Advanced Persistent Threat (APT) Protection - Market Quadrant 2015



Similar documents
Stop advanced targeted attacks, identify high risk users and control Insider Threats

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Comprehensive real-time protection against Advanced Threats and data theft

TRITON APX. Websense TRITON APX

Unified Security, ATP and more

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

How To Buy Nitro Security

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Cisco Advanced Malware Protection for Endpoints

ENABLING FAST RESPONSES THREAT MONITORING

WEBSENSE TRITON SOLUTIONS

Fighting Advanced Threats

Unified Threat Management, Managed Security, and the Cloud Services Model

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

MSSP Advanced Threat Protection Service

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

2012 North American Enterprise Firewalls Market Penetration Leadership Award

The Hillstone and Trend Micro Joint Solution

High Performance NGFW Extended

SECURITY REIMAGINED. FireEye Network Threat Prevention Platform. Threat Prevention Platform that Combats Web-based Cyber Attacks

Cisco Advanced Malware Protection for Endpoints

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

WEBSENSE SECURITY SOLUTIONS OVERVIEW

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

WildFire. Preparing for Modern Network Attacks

Content-ID. Content-ID URLS THREATS DATA

The Evolution of the Enterprise And Enterprise Security

Lab Validation Report

Networking for Caribbean Development

Spear Phishing Attacks Why They are Successful and How to Stop Them

SANS Top 20 Critical Controls for Effective Cyber Defense

Next-Generation Firewalls: Critical to SMB Network Security

Internal Network Firewall (INFW) Protecting your network from the inside out

Cisco Advanced Malware Protection

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

GOING BEYOND BLOCKING AN ATTACK

McAfee Security Architectures for the Public Sector

On-Premises DDoS Mitigation for the Enterprise

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

Market Guide for Network Sandboxing

Simple security is better security Or: How complexity became the biggest security threat

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Moving Beyond Proxies

Corporate Web Security - Market Quadrant 2015

Vulnerability Management

Analyzing HTTP/HTTPS Traffic Logs

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

Securing the Internet of Things

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

Endpoint Security for DeltaV Systems

FROM PRODUCT TO PLATFORM

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Integrating MSS, SEP and NGFW to catch targeted APTs

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

How To Sell Security Products To A Network Security Company

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Carbon Black and Palo Alto Networks

SOLUTION GUIDE. Maintaining Business Continuity Fighting Today s Advanced Attacks

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Securing Cloud-Based

INSERT COMPANY LOGO HERE

Lab Testing Detailed Report DR January Competitive Testing of Web Security Devices

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

A Modern Framework for Network Security in Government

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

SourceFireNext-Generation IPS

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Top 10 Reasons Enterprises are Moving Security to the Cloud

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

INTRODUCING isheriff CLOUD SECURITY

Securing the Small Business Network. Keeping up with the changing threat landscape

Palo Alto Networks. October 6

We ve got the UK covered

Managing Web Security in an Increasingly Challenging Threat Landscape

overview Enterprise Security Solutions

Advantages of Managed Security Services

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Next-Generation Firewalls: CEO, Miercom

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

How Attackers are Targeting Your Mobile Devices. Wade Williamson

V1.4. Spambrella Continuity SaaS. August 2

Trend Micro. Advanced Security Built for the Cloud

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Enterprise Security Platform for Government

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible

Requirements When Considering a Next- Generation Firewall

Endpoint protection for physical and virtual desktops

Direct or Transparent Proxy?

How To Build Security By Silo

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.

Transcription:

.......... THE RADICATI GROUP, INC. The Radicati Group, Inc. Palo Alto, CA 94301 Phone: (650) 322-8059 www.radicati.com. Advanced Persistent Threat (APT) Protection - Market Quadrant 2015.......... An Analysis of the Market for APT Protection Solutions, Revealing Top Players, Trail Blazers, Specialists and Mature Players. April 2015 Radicati Market Quadrant SM is copyrighted April 2015 by The Radicati Group, Inc. Reproduction in whole or in part is prohibited without expressed written permission of the Radicati Group. Vendors and products depicted in Radicati Market Quadrants SM should not be considered an endorsement, but rather a measure of The Radicati Group s opinion, based on product reviews, primary research studies, vendor interviews, historical data, and other metrics. The Radicati Group intends its Market Quadrants to be one of many information sources that readers use to form opinions and make decisions. Radicati Market Quadrants SM are time sensitive, designed to depict the landscape of a particular market at a given point in time. The Radicati Group disclaims all warranties as to the accuracy or completeness of such information. The Radicati Group shall have no liability for errors, omissions, or inadequacies in the information contained herein or for interpretations thereof.

