Market Analysis. Overview 2013 INTRUSION PREVENTION SYSTEMS. Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis
|
|
- Gervais Terry
- 6 years ago
- Views:
Transcription
1 Market Analysis 2013 INTRUSION PREVENTION SYSTEMS Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis Overview Prior to 2013, the intrusion prevention system (IPS) market was viewed as heading towards extinction. Lack of innovation from all but a handful of vendors, high prices for a single security function, and the dominance of next generation firewall (NGFW) platforms caused many organizations to move away from installation of a pure- play IPS. Then, beginning in late 2012 and through 2013, the IPS market began to redefine itself. New product announcements by IBM and HP and the market- changing news of the acquisition of Sourcefire by Cisco Systems are among some of the developments that have heralded renewed interest (and innovation) within the IPS market. While it is not yet evident whether these developments will slow the migration to NGFW platforms, they most certainly have boosted this market, offering next generation IPS (NGIPS) platforms aimed at improving workflow, forensics, and prevention capabilities. From the perspectives of size and growth, the market is entering a renewed growth phase. NSS Labs estimates this market will reach a growth rate of nearly 5 percent for the forecast period ( ). The market had generated over US$1.3 billion in annual revenue by the end of 2013, and NSS expects this number to grow to more than US$1.7 billion dollars by the end of IPS technology still represents a healthy portion of the overall infrastructure security market at just over 10 percent of that market. The degree to which organizations deploy NGFW in place of IPS or choose to replace IPS with NGIPS products over the next few years will ultimately shape this market. For many smaller organizations, NGFWs have proven effective in achieving most of the basic security and application controls. IPS as a pure- play technology is still an important part of the security stack, providing protection against a diversity of attacks; however, as the growing market share (and impressive test results) for vendors such as SonicWALL and Fortinet illustrates, many organizations are beginning to view IPS as a commodity technology that can be included in the firewall rather than as a separate device in the network. The 2013 acquisition of Sourcefire by Cisco and the 2013 acquisition of StoneSoft by McAfee (now part of Intel Security) demonstrates that the IPS market is still a relevant component in the modern network, providing detection, prevention, and response. NGIPS products are focused on improving security workflow, and many of these products are now closely affiliated with security information and event management (SIEM) products as well as breach detection systems (BDS).
2 IPS will continue to evolve as a core security component and will remain relevant as evasion techniques and protocol attacks become more sophisticated. To maintain this relevance, however, the difference between NGFW and NGIPS must be clearly distinguished. NSS Labs Findings In 2013, the IPS market grew at a rate of 4.2 percent to US$1.35 billion. The IPS market is expected to grow at an overall rate of 4.9 percent through 2018, reaching a total addressable market size of US$1.7 billion. The acquisition of Sourcefire by Cisco fills a long- standing gap in Cisco s IPS portfolio, and early indicators are that Cisco is basing many technology initiatives on Sourcefire technology. Newer IPS products (also called next generation IPS or NGIPS) have distinguished themselves from NGFW by focusing on detection through signatureless methods, including sandboxing, contextual awareness, and other forms of traffic analysis. Many IPS vendors focus on integration with threat intelligence and SIEM products to provide increased value to enterprise organizations through improved workflows and actionable intelligence 2
3 Table of Contents Overview... 1 NSS Labs Findings... 2 Analysis... 4 Methodology... 4 Market Definition... 4 Top Market Drivers... 4 An Increasingly Complex Threat landscape... 4 The Need for Improved Correlation and Context- based Protection... 5 The Need for a Security Platform that will Improve Security Workflow... 5 Top Market Challenges... 5 IPS Devices Have a High Total Cost of Ownership (TCO)... 5 Integration of IPS Technology into Other Products... 5 Confusion of IPS with Other Technologies... 5 Total Market Size and Growth Forecasts... 6 Total Units Shipped... 7 Vertical Market Trends... 7 Horizontal Market Trends... 8 Mergers and Acquisitions... 8 Cisco acquires Sourcefire... 8 McAfee (Intel Security) acquires Stonesoft... 8 Extreme Networks Acquires Enterasys... 9 Vendor Market Share... 9 Reading List Contact Information Table of Figures Figure 1 IPS Total Market Revenues and Growth Rate, 2011 to 2018 (Base Year 2013)... 6 Figure 2 IPS Total Market Revenues and Growth Rate (Graphic Representation) (Base Year 2013)... 6 Figure 3 Average Selling Price Forecast, (Base Year 2013)... 7 Figure 4 IPS Vertical Market Distribution, Figure Market Share by Vendor
