Antivirus Market Trends
|
|
- Ariel Shields
- 5 years ago
- Views:
Transcription
1 Markets, A. Hallawell Research Note 23 July 2003 Magic Quadrant for Enterprise Antivirus, 1H03 Enterprise antivirus vendors are being pressured to innovate, yet enterprises are still waiting for improvements. Best-of-breed functionality in related security areas is critical for success. Core Topic Security and Privacy: Security Tools, Technologies and Tactics Key Issue Which vendors will emerge as leaders in the information security domain? Note 1 Microsoft's Acquisition of GeCAD Microsoft's recent acquisition of GeCAD (see "Microsoft Must Transform, Not Threaten, the Antivirus Market") will profoundly affect the antivirus vendor landscape, although it did not affect vendor positions in this Magic Quadrant iteration. Antivirus vendors must show increasingly compelling value to enterprises (especially in remote-access support, centralized management and reporting) to avoid being squeezed out by Microsoft and best-ofbreed vendors in emerging areas. Enterprise antivirus vendors must focus on extinguishing enterprises' "pain points," as well as innovation for example, by making their antivirus engines more open to more effectively support other antivirus products that enterprises may use. Antivirus Market Trends The purchase and support of traditional, signature-based antivirus solutions constitute the largest portion of IT budgets allocated to information security. Antivirus vendors have capitalized on increased enterprise attention to security since the Sept. 11 terrorist attacks and the "Nimda" worm. Leading antivirus vendors have experienced strong growth rates for products, and product and maintenance price hikes have been largely tolerated by enterprises. The heyday that leading vendors have experienced in the past two years will not be repeated. Prior to Microsoft's acquisition of GeCAD Software (see Note 1), multivector worms such as Nimda and "SQL Slammer" exploited server-based vulnerabilities and simply bypassed antivirus products. Despite more regular (usually daily) signature updates, many viruses are spread so rapidly that enterprises are infected before the antivirus vendor can produce the signature, let alone allow time for enterprises to test and deploy signatures to the desktop. Peer-to-peer and Web services will make the situation even worse. Signature-based antivirus products are poised to become relegated to the detection of variants and other "routine noise" viruses. However, enterprises overwhelmingly expect antivirus vendors to deal with multifaceted threats, even if IT vulnerabilities are the primary cause of infection. Traditional antivirus vendors must battle on multiple fronts to retain or gain market share. The buying centers for antivirus products and the daily responsibility for virus management mainly have remained outside of the security organization and are decentralized, the domain of desktop and LAN groups, and network administrators. However, this decentralization is changing due to Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 Note 2 The Antivirus Markets There are four primary antivirus markets: Desktop antivirus, where automation and management, in addition to a growing need for support of personal firewalls, are required antivirus, where platform stability is key for Lotus and Exchange products, and best-of-breed anti-spam detection and management; content filtering and antivirus scanning are also required by e- mail administrators Antivirus scanning for HTTP/FTP and other firewall traffic, where network and network security administrators place a premium on high performance and, increasingly, operational efficiency with URL filtering and related content scanning SMB, where price, limited upkeep and operational efficiency are critical, and best-of-breed functionality in every discipline may not be required multifaceted threats such as Slammer, bringing antivirus as a discipline into the security mainstream. It is also becoming more pronounced, with the antivirus space segregated into four markets (see Note 2). Antivirus vendors must be prepared to provide best-of-breed technology in related areas to prevent being ousted by vendors that can integrate an antivirus signature-based engine into their products. Antivirus could become relegated to a secondary, commodity feature of platform-specific products, with much lower price points. However, antivirus vendors have failed to provide best-of-breed functionality for emerging enterprise needs, such as personal firewalls and anti-spam technology. In addition, as vendors have improved product stability and management capabilities, there is increasingly limited differentiation among traditional enterprise antivirus products. Magic Quadrant Criteria To be placed on the Magic Quadrant for Enterprise Antivirus, 1H03 (see Figure 1), a vendor must: Own its antivirus engine Provide products for the desktop, file servers, the SMTP gateway, and FTP and HTTP traffic Provide inherent management and distribution capabilities Sell and support its products to midsize and large enterprises worldwide 23 July
