Vendor Landscape: Unified Threat Management
|
|
|
- Kathleen McDaniel
- 9 years ago
- Views:
Transcription
1 Vendor Landscape: Unified Threat Management The perimeter firewall grows up & becomes a Swiss Army Knife of protection capabilities Info-Tech Research Group 1
2 Introduction Network security may be old-school, but it is not passé; the right perimeter protection means more threats stay outside & more data stays inside. This Research Is Designed For: This Research Will Help You: Enterprises seeking to select a network perimeter security appliance (Firewall/Unified Threat Manager/Next Generation Firewall) solution for comprehensive protection of the network edge. Enterprises that have established their network perimeter Firewall/UTM/NGFW (to be referred to simply as UTM hereafter for simplicity) strategy independently, and simply need guidance in evaluating available products. Understand the capabilities that are available in a modern network perimeter UTM solution. Evaluate network perimeter UTM vendors and products for your enterprise needs. Determine which products are most appropriate for particular use cases and scenarios. Info-Tech Research Group 2
3 Executive Summary Info-Tech evaluated ten competitors in the network perimeter UTM market, including the following notable performers: Champions: WatchGuard, with its balance of strong product and vendor capabilities at a market-leading price point, leads with a UTM solution that can deliver benefits to any organization. SonicWALL strong all round capabilities, focus on the Small/Medium enterprise, and price points that are hard to ignore makes this an easy vendor to like. Fortinet helped define the UTM term and space, and still leads the market with unmatched feature/functionality; pricing stabilization has eliminated its long-standing Achilles Heel. Value Award: WatchGuard s combination of stable and committed vendor, wellrounded product, and rock-bottom pricing earns the company the Best Overall Value Award. Innovation Award: Palo Alto with its App-ID, Content-ID, and User-ID technologies has defined the next frontier of perimeter protection, and established the new bar for the market. Info-Tech Insight 1. The only traffic that counts anymore is HTTP/S: As all traffic becomes Web traffic, controlling traffic flow by protocol becomes keyed to digging into Port 80 (and 443) traffic. 2. Inbound no longer the only direction in which threats flow: As security focus has shifted from infrastructure to data, protection needs to address outbound flow as much as inbound attacks. 3. Firewalls can t protect traffic they can t see: Encrypted traffic obfuscates threats from Firewalls while WiFi networks allow attacks to bypass them entirely; modern solutions must also control these traffic types. Info-Tech Research Group 3
4 Market Overview How it got here Firewalls as a theoretical concept were first postulated in the late 80 s and very shortly thereafter brought into existence as traffic-controlling security tools. Firewalls quickly evolved from simple packet-filters (that simply evaluated source, destination, and protocol) to stateful inspectors (that remembered the nature of ongoing communications and the provenance of packets in those communications), and proxies (that evaluated packet contents, rather than just the packets themselves). As threats increased through the early millennium, and became complex blended threats, more feature-rich UTM solutions evolved to deal with them. Essentially firewalls with integrated Anti-Malware and Intrusion Prevention capabilities, UTMs replaced multiple point solutions with a single integrated device that offered improved capability, simplified management and economy of scale cost savings. Where it s going UTMs are beginning to morph into Next Generation Firewalls (NGFW) that supplement the abilities of the traditional UTM with more content-aware capabilities such as: o URL/Web Content Filtering o Data Leakage Protection o Application-centric Control o User-centric Control In many ways NGFW however is simply a marketing term as leading UTMs have been gradually incorporating content-aware protection. As network traffic becomes ubiquitously Web traffic, content-level awareness becomes crucial; enterprises can continue to achieve appropriate protection through the deployment of older UTMs supplemented with newer point solutions, or they can once again consolidate, streamline, and improve through current UTM/NGFW solutions. As the market evolves, capabilities that were once cutting edge become default, and new functionality becomes differentiating. Integrated IPS and Anti-Malware have become Table Stakes capabilities and should no longer be used to differentiate solutions. Instead focus on Application and Identity-centric Control to get the best fit for your requirements. Info-Tech Research Group 4
5 UTM Vendor Landscape selection / knock-out criteria: Market share, mind share, and market consolidation Regardless of whether they are Firewalls, UTMs, or Next Gen Firewalls, the market is extremely stable, and represented by vendors with years of experience and significant market share. New vendors, such as Palo Alto Networks appear rarely and need to represent a phase shift to gain any traction in the space. For this Vendor Landscape, Info-Tech focuses on those vendors that have a strong market presence and/or reputational presence among small to mid-sized enterprises. Included in the Vendor Landscape: Astaro. An up-and-coming provider recently acquired by Sophos to broaden that vendor s security play. Barracuda. Supplemented its core spam and virus gateways with an NGFW through acquisition of Phion. Check Point. One of the progenitors of the firewall space, and still one of the most recognizable names. Cisco. The most widely deployed firewall solutions as the company has leveraged its networking market share. Fortinet. The vendor that coined the UTM term, and one of the first to incorporate enhanced capabilities. Juniper. Entered the firewall market through acquisition of NetScreen and has established a solid foothold since. McAfee. Acquisition of Secure Computing brought appliance lines, including firewall, to an established portfolio. Palo Alto. The latest entrant to the market of those reviewed, but the first to focus on application control. SonicWALL. SMB focused player now stretching its legs into the large enterprise space. WatchGuard. Another vendor growing into larger markets after early focus on the SMB space. Info-Tech Research Group 5
6 UTM Scoring Criteria & Weighting Factors Product Evaluation Features The solution provides basic and advanced feature/functionality. Features 30% 25% Usability Affordability The five year TCO of the solution is economical. Architecture 20% 30% Affordability Usability Architecture Vendor Evaluation Viability The solution s dashboard and reporting tools are intuitive and easy to use. The delivery method of the solution aligns with what is expected within the space. Vendor is profitable, knowledgeable, and will be around for the long-term. Product 50% 50% Vendor Strategy Vendor is committed to the space and has a future product and portfolio roadmap. Viability 30% 25% Strategy Reach Channel Vendor offers global coverage and is able to sell and provide post-sales support. Vendor channel strategy is appropriate and the channels themselves are strong. Channel 15% 30% Reach Info-Tech Research Group 6
7 The Info-Tech UTM Vendor Landscape Champions receive high scores for most evaluation criteria and offer excellent value. They have a strong market presence and are usually the trend setters for the industry. WatchGuard SonicWALL Market Pillars are established players with very strong vendor credentials, but with more average product scores. Palo Alto Juniper Barracuda Fortinet Innovators have demonstrated innovative product strengths that act as their competitive advantage in appealing to niche segments of the market. Astaro Emerging players are newer vendors who are starting to gain a foothold in the marketplace. They balance product and vendor attributes, though score lower relative to market Champions. Cisco Check Point McAfee For an explanation of how the Info-Tech Vendor Landscape is created, please see Vendor Evaluation Methodology in the appendix. Info-Tech Research Group 7
8 Balance vendor and product strengths to find the best fit for your enterprise Product Vendor Overall Features Usability Price Platform Overall Viability Strategy Reach Channel Astaro Barracuda Check Point Cisco Fortinet Juniper McAfee Palo Alto SonicWALL WatchGuard For an explanation of how the Info-Tech Harvey Balls are calculated, please see Vendor Evaluation Methodology in the appendix. Info-Tech Research Group 8
9 The Info-Tech UTM Value Index What is a Value Score? The Value Score indexes each vendor s product offering and business strength relative to their price point. It does not indicate vendor ranking. Vendors that score high offer more bang for the buck (e.g. features, usability, stability, etc.) than the average vendor, while the inverse is true for those that score lower. Champion On a relative basis, WatchGuard maintained the highest Info-Tech Value Score TM of the vendor group. Vendors were indexed against WatchGuard s performance to provide a complete, relative view of their product offerings. Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes Average Score: 45.7 For an explanation of how the Info-Tech Value Index is calculated, please see Value Index Ranking Methodology in the appendix. For an explanation of how normalized pricing is determined, please see Product Pricing Scenario & Methodology in the appendix. WatchGuard SonicWALL Juniper Fortinet 35 Astaro 34 Palo Alto 27 Barracuda 24 McAfee 17 Check Point 13 Cisco Info-Tech Research Group 9
10 Table Stakes represent the minimum standard; without these, a product doesn t even get reviewed The Table Stakes Feature Firewall VPN Anti-Malware Intrusion Prevention Description The solution includes a stateful inspection packet filter firewall Offers IPSEC (for site-to-site tunnels) and SSL VPN (for remote access) options Built-in perimeter anti-virus and antispyware protection Ability to recognize and restrict inappropriate and unauthorized access What Does This Mean? The products assessed in this Vendor Landscape TM meet, at the very least, the requirements outlined as Table Stakes. Many of the vendors go above and beyond the outlined Table Stakes, some even do so in multiple categories. This section aims to highlight the product capabilities in excess of the criteria listed here. If Table Stakes are all you need from your UTM solution, the only true differentiator for the organization is price. Otherwise, dig deeper to find the best price to value for your needs. Info-Tech Research Group 10
11 Advanced Features are the market differentiators that make or break a product Scoring Methodology Info-Tech scored each vendor s features offering as a summation of their individual scores across the listed advanced features. Vendors were given 1 point for each feature the product inherently provided. Some categories were scored on a more granular scale with vendors receiving half points (see Partial functionality criteria). Advanced Features Feature Identity-Based Control Data Leakage Protection Network Access Control URL Filtering Application Control WiFi Network Control WAN Routing & Optimization Encrypted Data Control What We Looked For Mapping of specific security policies to defined user groups and individuals Restriction on the egress of sensitive, privileged, or confidential data Endpoint interrogation to ensure each connecting device has appropriate security Restrictive filtering of Web surfing to limit exposure to harmful and inappropriate sites Ability to restrict, on a granular level, which Web apps are allowed to run Ensuring WiFi networks have the same security stance and abilities as the perimeter Dynamic routing of WAN traffic backed by QoS and prioritization capabilities Native decryption and re-encryption of SSL and SFTP traffic for thorough inspection Info-Tech Research Group 11
12 Each vendor offers a different feature set; concentrate on what your organization needs. Identity DLP NAC Web Apps WiFi WAN Encryption Astaro Barracuda Check Point Cisco Fortinet Juniper McAfee Palo Alto SonicWALL WatchGuard Legend = Feature fully present = Feature partially present / pending = Feature absent Info-Tech Research Group 12
13 WatchGuard; solid capability and stellar pricing Champion Product: Employees: Headquarters: Website: Founded: Presence: XTM 5 Series 400+ Seattle, WA WatchGuard.com 1996 Privately Held Overview WatchGuard strongly, though no longer exclusively, focuses on the firewalling needs of the SMB space. The company is strong, the products able, and the pricing can t be beat. Strengths XTM 5 Series line comprised of 4 license key upgradeable models; when requirements outgrow capabilities, a rip-andreplace upgrade is completely avoided. Company earns top strategy marks by focusing exclusively on the edge protection market and primarily on the needs of small to mid-sized businesses. Challenges 3 Year TCO between $50,000 and $100,000 A feature set that is good, but not great (no DLP, NAC, or WiFi network management) may limit the appeal for businesses seeking comprehensively consolidated solutions. On-going market consolidation may exert considerable pressure on WatchGuard as competition gets deeper pockets and leveraged sales opportunities. Info-Tech Recommends: Small/Medium businesses looking for solid feature functionality at an absolute rock-bottom price will find a lot to like in WatchGuard and their XTM line of appliances. Info-Tech Research Group 13
14 SonicWALL; the best combination of features and price Champion Product: Employees: Headquarters: Website: Founded: Presence: Network Security Appliance 900+ San Jose, CA SonicWALL.com 1991 Privately Held Overview SonicWALL offers a broad range of network security products and services, for enterprises of all sizes (although core focus continues to be SMB). In this review, its tools have the best combination of features and price. Strengths SonicWALL s Cavium multi-core processor architecture offers massively parallel processing allowing for proxy and reassembly-free packet-by-packet Deep Packet Inspection. With over 1 million devices shipped, the company is a market leader in its target SMB market (and is growing in the enterprise) and is likely to be around for the long-haul. Challenges 3 Year TCO between $50,000 and $100,000 The use of specialized processors means no software-only products exist, and raises questions of how functional the forthcoming virtual appliances will be. SonicWALL writes its own signatures for its detection engines; this gives them notable control and flexibility, but may impede response rates compared to syndicated feeds. Info-Tech Recommends: SonicWALL s comprehensive feature/functionality, diversity of device options, and attractive pricing make it an ideal choice for enterprises looking for a physical appliance-based solution. Info-Tech Research Group 14
15 Fortinet; the most feature-rich solution on the market Champion Product: Employees: Headquarters: Website: Founded: Presence: FortiGate 1,300+ Sunnyvale, CA Fortinet.com 2000 NASDAQ: FTNT FY10 Revenue: $325M Overview Fortinet broke the firewall mold with its original FortiGate and helped define the UTM Market. It continues to lead the way with the broadest feature set in this review. Strengths The most feature-rich solution evaluated, and the only one to have capability in every identified advanced feature. Continues to push boundaries, and add new features (e.g. Vulnerability Scanning). Dedicated threat and product research teams ensure capabilities and protection always on leading edge. Challenges 3 Year TCO between $100,000 and $250,000 The use of dedicated FortiASIC processors drives high performance today, but may limit flexibility tomorrow as it requires the company to invest in hardware R&D as well as functionality R&D. As markets consolidate, the question exists whether Fortinet is large enough to maintain viability and fend off advances. Info-Tech Recommends: Fortinet offers the most feature-rich and complete solution available and does so at a price that can no longer be considered punitive; a must evaluate option for all enterprises. Info-Tech Research Group 15
16 Barracuda; highly capable solution, but gets expensive quickly Innovator Product: Employees: Headquarters: Website: Founded: Presence: NG Firewall 700+ Campbell, CA Barracuda.com 2003 Privately Held Overview Barracuda built its business on low-cost, high function spam and malware firewalls, and has continued to grow its portfolio. It entered the NGFW market via its 2009 acquisition of Phion. Strengths NGFW offers flexibility of hardware, software, and virtual appliance deployment methods, and is integrated well into the broad Barracuda product line. Unique 100% historical revision auditing system allows clients to easily roll-back to previous configuration versions, should errors or mis-configurations be detected. Challenges 3 Year TCO between $100,000 and $250,000 Penetration of the NGFW into the company s existing partner channel minimal so far, and most partners are focused on the large enterprise; finding an SMB partner may be a challenge. Though low-end boxes are inexpensive, mid-tier device prices scales rapidly, making Barracuda one of most expensive solutions in this evaluation. Info-Tech Recommends: Enterprises looking for the pinnacle of protection will do well to evaluate Barracuda s offering, those looking for mid-pack functionality and bottom-end pricing should look elsewhere. Info-Tech Research Group 16
17 Juniper; one of the strongest application control suites Innovator Product: Employees: Headquarters: Website: Founded: Presence: SRX 2,000+ Sunnyvale, CA Juniper.net 1996 NYSE: JNPR FY10 Revenue: $4.1B Overview Juniper is a pure-play, high performance networking company; its acquisition of NetScreen in 2004 formed the basis of its enterprise firewall capabilities, one segment of its marketleading security portfolio. Strengths Use the proprietary JUNOS operating system ubiquitously across all product lines; give consistency of performance and consistency of management for Juniper shops. AppSecure portfolio of interlinked capabilities (AppTrack, AppQoS, AppFirewall, and APPDoS) is one of the strongest application control solutions currently available. Challenges 3 Year TCO between $50,000 and $100,000 Deployment options effectively limited to hardware solutions; though virtual appliances exist, their functionality at this time is a subset of that offered by the dedicated hardware appliances. Info-Tech Recommends: Juniper offers an excellent blend of pricing and capability and is a company with a proven trackrecord; Juniper shops will find an excellent fit, and others will find a worthy option. Info-Tech Research Group 17
18 Palo Alto; disruptive product that is redefining the market Innovator Product: Employees: Headquarters: Website: Founded: Presence: PA Series 420 Santa Clara, CA PaloAltoNetworks.com 2005 Privately Held Overview Founded by ex-check Point and NetScreen executives and engineers, Palo Alto released their first appliances in 2007 and instantly established themselves as leaders in the NGFW revolution. Strengths App-ID, Content-ID, User-ID are market-leading capabilities and have forced other UTM vendors into catch-up mode on these next generation capabilities. Though not the cheapest solution, the company offers its class-leading capability for middle-of-the-pack pricing. Challenges 3 Year TCO between $100,000 and $250,000 Products extremely capable, but market penetration so far very low with count of deployed devices in the thousands, rather than the hundreds of thousands for competitors; definitely the smallest player evaluated. Hardware-only deployment options (though model line not overly cluttered like many competitors) may limit applicability. Info-Tech Recommends: Though small, Palo Alto has a top-notch product and is already establishing a solid reputation; expansion of product line to include PA-500 makes it worthy, even for smaller enterprises. Info-Tech Research Group 18
19 Check Point; price premium not necessarily warranted Market Pillar Product: Employees: Headquarters: Website: Founded: Presence: UTM-1 2,200 Tel Aviv, Israel CheckPoint.com 1993 NASDAQ: CHKP FY10 Revenue: $1.0B Overview One of the first firewall providers, and still a market-share leader, Check Point offers firewalls (and related security tools) of all capacities and capabilities, to clients of all sizes. Strengths Delivers significant architectural flexibility via its Software Blade architecture that allows enterprises to customize protection by need and platform. A support network that is truly monumental in size; on-site support in over 250 countries and multi-region stock depots for fast delivery of spares, even into difficult locations. Challenges 3 Year TCO between $100,000 and $250,000 Broad portfolio of deployment options includes significant amount of overlap. Determining optimal solution for every need potentially confusing and difficult. Lack of WiFi and built-in SSL decryption means enterprises looking to address all ingress options may need supplementary solutions. Info-Tech Recommends: Check Point reputation likely to draw reviews, Check Point price premium likely to deter SMBs when smaller names offer better price points on more capable solutions. Info-Tech Research Group 19
20 Astaro; flexible, capable solution with expensive subscriptions Market Pillar Product: Employees: Headquarters: Website: Founded: Presence: Security Gateway 230 Karlsruhe, Germany Astaro.com 2000 Privately Held Overview Smaller vendor that is dedicated to perimeter protection and focused on the SMB space; recently acquired by marketleading Anti-Malware company Sophos. Strengths Well rounded solution that offers good blend of capability with flexible deployment options (software primarily, but hardware and virtual appliances options available). Remote Ethernet Device (RED) uniquely allows SMBs to extend firewall capability into small branches without actually deploying a firewall Challenges 3 Year TCO between $100,000 and $250,000 Appliances have attractive pricing, but TCO grows rapidly as a result of expensive subscription services; what seems a cheap solution at first really isn t when bells and whistles are added. Recent acquisition by Sophos enhances viability, but integration pains inevitable as the two companies synthesize. Info-Tech Recommends: Subscription service pricing keeps this flexible and capable solution out of the Champion zone; those looking for basic capabilities will find value, those wanting more may wish to look elsewhere. Info-Tech Research Group 20
21 McAfee; solid option, especially for McAfee (and epo) shops Market Pillar Product: Employees: Headquarters: Website: Founded: Presence: Firewall Enterprise 6,378 San Clara, CA McAfee.com 1987 NASDAQ: INTC FY10 Revenue: $2.1B Overview Now a wholly-owned division of Intel, McAfee is the world s largest dedicated security solutions provider. It entered the firewall market via its 2008 acquisition of Secure Computing. Strengths Viability, reach, and channel capabilities that are second to none make this a vendor that enterprises can trust. Management console integrates with epolicy Orchestrator (epo), McAfee s holistic management platform: allows for management of the entire McAfee stack via a single console. Challenges 3 Year TCO between $100,000 and $250,000 Third-party integrations (CrossBeam, RiverBed) indicate that company focus is on the large enterprise, not SMB, client. Concerns over the impact of the Intel acquisition lessening, but still not yet completely alleviated, particularly in relation to McAfee s hardware business. Info-Tech Recommends: A solution that all McAfee shops should evaluate as a viable option; for those without epo, Firewall Enterprise is solid, but unspectacular and better options exist. Info-Tech Research Group 21
22 Cisco; little functionality beyond the most basic capabilities Market Pillar Product: Employees: Headquarters: Website: Founded: Presence: ASA 5500 Series 73,000+ San Jose, CA Cisco.com 1984 NASDAQ: CSCO FY09 Revenue: $40.0B Overview By virtue of leveraging its dominant networking market share, Cisco is one of the largest firewall vendors in the world, though most of this is via older (and simpler) PIX firewalls. Strengths As the largest vendor in the space, and indeed one of the largest technology companies in the world, Cisco s viability is unparalleled. Partner and support networks that are unmatched in terms of size and distribution. Challenges 3 Year TCO between $100,000 and $250,000 Solution available as a hardware option only; devices offer no advanced functionality by default, relying on expansion cards instead, but each chassis has only a single expansion slot so functionality options are very limited. Cisco s predominant focus is networking, so security is definitively a non-core focus. Info-Tech Recommends: Cisco s ASA is advanced in name only; feature/functionality is so limited that it is all but impossible to recommend the solution to any enterprise. Info-Tech Research Group 22
23 Identify leading candidates with the UTM Vendor Shortlist Tool The Info-Tech UTM Vendor Shortlist Tool is designed to generate a customized shortlist of vendors based on your key priorities. This tool offers the ability to modify: Overall Vendor vs. Product Weightings Top-level weighting of product vs. vendor criteria Individual product criteria weightings: Features Usability Affordability Architecture Individual vendor criteria weightings: Viability Strategy Reach Channel Info-Tech Research Group 23
24 To protect against subversive traffic, network protection must first be able to see it Wireless and encrypted traffic can bypass the perimeter; protecting these entry methods is essential. Exemplary Performers 1 Holistic Protection From All Inbound Traffic 2 Feature/Price Balance Viable Performers 3 Complete Protection Adequate Performers 4 Info-Tech Research Group 24
25 Price/performance blend key factor to most SMB s Product bang-for-the-buck comes from evaluating features and price, leaving all other factors aside. Exemplary Performers 1 Protection From All Traffic 2 Balance Between Cost And Capability Viable Performers 3 Complete Protection Adequate Performers 4 Info-Tech Research Group 25
26 When nothing but the best will do the pinnacle of ability Top end capability a measure of functionality and usability; leveraging the one always requires the other. Exemplary Performers 1 Protection From All Traffic 2 Feature/Price Balance Viable Performers 3 The Most Capable Product, Money No Object Adequate Performers 4 Info-Tech Research Group 26
27 Appendix 1. Vendor Evaluation Methodology 2. Value Index Ranking Methodology 3. Product Pricing Scenario & Methodology Info-Tech Research Group 27
28 1. Vendor Evaluation Methodology Info-Tech Research Group s Vendor Landscape market evaluations are a part of a larger program of vendor evaluations which includes Solution Sets that provide both Vendor Landscapes and broader Selection Advice. From the domain experience of our analysts as well as through consultation with our clients, a vendor/product shortlist is established. Product briefings are requested from each of these vendors, asking for information on the company, products, technology, customers, partners, sales models and pricing. Our analysts then score each vendor and product across a variety of categories, on a scale of 0-10 points. The raw scores for each vendor are then normalized to the other vendors scores to provide a sufficient degree of separation for a meaningful comparison. These scores are then weighted according to weighting factors that our analysts believe represent the weight that an average client should apply to each criteria. The weighted scores are then averaged for each of two high level categories: vendor score and product score. A plot of these two resulting scores is generated to place vendors in one of four categories: Champion, Innovator, Market Pillar, and Emerging Player. For a more granular category by category comparison, analysts convert the individual scores (absolute, non-normalized) for each vendor/product in each evaluated category to a scale of zero to four whereby exceptional performance receives a score of four and poor performance receives a score of zero. These scores are represented with Harvey Balls, ranging from an open circle for a score of zero to a filled in circle for a score of four. Harvey Ball scores are indicative of absolute performance by category but are not an exact correlation to overall performance. Individual scorecards are then sent to the vendors for factual review, and to ensure no information is under embargo. We will make corrections where factual errors exist (e.g. pricing, features, technical specifications). We will consider suggestions concerning benefits, functional quality, value, etc; however, these suggestions must be validated by feedback from our customers. We do not accept changes that are not corroborated by actual client experience or wording changes that are purely part of a vendor s market messaging or positioning. Any resulting changes to final scores are then made as needed, before publishing the results to Info-Tech clients. Vendor Landscapes are refreshed every 12 to 24 months, depending upon the dynamics of each individual market. Info-Tech Research Group 28
29 2. Value Index Ranking Methodology Info-Tech Research Group s Value Index is part of a larger program of vendor evaluations which includes Solution Sets that provide both Vendor Landscapes and broader Selection Advice. The Value Index is an indexed ranking of value per dollar as determined by the raw scores given to each vendor by analysts. To perform the calculation, Affordability is removed from the Product score and the entire Product category is reweighted to represent the same proportions. The Product and Vendor scores are then summed, and multiplied by the Affordability raw score to come up with Value Score. Vendors are then indexed to the highest performing vendor by dividing their score into that of the highest scorer, resulting in an indexed ranking with a top score of 100 assigned to the leading vendor. The Value Index calculation is then repeated on the raw score of each category against Affordability, creating a series of indexes for Features, Usability, Viability, Strategy and Support, with each being indexed against the highest score in that category. The results for each vendor are displayed in tandem with the average score in each category to provide an idea of over and under performance. The Value Index, where applicable, is refreshed every 12 to 24 months, depending upon the dynamics of each individual market. Info-Tech Research Group 29
30 3. Product Pricing Scenario & Methodology Info-Tech Research Group provided each vendor with a common pricing scenario to enable normalized scoring of Affordability, calculation of Value Index rankings, and identification of the appropriate solution pricing tier as displayed on each vendor scorecard. Vendors were asked to provide list costs for UTM appliances to address the needs of a reference organization described in the following pricing scenario. Additional consulting, deployment, and training services were explicitly out of scope of the pricing request, as was the cost of enhanced support options beyond the minimum required to provide 24/7 protection, though vendors were encouraged to highlight any such items included with the base product acquisition. The annual software/hardware maintenance rate was also requested, along with clarity on whether or not the first year of maintenance was included in the quoted license costs, allowing a three-year total acquisition cost to be calculated for each vendor s solution. This three-year total acquisition cost is the basis of the solution pricing tier indicated for each vendor. Finally, the vendors three-year total acquisition costs were normalized to produce the Affordability raw scores and calculate Value Index ratings for each solution. Key elements of the common pricing scenario provided to UTM vendors included: A three-site organization with 2200 employees located at a US head office facility, a second US satellite office, and a European satellite office. IT functions, including 3 dedicated IT security professionals, are located primarily at the US head office, with a small proportion of IT staff and systems located at the European site, which also acts as a DR facility. The firm is interested in providing comprehensive hardware-based network perimeter protection for all three locations. It is seeking a solution that can be centrally managed across all locations via a single location and single management console (where possible). Headoffice and DR facilities require fully redundant infrastructure to ensure optimal continuity of connectivity. The firm defines comprehensive protection as including the following capabilities: Firewalling IPSEC and SSL VPN Intrusion Prevention Gateway Anti-Malware Network Access Control Data Leakage Protection Info-Tech Research Group 30
Vendor Landscape: Uninterruptible Power Supply (UPS)
Vendor Landscape: Uninterruptible Power Supply (UPS) A consolidating market with few viable vendors and many solutions. Info-Tech Research Group 1 Introduction The UPS market is dominated by few, but many
Vendor Landscape: Endpoint Encryption
Vendor Landscape: Endpoint Encryption Encryption from beginning to end(point) Introduction The Endpoint Encryption market is evolving alongside the data it protects by expanding its mobile encryption capabilities.
Vendor Landscape: Business Process Management (BPM) Suites Design your workdays with a suite solution.
Vendor Landscape: Business Process Management (BPM) Suites Design your workdays with a suite solution., Inc. Is a global leader in providing IT research and advice. Info-Tech s products and services combine
Select a Web Conferencing Vendor
Select a Web Conferencing Vendor Hear me, see me, show me, teach me. Info-Tech Research Group 1 Introduction The Web Conferencing Vendor Landscape is dominated by established vendors each offering their
Vendor Landscape: Security Information & Event Management (SIEM)
Vendor Landscape: Security Information & Event Management (SIEM) Optimize IT security management and simplify compliance with SIEM tools., Inc. Is a global leader in providing IT research and advice. Info-Tech
Vendor Landscape: Enterprise Service Desk Software
1234 Vendor Landscape: Enterprise Service Desk Software Move past tickets to proactive, integrated service., Inc. Is a global leader in providing IT research and advice. Info-Tech s products and services
Vendor Landscape: Disk Backup
Point your efforts at the best target to meet your backup needs., Inc. Is a global leader in providing IT research and advice. Info-Tech s products and services combine actionable insight and relevant
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview October 2010 Matias Cuba - Regional Sales Manager Northern Europe About Palo Alto Networks Palo Alto Networks is the Network
Vendor Landscape: Enterprise ERP
It is no longer just about SAP or Oracle; large enterprises now have a variety of options., Inc. Is a global leader in providing IT research and advice. Info-Tech s products and services combine actionable
Vendor Landscape: Legacy Software Modernization
Vendor Landscape: Legacy Software Modernization An increasingly vital and challenging effort of epic proportions. Info-Tech Research Group 1 Introduction Early efforts to modernize legacy systems had disappointing
High Performance NGFW Extended
High Performance NGFW Extended Enrique Millán Country Manager Colombia [email protected] 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Vendor Landscape: SaaS HRIS/HRMS
Vendor Landscape: SaaS HRIS/HRMS Automating and integrating HR for heightened strategic capabilities. McLean & Company 1 Introduction The strategic value of Human Resources is only gaining significance,
How To Get A Fortinet Security System For Free
Fortinet FortiGate Appliances Earn Coveted Recommend Ratings from NSS Labs in Next Generation Firewall, IPS, and Network Firewall in NSS Labs Group Tests Fortinet s Enterprise-Class Triple Play Fortinet
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security White Paper September 2003 Abstract The network security landscape has changed dramatically over the past several years. Until
Cisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
Vendor Landscape: Mid-Market ERP
Cloud ERP dominates this market., Inc. Is a global leader in providing IT research and advice. Info-Tech s products and services combine actionable insight and relevant advice with ready-to-use tools and
Vendor Landscape: Talent Acquisition Systems
Vendor Landscape: Talent Acquisition Systems Find the right solution to automate your requisition-to-hire process 1 Introduction Choosing a Talent Acquisition System to automate the requisition-to-hire
McAfee Endpoint Protection Products
McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough
Simple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
Cyberoam Perspective BFSI Security Guidelines. Overview
Overview The term BFSI stands for Banking, Financial Services and Insurance (BFSI). This term is widely used to address those companies which provide an array of financial products or services. Financial
2016 Firewall Management Trends Report
2016 Firewall Management Trends Report A survey of trends in firewall use and satisfaction with firewall management JANUARY 2016 Copyright 2016 Skybox Security, Inc. All rights reserved. Skybox is a trademark
The Fortinet Secure Health Architecture
The Fortinet Secure Health Architecture Providing Next Generation Secure Healthcare for The Healthcare Industry Authored by: Mark Hanson U.S. Director Fortinet, Inc. - Healthcare Introduction Healthcare
The Fortinet Secure Health Architecture
The Fortinet Secure Health Architecture Providing End-to-End Security for Modern Healthcare Organizations Introduction Healthcare providers are migrating from large, independent stand alone organizations
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
Providing Secure IT Management & Partnering Solution for Bendigo South East College
Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Vendor Landscape: Systems Management
Vendor Landscape: Systems Management Today s complex data centers are driving more sophisticated systems management solutions. Info-Tech Research Group 1 Introduction Systems Management can cover a wide
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
High performance security for low-latency networks
High performance security for low-latency networks Fortinet solutions for the financial services sector Financial Services Fortinet solutions protect your network and proprietary data without compromising
10 easy steps to secure your retail network
10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015
The Attacker s Target: The Small Business
Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection
Internal Network Firewall (INFW) Protecting your network from the inside out
Internal Network Firewall (INFW) Protecting your network from the inside out Ted Maniatis, SE Central Canada Fortinet Technologies Data Connectors 2015 Copyright Fortinet Inc. All rights reserved. Agenda
Fortigate Features & Demo
& Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Clean VPN Approach to Secure Remote Access for the SMB
Clean VPN Approach to Secure Remote Access for the SMB A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond
Vendor Landscape: Field Service Automation
Ensure proactive field service and collaboration in the age of extreme mobility., Inc. Is a global leader in providing IT research and advice. Info-Tech s products and services combine actionable insight
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Securing the Small Business Network. Keeping up with the changing threat landscape
Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not
Check Point Positions
Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.
Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs
Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs P/N 500205 July 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 1 Integrated VPN/firewall Page 2 placed
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
Check Point taps the power of virtualization to simplify security for private clouds
Datasheet: Check Point Virtual Systems Check Point taps the power of virtualization to simplify security for private clouds Looking for ways to reduce complexity and simplify network security in your private
Network protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
Sophos Acquires Cyberoam
Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam
Achieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
Next-Generation Firewall Market Analysis: The SonicWALL Difference CONTENTS
Next-Generation Firewall Market Analysis: The SonicWALL Difference SonicWALL advantages over Check Point, Cisco, Fortinet, Juniper, and Palo Alto Networks CONTENTS Introduction 2 Application Intelligence
Virtual Private Networks Secured Connectivity for the Distributed Organization
Virtual Private Networks Secured Connectivity for the Distributed Organization FORTINET VIRTUAL PRIVATE NETWORKS PAGE 2 Introduction A Virtual Private Network (VPN) allows organizations to securely connect
Select and Implement a Managed File Transfer Solution
1234 Select and Implement a Managed File Transfer Solution Secure file transfers today and avoid worrying about tomorrow. Info-Tech Research Group, Inc. Is a global leader in providing IT research and
Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network
Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network December 2008 Palo Alto Networks 232 E. Java Dr. Sunnyvale,
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
CIO Update: The Gartner Firewall Magic Quadrant for 2H02
IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market
PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data
White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and
White Paper. ZyWALL USG Trade-In Program
White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...
Next Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
Next Generation Enterprise Network Security Platform
Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
The Evolution of the Enterprise And Enterprise Security
The Evolution of the Enterprise And Enterprise Security Introduction Today's enterprise is evolving rapidly, with new technologies such as consumer-grade mobile devices, internet-based applications and
Unified Threat Management Throughput Performance
Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did
Securing the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Requirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
Next-Generation Firewalls: CEO, Miercom
Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology
EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals
Blue Coat Systems Adds Security And Control To WAN Optimization Appliances The Forrester Wave Vendor Summary, Q3 2007 by Robert Whiteley with Simon Yates and Rachel Batiancila EXECUTIVE SUMMARY Blue Coat
Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.
Juniper Networks Next Generation Security for a Cybercrime World Lior Cohen Principal Solutions Architect Scott Lucas Director of Product Marketing, Branch Solutions Service Layer Technologies Business
MEETING CSIP OBJECTIVES WITH AN AUTOMATED AND PREVENTIVE SECURITY APPROACH
MEETING CSIP OBJECTIVES WITH AN AUTOMATED AND PREVENTIVE SECURITY APPROACH A Palo Alto Networks and Channel Partner Case Study Every day, the U.S. federal government experiences increasingly sophisticated
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy [email protected]
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy [email protected] About Palo Alto Networks We are the network security company World-class
Using Palo Alto Networks to Protect the Datacenter
Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular
Clean VPN Approach to Secure Remote Access
Clean VPN Approach to Secure Remote Access A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond the Perimeter
Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions
Data Sheet Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
NGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
