1Info-Tech Research Group Vendor Landscape: Security Gateway Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.

Slides:



Advertisements
Similar presentations
1Info-Tech Research Group Vendor Landscape: eGRC Solutions Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
Advertisements

1Info-Tech Research Group Vendor Landscape: Innovation Management Solutions Info-Tech Research Group, Inc. Is a global leader in providing IT research.
Practical IT Research that Drives Measurable Results Manage Help Desk Staffing 1Info-Tech Research Group.
1 1Vendor Landscape: Cloud File Sharing Info-Tech Research Group Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: NGFW Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products.
1Info-Tech Research Group Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1Info-Tech Research Group Vendor Landscape: Data Loss Prevention (DLP) Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: Business Process Management (BPM) Suites Info-Tech Research Group, Inc. Is a global leader in providing IT.
Info-Tech Research Group1 Headline / Subhead Vertical Spacing Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Info-Tech Research Group Vendor Landscape: Mid-Market ERP Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
Info-Tech Research Group1 V3.1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Make the Case for IP Telephony 1Info-Tech Research Group.
1Info-Tech Research Group Vendor Landscape: Server Virtualization Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: Mid-Market Service Desk Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
Info-Tech Research Group1 Vendor Landscape: Secure Socket Layer Virtual Private Network (SSL VPN) Your workers are going remote, is your security?
Info-Tech Research Group1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: Enterprise Content Management Suite ECM: A vendor marketing concept, not an.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: CRM Software 1Info-Tech Research Group.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1Info-Tech Research Group Vendor Landscape: Process-Generated Content Management (PGCM) Info-Tech Research Group, Inc. Is a global leader in providing.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
1Info-Tech Research Group Vendor Landscape: Thin Clients Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Info-Tech Research Group Vendor Landscape: Enterprise Mobility Management Info-Tech Research Group, Inc. Is a global leader in providing IT research and.
1Info-Tech Research Group Vendor Landscape: Social Media Management Platforms Info-Tech Research Group, Inc. Is a global leader in providing IT research.
1Info-Tech Research Group Vendor Landscape: Content and Archiving Info-Tech Research Group, Inc. is a global leader in providing IT research and.
Info-Tech Research Group1 Build a Case for Windows Server 2012 Hyper-V Hyper-V is a credible alternative and competitive threat to VMware for virtualization.
1Info-Tech Research Group Vendor Landscape: Enterprise ERP Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
Info-Tech Research Group1 Vendor Landscape: Network Access Control NAC is back, tell a friend. Info-Tech's products and services combine actionable insight.
1Info-Tech Research Group Vendor Landscape: Mid-Market Service Desk Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.
1Info-Tech Research Group Vendor Landscape: Enterprise BI Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s.
1Info-Tech Research Group Vendor Landscape: Enterprise Wired and Wireless LAN Info-Tech Research Group, Inc. is a global leader in providing IT research.
Info-Tech Research Group1 Make the Decision to Upgrade to Microsoft Exchange 2010 It’s Time for a Change: Let’s Talk about Exchange Info-Tech's products.
Info-Tech Research Group1 Vendor Landscape: Web Conferencing Vendors Hear me, see me, show me, teach me.
Build an IT Strategy for the Small Enterprise
Vendor Landscape: Application Lifecycle Management
Vendor Landscape: Enterprise Service Desk Software
Vendor Landscape: Security Information & Event Management (SIEM)
Vendor Landscape: ECM for Knowledge Workers (CMKW)
Vendor Landscape: Intrusion Detection and Prevention Systems
Enhance Business Value through Customer-Centric IT Service Management
Vendor Landscape: Systems Management
Vendor Landscape: Software Testing Solutions
Vendor Landscape Plus: IP Telephony Vendors
Vendor Landscape: Desktop Virtualization
Vendor Landscape: Talent Management Suites
Ensure Cloud Security in IaaS and PaaS Environments
Vendor Landscape: Mid-Market BI
Vendor Landscape: Endpoint Protection
Create Data Strategies for the Small Enterprise
Gain Control of Cloud Integration Strategies Before they Float Away
Bridge IT and the Business with Business Architecture
Select an EA Tool Based on Business and User Need
Vendor Landscape: Hyperconverged Infrastructure
Improve Business Satisfaction by 10% Through Business Relationship Management Relationship management is the #1 driver of business satisfaction with IT.
Establish a Right-Sized Incident Management Process
Presentation transcript:

1Info-Tech Research Group Vendor Landscape: Security Gateway Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns. © Info-Tech Research Group Inc. Vendor Landscape: Security Gateway The s that you want are only the tip of the iceberg that you get. Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.© Info-Tech Research Group

2Info-Tech Research Group Vendor Landscape: Security Gateway security is as important today as it ever was. Organizations must implement an Security Gateway (ESG) to protect their most widely used business tool: . Introduction Enterprises seeking to select a solution for ESG. The following ESG use cases: Information Security Managers who have decided to select and deploy an ESG but are unfamiliar with the space. Information Security Managers who have decided to upgrade or switch ESG vendors and require advisory research. Organizations looking to optimize their security. Organizations looking to resolve -based cyber attacks and data breaches. This Research Is Designed For:This Research Will Help You: Understand what’s new in the ESG market. Evaluate ESG vendors and products for your enterprise needs. Determine which products are most appropriate for particular use cases and scenarios.

3Info-Tech Research Group Vendor Landscape: Security Gateway How to use this Vendor Landscape * Gold and Silver level subscribers only There are multiple ways you can use this Info-Tech Vendor Landscape in your organization. Choose the option that best fits your needs: Do-It-Yourself Use this Vendor Landscape to help you complete your purchasing decision. The slides in this deck will walk you through our recommended evaluated vendors in this market space with supporting tools and deliverables ready for you to make your decision. We recommend that you supplement the Vendor Landscape with a Guided Implementation. At no additional cost to you*, our expert analysts will provide telephone assistance to you and your team at key milestones in the decision to review your materials, answer your questions, and explain our methodologies. Vendor Landscape Free Guided Implementation

4Info-Tech Research Group Vendor Landscape: Security Gateway Book a Guided Implementation Today: Info-Tech is just a phone call away and can assist you with your evaluation. Our expert Analysts can guide you to successful technology selection. Here are the suggested Guided Implementation points for the ESG Vendor Landscape: Guided Implementation points in the ESG Vendor Landscape Section 1: Shortlist Assistance and Requirements Get off to a productive start: Discuss the market space and how vendors are evaluated. Decide on which deployment option suits you best and narrow down the options based on customized requirements. Section 2: RFP and Budget Review Interpreting and acting on RFP results: Review vendor RFPs and ensure the solution is meeting your needs. Discuss average pricing of solutions and what can fit into your budget. Section 3: Negotiation and Contract Review Purchase optimization: Review contracts and discuss best practices in negotiation tactics to get the best price for your solution. To enroll, send an to or call and ask for the Guided Implementation This symbol signifies when you’ve reached a Guided Implementation point in your project.

5Info-Tech Research Group Vendor Landscape: Security Gateway Market overview Security Gateways developed steadily over the 2000s in reaction to the increase in spam and other unwanted s, as well as new -based threat developments. Development of authentication methods, machine learning, blacklisting, whitelisting, and content filtering moved from the frontier defenses of ESGs to necessary stakes. The number of market competitors decreased due to the need for large intelligence gathering capabilities to stay up to date on the latest threats and attack campaigns. Proliferation of botnets to create zombie attacks as well as to compromise whitelisted domains underscore the need for active content filtering and behavioral analysis. The recent development of spear phishing (targeted attacks) has resurged the need for ESGs to protect against the most costly of user credential compromise or intellectual property theft. The threat landscape is becoming more advanced, fast paced, and reactive with more persistent adversaries. Traditional mass attacks and general spam are still a huge concern and nuisance. The proliferation of spear phishing, either by criminal organizations, hacktivist groups, or state sponsored groups, is developing into a standard attack method with commodity style markets selling and reselling these techniques. Vendors are placing a focus on integrated security solutions so that incoming and outgoing traffic across internet, , and other streams can be analyzed across mediums with multiple tools to detect unidentified attacks. This can include integration with DLP, SIEM, IDPS, firewalls, and other security solution products. There is a general development by cloud ESG providers to become more robust in their offerings to meet the general market push by organizations to move to the cloud with other functions. How it got here Where it’s going As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating. Anti-phishing with anti-spear-phishing has become a Table Stakes capability and should no longer be used to differentiate solutions. Instead, focus on dynamic content and URL execution and redactive outbound filtering to get the best fit for your requirements.

6Info-Tech Research Group Vendor Landscape: Security Gateway security gateway vendor selection / knock-out criteria: market share, mind share, and platform coverage Barracuda. A well developed offering of security features but not advanced enough for large enterprises. Cisco. A strategic vendor based on nonsecurity-related offerings. Clearswift. Advanced offerings for the highest of security needs. Fortinet. Extremely low price point and focused on a UTM deployment model. Google. Complete cloud-based business offering but with compliance and privacy concerns. McAfee. One of the most viable security vendors, but at a cost. Microsoft. Selected primarily based on nonsecurity-related offerings that are considered essential. Proofpoint. A pure play vendor with a focus on advanced technical offerings for large enterprises. Sophos. Extremely strong security offering and decent price point but with no hosted offering. Symantec. Widely known vendor with wealth of threat intelligence but lack of integrated capabilities. Trend Micro. A purely -focused vendor with encryption problems. Websense. Compliance and targeted attack strengths but with vendor focus on UTM. Included in this Vendor Landscape: ESG solutions must maintain conventional security against vast amounts of spam and malware, as well as being equipped to detect spear phishing attacks while enabling easy management and easy reporting. For this Vendor Landscape, Info-Tech focused on those vendors that offer broad capabilities across multiple platforms and that have a strong market presence and/or reputational presence among small and mid-sized enterprises.

7Info-Tech Research Group Vendor Landscape: Security Gateway Criteria Weighting security gateway criteria & weighting factors Vendor is committed to the space and has a future product and portfolio roadmap. Strategy Vendor offers global coverage and is able to sell and provide post-sales support. Reach Vendor is profitable, knowledgeable, and will be around for the long term. Viability Vendor channel strategy is appropriate and the channels themselves are strong. Channel Implementing and operating the solution is affordable given the technology. Affordability Multiple deployment options and extensive integration capabilities are available. Architecture The end-user and administrative interfaces are intuitive and offer streamlined workflow. Usability The solution provides basic and advanced feature/functionality. Features Usability Architecture Affordability Product Vendor ViabilityStrategy Channel Reach Product Evaluation Criteria Vendor Evaluation Criteria

8Info-Tech Research Group Vendor Landscape: Security Gateway Table Stakes represent the minimum standard; without these, a product doesn’t even get reviewed If Table Stakes are all you need from your ESG solution, the only true differentiator for the organization is price. Otherwise, dig deeper to find the best price to value for your needs. The products assessed in this Vendor Landscape TM meet, at the very least, the requirements outlined as Table Stakes. Many of the vendors go above and beyond the outlined Table Stakes, some even do so in multiple categories. This section aims to highlight the products’ capabilities in excess of the criteria listed here. The Table StakesWhat does this mean? Heuristic detection techniques that recognize common characteristics of phishing attacks. Anti-Phishing/ Spear Phishing Basic inbound blocking using multitude of triggers: IP address, content, header, and other reputation-based identifiers. Anti-Spam/Bulk Detection What it is: Feature

9Info-Tech Research Group Vendor Landscape: Security Gateway Advanced features are the capabilities that allow for granular market differentiation Advanced Features Info-Tech scored each vendor’s features offering as a summation of its individual scores across the listed advanced features. Vendors were given one point for each feature the product inherently provided. Some categories were scored on a more granular scale with vendors receiving half points. Scoring Methodology What we looked for: Feature For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix.Information Presentation – Feature Ranks (Stoplights) Outbound content filtering based on policy configuration with notification or redactive functions. Data Loss Prevention Comprehensive signature malware detection capabilities through threat intelligence sourcing. Anti-Malware Signature Detection End-user digest release capability and client integration for fine tuning. End-User Spam Visibility & Controls Live detection and following of URL embedded links and execution of active content. Real Time URL & Malware Detection Active code detection and execution. Anti-Malware Behavioral Detection Advanced capabilities to encode data and information with visibility and controls. Encryption / Decryption

10Info-Tech Research Group Vendor Landscape: Security Gateway Advanced features are the capabilities that allow for granular market differentiation Advanced Features (Continued) Info-Tech scored each vendor’s features offering as a summation of its individual scores across the listed advanced features. Vendors were given one point for each feature the product inherently provided. Some categories were scored on a more granular scale with vendors receiving half points. Scoring Methodology What we looked for: Feature For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix.Information Presentation – Feature Ranks (Stoplights) The ability to deploy in combination between a hosted and on-premise solution. Hosted & Hybrid Deployment Solutions Inbound and outbound logging capabilities. Retention/ Archiving Integration and support capabilities with third- party hosted providers. Hosted Support Domain Keys Identified Mail and Sender Policy Framework encryption support. DKIM & SPF Support

11Info-Tech Research Group Vendor Landscape: Security Gateway Arrange a call now: or call and ask for the Guided Implementation Shortlist Assistance & Requirements Prior to the Guided Implementation During the Guided Implementation Value & Outcome 1.Have reasoning as to why a new solution is being discussed. 2.Compile list of gaps. An Info-Tech Consulting Analyst will discuss with you: Reviewing the market and understanding the rationale behind the evaluation. Deciding on a deployment method. Feature analysis. At the conclusion of the Guided Implementation call, you will have: An understanding of the market situation. A narrowed list of vendors with customized evaluation tool. An RFP template to distribute to vendors.

12Info-Tech Research Group Vendor Landscape: Security Gateway Info-Tech Research Group Helps IT Professionals To: Sign up for free trial membership to get practical solutions for your IT challenges Quickly get up to speed with new technologies Make the right technology purchasing decisions – fast Deliver critical IT projects, on time and within budget Manage business expectations Justify IT spending and prove the value of IT Train IT staff and effectively manage an IT department “Info-Tech helps me to be proactive instead of reactive – a cardinal rule in a stable and leading edge IT environment. - ARCS Commercial Mortgage Co., LP Toll Free: