Gartner Magic Quadrant Sources and Disclaimer

Similar documents
Recognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership

Altiris Asset Management Suite 7.0

Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on

Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink.

CA Technologies Data Protection

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

How To Improve Your Network Security

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

VMware Vision Accelerating the Journey to Your Cloud

32% of Excel users are comfortable with using it for Advanced Analysis e.g., PivotTables

The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications

Embracing Complete BYOD Security with MDM and NAC

HP Services Global Service Desk with esupport. Innovative technology and business processes that transform IT support for your employees

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Enterprise Cloud Services

Cloud Database Demystified to Deliver SaaS Customer Value

Salient Managed Services. Hosting and Support

The power of collaboration: Accenture capabilities + Dell solutions

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

THINK CLOUD ATI CHALLENGES. 3 SITA 2011 SITA

Sam Cavaliere. Microsoft Corporation

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

Data Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy

How To Get A Cloud Service For A Small Business

End User Services. Managed Mobile. Mobile Device Management. Managed Mobile. Copyright 2012 FUJITSU

DATA TRANSPARENCY TOWN HALL MEETING

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

Business Intelligence with SharePoint 2010

Simplify and Automate IT

Top 10. Ten reasons customers choose SAP to help transform their business. Copyright/Trademark

How to Choose the Right Security Information and Event Management (SIEM) Solution

CA Systems Performance for Infrastructure Managers

Going Beyond Mobile Device Management - Leveraging NAC for Mobile Devices

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l t e r r e m a r k. c o m

#ITtrends #ITTRENDS SYMANTEC VISION

Commvault - Modern Data and Information Management. Aleksandar Antić Commvault Regional Sales SEE Region

Mobile device Management mit NAC

Sun and Oracle: Joining Forces in Identity Management

XenMobile Live Front to Back Demo

Technical Note. ForeScout MDM Data Security

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Microsoft Business Intelligence solution. What makes Microsoft BI difference

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

CHANGING THE RULES OF NETWORKING. Mike Banic, Vice President, Global Marketing, HP Networking January 13th, 2011

Skybox Security Survey: Next-Generation Firewall Management

Simplify and Automate IT

Devising a Server Protection Strategy with Trend Micro

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Recognized Leader in Human Capital Management. Paul Lacy President Mark Julien Chief Financial Officer 1

CA Virtual Assurance for Infrastructure Managers

Devising a Server Protection Strategy with Trend Micro

The ForeScout Difference

Transforming Communication Experience With Unified Collaboration Architecture Approach. Ahmed Zaghmouri Product Sales Specialist

Mobile First Era with MobileIron. MobileIron Japan

G06 - How to store your data in SharePoint

"The performance driven Enterprise" Emerging trends in Enterprise BI Platforms

IBM Tririga nástroj pre Real estate portfólio manažment

Web Security Gateway Solutions

MarketsandMarkets. Publisher Sample

MDM that Works. A Real World Guide to Making Data Quality a Successful Element of Your Cloud Strategy. Presented to Pervasive Metamorphosis Conference

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

Jits Langedijk Sr. Consultant

Independent process platform

Security Intelligence

Risk and threats everywhere, all the time

FROM PRODUCT TO PLATFORM

ORACLE FUSION MIDDLEWARE PROFILE

Reshaping the enterprise for the future of work. Are you ready?

Savvis Investor Update

<Insert Picture Here> Oracle Identity And Access Management

Uninett seminar, Tromsø 12/ Jan Harald Østbye

AirWatch Solution Overview

The CIO Guide to Virtual Server Data Protection

Microsoft Hybrid Cloud: Best of Both Worlds. March 26, 2015

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore

Parallel Data Warehouse

MarketsandMarkets. Publisher Sample

Product Support Notice. FTP backup MSS to a Windows 2003 Server

CommVault Backup Appliance with NetApp

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA

SAS CUSTOMER INTELLIGENCE. Solve more marketing challenges with a comprehensive enterprise solution

Transcription:

Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint Protection Platforms; by Peter Firstbrook, Arabella Hallawell, John Girard, Neil MacDonald; May 4, 2009 3. Gartner Magic Quadrant for Security Information and Event Management; by Mark Nicolett, Kelly M. Kavanagh; May 29, 2009 4. Gartner Magic Quadrant for Content-Aware Data Loss Prevention; by Eric Ouellet, Paul E. Proctor; June 22, 2009 5. Gartner Magic Quadrant for PC Life Cycle Configuration Management; by Terrence Cosgrove, Ronni J. Colville; December 29, 2008 The Magic Quadrants are copyrighted by Gartner, Inc. and are reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 24

