How To Evaluate An It Security Management Vendor

Size: px
Start display at page:

Download "How To Evaluate An It Security Management Vendor"

Transcription

1 Markets, M. Nicolett Research Note 24 March 2003 The IT Security Management Magic Quadrant Lacks Leaders Vendors in the Gartner 1H03 IT Security Management Magic Quadrant are being driven by the need for real-time security data analysis and faster reactions to security incidents. Core Topic Security and Privacy: Security Tools, Technologies and Tactics Key Issue Which vendors will emerge as leaders in the information security domain? Strategic Planning Assumptions By 2006, 50 percent of IT security management point solution vendors will exit the market by acquisition or business failure (0.7 probability). By year-end 2004, at least three of the network and systems management and broad-scope security vendors will meet IT security management functional requirements for security device and IT Infrastructure elements (0.8 probability). Vendors in the IT security management market provide technology to meet the needs of IT security operations personnel who require real-time analysis of security data from network devices, servers, PCs and applications to mitigate internal and external security threats and document the state of enterprise IT security (see "The Emerging IT Security Management Market"). The core value proposition of IT security management is the correlation of security data from multiple devices and systems to enable better security assessment and more-rapid corrective action (see "IT Security Management Technology Evaluation Criteria"). IT Security Management Market Trends The primary drivers of this evolving market are: The failure of intrusion detection systems (IDSs) to separate real threats from the background noise of ineffective probes, false alarms and normal system changes The need for enterprises to discover, investigate and mitigate internal and external security breaches and policy violations The need for enterprises to document and manage the general state of IT security to satisfy audit and regulatory requirements For more information on the IT security management market, see "IT Security Management Market Drivers and Inhibitors." The IT security management market is made up of small, immature, privately held point solution vendors, as well as security and systems management software vendors that have large installed bases for their primary products and diversified revenue streams. This market has passed the stages of early evolution and is poised for rapid growth from 2003 to Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 There are signs of general convergence on a core set of capabilities. We expect significant market consolidation, primarily through the acquisition of point solution vendors by larger systems and security management vendors that lack core capabilities in this area. During 2006, we expect the IT security management market to be pressured by the removal of one of its primary drivers: the failure of IDS. During this period, we expect broad market acceptance of security platforms that provide intrusion prevention capabilities to replace first generation IDSs. We present Gartner's 1H03 IT Security Management Magic Quadrant in Figure 1. Figure 1 1H03 IT Security Management Magic Quadrant Challengers Leaders Ability to Execute IBM Tivoli Symantec NetIQ Computer Associates BindView Addamark Technologies Micromuse NetForensics Network e-security Intelligence Intellitactics OpenService ArcSight GuardedNet As of March 2003 Niche Players Visionaries Completeness of Vision Source: Gartner Research IT Security Management Magic Quadrant Evaluation Criteria Gartner's Magic Quadrant is a graphical portrayal of vendor performance in a market segment, based on viability, service/support, features and functionality, and technology. Ability to Execute: A vendor's ability to execute is how well Gartner expects it to perform. Key criteria for a vendor's ability to execute include its: Installed base and distribution channel Financial parameters 24 March

3 Speed to market and time in market Support reputation Completeness of Vision: An IT security management vendor's completeness of vision is how well its offerings match current and emerging market requirements. It is also an indicator of how Gartner expects the vendor to do in the future, based on where the market is headed. For the "features, functionality and technology" evaluation, we heavily weighted the ability to collect and correlate data from network security devices, based on the relatively high percentage of client calls with this particular focus. We also believe that the direction of the technology must also be the integration of network threat information with server vulnerability assessment and policy compliance data. A smaller percentage of client calls have a focus on the analysis of data collected from the IT infrastructure and application layers (for example, nonsecurity devices, servers and applications); however, we have also assigned a high weight to this requirement, because the losses associated with internal security breaches exceed those from external intrusions. It is important to note that the most complete IT security management function with respect to the server and application layers is provided by a few of the larger network and systems management and broad scope security software vendors. Other technology-oriented evaluation criteria include: Correlation Scalability Real-time monitoring and displays Historical analysis and reporting Imbedded knowledge Magic Quadrants are meant to provide an understanding of vendor positioning and to set vendor performance expectations. Enterprises should not look to any one quadrant when selecting a vendor. Appropriate vendors might be found in each of the quadrants, not only the Leaders quadrant, and some vendors may be appropriate for only specific vertical markets. Leaders Gartner's 1H03 IT Security Management Magic Quadrant does not position any vendor as a leader. To be a leader with respect to completeness of vision, an IT security management vendor must provide aggregated and correlated historical reporting/analytics and real-time event management for the 24 March

4 security device layer and the infrastructure layer (at least the network and host elements) for heterogeneous sources, packaged as an integrated offering; advanced correlation; proven scalability; and host analytics that satisfy audit, policy compliance and vulnerability assessment requirements. The evaluation of a vendor's ability to execute includes financial viability, the size of its installed base, installed base growth rate, visibility on enterprise evaluations and shortlists, support, product function and match of technology to market requirements. Visionaries The Visionaries Quadrant is populated with a number of IT security management point solution vendors that share a common set of strengths and challenges. Point solution vendors have well-developed correlation and network security device coverage, and they are challenged to leverage their venture capital funding to grow to critical mass and profitability. When compared to their larger competitors, the total installed base of a typical point solution vendor is small, but many point solution vendors have larger installed bases for IT security management products than their large competitors. NetForensics has the largest installed base and revenue stream of the vendors in the Visionaries quadrant. It has a long-standing partnership with Cisco Systems, which brings NetForensics into accounts that require security management. Cisco's recent acquisition of Okena (see "Cisco to Buy Okena, Try to Compete in Security Software") raises flags that Cisco will look to have an organic security management offering. NetForensics has been challenged by newer point solution vendors that provide broader network device support and more of a real-time orientation to event management. e-security has been in the IT security management market for a long time. It has recently embedded the Security Focus database to provide security intelligence data in the context of an incident response. The vendor supports the rapid integration of new data sources through its agent builder technology, which can be used by customers to define new sources. It is attempting to capitalize on a sales relationship and technology integration with Hewlett-Packard (HP) and HP's OpenView product. The differentiating characteristics of Intellitactics are its real-time graphical displays of threat activity, fully integrated reporting and the propensity of its installed base to integrate in-house data sources through an application programming interface. ArcSight is a relatively recent entrant with a small installed base that is well-funded and highly visible in the IT security market. Like Intellitactics, ArcSight has a taxonomy for correlation and real-time graphical threat displays. In contrast to e-security and Intellitactics, ArcSight's primary method of data source integration is rapid vendor-side agent 24 March

5 development. GuardedNet has focused on ease of deployment and out-of-the-box functionality. The vendor is noted for its integrated service ticketing system and Host Investigative Toolkit. OpenService's ThreatManager is based on the OpenService NerveCenter event management technology, and the vendor is selling into the NerveCenter installed base. OpenService is one of the few vendors with advanced features for health and welfare monitoring for popular security appliances. Network Intelligence is unique in its focus on appliance-based security management solutions. Multiple appliances can be deployed for horizontal scalability, and query-based correlation is supported across appliances. Challengers IBM Tivoli is unique among the vendors in the Challengers quadrant in that its Risk Manager product has support for a large number of network security devices. The vendor has an opportunity to leverage its sizable Tivoli Management Environment installed base and also to sell the product as a stand-alone offering. Challenges include low visibility with security operations decision makers and a reputation for products that require extensive customization. NetIQ has welldeveloped server-centric security management products and has recently acquired PentaSafe Security Technologies, which had development initiatives under way in the areas of real-time correlation and network security device data collection. NetIQ is in the process of integrating the two sets of technologies. Symantec is in the midst of development initiatives that will soon provide a critical mass of IT security management function. The vendor already has a strong vulnerability assessment tool (Enterprise Security Manager), a framework for technology integration, and a well-developed incident management workflow (Incident Manager) that integrates Security Focus and additional content from Symantec's security research organization. Symantec must complete the late-stage development and testing of the Cyberwolf technology integration, which will provide network security data coverage. Because Symantec also provides many security technologies, there is the potential for internal pressure to focus on the management of its own products at the expense of competing products that must also be managed. Micromuse has leveraged its scalable event management and data collection infrastructure to provide a network-oriented security management product, but is challenged to build its small installed base and provide moreimbedded security knowledge. Computer Associates International has a broad portfolio of security products, and its etrust Security Command Center is in beta testing. The product will integrate current CA security technology (etrust Audit and etrust Policy Compliance) and CA common services (event 24 March

6 management, repository and correlation) with a new security portal and additional data collectors. Niche Players Vendors occupy the Niche Players quadrant for a variety of reasons. BindView is very strong in aspects of IT security management, such as deep and comprehensive reporting of server configuration and policy compliance. Although BindView products can collect network security device log data, there is a lack of real-time monitoring and data correlation capabilities. Addamark Technologies is unique in its focus on security analytics against very large and compressed historical log information, but it has no support for real-time monitoring. Not Appearing in the Magic Quadrant HP's OpenView is widely used for managing network devices, but HP has not demonstrated an ability or desire to expand into the security management market. BMC Software has user provisioning and access management products, but it does not provide an IT security management function. Ponte Communications and Solsoft provide solutions for controlling security devices but don't provide any analysis capabilities. Cisco and Check Point Software Technologies provides limited IT security management functions for its own products. Microsoft does not provide IT security management products, but we expect the Microsoft Security Products group to develop function in this area. Internet Security Systems (ISS) SiteProtector provides log aggregation and correlation for ISS and a limited number of third-party products, but ISS does not position SiteProtector as an IT Security Management solution. Bottom Line: When evaluating IT security management vendors and tools, enterprises should consider the event management and data analysis requirements for protecting their perimeter, as well as their internal systems and applications. No one vendor provides complete functionality for all of these areas, but the market is rapidly converging on a common set of functions that apply to security devices, IT Infrastructure and applications. Therefore, enterprises should select IT security vendors whose products demonstrate a clear path to integrated management of IT security. 24 March

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

BSM Definition, Drivers and Inhibitors

BSM Definition, Drivers and Inhibitors Events, D. Curtis, M. Govekar Research Note 11 August 2003 BMC Positions Itself for Business Service Management BMC Software's announcement of its business service management strategy is solidified by

More information

2003 Desktop Software Distribution Magic Quadrant

2003 Desktop Software Distribution Magic Quadrant Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic

More information

Patch management point solution. Platform. Patch Management Point Solution

Patch management point solution. Platform. Patch Management Point Solution Markets, R. Colville, M. Nicolett Research Note 18 March 2003 Patch Management: Identifying the Vendor Landscape As the importance of patch management increases, it is important to understand the limitations

More information

SIEM and IAM Technology Integration

SIEM and IAM Technology Integration SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security

More information

Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002

Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 IGG-10232002-03 J. Holincheck Article 23 October 2002 Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 The market for large-enterprise human resources management system (HRMS)

More information

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite

More information

Partner Relationship Management: 2003 Magic Quadrant

Partner Relationship Management: 2003 Magic Quadrant Markets, R. DeSisto, C. Marcus Research Note 11 February 2003 Partner Relationship Management: 2003 Magic Quadrant In the latest Gartner PRM Magic Quadrant, Siebel remains the sole PRM leader. Allegis,

More information

SAN Management Software Magic Quadrant

SAN Management Software Magic Quadrant Markets, C. DiCenzo, R. Paquet, N. Allen, R. Passmore Research Note 22 April 2003 SAN Management Software Magic Quadrant In the storage area network management software market, expect increased competition

More information

Management Update: Powerhouse Vendors Implement Document Management

Management Update: Powerhouse Vendors Implement Document Management IGG-10302002-04 G. Landers, K. Shegda, D. Logan Article 30 October 2002 Management Update: Powerhouse Vendors Implement Document Management Interest within enterprises is growing in the management of unstructured

