Infrastructure Security Technology Roadmap

Size: px
Start display at page:

Download "Infrastructure Security Technology Roadmap"

Transcription

1 Information Security Study: Wave 17 Infrastructure Security Technology Roadmap Capturing IT professionals adoption plans, projected spending and vendor short-lists, the in-depth roadmap covers 14 technologies, including endpoint and network data-loss prevention (DLP), encryption and tokenization. NEW YORK BOSTON WASHINGTON DC SAN FRANCISCO SEATTLE DENVER LONDON SAO PAULO DUBAI SINGAPORE

2 About TheInfoPro s Information Security Study TheInfoPro s Information Security Study takes an in-depth look at key industry trends and tracks the performance of individual vendors. Now in its twelfth year, this study was finalized in September 2014 and is based on 217 interviews. TheInfoPro s methodology uses extensive interviews with a proprietary network of IT professionals and key decision-makers at large and midsize enterprises. Each interview explores several fundamental areas, including the implementation and spending plans for technologies, evaluations of vendors observed from business and product perspectives, macro IT influences transforming the sector, and factors affecting decision processes. Results are collated into comprehensive research reports providing business intelligence in the form of technological roadmaps, budget trends and vendor spending plans and performance ratings. Examples of Vendors Covered in the Study Aruba Networks Blue Coat Systems Check Point Cisco Dell EMC (RSA) Fortinet FireEye Guidance Software Hewlett-Packard Intel (McAfee) Juniper Networks Microsoft About the Author Palo Alto Networks Qualys Rapid7 Sophos Symantec Websense This report was written by Daniel Kennedy, Research Director for Enterprise Networking and Information Security. Daniel Kennedy is an experienced information security professional. Prior to joining 451 Research, he was a partner in the information security consultancy Praetorian Security LLC, where he directed strategy on risk assessment and security certification. Before that, he was Global Head of Information Security for D.B. Zwirn & Co., as well as Vice President of Application Security and Development Manager at Pershing LLC, a division of the Bank of New York. Kennedy has written for both Forbes online and Ziff Davis, has provided commentary to numerous news outlets, including The New York Times and The Wall Street Journal, and his personal blog, Praetorian Prefect, which was recognized as one of the top five technical blogs in information security by the RSA 2010 Conference. Kennedy holds a master of science degree in information systems from Stevens Institute of Technology, a master of science in information assurance from Norwich University, and a bachelor of science in information management and technology from Syracuse University. He is certified as a CEH (Certified Ethical Hacker) from the EC-Council, is a CISSP, and has a NASD Series 7 license Research, LLC.

3 Guide to Information Security Study Reports A wave of research produces a series of reports that are published approximately in this order: 2015 INFORMATION SECURITY OUTLOOK INFORMATION SECURITY METRICS REFERENCE TECHNOLOGY APPLICATION SECURITY TECHNOLOGY INFRASTRUCTURE SECURITY TECHNOLOGY NETWORK SECURITY TECHNOLOGY SECURITY MANAGEMENT TECHNOLOGY Information security professionals describe how 2015 looks for budgets, projects and pain points with time series charts to give perspective to the coming year. Benchmarking organization efficiency, this report contains metrics about staffing, organization structure, the existence of written policies, compliance and internal security. Allowing comparison of all 42 technologies tracked in the study, this high-level reference contains the Technology Heat Index, the Adoption Index, leading vendor tables, overall technology roadmap and spending charts. It also indicates what is included in the more detailed reports based on each technology segment covered in the study. Capturing IT professionals adoption plans, projected spending and vendor short-lists, the in-depth roadmap covers these four technologies: Web application firewalls, Web application scanning, code/binary analysis and database security. Capturing IT professionals adoption plans, projected spending and vendor short-lists, the in-depth roadmap covers 14 technologies, including endpoint and network data-loss prevention (DLP), encryption and tokenization. Capturing IT professionals adoption plans, projected spending and vendor short-lists, the in-depth roadmap covers 11 technologies, including firewalls, NIPS, NAC, UTM, anti-spam and anti-ddos. Capturing IT professionals adoption plans, projected spending and vendor short-lists, the in-depth roadmap covers 13 technologies, including mobile device management, SIEM, IT GRC, identity federation, threat intelligence and computer forensics. VENDOR VULNERABILITY AND SPENDING This report allows you to compare IT professionals spending intentions and loyalty ratings for more than 12 vendors. VENDOR MARKET WINDOWS AND RATINGS CUSTOMER ASSESSMENTS FOR INDIVIDUAL VENDORS NARRATIVES MARKET DYNAMICS TheInfoPro s unique Market Window uses IT professionals ratings of vendors on 14 separate criteria to calculate scores for Vendor Promise and Vendor Fulfillment, allowing comparison of vendors effectiveness at strategy, marketing, delivery and execution. Summarizing IT professionals assessments for vendors, this report profiles individual vendors based on spending, vulnerability and ratings on 14 categories. Time series are included. Compiling open-ended commentary from in-depth interviews with IT professionals, you hear the direct voice of the customer discussing technology, the industry and the future of this sector. Designed for IT professionals, this report captures highlights from the complete study, and provides business intelligence in the form of technological roadmaps, budget trends, voice-of-the-customer narratives and vendor spending plans and performance ratings. Source: Information Security Wave Research, LLC.

