1Info-Tech Research Group Vendor Landscape: Endpoint Encryption Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.

Slides:



Advertisements
Similar presentations
Sage CRM awarded industry analyst awards. Sage CRM has been highly rated by recent industry analysts and awarded both a champion award and innovation award.
Advertisements

1Info-Tech Research Group Vendor Landscape: Application Integration Middleware Info-Tech Research Group, Inc. Is a global leader in providing IT research.
1Info-Tech Research Group Vendor Landscape: Canadian Co-location/ Managed Services Sort through disguised differentiation to get back to an apples-to-apples.
1Info-Tech Research Group Vendor Landscape: Web Experience Management Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: eGRC Solutions Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Info-Tech Research Group Vendor Landscape: Innovation Management Solutions Info-Tech Research Group, Inc. Is a global leader in providing IT research.
Practical IT Research that Drives Measurable Results Manage Help Desk Staffing 1Info-Tech Research Group.
1 1Vendor Landscape: Cloud File Sharing Info-Tech Research Group Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: Collaboration Platforms Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: NGFW Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products.
1Info-Tech Research Group Vendor Landscape: Data Loss Prevention (DLP) Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: IT Asset Management Enterprise Info-Tech Research Group, Inc. Is a global leader in providing IT research and.
1Info-Tech Research Group Vendor Landscape: Business Process Management (BPM) Suites Info-Tech Research Group, Inc. Is a global leader in providing IT.
1Info-Tech Research Group Vendor Landscape: European Co-location/Managed Services Take the time to thoroughly evaluate the European market before making.
1Info-Tech Research Group Vendor Landscape: Cloud Infrastructure- as-a-Service Options are proliferating as Cloud Infrastructure-as-a-Service provides.
1Info-Tech Research Group Vendor Landscape: Asset & Work Order Management Info-Tech Research Group, Inc. Is a global leader in providing IT research and.
1Info-Tech Research Group Vendor Landscape: Web Content Management Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: Mid-Market ERP Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Vendor Landscape: Revenue Management Systems Info-Tech Research Group Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech Research Group1 V3.1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services.
1Info-Tech Research Group Vendor Landscape: Lead Management Automation Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Plan for Application Consolidation. Successful application consolidation relies on assessment of the application portfolio to determine the best candidates.
1Info-Tech Research Group Vendor Landscape: Managed File Transfer Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Practical IT Research that Drives Measurable Results Make the Case for IP Telephony 1Info-Tech Research Group.
1Info-Tech Research Group Vendor Landscape: Mobile Development Platforms Ride the mobile wave while reducing fragmentation with an all-in-one MDP.
1Info-Tech Research GroupVendor Landscape: Data Center Networking Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: Mid-Market Service Desk Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech Research Group1 Vendor Landscape: Secure Socket Layer Virtual Private Network (SSL VPN) Your workers are going remote, is your security?
Info-Tech Research Group1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1Info-Tech Research Group Vendor Landscape: Annual Security Roundup Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: Multifunction Printers Making an informed decision about your MFP requires an analysis of all the “fax.”
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: CRM Software 1Info-Tech Research Group.
1Info-Tech Research Group Vendor Landscape: Video Conferencing (VC) Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: IT Asset Management Info-Tech Research Group, Inc. is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: Process-Generated Content Management (PGCM) Info-Tech Research Group, Inc. Is a global leader in providing.
1Info-Tech Research Group Vendor Landscape: Application Delivery Controllers Info-Tech Research Group, Inc. Is a global leader in providing IT research.
1Info-Tech Research Group Vendor Landscape: Talent Management Solutions Info-Tech Research Group, Inc. Is a global leader in providing IT research and.
1Info-Tech Research Group Vendor Landscape: Uninterruptible Power Supply (UPS) A steady power flow, a steady market growth.
1Info-Tech Research Group Vendor Landscape: Thin Clients Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Info-Tech Research Group Vendor Landscape: Point of Sale Solutions Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: IT Asset Management Mid-Market Info-Tech Research Group, Inc. Is a global leader in providing IT research and.
1Info-Tech Research Group Vendor Landscape: Enterprise Mobility Management Info-Tech Research Group, Inc. Is a global leader in providing IT research and.
1Info-Tech Research Group Vendor Landscape: Content and Archiving Info-Tech Research Group, Inc. is a global leader in providing IT research and.
1Info-Tech Research Group Vendor Landscape: Enterprise LAN Be the talk of the campus by choosing the right LAN vendor.
1Info-Tech Research Group Vendor Landscape: Enterprise ERP Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Info-Tech Research Group Vendor Landscape: Mid-Market Service Desk Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: Unified Communications as a Service UC in the cloud never looked so good. Today, communication means collaboration.
Info-Tech Research Group1 Make the Decision to Upgrade to Microsoft Exchange 2010 It’s Time for a Change: Let’s Talk about Exchange Info-Tech's products.
Info-Tech Research Group1 Vendor Landscape: Web Conferencing Vendors Hear me, see me, show me, teach me.
Build an IT Strategy for the Small Enterprise
Vendor Landscape: Security Information & Event Management (SIEM)
Vendor Landscape: Systems Management
Vendor Landscape: Converged Systems
Vendor Landscape Plus: IP Telephony Vendors
Vendor Landscape: Desktop Virtualization
Vendor Landscape: Talent Management Suites
Select the Right Vendor for Desktop Virtualization
Vendor Landscape: Mid-Market BI
Vendor Landscape: The Right eForms Solution
Vendor Landscape: Enterprise Marketing Management (EMM) Suites
Vendor Landscape: Endpoint Protection
Create Data Strategies for the Small Enterprise
Vendor Landscape: Mobile Device Management Suites
Vendor Landscape: CRM Suites for Gaming, Hospitality, and Leisure
Improve Business Satisfaction by 10% Through Business Relationship Management Relationship management is the #1 driver of business satisfaction with IT.
Presentation transcript:

1Info-Tech Research Group Vendor Landscape: Endpoint Encryption Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns. © Info-Tech Research Group Inc. Vendor Landscape: Endpoint Encryption Encryption from endpoint to endpoint, mobile and more. Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.© Info-Tech Research Group

2Info-Tech Research Group Vendor Landscape: Endpoint Encryption Endpoint encryption is evolving alongside the data and devices it protects by expanding its mobile encryption capabilities and platform coverage. Introduction Enterprises seeking to select a solution for endpoint encryption. The endpoint encryption use case may include: Enterprises seeking an encryption solution for comprehensive protection of laptops, mobile devices, and removable media. Enterprises that have established an endpoint encryption strategy independently and need guidance in evaluating available products. This Research Is Designed For:This Research Will Help You: Understand what’s new in the endpoint encryption market. Evaluate endpoint encryption vendors and products for your enterprise needs. Determine which products are most appropriate for particular use cases and scenarios.

3Info-Tech Research Group Vendor Landscape: Endpoint Encryption Market Overview The first digital encryption standard, Data Encryption Standard (DES) algorithm, was released in As devices possessed more memory, increased their speed, and became more mobile, DES was upgraded to Triple DES (3DES). The release of PGP in 1991 ushered in the start of endpoint encryption products. It was first bought by McAfee in 1997, but the ‘90s didn’t see much interest in endpoint encryption, so McAfee dumped the product. It was later picked up by Symantec. At the time of PGP’s initial product, information/file sharing was not as ubiquitous as it is today. Processor speeds and memory size/speed were also lower, so implementing digital encryption slowed down the performance of computers. In 2001, the Advanced Encryption Standard (AES) became a US Federal and de facto world standard, and remains that way today – all players in the space support AES encryption. The future of endpoint encryption continues to be consolidation. Encryption is part of the endpoint game, so companies are looking to expand their portfolios to give themselves a competitive edge. That’s why, throughout the 2000s, enterprises like Check Point, McAfee, Sophos, Symantec, and Trend Micro all bought their way into this market. Consolidation is also becoming part of the products themselves. Pricing for encryption often comes as part of an overall security suite, as is the case with Sophos. Standalone offerings are becoming less common. Increasingly, endpoint encryption is looked at as a starting point for broader/ubiquitous encryption including file, server, , and cloud encryption. Within two years, endpoint encryption products will not be bought independently from security suites, but will just be a default part of comprehensive packages. How it got here Where it’s going As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating. Full disk encryption has become a Table Stakes capability and should no longer be used to differentiate solutions. Instead focus on the solution’s additional encryption options, such as the capability to encrypt certain files and folders and removable devices.

4Info-Tech Research Group Vendor Landscape: Endpoint Encryption Endpoint Encryption Vendor selection / knock-out criteria: market share, mind share, and platform coverage Check Point. One of the founders of the firewall space, Check Point offers a feature-rich endpoint encryption solution with a strong showing for mobile device protection. Credant. A privately-held company with a focus on industry verticals. Its encryption solution is focused on policy-based encryption. McAfee. A long-time leader in security, McAfee offers a well-rounded encryption solution that integrates easily into existing systems. Sophos. In the security business for over 20 years, Sophos entered the encryption market in Its encryption solution combines with and manages other solutions, such as BitLocker. Symantec. Despite being the world’s largest security vendor, Symantec moved into the encryption market late. Its solution is straightforward, but it lacks advanced features. Trend Micro. Its acquisition of Mobile Armor in 2009 brought the company into the encryption game with a strong product and vendor viability. Trustwave. A privately-held company, Trustwave offers a highly usable product for administrators, but with few advanced features. WinMagic. A small Canadian company focused solely on encryption solutions, WinMagic is steadily growing globally with a product featuring enhanced pre-boot capabilities among other features. Included in this Vendor Landscape: Giants like McAfee and Symantec play in this space, alongside growing vendors such as Sophos, and the Canadian company, WinMagic. The market is still dominated by the big companies, but smaller vendors should not be overlooked. For this Vendor Landscape, Info-Tech focused on those vendors that offer broad capabilities across multiple platforms and that have a strong market presence and/or reputational presence among mid and large-sized enterprises.

5Info-Tech Research Group Vendor Landscape: Endpoint Encryption Criteria Weighting: Endpoint Encryption criteria & weighting factors Vendor is committed to the space and has a future product and portfolio roadmap. Strategy Vendor offers global coverage and is able to sell and provide post-sales support. Reach Vendor is profitable, knowledgeable, and will be around for the long-term. Viability Vendor channel strategy is appropriate and the channels themselves are strong. Channel The three year TCO of the solution is economical. Affordability The delivery method of the solution aligns with what is expected within the space. Architecture The solution’s dashboard and reporting tools are intuitive and easy to use. Usability The solution provides basic and advanced feature/functionality. Features Usability ArchitectureAffordability Product Vendor ViabilityStrategy ChannelReach Product Evaluation Criteria Vendor Evaluation Criteria

6Info-Tech Research Group Vendor Landscape: Endpoint Encryption Table Stakes represent the minimum standard; without these, a product doesn’t even get reviewed If Table Stakes are all you need from your endpoint encryption solution, the only true differentiator for the organization is price. Otherwise, dig deeper to find the best price to value for your needs. The products assessed in this Vendor Landscape TM meet, at the very least, the requirements outlined as Table Stakes. Many of the vendors go above and beyond the outlined Table Stakes, some even do so in multiple categories. This section aims to highlight the products’ capabilities in excess of the criteria listed here. The Table Stakes What Does This Mean? Compatible with other operating systems, such as OS X. Allows users to authenticate once and carry that authentication through Windows login. Offers a unified management console where users can run reports and upgrade the system. Offers full disk option that encrypts the entire physical disk as opposed to specific files or folders. The management console integrates with resource management tools such as Active Directory/eDirectory. What it is: Feature Encryption of non- Windows workstations Single sign-on with pre-boot authentication Centralized management system Full disk encryption Directory compatible

7Info-Tech Research Group Vendor Landscape: Endpoint Encryption Advanced Features are the capabilities that allow for granular market differentiation Info-Tech scored each vendor’s features offering as a summation of their individual scores across the listed advanced features. Vendors were given 1 point for each feature the product inherently provided. Some categories were scored on a more granular scale with vendors receiving half points. Protection for mobile devices includes smartphones and tablets. Mobile device encryption Ability to manage endpoints protected with Microsoft’s BitLocker. Integrates with BitLocker Ability to encrypt removable devices, such as USB devices. Devices can be used on other workstations without additional software. Removable device encryption Protection for files and folders wherever they’re stored – laptops, desktops, mobile devices, etc. File & Folder Encryption Ability to manage endpoints protected with inherent self-encrypting devices. Integrates with SEDs Provide authentication options beyond simple passwords at pre-boot. Multi-factor pre- boot authentication Ability to lock, key wipe, poison-pill, or remote wipe off-network devices via over the air (OTA) capabilities. Remote wipe Includes a pre-boot environment with capabilities beyond just authentication, such as network awareness and local disk access. Enhanced pre- boot What we looked for: Feature Advanced FeaturesScoring Methodology For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stop Lights) in the Appendix.Information Presentation – Feature Ranks (Stop Lights)

8Info-Tech Research Group Vendor Landscape: Endpoint Encryption The Info-Tech Endpoint Encryption Vendor Shortlist Tool is designed to generate a customized shortlist of vendors based on your key priorities.Endpoint Encryption Vendor Shortlist Tool Identify leading candidates with the Endpoint Encryption Vendor Shortlist Tool Overall Vendor vs. Product Weightings Individual product criteria weightings: Features Usability Affordability Architecture Individual vendor criteria weightings: Viability Strategy Reach Channel This tool offers the ability to modify:

9Info-Tech Research Group Vendor Landscape: Endpoint Encryption Appendix 1.Vendor Landscape Methodology: Overview 2.Vendor Landscape Methodology: Product Selection & Information Gathering 3.Vendor Landscape Methodology: Scoring 4.Vendor Landscape Methodology: Information Presentation 5.Vendor Landscape Methodology: Fact Check & Publication 6.Product Pricing Scenario

