Antivirus Market Trends

Size: px
Start display at page:

Download "Antivirus Market Trends"

Transcription

1 Markets, A. Hallawell Research Note 23 July 2003 Magic Quadrant for Enterprise Antivirus, 1H03 Enterprise antivirus vendors are being pressured to innovate, yet enterprises are still waiting for improvements. Best-of-breed functionality in related security areas is critical for success. Core Topic Security and Privacy: Security Tools, Technologies and Tactics Key Issue Which vendors will emerge as leaders in the information security domain? Note 1 Microsoft's Acquisition of GeCAD Microsoft's recent acquisition of GeCAD (see "Microsoft Must Transform, Not Threaten, the Antivirus Market") will profoundly affect the antivirus vendor landscape, although it did not affect vendor positions in this Magic Quadrant iteration. Antivirus vendors must show increasingly compelling value to enterprises (especially in remote-access support, centralized management and reporting) to avoid being squeezed out by Microsoft and best-ofbreed vendors in emerging areas. Enterprise antivirus vendors must focus on extinguishing enterprises' "pain points," as well as innovation for example, by making their antivirus engines more open to more effectively support other antivirus products that enterprises may use. Antivirus Market Trends The purchase and support of traditional, signature-based antivirus solutions constitute the largest portion of IT budgets allocated to information security. Antivirus vendors have capitalized on increased enterprise attention to security since the Sept. 11 terrorist attacks and the "Nimda" worm. Leading antivirus vendors have experienced strong growth rates for products, and product and maintenance price hikes have been largely tolerated by enterprises. The heyday that leading vendors have experienced in the past two years will not be repeated. Prior to Microsoft's acquisition of GeCAD Software (see Note 1), multivector worms such as Nimda and "SQL Slammer" exploited server-based vulnerabilities and simply bypassed antivirus products. Despite more regular (usually daily) signature updates, many viruses are spread so rapidly that enterprises are infected before the antivirus vendor can produce the signature, let alone allow time for enterprises to test and deploy signatures to the desktop. Peer-to-peer and Web services will make the situation even worse. Signature-based antivirus products are poised to become relegated to the detection of variants and other "routine noise" viruses. However, enterprises overwhelmingly expect antivirus vendors to deal with multifaceted threats, even if IT vulnerabilities are the primary cause of infection. Traditional antivirus vendors must battle on multiple fronts to retain or gain market share. The buying centers for antivirus products and the daily responsibility for virus management mainly have remained outside of the security organization and are decentralized, the domain of desktop and LAN groups, and network administrators. However, this decentralization is changing due to Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 Note 2 The Antivirus Markets There are four primary antivirus markets: Desktop antivirus, where automation and management, in addition to a growing need for support of personal firewalls, are required antivirus, where platform stability is key for Lotus and Exchange products, and best-of-breed anti-spam detection and management; content filtering and antivirus scanning are also required by e- mail administrators Antivirus scanning for HTTP/FTP and other firewall traffic, where network and network security administrators place a premium on high performance and, increasingly, operational efficiency with URL filtering and related content scanning SMB, where price, limited upkeep and operational efficiency are critical, and best-of-breed functionality in every discipline may not be required multifaceted threats such as Slammer, bringing antivirus as a discipline into the security mainstream. It is also becoming more pronounced, with the antivirus space segregated into four markets (see Note 2). Antivirus vendors must be prepared to provide best-of-breed technology in related areas to prevent being ousted by vendors that can integrate an antivirus signature-based engine into their products. Antivirus could become relegated to a secondary, commodity feature of platform-specific products, with much lower price points. However, antivirus vendors have failed to provide best-of-breed functionality for emerging enterprise needs, such as personal firewalls and anti-spam technology. In addition, as vendors have improved product stability and management capabilities, there is increasingly limited differentiation among traditional enterprise antivirus products. Magic Quadrant Criteria To be placed on the Magic Quadrant for Enterprise Antivirus, 1H03 (see Figure 1), a vendor must: Own its antivirus engine Provide products for the desktop, file servers, the SMTP gateway, and FTP and HTTP traffic Provide inherent management and distribution capabilities Sell and support its products to midsize and large enterprises worldwide 23 July

3 Figure 1 Magic Quadrant for Enterprise Antivirus, 1H03 Challengers Leaders Ability to Execute Computer Associates Symantec Network Associates (McAfee Security) Trend Micro Sophos F-Secure As of June 2003 Niche Players Source: Gartner Research (June 2003) Completeness of Vision Visionaries Significant weight is given to sales and channel capabilities to determine a vendor's ability to execute. Brand strength and good technology partnerships also are important. This weighting is a direct reflection of enterprises' preference for "known" enterprise antivirus solutions. Channel and partnership strengths help introduce emerging technologies to customers. Ability to execute criteria include: Financial stability, revenue growth and installed base Sales/channel capabilities Brand reputation and marketing strength Strong track record with technology partnerships Client feedback on product stability and quality of customer support The assessment of a vendor's future ability to serve a full spectrum of small to large, homogeneous and heterogeneous enterprise environments is weighted heavily to determine its completeness of vision. Criteria include: Strategic plan for its antivirus products 23 July

4 Client feedback on how product and feature functionality and quality of support meet customer requirements Track record in providing good quality and timely products, and features for emerging customer needs The vendor provides, or is planning to provide, best-of-breed functionality for personal firewalls, which should be integrated with antivirus, enterprise anti-spam functionality and content filtering Current and future strategies for dealing with new malicious code threats Current and planned management and administration capabilities for antivirus and related products Leaders Although Network Associates' McAfee Security has been increasingly dwarfed by Symantec's deft abilities in the channel, McAfee has worked to regain focus on its antivirus products in the past three years. In 2002, McAfee retained the largest share (34 percent) of the worldwide enterprise antivirus market. In 2001, the release of EPO, McAfee's management and administration tool, provided superior reporting a major need for large enterprises. McAfee's WebShield appliances also have been popular for midsize enterprises. After the fallout from its ambitious strategy during the mid-1990s, McAfee has been cautious in branching out of the antivirus area. However, in 2003, McAfee has been more adventurous and made acquisitions in anti-spam (Deersoft) and intrusion prevention (Entercept Security Technologies and IntruVert Networks). Entercept and IntruVert have good technology and performed well in early adopter settings. McAfee has yet to integrate the Deersoft technology into its SMTP/gateway products. Even when this is completed, the product will have to catch up to the best pure-play enterprise anti-spam products. McAfee's personal firewall still lags best-of-breed vendors, and we continue to hear negative customer comments about McAfee's GroupShield mail products. Trend Micro's core strengths are its and gateway products, especially its ability to serve current and emerging needs of larger enterprises. Trend recently segregated its Interscan product line into SMTP/messaging and HTTP/Web traffic to develop products and functionality for these different buying centers. Trend is leading innovation on these platforms. 23 July

5 Anti-spam fervor is hurting Trend's traditional dominance at the SMTP gateway. Trend's relationship with Postini (a leading antispam service provider) will allow customers to buy a product version of Postini from Trend. Trend also is starting to target remote-user requirements with its joint SMTP/HTTP appliances with NetScreen Technologies. Although Trend has strong centralized management and reporting capabilities, it has not made significant progress in the desktop antivirus market. In addition, Trend is hampered by the lack of an enterprise personal firewall (Trend's relationship with Zone Labs broke down in 2002), which will lead to an uncertain future in the desktop market. Symantec has gone from strength to strength in terms of its ability to execute in the enterprise antivirus channel. Symantec has experienced strong enterprise growth and high renewals, despite increased maintenance prices, and limited product and functionality improvements geared toward small or very large enterprises. Symantec's brand and reputation for customer support also is serving it well. Symantec's gateway products have not had best-of-breed functionality in related areas, such as URL blocking or anti-spam, or the performance needed by large enterprises (with the exception of the ICAP product). In addition, Symantec's personal firewall is not best or breed (similar to McAfee). High price points have failed to encourage adoption. Unlike Trend's and McAfee's antivirus management products, Symantec does not provide for reporting within a single product. The new Event Manager product must be installed for reporting, and enterprises must migrate from System Center to Event Manager by year-end Clients report that Symantec's recent enterprise licensing program changes, and product and maintenance prices have markedly increased the cost of Symantec's products. Higher prices and austere licensing practices (augmented by functionality in Event Manager) will not continue to be tolerated by customers without more focused attention on their antivirus needs. In addition, Symantec likely will be greatly affected by Microsoft's antivirus plans due to Symantec's strong presence in the consumer and small and midsize business (SMB) antivirus markets. Visionaries During the past two years, Sophos has emerged as the leading alternative to the "big three" antivirus vendors (Network 23 July

