Elastica stretches to capture a wide range of SaaS security features with its CloudSOC

Size: px
Start display at page:

Download "Elastica stretches to capture a wide range of SaaS security features with its CloudSOC"

Transcription

1 Elastica stretches to capture a wide range of SaaS security features with its CloudSOC Analyst: Adrian Sanabria 31 Mar, 2015 Elastica is one of the more recent entries into the busy and popular cloud app control (CAC) market. The CAC market seems to be finished spitting out startups, with about currently active, depending on how you define and categorize the space. Like its peers, Elastica is growing at an astonishing rate. The market appears to be entering a new phase now that most in this market have had products generally available for a year or longer, larger security companies are starting to show interest in the technology. Valuations may be too high for buyers to open the acquisition purses, but legitimate interest in these products is resulting in a frenzy of technical partnerships, OEM deals and reseller activity. The 451 Take While other CAC vendors chose to build the plane on the runway, Elastica surprised us in 2014 by coming out of stealth with 65 employees and a complete offering. The product included everything we expected to see from a CAC vendor, from discovery to enforcement and investigation. The CloudSOC platform is comprehensive, clearly marketed and compares well feature-wise with its closest competitors. Although the market is only just celebrating its second birthday from the first product release, Elastica trails in market recognition and has catching up to do. In a market having broad application across all verticals (as opposed to segments that largely attract regulated industries), making friends with incumbents, integrators and resellers is likely Elastica's best bet for growth. This market could be the first cloud security market segment to achieve ubiquitous appeal, and the first user-focused one to do so since the next-generation firewall. Copyright The 451 Group 1

2 Context Headquartered in San Jose, Elastica has more than doubled since its official public launch in early Out of stealth with 65 employees, the company now has 135 on staff. The majority are located in Silicon Valley, with a significant number based in Sydney and Pakistan as well. CEO Rehan Jalil is also an investor himself and helped finance the company early on. The company raised a significant series B to the tune of $30m from Pelion Venture Partners, Mayfield Fund and Third Point Ventures. Mayfield also funded the company's $6.3m series A. As we've seen with many security startups, the series A focus is the technology and series B ramps up sales and marketing. Here is no different, with the company announcing experienced hires for sales positions coming from the likes of Palo Alto Networks and Qualys. Previously, the company was vocal about key data science hires and the importance of machine learning and analytics to the product. Although the company is just now ramping up sales, it has a significant number of paying customers a number comparative to competitors with a head start over Elastica. Revenue appears to be a key challenge in this market. With most vendors employing a per-user subscription model, ramping up revenue means vendors in this market need to sign up large numbers of customers. For that reason, large resellers have been the preferred channel in this market, with most seeing close to a 50/50 split between direct and channel sales. Elastica is 100% channel-focused and claims partnerships with over 35 resellers combined across the US, Europe and Australia. Accuvant/FishNet Security is a key sales partner with many more deals in the works. We expect to see marketing and sales to continue ramping up in this space in an effort to reach more and more potential customers. Unlike other nascent security markets that tend to be interesting primarily to military or regulatory organizations, we see CAC becoming a pervasive technology attractive across all verticals. Although CAC functionality is broader, in some ways it could be described as a natural progression from next-generation firewalls. Products Elastica's product architecture is built on a platform branded as CloudSOC with a modular approach to building out the various applications that run on it. We normally break CAC functionality into discovery, analysis and control categories. Elastica covers all three, but splits it up across four 'applications.' The intent is to cover a complete security cycle within CloudSOC, from detection to remediation. The Audit app is the discovery piece, which uses firewall and proxy logs to generate a risk Copyright The 451 Group 2