4 Analysis 2013 marked the beginning of a period of revitalization for the declining IPS market, and with growth rates for the forecast period expected to be around 5 percent, the market appears to have stabilized. It accounted for over US$1.3 billion in revenue at the end of 2013, and this number is expected to grow to more than US$1.8 billion by the end of Methodology The NSS Labs Market Analyses are created using a robust methodology that is designed to provide an accurate picture of the particular market being evaluated. Once a market has been identified by NSS as a candidate for a Market Analysis, the vendor landscape is evaluated to identify market participants, and a detailed questionnaire is submitted to vendors, resellers, and customers. Vendors have the opportunity to perform fact checking on any information that is published by NSS. NSS is using 2013 as the base year for all forecasts and financial data for this Market Analysis. Market Definition NSS defines IPS devices as stand- alone appliances (hardware or virtualized) designed to decode and inspect every packet or stream that passes through them. These devices should allow legitimate traffic to pass while blocking attacks and evasion techniques. IPS devices are typically placed behind the firewall and/or other security devices and will often provide the final layer of inspection before passing data to internal hosts (exceptions would be where additional inspection technologies such as breach detection systems are deployed). Key considerations for organizations evaluating IPS devices include security effectiveness, resistance to evasion, stability, performance, manageability, and overall value. In the same way that the traditional firewall vendors transitioned to next generation firewall (NGFW) vendors, many IPS vendors began to add features in order to differentiate themselves from the basic IPS products that were a part of NGFW offerings. These new IPS products are referred to as next generation IPS (NGIPS). Key features that differentiate traditional perimeter IPS products from NGIPS products include application control, user awareness, integration with threat intelligence, and improved workflow and forensics capabilities. Top Market Drivers While many of the factors driving the IPS market have not changed in years, new products being introduced by some of its largest participants reflect the changes that are occurring. The top market drivers are: An Increasingly Complex Threat landscape The threat landscape continues to evolve as tools become easier to use and attackers continue to profit from their attacks. High- profile attacks against retailers such as Target, Inc. are raising awareness of the damage that can be wrought by determined attackers. Advanced attacks, along with the challenges posed by bring your own device (BYOD), make security challenging for organizations of all sizes. 4
5 The Need for Improved Correlation and Context- based Protection As attacks have become more complex, signature- based defenses have diminished in their effectiveness. All security products must evolve or become irrelevant, and IPS technology is no different. In order to improve accuracy of detection, many IPS solutions integrate threat intelligence feeds along with cloud- based analytics in order to improve accuracy. The Need for a Security Platform that will Improve Security Workflow A key differentiator for many new IPS products is their ability to integrate several disparate components under a single platform in order to improve the security workflow. As security practitioners seek out a platform that is able to perform prevention, detection, and response, the IPS becomes the clear choice. And as more IPS products integrate with SIEM, incident response, and other technologies, the ability for an IPS to be the command center of security operations becomes a key advantage of the platform and can offset the costs of maintaining a variety of security products as part of a workflow. Organizations are also recognizing that IPS devices are key components of the operations environment. Not only must organizations protect against known and unknown devices inside the network, they must also protect against known and unknown devices that access the network from outside the perimeter. Because of this, organizations are turning to next generation IPS devices that can leverage existing data to make informed decisions about potential threats in diverse scenarios. Top Market Challenges Many market challenges have been challenges for years, while newer challenges have arisen as a result of the commoditization of IPS technology and improvements to integrated security platforms. IPS Devices Have a High Total Cost of Ownership (TCO) IPS devices are highly specialized and have a high TCO compared to other security products. In addition to traditional maintenance and support costs, most vendors require subscriptions in order to access the most current threat data and signatures. Further, most IPS devices require considerable tuning to maximize security effectiveness, which means that technical staff must spend more time maintaining these devices than other security products. Integration of IPS Technology into Other Products The most significant challenge to pure- play IPS products has been the integration of IPS technology into multifunction devices such as NGFW. For many small and mid- sized organizations, this integration has been adequate. Unfortunately, many pure- play IPS vendors were late to challenge products from NGFW vendors, incentivizing smaller organizations to investigate NGFW alternatives instead of remaining IPS customers. Confusion of IPS with Other Technologies IPS technology can provide granular visibility into traffic on the network based on the traffic s location and the type of information being analyzed. Many IPS devices can provide some protection against distributed denial- of- service (DDoS) and other advanced attacks. As organizations decide between different protection mechanisms on the network, IPS vendors must ensure that the value proposition of IPS is clear. 5
6 Total Market Size and Growth Forecasts Figures 1 and 2 depict the total market size, annual growth, and compound annual growth rate (CAGR) of the IPS market from 2011 to Year Revenue Growth Rate , , % , % , % , % , % , % , % CAGR 4.9% Figure 1 IPS Total Market Revenues and Growth Rate, 2011 to 2018 (Base Year 2013) By the close of 2013, the market for IPS products had reached US$1,349 million; this number is expected to grow at a compound annual growth rate (CAGR) of 4.9 percent during the forecast period. IPS is entering a renewed growth phase, and for a number of reasons, organizations are evaluating new IPS devices. For some organizations, NGFW products are just not adequate, while for others their security architectures require IPS devices to drive workflow and forensics decisions. $1,800 $1,600 $1,400 $1,200 $1,000 $800 $600 $400 $200 $ % 5.00% 4.00% 3.00% 2.00% 1.00% 0.00% Figure 2 IPS Total Market Revenues and Growth Rate (Graphic Representation) (Base Year 2013) 6
7 Total Units Shipped Figure 3 depicts the total number of units shipped during the forecast period. Year Revenue ($Millions) ASP Units Units Growth Rate 2011 $1,256 $65,403 19, $1,295 $66,738 19, % 2013 $1,349 $68,100 19, % 2014 $1,409 $70,824 19, % 2015 $1,473 $73,657 20, % 2016 $1,546 $76,603 20, % 2017 $1,625 $79,667 20, % 2018 $1,712 $82,854 20, % CAGR 0.8% Figure 3 Average Selling Price Forecast, (Base Year 2013) NSS calculations are based on 19,814 units sold in 2013 at an average selling price (ASP) of US$68,100. Over the course of the forecast period, NSS estimates that the number of units sold will increase to 20,666, and the ASP will increase to US$82,854. The features and additional functionality included in new products, the heightened focus on enterprise and data center customers, and the number of platform options offered for upsell all will contribute to this higher ASP. Vertical Market Trends Key purchasers of IPS technology traditionally have been governments, financial organizations, and other large organizations. Today, however, some vendors are observing shifts in purchasing as the differences between NGIPS and NGFW products become more pronounced. While the government and financial services verticals remain the strongest for IPS, other verticals are starting to move away from dedicated IPS solutions. Healthcare and education verticals in particular are favoring NGFWs over NGIPS products. Reasons for this shift include the integration of wireless and security policies directly into NGFWs, end user awareness, and cost. Healthcare and education verticals in particular suffer from a lack of security resources, and the integrated functionality provided by NGFW is appealing. NGIPS vendors saw an uptick in sales in the utilities, manufacturing, and retail verticals in particular, with some customers citing the end of Windows XP support (and thus an inability to quickly update mission- critical systems that rely on Windows XP) as their motivation. As more smart equipment is introduced into utilities and other critical infrastructure components, providers are reviewing security technology that will monitor these new sensors in order to detect attacks. In the case of the retail vertical, incidents such as the Target breach have highlighted the need for stronger breach detection and forensics capabilities. 7
8 Figure 4 illustrates the predicted vertical market distribution from Vertical Government 25% 25% 25% 25% 25% 25% Financial 23% 23% 23% 23% 23% 23% Retail 17% 17% 18% 19% 19% 20% Utilities 14% 14% 15% 14% 15% 15% Healthcare 12% 12% 11% 11% 10% 9% Other 9% 9% 8% 8% 8% 8% Figure 4 IPS Vertical Market Distribution, Horizontal Market Trends Unlike the IPS vertical markets, which have been relatively stable over time, the horizontal market for IPS has seen the most drastic changes in recent years. Historically, IPS has targeted companies positioned in the mid- market and up (>500 employees). Since 2010, NGFW has eroded what was once a key horizontal market for IPS. Today, the market for IPS is almost entirely focused on the large enterprise, although some vendors do still provide lower throughput boxes to extend security to secondary corporate locations. The expertise that is required to properly maintain IPS along with its integration with SIEM and other security functions have elevated pure- play IPS to an advanced security platform that is best suited for enterprises. Mergers and Acquisitions Three