SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
695 Campbel l Technology Parkway • Suite 200 • Campbel l • Cali fornia • 95008 • t 408.583.0011 • f 408.583.0031 
www. infonetics.com • Silicon Val ley, CA • Boston, MA • London, UK 
Network and Content Security 
Vendor Scorecard 
Report Excerpts 
September 2014 
INFONETICS RESEARCH REPORT EXCERPTS
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Table of Contents 
TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES 1 
PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED 2 
SCORECARD RESULTS 3 
Top 3 Vendors by Criterion 5 
VENDOR PROFILES 5 
#1 Cisco 5 
Markets and Technology Segments 6 
Score Analysis 6 
Strengths and Weaknesses 7 
Bottom Line 7 
BOTTOM LINE 7 
METHODOLOGY 8 
REPORT AUTHOR 10 
ABOUT INFONETICS RESEARCH 10 
REPORT REPRINTS AND CUSTOM RESEARCH 10 
List of Exhibits 
Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 1 
Exhibit 2 Network and Content Security Vendor Scorecard Summary 3 
Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 4 
Exhibit 4 Top 3 Network and Content Security Vendors by Criterion 5 
Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 6
1 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES 
This service profiles, analyzes, and ranks the 8 largest global vendors of network and content security solutions. We chose the 8 vendors who had product offerings in network and content security and 2013 revenue of $240M or more. 
To eliminate subjective scoring and accurately and fairly evaluate vendors, we established 8 criteria using actual data and metrics, including market share data, publicly available financial data, and buyer feedback. Criteria include market share, market share momentum, financials, solution breadth, and 4 key metrics from our survey research on security (security, technology innovation, product reliability, and service and support). 
McAfee is second on the strength of a good market share position, solid financials (thanks Intel!), a broad product portfolio, and excellent scores in the end-user metrics from our survey data (aided by strong brand awareness since McAfee is a household name for consumers and business buyers). 
Check Point is in third, with great performance in market share and financials, though they have room to improve when it comes to end-user perception; they score below average in all 4 survey-based categories. 
Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 
012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALL
2 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED 
Network and content security products are the first line of defense for many organizations looking to protect networks, users, applications, and data, and a group of security vendors focusing on delivering network and content security products have emerged over the last 20 years and become critical technology suppliers to enterprises and service providers worldwide. This scorecard profiles, analyzes, and ranks the 8 leading vendors of network and content security products. The key product categories covered in this report are: 
Network security: 
● Integrated security appliances and software 
● SSL VPN 
● IDS/IPS 
● DDoS 
Content security: 
● Web security 
● Mail security 
Please see “Methodology” (excerpted methodology is at the end of this document; the full version, including detailed descriptions of the categories and scoring process, is available from Infonetics Research).
3 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
SCORECARD RESULTS 
The table below summarizes the 8 vendors’ scores and revenue. We’ll discuss the individual vendors in more detail in the profile sections of the report. 
Exhibit 2 Network and Content Security Vendor Scorecard Summary 
Rank 
Vendor 
Score 
2013 Revenue 
Score Analysis 
1 
Cisco 
4.5 
$2,457M 
Scored above 4 in every category with perfect scores of 5 in financial and market share 
2 
McAfee 
3.8 
$798M 
A broad product portfolio and strong financials due to Intel ownership bolster McAfee’s score 
3 
Check Point 
3.5 
$918M 
Solid scores in solution breadth, financials, market share, and momentum keep Check Point in the top 3 
4 
Fortinet 
3.4 
$444M 
Fortinet has strong share momentum and a broad offering 
5 
Juniper 
3.2 
$565M 
Strong share and solution breadth are offset by weak share momentum 
6 
Palo Alto Networks 
3.0 
$341M 
Highest share momentum of the group, held back temporarily by financial score due to patent lawsuit Juniper settlement 
7 
Blue Coat 
2.9 
$401M 
Good share momentum and solution breadth due to acquisitions over the last 18 months but held back by financial and survey category scores 
8 
Dell SonicWALL 
2.7 
$245M 
Middle-of-the road scores overall, but solid share momentum (over 3)
4 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
The next chart details the individual criteria scores making up the total score. 
Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 
012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALLMarket shareMarket share momentumFinancialsSolution breadthSecurity*Technology innovation* Product reliability*Service and support* *Score is based on survey research