Appendix Full slide deck (all questions)

Methodology Applied Research performed survey January 2010 2,100 worldwide responses Small enterprise (500 999 employees) Medium enterprise (1,000 4,999 employees) Large enterprise (5,000 or more employees)

Demographics

Company size

Industries

Medium enterprise

Medium enterprise

Large enterprise

Large enterprise

Objectives

Security risks

Enterprise security status

IT improvements

Planned change for enterprise security

Vendor security protection

Vendor security

Vendor security

Staffing & Budget

Enterprise security staff Q16: Roughly how many people work on enterprise security or IT compliance in your organization worldwide? Median 120 people

Enterprise security staff

Enterprise security staff

Manpower capacity change

Manpower capacity staffing

Enterprise security job requisitions Q20: How many requisitions for enterprise security jobs does your company have open worldwide at the moment? Median 20 requisitions

Enterprise security job requisitions

Staff recruiting

Enterprise security budget Q23: What will your annual budget for all of your enterprise security worldwide be in 2010? Median $600,000

Enterprise security budget Q24: What is the percentage change for your enterprise security budgets over 2009? Median 11%

Enterprise security budget Q25: Looking ahead, what do you anticipate the percentage change for your enterprise security budgets will be in 2011 when compared to 2010? Median 11%

Outsourcing

Outsourcing

Outsourcing

Outsourcing impact

Training budget

Training budget

Training

Attacks & Remediation

Cyber attacks

Cyber attacks

Cyber attacks

Cyber attacks

Cyber attacks

Cyber losses

Cyber attack costs

Cyber attack costs

Cyber attack info

Safeguards

Network Security

IaaS and network security

PaaS and network security

Server virtualization and network security

Hypervisor malware

Hypervisor malware

Endpoint Security

Endpoint types

Endpoint types

Endpoint vulnerability

Employee-owned endpoints

Employee-owned endpoints

Endpoint standardization

Endpoint control

Endpoint safeguards

Endpoint attacks

Attack remediation costs

Endpoint attack causes Q59: What percentage of the aforementioned attacks were the results of improper configurations such as missed OS patches, incorrect security settings, out of date virus profiles, etc? Median 20%

Lost devices

Endpoint security processes

Endpoint security processes

Windows 7

Windows 7

Endpoint virtualization

Endpoint virtualization

Software-as-a-Service

Data Loss Prevention

Data loss concern

Data loss prevention

Data loss prevention

Data loss prevention

Other information security systems

Previous data loss

Previous data loss

Data loss consequences

Data loss threats

Virtualization strategy

Virtualization strategy

Cloud computing strategy

Cloud computing strategy

DLP selection

Messaging/Collaboration Security

Email systems

Email systems

Email systems

Email systems

Collaboration systems

Instant messaging

Social media tools

Social networking sites

Employee access to social media

Employee access to social media

Messaging/Collaboration threats

Messaging/Collaboration security

Messaging/Collaboration protection

Messaging/Collaboration protection

Hosted security

Hosted security

Web Security

Web property security

Web property security

Web property attacks

Web property attack costs

Safeguards

Compliance

Standards and frameworks

Standard compliance

Compliance budget Q105: What is your total budget for compliance efforts worldwide? Median $200,000

Compliance budget

Compliance budget

Industry Verticals: Financial

Industry Verticals: Financial

Industry Verticals: Financial

Industry Verticals: Financial

Industry Verticals: Financial

Industry Verticals: Financial

Industry Verticals: Financial

Industry Verticals: Healthcare

Industry Verticals: Healthcare

Industry Verticals: Healthcare

Industry Verticals: Healthcare

Industry Verticals: Healthcare

Industry Verticals: Healthcare

Industry Verticals: Public Sector (US)

Industry Verticals: Public Sector (US)

Industry Verticals: Public Sector (US) Q120: What percentage of your security funding is coming from national stimulus funding currently? Median 0%

Industry Verticals: Public Sector (Non-US)

Industry Verticals: Public Sector (Non-US)

Industry Verticals: Public Sector (Non-US)

Industry Verticals: Telecommunications

Industry Verticals: Telecommunications

Industry Verticals: Telecommunications

Industry Verticals: Telecommunications

Industry Verticals: Telecommunications