10Info-Tech Research Group Vendor Landscape: Endpoint Encryption Vendor Landscape Methodology: Overview Info-Tech’s Vendor Landscapes are research materials that review a particular IT market space, evaluating the strengths and abilities of both the products available in that space, as well as the vendors of those products. These materials are created by a team of dedicated analysts operating under the direction of a senior subject matter expert over a period of six weeks. Evaluations weigh selected vendors and their products (collectively “solutions”) on the following eight criteria to determine overall standing: Features: The presence of advanced and market-differentiating capabilities. Usability: The intuitiveness, power, and integrated nature of administrative consoles and client software components. Affordability: The three-year total cost of ownership of the solution. Architecture: The degree of integration with the vendor’s other tools, flexibility of deployment, and breadth of platform applicability. Viability: The stability of the company as measured by its history in the market, the size of its client base, and its financial performance. Strategy: The commitment to both the market-space, as well as to the various sized clients (small, mid-sized, and enterprise clients). Reach: The ability of the vendor to support its products on a global scale. Channel: The measure of the size of the vendor’s channel partner program, as well as any channel strengthening strategies. Evaluated solutions are plotted on a standard two by two matrix: Champions: Both the product and the vendor receive scores that are above the average score for the evaluated group. Innovators: The product receives a score that is above the average score for the evaluated group, but the vendor receives a score that is below the average score for the evaluated group. Market Pillars: The product receives a score that is below the average score for the evaluated group, but the vendor receives a score that is above the average score for the evaluated group. Emerging Players: Both the product and the vendor receive scores that are below the average score for the evaluated group. Info-Tech’s Vendor Landscapes are researched and produced according to a strictly adhered to process that includes the following steps: Vendor/product selection Information gathering Vendor/product scoring Information presentation Fact checking Publication This document outlines how each of these steps is conducted.

11Info-Tech Research Group Vendor Landscape: Endpoint Encryption Vendor Landscape Methodology: Vendor/Product Selection & Information Gathering Info-Tech works closely with its client base to solicit guidance in terms of understanding the vendors with whom clients wish to work and the products that they wish evaluated; this demand pool forms the basis of the vendor selection process for Vendor Landscapes. Balancing this demand, Info-Tech also relies upon the deep subject matter expertise and market awareness of its Senior and Lead Research Analysts to ensure that appropriate solutions are included in the evaluation. As an aspect of that expertise and awareness, Info-Tech’s analysts may, at their discretion, determine the specific capabilities that are required of the products under evaluation, and include in the Vendor Landscape only those solutions that meet all specified requirements. Information on vendors and products is gathered in a number of ways via a number of channels. Initially, a request package is submitted to vendors to solicit information on a broad range of topics. The request package includes: A detailed survey. A pricing scenario (see Vendor Landscape Methodology: Price Evaluation and Pricing Scenario, below). A request for reference clients. A request for a briefing and, where applicable, guided product demonstration. These request packages are distributed approximately twelve weeks prior to the initiation of the actual research project to allow vendors ample time to consolidate the required information and schedule appropriate resources. During the course of the research project, briefings and demonstrations are scheduled (generally for one hour each session, though more time is scheduled as required) to allow the analyst team to discuss the information provided in the survey, validate vendor claims, and gain direct exposure to the evaluated products. Additionally, an end-user survey is circulated to Info-Tech’s client base and vendor-supplied reference accounts are interviewed to solicit their feedback on their experiences with the evaluated solutions and with the vendors of those solutions. These materials are supplemented by a thorough review of all product briefs, technical manuals, and publicly available marketing materials about the product, as well as about the vendor itself. Refusal by a vendor to supply completed surveys or submit to participation in briefings and demonstrations does not eliminate a vendor from inclusion in the evaluation. Where analyst and client input has determined that a vendor belongs in a particular evaluation, it will be evaluated as best as possible based on publicly available materials only. As these materials are not as comprehensive as a survey, briefing, and demonstration, the possibility exists that the evaluation may not be as thorough or accurate. Since Info-Tech includes vendors regardless of vendor participation, it is always in the vendor’s best interest to participate fully. All information is recorded and catalogued, as required, to facilitate scoring and for future reference.

12Info-Tech Research Group Vendor Landscape: Endpoint Encryption Info-Tech Research Group Helps IT Professionals To: Sign up for free trial membership to get practical solutions for your IT challenges Quickly get up to speed with new technologies Make the right technology purchasing decisions – fast Deliver critical IT projects, on time and within budget Manage business expectations Justify IT spending and prove the value of IT Train IT staff and effectively manage an IT department “Info-Tech helps me to be proactive instead of reactive – a cardinal rule in a stable and leading edge IT environment. - ARCS Commercial Mortgage Co., LP Toll Free: