Company-owned managed security technologies, in addition to more than 500 third-party technologies that Trustwave manages and monitors
|
|
- Coral Thompson
- 8 years ago
- Views:
Transcription
1 VENDOR PROFILE Trustwave: Solutions and Services for Security and Compliance Christina Richmond IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA USA P F Trustwave is a privately held company that offers solutions delivered through cloudbased and managed security services (MSS) and integrated technologies, augmented by professional services. The company's services and technologies are positioned to help businesses of all sizes fight cybercrime, protect data, and reduce security risks. Trustwave's solutions have attracted more than 2 million businesses that are enrolled in the Trustwave TrustKeeper, the company's cloud and managed services platform. While the majority of these businesses are smaller merchants using Trustwave's SMB compliance tools, an increasing number are enterprises accessing TrustKeeper for MSS. The company's roots are in payment card industry (PCI) compliance and Trustwave claims more than one-third of the market share in the United States but the company has expanded beyond PCI compliance through acquisitions and the organic development of technology. Company strengths and key differentiators, that position Trustwave for continued growth worldwide include: A portfolio of advanced MSS, such as managed security information and event management (SIEM), secure Web gateway (SWG), Web application firewall (WAF), and managed security testing Company-owned managed security technologies, in addition to more than 500 third-party technologies that Trustwave manages and monitors An "intelligence at every level" framework that integrates Trustwave proprietary threat intelligence, from its SpiderLabs team into its MSS offerings and its global security operations centers (SOCs) The TrustKeeper portal, which gives businesses access to subscription-based offerings ranging from enterprise-grade MSS to compliance and security automation tools Vertical-specific managed services offerings for industries such as hotels, financial services companies, and franchises Trustwave's history as a pioneer in PCI compliance, which has helped Trustwave develop compliance and risk management services that help identify and resolve enterprise deficiencies Filing Information: December 2013, IDC #244994, Volume: 1 Security Services: Vendor Profile
2 IN THIS VENDOR PROFILE This IDC Vendor Profile analyzes Trustwave, which offers bundles of managed security services that are suitable for businesses ranging in size from small retail shops to Fortune 100 enterprises. Key success factors are reviewed, including go-tomarket strategy, security management platform, monitored/managed technologies, and MSS offerings. SITUATION OVERVIEW Company Overview Trustwave is a pure-play information security company that helps businesses validate compliance and augment their protection beyond Payment Card Industry Data Security Standard (PCI DSS) requirements. Trustwave's cloud and managed security services and integrated security technologies are augmented by the company's security assessors, ethical hackers, data breach investigators, and security researchers. Trustwave clients can purchase cloud-based, subscription services either directly or through partners. While most of the services and technologies are sold directly in the United States, the company sells internationally mostly through a network of channel partners. Customers can purchase technology solutions delivered as a managed security service, or they can engage the company with professional services, technology products, and systems integration services. Ongoing investments in MSS include new and enhanced offerings, global security operations centers, and acquisitions. Headquartered in Chicago, the company has regional headquarters in London, São Paulo (Brazil), and Sydney (Australia). In January 2013, the company opened its newest SOC in Manila, Philippines (see Table 1). 2 # IDC
3 TABLE 1 Trustwave Company Snapshot Category Target market Details Small, midsize, and large enterprises worldwide Founding year 1995 Number of employees 1,100+ Company headquarters Security operations centers (SOCs) Chicago, Illinois Denver, Colorado Chicago, Illinois Minneapolis, Minnesota Warsaw, Poland Manila, Philippines Web site Sales channels Direct, which accounts for most sales within the United States Indirect, which accounts for most sales internationally Revenue estimate $114 million (2012) in MSS revenue a subset of total company revenue Source: IDC, 2013 Financial Performance Trustwave is a privately held company that does not release financial information. However, the company states that its MSS business is growing at more than twice the industry rate. IDC estimates Trustwave's MSS revenue, a subset of overall company revenue, to be around $114 million for Customers and Contracts Trustwave supports more than 2 million businesses that are enrolled in the TrustKeeper cloud and managed security services platform, and it serves clients of all sizes, from multinational entities to single-location small businesses, in 96 countries. The company also has clients in verticals, including financial services, hospitality, franchise restaurants and hotels, hospitals and physician networks, and technology IDC #
4 Company Strategy Trustwave provides traditional managed services such as firewall/unified threat management (UTM), intrusion detection services/intrusion prevention system (IDS/IPS), and internal vulnerability scanning (IVS) and advanced services such as managed SIEM, SWG, WAF, and network access control (NAC). These advanced services are recent additions to the portfolio and include a new penetration testing offering. Trustwave infuses its services with threat intelligence from the company's SpiderLabs security team and external sources. Its MSS strategy is to offer services tailored to specific business types based on factors such as size, IT profile, and industry segment. The company's go-to-market plans are designed to capitalize on the following trends, which Trustwave believes are the key drivers of growth and adoption of MSS: Increasing number of new technologies within businesses as well as additional devices/platforms to secure (This trend is intensified by the increased use of social media, the cloud, and big data and growth in mobile devices and the bringyour-own-device [BYOD] phenomenon.) Controlling complexities related to day-to-day management, as well as mitigation of and response to advanced security threats Cost control, whether resulting from cuts in IT budgets or efforts to reduce operating expenses Shortage of IT resources and security skill sets Keeping pace with compliance regulations, both security controls for industry and government requirements Increased level of confidence in managing security through the cloud (As cloud solutions have evolved, many enterprises are becoming less apprehensive about working with outside security vendors.) Trustwave's go-to-market plans include several focal points: teaming with new customers, building relationships with existing customers, extending the partner network, enhancing the company's managed services portfolio, emphasizing flexibility and customer service, augmenting threat intelligence from internal and external sources, providing third-party product monitoring and management, supporting mandates and regulations beyond PCI, and focusing on vertical market offerings and international expansion. Current target markets include: Large and midmarket firms that are seeking to fully outsource their security services and/or that want to address the increase in advanced threats and cybercrime with threat intelligence 4 # IDC
5 Fortune 500 firms searching for hybrid solutions to supplement their in-house skills and resources with a shared responsibility model Midmarket firms with insufficient staff and resources to maintain an appropriate security posture Highly distributed environments including franchise-type businesses such as quick-service restaurants, hotels, and healthcare organizations (Typically, these businesses have inadequate information security skills to support remote locations.) Industry verticals, including financial services, manufacturing, retail, and utilities Services Delivered Trustwave's services are offered through cloud, customer premise equipment (CPE), and SaaS. The company supports integrations of threat intelligence, correlation, alerting, and remediation in the MSS portfolio with current and relevant attack signatures, vulnerability plug-ins, malware strains, and applied knowledge gleaned from its SpiderLabs research team as well as through proprietary and third-party sources, including penetration tests and forensic investigations. Threat intelligence is "woven into" its MSS, according to Trustwave, providing near-real-time protection from network, application, Web, and other threats. The company believes that "inline" controls, such as firewalls and intrusion prevention, are still best deployed via CPE and that other "out of band" technologies, including secure and file integrity monitoring (FIM), are better suited for the cloud. Trustwave powers its services with its own intellectual property, along with threat research and technologies. Additionally, Trustwave offers support for managing and monitoring a variety of third-party products deployed in customer environments. The company offers hybrid managed options for its managed services, especially for SIEM. Customers can opt to have Trustwave manage the health and status of a deployed SIEM appliance only or share in management support by providing supplementary log analysis services. Hybrid managed deployments are becoming more common, according to Trustwave, with SIEM hybrid managed services leading the way. The company also is seeing demand for hybrid WAF and NAC services. Trustwave provides MSS via a single monthly subscription fee that includes appliance hardware, software, and support costs. Trustwave's MSS portfolio includes: Authentication (AU) is an on-demand two-factor authentication solution. Compliance Validation Service (CVS) helps manage and monitor the overall compliance process and aids businesses in achieving compliance objectives IDC #