TABLE OF CONTENTS RADICATI MARKET QUADRANTS EXPLAINED... 3 MARKET SEGMENTATION ADVANCED PERSISTENT THREAT (APT) PROTECTION... 5 EVALUATION CRITERIA... 7 MARKET QUADRANT APT PROTECTION VENDORS... 9 KEY MARKET QUADRANT TRENDS...10 APT PREVENTION - VENDOR ANALYSIS... 12 TOP PLAYERS...12 TRAIL BLAZERS...22 SPECIALISTS...26 Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 2

RADICATI MARKET QUADRANTS EXPLAINED Radicati Market Quadrants SM are designed to illustrate how individual vendors fit within specific technology markets at any given point in time. All Radicati Market Quadrants SM are composed of four sections, as shown in the example quadrant (Figure 1). 1. Specialists This group is made up of two types of companies: a. Emerging players that are still very new to the industry and have not yet built up much of an installed base. These companies are still developing their strategy and technology. b. Established vendors that offer a niche product. 2. Trail Blazers These vendors offer cutting edge technology, but have not yet built up a large customer base. With effective marketing and better awareness, these companies hold the power to dethrone the current market leaders. Trail blazers often shape the future of technology with their innovations and new products designs. 3. Top Players These are the current leaders of the market, with products that have built up large customer bases. Vendors don t become top players overnight. Most of the companies in this quadrant were first specialists or trail blazers (some were both). As companies reach this stage, they must fight complacency and continue product innovation, or else they ll be replaced by the next generation of trail blazers. 4. Mature Player These vendors have large, mature installed bases of customers, but no longer set the pace for the rest of the industry. These vendors are no longer considered movers and shakers like they once were. a. In some cases, this is by design. If a vendor has made a strategic decision to move in a new direction, it may slow development on one product line and start another. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 3

Low Market Share High APT Protection - Market Quadrant 2015 b. In other cases, a vendor may simply become complacent as a top vendor and be out-developed by hungrier trail blazers and other top players. c. Companies in this stage either find new life and revive their R&D, moving back into the top players segment, or else they slowly fade away as legacy technology. Figure 1, below, shows a sample Radicati Market Quadrant SM. As a vendor continues to develop its product, it will move horizontally along the x axis. As market share changes, vendors move vertically along the y axis. It is common for vendors to move between quadrants over the life of a product, as their products improve and market requirements evolve. Radicati Market Quadrant Mature Players Top Players Company Z Company L Company Y Company J Company H Company D Company B Company C Company A Specialists Low Functionality Company F Company G Company E Trail Blazers Figure 1: Sample Radicati Market Quadrant SM High Functionality is rated from 1 to 10, with 10 being the highest, and 1 the lowest. Market Share is assigned according to the company s ranking in our latest annual reports, based on its user Installed Base (e.g. the company with the largest installed base market share is number 1, the one with the second largest installed base market share is number 2, etc.). Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 4

MARKET SEGMENTATION ADVANCED PERSISTENT THREAT (APT) PROTECTION This edition of Radicati Market Quadrants SM covers the Advanced Persistent Threat (APT) Protection segment of the Security Market, which is defined as follows: Advanced Persistent Threat Solutions are a set of integrated solutions for the detection, prevention and possible remediation of zero-day threats and persistent malicious attacks. APT solutions may include but are not limited to: sandboxing, reputation networks, threat intelligence management and reporting, forensic analysis and more. Some of the leading players in this market are Blue Coat Systems, FireEye, Fortinet, McAfee, Palo Alto Networks, Sophos, Webroot, and Websense. While some product solutions target service providers (carriers, MSPs, etc.) as well as enterprise organizations, this report only looks at vendor installed base and revenue market share in the context of their enterprise business. APT solutions can be deployed in multiple form factors, including software, appliances, private or public cloud, and hybrid models. Virtualization is increasingly available through most APT security vendors. APT solutions, initially deployed mainly by large enterprises, are now seeing rapid adoption across all business sizes and industry segments, as organizations grow increasingly concerned about targeted malicious attacks. The worldwide revenue for APT Prevention solutions is expected to grow from over $1.9 billion in 2015, to over $6.7 billion by 2019. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 5

$8,000 $7,000 APT Protection - Revenue Forecast 2015-2019 $6,708 $6,000 $5,000 $4,791 $4,000 $3,000 $2,000 $1,950 $2,535 $3,422 $1,000 $0 2015 2016 2017 2018 2019 Figure 2: APT Protection Market Revenue Forecast, 2015 2019 Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 6