4 Table of Contents About TheInfoPro s Information Security Study 2 Principal Findings 5 Overview of Segment 6 Roadmaps of Individual Technologies 9 Endpoint Data-loss Prevention Solutions Network Data-loss Prevention Solutions Multifactor Authentication Managed Security Service Provider Tools for Securing Virtualization Infrastructure Certificate/Key Management Tools for Security Public Cloud Information or Digital Rights Management Vulnerability/Risk Assessment/Scanning File Integrity Monitoring Host Intrusion Detection and/or Prevention Penetration Testing Tokenization Encryption Appendixes Demographics, Methodology, Sample Variation 41 How to Interpret the Data 43 Narratives 44 Source: Information Security Wave Research, LLC.

5 Each individual report summarizes interesting portions of TheInfoPro s Wave 17 Information Security Study and does not comprehensively review the hundreds of pages of research that form the full study. For access to TheInfoPro s reports and services, please contact Methodology questions may be addressed to 451 Research is a preeminent information technology research and advisory company. With a core focus on technology innovation and market disruption, we provide essential insight for leaders of the digital economy. More than 100 analysts and consultants deliver that insight via syndicated research, advisory services and live events to over 1,000 client organizations in North America, Europe and around the world. Founded in 2000 and headquartered in New York, 451 Research is a division of The 451 Group. TheInfoPro, a service of 451 Research, is widely regarded as The Voice of the Customer, providing independent, real world intelligence on key IT sectors including Servers and Virtualization, Information Security, Networking, Storage and Cloud Computing. Using one-onone interviews conducted within a proprietary network composed of the world s largest buyers and users of IT, TheInfoPro provides data and insights that are used for strategic planning, technology benchmarking, competitive analysis, and vendor selection and negotiation. Reproduction and distribution of this publication, in whole or in part, in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. 451 Research disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although 451 Research may discuss legal issues related to the information technology business, 451 Research does not provide legal advice or services and their research should not be construed or used as such. 451 Research shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice. TheInfoPro and logo are registered trademarks and property of 451 Research, LLC Research, LLC and/or its Affiliates. All Rights Reserved. 20 West 37th Street, 3rd Floor, New York, NY P F Research, LLC.

Network Management Software Technology Roadmap

Network Management Software Technology Roadmap Networking Study: Wave 10 Network Management Software Technology Roadmap Capturing networking professionals adoption plans, projected spending and vendor short-lists, the indepth roadmap covers six technologies

More information

Data Networking Technology Roadmap

Data Networking Technology Roadmap Networking Study: Wave 10 Data Networking Technology Roadmap Capturing networking professionals adoption plans, projected spending and vendor short-lists, the indepth roadmap covers 17 technologies including:

More information

Application Security Technology Roadmap

Application Security Technology Roadmap Information Security Study: Wave 15 Application Security Technology Roadmap Capturing security professionals adoption plans, projected spending and vendor short lists, the in-depth roadmap covers six technologies,

More information

Servers and Virtualization Software Technology Roadmap

Servers and Virtualization Software Technology Roadmap Servers and Virtualization: Wave 13 Servers and Virtualization Software Technology Roadmap Capturing IT professionals adoption plans, projected spending and vendor short lists, the in-depth roadmap covers

More information

Big Data and Business Analytics

Big Data and Business Analytics Servers and Virtualization Study: Wave 14 Big Data and Business Analytics This report captures IT professionals adoption plans, projected spending, vendor short-lists and considerations in decision-making

More information

The Smell of Security, the Roar of the Cloud

The Smell of Security, the Roar of the Cloud The Smell of Security, the Roar of the Cloud When buzzwords start getting thrown around with reckless abandon, the results can be polarizing. Vendor market figures only show half the picture; our interviews

More information

Reference Technology Roadmap

Reference Technology Roadmap Information Security Study: Wave 17 Reference Technology Roadmap Comparing all 42 technologies tracked in the study, this high-level reference contains the Technology Index, the Adoption Index, leading