3 assessment for the enterprise. As with its peers, Elastica has assigned risk scores to all the major SaaS products based on 'business readiness.' The general idea is to educate the customer about riskier apps and give them the necessary information to block/allow apps and functionality based on their particular risk appetite. While most next-generation firewalls also provide SaaS risk rankings, Elastica's rankings (like those of other CAC vendors, as well) are much more granular and transparent. This approach allows customers to choose/weight the attributes (out of over 60 different metrics) that concern them the most and receive custom risk rankings. The tool can also automate the generation of executive-friendly risk assessment reports showing trends over time. In these reports, Elastica takes an opportunity to show off its considerable data science chops and presents key information in a colorful, infographic-like format. This app can currently produce two reports a cloud risk assessment and a shadow app risk assessment. The Detect app features event correlation and analysis. Data from different sources can be correlated and submitted to an engine branded as 'StreamIQ' for analysis. In a process similar to how many security products separate good from bad, StreamIQ generates a threat score that can be used to make manual or automated decisions. This score is determined by building and grooming a baseline of normal user behavior, using machine-learning principles to improve accuracy over time. We often see the same approach employed in security analytics products and its use here addresses the same sorts of challenges, just with different data. The Protect app is the bit of the CAC formula we'd normally call 'control.' This piece allows the customer to build rules and thresholds that use environmental factors and the threat score calculated by the Detect app to make risk decisions. An example might be a rule that blocks access to Salesforce if systematic data requests don't follow the natural application flow, suggesting that malware could be systematically scraping the company's data. Another example, using Box, could block the sharing of a file containing HR data to an individual outside the company. By injecting JavaScript, this app can educate and inform users on the reasons why functionality or requests were blocked. 'Investigate' is the final application on the CloudSOC platform, and focuses on enabling the customer to perform investigations on historical data from SaaS app use. The application is geared toward incident response and audit use. A customizable dashboard that Elastica calls an 'SOC for the Cloud' serves as a central point that ties all the applications together. 'Securlets' are Elastica's name for the software a plug-in of sorts (although Elastica also calls these 'applications') that allows inspection and control over each supported SaaS application. Box, Salesforce, Dropbox, Google Drive, Office 365 and Yammer are all examples of currently available Copyright The 451 Group 3

4 Securlets. Technology Elastica, like its peers, is ingesting data from a number of sources APIs (when available and rich enough), firewall and proxy logs and an in-line proxy. Elastica is in a minority that has chosen not to go with a reverse proxy for the in-line architecture. We've discussed the pros and cons of reverse proxies previously, but the primary downsides concern app breakage. Rewriting URLs can break SaaS applications, especially mobile versions. Also, changes to the SaaS application can temporarily break apps until reverse proxy-based CAC vendors have time to update support for the app. On the flipside, vendors using reverse proxies argue that most vendors have early access programs for partners, allowing them to plan in advance for application changes. Reverse proxies are also able to capture access attempts from any systems not just those that are corporate-owned. API data can catch these events also, but we're told that there are very few sources of rich API data from SaaS vendors today. Elastica prefers a 'forward' proxy approach which, when implemented is transparent to users (i.e., doesn't have to change URLs to dropbox.cacvendor.com). Also, if the application changes, the customer can still capture and audit traffic and the user's experience isn't interrupted. Proxy settings can be pushed to endpoints and mobile devices through a number of means, including Active Directory's group policy and MDMs. Elastica has also branded some of the technology it has built in-house StreamIQ, ThreatScore and ContentIQ. This may be to highlight the company's investments in data science and development talent, or the company could have an interest in licensing the technology separately in the future. The first of these is StreamIQ, which extracts and records events from live HTTP traffic, using machine learning and behavioral profiles to weigh events based on a number of factors, including context. StreamIQ is ultimately responsible for providing events to ThreatScore (the second), which uses another set of machine learning engines to build a score with StreamIQ and API-sourced data. The customer can then take advantage of this score through policies in the Protect app to block actions that exceed a threshold. Individual employees are also assigned threat scores based on actions versus a 'normal' baseline and other employees. RedOwl Analytics, a member of the nascent insider threat market, does something similar with internal corporate data rather than SaaS applications. The third is ContentIQ, which Elastica's proprietary data-loss prevention (DLP) technology. The company is quick to point out that it is not just employing regular expressions (regex) and labeling it DLP, which we must admit is the norm when DLP isn't the primary focus for a security or Copyright The 451 Group 4

