How To Sell Network Intrusion Prevention System Appliances

Size: px
Start display at page:

Download "How To Sell Network Intrusion Prevention System Appliances"

Transcription

1 Magic Quadrant for Network Intrusion Prevention System Appliances, 2H06 Gartner RAS Core Research Note G , Greg Young, John Pescatore, 22 December 2006 R The network intrusion prevention system appliance market is in a period of maturity and consolidation. A smaller group of vendors are getting an increasing percentage of the market, but the evolving threat means that those that fail to maintain innovation ahead of market demands will be left behind. WHAT YOU NEED TO KNOW Network intrusion prevention systems (IPSs) can detect and block attacks and act as a pre-patch shield for systems and applications. The market for network IPS appliances is entering a phase of maturity and consolidation, but since attacks are evolving, the products need to evolve as well. The significant benefits of an in-line attack-blocking technology can be realized only with a product that fits your security processes and is sized appropriately. STRATEGIC PLANNING ASSUMPTION(S) Sales of stand-alone IPS appliances will be less than 10% of overall next-generation firewall revenue by the end of 2008 (0.7 probability). MAGIC QUADRANT Market Overview The network IPS market has its roots in the improvement and often replacement of intrusion detection systems (IDSs). IPS contains all the detection features of IDS, with two critical areas of improvement: 1) Intrusion prevention moves beyond simple attack signature detection to add vulnerabilitybased signatures as well as anomaly detection capabilities; and 2) network IPS sensors operate at wire speeds to enable in-line automated blocking or handling of attacks. Essentially, network IPS adds block attacks and let everything else through security enforcement to the deny everything except that what is explicitly allowed policy enforcement provided by the first-generation of firewalls. While the market for separate network IPS and firewall devices will continue through at least 2008, most nextgeneration firewalls will use common processing engines to support both functions in one product. The network IPS market for stand-alone appliances was approximately $246 million in 2004 (including product and maintenance but not services) and will increase to more than $700 million by the end of This is a crowded market with several dozen vendors providing network IPS products, with a few large players and many with very small installed bases. Consolidation will continue as a result of the increasing consistency of shortlists of vendors, particularly in larger enterprises. Vendor lineage is stereotyped in the products: IPS from broad security companies tends to be strong on security function and less impressive on network performance, which is the opposite of companies in which security is not their primary business (for example, network infrastructure vendors and startups). These differences will be reduced in the medium term and, in the long term, will become almost irrelevant as the next-generation firewall market increases. On average, solutions remain priced at approximately $50,000 per Gbps of deep inspection (this is an average, and many products provide less than 1- Gbps capability). Most vendors provide more than five models, with some entry-level products offered for less than $15,000. Maintenance fees vary considerably. Signature update fees also vary but are included with maintenance for most products. Most products include a local-management console, with dedicated management appliances resulting in an additional cost. The total cost of ownership and system management capabilities of network IPS products should be key evaluation criteria when comparing competing products.

2 Figure 1. Magic Quadrant for Network Intrusion Prevention Systems Appliances, 2H06 challengers leaders vulnerability approach as IPS vendors to signatures, and this leaves the infrastructure vendors with less direct control over signature quality than competitors. ability to execute Cisco Systems 3Com (TippingPoint) Sourcefire Juniper Networks IBM McAfee Top Layer Networks Radware NFR Security Reflex Security One constant in security is that attacks never stay still. Gartner projects that targeted attacks that use unique malicious executables that do not always look to exploit known vulnerabilities will cause the majority of enterprise damage by Network intrusion prevention solutions need to evolve more detection and blocking capabilities for these types of attacks. niche players Source: Gartner DeepNines NitroSecurity StillSecure visionaries completeness of vision Reliability and availability are also key criteria for any in-line device. Bypass unit modules allowing failopen for copper ports are included in the base price for almost all vendors. Several infrastructure vendors have obtained signatures from antivirus companies, rather than have their own R&D capability. Examples include the partnerships between Cisco Systems and Trend Micro, Juniper and Symantec, and Nortel and Symantec. Antivirus vendors do not have the same As of December 2006 Market Definition/Description The network IPS appliance market is composed of in-line devices that perform full-stream assembly of network traffic, and they provide detection using several methods including signatures, protocol anomaly detection, and behavioral or heuristics. Network IPS is also provided within a next-generation firewall for small and midsize businesses (SMBs), which is the integration of an enterprise-class network firewall and network IPS. This Magic Quadrant is exclusively for stand-alone network IPS appliances, and does include nextgeneration firewall (NGFW). Many vendors offer IPS appliances that include a basic stateful firewall, minimal intrusion detection and prevention functions, and antivirus functions. Performances (both security capability and throughput) are typically suitable only for small enterprises or branch offices with basic security needs, with lower-speed Internet connections. The Magic Quadrant is copyrighted December 2006 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the Leaders quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner s research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice. 2