More information

Servers and Virtualization Hardware Technology Roadmap

Servers and Virtualization Hardware Technology Roadmap Servers and Virtualization Study: Wave 12 Servers and Virtualization Hardware Technology Roadmap Capturing server and virtualization professionals adoption plans, projected spending and vendor shortlists,

More information

Reference Technology Roadmap

Reference Technology Roadmap Information Security: Wave 16 Reference Technology Roadmap Allowing comparison of all 48 technologies tracked in the study, this high-level reference contains the Technology Heat Index, the Adoption Index,

More information

Customer Insight on Flash in the Data Center

Customer Insight on Flash in the Data Center Customer Insight on Flash in the Data Center Forum D-11: Flash in Data Centers Marco Coulter Vice President, 451 Research Flash Memory Summit 2015 Santa Clara, CA 1 About the Speaker @marcocoulter marco@451research.com

More information

Global Content Delivery Networks

Global Content Delivery Networks MARKET FORECAST NOV 2015 Global Content Delivery Networks Market Overview 2015 Jim Davis, Senior Analyst, Service Providers After enjoying robust growth in 2014, the CDN market will see some effects from

More information

Cloud Management Platform Market Map 2016

Cloud Management Platform Market Map 2016 MARKET MAP Cloud Management Platform Market Map 2016 MAY 2016 William Fellows, Research Vice President A cloud management platform should operate like a cloud Uber app for IT consumption and delivery that

More information

MANAGED INFRASTRUCTURE MARKET OVERVIEW 2015

MANAGED INFRASTRUCTURE MARKET OVERVIEW 2015 MANAGED INFRASTRUCTURE MARKET OVERVIEW 2015 This report takes a global view of the managed infrastructure market, analyzing the state of the market by technology and region. It also highlights vendors

More information

Web and Application Hosting 2015

Web and Application Hosting 2015 MARKET FORECAST Web and Application Hosting 2015 SEP 2015 Liam Eagle, Senior Analyst, Service Providers Web and application hosting, a mature IT market, is facing changes to the variety of services on

More information

The Data Management of Things

The Data Management of Things The Data Management of Things THE IMPLICATIONS OF IOT FOR DATA ANALYTICS The Internet of Things (IoT) is placing new demands on data storage, networking, processing and analytics. For end users, vendors

More information

Data Platforms and Analytics Market Map 2016

Data Platforms and Analytics Market Map 2016 MARKET MAP Data Platforms and Analytics Market Map 2016 APRIL 2016 Matt Aslett, Research Director, Data Management & Analytics Krishna Roy, Senior Analyst, Data Platforms & Analytics James Curtis, Senior

More information

Social Intranets and the Supply Chain

Social Intranets and the Supply Chain THOUGHT LEADERSHIP Social Intranets and the Supply Chain EXECUTIVE OVERVIEW SEP 2015 Alan Pelz-Sharpe, Research Director, Business Applications Matt Mullen, Senior Analyst, Business Applications In one

More information

Software and Data Are Reshaping the Advertising Market

Software and Data Are Reshaping the Advertising Market THOUGHT LEADERSHIP Software and Data Are Reshaping the Advertising Market APR 2016 Scott Denne, Analyst Matt Mullen, Senior Analyst, Social Business The growth of digital media and mobile connectivity

More information

Cloud Brokers EXECUTIVE OVERVIEW MAKING ITAAS A PRACTICAL REALITY?

Cloud Brokers EXECUTIVE OVERVIEW MAKING ITAAS A PRACTICAL REALITY? Cloud Brokers MAKING ITAAS A PRACTICAL REALITY? This report examines what a cloud broker is, its components and functions, its role(s), its audience and how it supports the delivery of ITaaS by turning

More information

2016 Trends in Enterprise Networking

2016 Trends in Enterprise Networking PREVIEW 2016 Trends in Enterprise Networking DEC 2015 Peter Christy, Research Director After years of being the uninteresting technology in back of the network jack, networking has recently found celebrity

More information

Canadian Multi-Tenant Datacenter

Canadian Multi-Tenant Datacenter Canadian Multi-Tenant Datacenter MARKET ASSESSMENT 2014 NOV 2014 451 RESEARCH REPORT SNAPSHOT TITLE Canadian Multi-Tenant Datacenter Market Assessment 2014 ANALYST Michael Levy, Senior Analyst, Multi-Tenant

More information

The State of the European Public Cloud Market

The State of the European Public Cloud Market The State of the European Public Cloud Market 2015 UPDATE A year ago, startups, early adopters, and test and development professionals were the key markets for European public cloud service providers.

More information

THREAT INTELLIGENCE EXECUTIVE OVERVIEW. A Market for Secrets KEY FINDINGS

THREAT INTELLIGENCE EXECUTIVE OVERVIEW. A Market for Secrets KEY FINDINGS A Market for Secrets As the arms race escalates between attacker and defender, organizations are trying to make more informed risk decisions and prioritize their responses. This means intelligence and

More information

Seattle EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET

Seattle EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET Seattle MULTI-TENANT DATACENTER MARKET This report provides an overview of the competitive dynamics in the Seattle market, a 451 Research Market Map of the competitors in the area, market share of the

More information

2016 Trends in Service Providers

2016 Trends in Service Providers PREVIEW 2016 Trends in Service Providers NOV 2015 Al Sadowski, Research Director Liam Eagle, Senior Analyst Carl Brooks, Analyst Jim Davis, Senior Analyst Selling generic technology resources is no way

More information

CLOUD CLIENTS AND VIRTUAL CLIENTS

CLOUD CLIENTS AND VIRTUAL CLIENTS CLOUD CLIENTS AND VIRTUAL CLIENTS The Transformation of Virtual Desktops Through Mobility and Cloud Computing Over the past three years, the technology we used to know as virtual desktop infrastructure

More information

2016 Trends in Cloud and IT Services Markets

2016 Trends in Cloud and IT Services Markets PREVIEW 2016 Trends in Cloud and IT Services Markets DEC 2015 William Fellows, Research Vice President Owen Rogers, Research Director Agatha Poon, Research Manager Katy Ring, Research Director Cloud transformation

More information

Application Hosting EXECUTIVE OVERVIEW. and Productivity THOUGHT LEADERSHIP APR Liam Eagle, Senior Analyst, Service Providers

Application Hosting EXECUTIVE OVERVIEW.  and Productivity THOUGHT LEADERSHIP APR Liam Eagle, Senior Analyst, Service Providers THOUGHT LEADERSHIP APR 2016 Application Hosting Email and Productivity Liam Eagle, Senior Analyst, Service Providers Email is used nearly ubiquitously by businesses, and accounts for a large portion of

More information

2016 Trends in Storage

2016 Trends in Storage PREVIEW 2016 Trends in Storage DEC 2015 Henry Baltazar, Research Director Though storage is far from dead, change is coming in the shape of new form factors such as hyperconverged infrastructures and disruptive

More information

2016 Trends in Datacenter Technologies

2016 Trends in Datacenter Technologies PREVIEW 2016 Trends in Datacenter Technologies OCT 2015 Rhonda Ascierto, Research Director Andy Lawrence, Research Vice President Andrew Donoghue, European Research Manager Daniel Bizo, Senior Analyst

More information

Virtualization Drives New Approaches to Backup. PRESENTATION TITLE GOES HERE Nikolay Yamakawa 451 Research

Virtualization Drives New Approaches to Backup. PRESENTATION TITLE GOES HERE Nikolay Yamakawa 451 Research Virtualization Drives New Approaches to Backup PRESENTATION TITLE GOES HERE Nikolay Yamakawa 451 Research Nikolay Yamakawa Analyst Nikolay is an analyst for 451 Research's TheInfoPro service, where he

More information

Software-Defined Network Architectures Find High Customer Value When Applied to the WAN

Software-Defined Network Architectures Find High Customer Value When Applied to the WAN MARKET FORECAST APR 2016 Software-Defined Network Architectures Find High Customer Value When Applied to the WAN Peter Christy, Research Director, Networks EXECUTIVE OVERVIEW Networking has evolved rapidly

More information

Mexico EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET

Mexico EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET Mexico MULTI-TENANT DATACENTER MARKET This report provides an overview of the competitive dynamics in the Mexico market, a 451 Research Market Map of the competitors in the area, market share of the dominant

More information

London Multi-Tenant Datacenter and Hosting Market

London Multi-Tenant Datacenter and Hosting Market London Multi-Tenant Datacenter and Hosting Market The largest city in Western Europe, London is also the most diverse in terms of IT service providers. It offers an ideal base to provide colocation, hosting

More information

TOTAL DATA WAREHOUSING: 2013-2018

TOTAL DATA WAREHOUSING: 2013-2018 TOTAL DATA WAREHOUSING: 2013-2018 Analytic Database and Hadoop Market Sizing and Forecasts This report examines the marketplace for Total Data Warehousing including competing players, revenue generation

More information

DATACENTER DISRUPTIVE TECHNOLOGIES IN THE DATACENTER EXECUTIVE OVERVIEW. Ten Technologies Driving a Wave of Change KEY FINDINGS

DATACENTER DISRUPTIVE TECHNOLOGIES IN THE DATACENTER EXECUTIVE OVERVIEW. Ten Technologies Driving a Wave of Change KEY FINDINGS DISRUPTIVE TECHNOLOGIES IN THE DATACENTER Ten Technologies Driving a Wave of Change Are there new technologies out there that could disrupt the economics and infrastructure of the modern datacenter and

More information

Are Small Consultancies Best for Big Data Projects?

Are Small Consultancies Best for Big Data Projects? Are Small Consultancies Best for Big Data Projects? Big data is attracting the attention of all types of buy-side organizations. But because the technologies involved are immature and there is a lack of

More information

2016 Trends in Enterprise Mobility

2016 Trends in Enterprise Mobility PREVIEW 2016 Trends in Enterprise Mobility OCT 2015 Chris Hazelton, Research Director Brian Partridge, Vice President Raúl Castañón-Martínez, Senior Analyst Rich Karpinski, Principal Analyst Sheryl Kingstone,

More information

Telco Multi-Play and Content Strategies

Telco Multi-Play and Content Strategies THOUGHT LEADERSHIP Telco Multi-Play and Content Strategies APR 2016 Declan Lonergan, VP, Research As telecom operators extend their convergence strategies and launch multi-play landline/mobile/tv services,

More information

The Cyber Threat Landscape

The Cyber Threat Landscape The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without

More information

THE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS

THE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS EXECUTIVE OVERVIEW THE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS KEY FINDINGS The IaaS market is currently about 20% the size of the managed hosting market; however, it

More information

State of the Market for Security Information Event Management and Log File Management Solutions

State of the Market for Security Information Event Management and Log File Management Solutions This research paper from TheInfoPro (TIP) delivers findings on over 140 in-depth interviews with Fortune 1000 Information Security professionals conducted in 2008, plus another 300 interviews conducted

More information

THE BEST EXECUTION VENUE

THE BEST EXECUTION VENUE Positioning for the Next Wave of Change in Enterprise IT Infrastructure As automation and consumerization become the dominant paradigms for designing and deploying IT infrastructure, these trends will

More information

TOTAL DATA INTEGRATION

TOTAL DATA INTEGRATION The Impact of Big Data on Integration and Governance Big data and Total Data have the potential to change the face of the data integration market. This report outlines the key drivers shaping this sector

More information

Multi-Tenant Datacenter and Hosting Market. Rory Duncan, Research Director, European Services Penny Jones, Senior Research Analyst, European Services

Multi-Tenant Datacenter and Hosting Market. Rory Duncan, Research Director, European Services Penny Jones, Senior Research Analyst, European Services EXECUTIVE OVERVIEW MARKET FORECAST SEP 2016 Frankfurt Multi-Tenant Datacenter and Hosting Market Rory Duncan, Research Director, European Services Penny Jones, Senior Research Analyst, European Services

More information

MOBILE TABLETS A Post-PC Era in the Enterprise?

MOBILE TABLETS A Post-PC Era in the Enterprise? Analyzing the Business of Enterprise IT Innovation MOBILE TABLETS A Post-PC Era in the Enterprise? The mobile tablet will bring significant change in enterprise computing. Early investment in supporting

More information

TO BUILD OR NOT TO BUILD Part I: Should service providers build or lease their datacenters?

TO BUILD OR NOT TO BUILD Part I: Should service providers build or lease their datacenters? EXECUTIVE OVERVIEW TO BUILD OR NOT TO BUILD Part I: Should service providers build or lease their datacenters? DATACENTER DECEMBER 2013 REPORT SNAPSHOT TITLE To Build or Not to Build ANALYST Kelly Morgan,

More information

Frankfurt Multi-Tenant Datacenter and Hosting Market

Frankfurt Multi-Tenant Datacenter and Hosting Market MARKET FORECAST Frankfurt Multi-Tenant Datacenter and Hosting Market DEC 2015 Rory Duncan, Research Director, European Services Penny Jones, Senior Research Analyst, European Services Second only to London

More information

2016 Trends in Information Security

2016 Trends in Information Security PREVIEW 2016 Trends in Information Security DEC 2015 Scott Crawford, Research Director Garrett Bekker, Senior Security Analyst Eric Ogren, Senior Security Analyst Adrian Sanabria, Senior Security Analyst