5 technology company. False positives are often unmanageably high when employing vanilla regex for DLP purposes. Elastica is also employing some data science skill here, using semantic analysis to discover types of files source code, for example that could never be detected with any accuracy when using regex. DLP is commonly found among competitors in this market, although encryption is nearly as common. Almost legendary for being difficult to implement, SaaS encryption is one feature Elastica has yet to address. Competition There is heavy competition in the CAC market, and when we say this, we don't mean that there are lots of vendors and growth. The rumor mill is filled with stories of scalability issues, latency issues, missing features and key customers leaving for competitors. One thing that's clear is that 2014 was a year of rapid growth and maturing for this market. That seems to have been the year for bugs to be worked out and technical issues addressed. This year may be the year for alliances to be formed and for the general IT population to get familiar, even comfortable with SaaS security. In this market, Elastica directly competes with Skyhigh Networks, Netskope, Adallom, Skyfence (an Imperva company), FireLayers, Bitglass, CloudLock, CipherCloud, Cinaya, Managed Methods and Perspecsys. All of these vendors are what we'd consider 'pure play' CAC competitors. Even so, most of them have unique features and focuses. Some are heavily focused on just one or a handful of SaaS applications. Some, like CipherCloud and Perspecsys, were formerly pure-play encryption gateways and have added CAC functionality in the last year or so. A few other vendors have significant overlap, although we don't consider them pure play. These include Zscaler, Intermedia (AppID), OpenDNS (discovery only), Microsoft (discovery only) Managed Methods (CAC for APIs, you could say) and even next-generation firewall vendors. Some of these are often used alongside CAC vendors, while others compete more directly. SWOT Analysis Strengths Weaknesses We've often remarked that strength lies in a flexible platform, and Elastica appears to have that in CloudSOC. Its platform has a lot of technology in common with security analytics another very hot market at the moment. Although Elastica is one of the younger startups in this space, it has caught up quickly, with roughly the same number of paying customers as most of its competition. Elastica's age puts it behind others in terms of sales and name recognition and it has some catching up to do in a relatively busy market. Encryption is a popular feature in this market that lies outside of Elastica's scope for now. Opportunities Threats Copyright The 451 Group 5

6 The company's modular platform should make it easy to ingest and correlate other types of data to improve visibility and accuracy. The addition of threat intelligence, partnerships and additional log types could allow Elastica to organically grow into other security markets. Partnerships, alliances and M&A activity could have significant impact on this market. We keep hearing that valuations are high, but still expect to see at least one or two acquisitions this year. A few strategic technology partnerships have already emerged and we expect to see many more in Copyright The 451 Group 6

7 Reproduced by permission of The 451 Group; This report was originally published within 451 Research's Market Insight Service. For additional information on 451 Research or to apply for trial access, go to: Copyright The 451 Group 7

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

More information

The Netskope Active Platform

The Netskope Active Platform The Netskope Active Platform Enabling Safe Migration to the Cloud Massive Cloud Adoption Netskope is the leader in safe cloud enablement. With Netskope, IT can protect data and ensure compliance across

More information

WildFire. Preparing for Modern Network Attacks

WildFire. Preparing for Modern Network Attacks WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends

More information

On the Radar: CipherCloud

On the Radar: CipherCloud Cloud access security delivered on enterprise gateways Publication Date: 18 Feb 2015 Product code: IT0022-000305 Rik Turner Summary Catalyst CipherCloud develops cloud visibility and security technology

More information

Accellion raises the bar in secure cloud-based file sharing

Accellion raises the bar in secure cloud-based file sharing Accellion raises the bar in secure cloud-based file sharing Analyst: Alan Pelz-Sharpe 4 Dec, 2012 Over the past couple of years, Accellion has been building out a highly secure enterprise collaboration

More information

Zoho weaves more of its own apps together, pulls in threads to third-party software

Zoho weaves more of its own apps together, pulls in threads to third-party software 19 August 2009 IMPACT REPORT Zoho weaves more of its own apps together, pulls in threads to third-party software Analysts: China Martens & Kathleen Reidy When we last met with Zoho, the on-demand productivity

More information

With $8.7m series A funding in the bag, Cirro looks to shore up its federation business

With $8.7m series A funding in the bag, Cirro looks to shore up its federation business With $8.7m series A funding in the bag, Cirro looks to shore up its federation business Analyst: Krishna Roy 11 Jun, 2014 Cirro is building a business in the integration sector, where it provides a federated

More information

Content Delivery Service (CDS)

Content Delivery Service (CDS) Content Delivery Service (CDS) Xyleme delivers content management for learning and development. We transform the way you author, publish, deliver, and analyze learning content to drive business performance.