5 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Top 3 Vendors by Criterion 
Another way to analyze leadership is to look at the top rankings in each of the 8 scoring criteria (see table below). Not surprisingly, Cisco shows up the most in the top 3 table (showing up among the top 3 in all criteria, and #1 in 6 of 8 criteria). What really stands out beyond that is Palo Alto’s first place finish in market share momentum (which should surprise nobody, considering how much the company has been outgrowing the competition in their primary space, the integrated appliance market). Also notable is that McAfee does quite well in all of our survey- based criteria; they’ve generated significant goodwill (and brand awareness) as a leading provider of anti-virus technology and volumes of threat research, and this has significant potential value. 
Exhibit 4 Top 3 Network and Content Security Vendors by Criterion 
VENDOR PROFILES 
#1 Cisco 
Cisco is one of the best-known telecom and datacom equipment manufacturers globally, targeting service providers, enterprises of all sizes, and consumers. Cisco’s fiscal year 2013 revenue was US$48.6B. 
Cisco built their security portfolio through internal development and acquisition over the last 16 years, and they’ve been busy in the last 18 months. In 2013 they acquired 2 security firms: Cognitive Security for an unknown amount and Sourcefire for approximately US$2.7B. Also, in 2014 they acquired ThreatGrid for an undisclosed amount to enhance their Advanced Malware Protection (AMP) portfolio, a solution they obtained as a result of their Sourcefire acquisition.
6 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Markets and Technology Segments 
Cisco has a vast security product portfolio that spans firewall, intrusion prevention, remote access, unified clients, network admission control (a suite of access control and authentication solutions), web and mail security, advanced threat protection solutions, and data center and virtualized security solutions. 
They have products in every segment we track in this service outside of standalone DDoS mitigation (they EOL’d their Guard DDoS mitigation product in 2008). They have multiple integrated appliance offerings (traditional Cisco ASA firewalls and Sourcefire’s NGFW products), multiple standalone IPS solutions (again a mix of existing Cisco products and new Sourcefire products), standalone SSL VPN gateways, and web and mail security gateways (courtesy of their IronPort acquisition). 
Score Analysis 
Cisco has the highest score overall and above-average scores in every single category. They have strong fundamentals (market share, share momentum, and financials), a very broad product portfolio (they have significant share in nearly every segment we track in this report), and they receive excellent buyer feedback in our surveys. They’re an example of a large network infrastructure company who has decided to put their significant resources behind building a serious security business, and over the last 16 years have built themselves into the market leader. 
Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 
012345MarketshareMarket sharemomentumFinancialsSolutionbreadthTechnologyinnovationSecurityProductreliabilityService andsupportWeightedtotalCisco2013 average score
7 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Strengths and Weaknesses 
As discussed, Cisco’s overall size, significant share in most of the markets we track in this report, excellent brand strength (not just in security, but in nearly all areas of their business, including networking and communications) and comprehensive product portfolio help them stay ahead of the pack. They have also been involved in developing security solutions for data centers and other virtualized environments for several years, and as the market for security solutions starts to move toward virtualized solutions, they’re positioned to take advantage of the transition. 
In addition to the products, they have a strong threat research and intelligence capability, and buyer perception of security vendors moving forward will be significantly influenced by how deeply involved in conducting threat research and publishing meaningful threat reports, which Cisco is placing serious resources behind. We expect this investment will pay off in the future, helping keep the survey-based scores in this report high. 
They do have some key issues to confront over the next several years; multiple acquisitions have left them with a mountain of technology and products to rationalize. They need to carefully streamline their product offering so they put their best foot forward (with the right product) in each product segment. This means resolving overlaps between existing Cisco products and the Sourcefire products they acquired and finding ways to integrate the new advanced threat protection platforms they’ve acquired recently into their overall product portfolio. Complex product portfolios are challenging for customers and resellers and can cause decision-making delays and create openings for the competition. 
Bottom Line 
