Magic Quadrant for Unified Threat Management
|
|
|
- Oscar Roberts
- 10 years ago
- Views:
Transcription
1 G Magic Quadrant for Unified Threat Management Published: 5 March 2012 Analyst(s): John Pescatore, Greg Young Unified threat management devices provide small and midsize businesses with multiple network security functions in a single appliance. Future trends in mobility and delivering security as a service will slow growth in the UTM market. Market Definition/Description For 2011, Gartner estimates that worldwide revenue in the UTM market totaled approximately $1.28 billion, which represents 19.5% growth over our estimate for 2010 (see Note 1). Gartner believes the UTM market will continue to grow faster than many other security markets, but we see a number of trends applying downward pressure on market growth. Regardless, we forecast continued growth in the UTM market of approximately 15% compound annual growth rate through Gartner defines the UTM market as multifunction network security products used by small or midsize businesses (SMBs). Gartner defines midsize businesses as those with 100 to 1,000 employees, and with revenue ranging from $50 million to $1 billion. However, the majority of midsize businesses' annual revenue is in the range of $100 million to $500 million, with head count ranging from 200 to 1,000 employees. UTM products for this market need to provide the following functions as a minimum: Standard network stateful firewall functions Remote access and site-to-site virtual private network (VPN) support Web security gateway functionality (anti-malware, URL and content filtering) Network intrusion prevention focused on blocking attacks against unpatched Windows PCs and servers All UTM products contain other security capabilities, such as security, Web application firewalls or data loss prevention. However, SMBs rarely enable these functions. Features such as built-in secure wireless LAN support and browser-based management, which don't appeal to large enterprises, are highly valued by SMBs in this market. SMBs that are evaluating UTM solutions should do so based on which of the above controls they will actually use, the quality of vendor and channel (and managed services) support that is available, and whether the management interface matches the skill level of local administrators.
2 Especially under the current economic conditions, most SMBs have strong IT budgetary and staffing constraints. This causes them to highly value ease of deployment and use, strong local channel support, and flexible pricing. Leading UTM vendors will: Be aggressive and flexible in pricing, reducing upfront costs and eliminating hidden fees while easing upgrades when economic conditions improve. Provide product management features that simplify deployment and operation. Invest in enabling value-added resellers (VARs) and local system integrators to add services onto product sales, since the channel is often the major influencer on the buyers of UTM products. Focus on the needs of midsize businesses for the right network security at the right price, rather than trying to upsell the customer to enterprise products and capabilities. Be early to add new security features that are showing up as separate point products. We see the following positive trends driving growth in the UTM market: A growing number of small (fewer than 100 employees) businesses. A continued refresh of first-generation UTM products by SMBs, especially midsize businesses (100 to 999 employees), and especially in North America and Western Europe, due to product aging and the demand for higher-speed Internet connectivity. This demand represents replacing an existing product with the incumbent's newer version, or the incumbent being dislodged by a competitor. Visibility of advanced targeted threats that have hit small businesses in North America, causing demand for increased firewall, intrusion prevention system (IPS) and Web security gateway features such as application control. This demand represents replacing an existing product (such as a simple firewalling router) with a UTM product, either with the incumbent's newer version or with the incumbent being dislodged by a competitor. SMBs in emerging countries buying their first UTM product to secure increasingly faster and more highly business-critical broadband Internet connections. This scenario represents "greenfield" growth for the market, often with a preference for country-specific vendors. There are also some downward trends: The pricing and features of cloud-based secure Web gateway (SWG) services (see "Magic Quadrant for Secure Web Gateway") are very attractive to small businesses because they offer flexible pricing and meet the needs for securing mobile users. While most of those services only deal with Secure Sockets Layer (SSL) and HTTP traffic, they represent the majority of the needs of many small businesses, and can reduce their UTM needs to a simple firewall/router. Cloudbased SWG providers can also add support for other protocols, further diluting the demand for customer premises UTM solutions. The increased use of cloud-based (such as Google Apps Premier Edition or Microsoft Office 365) reduces the demand for security, since those services include integrated antivirus. Page 2 of 21 Gartner, Inc. G
3 The increased use of smartphones, tablets and even 4G-equipped laptops moves more small business Internet traffic to direct connections to wireless data service providers, as opposed to through a UTM appliance to the wired Internet service provider. As lower-midsize companies grow to become upper-midsize and enterprise size, their security needs will get more complex, and they will outgrow their UTM appliance and deploy enterprise network security platforms such as next-generation firewalls and SWGs. Gartner believes the downward trends will outweigh the positive trends, thereby causing us to lower our long-term growth forecast for the UTM market from our previous outlook. These trends have also led to limited entries/exits of vendors into/from this market. In 2011, Sophos acquired Astaro and IBM exited the UTM market. There were no new startup vendors, but Clavister and Kerio Technologies satisfied Gartner's evaluation criteria and have been added in Barracuda Networks' current firewall product did not meet the UTM criteria, but its product road map indicates that it will be entering this area in the future (see Figure 1). Magic Quadrant Figure 1. Magic Quadrant for Unified Threat Management Source: Gartner (March 2012) Gartner, Inc. G Page 3 of 21
4 Vendor and Check Point Software Technologies Check Point Software Technologies is a well-known pure-play security company that has been shipping UTM products since Headquartered in Israel with R&D in Israel and California, Check Point has a range of appliances and software "blades" that implement network security functions. Check Point's UTM offerings include the 2200, 4200 and 4800 appliances, which range from 2 Gbps to 6 Gbps of IPS throughput. The Check Point SG80 is aimed at branch offices and offers up to 750 Mbps of IPS throughput. The Check Point UTM-1 series ranges from 1 Gbps to 4 Gbps of IPS throughput. The Safe@Office appliances offer up to 1 Gbps of firewall throughput. Trained personnel and external support are easy to find for Check Point products. Check Point offers a managed service starting at less than $20 per device per month, an aggressive price point compared with other managed service offerings. For the high end of the UTM market, Check Point management console is highly rated. Check Point's product and service pricing often make its total capital expenses pricier than comparable offerings from competitors. Regional integrators and smaller VARs tend to recommend competing products for midsize businesses, often driven by Check Point licensing complexity and better SMB channel support from competitors. Cisco Cisco is the dominant network infrastructure vendor, and has a broad network security product portfolio. In the small and midsize space, Cisco has a number of product offerings. The Cisco RV Series of products provides VPN and firewall functions for the small office/home office (SOHO) environment. The SA500 Series Security Appliances provide UTM functionality that aligns with the needs of the midsize business market using IPS, and Web security options, some of which include integrated wireless LAN (WLAN) access points. Low models of Cisco Integrated Services Routers (ISRs) and the Cisco Adaptive Security Appliances (ASA) are generally aimed more at branch offices than the UTM market. Several of these models have connectors to the Cisco ScanSafe Web security-as-a-service offering, which is attractive to small businesses. Cisco's continued dominance in the network infrastructure market means its UTM products are often chosen without looking at competing offerings. Page 4 of 21 Gartner, Inc. G
5 Cisco has enhanced the support (which was already strong) it provides to its channel partners serving the midmarket. In the core firewall and IPS areas, Cisco's UTM capabilities are good enough at an attractive price. While competitors made advances (such as adding application control features and more granular reporting), Cisco's network security product line stagnated in Cisco has laid out an aggressive road map for product improvements in 2012, but has had lots of organizational turmoil recently and many changes in strategy, resulting in missed deadlines. At the high end of the UTM market, Cisco's security management offerings are extremely weak, particularly in the amount of effort it takes to manage multiple appliances. Clavister With head offices in Sweden, Clavister sells UTM as part of the Security Gateway (SG) product line. Each SG model has a Pro option that has greater throughput and performance. The majority of Clavister's security business is in security gateways for carriers and service providers, and the company has significant business in the OEM of UTM technology elements. Clavister's primary focus is on the enterprise and telecommunications provider markets. Clavister has a large number of devices under support, and the extent of the OEM business provides validation for the company's technology focus. Users rate management capabilities as strong when multiple UTM units are deployed. It focuses on EMEA, with recent operations expanded to Asia/Pacific and has a limited international presence compared with competitors. The company is spread across many horizontal industries and security lines of business, with few UTM models and a limited focus on SMB compared with competitors. Clavister does not have a Web application firewall, and security features such as application control will not be available in the UTM product until later in Cyberoam India-based Cyberoam has been shipping appliances since With a high level of channel loyalty and a strategy of adding in features not usually present in competing products, Cyberoam Gartner, Inc. G Page 5 of 21
6 has expanded its sales and broadened its geographic coverage. Formerly focused solely on the midmarket, Cyberoam has expanded toward the consumer and SOHO placements. Gartner sees Cyberoam often being selected where bandwidth is expensive or unreliable, for the multiple link management and 3G/WiMAX features. Users like logging, alerting and forensic capabilities via Cyberoam's iview, and the on-appliance Web Application Firewall. Cyberoam maintains a high level of loyalty from its channel partners. Industry-specific features such as outbound spam protection and SMS authentication sell well into hotel/hospitality/service providers. Cyberoam usually scores very well on price in the competitive UTM selections seen by Gartner. Cyberoam is still not widely regarded as an option for global businesses due to limited support in North America and Western Europe. It is rarely seen on competitive shortlists, and rivals don't mention it as a "top competitor." Fortinet Fortinet, which is based in California, has been focused on UTM appliances since From the start, Fortinet has focused on using custom application-specific integrated circuits for network processing and content inspection to reach high performance levels. Fortinet offers nine FortiGate UTM appliances aimed at the midsize market, ranging from 20 Mbps to 1 Gbps of firewall throughput. Several versions offer integrated WLAN access points, while others include voice over IP gateway and IP PBX functionality. Fortinet continues to have the highest visibility of UTM providers among Gartner clients, and is the company most frequently mentioned by competitors. The product line has aggressive price/performance points and an easy migration path as network speeds increase. The Fortinet UTM line has strong channel and managed security service provider (MSSP) support. FortiGuard Labs is a strong source of threat and vulnerability information. Page 6 of 21 Gartner, Inc. G
7 While the management user interface has improved, it is still rated lower than competing offerings by Gartner clients. Users would like to see more flexible log filtering and viewing. gateprotect gateprotect, which is based in Germany, has been shipping UTM appliances since Its Series A appliances are the primary offerings aimed at midsize businesses. Overall, gateprotect's UTM models range from 1 Gbps to 18 Gbps of firewall throughput. All gateprotect appliances are also available as VMware images. gateprotect's unique approach to graphical user interface simplifies administrative tasks and reduces configuration errors. It offers competitive pricing. gateprotect has limited application awareness in firewall policies compared with competing offerings. It focuses on Germany and EMEA and has a limited international presence compared with competitors. gateprotect has low visibility and rarely appears on Gartner client shortlists, nor is it referenced in inquiries. Juniper Networks Juniper is a large network infrastructure provider that has a wide range of firewall, IPS and remote access security solutions. Juniper's SRX Series Services Gateways include Juniper's UTM offering for midsize businesses as well as enterprise branch offices. This product line contains models that range from 650 Mbps to 7 Gbps of firewall throughput. In 2011, Juniper added the SRX110 (650 Mbps) and SRX210E (750 Mbps) models to the low end of the lineup. In late 2010, Juniper acquired Altor Networks, a vendor of software firewalls for virtualized environments, but Juniper does not have a virtual appliance offering for the midmarket. For multiple UTM appliance scenarios, Juniper's pricing was often cited as a reason for selection. Gartner, Inc. G Page 7 of 21
8 For upper-end midsize businesses (500 to 999 employees), Juniper's NSM management console was highlighted for ease of deployment and management. Compared with most competitors, Juniper's 2011 midmarket offerings did not advance in areas such as application control and spam filtering. Juniper has limited channel support for the midmarket UTM needs. Users cited Juniper's reporting as in need of improvement. Kerio Technologies Headquartered in California, Kerio first shipped a UTM (WinRoute) product in The Kerio Control Box appliance is offered in two models that range from 90 Mbps to 400 Mbps of IPS throughput. The Kerio Control software is also available to run on Windows servers or as a VMware Virtual Appliance. It is easy to deploy and use, especially where other Kerio messaging and voice products are in use. It supports multiple antivirus signature feeds. Kerio's visibility is very low, and its partner support is limited. Kerio's use of Sophos antivirus signatures is a disadvantage when competing with Astaro. Netasq Based in France, Netasq has been shipping UTM products since The Netasq U Series of appliances ranges from 200 Mbps to 1 Gbps of firewall throughput, with the U30 (200 Mbps) and U70 (600 Mbps) being the primary offerings aimed at SMBs. The U Series includes hardware VPN acceleration. Netasq also offers the V50, V100, V200 and V500 Virtual Appliances for SMBs, which run on VMware vsphere and Citrix XenServer. The V-series software is free for SMB use, but annual maintenance and update services require a fee. Simplified licensing for procurement and support is cited as positive. Integration of the firewall and IPS engine increases throughput and eases deployment. Users continue to highly rate support from Netasq and channel partners. Page 8 of 21 Gartner, Inc. G
9 Netasq has not increased visibility outside of Europe. Netasq's channel is not as extensive as many of its competitors, which puts it at a disadvantage when support in multiple regions is required. Users say the integration of UTM features beyond firewall and IPS needs improvement. Version 9 has addressed this issue. Netgear Based in California, Netgear is a large provider of networking and storage products that entered the UTM market in late The ProSecure UTM appliance line is the primary offering for midsize businesses, with six models ranging from 90 Mbps to 900 Mbps of firewall throughput. In 2011, Netgear introduced a 150-user version and a version with an integrated VDSL modem. Netgear also sells STM Series appliances, which provide Web and security functions. Netgear offers a low-cost solution with features tailored to the midmarket. It has a strong channel with good reach into midsize IT environments. The breadth of its midmarket product line covers security, backup and wireless/wired network infrastructure, providing easily integrated solutions for midsize businesses. The Netgear brand has high visibility in consumer-oriented markets, but is not frequently mentioned by competitors or Gartner clients. It has limited application awareness in firewall policies. Netgear will address this in It has no multidevice centralized management. Support for multiunit management is on Netgear's road map. Netgear's product line has limited scalability. SonicWALL Headquartered in California, SonicWALL was acquired and taken private by private equity firm Thoma Bravo in SonicWALL has been shipping UTM products since 1998, and has two product lines aimed at the midmarket. The TZ Series ranges from 100 Mbps to 200 Mbps of firewall throughput, and includes an optional integrated WLAN access point. The NSA 200 Series supports firewall throughput of between 600 Mbps and 2.75 Gbps, and offers SSL inspection and application control. Gartner, Inc. G Page 9 of 21
10 SonicWALL has strong global partner and MSSP support. SonicWALL is well-known in the UTM space and appears frequently on Gartner client shortlists. The graphical elements of SonicWALL's management interface are consistently highly rated. SonicWALL's release of new features has kept up with midmarket needs, and has been matched by usability enhancements. SonicWALL's push into the high end with SuperMassive may divert resources and focus from the UTM market. SonicWALL does not offer a virtual appliance for the UTM space. Sophos (Astaro) Based in Massachusetts, with R&D in Germany, Astaro has been shipping UTM products since Astaro was acquired by endpoint security vendor Sophos in May 2011, but the Astaro branding will be maintained until the next major release in April Its UTM product line is branded as the Astaro Security Gateway. Hardware appliances are available that range from 45 Mbps to 575 Mbps of overall UTM throughput. The Astaro Security Gateway is available in hardware and software versions that support firewall, IPS, VPN and other functions. The product is also available as a virtual appliance that runs on VMware, Citrix, KVM and Hyper-V, along with an Amazon Machine Image (AMI) for Amazon's EC2. Astaro offers a series of Gateway "Extension" products, such as Wi-Fi access points and remote management appliances that integrate with the Astaro Command Center management console. Astaro's Red appliance and secure access point products enable it to offer very attractive bundles to vertical industries such as retail, healthcare and education. Ease of deployment, use and expansion are consistently cited as decision factors favoring Astaro. The acquisition of Astaro by Sophos should increase financial resources and channel strength, and improve visibility. Astaro has not shown up on many Gartner client shortlists, and is not cited by competitors in our surveys as a major factor. Users are looking for improvements in the granularity of Astaro's reporting, which Sophos plans to address in a 2012 release. Page 10 of 21 Gartner, Inc. G
11 Sophos must avoid the temptation to drive toward UTM solutions that depend on Sophos on the endpoint. Trustwave Based in Illinois, Trustwave is a large and rapidly growing service provider that focuses on the worldwide PCI compliance requirements. Trustwave has acquired a number of security products over the years, such as SecurePipe's managed services business and Linux-based firewall/vpn technology in SecurePipe had deployed firewall/vpn technology as early as The Trustwave Unified Threat Management appliance is available in three models: The XS-10 has a combined firewall and VPN throughput of 150 Mbps, while the TS-100 and TS-200 ranges are rated 130 Mbps to 300 Mbps. Trustwave offers a UTM managed service based on these devices. Trustwave offers managed UTM services that provide a low-cost means of meeting PCI and other network security requirements. Trustwave's pricing is aggressive and attractive for many smaller businesses. Trustwave's management platform is simple and easy to use for environments that do not require frequent policy changes. The Trustwave UTM offerings did not advance in 2011 compared with competitors. Trustwave's visibility in the UTM market, outside of PCI-centric environments, is very low. Trustwave's UTM offerings have a very low level of channel support outside of Trustwave's own services. WatchGuard Privately held WatchGuard is headquartered in Washington and has been shipping UTM appliances since WatchGuard's primary UTM offering for midsize businesses is the XTM 5 Series, which is composed of models ranging from 850 Mbps to 2.3 Gbps. WatchGuard also offers XTM 2 Series and XTM 3 Series UTM appliances for small businesses, and the Extensible Content Security (XCS) line of /web security appliances for midsize businesses that already have separate firewall solutions. WatchGuard XTMv is a virtual appliance that runs on VMware. A balance between ease of use and strong security is consistently cited as a reason why clients choose WatchGuard. Gartner, Inc. G Page 11 of 21
12 WatchGuard had the highest use rate of multiple features (beyond firewall, IPS and URL blocking) of all vendors. Users and channel partners report high reliability on the appliances and strong support from WatchGuard. WatchGuard has decreased in visibility to Gartner clients, and was less frequently mentioned by competitors compared with other vendors. Users cite shortcomings in reporting performance and functionality. MSSP support for WatchGuard appliances is limited compared with the major competitors. Vendors Added or Dropped We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor appearing in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. This may be a reflection of a change in the market and, therefore, changed evaluation criteria, or a change of focus by a vendor. Added Clavister Kerio Technologies Dropped IBM announced its end of support for the Proventia Network Multi-Function Security product line in November Inclusion and Exclusion Criteria Inclusion Criteria The following minimum requirements were used to determine which UTM companies met the criteria to be included in this Magic Quadrant under the following conditions: They shipped UTM software and/or hardware products targeted to midsize businesses that included capabilities in the following feature areas as a minimum: Network security (stateful firewall and intrusion prevention) Web security gateway Page 12 of 21 Gartner, Inc. G
13 security They regularly appeared on Gartner midsize client shortlists for final selection. They achieved UTM product sales (not including maintenance or other service fees) of more than $5 million during the past year, and within a customer segment that's visible to Gartner. They also achieved this revenue on the basis of product sales, exclusive of managed security service (MSS) revenue. Exclusion Criteria There was insufficient information for assessment, and the company didn't otherwise meet the inclusion criteria, or isn't yet actively shipping products for revenue. Products aren't usually deployed as the primary Internet-facing firewall (for example, proxy servers and network IPS solutions). Products are built around personal firewalls, host-based firewalls, host-based IPSs and Web application firewalls all of which are distinct from this market. Solutions are delivered primarily as an integral part of MSSs, to the extent that product sales didn't reach the $5 million threshold. Evaluation Criteria Ability to Execute Product/Service: Key features such as ease of deployment and operation, console quality, price/performance, range of models, secondary product capabilities (such as logging, integrated Wi-Fi support and remote access), and the ability to support multifunction deployments are weighted heavily. Overall Viability: This includes a vendor's overall financial health, prospects for continuing operations, company history, and demonstrated commitment to the multifunction firewall and network security market. Growth of the customer base and revenue derived from sales are also considered. All vendors are required to disclose comparable market data, such as multifunction firewall revenue, competitive wins versus key competitors (which is compared with Gartner data on such competitions held by our clients), and devices in deployment. The number of multifunction firewalls shipped isn't a key measure of execution. Instead, we consider the use of these firewalls and the features deployed to protect the key business systems of Gartner midsize business clients. Sales Execution/Pricing: This includes pricing, the number of deals, the installed base, and the strength of sales and distribution operations in the vendors. Presales and postsales support are evaluated. Pricing is compared in terms of a typical midsize business deployment, including the cost of all hardware, support, maintenance and installation. Low pricing won't guarantee high execution or client interest. Buyers want value more than they want bargains, although low price is often a factor in building shortlists. The total cost of ownership during a typical multifunction firewall Gartner, Inc. G Page 13 of 21
14 life cycle (which is three to five years) is assessed, as is the pricing model for adding security safeguards. In addition, the cost of refreshing the products is evaluated, as is the cost of replacing a competing product without intolerable costs or interruptions. Market Responsiveness and Track Record: This includes the ability to respond, change direction, be flexible, and achieve competitive success as opportunities develop, competitors act, customer needs evolve, and market dynamics change. This criterion also considers the provider's history of responsiveness. Marketing Execution: This addresses awareness of the product in the market. We recognize companies that are consistently identified by our clients and often appear on their preliminary shortlists. Customer Experience and Operations: These include management experience and track record, and the depth of staff experience specifically in the security marketplace. The greatest factor in these categories is customer satisfaction throughout the sales and product life cycle. Also important is ease of use, overall throughput across different deployment scenarios, and how the firewall fares under attack conditions (see Table 1). Table 1. Ability to Execute Evaluation Criteria Evaluation Criteria Product/Service Overall Viability (Business Unit, Financial, Strategy, Organization) Sales Execution/Pricing Market Responsiveness and Track Record Marketing Execution Customer Experience Operations Weighting High Standard Standard Standard Low Standard Standard Source: Gartner (March 2012) Completeness of Vision Market Understanding and Marketing Strategy: These include providing a track record of delivering on innovation that precedes customer demand, rather than an "us, too" road map and an overall understanding and commitment to the security market (specifically the SMB network security market). Gartner makes this assessment subjectively by several means, including interaction with vendors in briefings and feedback from Gartner clients on information they receive concerning road maps. Incumbent vendor market performance is reviewed yearly against specific recommendations that have been made to each vendor, and against future trends identified in Page 14 of 21 Gartner, Inc. G
15 Gartner research. Vendors can't merely state an aggressive future goal. They must enact a plan, show that they're following it and modify the plan as they forecast how market directions will change. Sales Strategy: This includes preproduct and postproduct support, value for pricing, and clear explanations and recommendations for detection events and deployment efficacy. Building loyalty through credibility with a full-time midsize business security and research staff demonstrates the ability to assess the next generation of requirements. Offering (Product) Strategy: The emphasis is on the vendor's product road map, current features, leading-edge capabilities, virtualization and performance. The quality of the security research labs behind the security features is considered. Credible, independent third-party certifications, such as Common Criteria, are included. Integrating with other security components is also weighted, as well as product integration with other IT systems. As threats change and become more targeted and complex, we weight vendors highly if they have road maps to move beyond purely signature-based, deep packet inspection techniques. In addition, we weight vendors that are looking to add cloudbased services to their offerings. Business Model: This includes the process and success rate of developing new features and innovation, and R&D spending. Innovation: This includes product innovation, such as R&D, and quality differentiators, such as performance, virtualization, integration with other security products, a management interface, and clarity of reporting. Geographic Strategy: This includes the ability and commitment to service geographies. The more a product mirrors the workflow of the midsize business operations scenario, the better the vision. Products that aren't intuitive in deployment, or operations that are difficult to configure or have limited reporting, are scored accordingly. Solving customer problems is a key element of this category. Reducing the rule base, offering interproduct support and beating competitors to market with new features are foremost (see Table 2). Gartner, Inc. G Page 15 of 21
16 Table 2. Completeness of Vision Evaluation Criteria Evaluation Criteria Market Understanding Marketing Strategy Sales Strategy Offering (Product) Strategy Business Model Vertical/Industry Strategy Innovation Geographic Strategy Weighting High Standard Standard Standard Standard No Rating Standard Low Source: Gartner (March 2012) Quadrant Descriptions Leaders The Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize business requirements. The requirements necessary for leadership include a wide range of models to cover midsize business use cases, support for multiple features, and a management and reporting capability that's designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and a product that's intuitive to manage and administer. Challengers The Challengers quadrant contains vendors that have achieved a sound customer base, but they aren't leading with features. Many Challengers have other successful security products in the midsize world and are counting on the client relationship or channel strength, rather than the product, to win deals. Challengers' products are often well-priced, and because of their strength in execution, these vendors can offer economic security product bundles that others can't. Many Challengers hold themselves back from becoming Leaders because they're obligated to set security or firewall products as a lower priority in their overall product sets. Page 16 of 21 Gartner, Inc. G
17 Visionaries Visionaries have the right designs and features for the midsize business, but lack the sales base, strategy, or financial means to compete globally with Leaders and Challengers. Most Visionaries' products have good security capabilities, but lack the performance capability and support network. Savings and high-touch support can be achieved for organizations that are willing to update products more frequently and switch vendors, if required. Where security technology is a competitive element for an enterprise, Visionaries are good shortlist candidates. Niche Players Most vendors in the Niche Players quadrant are enterprise-centric in their approach to UTM devices for midsize businesses. Some Niche Players focus on specific vertical industries or geographies. If midsize companies are already clients of these vendors for other products, or fit into those geographies or vertical industries, then Niche Players can be shortlisted. Context Different business and threat environments for SMBs result in significantly different network security requirements from those of large enterprises. Although the branch offices of some larger enterprises have requirements that are similar to midsize businesses, this is not always the case. The UTM market consists of a wide range of suppliers that meet the common core security requirements of SMBs, but businesses need to make their decisions by mapping their threat and deployment patterns to optimal offerings. Market Overview UTM appliances are used by midsize businesses to meet the requirements for secure Internet connectivity. For many small businesses, those requirements are often driven by regulatory demands (such as the PCI Data Security Standards), driving low to medium levels of security. Gartner sees very different demands from the enterprise and branch-office firewall markets (see "Magic Quadrant for Enterprise Network Firewalls"), which generally require more-complex network security features, and show very different selection criteria. Gartner generally defines SMBs by the number of employees and/or annual revenue they have. The primary attribute that is used most often is the number of employees. Small businesses usually have fewer than 100 employees, while midsize businesses are usually defined as companies with fewer than 1,000 employees. The second attribute most often used is annual revenue. Small businesses are usually defined as those with less than $50 million in annual revenue, while midsize businesses are defined as those with less than $1 billion in annual revenue. Typically, 80% of the companies Gartner analysts speak with have between 100 and 999 employees, and have revenue between $100 million and $500 million. Gartner, Inc. G Page 17 of 21
18 The primary characteristic of midsize companies is that they are organizations with resourceconstrained IT departments. They have a relative constraint in capital expenditures, operational budgets, number of IT staffers and depth of IT skills when compared with large enterprises. In keeping with this, UTM appliances are frequently used across midsize businesses as a low-cost way of meeting their network security requirements. Midsize businesses look at security differently, and show different buying behaviors compared with larger enterprises. The primary areas of difference are the following (in order of importance): Limited or nonexistent skilled security staff drives the need for ease of installation, configuration and use of channel-managed solutions. Less complex use of the Internet results in lower demand for high-end security features, such as application-level security and custom intrusion prevention filters. Limited security budgets drive acquisition costs to represent more than 60% of the overall decision weighting. Small businesses often perceive that they are not visible to attackers and, therefore, don't require as much security. However, financially motivated attackers have targeted small businesses, and the publicity over successful attacks has changed their perception. The branch offices of larger companies have very different network security demands from midsize businesses, even though they may be of similar size. Gartner views branch offices' firewalls as extensions of the central firewall strategy. This drives large enterprises to often use low-end enterprise products at their branch offices to ensure interoperability, and to take advantage of economies of scale in getting larger discounts from their firewall vendors. This is not true in all cases, but in general, it is one of the major reasons why firewall vendors that do sell successfully to both markets tend to have separate product lines for each market. For these reasons, Gartner allocates branch office firewall revenue to the enterprise firewall market, not the UTM market. Small businesses with fewer than 100 employees have even more budgetary pressure and even less security pressure. Most security procurement decisions are driven by nontechnical factors and rarely feature competitive comparisons. For these reasons, this Magic Quadrant focuses on the UTM products used by midsize businesses, as defined above. Recommended Reading Some documents may not be available as part of your current Gartner subscription. "Magic Quadrants and MarketScopes: How Gartner Evaluates Vendors Within a Market" "Magic Quadrant for Enterprise Network Firewalls" "Magic Quadrant for Unified Threat Management" "Astaro Acquisition Will Extend Sophos' Midmarket Security Offerings" Page 18 of 21 Gartner, Inc. G
19 Evidence Webmonkey survey of references provided by vendors Continuing stream of client inquiries on UTM area Vendor briefings from vendors Open-source research of vendor websites and user comment sites Proprietary source search by Gartner Secondary Research Services Note 1 UTM Revenue Differentiation As discussed in the Market Overview section, Gartner does not include branch office firewall revenue as UTM revenue. Evaluation Criteria Definitions Ability to Execute Product/Service: Core goods and services offered by the vendor that compete in/ serve the defined market. This includes current product/service capabilities, quality, feature sets and skills, whether offered natively or through OEM agreements/ partnerships as defined in the market definition and detailed in the subcriteria. Overall Viability (Business Unit, Financial, Strategy, Organization): Viability includes an assessment of the overall organization's financial health, the financial and practical success of the business unit, and the likelihood that the individual business unit will continue investing in the product, will continue offering the product and will advance the state of the art within the organization's portfolio of products. Sales Execution/Pricing: The vendor's capabilities in all pre-sales activities and the structure that supports them. This includes deal management, pricing and negotiation, pre-sales support and the overall effectiveness of the sales channel. Market Responsiveness and Track Record: Ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the vendor's history of responsiveness. Marketing Execution: The clarity, quality, creativity and efficacy of programs designed to deliver the organization's message to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This "mind share" can be driven by a combination of publicity, promotional initiatives, thought leadership, word-of-mouth and sales activities. Gartner, Inc. G Page 19 of 21
20 Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups, service-level agreements and so on. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure, including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Completeness of Vision Market Understanding: Ability of the vendor to understand buyers' wants and needs and to translate those into products and services. Vendors that show the highest degree of vision listen to and understand buyers' wants and needs, and can shape or enhance those with their added vision. Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the website, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling products that uses the appropriate network of direct and indirect sales, marketing, service and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: The vendor's approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature sets as they map to current and future requirements. Business Model: The soundness and logic of the vendor's underlying business proposition. Vertical/Industry Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including vertical markets. Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. Geographic Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market. Page 20 of 21 Gartner, Inc. G
21 Regional Headquarters Corporate Headquarters 56 Top Gallant Road Stamford, CT USA European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity on its website, ombudsman/omb_guide2.jsp. Gartner, Inc. G Page 21 of 21
Magic Quadrant for Unified Threat Management
G00245469 Magic Quadrant for Unified Threat Management Published: 19 July 2013 Analyst(s): Greg Young, Jeremy D'Hoinne Unified threat management devices provide small or midsize businesses with multiple
Magic Quadrant for Global Enterprise Desktops and Notebooks
Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main
NGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
Magic Quadrant for Higher Education Administrative Suites, 2005
Industry Research Publication Date: 21 November 2005 ID Number: G00131715 Magic Quadrant for Higher Education Administrative Suites, 2005 Marti Harris, Michael Zastrocky With Oracle's acquisition of PeopleSoft,
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
Q&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
Magic Quadrant for Unified Threat Management
Research Publication Date: 22 October 2010 ID Number: G00206923 Magic Quadrant for Unified Threat Management John Pescatore, Bob Walder Unified threat management devices provide all-in-one security in
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
Best Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
Ability to Execute. What You Need to Know
1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact
Magic Quadrant for SMB Multifunction Firewalls
Research Publication Date: 10 July 2009 ID Number: G00168918 Magic Quadrant for SMB Multifunction Firewalls Adam Hils, Greg Young This research examines the small-and-midsize-business multifunction firewall
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
Toolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
Unlike the general notebook market, in which
Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook
Magic Quadrant for Unified Threat Management
G00269677 Magic Quadrant for Unified Threat Management Published: 27 August 2015 Analyst(s): Jeremy D'Hoinne, Adam Hils, Greg Young, Rajpreet Kaur Unified threat management devices provide small and midsize
Case Study & POC & Demos Information
Case Study & POC & Demos Information Type: Case Study Name: Multichannel Campaign Management (MCCM) Description: The IBM Company seeks, as vendor, through the multichannel campaign management (MCCM) services,
Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
Choosing a Replacement for Incumbent One-Time Password Tokens
Research Publication Date: 21 April 2011 ID Number: G00212244 Choosing a Replacement for Incumbent One-Time Password Tokens Ant Allan This research outlines the options for enterprises seeking replacements
Cloud IaaS: Security Considerations
G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the
Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius
Naujos kartos ugniasienės Next Generation Firewalls (NGFW) Mindaugas Kubilius, Fortinet sprendimų inžinierius 1 The Evolving Security World The Easy Internet High Degree of IT control Slow rate of change
MarketScope for IT Governance, Risk and Compliance Management, 2008
Research Publication Date: 11 February 2008 ID Number: G00154941 MarketScope for IT Governance, Risk and Compliance Management, 2008 Paul E. Proctor, Mark Nicolett, French Caldwell The IT GRCM market was
The IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
Magic Quadrant for Unified Threat Management
Magic Quadrant for Unified Threat Management 27 August 2015 ID:G00269677 Analyst(s): Jeremy D'Hoinne, Adam Hils, Greg Young, Rajpreet Kaur Unified threat management devices provide small and midsize businesses
Gartner's View on 'Bring Your Own' in Client Computing
G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting
Analysis of the Global Unified Threat Management (UTM) Market Enterprise Features and Product Value Propel Market Growth
Analysis of the Global Unified Threat Management (UTM) Market Enterprise Features and Product Value Propel Market Growth November 2012 Research Team Lead Analyst Chris Rodriguez Industry Analyst Network
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality
Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
Cloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost
G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures
The 2H05 Magic Quadrant for managed
Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security
The Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand
Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable
Recognize the Importance of Digital Marketing
Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated
The Four New Ps of Marketing That CMOs and CIOs Should Consider
G00227185 The Four New Ps of Marketing That CMOs and CIOs Should Consider Published: 18 May 2012 Analyst(s): Kimberly Collins Four new Ps of marketing align people and processes across the marketing ecosystem,
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
Cloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
Strategic Road Map for Network Access Control
G00219087 Strategic Road Map for Network Access Control Published: 11 October 2011 Analyst(s): Lawrence Orans, John Pescatore Long derided as an overhyped concept, network access control (NAC) has emerged
IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
CIO Update: The Gartner Firewall Magic Quadrant for 2H02
IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market
High Performance NGFW Extended
High Performance NGFW Extended Enrique Millán Country Manager Colombia [email protected] 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
Understanding Vulnerability Management Life Cycle Functions
Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
Magic Quadrant for Application Delivery Controllers
Research Publication Date: 25 July 2008 ID Number: G00158570 Magic Quadrant for Application Delivery Controllers Mark Fabbi, Joe Skorupa The market for products to improve the delivery of application software
The Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
Solution Path: Threats and Vulnerabilities
Solution Path: Threats and Vulnerabilities Published: 24 January 2012 Burton IT1 Research G00226331 Analyst(s): Dan Blum This solution path helps Gartner clients develop a strategy and program for managing
User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009
Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly
NAC Strategies for Supporting BYOD Environments
G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
X.509 Certificate Management: Avoiding Downtime and Brand Damage
G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity
The Six Triggers for Using Data Center Infrastructure Management Tools
G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using
IT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game
Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s
Roundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success
Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
Repurposing Old PCs as Thin Clients as a Way to Save Money
Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers
SSL VPN 1H03 Magic Quadrant Evaluation Criteria
Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and
Magic Quadrant for WAN Optimization Controllers, 2007
Research Publication Date: 14 December 2007 ID Number: G00153256 Magic Quadrant for WAN Optimization Controllers, 2007 Andy Rolfe, Joe Skorupa The WOC market is maturing rapidly, but remains dynamic with
Document the IT Service Portfolio Before Creating the IT Service Catalog
Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service