EVALUATION CRITERIA Vendors are positioned in the quadrant according to two criteria: Market Share and Functionality. Market Share is based on the projected installed base published in our Advanced Persistent Threat (APT) Prevention Market, 2015-2019 report. The vendor with the largest projected installed base has a market share of 1, the one with the second largest projected installed base has a market share of 2, etc. Vendors with larger market shares are positioned either in Top Player or Mature quadrants. Vendors with smaller market shares are positioned either in the Trail Blazer, or Specialist quadrants. Functionality is assessed for each vendor s solution based on a number of key features that it offers out of the box. These capabilities do not necessarily have to be the vendor s own original technology, but they should be integrated and available for deployment when the solution is purchased. In order for an APT Prevention vendor to be on the right side of the quadrant (Top Player or Trail Blazer), their solution should possess the following capabilities: Malware detection usually based on behavior analysis, reputation filtering, advanced heuristics, and more. Firewall & URL filtering for attack behavior analysis. Web and Email Security serve to block malware that originates from Web browsing or emails with malicious intent. SSL scanning traffic over an SSL connection is also commonly monitored to enforce corporate policies. Encrypted traffic analysis provides monitoring of behavior of encrypted traffic to detect potential attacks. Forensics and Analysis of zero-day and advanced threats provide heuristics and behavior analysis to detect advanced and zero-day attacks. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 7

Sandboxing and Quarantining offer detection and isolation of potential threats. Directory Integration for instance integration with Active Directory or LDAP, to help mange and enforce user policies. Data Loss Prevention (DLP) allows organizations to define policies to prevent loss of sensitive electronic information. Mobile Device Protection the availability of Mobile Device Management or Enterprise Mobility Management features to help protect mobile endpoints. Administration easy, single pane of glass management across all users and network resources. Real-time updates to remediate newly identified threats or attacks across all network resources. Environment threat analysis to detect existing exposure and potential threat sources. Note: On occasion, we may put a player on the right side of the quadrant by giving them a higher than typical Functionality Score, even if they are missing one or two of the features mentioned above, if we feel that the other aspects of their solution are particularly unique and innovative. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 8

Market Share APT Protection - Market Quadrant 2015 MARKET QUADRANT APT PREVENTION VENDORS High Radicati Market Quadrant SM Mature Players Top Players Websense McAfee Blue Coat Fortinet FireEye Palo Alto Networks Sophos Low Specialists Webroot Trail Blazers Low Functionality High Figure 3: APT Prevention Market Quadrant, 2015 Radicati Market Quadrant SM is copyrighted April 2015 by The Radicati Group, Inc. Reproduction in whole or in part is prohibited without expressed written permission of the Radicati Group. Vendors and products depicted in Radicati Market Quadrants SM should not be considered an endorsement, but rather a measure of The Radicati Group s opinion, based on product reviews, primary research studies, vendor interviews, historical data, and other metrics. The Radicati Group intends its Market Quadrants to be one of many information sources that readers use to form opinions and make decisions. Radicati Market Quadrants SM are time sensitive, designed to depict the landscape of a particular market at a given point in time. The Radicati Group disclaims all warranties as to the accuracy or completeness of such information. The Radicati Group shall have no liability for errors, omissions, or inadequacies in the information contained herein or for interpretations thereof. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 9

KEY MARKET QUADRANT TRENDS The Top Players in the market are Websense, McAfee, Blue Coat and Fortinet. o Websense offers a strong APT solution, to unify web, email, data and endpoint security to stop advanced persistent threats, targeted attacks and evolving malware. o McAfee offers solid APT protection, which enables organizations to detect advanced targeted attacks and convert threat information into immediate action and protection. o Blue Coat is an early an innovator in Advanced Threat Protection (ATP) solutions and delivers a lifecycle defense that protects networks against a spectrum of security threats, while automating the containment and resolution of incidents. o Fortinet offers an integrated advanced threat protection (ATP) framework, which includes technologies to prevent, detect and mitigate threats. The Trail Blazers quadrant includes Sophos and Webroot. o Sophos offers a set of complementary solutions for APT, which comprise: network protection, endpoint protection for workstations and mobile devices, and unified threat intelligence. o Webroot offers cloud-based, real-time Internet threat detection which collects, analyzes and correlates file behavior, reputation, URL and IP reputation, realtime anti-phishing, mobile app reputation, and more. The Specialists quadrant includes FireEye and Palo Alto Networks. o FireEye offers automated threat forensics and dynamic malware protection against APT and spear phishing. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 10

o Palo Alto Networks offers an APT solution, which provides complete visibility into all network traffic, across applications, Web traffic, email protocols, and file transfer, regardless of ports or encryption use. There are no Mature Players in this market at this time. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 11

APT PREVENTION - VENDOR ANALYSIS TOP PLAYERS WEBSENSE 10900 Stonelake Blvd 3rd Floor Austin, TX 78759 www.websense.com Founded in 1994, Websense offers Web, data, and email content security solutions to organizations of all sizes. Websense s TRITON APX offers comprehensive data theft prevention for web, email, data and endpoint security to stop advanced persistent threats, targeted attacks and evolving malware. TRITON APX Enterprise Core is Websense s foundational APT offering that combines advanced outbound data protection with inbound threat detection in a unified solution for complete web, email, and data security. TRITON APX utilizes Websense ACE (Advanced Classification Engine), which analyzes web and email traffic in real time with 10,000+ analytics and composite risk scoring for signature-less threat identification. The in-line, real-time TRITON APX defenses cover the multiple stages of advanced threats for inbound and outbound traffic. This protects data in motion through web and email channels, as well as data at rest on servers and endpoints. The basic TRITON APX Enterprise Core suite includes: TRITON AP-WEB Web gateway proxy available for on-premise, cloud-based, or hybrid deployment modes. TRITON AP-EMAIL Secure email gateway with integrated DLP protection available in the cloud, on-premise, or in a hybrid on-premise with cloud prefiltering modes. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 12