More information

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products Cloud Access Security Broker Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products THERE IS A RAPID ADOPTION OF CLOUD APPS INTRODUCING NEW SET OF RISKS We are rapidly

More information

Assessment & Monitoring

Assessment & Monitoring Cloud Services Shadow IT Risk Assessment Report Assessment & Monitoring Shadow IT Analytics & Business Readiness Ratings with Elastica CloudSOC & Audit November, 204 Based on all data sources from October,

More information

Solutions to Trust. NEXThink V5 What is New?

Solutions to Trust. NEXThink V5 What is New? Solutions to Trust NEXThink V5 What is New? HIGHLIGHTS What is New? ITSM: IT services analytics in real-time Analytics and product usability Security Analytics for all web & cloud applications Product

More information

REVOLUTIONIZING ADVANCED THREAT PROTECTION

REVOLUTIONIZING ADVANCED THREAT PROTECTION REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my

More information

Moreketing. With great ease you can end up wasting a lot of time and money with online marketing. Causing

Moreketing. With great ease you can end up wasting a lot of time and money with online marketing. Causing ! Moreketing Automated Cloud Marketing Service With great ease you can end up wasting a lot of time and money with online marketing. Causing frustrating delay and avoidable expense right at the moment

More information

SWOT Assessment: FireMon Security Manager Suite v7.0

SWOT Assessment: FireMon Security Manager Suite v7.0 SWOT Assessment: FireMon Security Manager Suite v7.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT017-004174 Publication Date: 12 Aug 2013 Author: Andrew Kellett SUMMARY

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Analyst: Chris Hazelton 24 Aug, 2015 The fact that mobile computing is now displacing a share of 'traditional computing'

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks

More information

Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail

Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail Analyst: Javvad Malik 24 Sep, 2014 It's almost two years to the day since RSA acquired Web-fraud detection vendor

More information

How to Define SIEM Strategy, Management and Success in the Enterprise

How to Define SIEM Strategy, Management and Success in the Enterprise How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have

More information

Managed Security Services

Managed Security Services NEAT EVALUATION FOR UNISYS: Managed Security Services Market Segment: Overall This document presents Unisys with the NelsonHall NEAT vendor evaluation for Managed Security Services (MSS) for the Overall

More information

Netskope Cloud Report. Report Highlights. cloud report. Three of the top 10 cloud apps are Storage, and enterprises use an average of 26 such apps

Netskope Cloud Report. Report Highlights. cloud report. Three of the top 10 cloud apps are Storage, and enterprises use an average of 26 such apps cloud report JAN 2014 Netskope Cloud Report In the second Netskope Cloud Report, we ve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the

More information

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps Visibility and Control for Sanctioned & Unsanctioned Cloud Apps Walter Doria Technical Director Exclusive Networks Gabriele Buratti Principal SE Imperva Today s Agenda Introductions & Discussion Market

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

SIEM Implementation Approach Discussion. April 2012

SIEM Implementation Approach Discussion. April 2012 SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual

More information

State of Security Monitoring of Public Cloud

State of Security Monitoring of Public Cloud State of Security Monitoring of Public Cloud Shittu O. Shittu Enterprise Security Architect, BP Enterprise Security Architect, trainline.com Director and Principal Consultant, TRAIS Mavens Ltd Highlights

More information

Cloud App Security. Tiberio Molino Sales Engineer

Cloud App Security. Tiberio Molino Sales Engineer Cloud App Security Tiberio Molino Sales Engineer 2 Customer Challenges 3 Many Attacks Include Phishing Emails External Phishing attacks: May target specific individuals or companies Customer malware or

More information

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION Technology Overview, Business Justification, and Resource Requirements Introduction to Data Loss Prevention Intelligent Protection for Digital Assets Although

More information

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC Information Risk Management Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC Agenda Data Breaches Required Capabilities of preventing Data Loss Information