3 The network IPS market is entering the early maturity phase where consolidation inevitably occurs. Gartner sees a more consistent and more limited list of vendors on our customers shortlists. With fewer companies getting more share of revenue, there is increased risk for buyers of niche products, but all providers on the Magic Quadrant are viable suppliers. However, enterprises should use the Magic Quadrant to align potential vendors with both near-term and longer-term enterprise security needs. Inclusion and Exclusion Criteria Only products that met the following criteria were included: Products that meet Gartner s definition of network IPS Operate as an in-line network device that runs at wire speeds Perform packet normalization, assembly and inspection Apply rules based on several methodologies to packet streams, including (at a minimum) protocol anomaly analysis, signature analysis and behavior analysis Drop malicious sessions don t simply reset connections Have achieved significant network IPS product sales in the last year within a customer segment that is visible Products and vendors were excluded if: They provide only a NGFW, which is covered in the Magic Quadrant for Network Firewalls, 2H04. We should note that NGFW vendors, which provide an IPS appliance, have that appliance included in this Magic Quadrant. They are in other product classes or markets, such as: Network behavior assessment (NBA) products. These products are not in-line IPSs, but instead focus on networkwide detection of anomalies. IPS vendors are beginning to implement feeds from network anomaly detection as one means of having intelligence from across the network, which can be used to prioritize blocking. Network access control (NAC) products. These are not IPSs and are covered in other Gartner Research. Host IPSs. Software is on servers and workstations rather than an in-line device on the network. Added Enterasys Longtime IDS vendor Enterasys has moved to producing in-line IPS products. Its first customers are primarily managed security system provider (MSSP) customers who report a high degree of satisfaction with Enterasys support with the IDS products and are converting over as customer demand shifts. The Enterasys IPS product is not yet placed on the quadrant because most deployments are incumbent Enterasys IDS deployments moving over to in-line deployment, and Enterasys has yet to emerge into significant competition with other IPS companies. Enterasys emphasis on IPS will likely increase product visibility. Force10 Networks Earlier this year, fast Ethernet switch maker Force10 Networks acquired IDS maker MetaNetworks. MetaNetworks had been active in providing IDS to some areas of the government vertical. Force10 Networks lists a 10-Gbps IPS throughput, although as a new product, there is no independent third-party tests to confirm this. Force10 Networks is new to the security and to the IPS market via this acquisition, and in the short term, they will be challenged in competing with established IPS players beyond replacing IDS in their established customer base. Force10 Networks will likely produce a high-speed switch-based IPS because it already has both products in separate platforms, and to increase IPS placements via the Force10 Networks sales channels. Force10 Networks has yet to emerge into significant competition with other IPS companies and is not placed on the Magic Quadrant. Dropped Symantec Symantec recently announced that it was exiting the network firewall and IPS market. Symantec subsequently announced that it would be partnering with Juniper; however, this partnership will essentially lead to Juniper transitioning Symantec customers to Juniper products. 3

4 Lucid Security Lucid Security recently was acquired by AmbironTrustWave. The former Lucid ipangel will not be sold as a product but instead will become part of Ambiron Trustwave Payment Card Industry (PCI) compliance services so it will not be included in this Magic Quadrant. Check Point Software Technologies The unsuccessful attempt to acquire Sourcefire in 2005 and the announcement to acquire NFR in December 2006 were the significant IPS market events for Check Point. Check Point had not expressed any clear IPS strategy post-sourcefire other than continuing to lead with its Smart Defense product as an add-on service to its firewall product. After the NFR acquisition is complete, however, Check Point has a path for re-entry into the IPS market and will likely lead with the stand-alone NFR product followed by a longer-term integration of the NFR technology into Smart Defense and InterSpect. Check Point InterSpect is not a successful IPS market contender and is instead a NAC enforcement point. The Smart Defense offering, as with other NGFW products, is covered in Magic Quadrant for Enterprise Network Firewalls, 1H06. When the NFR acquisition has been completed, and Check Point has committed to an integration and NFR talent retention strategy, Gartner will reassess Check Point/NFR s standing in the Magic Quadrant. Check Point has an opportunity with NFR to cause disruption to competitors based on their security market sales reach as long as they deliver enterprise-class platforms and expand their vulnerability and IPS signature development team. V-Secure V-Secure now appears under the Radware entry (Radware acquired V-Secure in early 2006). Evaluation Criteria Ability to Execute The Ability to Execute criteria include: Product service and customer satisfaction in deployments. Overall business viability, including overall financial health and prospects for continuing operations. Sales execution and pricing including dollars per Gbps, revenue, average deal size, installed base and use by MSSPs. Market responsiveness and track record. Delivering on new features, such as receiving and acting on feeds from outside the IPS, rate shaping and quality of service, and solid multidevice management. Market execution, including delivering on features and performance, such as product vision, customer satisfaction with those features, and those features winning out over competitors in selections. Delivering products that are low latency and multi-gbps, have solid internal security, behave well under attack, have high availability, and are available ports that meet demands, is rated highly. Speed of vulnerabilitybased signature production was highly rated. Customer experience and operations, including management experience and track record, and depth of staff experience, specifically in the security marketplace. Also important is low latency, rapid signature updates, overall low false positive and negative rates, and how the product fared in attack events. Completeness of Vision The Completeness of Vision criteria include: Market understanding and strategy. This includes providing the correct blend of detection and blocking technologies that meet the requirements for IPS, innovation, having vulnerability rather than exploit product focus, and integration with other security solutions. Also included is understanding and commitment to the security market and, more specifically, the network security market. Vendors that rely on third-party sources for signatures or have weak or shortcut detection technologies, such as overreliance on expression matching, score lower. Sales strategy includes pre- and post-product support, value for pricing, and providing clear explanations and recommendations for detection events. Offering strategy, with emphasis on product road map, signature quality, NGFW integration and performance. Successfully completing third-party testing, such as the NSS Group IPS tests and 4

5 Table 1. Ability to Execute Evaluation Criteria Evaluation Criteria Product/Service Overall Viability (Business Unit, Financial, Strategy, Organization) Sales Execution/Pricing Market Responsiveness and Track Record Marketing Execution Customer Experience Operations Source: Gartner Weighting Table 2. Completeness of Vision Evaluation Criteria Evaluation Criteria Market Understanding Marketing Strategy Sales Strategy Offering (Product) Strategy Business Model Vertical/Industry Strategy Innovation Geographic Strategy Source: Gartner Weighting low low Common Criteria evaluations, is important. Vendors that reissue signatures, are overreliant on behavioral detection, and are slow to issue quality signatures do not score well. The business model includes the process and success rate for developing new features and innovation and R&D spending. Vertical, industry and geographic strategy includes the ability and commitment to service geographies and vertical markets (for example, MSSP and the financial sector). Innovation, including R&D, and quality differentiators, such as performance, management interface and clarity of reporting. The road map should include moving IPS into new placement points and better-performing devices. Leaders Leaders demonstrate balanced progress and effort on all execution and vision categories. Their actions raise the competitive bar for all products in the market, and they can change the course of the industry. To remain in the Leaders quadrant, these vendors must have demonstrated a track record of delivering successfully in enterprise IPS deployments and winning in competitive assessments. Leaders produce products that provide high signature quality, offer low latency, are innovating with or ahead of customer challenges (such as using endpoint intelligence to make more-efficient detection), and have a range of models. Leaders consistently win selections and have been consistently visible on enterprise shortlists. A leading vendor is not a default choice for every buyer, and clients are warned not to assume that they should buy only from the Leaders quadrant. Challengers Challengers have products that address the typical needs of the market with strong sales, visibility and clout that add up to higher execution than niche players. Challengers often succeed in established customer bases but do not yet fare well in competitive selections. Visionaries Visionaries invest in the leading/bleeding-edge features that will be significant in next generation of products and give buyers early access to improved security and management. Visionaries can affect the course of technological developments in the market, but they lack the execution skills to outmaneuver challengers and leaders. 5

6 Niche Players Niche players offer viable solutions that meet the needs of some buyers. Niche players are less likely to appear on shortlists, but they fare well when given the right opportunity. While they generally lack the clout to change the course of the market, they should not be regarded as merely following the leaders. Niche players may address subsets of the overall market (for example, the SMB segment or a vertical market), and often they can do so more efficiently than the leaders. Niche players are often smaller firms, produce only software appliances, and/or do not yet have the resources to meet all the enterprise requirements. Vendor Comments 3Com (TippingPoint) This year, 3Com introduced two new products. The X series includes a stateful firewall and is the 3Com entry into the SMB security multifunction appliance (MFA) market. The enterprise- and carrier-class M60 product supports up to 12 1-, 3- or 5-Gbps blades. The M60 has a maximum single channel capacity of 5 Gbps but a combined throughput of up to 60 Gbps and high-port density. 3Com will likely move features more into internal networks products as opposed to edge-of-network NGFW products because 3Com has switch technology, but it does not have an enterprise-class firewall. 3Com has been increasing its signature/vulnerability research team investments to remain competitive with ISS (now IBM), recognizing that enterprises are placing increasing weight on IPS signature quality and timeliness. Since the acquisition, TippingPoint product has benefited from the larger resources of 3Com but had some trouble penetrating accounts where 3Com is not viewed positively. Enterprises and carriers can consider 3Com IPS appliances where very low latency or high consolidated throughput is required. SMBs and branch offices with requirements that are heavy on IPS and lighter on the firewall can evaluate the X series products. Cisco Systems Cisco offers a wide choice of platforms for IPS, including: IDSM-2: Catalyst 6500 switch blade IOS device software load or a hardware module for the Cisco ISR routers 4200 series: stand-alone IPS appliances in 250- Mbps, 600-Mbps and 1-Gbps models In the ASA firewall appliance with the AIP module added Cisco has made improvements to the security management interface (CSM); however, a significant proportion of Gartner customers report that the IPS products are challenging to manage. IPS selection by enterprises favors signature quality and speed of release; the decision by Cisco to obtain some IPS signatures and vulnerability information from Trend has not been competing effectively vs. competitors who have increasingly significant signature research investments. Loading Cisco IPS for IOS can be a good total cost of ownership (TCO) decision for branch offices since a new appliance need not be deployed; recognize, however, that deep inspection represents a significant additional workload that cannot be added to devices already at capacity. Cisco has accrued a significant IPS market share by maintaining focus on the needs of Cisco customers and introducing IPS on so many platforms. Although not required, The Cisco MARS SIEM product is commonly co-deployed with Cisco network and host IPS products, and future improvements will likely allow more product interaction, such as changes in IPS inspection based on MARS observations. Cisco has many security products, and maintaining competitive innovation across all these products can be a challenge. Overall, Cisco has not followed up the level of IPS innovation of 2004 to 2005 in 2005 to 2006 and needs to improve IPS usability and features and deliver in-house signatures. All Cisco networks should consider Cisco IPS, particularly when the edge firewall is Cisco ASA or other Cisco security products are in wide use. 6

7 DeepNines The market focus for DeepNines is primarily regionally to the Southern United States, and vertically to education for K through 12. DeepNines BBX IPS product comes in two versions one for placements in front of the router and the other for traditional behind the router placements. DeepNines also offers IPS within its security edge platform (SEP), a software appliance close in functionality to an all-in-one appliance targeting the SMB market, as it also includes a firewall, gateway antivirus, antispyware and anti-phishing capability. DeepNines has recently been engaged in pursuing McAfee for alleged patent infringement, which is a distraction for the company s ability to compete on product capabilities. DeepNines also introduced infection-free networking (IFN), which provides a NAC addition. SEP can be considered by SMBs, especially those looking for a complementary NAC product with IFN. IBM IBM (ISS) continues to benefit from the leverage of the X-Force vulnerability research team, and is benefiting from the Protocol Analysis Module (PAM) through being able to add new protocol inspection without a product redesign. ISS also undertook an arrangement to be the OEM for the Arbor Networks Network Behavior Assessment (NBA) product under the Proventia ADS (Anomaly Detection System) name, which provides the advantage of sharing a single console (SiteProtector) with other ISS products but limited IPS-NBA interaction. ISS continues to have high-quality signatures and low time between vulnerabilities and the release of new signatures. ISS also offers host IPS, which can be managed by Siteprotector. ISS still needs to deliver on a higher-end platform to compete more effectively with the 5-or-more-Gbps solutions of competitors, such as 3Com. As with many competitors, the company s network IPS offerings still require integration into an enterprise network firewall for edge placements or switch integration to provide an internal network placement. ISS s standing in the network IPS market will be challenged by the acquisition by IBM. With IBM having a greater presence in the host rather than network buying center, Gartner believes that maintaining the current rate of innovation for ISS network security products will not continue in the long term. Juniper Networks The Juniper IDP stand-alone IPS product remains competitive, although Juniper has not been aggressive with product improvements or a road map. Juniper is well-positioned in the next-generation firewall market (the hardware-based ISG firewalls provide up to 2 Gbps of intrusion prevention throughput). Juniper s software-based IDP IPS appliance is well-suited to shortlists where other Juniper infrastructure equipment is present, although this is not a requirement. Juniper is well-positioned to use the ScreenOS to drive network IPS capability and performance, but its product management and engineering resources seem spread thinly across a wide range of network and security products. Juniper has focused resources in a significant expansion of its branch office firewall line, which include IPS, but has not been driving the market at the higher end. Juniper still hasn t made any announcements on carrier-class capabilities for IDP, which should be its strength, and instead has been positioning the ISG in this role. Juniper will gain some market share at the low end of the market by converting Symantec customers to Juniper products, but it s unlikely that there will be any longer-term benefit from the Juniper/Symantec partnership other than Symantec providing antivirus signatures to Juniper. McAfee Incumbent McAfee placements are often expanded; however, McAfee is less often seen in shortlists by Gartner and has a decreasing network IPS market share, according to Gartner. McAfee IntruShield continues to benefit from having a 2-Gbps appliance for the higher-end placements. McAfee has not been competitive with new features when compared with leading vendors. McAfee (as with all other leaders, excepting Juniper) has not recognized the requirement to incorporate an enterprise-class network firewall in its IPS. MCAfee instead has NAC 7

8 integration plans for internal placements. McAfee offers host IPS products and does not plan to integrate these with its network IPS offerings under a unifying management console capability and signature update capability; however, 4.1 has the ability to import host IPS alert data for correlation and viewing. McAfee has a stronger presence in the host security market and the associated buying center, and as Symantec has done, McAfee needs to assess how competitive it wishes to remain in the network security space. McAfee intends to introduce increased internal IPS features, particularly NAC integration, including the use of the IPS as a NAC enforcement point. This integration will be most useful in agent-based NAC using the McAfee clientside software suite. NFR Security NFR Security has leveraged its IDS lineage to move into the IPS space with its Sentivist product line. The Sentivist IPS strengths include the N-Code language for signature modification, and strong reporting and console. Its support for IP v.6 may be of interest to some government and Asia/Pacific enterprises. NFR s Dynamic Shielding provides a strong capability for incorporating endpoint intelligence to optimize intrusion prevention configuration. Gartner believes that NFR has a 5-Gbps appliance in development as a product line expansion. NFR has been strong in the public sector and has good technology; however, an acquisition was required in order to be successful. In December 2006, Check Point announced a definitive agreement to acquire NFR, and approval of U.S. regulators, including the Committee on Foreign Investment in the United States (CFIUS), had been obtained. Integration of NFR Sentivist technology into Check Point s management consoles and other products should be comparatively rapid. The NFR position on the quadrant reflects the 2H06 status of NFR, where the acquisition has not yet been completed. Postacquisition Magic Quadrant placement change will mostly be driven by Check Point s ability to maintain a hold on shortlists, how tightly the NFR product is integrated across other Check Point products for cross-sales opportunities, and delivering on an increased competitive capability in vulnerability and signature research. NitroSecurity NitroSecurity s focus on its product s internal database performance within the IPS product has led it to produce an impressive interface for viewing and correlating large numbers of events in real time. The NitroSecurity software appliance IPS uses proprietary signatures with the SNORT signature language, but has not been competitive with the quality and timeliness of signatures. The product offers a Layer 2 transparent mode IPS that is seeing success in healthcare and education verticals. This year saw the inclusion of some network flow analysis (SFlow and Netflow) for some NBA-like behaviorbased detection. Radware The Radware DefensePro line offers purpose-built multigigabit IPS appliances up to 6 Gbps. Capitalizing on its network expertise, Radware DefensePro switch IPS includes solid in-line behavior, such as low latency and denial of service (DOS) features, including traffic shaping. Radware remains dependent on SNORT for much of its signature research, and the time between vulnerability announcement and new signature release is below the industry average. Radware IPS is best-suited to internal deployments where other Radware products are deployed rather than as the first line of defense at the network/internet edge. Radware has moved IPS into the APSoluteOS ADC products and is integrating some behavioral features from the acquisition of V-Secure. Reflex Security Reflex Security continues to focus on the midsize market with success and is expanding into new enterprise products. Reflex introduced a VMWarecompatible software version of its product, which can be added via a drag-and-drop interface into virtual machines. In October, it released a blade server platform listed as having 5-Gbps and 10-Gbps throughput (although this has not yet been tested by an independent lab), which is impressive considering large IPS vendors, such as ISS, Cisco and Sourcefire, have not yet done so. Reflex wins placements on price and the multi-device interface features. Reflex has delivered well on an aggressive road map and the VMWare product is well-suited to data center deployments. Reflex will need to expand 8

9 investment in vulnerability and signature research to go head-to-head with Leaders quadrant members. Sourcefire Sourcefire has seen an increase in use of its IPS after it introduced its passive vulnerability and network discovery product (RNA). Under a single console, this provides visibility into the network vulnerabilities that the IPS can be tuned manually to protect. Despite the failed acquisition by Check Point Sourcefire, revenue has increased, it has gained additional private funding and is in a healthy financial position. Sourcefire filed with the Securities and Exchange Commission (SEC) to go public, which will likely occur in Sourcefire has addressed criticism of relying on SNORT signatures by increasing the team doing vulnerability research to the point that most signatures are now Sourcefire rather than SNORT originated. Sourcefire has announced a number of alliances with platforms, such as Nortel, that really have not resulted in strong appliance or security switch competition to 3Com or Cisco. Sourcefire IPS is available on the Crossbeam Systems X series appliances, and a significant new channel through Nokia. In November, Nokia released two appliances, a 200-Mbps and a 450-Mbps model, both running the Sourcefire IPS and Nokia IPSO operating system. StillSecure Strata Guard (renamed from BorderGuard) is a software appliance solution suited to sub-gbps placement points. StrataGuard IPS includes integration with the StillSecure VAM vulnerability management product, providing workflow supporting the reality that IPS is part of a process of vulnerability remediation. Having this vulnerability management feed widens the network view for moreintelligent IPS alerting and blocking decisions. New this year is the innovative step of offering a freeware version with limited functionality, Strata Guard Free. StillSecure plans to focus on using IPS as part of a post-connect NAC solution similar to other vendors that trigger quarantine actions off IPS alerts with Strata Guard IPS currently including integration with the StillSecure Safe Access NAC product. With many product features, but with limited market penetration, StillSecure joins Reflex Security and DeepNines as a good acquisition candidate for lateto-market security firms or network infrastructure companies looking to increase competition with Cisco. Top Layer Networks Pure-play IPS vendor Top Layer Networks primary offering is the purpose-built 5500 IPS appliance, which includes a multi-gbps high-end product. Top Layer provides a balanced blend of safeguards and detection methods, including network firewall, DOS protection and traffic shaping. Top Layer lags behind other players in the proactive protection of narrow blocking signatures, but it does have multidevice management capabilities, low latency and good postsales support. Top Layer is not seen by Gartner on many shortlists, with the exception of larger enterprises that have recently been the subject of a successful targeted attack, such as DOS extortion attempts. Top Layer underwent some cost reductions, including staff layoffs this year as part of maintaining profitability. Given its strength in hardware, Top Layer will likely produce a 10-Gbps solution. Vendors Added or Dropped We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor appearing in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. This may be a reflection of a change in the market and, therefore, changed evaluation criteria, or a change of focus by a vendor. 9

10 Evaluation Criteria Definitions Ability to Execute Product/Service: Core goods and services offered by the vendor that compete in/serve the defined market. This includes current product/service capabilities, quality, feature sets, skills, etc., whether offered natively or through OEM agreements/partnerships as defined in the market definition and detailed in the subcriteria. Overall Viability (Business Unit, Financial, Strategy, Organization): Viability includes an assessment of the overall organization s financial health, the financial and practical success of the business unit, and the likelihood of the individual business unit to continue investing in the product, to continue offering the product and to advance the state of the art within the organization s portfolio of products. Sales Execution/Pricing: The vendor s capabilities in all pre-sales activities and the structure that supports them. This includes deal management, pricing and negotiation, pre-sales support and the overall effectiveness of the sales channel. Market Responsiveness and Track Record: Ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the vendor s history of responsiveness. Marketing Execution: The clarity, quality, creativity and efficacy of programs designed to deliver the organization s message in order to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This mind share can be driven by a combination of publicity, promotional, thought leadership, word-of-mouth and sales activities. Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups, service-level agreements, etc. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Completeness of Vision Market Understanding: Ability of the vendor to understand buyers wants and needs and to translate those into products and services. Vendors that show the highest degree of vision listen and understand buyers wants and needs, and can shape or enhance those with their added vision. Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the Web site, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling product that uses the appropriate network of direct and indirect sales, marketing, service and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: The vendor s approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature set as they map to current and future requirements. Business Model: The soundness and logic of the vendor s underlying business proposition. Vertical/Industry Strategy: The vendor s strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including verticals. Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. Geographic Strategy: The vendor s strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the home or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market. 10

Magic Quadrant for Network Intrusion Prevention System Appliances, 1H08

Magic Quadrant for Network Intrusion Prevention System Appliances, 1H08 Magic Quadrant for Network Intrusion Prevention System Appliances, 1H08 Gartner RAS Core Research Note G00154849, Greg Young, John Pescatore, 4 February 2008, R2688 04022009 The network intrusion prevention

More information

Magic Quadrant for Intrusion Prevention

Magic Quadrant for Intrusion Prevention Page 1 of 9 Magic Quadrant for Intrusion Prevention Systems 5 July 2012ID:G00222572 Analyst(s): Greg Young, John Pescatore VIEW SUMMARY The network intrusion prevention system market is undergoing a period

More information

Magic Quadrant for Global Enterprise Desktops and Notebooks

Magic Quadrant for Global Enterprise Desktops and Notebooks Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main

More information

Magic Quadrant for Network Intrusion Prevention Systems

Magic Quadrant for Network Intrusion Prevention Systems Magic Quadrant for Network Intrusion Prevention Systems Gartner RAS Core Research Note G00208628, Greg Young, John Pescatore, 06 Dec 2010, R3524 12082011 Deep inspection network-based intrusion prevention

More information

Magic Quadrant for Intrusion Prevention

Magic Quadrant for Intrusion Prevention Magic Quadrant for Intrusion Prevention Systems 16 December 2013 ID:G00253078 Analyst(s): Adam Hils, Greg Young, Jeremy D'Hoinne VIEW SUMMARY Market Definition/Description The network intrusion prevention

More information

Ability to Execute. What You Need to Know

Ability to Execute. What You Need to Know 1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact

More information

Magic Quadrant for Network Intrusion Prevention System Appliances

Magic Quadrant for Network Intrusion Prevention System Appliances Magic Quadrant for Network Intrusion Prevention System Appliances Gartner RAS Core Research Note G00167303, Greg Young, John Pescatore, 14 April 2009, R3048 04172010 The network IPS market continues to

More information

Unlike the general notebook market, in which

Unlike the general notebook market, in which Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook

More information

The 2H05 Magic Quadrant for managed

The 2H05 Magic Quadrant for managed Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security

More information

Magic Quadrant for Network Intrusion Prevention System Appliances

Magic Quadrant for Network Intrusion Prevention System Appliances Research Publication Date: 14 April 2009 ID Number: G00167303 Magic Quadrant for Network Intrusion Prevention System Appliances Greg Young, John Pescatore The network IPS market continues to mature and

More information

Case Study & POC & Demos Information

Case Study & POC & Demos Information Case Study & POC & Demos Information Type: Case Study Name: Multichannel Campaign Management (MCCM) Description: The IBM Company seeks, as vendor, through the multichannel campaign management (MCCM) services,

More information

What Are Network Security Platforms?

What Are Network Security Platforms? Markets, J. Pescatore, M. Easley, R. Stiennon Research Note 7 November 2002 Network Security Platforms Will Transform Security Markets An integrated network security platform approach will increase network

More information

Magic Quadrant for Storage Professional and Support Services

Magic Quadrant for Storage Professional and Support Services Magic Quadrant for Storage Professional and Support Services Gartner RAS Core Research Note G00157182, Adam W. Couture, Robert E. Passmore, 30 July 2008 Gartner evaluates storage service providers and

More information

Personal firewalls extend company firewall

Personal firewalls extend company firewall Magic Quadrant for Personal Firewalls, 1Q06 Gartner RAS Core Research Note G00139942, John Girard, 27 June 2006, R1901 06302007 Personal firewalls extend company firewall policy to block attacks against

More information

MarketScope for IT Governance, Risk and Compliance Management, 2008

MarketScope for IT Governance, Risk and Compliance Management, 2008 MarketScope for IT Governance, Risk and Compliance Management, 2008 Gartner RAS Core Research Note G00154941, Paul E. Proctor, Mark Nicolett, French Caldwell, 11 February 2008, RA7 03032009 The IT GRCM

More information

CIO Update: The Gartner Firewall Magic Quadrant for 2H02

CIO Update: The Gartner Firewall Magic Quadrant for 2H02 IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market

More information

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM 1 of 5 10/11/2010 9:44 AM 27 April 2010 Mark Fabbi Gartner RAS Core Research Note G00200313 With the completion of the 3Com acquisition, HP will become a formidable competitor across the entire enterprise

More information

Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms

Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Gartner RAS Core Research Note G00158295, French Caldwell, Tom Eid, 30 June 2008, R2799 07092009 The market for enterprise governance,

More information

Magic Quadrant for CRM Service Providers, North

Magic Quadrant for CRM Service Providers, North Magic Quadrant for CRM Service Providers, North America 30 August 2010 Matthew Goldman, Ed Thompson Gartner RAS Core Research Note G00205524 Demand for CRM project-based consulting and implementation services

More information

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Magic Quadrant for Content-Aware Data Loss Prevention

Magic Quadrant for Content-Aware Data Loss Prevention Magic Quadrant for Content-Aware Data Loss Prevention Gartner RAS Core Research Note G00200788, Paul E. Proctor, Eric Ouellet, 2 June 2010, V2 RA2 12062010 The enterprise content-aware data loss prevention

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius

Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius 1 The Evolving Security World The Easy Internet High Degree of IT control Slow rate of change

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

Modular Network Security. Tyler Carter, McAfee Network Security

Modular Network Security. Tyler Carter, McAfee Network Security Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution

More information

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC Intrusion Detection and Intrusion Prevention Ed Sale VP of Security Pivot Group, LLC Presentation Goals Describe IDS and IPS Why They Are Important Deployment and Use Major Players The IT Security Camera

More information

Braindumps.700-295.50.QA

Braindumps.700-295.50.QA Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me

More information

SourceFireNext-Generation IPS

SourceFireNext-Generation IPS D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

The Magic Quadrant Framework

The Magic Quadrant Framework Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship

More information

Managed Security Service Providers vs. SIEM Product Solutions

Managed Security Service Providers vs. SIEM Product Solutions White Paper The Business Case for Managed Security Services Managed Security Service Providers vs. SIEM Product Solutions www.solutionary.com (866) 333-2133 The Business Case for Managed Security Services

More information

Magic Quadrant for Corporate Telephony in EMEA, 2003

Magic Quadrant for Corporate Telephony in EMEA, 2003 Markets, S. Blood, C. Lock Research Note 2 September 2003 Magic Quadrant for Corporate Telephony in EMEA, 2003 Cisco and Alcatel continue to offer the market's most comprehensive corporate propositions.

More information

By 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability).

By 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability). Page 1 of 5 Magic Quadrant for Unified Communications, 2005 14 February 2005 Bern Elliot Steve Blood Drew Kraus Source: Gartner Note Number: G00125707 Unified communications technology and applications

More information

Magic Quadrant for Higher Education Administrative Suites, 2005

Magic Quadrant for Higher Education Administrative Suites, 2005 Industry Research Publication Date: 21 November 2005 ID Number: G00131715 Magic Quadrant for Higher Education Administrative Suites, 2005 Marti Harris, Michael Zastrocky With Oracle's acquisition of PeopleSoft,

More information

CIO Update: Enterprise Security Moves Toward Intrusion Prevention

CIO Update: Enterprise Security Moves Toward Intrusion Prevention IGG-06042003-03 J. Pescatore, R. Stiennon Article 4 June 2003 CIO Update: Enterprise Security Moves Toward Intrusion Prevention As targeted hacker attacks increase, intrusion prevention is gaining importance

More information

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite

More information

Firewall Market Trends

Firewall Market Trends Markets, R. Stiennon Research Note 19 June 2003 Magic Quadrant for Enterprise Firewalls, 1H03 Deep packet inspection technology is driving the firewall market to an inflection point that is characterized

More information

NGFWs will be most effective when working in conjunction with other layers of security controls.

NGFWs will be most effective when working in conjunction with other layers of security controls. Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

Magic Quadrant for Intrusion Prevention

Magic Quadrant for Intrusion Prevention Page 1 of 10 Magic Quadrant for Intrusion Prevention Systems 16 November 2015 ID:G00271823 Analyst(s): Craig Lawson, Adam Hils, Claudio Neiva VIEW SUMMARY The network IPS market continues being absorbed

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

QRadar Security Intelligence Platform Appliances

QRadar Security Intelligence Platform Appliances DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management

More information

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland Adaptive IPS Security in a changing world Dave Venman Security Engineer, UK & Ireland 2 Who Is Sourcefire? Mission: To help customers manage increasing risks and regulations by providing the most effective,

More information

SSL VPN 1H03 Magic Quadrant Evaluation Criteria

SSL VPN 1H03 Magic Quadrant Evaluation Criteria Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and

More information

Performance of Cisco IPS 4500 and 4300 Series Sensors

Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of

More information

Virtualized Security: The Next Generation of Consolidation

Virtualized Security: The Next Generation of Consolidation Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the

More information

Hierarchy of Needs for Content Networking

Hierarchy of Needs for Content Networking Technology, M. Fabbi Research Note 28 October 2002 Hierarchy of Needs for Content Networking Enterprises should understand the hierarchy of needs for content networking, which is illustrated by examining

More information

Magic Quadrant for IT Vendor Risk Management

Magic Quadrant for IT Vendor Risk Management (http://www.gartner.com/home) LICENSED FOR DISTRIBUTION Magic Quadrant for IT Vendor Risk Management 29 October 2014 ID:G00263243 Analyst(s): Christopher Ambrose, Gayla Sullivan, Kris Doering Summary The

More information

Magic Quadrant for Network Access Control VIEW SUMMARY Most NAC vendors provide good support for the BYOD use case. Now, the market is evolving to

Magic Quadrant for Network Access Control VIEW SUMMARY Most NAC vendors provide good support for the BYOD use case. Now, the market is evolving to Magic Quadrant for Network Access Control VIEW SUMMARY Most NAC vendors provide good support for the BYOD use case. Now, the market is evolving to address another use case, where NAC policy servers act

More information

Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant.

Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant. Markets, M. Halpern Research Note 18 March 2003 Defining the PLM Magic Quadrant by Criteria and Use We provide the methodology used in developing our product life cycle management Magic Quadrant. Core

More information

The PC life cycle configuration management Market Overview

The PC life cycle configuration management Market Overview Magic Quadrant for PC Life Cycle Configuration Management, 2005 Gartner RAS Core Research Note G00131185, 17 October 2005, Ronni J. Colville, Michael A. Silver, R1580 05052006. The PC life cycle configuration

More information

Check Point Positions

Check Point Positions Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.

More information

Magic Quadrant for Enterprise Network Firewalls

Magic Quadrant for Enterprise Network Firewalls G00219235 Magic Quadrant for Enterprise Network Firewalls Published: 14 December 2011 Analyst(s): Greg Young, John Pescatore The enterprise network firewall market is undergoing a period dynamic evolution,

More information

Strategic Sourcing Magic Quadrant Criteria: An Explanation

Strategic Sourcing Magic Quadrant Criteria: An Explanation Markets, D. Hope-Ross, J. Woods Research Note 14 March 2003 Strategic Sourcing Magic Quadrant Criteria: An Explanation A new Gartner Magic Quadrant for strategic sourcing applications is being introduced.

More information

Magic Quadrant for Job Scheduling

Magic Quadrant for Job Scheduling Page 1 of 9 Magic Quadrant for Job Scheduling 28 April 2009 Milind Govekar Gartner RAS Core Research Note G00166953 Job scheduling, a mature market, is undergoing a transformation toward IT Workload Automation

More information

Magic Quadrant for Energy and Utilities Enterprise Asset Management Software

Magic Quadrant for Energy and Utilities Enterprise Asset Management Software Magic Quadrant for Energy and Utilities Enterprise Asset Management Software 29 September 2014 ID:G00263205 Analyst(s): Leif Eriksen, Kristian Steenstrup VIEW SUMMARY For energy and utility (including

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Ability to Execute. 1 von 22 15.06.2010 17:55. What You Need to Know

Ability to Execute. 1 von 22 15.06.2010 17:55. What You Need to Know 1 von 22 15.06.2010 17:55 13 May 2010 Mark Nicolett, Kelly M. Kavanagh Gartner RAS Core Research Note G00176034 Broad adoption of SIEM technology is driven by compliance and security needs. New use cases

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to

More information

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi Cisco and Sourcefire AGILE SECURITY : Security for the Real World Stefano Volpi SOURCEfire Worldwide John Chambers statement Security is the TOP issue for Cisco and many of the CIO s in the industry. We

More information

McAfee Next Generation Firewall

McAfee Next Generation Firewall McAfee Next Generation Firewall Services solutions for Managed Service Providers (MSPs) McAfee Next Generation Firewall offers the advanced security, flexibility, and multitenant control needed to protect

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Intelligent. Data Sheet

Intelligent. Data Sheet Cisco IPS Software Product Overview Cisco IPS Software is the industry s leading network-based intrusion prevention software. It provides intelligent, precise, and flexible protection for your business

More information

Next Generation IPS and Reputation Services

Next Generation IPS and Reputation Services Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become

More information

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO

More information

How To Sell Security Products To A Network Security Company

How To Sell Security Products To A Network Security Company Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that

More information

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to

More information

Magic Quadrant for Enterprise Network Firewalls

Magic Quadrant for Enterprise Network Firewalls Research Publication Date: 21 November 2008 ID Number: G00162592 Magic Quadrant for Enterprise Network Firewalls Greg Young, John Pescatore The enterprise network firewall market experienced limited overall

More information

Joshua Beeman University Information Security Officer October 17, 2011

Joshua Beeman University Information Security Officer October 17, 2011 Joshua Beeman University Information Security Officer October 17, 2011 1 June, 2011- NPTF Security Presentation on FY 12 InfoSec goals: Two Factor Authentication Levels of Assurance Shibboleth InCommon

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools Magic Quadrant for Client Management Tools 22 May 2014 ID:G00260863 Analyst(s): Kevin Knox, Terrence Cosgrove VIEW SUMMARY EVALUATION CRITERIA DEFINITIONS New client management tool capabilities have emerged

More information

How To Protect Your Network From A Threat From A Rogue Host Or A Rogue Server From A Hacker (For A Fee)

How To Protect Your Network From A Threat From A Rogue Host Or A Rogue Server From A Hacker (For A Fee) Next-Generation Intrusion Detection & Prevention Manuel Minzoni, Brand Manager ITWAY VAD Today s Reality Begin the transformation to context-aware and adaptive security infrastructure now as you replace

More information

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency. Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High

More information

Magic Quadrant for Network Access Control

Magic Quadrant for Network Access Control Research Publication Date: 27 March 2009 ID Number: G00166224 Magic Quadrant for Network Access Control Lawrence Orans, John Pescatore, Mark Nicolett Network infrastructure, endpoint protection and network

More information

MarketScope for Vulnerability Assessment

MarketScope for Vulnerability Assessment Page 1 of 9 MarketScope for Vulnerability Assessment 17 February 2010 Kelly M. Kavanagh, Mark Nicolett, John Pescatore Gartner RAS Core Research Note G00173772 The evolution of the vulnerability assessment

More information

MarketScope for Vulnerability Assessment

MarketScope for Vulnerability Assessment Page 1 of 9 MarketScope for Vulnerability Assessment 17 February 2010 Kelly M. Kavanagh, Mark Nicolett, John Pescatore Gartner RAS Core Research Note G00173772 The evolution of the vulnerability assessment

More information

IBM Security Intrusion Prevention Solutions

IBM Security Intrusion Prevention Solutions IBM Security Intrusion Prevention Solutions Sarah Cucuz sarah.cucuz@spyders.ca IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints

More information

Simplify and Automate IT

Simplify and Automate IT Simplify and Automate IT The current state of IT INCIDENT SERVICE LEVEL DATA SERVICE REQUEST ASSET RELEASE CONFIGURATION GOVERNANCE AND COMPLIANCE EVENT AND IMPACT ENTERPRISE SCHEDULING DASHBOARDS CAPACITY

More information

Magic Quadrant for Enterprise Network Firewalls

Magic Quadrant for Enterprise Network Firewalls Magic Quadrant for Enterprise Network Firewalls Gartner RAS Core Research Note G00162592, Greg Young, John Pescatore, 21 November 2008, R2942 06102009 The enterprise network firewall market experienced

More information

Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002

Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 IGG-10232002-03 J. Holincheck Article 23 October 2002 Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 The market for large-enterprise human resources management system (HRMS)

More information

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance,

More information

Magic Quadrant for Enterprise Asset Management for Manufacturing

Magic Quadrant for Enterprise Asset Management for Manufacturing Magic Quadrant for Enterprise Asset Management for Manufacturing Gartner Industry Research Note G00169941, Dan Miklovic, 9 September 2009, R3179 10182010 Manufacturing, by its very nature, relies on the

More information

2003 Desktop Software Distribution Magic Quadrant

2003 Desktop Software Distribution Magic Quadrant Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic

More information

A Layperson s Guide To DoS Attacks

A Layperson s Guide To DoS Attacks A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

IBM QRadar Security Intelligence Platform appliances

IBM QRadar Security Intelligence Platform appliances IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event

More information

Magic Quadrant for MSSPs, North America

Magic Quadrant for MSSPs, North America Page 1 of 18 Magic Quadrant for MSSPs, North America 29 November 2010 Kelly M. Kavanagh, John Pescatore Gartner RAS Core Research Note G00208473 Enterprises face a wide range of options when selecting

More information

Magic Quadrant for WAN Optimization Controllers, 2009

Magic Quadrant for WAN Optimization Controllers, 2009 Magic Quadrant for WAN Optimization Controllers, 2009 Gartner RAS Core Research Note G00165875, Andy Rolfe, Joe Skorupa, Severine Real, 30 June 2009, RA1 10022009 The WOC market is maturing rapidly, but

More information

Towards End-to-End Security

Towards End-to-End Security Towards End-to-End Security Thomas M. Chen Dept. of Electrical Engineering Southern Methodist University PO Box 750338 Dallas, TX 75275-0338 USA Tel: 214-768-8541 Fax: 214-768-3573 Email: tchen@engr.smu.edu

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns

More information

Magic Quadrant for Enterprise Content Management, 2005 7 November 2005 James Lundy Karen M. Shegda Kenneth Chin Toby Bell Lou Latham Debra Logan

Magic Quadrant for Enterprise Content Management, 2005 7 November 2005 James Lundy Karen M. Shegda Kenneth Chin Toby Bell Lou Latham Debra Logan Magic Quadrant for Enterprise Content Management, 2005 7 November 2005 James Lundy Karen M. Shegda Kenneth Chin Toby Bell Lou Latham Debra Logan Source: Gartner Note Number: G00131821 The 2005 Magic Quadrant

More information

Sample - Cloud Storage Layer. explore@researchfox.com +1-408-469-4380 +91-80-6134-1500 www.researchfox.com

Sample - Cloud Storage Layer. explore@researchfox.com +1-408-469-4380 +91-80-6134-1500 www.researchfox.com Sample - Cloud Storage Layer explore@researchfox.com +1-408-469-4380 +91-80-6134-1500 www.researchfox.com 1 ResearchFox Consulting is an Indian market research and consulting firm based in Bangalore. We

More information

CHANGING THE RULES OF NETWORKING. Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011

CHANGING THE RULES OF NETWORKING. Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011 CHANGING THE RULES OF NETWORKING Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011 FORWARD LOOKING STATEMENTS This presentation may contain forward-looking statements that

More information

Magic Quadrant for WAN Optimization Controllers, 2007

Magic Quadrant for WAN Optimization Controllers, 2007 Magic Quadrant for WAN Optimization Controllers, 2007 Gartner RAS Core Research Note G00153256, Andy Rolfe, Joe Skorupa, 14 December 2007 R2577 12192008 The WOC market is maturing rapidly, but remains

More information

How To Manage Sourcefire From A Command Console

How To Manage Sourcefire From A Command Console Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security

More information

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management Magic Quadrant for Security Information and Event Management Gartner RAS Core Research Note G00212454, Mark Nicolett, Kelly M. Kavanagh, 12 May 2011, RA 1-2494611471 05132012 Broad adoption of SIEM technology

More information

Решения HP по информационной безопасности

Решения HP по информационной безопасности Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information