TRITON AP-DATA Content-aware data loss prevention solution to discover and secure an organization s sensitive information and prevent data theft. TRITON AP-ENDPOINT Protects roaming users against data theft and retains control of sensitive information on Mac and Windows endpoint systems, both on and off the network. To obtain the full data theft prevention capabilities, Websense offers the following advanced modules that can be added to the core TRITON APX solutions for Web, Email, Data and Endpoint products described above: Web Sandbox Module Monitors Web traffic for real-time code analysis in a behavioral sandbox and provides detailed forensic reporting on sandbox results. Email Sandbox Module Intercepts attachments and URLs in real time for additional threat analysis in a behavioral sandbox. It also provides phishing education and reporting. Email Encryption Module A policy-driven service that enables the secure delivery of email communications to comply with regulations and protect the confidentiality of sensitive information. Image Analysis Module Identifies explicit images in email that may violate sexual harassment or other policies and regulations. TRITON AP-MOBILE Protect against mobile malware, malicious apps, SMS spoofing, phishing, web threats and data loss. MDM features are provided through integration with AirWatch. FUNCTIONALITY: 9 MARKET SHARE: 1 Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 13

KEY STRENGTHS: Websense offers Unified Web, Email, Data and Endpoint security. Threat Intelligence is shared and applied across all channels, for inbound and outbound traffic, to stop attacks before they complete their life cycle. The unified TRITON architecture offers a single management console which facilitates the management of a sophisticated end-to-end security solution across an enterprise. Websense s flexible, modularized packaging allows customers to purchase the product and features they need, and add more advanced capabilities over time as threats and needs evolve. Fully contextually aware DLP provides enterprise-class data loss protection for endpoints, Web and Email gateways, and both networked and cloud storage. WEAKNESSES: Websense needs to continue to innovate with advanced protection for malware attacks and data theft aimed at roaming endpoints. Websense needs to continue to integrate with third-party solutions such as SIEMs. Websense needs to provide predictive, actionable threat intelligence reporting across the entire threat lifecycle. INTEL SECURITY (MCAFEE) 2821 Mission College Boulevard Santa Clara, CA 95054 http://www.intelsecurity.com McAfee, a separate business unit of Intel Corporation, delivers security solutions and services for systems, networks, and mobile devices. The company s approach to hardware- Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 14

enhanced security, and McAfee Global Threat Intelligence network provides security solutions and services that protect systems, networks, and mobile devices for business and personal use. McAfee Advanced Threat Defense enables organizations to detect advanced targeted attacks and convert threat information into immediate action and protection. Unlike traditional sandboxing, Advanced Threat Defense includes static code analysis, which provides additional inspection capabilities that broaden detection and expose evasive threats. Tight integration between Intel Security solutions, from network to endpoint, enables instant sharing of threat information. Protection is enhanced as attempts to infiltrate the organization are blocked. Indicators of compromised data are used to find and correct threat infiltrations, helping organizations recover post-attack. Advanced Threat Defense comprises the following characteristics: Advanced analysis ensures that dynamic analysis through sandboxing, and static code analysis, together provide inspection and detection capabilities. Malicious activity is observed in the sandbox environment and simultaneously examined with in-depth static code analysis to broaden detection and identify evasive maneuvers. Centralized deployment allows customers to leverage shared resources for malware analysis with a high performance architecture that scales with fewer appliances. Security Connected an Intel Security-wide initiative, allows integrated solutions to move organizations from analysis and conviction to protection and resolution. At the data level, Advanced Threat Defense integrates with other solutions so that they can make immediate decisions about blocking traffic or executing an endpoint service, or whether or not an organized attack is taking place against targeted organization individuals. Out-of-the-box, Advanced Threat Defense plugs in and integrates other McAfee solutions, including: Network Security Platform (IPS), Next Generation Firewall, Enterprise Security Manager (SIEM), epolicy Orchestrator (epo) and McAfee endpoint solutions, Web Gateway, Email Gateway, and McAfee Threat Intelligence Exchange (which serves as the information broker and middleware messaging layer for McAfee security products). Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 15

FUNCTIONALITY: 9 MARKET SHARE: 2 KEY STRENGTHS: Combination of in-depth static code and dynamic analysis through sandboxing, provide strong analysis and detection capabilities. McAfee offers one of the broadest analysis environments available, encompassing desktop computers, servers, and mobile devices. Additional detection engines, including signatures, reputation, and real-time emulation enhance analysis speed. Centralized analysis device acts as a shared resource between multiple Intel Security devices. Tight integration between Advanced Threat Defense and all Intel Security solutions, directly or through McAfee s Threat Intelligence Exchange (TIE), allows instant information sharing and action across the network when attacks are detected. WEAKNESSES: McAfee s Advanced Threat Defense works best in the context of a full McAfee security deployment across computers, servers, and mobile devices. McAfee solutions are a somewhat pricier than offerings from competing vendors, but do offer more feature and functionality. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 16

BLUE COAT 420 N. Mary Avenue Sunnyvale, CA 94085-4121 www.bluecoat.com Blue Coat is a provider of network security and threat detection technology. Its Business Assurance Technology provides Web Security and Advance Threat Protection (ATP) solutions. Blue Coat Advanced Threat Protection solution delivers a lifecycle defense that protects networks against a spectrum of security threats. The solution safeguards against advanced persistent threats, detects both known and unknown malware, and automates the containment and resolution of incidents that have occurred. Blue Coat ProxySG appliance, Secure Web Gateway Virtual Appliance, or Cloud Service block in real-time known threats, malicious sources, and malnets (malware delivery networks) at the gateway. The Blue Coat Content Analysis System integrates with the Proxy SG appliance to orchestrate malware scanning and application whitelisting while the Blue Coat SSL Visibility appliance gives visibility into threats hiding in encrypted traffic. Blue Coat Advanced Threat Protection analyzes and mitigates unknown malware using the Blue Coat Content Analysis System, with malware analysis and sandboxing, as well as the Security Analytics Platform, with integrated ThreatBLADES. As the behaviors and characteristics of an unknown threat are learned through automated analysis, intelligence is shared across the security infrastructure, enhancing protection at the gateway for scalable defense. Security Analytics Platform is used for threat profiling to eradicate threats that have penetrated the network. Intelligence of a new known threat is used to investigate and remediate the full scope of the attack, including other instances of malicious files and threats already on the network. Intelligence is shared across the enterprise infrastructure, as well as across the Blue Coat Global Intelligence Network to automate detection of the newly identified threats. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 17

FUNCTIONALITY: 9 MARKET SHARE: 3 KEY STRENGTHS: Blue Coat offers policy-based encrypted traffic management for both inbound and outbound traffic to uncover encrypted APTs. Blue Coat provides extensive filtering and blocking of all known threats using whitelists, blacklists and anti-malware scanning. Next-generation sandboxing uses dual detection via emulation and virtual sandbox techniques, enabling users to customize their sandbox in order replicate production images as needed. Blue Coat offers an integrated, easy to use incident response and advanced forensics capability to fully resolve APTs. The Blue Coat Global Intelligence Network powers all the products in the lifecycle defense solution with latest threat information. WEAKNESSES: Blue Coat s APT solution is aimed primarily at the needs of medium and large enterprises. Small business (SMB) may not have the needed budget to fully deploy all the components of Blue Coat APT solution. Blue Coat does not offer firewall protection, but relies on its Web Security solution for url filtering. Blue Coat is best known for its Web Security solutions and needs to raise market visibility for its APT solution. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 18

FORTINET 899 Kifer Road Sunnyvale, CA 94086 www.fortinet.com Founded in 2000, Fortinet is a leading vendor of next-generation firewall and network security solutions. The company offers network security appliances and security subscription services aimed at the needs of carriers, data centers, enterprises, distributed offices and MSSPs. Fortinet offers an integrated advanced threat protection (ATP) framework, which includes technologies to prevent, detect and mitigate threats. Fortinet s product portfolio includes: FortiGate Next Generation Firewall consists of physical and virtual appliances that provide a broad array of security and networking functions, including firewall, VPN, antimalware, intrusion prevention, application control, Web filtering, anti-spam, DLP, WAN acceleration, and WLAN control. FortiMail Secure Email Gateway provides a single solution to protect against inbound attacks, including advanced malware, as well as outbound threats and data loss. It includes: antispam, antiphishing, anti-malware, sandboxing, data leakage prevention (DLP), identity based encryption (IBE), and message archiving. FortiWeb Web Application Firewall protects web-based applications and internetfacing data from attack and data loss with bidirectional protection against malicious sources, application layer DoS Attacks, and sophisticated threats such as SQL injection and cross-site scripting. FortiAuthenticator - provide strong two-factor authentication, RADIUS, LDAP and 802.1X Wireless Authentication Certificate management, as well as Single Sign-on. FortiClient Endpoint Protection offers endpoint client protection for desktops, laptops, tablets and smartphones. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 19