Cisco is the clear leader in the network and content security space, and we don’t expect this to change in the next year, but the lead isn’t necessarily insurmountable. Unfortunately for the competition, it will take some ingredients that are hard to acquire to pass Cisco; namely the brand strength and strong financials that come with being one of the largest networking and telecom equipment suppliers in the world—a supplier that also happens to be interested in building market-leading security solutions. 
BOTTOM LINE 
The network and content security space is complex; there are many vendors and countless market forces all pushing and pulling on those vendors. Though Cisco has stiff competition in a variety of the criteria we cover in this report, they have a strong lead in market share (their revenue is more than 2.5x their next closest competitor’s) that should keep them on top for the next year. They might not be toppled, but there are more than a few vendors (namely Palo Alto, Fortinet, and Check Point) eating into their growth potential, and some wildcard vendors have built disruptive product portfolios that could lead to explosive growth in revenue and increases in their scores in future versions of this report.
8 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
METHODOLOGY 
This scorecard includes Blue Coat, Check Point, Cisco, Dell SonicWALL, Fortinet, Juniper, McAfee, and Palo Alto Networks; these are the top 8 network and content security vendors, each with $240M or more in 2013 network and content security product revenue and significant product offerings in network (integrated security appliances, IDS/IPS, SSL VPN, DDoS) and content (web and mail) security. 
We evaluate the top 8 vendors in 8 criteria using actual data and metrics. For each criterion, we scored vendors on a 5-point scale, with 1 being the lowest possible score, 3 being an average score, and 5 being a perfect score. Specifically, we evaluated vendors on the following: 
● Market share and market share momentum: a measure of how successfully a company has penetrated its target markets; having significant market share creates awareness with buyers, improves scale, and reassures buyers that companies are here to stay for the long term; some RFPs require vendors to meet certain market share thresholds to ensure vendor viability; successful vendors will have above-average market share that is increasing year over year 
● Market share: vendors’ percentage share of network and content security product revenue 
● Market share momentum: changes in revenue market share over time 
● Financials: an analysis of a vendor’s financials; a strong financial position improves long-term viability and allows a company to stay ahead of the competition by investing in R&D and/or acquiring other companies/technologies; we base the score on the Altman Z-score non-manufacturing model 
● Solution breadth: a measure of how many network and content security product segments a vendor addresses; a broader solution set improves a vendor's potential and efficiency of its operations and allows it to differentiate by innovating across segments; we calculated scores based on whether a vendor participates in a given sub-segment of the market, and its relative revenue contribution to the overall market 
● Buyer feedback on security, technology innovation, product reliability, and service/support: assessments of a vendor’s performance by buyers, based on interviews we conduct with hundreds of end-users every year 
Based on the scores for each of the 8 criteria, we created a single composite vendor score, using the same 5- point scale, and weighted the individual criterion based on its importance in the buying process.
9 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
The information in this report is based on findings from multiple Infonetics Research services, including: 
● Market share, size, and forecasts 
● Network Security Appliances and Software Quarterly Worldwide and Regional Market Share, Size, and Forecasts 
● Content Security Gateway Appliances, Software, and SaaS Quarterly Worldwide and Regional Market Share, Size, and Forecasts 
● DDoS Prevention Appliances Quarterly Worldwide and Regional Market Share, Size, and Forecasts 
● Survey-based research 
● Next Generation Threat Prevention Strategies and Vendor Leadership: North American Enterprise Survey 
● Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey
10 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
REPORT AUTHOR 
Jeff Wilson 
Principal Analyst, Security 
Infonetics Research 
+1 408.583.3337 | jeff@infonetics.com 
Twitter: @securityjeff 
ABOUT INFONETICS RESEARCH 
Infonetics Research is an international market research and consulting analyst firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete more effectively. 
REPORT REPRINTS AND CUSTOM RESEARCH 
To learn about distributing excerpts from Infonetics reports or custom research, please contact: 
North America (West) and Asia Pacific 
Larry Howard, Vice President, larry@infonetics.com, +1 408.583.3335 
North America (East, Midwest, Texas), Latin America and EMEA 
Scott Coyne, Senior Account Director, scott@infonetics.com, +1 408.583.3395 
Greater China and Southeast Asia 大中华区及东南亚地区 
Jeffrey Song, Market Analyst 市场分析师及客户经理jeffrey@infonetics.com, +86 21.3919.8505