More information

Synergic Partners: Spanish big-data pioneer

Synergic Partners: Spanish big-data pioneer Synergic Partners: Spanish big-data pioneer Analyst: Katy Ring 20 Mar, 2015 Synergic Partners offers a services portfolio around data engineering, big data and data science. The company focuses on business

More information

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance CASE STUDY AUSTRIAN AIRLINES PAGE 1 PA-5020 (2) Austrian Airlines is Austria s largest carrier and operates a global network of routes to around 130 destinations. The company s hub at Vienna International

More information

An in-depth look into how today s cloud solution providers create and sustain successful partnerships while empowering customers to move to the cloud.

An in-depth look into how today s cloud solution providers create and sustain successful partnerships while empowering customers to move to the cloud. Partnering in the Cloud 2015 ISV REPORT An in-depth look into how today s cloud solution providers create and sustain successful partnerships while empowering customers to move to the cloud. Partnering

More information

Detect & Investigate Threats. OVERVIEW

Detect & Investigate Threats. OVERVIEW Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide

More information

Content-ID. Content-ID URLS THREATS DATA

Content-ID. Content-ID URLS THREATS DATA Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and

More information

APERTURE. Safely enable your SaaS applications.

APERTURE. Safely enable your SaaS applications. APERTURE Safely enable your SaaS applications. Unsanctioned use of SaaS (Software as a Service) applications is creating gaps in security visibility and new risks for threat propagation, data leakage and

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents

PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents PREVENTIA Forward Thinking Security Solutions Skyhigh Best Practices and Use cases. Table of Contents Discover Your Cloud 1. Identify all cloud services in use & evaluate risk 2. Encourage use of low-risk

More information

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Neil MacDonald VP and Gartner Fellow Gartner Information Security, Privacy and Risk Research Twitter @nmacdona

More information

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit. Juniper Networks Next Generation Security for a Cybercrime World Lior Cohen Principal Solutions Architect Scott Lucas Director of Product Marketing, Branch Solutions Service Layer Technologies Business

More information

Palo Alto Networks. October 6

Palo Alto Networks. October 6 Palo Alto Networks October 6 Agenda Malware Trends by the numbers Protect Locally Share Globally Delivery methods 21.5% ~14% OF MALWARE HAS BEEN DELIVERED OVER APPS OTHER THAN WEB AND EMAIL IN 2015 8.2%

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

Microsoft Dynamics CRM. Salesforce.com. 8 Reasons Microsoft is the Better Investment. versus

Microsoft Dynamics CRM. Salesforce.com. 8 Reasons Microsoft is the Better Investment. versus versus 8 Reasons Microsoft is the Better Investment 2015 versus : The Choice is Clear When you choose a business management system, the last thing you want is to be surprised once you ve gone through the

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013 Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,

More information

BDNA continues growth surge as channel activities expand

BDNA continues growth surge as channel activities expand BDNA continues growth surge as channel activities expand Analyst: Dennis Callaghan 22 Jul, 2015 BDNA is enjoying another burst of growth as its integration partnerships with companies like ServiceNow and

More information

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security

More information

Moving Beyond Proxies

Moving Beyond Proxies Moving Beyond Proxies A Better Approach to Web Security January 2015 Executive Summary Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security

More information

Arista shakes up data access management with DANZ

Arista shakes up data access management with DANZ Analyst: Peter Christy 26 Feb, 2013 Arista shakes up data access management with DANZ When Andy Bechtolsheim founded high-speed switch vendor Arista Networks, the hardware design represented a new direction

More information

Filling the Threat Management Gateway Void with F5

Filling the Threat Management Gateway Void with F5 Filling the Threat Management Gateway Void with F5 With the discontinuation of Microsoft Forefront Threat Management Gateway, enterprises need to find a replacement. F5 Secure Web Gateway Services offer

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

How To Protect Cloud Services From Attack From A Threat From A Cloud (Cloud)

How To Protect Cloud Services From Attack From A Threat From A Cloud (Cloud) Rethinking Security for SaaS and Cloud Apps The Problem Securing and mitigating risks to information assets has been a long-standing concern for IT security teams in organizations of all sizes. To protect

More information

Cisco Cloud Web Security

Cisco Cloud Web Security Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that

More information

IT Security & Compliance. On Time. On Budget. On Demand.

