Providers (MSPs) McAfee Next Generation Firewall offers the advanced security, flexibility, and multitenant control needed to protect
Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms
Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Gartner RAS Core Research Note G00158295, French Caldwell, Tom Eid, 30 June 2008, R2799 07092009 The market for enterprise governance,
Network Security Scenario
Network Security Scenario Jeffrey Wheatman Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals must
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
VMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
Virtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
High Performance NGFW Extended
High Performance NGFW Extended Enrique Millán Country Manager Colombia [email protected] 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material
Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore
Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear
Improving Profitability for MSSPs Targeting SMBs
Improving Profitability for MSSPs Targeting SMBs Using a Multi-tenant Virtual Domain (VDOM) Model to Deliver Cost-Effective Security Services Introduction In recent years the adoption of cloud services,
2003 Desktop Software Distribution Magic Quadrant
Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic
MarketScope for IT Governance, Risk and Compliance Management, 2008
MarketScope for IT Governance, Risk and Compliance Management, 2008 Gartner RAS Core Research Note G00154941, Paul E. Proctor, Mark Nicolett, French Caldwell, 11 February 2008, RA7 03032009 The IT GRCM
2010-2014. Sample Global Network Security Market. 1 technavio insights
1 technavio insights About TechNavio Technavio is the research platform of Infiniti Research. Infiniti Research provides actionable market intelligence to leading companies worldwide. A team of 120 analysts
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Astaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002
IGG-10232002-03 J. Holincheck Article 23 October 2002 Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 The market for large-enterprise human resources management system (HRMS)
McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.
Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High
The PC life cycle configuration management Market Overview
Magic Quadrant for PC Life Cycle Configuration Management, 2005 Gartner RAS Core Research Note G00131185, 17 October 2005, Ronni J. Colville, Michael A. Silver, R1580 05052006. The PC life cycle configuration
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security White Paper September 2003 Abstract The network security landscape has changed dramatically over the past several years. Until
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview October 2010 Matias Cuba - Regional Sales Manager Northern Europe About Palo Alto Networks Palo Alto Networks is the Network
Magic Quadrant for Content-Aware Data Loss Prevention
Magic Quadrant for Content-Aware Data Loss Prevention Gartner RAS Core Research Note G00200788, Paul E. Proctor, Eric Ouellet, 2 June 2010, V2 RA2 12062010 The enterprise content-aware data loss prevention
White Paper. ZyWALL USG Trade-In Program
White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...
By 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability).
Page 1 of 5 Magic Quadrant for Unified Communications, 2005 14 February 2005 Bern Elliot Steve Blood Drew Kraus Source: Gartner Note Number: G00125707 Unified communications technology and applications
Magic Quadrant for Network Intrusion Prevention System Appliances
Magic Quadrant for Network Intrusion Prevention System Appliances Gartner RAS Core Research Note G00167303, Greg Young, John Pescatore, 14 April 2009, R3048 04172010 The network IPS market continues to
Magic Quadrant for Enterprise Network
Page 1 sur 15 Magic Quadrant for Enterprise Network Firewalls 15 April 2014 ID:G00258296 Analyst(s): Greg Young, Adam Hils, Jeremy D'Hoinne VIEW SUMMARY "Next generation" capability has been achieved by
The Magic Quadrant Framework
Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship
Requirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
IP Centrex and IP Telephony Offer Different Capabilities
Competitive Analysis IP Centrex and IP Telephony Offer Different Capabilities Abstract: As IP Centrex and hosted IP telephony services become more mainstream, organizations must assess which solution is
Magic Quadrant for Unified Threat Management
Research Publication Date: 22 October 2010 ID Number: G00206923 Magic Quadrant for Unified Threat Management John Pescatore, Bob Walder Unified threat management devices provide all-in-one security in
Braindumps.700-295.50.QA
Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me
Delivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant.
Markets, M. Halpern Research Note 18 March 2003 Defining the PLM Magic Quadrant by Criteria and Use We provide the methodology used in developing our product life cycle management Magic Quadrant. Core
Emerging Trends in the Network Security Market in India, CY 2013
Emerging Trends in the Network Security Market in India, CY 2013 Advanced Threat Landscape will Give Rise to Increased Network Security Spending 9AC3-74 July 2014 Contents Section Slide Numbers Executive
Magic Quadrant for WAN Optimization Controllers, 2007
Magic Quadrant for WAN Optimization Controllers, 2007 Gartner RAS Core Research Note G00153256, Andy Rolfe, Joe Skorupa, 14 December 2007 R2577 12192008 The WOC market is maturing rapidly, but remains
Securing Virtualization with Check Point and Consolidation with Virtualized Security
Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized
Magic Quadrant for Enterprise Network
Page 1 of 15 Magic Quadrant for Enterprise Network Firewalls 15 April 2014 ID:G00258296 Analyst(s): Greg Young, Adam Hils, Jeremy D'Hoinne VIEW SUMMARY "Next generation" capability has been achieved by
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice
Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice The Road To Ethernet WAN Various industry sources show trends in globalization and distribution, of employees moving towards
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
Cisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Securing the Small Business Network. Keeping up with the changing threat landscape
Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not
Magic Quadrant for WAN Optimization Controllers, 2009
Magic Quadrant for WAN Optimization Controllers, 2009 Gartner RAS Core Research Note G00165875, Andy Rolfe, Joe Skorupa, Severine Real, 30 June 2009, RA1 10022009 The WOC market is maturing rapidly, but
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
Sophos Acquires Cyberoam
Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
Magic Quadrant for Higher Education Administrative Suites, 2005
Industry Research Publication Date: 21 November 2005 ID Number: G00131715 Magic Quadrant for Higher Education Administrative Suites, 2005 Marti Harris, Michael Zastrocky With Oracle's acquisition of PeopleSoft,
Strategic Sourcing Magic Quadrant Criteria: An Explanation
Markets, D. Hope-Ross, J. Woods Research Note 14 March 2003 Strategic Sourcing Magic Quadrant Criteria: An Explanation A new Gartner Magic Quadrant for strategic sourcing applications is being introduced.
Magic Quadrant for Network Intrusion Prevention System Appliances
Research Publication Date: 14 April 2009 ID Number: G00167303 Magic Quadrant for Network Intrusion Prevention System Appliances Greg Young, John Pescatore The network IPS market continues to mature and
