Company-owned managed security technologies, in addition to more than 500 third-party technologies that Trustwave manages and monitors

Size: px
Start display at page:

Download "Company-owned managed security technologies, in addition to more than 500 third-party technologies that Trustwave manages and monitors"

Transcription

1 VENDOR PROFILE Trustwave: Solutions and Services for Security and Compliance Christina Richmond IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA USA P F Trustwave is a privately held company that offers solutions delivered through cloudbased and managed security services (MSS) and integrated technologies, augmented by professional services. The company's services and technologies are positioned to help businesses of all sizes fight cybercrime, protect data, and reduce security risks. Trustwave's solutions have attracted more than 2 million businesses that are enrolled in the Trustwave TrustKeeper, the company's cloud and managed services platform. While the majority of these businesses are smaller merchants using Trustwave's SMB compliance tools, an increasing number are enterprises accessing TrustKeeper for MSS. The company's roots are in payment card industry (PCI) compliance and Trustwave claims more than one-third of the market share in the United States but the company has expanded beyond PCI compliance through acquisitions and the organic development of technology. Company strengths and key differentiators, that position Trustwave for continued growth worldwide include: A portfolio of advanced MSS, such as managed security information and event management (SIEM), secure Web gateway (SWG), Web application firewall (WAF), and managed security testing Company-owned managed security technologies, in addition to more than 500 third-party technologies that Trustwave manages and monitors An "intelligence at every level" framework that integrates Trustwave proprietary threat intelligence, from its SpiderLabs team into its MSS offerings and its global security operations centers (SOCs) The TrustKeeper portal, which gives businesses access to subscription-based offerings ranging from enterprise-grade MSS to compliance and security automation tools Vertical-specific managed services offerings for industries such as hotels, financial services companies, and franchises Trustwave's history as a pioneer in PCI compliance, which has helped Trustwave develop compliance and risk management services that help identify and resolve enterprise deficiencies Filing Information: December 2013, IDC #244994, Volume: 1 Security Services: Vendor Profile

2 IN THIS VENDOR PROFILE This IDC Vendor Profile analyzes Trustwave, which offers bundles of managed security services that are suitable for businesses ranging in size from small retail shops to Fortune 100 enterprises. Key success factors are reviewed, including go-tomarket strategy, security management platform, monitored/managed technologies, and MSS offerings. SITUATION OVERVIEW Company Overview Trustwave is a pure-play information security company that helps businesses validate compliance and augment their protection beyond Payment Card Industry Data Security Standard (PCI DSS) requirements. Trustwave's cloud and managed security services and integrated security technologies are augmented by the company's security assessors, ethical hackers, data breach investigators, and security researchers. Trustwave clients can purchase cloud-based, subscription services either directly or through partners. While most of the services and technologies are sold directly in the United States, the company sells internationally mostly through a network of channel partners. Customers can purchase technology solutions delivered as a managed security service, or they can engage the company with professional services, technology products, and systems integration services. Ongoing investments in MSS include new and enhanced offerings, global security operations centers, and acquisitions. Headquartered in Chicago, the company has regional headquarters in London, São Paulo (Brazil), and Sydney (Australia). In January 2013, the company opened its newest SOC in Manila, Philippines (see Table 1). 2 # IDC

3 TABLE 1 Trustwave Company Snapshot Category Target market Details Small, midsize, and large enterprises worldwide Founding year 1995 Number of employees 1,100+ Company headquarters Security operations centers (SOCs) Chicago, Illinois Denver, Colorado Chicago, Illinois Minneapolis, Minnesota Warsaw, Poland Manila, Philippines Web site Sales channels Direct, which accounts for most sales within the United States Indirect, which accounts for most sales internationally Revenue estimate $114 million (2012) in MSS revenue a subset of total company revenue Source: IDC, 2013 Financial Performance Trustwave is a privately held company that does not release financial information. However, the company states that its MSS business is growing at more than twice the industry rate. IDC estimates Trustwave's MSS revenue, a subset of overall company revenue, to be around $114 million for Customers and Contracts Trustwave supports more than 2 million businesses that are enrolled in the TrustKeeper cloud and managed security services platform, and it serves clients of all sizes, from multinational entities to single-location small businesses, in 96 countries. The company also has clients in verticals, including financial services, hospitality, franchise restaurants and hotels, hospitals and physician networks, and technology IDC #

4 Company Strategy Trustwave provides traditional managed services such as firewall/unified threat management (UTM), intrusion detection services/intrusion prevention system (IDS/IPS), and internal vulnerability scanning (IVS) and advanced services such as managed SIEM, SWG, WAF, and network access control (NAC). These advanced services are recent additions to the portfolio and include a new penetration testing offering. Trustwave infuses its services with threat intelligence from the company's SpiderLabs security team and external sources. Its MSS strategy is to offer services tailored to specific business types based on factors such as size, IT profile, and industry segment. The company's go-to-market plans are designed to capitalize on the following trends, which Trustwave believes are the key drivers of growth and adoption of MSS: Increasing number of new technologies within businesses as well as additional devices/platforms to secure (This trend is intensified by the increased use of social media, the cloud, and big data and growth in mobile devices and the bringyour-own-device [BYOD] phenomenon.) Controlling complexities related to day-to-day management, as well as mitigation of and response to advanced security threats Cost control, whether resulting from cuts in IT budgets or efforts to reduce operating expenses Shortage of IT resources and security skill sets Keeping pace with compliance regulations, both security controls for industry and government requirements Increased level of confidence in managing security through the cloud (As cloud solutions have evolved, many enterprises are becoming less apprehensive about working with outside security vendors.) Trustwave's go-to-market plans include several focal points: teaming with new customers, building relationships with existing customers, extending the partner network, enhancing the company's managed services portfolio, emphasizing flexibility and customer service, augmenting threat intelligence from internal and external sources, providing third-party product monitoring and management, supporting mandates and regulations beyond PCI, and focusing on vertical market offerings and international expansion. Current target markets include: Large and midmarket firms that are seeking to fully outsource their security services and/or that want to address the increase in advanced threats and cybercrime with threat intelligence 4 # IDC

5 Fortune 500 firms searching for hybrid solutions to supplement their in-house skills and resources with a shared responsibility model Midmarket firms with insufficient staff and resources to maintain an appropriate security posture Highly distributed environments including franchise-type businesses such as quick-service restaurants, hotels, and healthcare organizations (Typically, these businesses have inadequate information security skills to support remote locations.) Industry verticals, including financial services, manufacturing, retail, and utilities Services Delivered Trustwave's services are offered through cloud, customer premise equipment (CPE), and SaaS. The company supports integrations of threat intelligence, correlation, alerting, and remediation in the MSS portfolio with current and relevant attack signatures, vulnerability plug-ins, malware strains, and applied knowledge gleaned from its SpiderLabs research team as well as through proprietary and third-party sources, including penetration tests and forensic investigations. Threat intelligence is "woven into" its MSS, according to Trustwave, providing near-real-time protection from network, application, Web, and other threats. The company believes that "inline" controls, such as firewalls and intrusion prevention, are still best deployed via CPE and that other "out of band" technologies, including secure and file integrity monitoring (FIM), are better suited for the cloud. Trustwave powers its services with its own intellectual property, along with threat research and technologies. Additionally, Trustwave offers support for managing and monitoring a variety of third-party products deployed in customer environments. The company offers hybrid managed options for its managed services, especially for SIEM. Customers can opt to have Trustwave manage the health and status of a deployed SIEM appliance only or share in management support by providing supplementary log analysis services. Hybrid managed deployments are becoming more common, according to Trustwave, with SIEM hybrid managed services leading the way. The company also is seeing demand for hybrid WAF and NAC services. Trustwave provides MSS via a single monthly subscription fee that includes appliance hardware, software, and support costs. Trustwave's MSS portfolio includes: Authentication (AU) is an on-demand two-factor authentication solution. Compliance Validation Service (CVS) helps manage and monitor the overall compliance process and aids businesses in achieving compliance objectives IDC #

6 File Integrity Monitoring is a cloud-based solution that monitors OS and registry file data on Windows-based POS devices, laptops, desktops, and servers. Intrusion Prevention System is an asset-centric, enforcement technology that autotunes in real time to address vulnerabilities specific to the network complementing the firewall perimeter. Managed Security Information and Event Management solution collects, analyzes, and stores logs from networks, hosts, and critical applications. Managed Network Access Control provides full-feature NAC as a managed security service with proactive management, maintenance, and monitoring. Managed Security Testing is a subscription-based penetration testing service. Managed Secure Web Gateway addresses malware, zero-day vulnerabilities, and blended and advanced persistent threats (APTs). Secure service quarantines questionable traffic before it enters the network; protects confidential content via encryption; blocks spam, viruses, and malicious software; and inspects incoming and outgoing for inappropriate and unauthorized content. SpiderLabs Threat Intelligence includes daily feeds and quarterly summaries that supplement internal security expertise to improve an organization's ability to detect threats and prevent data breaches. Vulnerability Scanning Service enables an organization to meet compliance requirements while providing security, support, self-scan, and reporting capabilities. In more detail: External Vulnerability Scanning (EVS) is delivered via TrustKeeper Agent, a proprietary, automated vulnerability scanning engine within TrustKeeper, which tests for more than 3,000 unique vulnerabilities. Internal Vulnerability Scanning is a managed service delivered via a device or Trustwave Unified Threat Management that assesses and detects vulnerabilities across a company's internal network. Unified threat management is a managed service that provides security consolidated in a single piece of equipment that addresses security concerns and controls at the network perimeter. Web Application Firewall provides real-time, continuous security against attacks and data loss while maintaining compliance with industry regulations. Trustwave also offers optional fee-based consulting services specific to MSS support, called Trustwave Information Security Advisor consulting services. They help customers transition to a managed environment through scoping and implementation of services based on security gaps and the level of in-house information security expertise and support. 6 # IDC

7 In addition, Trustwave added new enterprise risk assessment services in 2013 that identify security gaps that managed services can address, provided a customer has the internal resources to support them (e.g., a mobile security assessment may suggest that NAC or SWG technology would control rogue access and malware in the environment). Platform/Technologies Trustwave's TrustKeeper portal/platform enables businesses to access subscriptionbased Trustwave offerings. The portal unifies the cloud and managed services developed by Trustwave's three business units: Compliance and Risk Management, Security Solutions/MSS, and Threat Intelligence and Research (aka SpiderLabs). The TrustKeeper portal offers customers a view into their events, alerts, and trends and provides self-service interaction with the SOC staff for change requests, ticketing, and other requests. Telephone support is available 24 x 7 in multiple languages, and the SOCs and staff are located to enable a follow-the-sun model. Over the past few years, Trustwave has increased the number of applications including some from acquisitions that can be accessed through the portal and expects to continue this effort. A standard operating system based on Linux called TrustOS and its TrustedSentry appliance provide standard platforms that promote integration and interoperability, as well as device and threat management from the SOCs. Trustwave's multitenant SIEM technology is used in Trustwave SOCs as a foundation for the company's MSS, providing data acquisition, normalization, correlation, analysis, and real-time reporting capabilities for vendors and open source data sources. Optionally, customers can employ log management appliances, designed for use with both MSS and licensed products, to extend their on-premise capabilities. Monitored/Managed Technologies In addition to delivering, monitoring, and managing its own set of security technologies, Trustwave also monitors more than 500 third-party devices and manages widely used third-party products. When bringing on a new client and throughout the relationship, Trustwave has a formalized process by which clients can request support and management for additional third-party products. Third-party device management gives Trustwave visibility and control (install, configure, monitor, correlate, analyze, etc.) for technologies from: Juniper NetScreen Fortinet Websense Sourcefire 2013 IDC #

8 Cisco Standards Trustwave supports the following standards: PCI DSS FFIEC GLBA HIPAA FISMA SOX NIST FIPS ISO 27001/2 With respect to security and threat intelligence capabilities, the company's support staff receives regular training and holds advanced certifications. The average staff member's tenure is 15 years. Partnerships Trustwave partners with a range of organizations, including global financial institutions, telecommunications companies, hosting providers, service providers, security integrators, and value-added resellers. The company supports its partners alliance, technology, and channel with specific programs to address each organization's needs and objectives through its portfolio. Geographic Coverage Trustwave operates in all major geographies worldwide, with customers in 96 countries. Operating with more than 1,100 employees, the company maintains a local presence in 26 countries. The company operates five SOCs in the cities of Chicago, Denver, Minneapolis, Manila (Philippines), and Warsaw (Poland). Additionally, the company says it has globally dispersed technical assistance, provisioning, and distribution centers. 8 # IDC

9 Mergers and Acquisitions Acquisitions include: Application Security Inc. (2013) for database and big data scanning technology, which is expected to augment MSS offerings SecureConnect (2013), which added MSS services for hospitality and retail verticals as well as customers operating in distributed environments (Trustwave also gained a SOC in Minneapolis through the acquisition.) M86 Security (2012) for advanced antimalware technology, secure Web gateway, secure gateway, and Web security (Trustwave has launched a managed SWG based on M86 technology.) Intellitactics (2010) for SIEM, which Trustwave uses both in its SOC and as a managed SIEM offering Breach Security (2010) for WAF and application security, which Trustwave uses for its managed WAF offering BitArmor (2010) for encryption Vericept (2009) for data loss prevention Mirage Networks (2009) for network access control, which Trustwave uses for its managed NAC offering FUTURE OUTLOOK IDC research indicates that MSS is growing at a double-digit growth rate of more than 10% in a five-year forecast period. IDC expects to publish its finalized forecast of this market by the end of 1Q14. Several factors are driving this trend: Increased complexity of security threats drives the need for a more holistic security posture. IT managers' knowledge that at a minimum in addition to a SOC they must have enhanced analytics, data consolidation, and global threat intelligence knowledge of advanced persistent threats and other adaptive, complex, and dynamic threats. 24 x 7 in-house security solutions are expensive, and expertise is scarce. In addition, IT managers know that they must have the correlation capability to keep the information of these threats flowing to critical areas of the organization. Budgetary pressures faced by chief information security officers (CISOs) can lead to "build versus buy" discussions. Engaging a security services provider can enable an organization to transfer the cost of ownership, thereby reducing capex and transferring the budget line item to opex. This step creates a predictable expense with a regular cadence in the budget cycle IDC #

10 The need for advanced security features leads companies to seek out a provider, such as Trustwave, that has enhanced security capabilities, with scalable and flexible security platforms capable of handling future expansion. And, like Trustwave, these providers often have research labs that study and monitor threat trends on a global basis, and the findings from these organizations are critical to helping enterprises deal with the latest threats. Correlation and analytics of data that comes from a large number of customers and sources enable a managed security services provider to have visibility into a large variety of threats on a global basis. Leveraging the scale and expertise of a service provider like Trustwave, therefore, can be beneficial to companies with geographically dispersed sites. ESSENTIAL GUIDANCE Advice for T r ustwave Trustwave has done a very good job of growing its MSS offering both organically and through acquisition. It continues to move its services both managed and professional up the stack to provide increased benefit to its customers. This year alone, Trustwave has invested in an additional SOC and added several advanced services. While market misperception has pigeonholed Trustwave into a PCIcompliance-only security services provider, the company has leveraged its knowledge and processes in the PCI arena to build out and provide compliance offerings across other regulatory standards as well. IDC believes that the hard work Trustwave has done will pay off in the coming years. There is a blessing and a curse of being one of the few remaining pure-play security services firms left standing. As this dynamic and disaggregated market consolidates, other larger firms will create significant competition for Trustwave. This could make Trustwave a significant acquisition, which may allow it to dictate its price when suitors come to call. All in all, IDC is impressed with the scale of Trustwave's offerings and looks forward to witnessing the company's future growth, in whatever form it may come to fruition. LEARN MORE Related Research Worldwide and U.S. Professional Security Services Forecast (IDC #241958, July 2013) 10 # IDC

11 Copyright Notice This IDC research document was published as part of an IDC continuous intelligence service, providing written research, analyst interactions, telebriefings, and conferences. Visit to learn more about IDC subscription and consulting services. To view a list of IDC offices worldwide, visit Please contact the IDC Hotline at , ext (or ) or sales@idc.com for information on applying the price of this document toward the purchase of an IDC service or for information on additional copies or Web rights. Copyright 2013 IDC. Reproduction is forbidden unless authorized. All rights reserved IDC #

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

$ Drive awareness and increase participation. National account program. Flexible managed Security Solutions for hospitality

$ Drive awareness and increase participation. National account program. Flexible managed Security Solutions for hospitality National Account Program Managed Security Solutions for Hospitality National account program Flexible managed Security Solutions for hospitality The Trustwave National Account Program is designed with

More information

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor VENDOR PROFILE SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor Juan Sacchi IDC OPINION SecureData is a growing managed security services provider headquartered in the U.K. with

More information

W H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d a y ' s T h r e a t L a n d s c a p e

W H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d a y ' s T h r e a t L a n d s c a p e Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d

More information

Simplify Your Network Security with All-In-One Unified Threat Management

Simplify Your Network Security with All-In-One Unified Threat Management Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,

More information

INSIGHT. Cisco' s Continuing Services Evolution: Remote Management Services IDC OPINION IN THIS INSIGHT SITUATION OVERVIEW

INSIGHT. Cisco' s Continuing Services Evolution: Remote Management Services IDC OPINION IN THIS INSIGHT SITUATION OVERVIEW INSIGHT Cisco' s Continuing Services Evolution: Remote Management Services Leslie Rosenberg Curtis Price Rob Brothers Chris Barnard IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701

More information

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

NEC Managed Security Services

NEC Managed Security Services NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD Protecting your infrastructure requires you to detect threats, identify suspicious

More information

Sluggish Incident Response: Next-Generation Security Problems and Solutions

Sluggish Incident Response: Next-Generation Security Problems and Solutions CUSTOMER NEEDS AND STRATEGIES Sluggish Incident Response: Next-Generation Security Problems and Solutions Christian A. Christiansen Christina Richmond Robert Westervelt IDC OPINION The rush to adopt technologies

More information

QRadar SIEM 6.3 Datasheet

QRadar SIEM 6.3 Datasheet QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Cloud Assurance: Ensuring Security and Compliance for your IT Environment Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T N i n e S t a r t - U p s a n d I n n o v a t o r s E x t e n d t h e C l o u d S y

More information

I D C A N A L Y S T C O N N E C T I O N

I D C A N A L Y S T C O N N E C T I O N I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Trend Micro Cloud Security for Citrix CloudPlatform

Trend Micro Cloud Security for Citrix CloudPlatform Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing

More information

How To Get A Better Desktop Management System

How To Get A Better Desktop Management System IDC MARKETSCAPE IDC MarketScape Excerpt: Worldwide Client Virtualization Software 2013 Vendor Assessment Brett Waldman Iris Feng THIS IDC MARKETSCAPE EXCERPT FEATURES: NCOMPUTING IDC MARKETSCAPE FIGURE

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market

More information

Clavister InSight TM. Protecting Values

Clavister InSight TM. Protecting Values Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis

IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis IDC MarketScape IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis Robert Young THIS IDC MARKETSCAPE EXCERPT FEATURES: CHERWELL SOFTWARE IDC MARKETSCAPE FIGURE FIGURE 1 IDC

More information

Websense: Worldwide Leader in Web Filtering Expands into Web Security

Websense: Worldwide Leader in Web Filtering Expands into Web Security Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Websense: Worldwide Leader in Web Filtering Expands into Web Security Brian E. Burke

More information

Worldwide Cloud Systems Management Software 2013 Vendor Shares

Worldwide Cloud Systems Management Software 2013 Vendor Shares COMPETITIVE ANALYSIS Worldwide Cloud Systems Management Software 2013 Vendor Shares Mary Johnston Turner IDC OPINION In 2013, the worldwide cloud systems management software competitive market showed very

More information

IDC MarketScape: Worldwide Datacenter Infrastructure Management 2015 Vendor Assessment

IDC MarketScape: Worldwide Datacenter Infrastructure Management 2015 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Datacenter Infrastructure Management 2015 Vendor Assessment Jennifer Koppy THIS IDC MARKETSCAPE EXCERPT FEATURES EMERSON NETWORK POWER IDC MARKETSCAPE FIGURE

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

Vulnerability Management for the Distributed Enterprise. The Integration Challenge

Vulnerability Management for the Distributed Enterprise. The Integration Challenge Vulnerability Management for the Distributed Enterprise The Integration Challenge Vulnerability Management and Distributed Enterprises All organizations face the threat of unpatched vulnerabilities on

More information

W o r l d w i d e a n d U. S. M a n a g e d M o b i l i t y 2 0 1 3 2 0 1 7 F o r e c a s t : U n i t e d S t a t e s L e a d s i n A d o p t i o n

W o r l d w i d e a n d U. S. M a n a g e d M o b i l i t y 2 0 1 3 2 0 1 7 F o r e c a s t : U n i t e d S t a t e s L e a d s i n A d o p t i o n Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com M A R K E T A N A L Y S I S W o r l d w i d e a n d U. S. M a n a g e d M o b i l i t y 2 0 1 3 2

More information

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist Smarter Security for Smarter Local Government Craig Sargent, Solutions Specialist SUMMARY 1 Trustwave and SpiderLabs 2 Penetration Testing 3 Web Application Firewall (WAF) 4 Security Information & Event

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Leveraging security from the cloud

Leveraging security from the cloud IBM Global Technology Services Thought Leadership White Paper IBM Security Services Leveraging security from the cloud The who, what, when, why and how of cloud-based security services 2 Leveraging security

More information

IT Security & Compliance. On Time. On Budget. On Demand.

IT Security & Compliance. On Time. On Budget. On Demand. IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount

More information

Business Case for Virtual Managed Services

Business Case for Virtual Managed Services Business Case for Virtual Managed Services Executive Summary Managed services allow businesses to offload day-to-day network management tasks to service providers and thus free up internal talent to focus

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis

IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis IDC MarketScape IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis Robert Young THIS IDC MARKETSCAPE EXCERPT FEATURES: SERVICENOW IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape

More information

IT as a Service Emerges as a New Management Paradigm in the Software-Defined Datacenter Era

IT as a Service Emerges as a New Management Paradigm in the Software-Defined Datacenter Era Customer Needs and Strategies IT as a Service Emerges as a New Management Paradigm in the Software-Defined Datacenter Era Mary Johnston Turner IDC OPINION IT as a service (ITaaS) represents a fundamentally

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

Transformative Technology in Document Security

Transformative Technology in Document Security INSIGHT Transformative Technology in Document Security Arianna Valentini IDC OPINION The majority of organizations have taken steps in making sure that their IT environments are secure. Worldwide Security

More information

Microsoft Office 365: How the Hosted Exchange Server Is Redefining SMB Cloud IT Adoption

Microsoft Office 365: How the Hosted Exchange Server Is Redefining SMB Cloud IT Adoption INDUSTRY DEVELOPMENTS AND MODELS Microsoft Office 365: How the Hosted Exchange Server Is Redefining SMB Cloud IT Adoption Christopher Chute IDC OPINION Office 365 is Microsoft's next-generation email and

More information

CLOUD GUARD UNIFIED ENTERPRISE

CLOUD GUARD UNIFIED ENTERPRISE Unified Security Anywhere CLOUD SECURITY CLOUD GUARD UNIFIED ENTERPRISE CLOUD SECURITY UNIFIED CLOUD SECURITY Cloudy with a 90% Chance of Attacks How secure is your cloud computing environment? If you

More information

Current IBAT Endorsed Services

Current IBAT Endorsed Services Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network

More information

How To Sell Security Products To A Network Security Company

How To Sell Security Products To A Network Security Company Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that

More information

Cirba Targets Software-Defined Infrastructure Control with Workload-Aware Predictive Analytics

Cirba Targets Software-Defined Infrastructure Control with Workload-Aware Predictive Analytics Vendor Profile Cirba Targets Software-Defined Infrastructure Control with Workload-Aware Predictive Analytics Mary Johnston Turner David Immerman IDC OPINION Software-defined infrastructure (SDI) enables

More information

ScienceLogic Offers Unified Infrastructure Monitoring and Analytics for Hybrid IT

ScienceLogic Offers Unified Infrastructure Monitoring and Analytics for Hybrid IT VENDOR PROFILE ScienceLogic Offers Unified Infrastructure Monitoring and Analytics for Hybrid IT Mary Johnston Turner David Immerman IDC OPINION Enterprise datacenter infrastructure environments are becoming

More information

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES SOX COMPLIANCE Achieving SOX Compliance with Professional Services The Sarbanes-Oxley (SOX)

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Monetizing the Cloud: XaaS Opportunities for Service Providers Sponsored by: EMC Brad Nisbet March 2011 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Achieving SOX Compliance with Masergy Security Professional Services

Achieving SOX Compliance with Masergy Security Professional Services Achieving SOX Compliance with Masergy Security Professional Services The Sarbanes-Oxley (SOX) Act, also known as the Public Company Accounting Reform and Investor Protection Act of 2002 (and commonly called

More information

CloudCheck Compliance Certification Program

CloudCheck Compliance Certification Program CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or

More information

Modular Network Security. Tyler Carter, McAfee Network Security

Modular Network Security. Tyler Carter, McAfee Network Security Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution

More information

FIRN Secure Internet Bundled Services:

FIRN Secure Internet Bundled Services: FIRN INTERNET SECURITY BUNDLE SERVICES AND NEW ADVANCED SECURITY OPTIONAL SERVICES (New Services and Prices Available July 1, 2014. CSAB Orders can be placed as early as March 1, 2014) Ethernet Bandwidth

More information

V E N D O R P R O F I L E. V e r i x P r i v a t e V e n d o r W a t c h l i s t P r o f i l e I D C O P I N I O N

V E N D O R P R O F I L E. V e r i x P r i v a t e V e n d o r W a t c h l i s t P r o f i l e I D C O P I N I O N V E N D O R P R O F I L E V e r i x P r i v a t e V e n d o r W a t c h l i s t P r o f i l e Dan Yachin Ryan Patterson I D C O P I N I O N Global Headquarters: 5 Speen Street Framingham, MA 01701 USA

More information

Network Management Services: A Cost-Effective Approach to Complexity

Network Management Services: A Cost-Effective Approach to Complexity Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F Network Management Services: A Cost-Effective Approach to Complexity

More information

I D C M a r k e t S c a p e : W o r l d w i d e M e s s a g i n g S e c u r i t y 2 0 1 3 2 0 1 4 V e n d o r A s s e s s m e n t

I D C M a r k e t S c a p e : W o r l d w i d e M e s s a g i n g S e c u r i t y 2 0 1 3 2 0 1 4 V e n d o r A s s e s s m e n t Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com C O M P E T I T I V E A N A L Y S I S I D C M a r k e t S c a p e : W o r l d w i d e M e s s a g

More information

Worldwide DDI Market Update

Worldwide DDI Market Update Update Worldwide DDI Market Update Nolan Greene Petr Jirovsky IN THIS UPDATE This IDC update reviews the revenue and shipments of the worldwide DDI (DNS, DHCP, and IP address management [IPAM]) solutions

More information

Enterprise Security Solutions

Enterprise Security Solutions Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E XCERPT M A R K E T A N A L Y S I S W o r l d w i d e S e c u r i t y a n d V u l n e r a b i l i

More information

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security Securing business data CNS White Paper Cloud for Enterprise Effective Management of Data Security Jeff Finch, Head of Business Development, CNS Mosaic 2nd July 2015 Contents 1 Non-Disclosure Statement...

More information

DNS Server Security Survey

DNS Server Security Survey EXECUTIVE BRIEF DNS Server Security Survey Sponsored by: EfficientIP Romain Fouchereau June 2014 INTRODUCTION With most organizations having some business linked to and more importantly relying on an online

More information

Managed Security Monitoring Quick Guide 5/26/15. 2014 EarthLink. Trademarks are property of their respective owners. All rights reserved.

Managed Security Monitoring Quick Guide 5/26/15. 2014 EarthLink. Trademarks are property of their respective owners. All rights reserved. Managed Security Monitoring Quick Guide 5/26/15 2014 EarthLink. Trademarks are property of their respective owners. All rights reserved. 2 Managed Security Monitoring - Overview Service Positioning EarthLink

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE IBM ISS: Two Years Later Jon Crotty Ramasubramoni. R Irida Xheneti Andrew J. Hanson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

IBM Global Technology Services Preemptive security products and services

IBM Global Technology Services Preemptive security products and services IBM Global Technology Services Preemptive security products and services Providing protection ahead of the threat Today, security threats to your organization leave little margin for error. To consistently

More information

Conquering PCI DSS Compliance

Conquering PCI DSS Compliance Any organization that stores, processes or transmits information related to credit and debit card payments has a responsibility to protect each cardholder s personal data. To help accomplish this goal,

More information

Building a Web Security Ecosystem to Combat Emerging Internet Threats

Building a Web Security Ecosystem to Combat Emerging Internet Threats I D C V E N D O R S P O T L I G H T Building a Web Security Ecosystem to Combat Emerging Internet Threats September 2005 Adapted from: Worldwide Secure Content Management 2005 2009 Forecast Update and

More information

Trustwave blocks Web-borne malware - guaranteed, or your money back

Trustwave blocks Web-borne malware - guaranteed, or your money back Trustwave blocks Web-borne malware - guaranteed, or your money back Analyst: Adrian Sanabria 16 Jul, 2014 Today, Trustwave makes a bold announcement a zero malware guarantee. The anti-malware market has

More information

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 1 EXECUTIVE SUMMARY INTRODUCING THE 2015 GLOBAL THREAT INTELLIGENCE REPORT Over the last several years, there has been significant security industry

More information

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.

More information

Converged and Integrated Datacenter Systems: Creating Operational Efficiencies

Converged and Integrated Datacenter Systems: Creating Operational Efficiencies Insight Converged and Integrated Datacenter Systems: Creating Operational Efficiencies Rob Brothers IDC OPINION Enterprise IT has moved away from siloed servers, storage, information, and processes and

More information

Q1 Labs Corporate Overview

Q1 Labs Corporate Overview Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

overview Enterprise Security Solutions

overview Enterprise Security Solutions Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world

More information

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding

More information

BEST PRACTICES RESEARCH

BEST PRACTICES RESEARCH 2013 Frost & Sullivan 1 We Accelerate Growth Market Leadership Award Vulnerability Management Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year of business with

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T T h e B u s i n e ss Value of Hyb r i d C l o u d - B a s e d C o m p r o m i s e I n t e l l i g e nce Monitoring and T h r e a t M i tigation February 2013

More information

Security is a top priority. The reasons for reliable network security keep growing.

Security is a top priority. The reasons for reliable network security keep growing. Network Security Security is a top priority. The reasons for reliable network security keep growing. Convergence of voice and data networks Changing compliance regulations Explosion of Web 2.0 business

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

What is Security Intelligence?

What is Security Intelligence? 2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the

More information

I D C E X E C U T I V E B R I E F

I D C E X E C U T I V E B R I E F Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F P e netration Testing: Taking the Guesswork Out of Vulnerability

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200

More information

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Security. Security consulting and Integration: Definition and Deliverables. Introduction Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data

More information

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic

More information

Tom Reilly President & CEO, ArcSight

Tom Reilly President & CEO, ArcSight Tom Reilly President & CEO, ArcSight ArcSight Company Background Founded May 2000 2000+ customers 500+ employees, offices worldwide NASDAQ: ARST 20% Revenue growth year over year Analyst Recognition SIEM

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

Cloud and Data Center Security

Cloud and Data Center Security solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T W o r l d w i d e W e b S e c u r i t y 2 0 1 1-2 0 1 5 F o r e c a s t a n d 2 0 1

More information