More information

CLOUDSCAPE. IT SERVICES Tooling up for ITaaS KEY FINDINGS

CLOUDSCAPE. IT SERVICES Tooling up for ITaaS KEY FINDINGS IT SERVICES Tooling up for ITaaS IT as a service (ITaaS) is an operational model where the enterprise IT department acts and operates as a distinct business entity, creating services for the other lines

More information

SWOT Assessment: Upland Software, FileBound v7

SWOT Assessment: Upland Software, FileBound v7 SWOT Assessment: Upland Software, FileBound v7 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 31 Jul 2014 Product code: IT0014-002924 Sue Clarke Summary Catalyst Workflow

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform

More information

E-DISCOVERY AND E-DISCLOSURE 2013 The Ongoing Journey From Reactive E-Discovery to Proactive Information Governance

E-DISCOVERY AND E-DISCLOSURE 2013 The Ongoing Journey From Reactive E-Discovery to Proactive Information Governance E-DISCOVERY AND E-DISCLOSURE 2013 The Ongoing Journey From Reactive E-Discovery to Proactive Information Governance Evolving technologies are expanding the need for effective electronic discovery in legal

More information

SWOT Assessment: EMC Data Protection Suite

SWOT Assessment: EMC Data Protection Suite SWOT Assessment: EMC Data Protection Suite Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 02 Sep 2014 Product code: IT0022-000131 Roy Illsley Summary Catalyst Organizations

More information

BACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments

BACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments BACKUP IN A VIRTUAL WORLD Data-Protection Challenges in Virtual Server Environments Data protection for virtual environments became crucial when end users began virtualizing tier-one, mission-critical

More information

DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE. Monitoring, Managing and Optimizing the Datacenter

DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE. Monitoring, Managing and Optimizing the Datacenter Analyzing the Business of Enterprise IT Innovation DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE Monitoring, Managing and Optimizing the Datacenter As datacenters become bigger, denser and more complex,

More information

THE CHANGING LINUX LANDSCAPE. The cloud, community distributions and devops are dramatically impacting the market

THE CHANGING LINUX LANDSCAPE. The cloud, community distributions and devops are dramatically impacting the market THE CHANGING LINUX LANDSCAPE The cloud, community distributions and devops are dramatically impacting the market Trends such as cloud computing and devops whereby application development and deployment

More information

MANAGED INFRASTRUCTURE MARKET OVERVIEW 2013

MANAGED INFRASTRUCTURE MARKET OVERVIEW 2013 EXECUTIVE OVERVIEW MANAGED INFRASTRUCTURE MARKET OVERVIEW 2013 Global Perspectives KEY FINDINGS Managed hosting as a subset of managed infrastructure remains the overwhelming bulk of the market opportunity

More information

Bold Move Further Builds Blue Coat Portfolio

Bold Move Further Builds Blue Coat Portfolio ANALYST BRIEF Bold Move Further Builds Blue Coat Portfolio SOLERA ACQUISITION PROVIDES BLUE COAT ABILITY TO LEVERAGE BIG DATA ANALYTICS Author John W. Pirc Overview On May 23, 2013, security vendor Blue

More information

2010-2014. Sample Global Network Security Market. 1 technavio insights

2010-2014. Sample Global Network Security Market. 1 technavio insights 1 technavio insights About TechNavio Technavio is the research platform of Infiniti Research. Infiniti Research provides actionable market intelligence to leading companies worldwide. A team of 120 analysts

More information

EXECUTIVE VIEW. KuppingerCole Report. Content. Related Research

EXECUTIVE VIEW. KuppingerCole Report. Content. Related Research KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski February 2015 by Alexei Balaganski ab@kuppingercole.com February 2015 Content 1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges...

More information

THE CYBER-SECURITY PLAYBOOK

THE CYBER-SECURITY PLAYBOOK THE CYBER-SECURITY PLAYBOOK Selling Into the Global Defense Market The federal cyber-security space is becoming a hotbed of incubation, acquisition and opportunity, but how to sell into this complicated

More information

OF THE CLOUD, FOR THE CLOUD

OF THE CLOUD, FOR THE CLOUD EXECUTIVE OVERVIEW OF THE CLOUD, FOR THE CLOUD The State of the Art in IT Performance Management IT performance management tools are following application and infrastructure workloads to the cloud, giving

More information

MOBILE APP LIFECYCLE

MOBILE APP LIFECYCLE MOBILE APP LIFECYCLE Design and Development As enterprises invest in developing or externally sourcing mobile apps, they are finding the need to integrate this process into the overall software development

More information

How to Develop an Effective Vulnerability Management Process

How to Develop an Effective Vulnerability Management Process Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes

More information

TOTAL DATA ANALYTICS

TOTAL DATA ANALYTICS The Impact of Big Data on Business Intelligence and Analytics Big data and Total Data have the potential to fundamentally change the analytics market. This report outlines the key drivers in the analytics

More information

On the Radar: Pulse Secure

On the Radar: Pulse Secure Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT0022-000431 Rik Turner Summary Catalyst Pulse Secure is a developer of secure

More information

Global Case Studies in Highly Efficient Datacenters 2014

Global Case Studies in Highly Efficient Datacenters 2014 Global Case Studies in Highly Efficient Datacenters 2014 For datacenters, efficiency and operational excellence are achievable in any location, despite regional differences in datacenter markets across

More information

DATACENTER CANADA MTDC MARKET ASSESSMENT REPORT EXCERPT SUPPLY AND PROVIDERS MICHAEL LEVY WRITTEN BY DECEMBER 2012

DATACENTER CANADA MTDC MARKET ASSESSMENT REPORT EXCERPT SUPPLY AND PROVIDERS MICHAEL LEVY WRITTEN BY DECEMBER 2012 CANADA MTDC MARKET ASSESSMENT SUPPLY AND PROVIDERS DATACENTER WRITTEN BY MICHAEL LEVY DECEMBER 2012 451 RESEARCH: DATACENTER COGECO DATA SERVICES COGECO DATA SERVICES Headquarters: Toronto, ON President:

More information

TCS Managed Security Services

TCS Managed Security Services IT OUTSOURCING VENDOR PROFILE OF: TCS Managed Security Services 1. Background... 1 2. Revenue Summary... 1 3. Key Offerings... 2 3.1.. Security Monitoring and Incident Management... 2 3.2.. Network security...

More information

Amsterdam Multi-Tenant Datacenter and Hosting Market

Amsterdam Multi-Tenant Datacenter and Hosting Market MARKET FORECAST SEP 2015 Amsterdam Multi-Tenant Datacenter and Hosting Market Penny Jones, Senior Research Analyst, European Services Rory Duncan, Research Director, European Services For centuries, the

More information

The Outlook for IT. 2014 to 2017. Michael Smith VP Distinguished Analyst January 31, 2014

The Outlook for IT. 2014 to 2017. Michael Smith VP Distinguished Analyst January 31, 2014 The Outlook for IT Michael Smith VP Distinguished Analyst January 31, 2014 2014 to 2017 Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed

More information

Market Guide for Network Sandboxing

Market Guide for Network Sandboxing G00271317 Market Guide for Network Sandboxing Published: 2 March 2015 Analyst(s): Lawrence Orans, Jeremy D'Hoinne Choosing a network sandboxing solution is challenging due to the wide array of options

More information

How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary

How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary Publication Date: 2 January 2004 Author Bruce M. Caldwell This document has been published to the following

More information

Exploring the Impact of Geographic Context On Business Processes. Research Report Executive Summary

Exploring the Impact of Geographic Context On Business Processes. Research Report Executive Summary Business Trends in Location Analytics Exploring the Impact of Geographic Context On Business Processes Research Report Executive Summary Copyright Ventana Research 2013 Do Not Redistribute Without Permission

More information

Recognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership

Recognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership Recognition of Websense Leadership Industry Analysts Validate Websense Market and Technological Leadership Analysts Recognize Websense 2011 Secure Web Gateway MQ: Leaders Quadrant 2011 Content-Aware Data

More information

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if

More information

Managing Vulnerabilities For PCI Compliance

Managing Vulnerabilities For PCI Compliance Managing Vulnerabilities For PCI Compliance Christopher S. Harper Vice President of Technical Services, Secure Enterprise Computing, Inc. June 2012 NOTE CONCERNING INTELLECTUAL PROPERTY AND SOLUTIONS OF

More information

DATACENTER BRAZIL MTDC MARKET ASSESSMENT EXECUTIVE OVERVIEW. Supply and Providers MARCH 2013

DATACENTER BRAZIL MTDC MARKET ASSESSMENT EXECUTIVE OVERVIEW. Supply and Providers MARCH 2013 BRAZIL MTDC MARKET ASSESSMENT Supply and Providers DATACENTER MARCH 2013 REPORT SNAPSHOT TITLE Brazil MTDC Market Assessment Supply and Providers ANALYST RELEASE DATE March 2013 LENGTH Jeff Paschke, Research

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

2015 Services Catalog. IT Security Training & Solutions I(TS) ²

2015 Services Catalog. IT Security Training & Solutions I(TS) ² 2015 Services Catalog IT Security Training & Solutions I(TS) ² CONSULTING Compliance Services Gap Analysis The gap analysis is a fast track assessment to establish understanding on an organization s current

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

Organizations Struggle with Data Center Capacity Management

Organizations Struggle with Data Center Capacity Management R E S E A R C H N O T E Publication Date: November 23, 2006 Organizations Struggle with Data Center Capacity Management Survey shows data center processes and tools lagging Businesses today are increasingly

More information

ObserveIT User Activity Monitoring

ObserveIT User Activity Monitoring KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ObserveIT provides a comprehensive solution for monitoring user activity across the enterprise. The product operates primarily based on

More information

MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING "IT" ALONE

MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING IT ALONE MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING "IT" ALONE August 2014 Derek E. Brink, CISSP, Vice President and Research Fellow, IT Security and IT GRC Report Highlights p2 p3 p6 p7 Security is

More information

Windows Hard Disk Encryption

Windows Hard Disk Encryption Windows Hard Disk Encryption Usage Analysis September 2010 Windows Hard Disk Encryption Usage Analysis Introduction This is the first OPSWAT usage report for hard disk encryption products. Because Microsoft

More information

Analysts forecast the Global Enterprise Firewall market to grow at a CAGR of 7.74 percent over the period

Analysts forecast the Global Enterprise Firewall market to grow at a CAGR of 7.74 percent over the period is the latest addition to reportsnreports.com industry research reports collection. The report is about 80 pages published in Feb-2015. Global Enterprise Firewall Market 2015-2019 has been prepared based

More information

BMS Consulting Cyber Security and IT Technology Team

BMS Consulting Cyber Security and IT Technology Team BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the

More information

APPENDIX C AMENDMENT # 3 PRICING INDEX DIR CONTRACT NO. DIR-SDD-1855. Solid Border, Inc.

APPENDIX C AMENDMENT # 3 PRICING INDEX DIR CONTRACT NO. DIR-SDD-1855. Solid Border, Inc. APPENDIX C AMENDMENT # 3 PRICING INDEX DIR CONTRACT NO. DIR-SDD-1855 DESCRIPTION Solid Border, Inc. CUSTOMER DISCOUNT ITS PRODUCTS Accellion Lab Gear 50% Accellion Appliance Bundles/Software 13.75% AppNeta

More information

Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology

Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology Network Security Sandbox Market Analysis APTs Create a Must Have Security Technology An Executive Brief Frank Dickson Research Director Information & Network Security 1 Key Findings Advanced persistent

More information

E-DISCOVERY AND E-DISCLOSURE 5 IMPLICATIONS

E-DISCOVERY AND E-DISCLOSURE 5 IMPLICATIONS Analyzing the Business of Enterprise IT Innovation E-DISCOVERY AND E-DISCLOSURE Bringing It All Back Home Almost four years after all electronic information became legally discoverable in US courts, organizations

More information

How Protected Is Your Enterprise?

How Protected Is Your Enterprise? How Protected Is Your Enterprise? Next Gen thinking and technology to help strengthen and protect your critical business systems and data Greg Belanger, CISSP Symantec (Canada) Corporation - Security Practice

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes

More information

Leaders: Niche Players: Leaders High Performers Contenders Niche

Leaders: Niche Players: Leaders High Performers Contenders Niche Best E-Signature Products G2 Crowd rated these products highest based on reviews and data gathered by August 18, 2013: Leaders: Adobe Echosign, DocuSign, and Silanis e-sign Niche Players: RightSignature,

More information

Global Network Security Market 2015-2019

Global Network Security Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3505505/ Global Network Security Market 2015-2019 Description: About network security Network security comprises products and services

More information

Global SaaS-based Content Security Market 2014-2018

Global SaaS-based Content Security Market 2014-2018 Brochure More information from http://www.researchandmarkets.com/reports/2933813/ Global SaaS-based Content Security Market 2014-2018 Description: About SaaS-based Content Security SaaS-based content security

More information

INFORMATION SECURITY STUDY

INFORMATION SECURITY STUDY WAVE 16 MARKET DYNAMICS INFORMATION SECURITY STUDY Designed for IT professionals, this report captures highlights from the complete study, and provides business intelligence in the form of technological

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T W o r l d w i d e W e b S e c u r i t y 2 0 1 1-2 0 1 5 F o r e c a s t a n d 2 0 1

More information

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 11 Jun 2015 Product code: IT0022-000387 Andrew Kellett

More information

2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles

2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles FIREWALL COMPARATIVE ANALYSIS Total Cost of Ownership (TCO) 2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles Tested s Barracuda F800, Check Point 12600, Cyberoam CR2500iNG, Dell SonicWALL

More information