FortiAnalyzer provides log and reporting to build and maintain a comprehensive view of an organization s security posture. FortiSandbox provides deep analysis of at risk objects to discover new and unknown malware, malicious or compromised sites, command and control servers and more. It can set up a full virtual sandbox environment where it performs deep analysis of file behavior. To expedite discovery, FortiSandbox employs a multi-step approach to analyzing objects. Often file attributes (including evasion techniques) are identified in earlier steps and FortiSandbox can skip directly to reporting findings, speeding up the time to action. FortiSandbox delivers deep analysis of new threats, including their intended behavior and endpoints that may have been infected. Integration between FortiSandbox Cloud and FortiGate enables administrators to quarantine infected endpoints with one click of a button. FortiGate pre-filters traffic so only at risk objects are forwarded to FortiSandbox for analysis. A single FortiSandbox can support multiple FortiGates, eliminating the need to put a sandbox at every ingress/egress point. New threat information uncovered by FortiSandbox is used by the FortiGuard Labs threat research team, to create new security updates to be sent to all Fortinet products. For instance, FortiSandbox can provide an excellent preventative security measure through integration with FortiMail, where FortiMail can hold an email while any risky object in that email is analyzed via FortiSandbox. The email is then delivered to the recipient after it has passed sandbox analysis, or blocked if malicious items are identified. Fortinet also offers a range of services to help mitigate attacks including Resident Engineers, Premier Signature Services and more. FUNCTIONALITY: 8 MARKET SHARE: 4 KEY STRENGTHS: Effective threat prevention validated through independent testing with NSS Labs, VB100, and AV Comparatives for anti-malware, IPS, antiphishing, antispam, NGFW, Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 20

and sandboxing. Fortinet offers a broad portfolio to facilitate a coordinated and effective approach to advanced threat protection. Fortinet offers an integrated approach to sandboxing, making it easy to deploy and affordable. Custom ASICs and hardware that deliver performance, enabling more security to be deployed at each inspection point. Fortinet products are all developed in-house (without relying on OEM products), which allows the vendor to deliver solutions with broad threat insight and seamless operation across products. WEAKNESSES: Fortinet currently offers only store and forward protection for email, however, the vendor is working to update Fortimail protection with near real-time time to click protection. Support for custom images in the sandbox requires professional services. Fortinet s depth of forensic packet capture/replay is currently somewhat limited. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 21

TRAIL BLAZERS SOPHOS, LTD. 3 Van de Graaff Drive Burlington, MA 01803 www.sophos.com Sophos provides IT and data security solutions for businesses on a worldwide basis. SophosLabs is the R&D division behind the vendor s antivirus and malware research. Sophos provides security solutions such as endpoint and mobile security, enterprise mobility management, encryption, server protection, secure email and web gateways, nextgeneration firewall and unified threat management (UTM). Sophos offers a set of complementary solutions for APT, which comprise: Sophos UTM, for network protection, Sophos Endpoint Protection for workstations and mobile devices, and SophosLabs which provides unified threat intelligence across all platforms. Sophos UTM - is an integrated network security system that combines a next-gen firewall and IPS with web, email, remote access, and wireless security functionality. It includes Advanced Threat Protection through: o Sandboxing which analyzes and detonates suspicious content in a safe, cloudbased environment to identify and block previously unseen threats. o Suspicious traffic detection which identifies when an endpoint is trying to communicate with a malicious server. Once detected, the UTM blocks the traffic and notifies the administrator. This lets organization detect the presence of compromised endpoints and prevent attacks from spreading, exfiltrating data, or receiving commands. Sophos Endpoint Protection - is an endpoint security solution designed to prevent, detect, and remediate threats. It is available as a cloud-managed or on-premise solution. It helps administrators reduce the attack surface through features such as application control, device control, and web filtering. It then uses a system of sensors that correlate application Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 22

behavior, website reputation, file characteristics, network activity, and more to identify and block exploits and previously unseen malware. Cleanup and quarantine capabilities neutralize detected threats and help return users systems to a clean state. SophosLabs is the company s global research network, which collects, correlates, and analyzes endpoint, network, server, email, web, and mobile threat data from across Sophos s entire customer base. It simplifies configuration by feeding advanced threat intelligence directly into Sophos products in the form of preconfigured settings and rules. This allows systems to be deployed quickly without the need for dedicated, trained security staff to update and test the configuration over time. FUNCTIONALITY: 8 MARKET SHARE: 7 KEY STRENGTHS: Sophos APT solutions emphasize simplicity of configuration, deployment, and management to minimize the time and expertise required to use the solutions. Sophos solutions are able to remove malware from compromised endpoints, where other vendors are only issue an alert or temporarily block malicious code. Sophos is working to add greater real-time threat intelligence between the Sophos UTM and Sophos Endpoint Protection solutions for faster, more cohesive APT protection. Sophos incorporates APT defenses into complete security solutions that can replace, rather than supplement, existing layers of protection. Sophos UTM and endpoint protection solutions are attractively priced for the midmarket. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 23