acquisitions affecting the IPS market were completed in 2013: Cisco Systems acquired Sourcefire, McAfee (now part of Intel Security) acquired Stonesoft, and Extreme Networks acquired Enterasys Networks. While the Sourcefire acquisition dwarfed the Stonesoft acquisition in terms of dollars, both acquisitions were important. Extreme s acquisition of Enterasys had little to do with security, but could impact a long- standing IPS product line and its customers. Cisco acquires Sourcefire Sourcefire was almost acquired by Check Point in 2005, but the large quantity of Sourcefire products in the federal government space gave rise to concerns that the acquisition would be blocked, and Check Point (which had offered US$225 million for Sourcefire) was forced to walk away. As the market evolved, it became clear that being the last pure- play IPS vendor in the market made acquisition inevitable for Sourcefire, and in 2013, Cisco paid nearly three times Sourcefire s revenue (close to US$2.7 billion) to do just this. There was no doubt that Cisco was getting a great company for its money, but the key question was whether Cisco could execute on the integration. At the time of this writing, Cisco has been quick to integrate the Sourcefire team; has ensured continuity of top management; and thus far appears to be making considerable overall progress in the integration effort. Cisco made other security acquisitions in 2013 and 2014 specifically aimed at bolstering technology related to the Sourcefire acquisition, namely Cognitive Security and ThreatGRID. McAfee (Intel Security) acquires Stonesoft The McAfee/Stonesoft acquisition was smaller in terms of revenues than Cisco/Sourcefire, but illustrated McAfee s desire to continue innovation in the IPS market. Based in Finland, Stonesoft was an IPS and NGFW vendor that had 8
9 received recognition for its technology. The company was acquired for roughly 5x revenue and brought new and innovative technology to a McAfee product line that has performed consistently well over the years. As with other innovation- driven acquisitions, the key issue for McAfee was the extent to which the StoneSoft technology would be integrated into its existing product line. So far, McAfee has moved quickly to integrate the Stonesoft product line into its own IPS product suite. Extreme Networks Acquires Enterasys The acquisition of Enterasys Networks by Extreme Networks had much more to do with switches and routers than security, but it will still affect customers and product lines that have been long been established in the IPS market. Through its acquisitions by Siemens and now Extreme, the Enterasys Dragon IDS/IPS product line has sold consistently, and even though this product line is small in terms of annual revenues, there is a larger install base that is waiting to see if Extreme will continue to support it. Vendor Market Share Figure 5 illustrates the 2013 IPS market share by vendor. NGFW revenue from Check Point, Dell SonicWALL, Fortinet, Juniper, and other NGFW vendors is not included but will be attributed in the NSS Labs 2013 NGFW Market Analysis. HP 14.7% Others 3.6% Cisco 39.5% IBM 16.8% McAfee 25.5% Figure Market Share by Vendor 9
10 Market share allocation can be misleading in the IPS market. Since this Market Analysis evaluates only stand- alone IPS platforms, the impact of NGFW devices is not captured in figure 5. However, it is clear that Cisco s acquisition of Sourcefire and McAfee s acquisition of Stonesoft have helped establish their leading positions. HP and IBM both demonstrated strong recoveries in sales during Furthermore, NSS testing reveals that many NGFW vendors offer highly effective IPS products. In the future, key differentiators for the industry will be contextual awareness and improved security workflow. Reading List Network Intrusion Prevention Systems (IPS): Test Methodology v7.2. NSS Labs intrusion- prevention- systems- ips- test- methodology- v72 Next Generation Firewall: Test Methodology v5.4. NSS Labs generation- firewall- test- methodology- v54 10
11 Contact Information NSS Labs, Inc. 206 Wild Basin Rd Building A, Suite 200 Austin, TX USA This analyst brief was produced as part of NSS Labs independent testing information services. Leading products were tested at no cost to the vendor, and NSS Labs received no vendor funding to produce this analyst brief NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, copied/scanned, stored on a retrieval system, e- mailed or otherwise disseminated or transmitted without the express written consent of NSS Labs, Inc. ( us or we ). Please read the disclaimer in this box because it contains important information that binds you. If you do not agree to these conditions, you should not read the rest of this report but should instead return the report immediately to us. You or your means the person who accesses this report and any entity on whose behalf he/she has obtained this report. 1. The information in this report is subject to change by us without notice, and we disclaim any obligation to update it. 2. The information in this report is believed by us to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at your sole risk. We are not liable or responsible for any damages, losses, or expenses of any nature whatsoever arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY US. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON- INFRINGEMENT, ARE HEREBY DISCLAIMED AND EXCLUDED BY US. IN NO EVENT SHALL WE BE LIABLE FOR ANY DIRECT, CONSEQUENTIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and/or software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet your expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners. 11
NEXT GENERATION FIREWALL. Tested Products. Environment. SonicWall Security Value Map (SVM) JULY 11, 2017 Author Thomas Skybakmoen
NEXT GENERATION FIREWALL SonicWall Security Value Map (SVM) JULY 11, 2017 Author Thomas Skybakmoen Tested Products NGFW Group Test: SonicWall NSA 6600 SonicOS Enhanced 6.2.5.10-70n Dynamic signature database
More informationNEXT GENERATION FIREWALL COMPARATIVE REPORT
NEXT GENERATION FIREWALL COMPARATIVE REPORT Security Value Map (SVM) Authors Thomas Skybakmoen, Christopher Conrad Tested Products Barracuda Networks F600.E20 v6.1.1-071 Check Point Software Technologies
More informationENTERPRISE ENDPOINT COMPARATIVE REPORT
ENTERPRISE ENDPOINT COMPARATIVE REPORT SECURITY STACK: EXPLOITS Authors Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3 ESET Endpoint Antivirus v6.1 Fortinet FortiClient
More informationADVANCED ENDPOINT PROTECTION COMPARATIVE REPORT
ADVANCED ENDPOINT PROTECTION COMPARATIVE REPORT Total Cost of Ownership () MARCH 10, 2017 Authors Jason Brvenik, Thomas Skybakmoen, Morgan Dhanraj Tested Products Carbon Black Cb Protection v7.2.3.3106
More informationBREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS
BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS Security Thomas Skybakmoen, Jason Pappalexis Tested Products AhnLab MDS Fidelis XPS Direct 1000 FireEye Web MPS 4310 and Email MPS 5300 Fortinet FortiSandbox
More informationWEB APPLICATION FIREWALL COMPARATIVE ANALYSIS
WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS Performance Author Thomas Skybakmoen Tested Products Barracuda Networks Web Application Firewall 960 Citrix NetScaler AppFirewall MPX 11520 Fortinet FortiWeb
More informationADVANCED ENDPOINT PROTECTION TEST REPORT
ADVANCED ENDPOINT PROTECTION TEST REPORT SentinelOne Endpoint Protection Platform v1.8.3#31 FEBRUARY 14, 2017 Authors Thomas Skybakmoen, Morgan Dhanraj Overview NSS Labs performed an independent test of
More informationThey Call It Stormy Monday
ANALYST BRIEF They Call It Stormy Monday MOVE TO THE CLOUD REQUIRES FULL LIFE CYCLE MANAGEMENT Author Rob Ayoub Overview The revelation on September 17, 2013 that the cloud storage company Nirvanix would
More informationTEST METHODOLOGY. SSL/TLS Performance. v1.0
TEST METHODOLOGY SSL/TLS Performance v1.0 Table of Contents 1 Introduction... 3 1.1 The Need for SSL/TLS Performance Testing... 3 1.2 About This Test Methodology... 3 1.3 Inclusion Criteria... 3 2 SSL/TLS
More informationMaturing VARs Offer New Outsourcing Option
ANALYST BRIEF Maturing VARs Offer New Outsourcing Option VALUE- ADDED RESELLERS SHIFT TO OFFERING MANAGED SECURITY SERVICES Author Rob Ayoub Overview Security equipment vendors have found managed security
More informationDATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Performance 2014 Jason Pappalexis, Thomas Skybakmoen Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview Implementation
More informationCY2015 Next Generation Intrusion Prevention Systems
MARKET ANALYSIS CY2015 Next Generation Intrusion Prevention Systems AUTHORS: Paula Musich, Joshua Mittler Overview 2015 marked a shifting of priorities and portfolios among some of the top next generation
More informationQuick Start Guide for Administrators and Operators Cyber Advanced Warning System
NSS Labs Quick Start Guide for Administrators and Operators Cyber Advanced Warning System Introduction to the Cyber Advanced Warning System and RiskViewer... 1 Activating Your Account... 2 Adding a New
More informationCONSUMER EPP COMPARATIVE ANALYSIS
CONSUMER EPP COMPARATIVE ANALYSIS Socially Engineered Malware Randy Abrams, Jayendra Pathak, Mohamed Saher, Ahmed Garhy Tested Vendors AVG, F- Secure, Kaspersky, McAfee, Microsoft, Symantec, Trend Micro
More informationBREACH DETECTION SYSTEM PRODUCT ANALYSIS
BREACH DETECTION SYSTEM PRODUCT ANALYSIS Sourcefire (Cisco) Advanced Malware Protection 1 v4.5.2 Bhaarath Venkateswaran, Jayendra Pathak, Ahmed Garhy, Ryan Liles 1 Sourcefire is now part of Cisco. Overview
More informationTHREAT ISOLATION TECHNOLOGY PRODUCT ANALYSIS
THREAT ISOLATION TECHNOLOGY PRODUCT ANALYSIS v1.1.0.3568 2013 Jayendra Pathak, Ken Baylor, Ph.D Overview NSS Labs performed an independent test of the 1.1.0.3568 threat isolation technology. The product
More informationTEST METHODOLOGY. Virtual Firewall. v2.1 MARCH 13, 2017
TEST METHODOLOGY Virtual Firewall MARCH 13, 2017 v2.1 Table of Contents 1 Introduction... 4 1.1 The Need for Virtual Firewalls... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria... 5 2 Product
More informationTEST METHODOLOGY. Breach Detection Systems (BDS) v5.0 MARCH 5, 2018
TEST METHODOLOGY Breach Detection Systems (BDS) MARCH 5, 2018 v5.0 Table of Contents 1 Introduction... 3 1.1 The Need for Breach Detection... 3 1.2 About This Test Methodology... 3 1.3 Inclusion Criteria...
More informationAchieve deeper network security
Achieve deeper network security SonicWall next-generation firewalls Abstract Next-generation firewalls (NGFWs) have become the new norm in network security for organizations of all sizes. Unlike their
More informationIT S NOT ABOUT THE 98 PERCENT YOU CATCH, IT S ABOUT THE 2 PERCENT YOU MISS.
ANALYST BRIEF Cyber Resilience IT S NOT ABOUT THE 98 PERCENT YOU CATCH, IT S ABOUT THE 2 PERCENT YOU MISS. Authors Bob Walder, Chris Morales Overview Where the goal of cyberprevention has been to reduce
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationDBMS Software Market Forecast, (Executive Summary) Executive Summary
DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:
More informationWhite Paper. Why IDS Can t Adequately Protect Your IoT Devices
White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity
More informationMemSQL Partner Program Guide
MemSQL Partner Program Guide April 2018 Introduction As the world changes and it s changing faster than ever you need to be adapting to it. You need to be anticipating problems before they occur. You need
More informationSOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.
More informationTEST METHODOLOGY. Breach Detection Systems (BDS) v3.0
TEST METHODOLOGY Breach Detection Systems (BDS) v3.0 Table of Contents 1 Introduction... 4 1.1 The Need for Breach Detection... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria... 5 1.4 Deployment...
More informationCONSUMER AV / EPP COMPARATIVE ANALYSIS
CONSUMER AV / EPP COMPARATIVE ANALYSIS Exploits Evasion Defenses 2012 Randy Abrams, Nathan Taylor Tested Vendors Avast, AVG, Avira, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Norton, Panda,
More informationProtection - Before, During And After Attack
Advanced Malware Protection for FirePOWER TM BENEFITS Continuous detection of malware - immediately and retrospectively Inline detection of sophisticated malware that evades traditional network protections
More informationFOR FINANCIAL SERVICES ORGANIZATIONS
RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationMoving From Reactive to Proactive Storage Management with an On-demand Cloud Solution
Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar
More informationFICON Drives Fibre Channel Security
FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre
More informationDBAM Systems EP60 Test Executive Summary
Test Executive Summary A Broadband-Testing Report First published February 2007 (V1.0) Published by Broadband-Testing La Calade, 11700 Moux, Aude, France Tel : +33 (0)4 68 43 99 70 Fax : +33 (0)4 68 43
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationEXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE
EXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE Why you need to use sandboxing as well as signatures and heuristics Abstract Next-gen firewalls leverage signatures and heuristics
More informationCIO Update: Security Platforms Will Transform the Network Security Arena
IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will
More informationCyber Security in Smart Commercial Buildings 2017 to 2021
Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the
More informationIBM Storwize V7000 TCO White Paper:
IBM Storwize V7000 TCO White Paper: A TCO White Paper An Alinean White Paper Published by: Alinean, Inc. 201 S. Orange Ave Suite 1210 Orlando, FL 32801-12565 Tel: 407.382.0005 Fax: 407.382.0906 Email:
More information10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control
10 ways to securely optimize your network Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control Table of Contents Secure network optimization 3 #1. Application
More informationKemp Technologies LM-3600 IPv4 and IPv6 Performance Report
Kemp Technologies LM-3600 IPv4 and IPv6 Performance Report A Broadband-Testing Report By Steve Broadhead, Founder & Director, BB-T First published April 2012 (V1.0) Published by Broadband-Testing A division
More informationThe Internet of Everything is changing Everything
The Internet of Everything is changing Everything Intelligent Threat Defense for the Enterprise Mobility Nikos Mourtzinos, CCIE #9763 Global Security Sales Organization Changing Business Models Any Device
More informationSOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM
RSA NETWITNESS EVOLVED SIEM OVERVIEW A SIEM is technology originally intended for compliance and log management. Later, as SIEMs became the aggregation points for security alerts, they began to be more
More informationWorldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary
Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace
More informationAn Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks
An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks abulletti@arbor.net Topics Covered The DDOS cyber threat and impacts Cyprus attacks trend in
More informationUsing Threat Analytics to Protect Privileged Access and Prevent Breaches
Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationFlorida Board of Governors General Office Legislative Budget Request
Florida Board of Governors General Office 2018-2019 Legislative Budget Request Funding of $9.16 million is needed to support the 65 authorized positions and associated operating expense for the Board Office.
More informationBREACH DETECTION SYSTEMS TEST REPORT
BREACH DETECTION SYSTEMS TEST REPORT Lastline Enterprise v7.10 Authors Dipti Ghimire, Jessica Williams, Ahmed Garhy Overview NSS Labs performed an independent test of the Lastline Enterprise v7.10. The
More informationHPE Education Services ESE (East and South Europe) Terms and Conditions
HPE Education Services ESE (East and South Europe) Terms and Conditions These terms and conditions govern the purchase of education services from Hewlett Packard Enterprise Company ( HPE ). 1. Definitions
More informationEntrust WAP Server Certificate Relying Party Agreement
Entrust WAP Server Certificate Relying Party Agreement The WAP/WTLS specification v1.1 does not provide a means for certificate revocation checking. The following Relying Party Agreement" provides further
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationRESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises
RESELLER LOGO RADICALLY BETTER DDoS PROTECTION Radically more effective, radically more affordable solutions for small and medium enterprises IT S TIME TO GET SERIOUS ABOUT CYBER CRIME Despite the headline
More informationServices solutions for Managed Service Providers (MSPs)
McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive
More informationCloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION
Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationOptimize Your Databases Using Foglight for Oracle s Performance Investigator
Optimize Your Databases Using Foglight for Oracle s Performance Investigator Solve performance issues faster with deep SQL workload visibility and lock analytics Abstract Get all the information you need
More informationVertical Market Trends: Western Europe, (Executive Summary) Executive Summary
Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace
More informationMcafee Network Intrusion Detection System. Project Report >>>CLICK HERE<<<
Mcafee Network Intrusion Detection System Project Report Selecting an intrusion detection and prevention system vendor can be a IDS/IPS protection, the current network configuration and the project budget,
More informationBuilding a Threat Intelligence Program
WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351
More informationRed Hat Acquisition of Qumranet Adds next generation virtualization capabilities. September 4, 2008
Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities September 4, 2008 Safe Harbor Forward-Looking Statements Certain statements contained or discussed in this presentation
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 4, ISSUE 1 1ST QUARTER 2017 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q1 2017 4 DDoS
More informationMCAFEE INTEGRATED THREAT DEFENSE SOLUTION
IDC Lab Validation Report, Executive Summary MCAFEE INTEGRATED THREAT DEFENSE SOLUTION Essential Capabilities for Analyzing and Protecting Against Advanced Threats By Rob Ayoub, CISSP, IDC Security Products
More informationExpert Reference Series of White Papers. Cisco Completes the Security Picture with Sourcefire
Expert Reference Series of White Papers Cisco Completes the Security Picture with Sourcefire 1-800-COURSES www.globalknowledge.com Cisco Completes the Security Picture with Sourcefire Rich Hummel, CCNA,
More informationSamu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED
Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing
More informationIntelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales
Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales The Industrialization of Hacking Sophisticated Attacks, Complex Landscape Hacking Becomes an Industry Phishing,
More informationWHITE PAPER. Applying Software-Defined Security to the Branch Office
Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry
More informationDDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT
DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT 01. EXECUTIVE SUMMARY This report summarizes recent research on distributed denial of service (DDoS) attacks, which looks at data collated recently and
More information2018 Trends in Hosting & Cloud Managed Services
PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior
More informationCisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics
Solution Overview Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics BENEFITS Gain visibility across all network conversations, including east-west and north-south
More informationIBM Next Generation Intrusion Prevention System
IBM Next Generation Intrusion Prevention System Fadly Yahaya SWAT Optimizing the World s Infrastructure Oct 2012 Moscow 2012 IBM Corporation Please note: IBM s statements regarding its plans, directions,
More informationNetworking for a smarter data center: Getting it right
IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting
More informationGrowth Leadership, Unified Threat Management (UTM) Global, 2010
Growth Leadership, Unified Threat Management (UTM) Global, 2010 Frost & Sullivan s Global Research Platform Frost & Sullivan is entering its 49 th year in business with a global research organization of
More informationOpenText Buys Guidance Software
OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations
More informationSecuring Your Microsoft Azure Virtual Networks
Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up
More informationBCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)
BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) CLAUSE 13 ON-LINE BIDDING 13.1 ON-LINE BIDDING.1 Definitions: Owner means the party and/or their agent designated to receive on-line
More informationNokia Conference Call 1Q 2012 Financial Results
Nokia Internal Use Only Nokia Conference Call 1Q 2012 Financial Results April 19 th, 2012 15.00 Helsinki time 8.00 New York time Stephen Elop President & CEO Timo Ihamuotila CFO Matt Shimao Head of Investor
More informationHow Architecture Design Can Lower Hyperconverged Infrastructure (HCI) Total Cost of Ownership (TCO)
Economic Insight Paper How Architecture Design Can Lower Hyperconverged Infrastructure (HCI) Total Cost of Ownership (TCO) By Eric Slack, Sr. Analyst December 2017 Enabling you to make the best technology
More informationC H A P T E R Overview Figure 1-1 What is Disaster Recovery as a Service?
CHAPTER 1 Cisco Disaster Recovery as a Service Solution (DRaaS) architecture described in this document is designed to provide a new set of related capabilities allowing Virtualized Multi-Tenant Data Center
More informationVideo-Aware Networking: Automating Networks and Applications to Simplify the Future of Video
Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.
More informationInformation Security Specialist. IPS effectiveness
Information Security Specialist IPS effectiveness IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions An Intrusion Prevention System (IPS) is a critical layer of
More informationMobile Phones, Poor Economy to Dampen PDA Market to 2007
Forecast Analysis Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Abstract: A stagnant economy and growing competition from mobile phones have reduced our expectations for PDA market growth. Worldwide
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More informationitelligence Your One-Stop Partner
itelligence Your One-Stop Partner Table of Contents 3 itelligence in Numbers 4 itelligence Germany in Numbers 5 A Closer Look at the Market 6 Milestones in the itelligence History 7 Integrated Approach
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationCase Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform
Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform Summary For the University of Aberdeen, protecting IT infrastructure serving
More informationCIO Forum Maximize the value of IT in today s economy
CIO Forum Maximize the value of IT in today s economy Laura Scott, Vice President Service Product Line Sales Global Technology Services IT infrastructure is reaching a breaking point. 85% idle In distributed
More informationIBM Security Services Overview
Services Overview Massimo Nardone Senior Lead IT Security Architect Global Technology Services, IBM Internet Security Systems massimo.nardone@fi.ibm.com THE VEHICLE THE SKILL THE SOLUTION Today s Business
More informationAn Investment Checklist
Next-Generation Addressing Advanced Firewalls: Web Threats Next-Generation Firewalls: What You Will Learn When you buy a next-generation firewall (NGFW), you want to determine whether the solution can
More informationSamu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%
Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16% 1 AGENDA Key takeaways from Q4 Key figures Business review for 2017 Outlook 2018 Outlook for 2018-2021 Financials FAQ
More informationA Simple Guide to Understanding EDR
2018. 08. 22 A Simple Guide to Understanding EDR Proposition for Adopting Next-generation Endpoint Security Technology 220, Pangyoyeok-ro, Bundang-gu, Seongnam-si, Gyeonggi-do, South Korea Tel: +82-31-722-8000
More informationManaged Endpoint Defense
DATA SHEET Managed Endpoint Defense Powered by CB Defense Next-gen endpoint threat detection and response DEPLOY AND HARDEN. Rapidly deploy and optimize endpoint prevention with dedicated security experts
More informationTable of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
More informationA custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74
Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market Abridged Version Rise of the DDoS Attack Spurs Demand for Comprehensive Solutions A custom excerpt from Frost & Sullivan s
More informationTerms of Use. Changes. General Use.
Terms of Use THESE TERMS AND CONDITIONS (THE TERMS ) ARE A LEGAL CONTRACT BETWEEN YOU AND SPIN TRANSFER TECHNOLOGIES ( SPIN TRANSFER TECHNOLOGIES, STT, WE OR US ). THE TERMS EXPLAIN HOW YOU ARE PERMITTED
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More information