IT Security & Compliance. On Time. On Budget. On Demand. IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount

More information

Oracle Real Time Decisions

Oracle Real Time Decisions A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

Enterprise Buyer Guide

Enterprise Buyer Guide Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight

More information

Managed service provider Bell Techlogix shines its BEAM to differentiate

Managed service provider Bell Techlogix shines its BEAM to differentiate Analyst: Katy Ring 1 Nov, 2013 Managed service provider Bell Techlogix shines its BEAM to differentiate Bell Techlogix is a midsized US managed service provider (MSP) that is ahead of the curve in getting

More information

Flying under the radar, Moogsoft looks to shake up the ITSM space

Flying under the radar, Moogsoft looks to shake up the ITSM space Flying under the radar, Moogsoft looks to shake up the ITSM space Analyst: Dennis Callaghan 15 Feb, 2013 Veteran software entrepreneurs Phil Tee and Mike Silvey are back with Moogsoft, their first startup

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

Secure Cloud-Ready Data Centers Juniper Networks

Secure Cloud-Ready Data Centers Juniper Networks Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security

More information

Accenture Cloud Platform at v3 - the Airbnb or Uber of cloud?

Accenture Cloud Platform at v3 - the Airbnb or Uber of cloud? Accenture Cloud Platform at v3 - the Airbnb or Uber of cloud? Analyst: William Fellows 21 Jan, 2015 The Accenture Cloud Platform (ACP) is now at a v3 release. The first two iterations were mostly consumed

More information

RapidMiner looks to step up advanced analysis business, adds to processing options

RapidMiner looks to step up advanced analysis business, adds to processing options RapidMiner looks to step up advanced analysis business, adds to processing options Analyst: Krishna Roy 14 Jan, 2015 RapidMiner has its eyes down and focused on higher growth rates in its business this

More information

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network. Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration

More information

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,

More information

WHITE PAPER AUGUST 2014

WHITE PAPER AUGUST 2014 THE DEFINITIVE GUIDE TO CLOUD ACCESS SECURITY BROKERS WHITE PAPER AUGUST 2014 For many enterprises, security and compliance concerns hamper adoption of cloud applications. Furthermore, cloud applications

More information

Sarbanes-Oxley Compliance for Cloud Applications

Sarbanes-Oxley Compliance for Cloud Applications Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this

More information

Executive s Guide to Cloud Access Security Brokers

Executive s Guide to Cloud Access Security Brokers Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve

More information

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation

More information

Enterprise Security Platform for Government

Enterprise Security Platform for Government Enterprise Security Platform for Government Today s Cybersecurity Challenges in Government Governments are seeking greater efficiency and lower costs, adopting Shared Services models, consolidating data

More information

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe

What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview October 2010 Matias Cuba - Regional Sales Manager Northern Europe About Palo Alto Networks Palo Alto Networks is the Network

More information

THE STATE OF Social Media Analytics. How Leading Marketers Are Using Social Media Analytics

THE STATE OF Social Media Analytics. How Leading Marketers Are Using Social Media Analytics THE STATE OF Social Media Analytics May 2016 Getting to Know You: How Leading Marketers Are Using Social Media Analytics» Marketers are expanding their use of advanced social media analytics and combining

More information

FROM PRODUCT TO PLATFORM

FROM PRODUCT TO PLATFORM FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really

More information

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:

More information

The Sophos Security Heartbeat:

The Sophos Security Heartbeat: The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that

More information

Enterprise-Grade Security from the Cloud

Enterprise-Grade Security from the Cloud Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Next Generation IPS and Reputation Services

Next Generation IPS and Reputation Services Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become

More information

Brinkster offers deep margins versus AWS pricing with its white-label cloud program

Brinkster offers deep margins versus AWS pricing with its white-label cloud program Brinkster offers deep margins versus AWS pricing with its white-label cloud program Analyst: Liam Eagle 8 Sep, 2014 With a 15-year history in the Web and application hosting business, Brinkster has spent

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information