WEAKNESSES: Integration between Sophos endpoint and network solutions for correlated APT protection will not be available until later in 2015. While Sophos APT solutions forensic analysis capabilities are used within the product for automated detection and remediation, not all the information is exposed to administrators. In pursuit of simplicity, Sophos solutions sometimes favor features and rule sets that are configured automatically by SophosLabs, over providing administrators with granular, do-it-yourself controls. Currently, Sophos application whitelisting is limited to servers; the company does, however, offer category-based application control for workstations. WEBROOT INC. 385 Interlocken Crescent, Suite 800 Broomfield, CO 80021 www.webroot.com Webroot, founded in 1997, provides cybersecurity solutions to protect against malware and other cyberattacks using its cloud-based threat intelligence network. Webroot SecureAnywhere Business Endpoint Protection is a real-time, cloud-based approach to preventing malware. It is compatible with Microsoft Windows PCs, Laptops and Servers as well as Android and Apple devices Terminal Servers and Citrix; VMware; virtual desktops, servers and point of sale (POS) systems. SecureAnywhere s file pattern and predictive behavior recognition technology is designed to stop malware, including APT s and zero-day threats at the moment of infection. Unlike conventional AV there are no definition or signature updates to deploy, and no management issues with ensuring that endpoints are properly updated. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 24

Webroot s continuous endpoint monitoring agent ensures malware detection is in real-time and that every endpoint is always protected and up-to-date. The agent/cloud architecture eliminates device performance issues, allows for fast scheduled system scans, and ensures that device performance is not affected. It encompass virtual, desktop and server environments and embedded POS systems. SecureAnywhere s anti-malware architecture is also designed to coexist alongside existing AV with no immediate need to remove or replace because of software conflicts. SecureAnywhere also offers infection monitoring, journaling and rollback autoremediation. If new or changed files and processes cannot be immediately categorized, then full monitoring and journaling is started. In this endpoint state the uncategorized files and processes are overseen and any permanent system damage averted until categorization is completed. If a threat is then determined to be malware, any system changes made are reversed and the endpoint auto-remediated to its last known good state. This extra layer helps ensure minimal false positives, but if they occur administrators can easily override the Webroot categorization so business disruption is minimized. FUNCTIONALITY: 8 MARKET SHARE: 8 KEY STRENGTHS: The scanning, benchmarking and whitelisting of individual endpoint devices, coupled with continuous monitoring of each individual endpoint provides an individual/collective approach which ensures malware prevention is both individualized (to counter highly targeted attacks) and also offers collective prevention. The Webroot Intelligence Network uses Big Data processing techniques coupled to high computational scalability and actionable security intelligence to detect and prevent APTs. Individual endpoint infection visibility via dwell time alerts and reporting allows administrators to take action in respect of the risk profile of the endpoint. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 25

Webroot offers monitoring, journaling, protection and auto-remediation, which means that as soon as files and processes are categorized as undetermined, the endpoint system is protected from extensive damage and costly reimaging requirements. WEAKNESSES: While Webroot provides threat visibility it does not yet provide extensive forensics and auditing of data. Webroot needs to add interoperability with SIM s and SIEM s. Webroot is best known for its next generation endpoint protection, but currently lacks visibility as an APT solution provider. SPECIALISTS FIREEYE 1440 McCarthy Blvd. Milpitas, CA 95035 www.fireeye.com FireEye, founded in 2004, offers automated threat forensics and dynamic malware protection against APT and spear phishing. The company's solutions consist of web security, email security, file security, and malware analysis. The FireEye Network Threat Prevention Platform identifies and blocks zero-day Web exploits, droppers (binaries), and multi-protocol callbacks to help organizations deploy advanced threat defenses. FireEye Network can be deployed in-line at Internet egress points to block Web exploits and outbound multi-protocol callbacks. It comprises the following: Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 26

o Intrusion Prevention System (IPS) technology designed to stop drive-by downloads and blended Web and email attacks. o FireEye Multi-vector Virtual Execution (MVX) engine allows FireEye Network to confirm zero-day attacks, create real-time threat intelligence, and capture dynamic callback destinations. In monitor mode, it serves as an incident response mechanisms. In out-of-band prevention mode, it issues TCP resets for out-of-band blocking of TCP, UDP, or HTTP connections. o FireEye Email Security products (EX and ETP) protect against cyber attacks, by detonating and analyzing suspicious email attachments and embedded URLs, and blocking anything malicious. FireEye also provides anti-virus and anti-spam protection through Email Threat Prevention (ETP) in the cloud. o FireEye Network Forensics Platform (PX series) & Investigation Analysis system (IA series) are a powerful combination, pairing a network data capture and retrieval solution with centralized analysis and visualization. o HX series endpoint security products provide organizations with the ability to continuously monitor endpoints for advanced malware and indicators of compromise that can bypass signature-based and defense-in-depth security systems. o FireEye Mobile Security (Mobile Threat Prevention) detects and prevents mobile threats and provides visibility into mobile device security trends across the enterprise. It also integrates with industry leading mobile device management (MDM) providers. o File content security (FX Series) products scan internal file shares for malicious content that may have been brought into the organization from outside sources, such as online file shares and portable file storage devices. FUNCTIONALITY: 5 MARKET SHARE: 5 Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 27

KEY STRENGTHS: Protects against unknown, zero-day attacks through a signature-less engine, FireEye MVX, which executes suspicious binaries and Web objects against a range of browsers, plug-ins, applications, and operating environments. As the attack plays out, the FireEye MVX engine captures callback channels, dynamically creates blocking rules, and transmits the information back to FireEye Network. YARA-based rules enable security analysts to specify which Web objects should be analyzed for threats. The FireEye AV-Suite allows each malicious object to be further analyzed to determine if anti-virus vendors were able to detect the malware stopped by FireEye Network. This enables organizations to more efficiently prioritize incident response. Dynamic threat intelligence sharing, which includes callback coordinates and communication characteristics, can be shared through the FireEye Dynamic Threat Intelligence (DTI) cloud to notify all subscribers of new threats. FireEye Network is an easy-to-manage, clientless platform that deploys quickly and requires no tuning. It can be deployed out-of-band, for in-line monitoring, or as in-line active blocking. FireEye Network supports integration with the active fail open switch to ensure no link downtime and drives availability for in-line hardware deployments in the event of power or link failures. It leverages heartbeat technology to monitor availability of the FireEye Network device and automatically switches to bypass in case of failure. FireEye Network with IPS consolidates advanced threat prevention with traditional security. It automates alert validation, reduces false alerts and helps detect hidden attacks. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 28

WEAKNESSES: FireEye s APT solutions are somewhat more expensive than competitors, however, the vendor prides itself on a higher rate of zero day exploit detection. FireEye currently lacks preventative capabilities for its endpoint/hx product, however, the company has announced that it will address this in future releases. Customers may find it difficult to understand how to put together an effective APT deployment given the many different components FireEye offers, without significant design support by the vendor. PALO ALTO NETWORKS, INC. 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com Palo Alto Networks, founded in 2005, is best known for its next-generation firewall solutions. The company covers a wide range of network security functions, including advanced threat protection, firewall, IDS/IPS, and URL filtering. WildFire is Palo Alto Networks APT solution. It can be deployed from any Palo Alto Networks security platform or as a private cloud option where all analysis and data remain on the local network. WildFire provides complete visibility into all traffic, including advanced threats, across nearly 400 applications, including Web traffic, email protocols (SMTP, IMAP, POP), and FTP, regardless of ports or encryption (SSL). Wildfire offers native integration with Palo Alto Networks Enterprise Security Platform, a service which brings advanced threat detection and prevention to all security platforms deployed throughout the network, automatically sharing protections with all WildFire subscribers globally in about 15 minutes. The service offers: o A unified, hybrid cloud architecture, either deployed through the public cloud, or via private cloud appliance that maintains all data on the local network. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 29

o Dynamic analysis of suspicious content in a cloud-based virtual environment to discover unknown threats. o Automatic creation and enforcement of best-in-class content-based malware protections. o Link detection in email, proactively blocking access to malicious websites. FUNCTIONALITY: 4 MARKET SHARE: 6 KEY STRENGTHS: Palo Alto Networks is well known as a leader and innovator in network security, the company is one of the early developers of APT technology. Wildfire is available in a variety of form factors (on-premise, private or public cloud) to help reduce costs and maximize investments. Wildfire integrates across Palo Alto Networks entire product portfolio to offer rapid, up to date threat intelligence. WEAKNESSES: Palo Alto Networks focuses on next generation firewalls and network security, but does not provide endpoint protection, secure email gateways or web gateways. This means its APT protection tends to be aimed mainly at the network layer rather than at applications. Palo Alto Networks solutions are somewhat costly when compared with other vendors in this space. While Palo Alto Networks provides strong real-time analysis, forensics and static analysis could be improved to ease investigations and reporting. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 30

THE RADICATI GROUP, INC. http://www.radicati.com The Radicati Group, Inc. is a leading Market Research Firm specializing in emerging IT technologies. The company provides detailed market size, installed base and forecast information on a worldwide basis, as well as detailed country breakouts, in all areas of: Email Security Instant Messaging Unified Communications Identity Management Web Technologies The company assists vendors to define their strategic product and business direction. It also assists corporate organizations in selecting the right products and technologies to support their business needs. Our market research and industry analysis takes a global perspective, providing clients with valuable information necessary to compete on a global basis. We are an international firm with clients throughout the US, Europe and the Pacific Rim. The Radicati Group, Inc. was founded in 1993, and is headquartered in Palo Alto, CA, with offices in London, UK. Copyright April 2015 The Radicati Group, Inc. Reproduction Prohibited 31