3 Figure 1 Magic Quadrant for Enterprise Antivirus, 1H03 Challengers Leaders Ability to Execute Computer Associates Symantec Network Associates (McAfee Security) Trend Micro Sophos F-Secure As of June 2003 Niche Players Source: Gartner Research (June 2003) Completeness of Vision Visionaries Significant weight is given to sales and channel capabilities to determine a vendor's ability to execute. Brand strength and good technology partnerships also are important. This weighting is a direct reflection of enterprises' preference for "known" enterprise antivirus solutions. Channel and partnership strengths help introduce emerging technologies to customers. Ability to execute criteria include: Financial stability, revenue growth and installed base Sales/channel capabilities Brand reputation and marketing strength Strong track record with technology partnerships Client feedback on product stability and quality of customer support The assessment of a vendor's future ability to serve a full spectrum of small to large, homogeneous and heterogeneous enterprise environments is weighted heavily to determine its completeness of vision. Criteria include: Strategic plan for its antivirus products 23 July
4 Client feedback on how product and feature functionality and quality of support meet customer requirements Track record in providing good quality and timely products, and features for emerging customer needs The vendor provides, or is planning to provide, best-of-breed functionality for personal firewalls, which should be integrated with antivirus, enterprise anti-spam functionality and content filtering Current and future strategies for dealing with new malicious code threats Current and planned management and administration capabilities for antivirus and related products Leaders Although Network Associates' McAfee Security has been increasingly dwarfed by Symantec's deft abilities in the channel, McAfee has worked to regain focus on its antivirus products in the past three years. In 2002, McAfee retained the largest share (34 percent) of the worldwide enterprise antivirus market. In 2001, the release of EPO, McAfee's management and administration tool, provided superior reporting a major need for large enterprises. McAfee's WebShield appliances also have been popular for midsize enterprises. After the fallout from its ambitious strategy during the mid-1990s, McAfee has been cautious in branching out of the antivirus area. However, in 2003, McAfee has been more adventurous and made acquisitions in anti-spam (Deersoft) and intrusion prevention (Entercept Security Technologies and IntruVert Networks). Entercept and IntruVert have good technology and performed well in early adopter settings. McAfee has yet to integrate the Deersoft technology into its SMTP/gateway products. Even when this is completed, the product will have to catch up to the best pure-play enterprise anti-spam products. McAfee's personal firewall still lags best-of-breed vendors, and we continue to hear negative customer comments about McAfee's GroupShield mail products. Trend Micro's core strengths are its and gateway products, especially its ability to serve current and emerging needs of larger enterprises. Trend recently segregated its Interscan product line into SMTP/messaging and HTTP/Web traffic to develop products and functionality for these different buying centers. Trend is leading innovation on these platforms. 23 July
5 Anti-spam fervor is hurting Trend's traditional dominance at the SMTP gateway. Trend's relationship with Postini (a leading antispam service provider) will allow customers to buy a product version of Postini from Trend. Trend also is starting to target remote-user requirements with its joint SMTP/HTTP appliances with NetScreen Technologies. Although Trend has strong centralized management and reporting capabilities, it has not made significant progress in the desktop antivirus market. In addition, Trend is hampered by the lack of an enterprise personal firewall (Trend's relationship with Zone Labs broke down in 2002), which will lead to an uncertain future in the desktop market. Symantec has gone from strength to strength in terms of its ability to execute in the enterprise antivirus channel. Symantec has experienced strong enterprise growth and high renewals, despite increased maintenance prices, and limited product and functionality improvements geared toward small or very large enterprises. Symantec's brand and reputation for customer support also is serving it well. Symantec's gateway products have not had best-of-breed functionality in related areas, such as URL blocking or anti-spam, or the performance needed by large enterprises (with the exception of the ICAP product). In addition, Symantec's personal firewall is not best or breed (similar to McAfee). High price points have failed to encourage adoption. Unlike Trend's and McAfee's antivirus management products, Symantec does not provide for reporting within a single product. The new Event Manager product must be installed for reporting, and enterprises must migrate from System Center to Event Manager by year-end Clients report that Symantec's recent enterprise licensing program changes, and product and maintenance prices have markedly increased the cost of Symantec's products. Higher prices and austere licensing practices (augmented by functionality in Event Manager) will not continue to be tolerated by customers without more focused attention on their antivirus needs. In addition, Symantec likely will be greatly affected by Microsoft's antivirus plans due to Symantec's strong presence in the consumer and small and midsize business (SMB) antivirus markets. Visionaries During the past two years, Sophos has emerged as the leading alternative to the "big three" antivirus vendors (Network 23 July
6 Associates, Symantec and Trend Micro). Sophos provides a topquality detection engine, superior customer service and broad platform support in the U.K. and Western European markets. Sophos has experienced strong growth in the past year in Europe and with its push into the U.S. market. Improvements in its management and administration, and new and SMTP products, also have increased its ability to win enterprise deals. Sophos' technology partnerships (where it provides its antivirus engine via original equipment manufacturer agreements) with best-of-breed vendors such as Sybari Software (for Exchange and Lotus Notes), Mirapoint, CipherTrust (anti-spam/security appliance) and FrontBridge Technologies (anti-spam service provider) also have gained it visibility with enterprises in the United States. Sophos' neutral position as a pure-play antivirus vendor and its successful partnership track record makes it a good partner candidate for best-of-breed and mainstream security vendors. Its key strengths are its desktop (and file server) products and its solely enterprise-focused customer service. Its challenges will be to gain greater brand awareness in the U.S. market, and to augment its desktop antivirus with personal firewall technology of its own or with a strong partnership. Niche Players F-Secure has a strong reputation for antivirus research, although consolidation in the antivirus market in the past five years has led to declining "mind share" and market share. F-Secure has branched out of antivirus with product offerings in encryption and network security. Most notably, F-Secure has developed strong offerings for wireless and handheld antivirus protection. However, there is minimal threat and, therefore, a minimal market for wireless antivirus protection, although F-Secure is strongly positioned with wireless manufacturers and service providers. F-Secure also has produced a passable personal firewall that can be bundled with its desktop antivirus product at a competitive price. It has supported other vendors' antivirus engines (including the Kasperksy Labs engine) in addition to its own for several years. Although Computer Associates (CA) is not a leader or a visionary in the enterprise antivirus market, changes to its pricing structure and CA's sales presence with chief information officers makes it an emerging contender, especially among SMBs. CA has made some basic improvements to its etrust antivirus product line, and it has relationships with Sybari (for antivirus on 23 July
7 Exchange and Notes) and Webwasher (for SMTP/URL content filtering). In March 2003, CA, recognizing that the leading vendors were increasing their products' prices, announced a pricing structure that made it appear cost-attractive. CA's modest perpetual license (and one-year maintenance) fee, which has an option to get the signatures for free (although maintenance is an aboveaverage 40 percent) has increased its visibility with enterprises. Vendors Not on the Magic Quadrant There are several vendors that have their own antivirus engines or, more typically, license and integrate an antivirus vendor engine into their products, that have not been placed on the Magic Quadrant. Because of the segmented buying centers for enterprise antivirus, as well as platform-specific requirements, many enterprises do not use an enterprise antivirus vendor for antivirus protection on internal servers or at the gateway. For example, Sybari has antivirus products for Lotus Notes and Exchange, and integrates in an antivirus engine from several vendors. content filtering or anti-spam vendors, such as ActiveState, Clearswift, CipherTrust, FrontBridge, MessageLabs, NetIQ/Marshall and Tumbleweed Communications, can integrate in or provide "hooks" to antivirus engines. More unusually, Fortinet has developed an antivirus engine to allow applicationspecific-integrated-circuit-based processing of SMTP and HTTP traffic within its appliance. Bottom Line: Enterprises should use a broader lens than they have traditionally used when evaluating antivirus and related products. They should examine how best-of-breed or platformspecific products may serve their requirements. Enterprises also should capitalize on recent competition tension in the enterprise antivirus market by demanding better functionality and services at lower prices during renewal and procurement negotiation. 23 July
Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary
Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace
More informationCIO Update: Security Platforms Will Transform the Network Security Arena
IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will
More informationCIO Update: Enterprise Firewall Magic Quadrant for 1H03
IGG-07022003-02 R. Stiennon Article 2 July 2003 CIO Update: Enterprise Firewall Magic Quadrant for 1H03 Deep packet inspection technology is driving the firewall market to an inflection point that is characterized
More informationSelect Q&A, QA A. Hallawell, M. Grey. Anti-spam Architecture Choices. Firewall. Appliance or Licensed Software. SMTP Relay
Select Q&A, A. Hallawell, M. Grey Research Note 22 September 2003 How to Select Spam-Filtering Products and Services Choose a spam-filtering solution by evaluating anti-spam providers' management, research
More informationPredicts 2004: The Future of Windows Server
Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially
More informationEurope Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary
Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Publication Date: 1 July 2003 Authors Fabrizio Biscotti Alain Dang Van Mien Norma Schroder Chris Pang This document
More informationMagic Quadrant Selection Criteria
Markets, G. Johnson Research Note 30 May 2003 Magic Quadrant for Australian xdsl Providers, 2003 The Australian generic digital subscriber line market is rapidly consolidating. Network service providers
More informationMarket Scope. Magic Quadrant Methodology
Markets, J. Enck, A. Powell Research Note 12 May 2003 Global IA High-Volume Server Magic Quadrant, 1H03 Gartner's Magic Quadrant for Intel Architecture in 1H03 indicates that Dell Computer, Hewlett-Packard
More informationWith a national IP backbone, as well as more flexible contracts and broader discounts in place, SBC is worth considering.
Vendor Ratings, Kathie Hackler Research Note 19 January 2004 Vendor Rating Update: SBC Communications With a national IP backbone, as well as more flexible contracts and broader discounts in place, SBC
More informationDatabase Design Tool Magic Quadrant 2H02
Markets, J. Duggan Research Note 27 August 2002 Database Design Tool Magic Quadrant 2H02 Despite rapid growth in Unified Modeling Language, objectoriented and business process modeling tools, database
More informationCan you wait until 2010?
Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationFinding Pure-Play Midtier ESPs: A Two-Step Process
Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors
More informationShould You Use Liberty or Passport for Digital Identities?
Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft
More informationNetIQ's VoIP Management Products
Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.
More informationAIOs Displace Single-Function Printers in Latin America
` Market Analysis AIOs Displace Single-Function Printers in Latin America Abstract: Stand-alone printer shipments have dropped sharply, while inkjet all-in-one printers continue to gain market share in
More informationMobile Phones, Poor Economy to Dampen PDA Market to 2007
Forecast Analysis Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Abstract: A stagnant economy and growing competition from mobile phones have reduced our expectations for PDA market growth. Worldwide
More informationWorldwide Workstation Shipments Rebound in Third Quarter
Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase
More information4Q03 Update: Wireless Communications Semiconductor Forecast,
Forecast Analysis 4Q03 Update: Wireless Communications Semiconductor Forecast, 2003-2005 Abstract: Mobile communications semiconductor revenue was strong in the third quarter. 2003 is on a path for 16
More informationChina: User Perceptions and Plans for PCs and PDAs in 2003
End-User Analysis China: User Perceptions and Plans for PCs and PDAs in 2003 Abstract: The majority of the Chinese organizations' IT strategies and budget planning issues remain immature. It would not
More informationUnified Communications Magic Quadrant 1H03
Markets, B. Elliot Research Note 3 February 2003 Unified Communications Magic Quadrant 1H03 Unified communications is emerging as an enabler for business process improvement. Vendor offerings remain fragmented,
More informationHuawei: China's Leading Equipment Vendor Returns to Growth
Research Brief Huawei: China's Leading Equipment Vendor Returns to Growth Abstract: Huawei has turned in a strong performance during the first half of 2003. The second half of the year could be even better.
More informationSOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary
SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been
More informationMidsize Business Voice Service Spending Steady for 2003
End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in
More informationSoftware-Defined WAN Does Not Grow on WAN Alone
MARKET FORECAST Software-Defined WAN Does Not Grow on WAN Alone OCT 2017 Jim Duffy, Senior Analyst, Networking Software-defined WAN is expected to undergo robust growth over the next few years, fueled
More informationManagement Update: Storage Management TCO Considerations
IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total
More informationCIO Update: Gartner s Storage Services Magic Quadrant
IGG-04302003-04 A. Couture, R. Passmore Article 30 April 2003 CIO Update: Gartner s Storage Services Magic Quadrant Gartner has developed its first North American Storage Services Magic Quadrant. Storage
More informationWeb Services Take Root in Banks and With Asset Managers
Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations
More informationSymantec Endpoint Protection 11.0
OVERVIEW Symantec Endpoint Protection replaces Symantec AntiVirus Corporate Edition, Symantec Client Security, Symantec Sygate Enterprise protection and Confidence Online for PCs. Symantec Endpoint Protection
More informationSecuring BYOD With Network Access Control, a Case Study
Research G00226207 29 August 2012 Securing BYOD With Network Access Control, a Case Study Lawrence Orans This Case Study highlights how an organization utilized NAC and mobile device management solutions
More informationSecurity Market,
THE RADICATI GROUP, INC. A TECHNOLOGY MARKET RESEARCH FIRM Email Security Market, 2007-2011 http://www.radicati.com Cost US $3,000 by company P.O. or $2,500 by credit card A comprehensive analysis of the
More informationUser Survey Analysis: Next Steps for Server Virtualization in the Midmarket
User Survey Analysis: Next Steps for Server Virtualization in the Midmarket Gartner RAS Core Research Note G00207375, James A. Browning, Alan Dayley, 21 October 2010, RV2A411012011 Approximately 30% of
More informationFirewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary
Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published
More informationCentral and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary
Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the
More informationGrowth Leadership, Unified Threat Management (UTM) Global, 2010
Growth Leadership, Unified Threat Management (UTM) Global, 2010 Frost & Sullivan s Global Research Platform Frost & Sullivan is entering its 49 th year in business with a global research organization of
More information2018 Trends in Hosting & Cloud Managed Services
PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior
More informationEnterprise Data Architecture: Why, What and How
Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented
More informationThese patterns include: The use of proprietary software
Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal
More informationSymantec Endpoint Protection
Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,
More informationKaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia
Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab
More informationSymantec Client Security. Integrated protection for network and remote clients.
Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions
More informationDBMS Software Market Forecast, (Executive Summary) Executive Summary
DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:
More informationRiverbed Acquisitions Broaden Customer Options for Acceleration and ADC
Research Publication Date: 29 September 2011 ID Number: G00219067 Riverbed Acquisitions Broaden Customer Options for Acceleration and ADC Joe Skorupa, Mark Fabbi This research discusses the impact of Riverbed's
More informationCOM F. Troni, L. Fiering
F. Troni, L. Fiering Research Note 8 September 2003 Commentary Notebook TCO Comparison: Day Extenders vs. Traveling s Notebooks used by traveling workers, who are out of the office more often and work
More information4Q02 Update: Disk Storage Forecast Scenarios,
Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than
More informationVendor Ratings, VDR Kevin Strange, Andrew Butler, Gareth Herschel
Vendor Ratings, Kevin Strange, Andrew Butler, Gareth Herschel Research Note 27 January 2003 Vendor Rating: Focus on NCR s Teradata Division NCR s Teradata division is performing well, despite the tough
More informationAction Recommendation for 2004
Strategic Planning, P. Redman, T. Hart, W. Clark, J. Chapman, P. Dittner, R. Simpson, K. Foong, N. Ingelbrecht Research Note 20 November 2003 Changes in Store for Wireless WAN During 2004 The hottest growth
More informationHow to Test Outbreak Commander
TREND MICRO CONTROL MANAGER TREND MICRO, INC. 10101 N. DE ANZA BLVD. CUPERTINO, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 WWW.TRENDMICRO.COM How to Test Outbreak Commander 2 TREND MICRO CORPORATE
More informationIT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary
IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the
More informationNGN: Enterprise IP Telephony
NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations
More informationVertical Market Trends: Western Europe, (Executive Summary) Executive Summary
Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace
More informationetrust Antivirus Release 7.1
D A T A S H E E T etrust Antivirus Release 7.1 etrust Antivirus provides superior protection from the perimeter to the PDA against today s most prevalent security threat viruses. It eliminates virus infections,
More informationMagic Quadrant for Pan-European Web Hosting, 2H03
Markets, M. Halama Research Note 9 September 2003 Magic Quadrant for Pan-European Web Hosting, 2H03 New vendors have appeared, and others have sharpened their focus. All those in the Magic Quadrant will
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationSophos. Allan Widell Channel Account Executive. 24. August 2017
Sophos Allan Widell Channel Account Executive 24. August 2017 Our Differentiated Model Focus on mid-market enterprises: over 50% of IT security market Complete, advanced, and highly effective security
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationSymantec Endpoint Protection Integration Component User's Guide. Version 7.0
Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationTrends in Fixed Public Network Services: Finland, (Executive Summary) Executive Summary
Trends in Fixed Public Network Services: Finland, 2000-2006 (Executive Summary) Executive Summary Publication Date: October 17, 2002 Authors Susan Richardson Maureen Coulter Michal Halama Katja Ruud Lisa
More informationSTRONG PROFITS AND NEW MARKET OPPORTUNITIES SAMU KONTTINEN Capital Market Day 16 Sept 2015
CONSUMER SECURITY STRONG PROFITS AND NEW MARKET OPPORTUNITIES SAMU KONTTINEN Capital Market Day 16 Sept 2015 1 AGENDA Consumer Security in brief Market overview and key trends Offering and channels Competition
More informationMagic Quadrant for SAN Fibre Channel Switches, 1H03
Markets, N. Allen, R. Passmore Research Note 1 May 2003 Magic Quadrant for SAN Fibre Channel Switches, 1H03 In the latest Storage Area Network Fibre Channel Switch Magic Quadrant, Brocade and McDATA still
More informationGlobal Headquarters: 5 Speen Street Framingham, MA USA P F
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com C O M P E T I T I V E A N A L Y S I S I D C M a r k e t S c a p e : W o r l d w i d e D a t a c e
More informationWireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary
Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Publication Date: October 14, 2002 Authors To Chee Eng Evelyn Goh Kobita Desai This document has been published to the following
More informationIT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary
IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the
More informationCOM I. Keene, B. Hafner
I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.
More informationFour Partial Solutions for Remote Network Access
Decision Framework, E. Paulak Research Note 29 August 2003 Four Partial Solutions for Remote Network Access Four different solutions can help to meet your remoteaccess needs. Managed-service providers
More informationManagement Update: Wireless LAN Predictions for 2004
IGG-11192003-03 K. Dulaney, R. Ahlawat Article 19 November 2003 Management Update: Wireless LAN Predictions for 2004 Wireless LAN (WLAN) technology and use continue to evolve at a rapid pace. WLANs will
More informationServices solutions for Managed Service Providers (MSPs)
McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive
More informationHow We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study.
How We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study. Contents. Introduction... 3 Our initial findings... 5 The solution.... 6 Using Gateway Antivirus for multi-layer
More informationSYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet
SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document
More informationSpam Filtering Works Better With a Management Policy
Select Q&A, M. Grey, A. Hallawell Research Note 22 September 2003 Spam Filtering Works Better With a Management Policy A deployment of spam-filtering technology that does not consider business issues will
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationIP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary
IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary Publication Date: September 9, 2002 Author Chee Eng To This document has been published to the following Cluster codes: TELC-WW-EX-0423
More informationU.S. Network Service Provider Magic Quadrant: 1H03
Markets, J. Pultz Research Note 14 March 2003 U.S. Network Service Provider Magic Quadrant: 1H03 The turmoil in the U.S.-based network service provider marketplace is far from over. More providers will
More informationINTRODUCING SECURITYPLUS FOR MDAEMON
INTRODUCING SECURITYPLUS FOR MDAEMON Alt-N Technologies is introducing SecurityPlus for MDaemon as a new product name for the next version of AntiVirus for MDaemon. Because SecurityPlus will include additional
More informationProduction Surge Boosts Automotive Semiconductor Market
Market Analysis Production Surge Boosts Automotive Semiconductor Market Abstract: Demand for automotive semiconductors revived in 2002, as car makers stepped up production. Consumer fears may stifle growth
More informationSemiconductor Market for Data Processing: Asia/Pacific, 3Q03
Research Brief Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Abstract: Semiconductor market conditions have improved since the second quarter of 2003, and the industry's recovery is continuing.
More informationKW Predicts: Who Will Own the Web-Conferencing Market?
Strategic Planning, J. Lundy, L. Latham, R. Knox Research Note 21 November 2003 KW Predicts: Who Will Own the Web-Conferencing Market? In the knowledge workplace, voice over IP will revolutionize Web conferencing
More informationMesh Networking Principles
Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,
More informationINSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic
Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need
More informationNetwork-Attached Storage Market Shows Weakness
Market Analysis Network-Attached Storage Market Shows Weakness Abstract: Despite Dell's strong growth in revenue, most other network-attached storage vendors experienced weaker performance in the first
More informationSpending on Service Provider Routers Begins to Grow in EMEA
Research Brief Spending on Service Provider Routers Begins to Grow in EMEA Abstract: 2Q03 brought the first rise in end-user spending on service provider routers in Europe, Middle East and Africa for a
More informationEnding the Confusion About Software- Defined Networking: A Taxonomy
Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server
More informationComputer Associates International etrust Antivirus
Kristen Noakes-Fry Product Report 29 August 2003 Computer Associates International etrust Antivirus Summary etrust Antivirus from Computer Associates employs signature scanning and heuristics across several
More informationSecurity Made Simple by Sophos
Security Made Simple by Sophos Indian businesses in the radar of cyber-threats Frequency of cyber-attacks Most targeted systems / IT assets -- KPMG Cybercrime Survey Report 2015 3 ON AN AVERAGE, HOW MUCH
More informationNew Content and Cloud Security Suites
New Content and Cloud Security Suites Customer Business Problems & Pain Points Too many point products to manage for and email security. Need to lower costs, save time so considering SaaS for security
More informationLeased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary
Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Publication Date: December 4, 2002 Authors Alayne Wong To Chee Eng Evelyn Goh Kenshi Tazaki Andrew
More informationComputer Associates etrust Antivirus v 7.1
Product Advisor Charlotte Dunlap Analyst, Information Security Andrew Braunberg Senior Analyst, Information Security Contents Product Assessment Summary Current Perspective Product Strengths & Weaknesses
More informationHype Cycle for Data Warehousing, 2003
K. Strange, T. Friedman Strategic Analysis Report 30 May 2003 Hype Cycle for Data Warehousing, 2003 Data warehousing concepts and approaches have become fairly mature during a decade of refinement. However,
More informationMobile Terminals: Western Europe, (Executive Summary) Executive Summary
Mobile Terminals: Western Europe, 1998-2007 (Executive Summary) Executive Summary Publication Date: 6 June 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace
More informationManagement Update: Gartner s New Magic Quadrant for U.S. Network Service Providers
IGG-03262003-03 J. Pultz Article 26 March 2003 Management Update: Gartner s New Magic Quadrant for U.S. Network Service Providers Most enterprises are concerned about which network service providers (NSPs)
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationHost-Bus RAID Controller Worldwide Market Share, 2002 (Executive Summary) Executive Summary
Host-Bus RAID Controller Worldwide Market Share, 2002 (Executive Summary) Executive Summary Publication Date: 23 July 2003 Author Roger W. Cox This document has been published to the following Marketplace
More informationHong Kong EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST DEC Dan Thompson, Senior Analyst, Multi-tenant Datacenters
MARKET FORECAST DEC 2016 Hong Kong Multi-Tenant Datacenter Market Dan Thompson, Senior Analyst, Multi-tenant Datacenters This report provides an overview of the competitive dynamics in the Hong Kong market,
More informationSamu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED
Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing
More informationIntegration With the Business Modeler
Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design
More informationConstant Contact. Responsyssy. VerticalResponse. Bronto. Monitor. Satisfaction
Contenders Leaders Marketing Cloud sy Scale Campaign aign Monitor Niche High Performers Satisfaction Email Marketing Products Products shown on the Grid for Email Marketing have received a minimum of 10
More informationVenusense UTM Introduction
Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,
More informationMidsize Businesses Slowly Warm Up to Storage Services
Research Brief Midsize Businesses Slowly Warm Up to Storage Services Abstract: A recent study reveals only lukewarm demand for new storage services among midsize businesses. Assessment tools and peer references
More informationCommercial Product Matrix
PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer
More information