More information

2003 Enterprise Backup/Restore Magic Quadrant

2003 Enterprise Backup/Restore Magic Quadrant Markets, C DiCenzo, R Paquet Research Note 9 May 2003 2003 Enterprise Backup/Restore Magic Quadrant The backup/restore software market is maturing, with a limited number of vendors competing for the bulk

More information

MarketScope for IT Governance, Risk and Compliance Management, 2008

MarketScope for IT Governance, Risk and Compliance Management, 2008 MarketScope for IT Governance, Risk and Compliance Management, 2008 Gartner RAS Core Research Note G00154941, Paul E. Proctor, Mark Nicolett, French Caldwell, 11 February 2008, RA7 03032009 The IT GRCM

More information

The Magic Quadrant Framework

The Magic Quadrant Framework Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship

More information

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions. Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information

More information

By 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability).

By 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability). Page 1 of 5 Magic Quadrant for Unified Communications, 2005 14 February 2005 Bern Elliot Steve Blood Drew Kraus Source: Gartner Note Number: G00125707 Unified communications technology and applications

More information

Magic Quadrant for Application Platform Suites, 2Q03

Magic Quadrant for Application Platform Suites, 2Q03 Markets, Y. Natis, M. Pezzini, G. Phifer, C. Haight, M. Driver Research Note 5 May 2003 Magic Quadrant for Application Platform Suites, 2Q03 Application platform suites are incrementally assembled or bought

More information

CIO Update: The Gartner Firewall Magic Quadrant for 2H02

CIO Update: The Gartner Firewall Magic Quadrant for 2H02 IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market

More information

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management Magic Quadrant for Security Information and Event Management Gartner RAS Core Research Note G00156945, Mark Nicolett, Kelly M. Kavanagh, 8 May 2008, R2725 05092009 Broad adoption of SIEM technology is

More information

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear

More information

Vendor Classification

Vendor Classification Markets, L. Geishecker, F. Buytendijk Research Note 2 October 2002 Introducing the CPM Suites Magic Quadrant Vendors are developing a wide range of new functionality for corporate performance management.

More information

Market Trends in 2002 and 2003

Market Trends in 2002 and 2003 Markets, J. Pescatore, R. Wagner Research Note 8 January 2003 Extranet Access Management 2H02 Magic Quadrant Inside-the-firewall (intraenterprise) integration to reduce costs dominated the extranet access

More information

Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant.

Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant. Markets, M. Halpern Research Note 18 March 2003 Defining the PLM Magic Quadrant by Criteria and Use We provide the methodology used in developing our product life cycle management Magic Quadrant. Core

More information

Security and Identity Management Auditing Converge

Security and Identity Management Auditing Converge Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,

More information

Magic Quadrant for the IT Service Desk, 2003

Magic Quadrant for the IT Service Desk, 2003 Markets, K. Brittain Research Note 14 May 2003 Magic Quadrant for the IT Service Desk, 2003 Vendors in the IT service desk market Magic Quadrant have suffered through a depressed economy, vendor financial

More information

Vendors strongly focused on WCM

Vendors strongly focused on WCM Markets, M. Gilbert, N. Drakos, L. Latham Research Note 28 August 2001 The Web Content Management Magic Quadrant for 2001 The Gartner Web content management Magic Quadrant for 2001 has three leaders and

More information

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management Magic Quadrant for Security Information and Event Management Gartner RAS Core Research Note G00176034, Mark Nicolett, Kelly M. Kavanagh, 13 May 2010, RA6 05132011 Broad adoption of SIEM technology is driven

More information

Magic Quadrant for a Fading PKI Market, 2003

Magic Quadrant for a Fading PKI Market, 2003 Markets, V. Wheatman, R. Wagner Research Note 17 June 2003 Magic Quadrant for a Fading PKI Market, 2003 Pure-play public-key infrastructure vendors are disappearing due to failure or acquisition, or by

More information

Upheaval in the CRM Services Market

Upheaval in the CRM Services Market Markets, J. Kirkby Research Note 24 October 2002 Upheaval in the CRM Services Market The customer relationship management services market is in upheaval: Competitive changes will strongly influence trends.

More information

SSL VPN 1H03 Magic Quadrant

SSL VPN 1H03 Magic Quadrant Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant The emerging Secure Sockets Layer virtual private network market is standards-based, with good short-term return on investment

More information

Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant

Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant IGG-02192003-03 R. Matlus Article 19 February 2003 Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant The North American help desk outsourcing market is growing despite a down economy.

More information

Unified Communications MQ Selection Criteria for 2003

Unified Communications MQ Selection Criteria for 2003 Decision Framework, B. Elliot Research Note 22 January 2003 Unified Communications MQ Selection Criteria for 2003 Unified communications enable enterprises to control their communication options, leveraging

More information

What Are Network Security Platforms?

What Are Network Security Platforms? Markets, J. Pescatore, M. Easley, R. Stiennon Research Note 7 November 2002 Network Security Platforms Will Transform Security Markets An integrated network security platform approach will increase network

More information

Vertical Data Warehouse Solutions for Financial Services

Vertical Data Warehouse Solutions for Financial Services Decision Framework, M. Knox Research Note 24 July 2003 Vertical Data Warehouse Solutions for Financial Services Packaged DW financial services solutions differ in degree of and approach to verticalization,

More information

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management Magic Quadrant for Security Information and Event Management Gartner RAS Core Research Note G00176034, Mark Nicolett, Kelly M. Kavanagh, 13 May 2010, RA1 05212011 Broad adoption of SIEM technology is driven

More information

Magic Quadrant for Integrated Document Management, 2003

Magic Quadrant for Integrated Document Management, 2003 Magic Quadrant for Integrated Document Management, 2003 Document management has moved to the forefront of many enterprises' purchasing lists. Our 2003 Magic Quadrant explains the complexities of the integrated

More information

Management Update: Gartner s BI Magic Quadrant Update Sailing in Rough Waters

Management Update: Gartner s BI Magic Quadrant Update Sailing in Rough Waters IGG-09112002-02 H. Dresner Article 11 September 2002 Management Update: Gartner s BI Magic Quadrant Update Sailing in Rough Waters Although the business intelligence (BI) market continues to ride out the

More information

HP and netforensics Security Information Management solutions. Business blueprint

HP and netforensics Security Information Management solutions. Business blueprint HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization

More information

Business Applications and Infrastructure Entwined

Business Applications and Infrastructure Entwined Markets, S. Hayward, B. Burton, J. Comport, Y. Genovese, T. Bittman Research Note 9 July 2003 Business and Infrastructure Entwined Oracle's bid for PeopleSoft encompasses more than applications. It illustrates

More information

How to Develop an Effective Vulnerability Management Process

How to Develop an Effective Vulnerability Management Process Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes

More information

Q1 Labs Corporate Overview

Q1 Labs Corporate Overview Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

More information

Ability to Execute. 1 von 22 15.06.2010 17:55. What You Need to Know

Ability to Execute. 1 von 22 15.06.2010 17:55. What You Need to Know 1 von 22 15.06.2010 17:55 13 May 2010 Mark Nicolett, Kelly M. Kavanagh Gartner RAS Core Research Note G00176034 Broad adoption of SIEM technology is driven by compliance and security needs. New use cases

More information

Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03

Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 Markets, H. Dresner, B. Hostmann, F. Buytendijk, A. Tiedrich Research Note 25 August 2003 Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 The business intelligence technology markets continue

More information

Firewall Market Trends

Firewall Market Trends Markets, R. Stiennon Research Note 19 June 2003 Magic Quadrant for Enterprise Firewalls, 1H03 Deep packet inspection technology is driving the firewall market to an inflection point that is characterized

More information

CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02

CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 IGG-01152003-02 J. Pescatore, R. Wagner Article 15 January 2003 CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 CIOs and many other executives are interested in insights on how

More information

Management Update: The Eight Building Blocks of CRM

Management Update: The Eight Building Blocks of CRM IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful

More information

PLM Eclipses CPC as a Software Market

PLM Eclipses CPC as a Software Market Markets, M. Halpern, K. Brant Research Note 20 March 2003 PLM Eclipses CPC as a Software Market Gartner is retiring the Collaborative Product Commerce Magic Quadrant and introducing the Product Life Cycle

More information

Hierarchy of Needs for Content Networking

Hierarchy of Needs for Content Networking Technology, M. Fabbi Research Note 28 October 2002 Hierarchy of Needs for Content Networking Enterprises should understand the hierarchy of needs for content networking, which is illustrated by examining

More information

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management Magic Quadrant for Security Information and Event Management Gartner RAS Core Research Note G00212454, Mark Nicolett, Kelly M. Kavanagh, 12 May 2011, RA 1-2494611471 05132012 Broad adoption of SIEM technology

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

Magic Quadrant for Data Center Outsourcing, 4Q03

Magic Quadrant for Data Center Outsourcing, 4Q03 Markets, R. Matlus, W. Maurer, L. Scardino, B. Caldwell Research Note 12 November 2003 Magic Quadrant for Data Center Outsourcing, 4Q03 Gartner's positioning of the 14 external service providers in the

More information

SSL VPN 1H03 Magic Quadrant Evaluation Criteria

SSL VPN 1H03 Magic Quadrant Evaluation Criteria Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and

More information

APS/SES combination. Traditional package

APS/SES combination. Traditional package Markets, G. Phifer, R. Valdes, D. Gootzit Research Note 26 March 2003 The Horizontal Portal Product 2003 Magic Quadrant The portal product market is undergoing significant segmentation. Gartner presents

More information

2015 Global Identity and Access Management (IAM) Market Leadership Award

2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Contents Background and Company Performance... 3 Industry Challenges... 3 Market Leadership of IBM... 3 Conclusion... 6 Significance

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow

CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow IGG-03192003-03 D. Vecchio Article 19 March 2003 CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow The conversion of aging applications to more modern architectures

More information

Management Update: How to Implement a Successful ERP II Project

Management Update: How to Implement a Successful ERP II Project IGG-09252002-02 B. Zrimsek, P. Phelan Article 25 September 2002 Management Update: How to Implement a Successful ERP II Project Gartner provides insights and recommendations on how enterprises can make

More information

MarketScope for IT Governance, Risk and Compliance Management, 2008

MarketScope for IT Governance, Risk and Compliance Management, 2008 Research Publication Date: 11 February 2008 ID Number: G00154941 MarketScope for IT Governance, Risk and Compliance Management, 2008 Paul E. Proctor, Mark Nicolett, French Caldwell The IT GRCM market was

More information

Simplify and Automate IT

Simplify and Automate IT Simplify and Automate IT The current state of IT INCIDENT SERVICE LEVEL DATA SERVICE REQUEST ASSET RELEASE CONFIGURATION GOVERNANCE AND COMPLIANCE EVENT AND IMPACT ENTERPRISE SCHEDULING DASHBOARDS CAPACITY

More information

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management Magic Quadrant for Security Information and Event Management Gartner RAS Core Research Note G00167782, Mark Nicolett, Kelly M. Kavanagh, 29 May 2009, R3102 06182010 Broad adoption of SIEM technology is

More information

The PC life cycle configuration management Market Overview

The PC life cycle configuration management Market Overview Magic Quadrant for PC Life Cycle Configuration Management, 2005 Gartner RAS Core Research Note G00131185, 17 October 2005, Ronni J. Colville, Michael A. Silver, R1580 05052006. The PC life cycle configuration

More information

TOTAL DATA WAREHOUSING: 2013-2018

TOTAL DATA WAREHOUSING: 2013-2018 TOTAL DATA WAREHOUSING: 2013-2018 Analytic Database and Hadoop Market Sizing and Forecasts This report examines the marketplace for Total Data Warehousing including competing players, revenue generation

More information

Magic Quadrant for Global Enterprise Desktops and Notebooks

Magic Quadrant for Global Enterprise Desktops and Notebooks Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main

More information

The 2H05 Magic Quadrant for managed

The 2H05 Magic Quadrant for managed Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security

More information

Job Scheduling Magic Quadrant Reflects New Challenges

Job Scheduling Magic Quadrant Reflects New Challenges Markets, M. Govekar Research Note 23 January 2003 Job Scheduling Magic Quadrant Reflects New Challenges In 2003, job scheduling systems should be starting to address new platforms and environments. Some

More information

WAGs Must Meet Multichannel Access Gateway Criteria

WAGs Must Meet Multichannel Access Gateway Criteria Markets, W. Clark Research Note 16 December 2003 WAGs Must Meet Multichannel Access Gateway Criteria Most wireless application gateway functionality will be absorbed into other mobile development platforms

More information

Server Vendors' High-Availability Services: Magic Quadrant

Server Vendors' High-Availability Services: Magic Quadrant Markets, A. Mac Neela, B. Igou, E. Rocco Research Note 30 September 2002 Server Vendors' High-Availability Services: Magic Quadrant User demand for high availability of critical systems is driving the

More information

Magic Quadrant for Security Information and Event

Magic Quadrant for Security Information and Event Page 1 of 14 Magic Quadrant for Security Information and Event Management 29 May 2009 Mark Nicolett, Kelly M. Kavanagh Gartner RAS Core Research Note G00167782 Broad adoption of SIEM technology is driven

More information

Magic Quadrant for Corporate Telephony in EMEA, 2003

Magic Quadrant for Corporate Telephony in EMEA, 2003 Markets, S. Blood, C. Lock Research Note 2 September 2003 Magic Quadrant for Corporate Telephony in EMEA, 2003 Cisco and Alcatel continue to offer the market's most comprehensive corporate propositions.

More information

Vendor Ratings, VDR-18-1757 Nikos Drakos

Vendor Ratings, VDR-18-1757 Nikos Drakos Vendor Ratings, Nikos Drakos Research Note 5 November 2002 Vendor Rating: Tridion Web Content Management Tridion hopes that a prudent business strategy and a flexible product line will be enough to put

More information

QRadar SIEM and FireEye MPS Integration

QRadar SIEM and FireEye MPS Integration QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving

More information

CIO Update: Microsoft's Business Intelligence Strategy Is a Work in Progress

CIO Update: Microsoft's Business Intelligence Strategy Is a Work in Progress IGG-05282003-04 B. Hostmann, K. Strange Article 28 May 2003 CIO Update: Microsoft's Business Intelligence Strategy Is a Work in Progress Microsoft s SQL Server and related business intelligence (BI) products

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE. Monitoring, Managing and Optimizing the Datacenter

DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE. Monitoring, Managing and Optimizing the Datacenter Analyzing the Business of Enterprise IT Innovation DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE Monitoring, Managing and Optimizing the Datacenter As datacenters become bigger, denser and more complex,

More information

Troux Configuration Management Software

Troux Configuration Management Software Sharon Fisher Product Report 5 December 2003 Troux Configuration Management Software Summary With the Troux Blueprinting System, Troux hopes to help create a new market with software to map an information

More information

QRadar SIEM and Zscaler Nanolog Streaming Service

QRadar SIEM and Zscaler Nanolog Streaming Service QRadar SIEM and Zscaler Nanolog Streaming Service February 2014 1 QRadar SIEM: Security Intelligence Platform QRadar SIEM provides full visibility and actionable insight to protect networks and IT assets

More information

Strategic Sourcing Magic Quadrant Criteria: An Explanation

Strategic Sourcing Magic Quadrant Criteria: An Explanation Markets, D. Hope-Ross, J. Woods Research Note 14 March 2003 Strategic Sourcing Magic Quadrant Criteria: An Explanation A new Gartner Magic Quadrant for strategic sourcing applications is being introduced.

More information

Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor

Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor IGG-10232002-02 P. Phelan Article 23 October 2002 Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor Service partner relationships will grow to enable more holistic

More information

The Business Rule Engine 2003 Magic Quadrant

The Business Rule Engine 2003 Magic Quadrant Markets, J. Sinur Research Note 7 April 2003 The Business Rule Engine 2003 Magic Quadrant Business rule engines are moving toward maturity. In 2003, they will support business agility when called on to

More information

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management Magic Quadrant for Security Information and Event Management Gartner RAS Core Research Note G00212454, Mark Nicolett, Kelly M. Kavanagh, 12 May 2011, RV4A105172012 Broad adoption of SIEM technology is

More information

Unlike the general notebook market, in which

Unlike the general notebook market, in which Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook

More information

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management Magic Quadrant for Security Information and Event Management Gartner RAS Core Research Note G00212454, Mark Nicolett, Kelly M. Kavanagh, 12 May 2011, RA 1-2494611471 05132012 Broad adoption of SIEM technology

More information

Social Intranets and the Supply Chain

Social Intranets and the Supply Chain THOUGHT LEADERSHIP Social Intranets and the Supply Chain EXECUTIVE OVERVIEW SEP 2015 Alan Pelz-Sharpe, Research Director, Business Applications Matt Mullen, Senior Analyst, Business Applications In one

More information

Definition of the Market

Definition of the Market Markets, M. Halama Research Note 9 September 2003 Criteria for Pan-European Web Hosting Magic Quadrant, 2H03 Web hosting firms offer greatly differing services to a wide range of customers. Our criteria

More information

Simplify and Automate IT

Simplify and Automate IT Simplify and Automate IT Expectations have never been higher Reduce IT Costs 30% increase in staff efficiency Reduce support costs by 25% Improve Quality of Service Reduce downtime by 75% 70% faster MTTR

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

CA Systems Performance for Infrastructure Managers

CA Systems Performance for Infrastructure Managers PRODUCT SHEET: CA Systems Performance for Infrastructure Managers agility made possible CA Systems Performance for Infrastructure Managers CA Systems Performance for Infrastructure Managers is an add-on

More information

EMEA CRM Analytics Suite Magic Quadrant 3Q02

EMEA CRM Analytics Suite Magic Quadrant 3Q02 Markets, J. Radcliffe, G. Herschel Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant 3Q02 SAS Institute leverages its strength in analytics to take the lead in the immature CRM analytics

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov

More information

QRadar SIEM 6.3 Datasheet

QRadar SIEM 6.3 Datasheet QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

What is SIEM? Security Information and Event Management. Comes in a software format or as an appliance.

What is SIEM? Security Information and Event Management. Comes in a software format or as an appliance. Ross Spooner Cyber Security for Government Conference 6 August 2013 What is SIEM? Security Information and Event Management Centralised security log management Long term storage, analysis and reporting

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

Magic Quadrant for Pure-Play BPM, 2Q03

Magic Quadrant for Pure-Play BPM, 2Q03 Markets, J. Sinur, J. Thompson Research Note 2 June 2003 Magic Quadrant for Pure-Play BPM, 2Q03 Vendor viability is an important consideration in the application-independent business process management

More information

Tom Reilly President & CEO, ArcSight

Tom Reilly President & CEO, ArcSight Tom Reilly President & CEO, ArcSight ArcSight Company Background Founded May 2000 2000+ customers 500+ employees, offices worldwide NASDAQ: ARST 20% Revenue growth year over year Analyst Recognition SIEM

More information

First North American Magic Quadrant: CRM Suites for SMBs

First North American Magic Quadrant: CRM Suites for SMBs Markets, J. Outlaw Research Note 6 February 2002 First North American Magic Quadrant: CRM Suites for SMBs Customer relationship management application suites have become the most-popular form of CRM technology

More information

Find the intruders using correlation and context Ofer Shezaf

Find the intruders using correlation and context Ofer Shezaf Find the intruders using correlation and context Ofer Shezaf Agenda The changing threat landscape What can you do to find intruders? Best practices for timely detection and mitigation HP ArcSight 2 Find

More information

The Four "A's" of Information Security

The Four A's of Information Security Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also

More information

Securing your IT infrastructure with SOC/NOC collaboration

Securing your IT infrastructure with SOC/NOC collaboration Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and

More information

Software and Data Are Reshaping the Advertising Market

Software and Data Are Reshaping the Advertising Market THOUGHT LEADERSHIP Software and Data Are Reshaping the Advertising Market APR 2016 Scott Denne, Analyst Matt Mullen, Senior Analyst, Social Business The growth of digital media and mobile connectivity

More information