6 Associates, Symantec and Trend Micro). Sophos provides a topquality detection engine, superior customer service and broad platform support in the U.K. and Western European markets. Sophos has experienced strong growth in the past year in Europe and with its push into the U.S. market. Improvements in its management and administration, and new and SMTP products, also have increased its ability to win enterprise deals. Sophos' technology partnerships (where it provides its antivirus engine via original equipment manufacturer agreements) with best-of-breed vendors such as Sybari Software (for Exchange and Lotus Notes), Mirapoint, CipherTrust (anti-spam/security appliance) and FrontBridge Technologies (anti-spam service provider) also have gained it visibility with enterprises in the United States. Sophos' neutral position as a pure-play antivirus vendor and its successful partnership track record makes it a good partner candidate for best-of-breed and mainstream security vendors. Its key strengths are its desktop (and file server) products and its solely enterprise-focused customer service. Its challenges will be to gain greater brand awareness in the U.S. market, and to augment its desktop antivirus with personal firewall technology of its own or with a strong partnership. Niche Players F-Secure has a strong reputation for antivirus research, although consolidation in the antivirus market in the past five years has led to declining "mind share" and market share. F-Secure has branched out of antivirus with product offerings in encryption and network security. Most notably, F-Secure has developed strong offerings for wireless and handheld antivirus protection. However, there is minimal threat and, therefore, a minimal market for wireless antivirus protection, although F-Secure is strongly positioned with wireless manufacturers and service providers. F-Secure also has produced a passable personal firewall that can be bundled with its desktop antivirus product at a competitive price. It has supported other vendors' antivirus engines (including the Kasperksy Labs engine) in addition to its own for several years. Although Computer Associates (CA) is not a leader or a visionary in the enterprise antivirus market, changes to its pricing structure and CA's sales presence with chief information officers makes it an emerging contender, especially among SMBs. CA has made some basic improvements to its etrust antivirus product line, and it has relationships with Sybari (for antivirus on 23 July

7 Exchange and Notes) and Webwasher (for SMTP/URL content filtering). In March 2003, CA, recognizing that the leading vendors were increasing their products' prices, announced a pricing structure that made it appear cost-attractive. CA's modest perpetual license (and one-year maintenance) fee, which has an option to get the signatures for free (although maintenance is an aboveaverage 40 percent) has increased its visibility with enterprises. Vendors Not on the Magic Quadrant There are several vendors that have their own antivirus engines or, more typically, license and integrate an antivirus vendor engine into their products, that have not been placed on the Magic Quadrant. Because of the segmented buying centers for enterprise antivirus, as well as platform-specific requirements, many enterprises do not use an enterprise antivirus vendor for antivirus protection on internal servers or at the gateway. For example, Sybari has antivirus products for Lotus Notes and Exchange, and integrates in an antivirus engine from several vendors. content filtering or anti-spam vendors, such as ActiveState, Clearswift, CipherTrust, FrontBridge, MessageLabs, NetIQ/Marshall and Tumbleweed Communications, can integrate in or provide "hooks" to antivirus engines. More unusually, Fortinet has developed an antivirus engine to allow applicationspecific-integrated-circuit-based processing of SMTP and HTTP traffic within its appliance. Bottom Line: Enterprises should use a broader lens than they have traditionally used when evaluating antivirus and related products. They should examine how best-of-breed or platformspecific products may serve their requirements. Enterprises also should capitalize on recent competition tension in the enterprise antivirus market by demanding better functionality and services at lower prices during renewal and procurement negotiation. 23 July

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace

More information

CIO Update: Security Platforms Will Transform the Network Security Arena

CIO Update: Security Platforms Will Transform the Network Security Arena IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will

More information

CIO Update: Enterprise Firewall Magic Quadrant for 1H03

CIO Update: Enterprise Firewall Magic Quadrant for 1H03 IGG-07022003-02 R. Stiennon Article 2 July 2003 CIO Update: Enterprise Firewall Magic Quadrant for 1H03 Deep packet inspection technology is driving the firewall market to an inflection point that is characterized

More information

Select Q&A, QA A. Hallawell, M. Grey. Anti-spam Architecture Choices. Firewall. Appliance or Licensed Software. SMTP Relay

Select Q&A, QA A. Hallawell, M. Grey. Anti-spam Architecture Choices. Firewall. Appliance or Licensed Software. SMTP Relay Select Q&A, A. Hallawell, M. Grey Research Note 22 September 2003 How to Select Spam-Filtering Products and Services Choose a spam-filtering solution by evaluating anti-spam providers' management, research

More information

Predicts 2004: The Future of Windows Server

Predicts 2004: The Future of Windows Server Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially

More information

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Publication Date: 1 July 2003 Authors Fabrizio Biscotti Alain Dang Van Mien Norma Schroder Chris Pang This document

More information

Magic Quadrant Selection Criteria

Magic Quadrant Selection Criteria Markets, G. Johnson Research Note 30 May 2003 Magic Quadrant for Australian xdsl Providers, 2003 The Australian generic digital subscriber line market is rapidly consolidating. Network service providers

More information

Market Scope. Magic Quadrant Methodology

Market Scope. Magic Quadrant Methodology Markets, J. Enck, A. Powell Research Note 12 May 2003 Global IA High-Volume Server Magic Quadrant, 1H03 Gartner's Magic Quadrant for Intel Architecture in 1H03 indicates that Dell Computer, Hewlett-Packard

More information

With a national IP backbone, as well as more flexible contracts and broader discounts in place, SBC is worth considering.

With a national IP backbone, as well as more flexible contracts and broader discounts in place, SBC is worth considering. Vendor Ratings, Kathie Hackler Research Note 19 January 2004 Vendor Rating Update: SBC Communications With a national IP backbone, as well as more flexible contracts and broader discounts in place, SBC

More information

Database Design Tool Magic Quadrant 2H02

Database Design Tool Magic Quadrant 2H02 Markets, J. Duggan Research Note 27 August 2002 Database Design Tool Magic Quadrant 2H02 Despite rapid growth in Unified Modeling Language, objectoriented and business process modeling tools, database

More information

Can you wait until 2010?

Can you wait until 2010? Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

Finding Pure-Play Midtier ESPs: A Two-Step Process

Finding Pure-Play Midtier ESPs: A Two-Step Process Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors

More information

Should You Use Liberty or Passport for Digital Identities?

Should You Use Liberty or Passport for Digital Identities? Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft

More information

NetIQ's VoIP Management Products

NetIQ's VoIP Management Products Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.

More information

AIOs Displace Single-Function Printers in Latin America

AIOs Displace Single-Function Printers in Latin America ` Market Analysis AIOs Displace Single-Function Printers in Latin America Abstract: Stand-alone printer shipments have dropped sharply, while inkjet all-in-one printers continue to gain market share in

More information

Mobile Phones, Poor Economy to Dampen PDA Market to 2007

Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Forecast Analysis Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Abstract: A stagnant economy and growing competition from mobile phones have reduced our expectations for PDA market growth. Worldwide

More information

Worldwide Workstation Shipments Rebound in Third Quarter

Worldwide Workstation Shipments Rebound in Third Quarter Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase

More information

4Q03 Update: Wireless Communications Semiconductor Forecast,

4Q03 Update: Wireless Communications Semiconductor Forecast, Forecast Analysis 4Q03 Update: Wireless Communications Semiconductor Forecast, 2003-2005 Abstract: Mobile communications semiconductor revenue was strong in the third quarter. 2003 is on a path for 16

More information

China: User Perceptions and Plans for PCs and PDAs in 2003

China: User Perceptions and Plans for PCs and PDAs in 2003 End-User Analysis China: User Perceptions and Plans for PCs and PDAs in 2003 Abstract: The majority of the Chinese organizations' IT strategies and budget planning issues remain immature. It would not

More information

Unified Communications Magic Quadrant 1H03

Unified Communications Magic Quadrant 1H03 Markets, B. Elliot Research Note 3 February 2003 Unified Communications Magic Quadrant 1H03 Unified communications is emerging as an enabler for business process improvement. Vendor offerings remain fragmented,

More information

Huawei: China's Leading Equipment Vendor Returns to Growth

Huawei: China's Leading Equipment Vendor Returns to Growth Research Brief Huawei: China's Leading Equipment Vendor Returns to Growth Abstract: Huawei has turned in a strong performance during the first half of 2003. The second half of the year could be even better.

More information

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been

More information

Midsize Business Voice Service Spending Steady for 2003

Midsize Business Voice Service Spending Steady for 2003 End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in

More information

Software-Defined WAN Does Not Grow on WAN Alone

Software-Defined WAN Does Not Grow on WAN Alone MARKET FORECAST Software-Defined WAN Does Not Grow on WAN Alone OCT 2017 Jim Duffy, Senior Analyst, Networking Software-defined WAN is expected to undergo robust growth over the next few years, fueled

More information

Management Update: Storage Management TCO Considerations

Management Update: Storage Management TCO Considerations IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total

More information

CIO Update: Gartner s Storage Services Magic Quadrant

CIO Update: Gartner s Storage Services Magic Quadrant IGG-04302003-04 A. Couture, R. Passmore Article 30 April 2003 CIO Update: Gartner s Storage Services Magic Quadrant Gartner has developed its first North American Storage Services Magic Quadrant. Storage

More information

Web Services Take Root in Banks and With Asset Managers

Web Services Take Root in Banks and With Asset Managers Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations

More information

Symantec Endpoint Protection 11.0

Symantec Endpoint Protection 11.0 OVERVIEW Symantec Endpoint Protection replaces Symantec AntiVirus Corporate Edition, Symantec Client Security, Symantec Sygate Enterprise protection and Confidence Online for PCs. Symantec Endpoint Protection

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Research G00226207 29 August 2012 Securing BYOD With Network Access Control, a Case Study Lawrence Orans This Case Study highlights how an organization utilized NAC and mobile device management solutions

More information

Security Market,

Security Market, THE RADICATI GROUP, INC. A TECHNOLOGY MARKET RESEARCH FIRM Email Security Market, 2007-2011 http://www.radicati.com Cost US $3,000 by company P.O. or $2,500 by credit card A comprehensive analysis of the

More information

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket User Survey Analysis: Next Steps for Server Virtualization in the Midmarket Gartner RAS Core Research Note G00207375, James A. Browning, Alan Dayley, 21 October 2010, RV2A411012011 Approximately 30% of

More information

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published

More information

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the

More information

Growth Leadership, Unified Threat Management (UTM) Global, 2010

Growth Leadership, Unified Threat Management (UTM) Global, 2010 Growth Leadership, Unified Threat Management (UTM) Global, 2010 Frost & Sullivan s Global Research Platform Frost & Sullivan is entering its 49 th year in business with a global research organization of

More information

2018 Trends in Hosting & Cloud Managed Services

2018 Trends in Hosting & Cloud Managed Services PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior

More information

Enterprise Data Architecture: Why, What and How

Enterprise Data Architecture: Why, What and How Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented

More information

These patterns include: The use of proprietary software

These patterns include: The use of proprietary software Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal

More information

Symantec Endpoint Protection

Symantec Endpoint Protection Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec Insight and by SONAR, a single,

More information

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia Kaspersky Cloud Security for Hybrid Cloud Diego Magni Presales Manager Kaspersky Lab Italia EXPERTISE 1/3 of our employees are R&D specialists 323,000 new malicious files are detected by Kaspersky Lab

More information

Symantec Client Security. Integrated protection for network and remote clients.

Symantec Client Security. Integrated protection for network and remote clients. Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions

More information

DBMS Software Market Forecast, (Executive Summary) Executive Summary

DBMS Software Market Forecast, (Executive Summary) Executive Summary DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:

More information

Riverbed Acquisitions Broaden Customer Options for Acceleration and ADC

Riverbed Acquisitions Broaden Customer Options for Acceleration and ADC Research Publication Date: 29 September 2011 ID Number: G00219067 Riverbed Acquisitions Broaden Customer Options for Acceleration and ADC Joe Skorupa, Mark Fabbi This research discusses the impact of Riverbed's

More information

COM F. Troni, L. Fiering

COM F. Troni, L. Fiering F. Troni, L. Fiering Research Note 8 September 2003 Commentary Notebook TCO Comparison: Day Extenders vs. Traveling s Notebooks used by traveling workers, who are out of the office more often and work

More information

4Q02 Update: Disk Storage Forecast Scenarios,

4Q02 Update: Disk Storage Forecast Scenarios, Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than

More information

Vendor Ratings, VDR Kevin Strange, Andrew Butler, Gareth Herschel

Vendor Ratings, VDR Kevin Strange, Andrew Butler, Gareth Herschel Vendor Ratings, Kevin Strange, Andrew Butler, Gareth Herschel Research Note 27 January 2003 Vendor Rating: Focus on NCR s Teradata Division NCR s Teradata division is performing well, despite the tough

More information

Action Recommendation for 2004

Action Recommendation for 2004 Strategic Planning, P. Redman, T. Hart, W. Clark, J. Chapman, P. Dittner, R. Simpson, K. Foong, N. Ingelbrecht Research Note 20 November 2003 Changes in Store for Wireless WAN During 2004 The hottest growth

More information

How to Test Outbreak Commander

How to Test Outbreak Commander TREND MICRO CONTROL MANAGER TREND MICRO, INC. 10101 N. DE ANZA BLVD. CUPERTINO, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 WWW.TRENDMICRO.COM How to Test Outbreak Commander 2 TREND MICRO CORPORATE

More information

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the

More information

NGN: Enterprise IP Telephony

NGN: Enterprise IP Telephony NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations

More information

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace

More information

etrust Antivirus Release 7.1

etrust Antivirus Release 7.1 D A T A S H E E T etrust Antivirus Release 7.1 etrust Antivirus provides superior protection from the perimeter to the PDA against today s most prevalent security threat viruses. It eliminates virus infections,

More information

Magic Quadrant for Pan-European Web Hosting, 2H03

Magic Quadrant for Pan-European Web Hosting, 2H03 Markets, M. Halama Research Note 9 September 2003 Magic Quadrant for Pan-European Web Hosting, 2H03 New vendors have appeared, and others have sharpened their focus. All those in the Magic Quadrant will

More information

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling

More information

Sophos. Allan Widell Channel Account Executive. 24. August 2017

Sophos. Allan Widell Channel Account Executive. 24. August 2017 Sophos Allan Widell Channel Account Executive 24. August 2017 Our Differentiated Model Focus on mid-market enterprises: over 50% of IT security market Complete, advanced, and highly effective security

More information

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief 5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Trends in Fixed Public Network Services: Finland, (Executive Summary) Executive Summary

Trends in Fixed Public Network Services: Finland, (Executive Summary) Executive Summary Trends in Fixed Public Network Services: Finland, 2000-2006 (Executive Summary) Executive Summary Publication Date: October 17, 2002 Authors Susan Richardson Maureen Coulter Michal Halama Katja Ruud Lisa

More information

STRONG PROFITS AND NEW MARKET OPPORTUNITIES SAMU KONTTINEN Capital Market Day 16 Sept 2015

STRONG PROFITS AND NEW MARKET OPPORTUNITIES SAMU KONTTINEN Capital Market Day 16 Sept 2015 CONSUMER SECURITY STRONG PROFITS AND NEW MARKET OPPORTUNITIES SAMU KONTTINEN Capital Market Day 16 Sept 2015 1 AGENDA Consumer Security in brief Market overview and key trends Offering and channels Competition

More information

Magic Quadrant for SAN Fibre Channel Switches, 1H03

Magic Quadrant for SAN Fibre Channel Switches, 1H03 Markets, N. Allen, R. Passmore Research Note 1 May 2003 Magic Quadrant for SAN Fibre Channel Switches, 1H03 In the latest Storage Area Network Fibre Channel Switch Magic Quadrant, Brocade and McDATA still

More information

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Global Headquarters: 5 Speen Street Framingham, MA USA P F Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com C O M P E T I T I V E A N A L Y S I S I D C M a r k e t S c a p e : W o r l d w i d e D a t a c e

More information

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Publication Date: October 14, 2002 Authors To Chee Eng Evelyn Goh Kobita Desai This document has been published to the following

More information

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the

More information

COM I. Keene, B. Hafner

COM I. Keene, B. Hafner I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.

More information

Four Partial Solutions for Remote Network Access

Four Partial Solutions for Remote Network Access Decision Framework, E. Paulak Research Note 29 August 2003 Four Partial Solutions for Remote Network Access Four different solutions can help to meet your remoteaccess needs. Managed-service providers

More information

Management Update: Wireless LAN Predictions for 2004

Management Update: Wireless LAN Predictions for 2004 IGG-11192003-03 K. Dulaney, R. Ahlawat Article 19 November 2003 Management Update: Wireless LAN Predictions for 2004 Wireless LAN (WLAN) technology and use continue to evolve at a rapid pace. WLANs will

More information

Services solutions for Managed Service Providers (MSPs)

Services solutions for Managed Service Providers (MSPs) McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive

More information

How We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study.

How We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study. How We Delivered Compliance to a London-based Law Firm. A Network Security Project Case Study. Contents. Introduction... 3 Our initial findings... 5 The solution.... 6 Using Gateway Antivirus for multi-layer

More information

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet SYMANTEC ENTERPRISE SECURITY Symantec Internet Security Threat Report September 00 Power and Energy Industry Data Sheet An important note about these statistics The statistics discussed in this document

More information

Spam Filtering Works Better With a Management Policy

Spam Filtering Works Better With a Management Policy Select Q&A, M. Grey, A. Hallawell Research Note 22 September 2003 Spam Filtering Works Better With a Management Policy A deployment of spam-filtering technology that does not consider business issues will

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary

IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary Publication Date: September 9, 2002 Author Chee Eng To This document has been published to the following Cluster codes: TELC-WW-EX-0423

More information

U.S. Network Service Provider Magic Quadrant: 1H03

U.S. Network Service Provider Magic Quadrant: 1H03 Markets, J. Pultz Research Note 14 March 2003 U.S. Network Service Provider Magic Quadrant: 1H03 The turmoil in the U.S.-based network service provider marketplace is far from over. More providers will

More information

INTRODUCING SECURITYPLUS FOR MDAEMON

INTRODUCING SECURITYPLUS FOR MDAEMON INTRODUCING SECURITYPLUS FOR MDAEMON Alt-N Technologies is introducing SecurityPlus for MDaemon as a new product name for the next version of AntiVirus for MDaemon. Because SecurityPlus will include additional

More information

Production Surge Boosts Automotive Semiconductor Market

Production Surge Boosts Automotive Semiconductor Market Market Analysis Production Surge Boosts Automotive Semiconductor Market Abstract: Demand for automotive semiconductors revived in 2002, as car makers stepped up production. Consumer fears may stifle growth

More information

Semiconductor Market for Data Processing: Asia/Pacific, 3Q03

Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Research Brief Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Abstract: Semiconductor market conditions have improved since the second quarter of 2003, and the industry's recovery is continuing.

More information

KW Predicts: Who Will Own the Web-Conferencing Market?

KW Predicts: Who Will Own the Web-Conferencing Market? Strategic Planning, J. Lundy, L. Latham, R. Knox Research Note 21 November 2003 KW Predicts: Who Will Own the Web-Conferencing Market? In the knowledge workplace, voice over IP will revolutionize Web conferencing

More information

Mesh Networking Principles

Mesh Networking Principles Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,

More information

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need

More information

Network-Attached Storage Market Shows Weakness

Network-Attached Storage Market Shows Weakness Market Analysis Network-Attached Storage Market Shows Weakness Abstract: Despite Dell's strong growth in revenue, most other network-attached storage vendors experienced weaker performance in the first

More information

Spending on Service Provider Routers Begins to Grow in EMEA

Spending on Service Provider Routers Begins to Grow in EMEA Research Brief Spending on Service Provider Routers Begins to Grow in EMEA Abstract: 2Q03 brought the first rise in end-user spending on service provider routers in Europe, Middle East and Africa for a

More information

Ending the Confusion About Software- Defined Networking: A Taxonomy

Ending the Confusion About Software- Defined Networking: A Taxonomy Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server

More information

Computer Associates International etrust Antivirus

Computer Associates International etrust Antivirus Kristen Noakes-Fry Product Report 29 August 2003 Computer Associates International etrust Antivirus Summary etrust Antivirus from Computer Associates employs signature scanning and heuristics across several

More information

Security Made Simple by Sophos

Security Made Simple by Sophos Security Made Simple by Sophos Indian businesses in the radar of cyber-threats Frequency of cyber-attacks Most targeted systems / IT assets -- KPMG Cybercrime Survey Report 2015 3 ON AN AVERAGE, HOW MUCH

More information

New Content and Cloud Security Suites

New Content and Cloud Security Suites New Content and Cloud Security Suites Customer Business Problems & Pain Points Too many point products to manage for and email security. Need to lower costs, save time so considering SaaS for security

More information

Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary

Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Publication Date: December 4, 2002 Authors Alayne Wong To Chee Eng Evelyn Goh Kenshi Tazaki Andrew

More information

Computer Associates etrust Antivirus v 7.1

Computer Associates etrust Antivirus v 7.1 Product Advisor Charlotte Dunlap Analyst, Information Security Andrew Braunberg Senior Analyst, Information Security Contents Product Assessment Summary Current Perspective Product Strengths & Weaknesses

More information

Hype Cycle for Data Warehousing, 2003

Hype Cycle for Data Warehousing, 2003 K. Strange, T. Friedman Strategic Analysis Report 30 May 2003 Hype Cycle for Data Warehousing, 2003 Data warehousing concepts and approaches have become fairly mature during a decade of refinement. However,

More information

Mobile Terminals: Western Europe, (Executive Summary) Executive Summary

Mobile Terminals: Western Europe, (Executive Summary) Executive Summary Mobile Terminals: Western Europe, 1998-2007 (Executive Summary) Executive Summary Publication Date: 6 June 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace

More information

Management Update: Gartner s New Magic Quadrant for U.S. Network Service Providers

Management Update: Gartner s New Magic Quadrant for U.S. Network Service Providers IGG-03262003-03 J. Pultz Article 26 March 2003 Management Update: Gartner s New Magic Quadrant for U.S. Network Service Providers Most enterprises are concerned about which network service providers (NSPs)

More information

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2

More information

Host-Bus RAID Controller Worldwide Market Share, 2002 (Executive Summary) Executive Summary

Host-Bus RAID Controller Worldwide Market Share, 2002 (Executive Summary) Executive Summary Host-Bus RAID Controller Worldwide Market Share, 2002 (Executive Summary) Executive Summary Publication Date: 23 July 2003 Author Roger W. Cox This document has been published to the following Marketplace

More information

Hong Kong EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST DEC Dan Thompson, Senior Analyst, Multi-tenant Datacenters

Hong Kong EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST DEC Dan Thompson, Senior Analyst, Multi-tenant Datacenters MARKET FORECAST DEC 2016 Hong Kong Multi-Tenant Datacenter Market Dan Thompson, Senior Analyst, Multi-tenant Datacenters This report provides an overview of the competitive dynamics in the Hong Kong market,

More information

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing

More information

Integration With the Business Modeler

Integration With the Business Modeler Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design

More information

Constant Contact. Responsyssy. VerticalResponse. Bronto. Monitor. Satisfaction

Constant Contact. Responsyssy. VerticalResponse. Bronto. Monitor. Satisfaction Contenders Leaders Marketing Cloud sy Scale Campaign aign Monitor Niche High Performers Satisfaction Email Marketing Products Products shown on the Grid for Email Marketing have received a minimum of 10

More information

Venusense UTM Introduction

Venusense UTM Introduction Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,

More information

Midsize Businesses Slowly Warm Up to Storage Services

Midsize Businesses Slowly Warm Up to Storage Services Research Brief Midsize Businesses Slowly Warm Up to Storage Services Abstract: A recent study reveals only lukewarm demand for new storage services among midsize businesses. Assessment tools and peer references

More information

Commercial Product Matrix

Commercial Product Matrix PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer

More information