6 File Integrity Monitoring is a cloud-based solution that monitors OS and registry file data on Windows-based POS devices, laptops, desktops, and servers. Intrusion Prevention System is an asset-centric, enforcement technology that autotunes in real time to address vulnerabilities specific to the network complementing the firewall perimeter. Managed Security Information and Event Management solution collects, analyzes, and stores logs from networks, hosts, and critical applications. Managed Network Access Control provides full-feature NAC as a managed security service with proactive management, maintenance, and monitoring. Managed Security Testing is a subscription-based penetration testing service. Managed Secure Web Gateway addresses malware, zero-day vulnerabilities, and blended and advanced persistent threats (APTs). Secure service quarantines questionable traffic before it enters the network; protects confidential content via encryption; blocks spam, viruses, and malicious software; and inspects incoming and outgoing for inappropriate and unauthorized content. SpiderLabs Threat Intelligence includes daily feeds and quarterly summaries that supplement internal security expertise to improve an organization's ability to detect threats and prevent data breaches. Vulnerability Scanning Service enables an organization to meet compliance requirements while providing security, support, self-scan, and reporting capabilities. In more detail: External Vulnerability Scanning (EVS) is delivered via TrustKeeper Agent, a proprietary, automated vulnerability scanning engine within TrustKeeper, which tests for more than 3,000 unique vulnerabilities. Internal Vulnerability Scanning is a managed service delivered via a device or Trustwave Unified Threat Management that assesses and detects vulnerabilities across a company's internal network. Unified threat management is a managed service that provides security consolidated in a single piece of equipment that addresses security concerns and controls at the network perimeter. Web Application Firewall provides real-time, continuous security against attacks and data loss while maintaining compliance with industry regulations. Trustwave also offers optional fee-based consulting services specific to MSS support, called Trustwave Information Security Advisor consulting services. They help customers transition to a managed environment through scoping and implementation of services based on security gaps and the level of in-house information security expertise and support. 6 # IDC
7 In addition, Trustwave added new enterprise risk assessment services in 2013 that identify security gaps that managed services can address, provided a customer has the internal resources to support them (e.g., a mobile security assessment may suggest that NAC or SWG technology would control rogue access and malware in the environment). Platform/Technologies Trustwave's TrustKeeper portal/platform enables businesses to access subscriptionbased Trustwave offerings. The portal unifies the cloud and managed services developed by Trustwave's three business units: Compliance and Risk Management, Security Solutions/MSS, and Threat Intelligence and Research (aka SpiderLabs). The TrustKeeper portal offers customers a view into their events, alerts, and trends and provides self-service interaction with the SOC staff for change requests, ticketing, and other requests. Telephone support is available 24 x 7 in multiple languages, and the SOCs and staff are located to enable a follow-the-sun model. Over the past few years, Trustwave has increased the number of applications including some from acquisitions that can be accessed through the portal and expects to continue this effort. A standard operating system based on Linux called TrustOS and its TrustedSentry appliance provide standard platforms that promote integration and interoperability, as well as device and threat management from the SOCs. Trustwave's multitenant SIEM technology is used in Trustwave SOCs as a foundation for the company's MSS, providing data acquisition, normalization, correlation, analysis, and real-time reporting capabilities for vendors and open source data sources. Optionally, customers can employ log management appliances, designed for use with both MSS and licensed products, to extend their on-premise capabilities. Monitored/Managed Technologies In addition to delivering, monitoring, and managing its own set of security technologies, Trustwave also monitors more than 500 third-party devices and manages widely used third-party products. When bringing on a new client and throughout the relationship, Trustwave has a formalized process by which clients can request support and management for additional third-party products. Third-party device management gives Trustwave visibility and control (install, configure, monitor, correlate, analyze, etc.) for technologies from: Juniper NetScreen Fortinet Websense Sourcefire 2013 IDC #
8 Cisco Standards Trustwave supports the following standards: PCI DSS FFIEC GLBA HIPAA FISMA SOX NIST FIPS ISO 27001/2 With respect to security and threat intelligence capabilities, the company's support staff receives regular training and holds advanced certifications. The average staff member's tenure is 15 years. Partnerships Trustwave partners with a range of organizations, including global financial institutions, telecommunications companies, hosting providers, service providers, security integrators, and value-added resellers. The company supports its partners alliance, technology, and channel with specific programs to address each organization's needs and objectives through its portfolio. Geographic Coverage Trustwave operates in all major geographies worldwide, with customers in 96 countries. Operating with more than 1,100 employees, the company maintains a local presence in 26 countries. The company operates five SOCs in the cities of Chicago, Denver, Minneapolis, Manila (Philippines), and Warsaw (Poland). Additionally, the company says it has globally dispersed technical assistance, provisioning, and distribution centers. 8 # IDC
9 Mergers and Acquisitions Acquisitions include: Application Security Inc. (2013) for database and big data scanning technology, which is expected to augment MSS offerings SecureConnect (2013), which added MSS services for hospitality and retail verticals as well as customers operating in distributed environments (Trustwave also gained a SOC in Minneapolis through the acquisition.) M86 Security (2012) for advanced antimalware technology, secure Web gateway, secure gateway, and Web security (Trustwave has launched a managed SWG based on M86 technology.) Intellitactics (2010) for SIEM, which Trustwave uses both in its SOC and as a managed SIEM offering Breach Security (2010) for WAF and application security, which Trustwave uses for its managed WAF offering BitArmor (2010) for encryption Vericept (2009) for data loss prevention Mirage Networks (2009) for network access control, which Trustwave uses for its managed NAC offering FUTURE OUTLOOK IDC research indicates that MSS is growing at a double-digit growth rate of more than 10% in a five-year forecast period. IDC expects to publish its finalized forecast of this market by the end of 1Q14. Several factors are driving this trend: Increased complexity of security threats drives the need for a more holistic security posture. IT managers' knowledge that at a minimum in addition to a SOC they must have enhanced analytics, data consolidation, and global threat intelligence knowledge of advanced persistent threats and other adaptive, complex, and dynamic threats. 24 x 7 in-house security solutions are expensive, and expertise is scarce. In addition, IT managers know that they must have the correlation capability to keep the information of these threats flowing to critical areas of the organization. Budgetary pressures faced by chief information security officers (CISOs) can lead to "build versus buy" discussions. Engaging a security services provider can enable an organization to transfer the cost of ownership, thereby reducing capex and transferring the budget line item to opex. This step creates a predictable expense with a regular cadence in the budget cycle IDC #
10 The need for advanced security features leads companies to seek out a provider, such as Trustwave, that has enhanced security capabilities, with scalable and flexible security platforms capable of handling future expansion. And, like Trustwave, these providers often have research labs that study and monitor threat trends on a global basis, and the findings from these organizations are critical to helping enterprises deal with the latest threats. Correlation and analytics of data that comes from a large number of customers and sources enable a managed security services provider to have visibility into a large variety of threats on a global basis. Leveraging the scale and expertise of a service provider like Trustwave, therefore, can be beneficial to companies with geographically dispersed sites. ESSENTIAL GUIDANCE Advice for T r ustwave Trustwave has done a very good job of growing its MSS offering both organically and through acquisition. It continues to move its services both managed and professional up the stack to provide increased benefit to its customers. This year alone, Trustwave has invested in an additional SOC and added several advanced services. While market misperception has pigeonholed Trustwave into a PCIcompliance-only security services provider, the company has leveraged its knowledge and processes in the PCI arena to build out and provide compliance offerings across other regulatory standards as well. IDC believes that the hard work Trustwave has done will pay off in the coming years. There is a blessing and a curse of being one of the few remaining pure-play security services firms left standing. As this dynamic and disaggregated market consolidates, other larger firms will create significant competition for Trustwave. This could make Trustwave a significant acquisition, which may allow it to dictate its price when suitors come to call. All in all, IDC is impressed with the scale of Trustwave's offerings and looks forward to witnessing the company's future growth, in whatever form it may come to fruition. LEARN MORE Related Research Worldwide and U.S. Professional Security Services Forecast (IDC #241958, July 2013) 10 # IDC
11 Copyright Notice This IDC research document was published as part of an IDC continuous intelligence service, providing written research, analyst interactions, telebriefings, and conferences. Visit to learn more about IDC subscription and consulting services. To view a list of IDC offices worldwide, visit Please contact the IDC Hotline at , ext (or ) or sales@idc.com for information on applying the price of this document toward the purchase of an IDC service or for information on additional copies or Web rights. Copyright 2013 IDC. Reproduction is forbidden unless authorized. All rights reserved IDC #
2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
More information$ Drive awareness and increase participation. National account program. Flexible managed Security Solutions for hospitality
National Account Program Managed Security Solutions for Hospitality National account program Flexible managed Security Solutions for hospitality The Trustwave National Account Program is designed with
More informationSecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor
VENDOR PROFILE SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor Juan Sacchi IDC OPINION SecureData is a growing managed security services provider headquartered in the U.K. with
More informationW H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d a y ' s T h r e a t L a n d s c a p e
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R A T r u s t e d S e c u r i t y P a r t n e r : A M u s t - H a v e i n T o d
More informationSimplify Your Network Security with All-In-One Unified Threat Management
Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,
More informationINSIGHT. Cisco' s Continuing Services Evolution: Remote Management Services IDC OPINION IN THIS INSIGHT SITUATION OVERVIEW
INSIGHT Cisco' s Continuing Services Evolution: Remote Management Services Leslie Rosenberg Curtis Price Rob Brothers Chris Barnard IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701
More informationWorldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
More informationNEC Managed Security Services
NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationDETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD Protecting your infrastructure requires you to detect threats, identify suspicious
More informationSluggish Incident Response: Next-Generation Security Problems and Solutions
CUSTOMER NEEDS AND STRATEGIES Sluggish Incident Response: Next-Generation Security Problems and Solutions Christian A. Christiansen Christina Richmond Robert Westervelt IDC OPINION The rush to adopt technologies
More informationQRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
More informationSecurity solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
More informationCautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
More informationCloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T N i n e S t a r t - U p s a n d I n n o v a t o r s E x t e n d t h e C l o u d S y
More informationI D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More information1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationTrend Micro Cloud Security for Citrix CloudPlatform
Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing
More informationHow To Get A Better Desktop Management System
IDC MARKETSCAPE IDC MarketScape Excerpt: Worldwide Client Virtualization Software 2013 Vendor Assessment Brett Waldman Iris Feng THIS IDC MARKETSCAPE EXCERPT FEATURES: NCOMPUTING IDC MARKETSCAPE FIGURE
More informationCaretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
More informationWorldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares
Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market
More informationClavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
More informationOVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
More informationWAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
More informationIDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis
IDC MarketScape IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis Robert Young THIS IDC MARKETSCAPE EXCERPT FEATURES: CHERWELL SOFTWARE IDC MARKETSCAPE FIGURE FIGURE 1 IDC
More informationWebsense: Worldwide Leader in Web Filtering Expands into Web Security
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Websense: Worldwide Leader in Web Filtering Expands into Web Security Brian E. Burke
More informationWorldwide Cloud Systems Management Software 2013 Vendor Shares
COMPETITIVE ANALYSIS Worldwide Cloud Systems Management Software 2013 Vendor Shares Mary Johnston Turner IDC OPINION In 2013, the worldwide cloud systems management software competitive market showed very
More informationIDC MarketScape: Worldwide Datacenter Infrastructure Management 2015 Vendor Assessment
IDC MarketScape IDC MarketScape: Worldwide Datacenter Infrastructure Management 2015 Vendor Assessment Jennifer Koppy THIS IDC MARKETSCAPE EXCERPT FEATURES EMERSON NETWORK POWER IDC MARKETSCAPE FIGURE
More informationThe Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
More informationEnd-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationVulnerability Management for the Distributed Enterprise. The Integration Challenge
Vulnerability Management for the Distributed Enterprise The Integration Challenge Vulnerability Management and Distributed Enterprises All organizations face the threat of unpatched vulnerabilities on
More informationW o r l d w i d e a n d U. S. M a n a g e d M o b i l i t y 2 0 1 3 2 0 1 7 F o r e c a s t : U n i t e d S t a t e s L e a d s i n A d o p t i o n
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com M A R K E T A N A L Y S I S W o r l d w i d e a n d U. S. M a n a g e d M o b i l i t y 2 0 1 3 2
More informationSmarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist
Smarter Security for Smarter Local Government Craig Sargent, Solutions Specialist SUMMARY 1 Trustwave and SpiderLabs 2 Penetration Testing 3 Web Application Firewall (WAF) 4 Security Information & Event
More informationNorth American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
More informationLeveraging security from the cloud
IBM Global Technology Services Thought Leadership White Paper IBM Security Services Leveraging security from the cloud The who, what, when, why and how of cloud-based security services 2 Leveraging security
More informationIT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
More informationBusiness Case for Virtual Managed Services
Business Case for Virtual Managed Services Executive Summary Managed services allow businesses to offload day-to-day network management tasks to service providers and thus free up internal talent to focus
More informationAdvantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
More informationIDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis
IDC MarketScape IDC MarketScape: Worldwide Service Desk Management Software 2014 Vendor Analysis Robert Young THIS IDC MARKETSCAPE EXCERPT FEATURES: SERVICENOW IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape
More informationIT as a Service Emerges as a New Management Paradigm in the Software-Defined Datacenter Era
Customer Needs and Strategies IT as a Service Emerges as a New Management Paradigm in the Software-Defined Datacenter Era Mary Johnston Turner IDC OPINION IT as a service (ITaaS) represents a fundamentally
More informationAddressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
More informationTransformative Technology in Document Security
INSIGHT Transformative Technology in Document Security Arianna Valentini IDC OPINION The majority of organizations have taken steps in making sure that their IT environments are secure. Worldwide Security
More informationMicrosoft Office 365: How the Hosted Exchange Server Is Redefining SMB Cloud IT Adoption
INDUSTRY DEVELOPMENTS AND MODELS Microsoft Office 365: How the Hosted Exchange Server Is Redefining SMB Cloud IT Adoption Christopher Chute IDC OPINION Office 365 is Microsoft's next-generation email and
More informationCLOUD GUARD UNIFIED ENTERPRISE
Unified Security Anywhere CLOUD SECURITY CLOUD GUARD UNIFIED ENTERPRISE CLOUD SECURITY UNIFIED CLOUD SECURITY Cloudy with a 90% Chance of Attacks How secure is your cloud computing environment? If you
More informationCurrent IBAT Endorsed Services
Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network
More informationHow To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
More informationCirba Targets Software-Defined Infrastructure Control with Workload-Aware Predictive Analytics
Vendor Profile Cirba Targets Software-Defined Infrastructure Control with Workload-Aware Predictive Analytics Mary Johnston Turner David Immerman IDC OPINION Software-defined infrastructure (SDI) enables
More informationScienceLogic Offers Unified Infrastructure Monitoring and Analytics for Hybrid IT
VENDOR PROFILE ScienceLogic Offers Unified Infrastructure Monitoring and Analytics for Hybrid IT Mary Johnston Turner David Immerman IDC OPINION Enterprise datacenter infrastructure environments are becoming
More informationUnified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES
Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES SOX COMPLIANCE Achieving SOX Compliance with Professional Services The Sarbanes-Oxley (SOX)
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Monetizing the Cloud: XaaS Opportunities for Service Providers Sponsored by: EMC Brad Nisbet March 2011 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
More informationAchieving SOX Compliance with Masergy Security Professional Services
Achieving SOX Compliance with Masergy Security Professional Services The Sarbanes-Oxley (SOX) Act, also known as the Public Company Accounting Reform and Investor Protection Act of 2002 (and commonly called
More informationCloudCheck Compliance Certification Program
CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or
More informationModular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
More informationFIRN Secure Internet Bundled Services:
FIRN INTERNET SECURITY BUNDLE SERVICES AND NEW ADVANCED SECURITY OPTIONAL SERVICES (New Services and Prices Available July 1, 2014. CSAB Orders can be placed as early as March 1, 2014) Ethernet Bandwidth
More informationV E N D O R P R O F I L E. V e r i x P r i v a t e V e n d o r W a t c h l i s t P r o f i l e I D C O P I N I O N
V E N D O R P R O F I L E V e r i x P r i v a t e V e n d o r W a t c h l i s t P r o f i l e Dan Yachin Ryan Patterson I D C O P I N I O N Global Headquarters: 5 Speen Street Framingham, MA 01701 USA
More informationNetwork Management Services: A Cost-Effective Approach to Complexity
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F Network Management Services: A Cost-Effective Approach to Complexity
More informationI D C M a r k e t S c a p e : W o r l d w i d e M e s s a g i n g S e c u r i t y 2 0 1 3 2 0 1 4 V e n d o r A s s e s s m e n t
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com C O M P E T I T I V E A N A L Y S I S I D C M a r k e t S c a p e : W o r l d w i d e M e s s a g
More informationWorldwide DDI Market Update
Update Worldwide DDI Market Update Nolan Greene Petr Jirovsky IN THIS UPDATE This IDC update reviews the revenue and shipments of the worldwide DDI (DNS, DHCP, and IP address management [IPAM]) solutions
More informationEnterprise Security Solutions
Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E XCERPT M A R K E T A N A L Y S I S W o r l d w i d e S e c u r i t y a n d V u l n e r a b i l i
More informationSecuring business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security
Securing business data CNS White Paper Cloud for Enterprise Effective Management of Data Security Jeff Finch, Head of Business Development, CNS Mosaic 2nd July 2015 Contents 1 Non-Disclosure Statement...
More informationDNS Server Security Survey
EXECUTIVE BRIEF DNS Server Security Survey Sponsored by: EfficientIP Romain Fouchereau June 2014 INTRODUCTION With most organizations having some business linked to and more importantly relying on an online
More informationManaged Security Monitoring Quick Guide 5/26/15. 2014 EarthLink. Trademarks are property of their respective owners. All rights reserved.
Managed Security Monitoring Quick Guide 5/26/15 2014 EarthLink. Trademarks are property of their respective owners. All rights reserved. 2 Managed Security Monitoring - Overview Service Positioning EarthLink
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE IBM ISS: Two Years Later Jon Crotty Ramasubramoni. R Irida Xheneti Andrew J. Hanson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
More informationIBM Global Technology Services Preemptive security products and services
IBM Global Technology Services Preemptive security products and services Providing protection ahead of the threat Today, security threats to your organization leave little margin for error. To consistently
More informationConquering PCI DSS Compliance
Any organization that stores, processes or transmits information related to credit and debit card payments has a responsibility to protect each cardholder s personal data. To help accomplish this goal,
More informationBuilding a Web Security Ecosystem to Combat Emerging Internet Threats
I D C V E N D O R S P O T L I G H T Building a Web Security Ecosystem to Combat Emerging Internet Threats September 2005 Adapted from: Worldwide Secure Content Management 2005 2009 Forecast Update and
More informationTrustwave blocks Web-borne malware - guaranteed, or your money back
Trustwave blocks Web-borne malware - guaranteed, or your money back Analyst: Adrian Sanabria 16 Jul, 2014 Today, Trustwave makes a bold announcement a zero malware guarantee. The anti-malware market has
More information2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY
2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 1 EXECUTIVE SUMMARY INTRODUCING THE 2015 GLOBAL THREAT INTELLIGENCE REPORT Over the last several years, there has been significant security industry
More informationIBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
More informationConverged and Integrated Datacenter Systems: Creating Operational Efficiencies
Insight Converged and Integrated Datacenter Systems: Creating Operational Efficiencies Rob Brothers IDC OPINION Enterprise IT has moved away from siloed servers, storage, information, and processes and
More informationQ1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
More informationContinuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
More informationoverview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
More informationFull-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
More informationBEST PRACTICES RESEARCH
2013 Frost & Sullivan 1 We Accelerate Growth Market Leadership Award Vulnerability Management Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year of business with
More informationThe Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
More informationPCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
More informationManaged Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T T h e B u s i n e ss Value of Hyb r i d C l o u d - B a s e d C o m p r o m i s e I n t e l l i g e nce Monitoring and T h r e a t M i tigation February 2013
More informationSecurity is a top priority. The reasons for reliable network security keep growing.
Network Security Security is a top priority. The reasons for reliable network security keep growing. Convergence of voice and data networks Changing compliance regulations Explosion of Web 2.0 business
More informationTechnology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More informationWhat is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
More informationI D C E X E C U T I V E B R I E F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F P e netration Testing: Taking the Guesswork Out of Vulnerability
More informationProven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
More informationI D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
More informationIBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!
IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200
More informationSecurity. Security consulting and Integration: Definition and Deliverables. Introduction
Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data
More informationTrend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
More informationTom Reilly President & CEO, ArcSight
Tom Reilly President & CEO, ArcSight ArcSight Company Background Founded May 2000 2000+ customers 500+ employees, offices worldwide NASDAQ: ARST 20% Revenue growth year over year Analyst Recognition SIEM
More informationPCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
More informationCloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T W o r l d w i d e W e b S e c u r i t y 2 0 1 1-2 0 1 5 F o r e c a s t a n d 2 0 1
More information