Weitere ähnliche Inhalte

Was ist angesagt?

Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Ulf Mattsson
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
Bryan Len
 

Was ist angesagt? (20)

Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
NIST releases SP 800-160  Multi-discplinary approach to cybersecurityNIST releases SP 800-160  Multi-discplinary approach to cybersecurity
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
 
From Code to Customer: How to Make Software Products Secure
From Code to Customer: How to Make Software Products SecureFrom Code to Customer: How to Make Software Products Secure
From Code to Customer: How to Make Software Products Secure
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
 

Andere mochten auch

Kasus neurobehaviour ke
Kasus neurobehaviour keKasus neurobehaviour ke
Kasus neurobehaviour ke
Arya Ningrat
 
Kisah katak kecil
Kisah katak kecilKisah katak kecil
Kisah katak kecil
hamdEy
 

Andere mochten auch (20)

Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Enterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveEnterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's Perspective
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
Kasus neurobehaviour ke
Kasus neurobehaviour keKasus neurobehaviour ke
Kasus neurobehaviour ke
 
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
 
Taylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipTaylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zip
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
 
Counterstories” The Real Knowledge About Going to College
Counterstories”The Real Knowledge About Going to CollegeCounterstories”The Real Knowledge About Going to College
Counterstories” The Real Knowledge About Going to College
 
Interni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàInterni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolarità
 
Kisah katak kecil
Kisah katak kecilKisah katak kecil
Kisah katak kecil
 
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
 
Fathers day
Fathers dayFathers day
Fathers day
 
Presentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San PedroPresentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San Pedro
 
Rpp bio vii smt 2
Rpp bio vii smt 2Rpp bio vii smt 2
Rpp bio vii smt 2
 
Jawaban 1
Jawaban  1Jawaban  1
Jawaban 1
 
Bab ii
Bab iiBab ii
Bab ii
 
Intannnnn5555
Intannnnn5555Intannnnn5555
Intannnnn5555
 

Ähnlich wie Infonetics Network and Content Security Vendor Scorecard

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
Skywork Solutions INC.
Skywork Solutions INC.Skywork Solutions INC.
Skywork Solutions INC.
Levi Saada
 
Sample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial Services
ResearchFox
 
Value Plus April014
Value Plus April014 Value Plus April014
Value Plus April014
aditya0312
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APAC
ResearchFox
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - Manufacturing
ResearchFox
 
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform JourneyCisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
Lluis Altes
 

Ähnlich wie Infonetics Network and Content Security Vendor Scorecard (20)

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Skywork Solutions INC.
Skywork Solutions INC.Skywork Solutions INC.
Skywork Solutions INC.
 
Frost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products Market
 
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
 
fso-landscape
fso-landscape fso-landscape
fso-landscape
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-Secure
 
Sample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial Services
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Value Plus April014
Value Plus April014 Value Plus April014
Value Plus April014
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APAC
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - Manufacturing
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
 
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform JourneyCisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
G02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewallG02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewall
 

Mehr von Cisco Security

Mehr von Cisco Security (19)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
 
William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson University
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Infonetics Network and Content Security Vendor Scorecard

  • 1. 695 Campbel l Technology Parkway • Suite 200 • Campbel l • Cali fornia • 95008 • t 408.583.0011 • f 408.583.0031 www. infonetics.com • Silicon Val ley, CA • Boston, MA • London, UK Network and Content Security Vendor Scorecard Report Excerpts September 2014 INFONETICS RESEARCH REPORT EXCERPTS
  • 2. Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Table of Contents TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES 1 PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED 2 SCORECARD RESULTS 3 Top 3 Vendors by Criterion 5 VENDOR PROFILES 5 #1 Cisco 5 Markets and Technology Segments 6 Score Analysis 6 Strengths and Weaknesses 7 Bottom Line 7 BOTTOM LINE 7 METHODOLOGY 8 REPORT AUTHOR 10 ABOUT INFONETICS RESEARCH 10 REPORT REPRINTS AND CUSTOM RESEARCH 10 List of Exhibits Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 1 Exhibit 2 Network and Content Security Vendor Scorecard Summary 3 Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 4 Exhibit 4 Top 3 Network and Content Security Vendors by Criterion 5 Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 6
  • 3. 1 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES This service profiles, analyzes, and ranks the 8 largest global vendors of network and content security solutions. We chose the 8 vendors who had product offerings in network and content security and 2013 revenue of $240M or more. To eliminate subjective scoring and accurately and fairly evaluate vendors, we established 8 criteria using actual data and metrics, including market share data, publicly available financial data, and buyer feedback. Criteria include market share, market share momentum, financials, solution breadth, and 4 key metrics from our survey research on security (security, technology innovation, product reliability, and service and support). McAfee is second on the strength of a good market share position, solid financials (thanks Intel!), a broad product portfolio, and excellent scores in the end-user metrics from our survey data (aided by strong brand awareness since McAfee is a household name for consumers and business buyers). Check Point is in third, with great performance in market share and financials, though they have room to improve when it comes to end-user perception; they score below average in all 4 survey-based categories. Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALL
  • 4. 2 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED Network and content security products are the first line of defense for many organizations looking to protect networks, users, applications, and data, and a group of security vendors focusing on delivering network and content security products have emerged over the last 20 years and become critical technology suppliers to enterprises and service providers worldwide. This scorecard profiles, analyzes, and ranks the 8 leading vendors of network and content security products. The key product categories covered in this report are: Network security: ● Integrated security appliances and software ● SSL VPN ● IDS/IPS ● DDoS Content security: ● Web security ● Mail security Please see “Methodology” (excerpted methodology is at the end of this document; the full version, including detailed descriptions of the categories and scoring process, is available from Infonetics Research).
  • 5. 3 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. SCORECARD RESULTS The table below summarizes the 8 vendors’ scores and revenue. We’ll discuss the individual vendors in more detail in the profile sections of the report. Exhibit 2 Network and Content Security Vendor Scorecard Summary Rank Vendor Score 2013 Revenue Score Analysis 1 Cisco 4.5 $2,457M Scored above 4 in every category with perfect scores of 5 in financial and market share 2 McAfee 3.8 $798M A broad product portfolio and strong financials due to Intel ownership bolster McAfee’s score 3 Check Point 3.5 $918M Solid scores in solution breadth, financials, market share, and momentum keep Check Point in the top 3 4 Fortinet 3.4 $444M Fortinet has strong share momentum and a broad offering 5 Juniper 3.2 $565M Strong share and solution breadth are offset by weak share momentum 6 Palo Alto Networks 3.0 $341M Highest share momentum of the group, held back temporarily by financial score due to patent lawsuit Juniper settlement 7 Blue Coat 2.9 $401M Good share momentum and solution breadth due to acquisitions over the last 18 months but held back by financial and survey category scores 8 Dell SonicWALL 2.7 $245M Middle-of-the road scores overall, but solid share momentum (over 3)
  • 6. 4 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. The next chart details the individual criteria scores making up the total score. Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALLMarket shareMarket share momentumFinancialsSolution breadthSecurity*Technology innovation* Product reliability*Service and support* *Score is based on survey research
  • 7. 5 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Top 3 Vendors by Criterion Another way to analyze leadership is to look at the top rankings in each of the 8 scoring criteria (see table below). Not surprisingly, Cisco shows up the most in the top 3 table (showing up among the top 3 in all criteria, and #1 in 6 of 8 criteria). What really stands out beyond that is Palo Alto’s first place finish in market share momentum (which should surprise nobody, considering how much the company has been outgrowing the competition in their primary space, the integrated appliance market). Also notable is that McAfee does quite well in all of our survey- based criteria; they’ve generated significant goodwill (and brand awareness) as a leading provider of anti-virus technology and volumes of threat research, and this has significant potential value. Exhibit 4 Top 3 Network and Content Security Vendors by Criterion VENDOR PROFILES #1 Cisco Cisco is one of the best-known telecom and datacom equipment manufacturers globally, targeting service providers, enterprises of all sizes, and consumers. Cisco’s fiscal year 2013 revenue was US$48.6B. Cisco built their security portfolio through internal development and acquisition over the last 16 years, and they’ve been busy in the last 18 months. In 2013 they acquired 2 security firms: Cognitive Security for an unknown amount and Sourcefire for approximately US$2.7B. Also, in 2014 they acquired ThreatGrid for an undisclosed amount to enhance their Advanced Malware Protection (AMP) portfolio, a solution they obtained as a result of their Sourcefire acquisition.
  • 8. 6 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Markets and Technology Segments Cisco has a vast security product portfolio that spans firewall, intrusion prevention, remote access, unified clients, network admission control (a suite of access control and authentication solutions), web and mail security, advanced threat protection solutions, and data center and virtualized security solutions. They have products in every segment we track in this service outside of standalone DDoS mitigation (they EOL’d their Guard DDoS mitigation product in 2008). They have multiple integrated appliance offerings (traditional Cisco ASA firewalls and Sourcefire’s NGFW products), multiple standalone IPS solutions (again a mix of existing Cisco products and new Sourcefire products), standalone SSL VPN gateways, and web and mail security gateways (courtesy of their IronPort acquisition). Score Analysis Cisco has the highest score overall and above-average scores in every single category. They have strong fundamentals (market share, share momentum, and financials), a very broad product portfolio (they have significant share in nearly every segment we track in this report), and they receive excellent buyer feedback in our surveys. They’re an example of a large network infrastructure company who has decided to put their significant resources behind building a serious security business, and over the last 16 years have built themselves into the market leader. Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 012345MarketshareMarket sharemomentumFinancialsSolutionbreadthTechnologyinnovationSecurityProductreliabilityService andsupportWeightedtotalCisco2013 average score
  • 9. 7 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Strengths and Weaknesses As discussed, Cisco’s overall size, significant share in most of the markets we track in this report, excellent brand strength (not just in security, but in nearly all areas of their business, including networking and communications) and comprehensive product portfolio help them stay ahead of the pack. They have also been involved in developing security solutions for data centers and other virtualized environments for several years, and as the market for security solutions starts to move toward virtualized solutions, they’re positioned to take advantage of the transition. In addition to the products, they have a strong threat research and intelligence capability, and buyer perception of security vendors moving forward will be significantly influenced by how deeply involved in conducting threat research and publishing meaningful threat reports, which Cisco is placing serious resources behind. We expect this investment will pay off in the future, helping keep the survey-based scores in this report high. They do have some key issues to confront over the next several years; multiple acquisitions have left them with a mountain of technology and products to rationalize. They need to carefully streamline their product offering so they put their best foot forward (with the right product) in each product segment. This means resolving overlaps between existing Cisco products and the Sourcefire products they acquired and finding ways to integrate the new advanced threat protection platforms they’ve acquired recently into their overall product portfolio. Complex product portfolios are challenging for customers and resellers and can cause decision-making delays and create openings for the competition. Bottom Line Cisco is the clear leader in the network and content security space, and we don’t expect this to change in the next year, but the lead isn’t necessarily insurmountable. Unfortunately for the competition, it will take some ingredients that are hard to acquire to pass Cisco; namely the brand strength and strong financials that come with being one of the largest networking and telecom equipment suppliers in the world—a supplier that also happens to be interested in building market-leading security solutions. BOTTOM LINE The network and content security space is complex; there are many vendors and countless market forces all pushing and pulling on those vendors. Though Cisco has stiff competition in a variety of the criteria we cover in this report, they have a strong lead in market share (their revenue is more than 2.5x their next closest competitor’s) that should keep them on top for the next year. They might not be toppled, but there are more than a few vendors (namely Palo Alto, Fortinet, and Check Point) eating into their growth potential, and some wildcard vendors have built disruptive product portfolios that could lead to explosive growth in revenue and increases in their scores in future versions of this report.
  • 10. 8 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. METHODOLOGY This scorecard includes Blue Coat, Check Point, Cisco, Dell SonicWALL, Fortinet, Juniper, McAfee, and Palo Alto Networks; these are the top 8 network and content security vendors, each with $240M or more in 2013 network and content security product revenue and significant product offerings in network (integrated security appliances, IDS/IPS, SSL VPN, DDoS) and content (web and mail) security. We evaluate the top 8 vendors in 8 criteria using actual data and metrics. For each criterion, we scored vendors on a 5-point scale, with 1 being the lowest possible score, 3 being an average score, and 5 being a perfect score. Specifically, we evaluated vendors on the following: ● Market share and market share momentum: a measure of how successfully a company has penetrated its target markets; having significant market share creates awareness with buyers, improves scale, and reassures buyers that companies are here to stay for the long term; some RFPs require vendors to meet certain market share thresholds to ensure vendor viability; successful vendors will have above-average market share that is increasing year over year ● Market share: vendors’ percentage share of network and content security product revenue ● Market share momentum: changes in revenue market share over time ● Financials: an analysis of a vendor’s financials; a strong financial position improves long-term viability and allows a company to stay ahead of the competition by investing in R&D and/or acquiring other companies/technologies; we base the score on the Altman Z-score non-manufacturing model ● Solution breadth: a measure of how many network and content security product segments a vendor addresses; a broader solution set improves a vendor's potential and efficiency of its operations and allows it to differentiate by innovating across segments; we calculated scores based on whether a vendor participates in a given sub-segment of the market, and its relative revenue contribution to the overall market ● Buyer feedback on security, technology innovation, product reliability, and service/support: assessments of a vendor’s performance by buyers, based on interviews we conduct with hundreds of end-users every year Based on the scores for each of the 8 criteria, we created a single composite vendor score, using the same 5- point scale, and weighted the individual criterion based on its importance in the buying process.
  • 11. 9 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. The information in this report is based on findings from multiple Infonetics Research services, including: ● Market share, size, and forecasts ● Network Security Appliances and Software Quarterly Worldwide and Regional Market Share, Size, and Forecasts ● Content Security Gateway Appliances, Software, and SaaS Quarterly Worldwide and Regional Market Share, Size, and Forecasts ● DDoS Prevention Appliances Quarterly Worldwide and Regional Market Share, Size, and Forecasts ● Survey-based research ● Next Generation Threat Prevention Strategies and Vendor Leadership: North American Enterprise Survey ● Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey
  • 12. 10 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. REPORT AUTHOR Jeff Wilson Principal Analyst, Security Infonetics Research +1 408.583.3337 | jeff@infonetics.com Twitter: @securityjeff ABOUT INFONETICS RESEARCH Infonetics Research is an international market research and consulting analyst firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete more effectively. REPORT REPRINTS AND CUSTOM RESEARCH To learn about distributing excerpts from Infonetics reports or custom research, please contact: North America (West) and Asia Pacific Larry Howard, Vice President, larry@infonetics.com, +1 408.583.3335 North America (East, Midwest, Texas), Latin America and EMEA Scott Coyne, Senior Account Director, scott@infonetics.com, +1 408.583.3395 Greater China and Southeast Asia 大中华区及东南亚地区 Jeffrey Song, Market Analyst 市场分析师及客户经理jeffrey@infonetics.com, +86 21.3919.8505