SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Overview:
 What is Gartner Magic Quadrant?
 How do I use a Gartner Magic Quadrant?
 How does a Gartner Magic Quadrant Work?
 How can a Gartner Magic Quadrant help me?
 What are the new Gartner Magic Quadrant Enhancements?
 What is a Gartner Magic Quadrant for Secure Web Gateways?
 A brief on the first three leaders of the latest Gartner report magic Quadrant
2014 in the web security field?
 What are the first three leaders of a Gartner Magic Quadrant 2014 report
Strengths & Cautions?
By: Tarek Nader
What is Gartner Magic Quadrant?
• The Gartner Magic Quadrant (MQ) is the brand name for a series of market research reports published by Gartner Inc. a US-
based research and advisory firm.
• A Gartner Magic Quadrant is a culmination of research in a specific market, giving you a wide-angle view of the relative
positions of the market's competitors.
• According to Gartner, the Magic Quadrant aims to provide a qualitative analysis into a market and its direction, maturity and
participants.
• By applying a graphical treatment and a uniform set of evaluation criteria, a Magic Quadrant helps you quickly ascertain how
well technology providers are executing their stated visions and how well they are performing against Gartner's market view.
• Their analyses are conducted for several specific technology industries and are updated
every 1–2 years.
How do I use a Gartner Magic Quadrant?
 Use a Gartner Magic Quadrant as a first step to understanding the technology providers you might consider for a specific
investment opportunity.
• Keep in mind that focusing on the leaders' quadrant isn't always the best course of action.
• There are good reasons to consider market challengers. And a niche player may support your needs better than a market
leader.
• It all depends on how the provider aligns with your business goals.
How does a Gartner Magic Quadrant Work?
 Gartner rates vendors upon two criteria: completeness of vision and ability to execute. Using a methodology which Gartner
does not disclose, these component scores lead to a vendor position in one of four quadrants:
 Leaders are said to score higher on both criteria: the ability to execute and completeness of vision. These are said to be
typically larger, mature businesses.
 Challengers are said to score higher on the ability to execute and lower on the completeness of vision. Typically larger, settled
businesses with what Gartner claims to be minimal future plans for that industry.
 Visionaries are said to score lower on the ability to execute and higher on the completeness of vision. Typically smaller
companies.
 Niche players are said to score lower on both criteria: the ability to execute and
completeness of vision. Typically new additions to the Magic Quadrant.
Magic Quadrants help you:
 Get quickly educated about a market's competing technology providers and their ability to deliver on what end users require
today and in the future
 Understand how a market's technology providers are competitively positioned and the strategies they are using to compete for
end-user business
 Compare a technology provider's strengths and challenges with your specific needs
The new Gartner Magic Quadrant Enhancements:
Additional Perspectives
1. New contextual perspectives for key markets that provide critical insight by industry, company size or geography.
2. Connection to a new, interactive Critical Capabilities tool, with features that enable deeper understanding of products and
services and vendors in a market.
3. Customization of both the Magic Quadrant and the Critical Capabilities allowing for a personalized view of the market and
usage scenarios providing deeper insight aligned to your needs.
 It's the same trusted Gartner methodology you've come to rely on, with the flexibility to tailor the analysis to your unique
business needs.
 This enhancement provides analyst commentary on the market and notable vendors from key client contexts.
 Insight into markets and vendors, year-over-year views and ability to customize aligned to your unique needs.
I. Gain Deeper Insight for Your Unique Needs
 Provides market direction, technology selection, and vendors to consider from an industry, region or company-size perspective.
II. Additional Perspectives
III. Gartner Critical Capabilities
 The insights of the interactive Magic Quadrant, when combined with a companion interactive Critical Capabilities, enable
deeper analysis into product or service functionality.
IV. Magic Quadrant home page on My Gartner
 Search and browse Gartner Magic Quadrants or Critical Capabilities by vendor, topic or industry.
Magic Quadrant for Secure Web Gateways
 By: Analyst(s): Lawrence Orans, Peter Firstbrook
 The SWG market is evolving rapidly as vendors respond to the mobility trend and the evolving threat landscape. SWG vendors are highly
differentiated in their ability to deliver cloud-based services, and to protect users with advanced threat defense features.
Market Definition/Description:
 Secure Web gateways (SWGs) utilize URL filtering, advanced threat defense, legacy malware protection and application
control technologies to defend users from Internet-borne threats, and to help enterprises enforce Internet policy compliance.
 SWGs are delivered as on-premises appliances (hardware and virtual) or cloud-based services.
 Vendors differ greatly in the maturity and features of their cloud-based services, and in their ability to protect enterprises
from advanced threats.
 Gartner estimates that, in 2013, 77% of SWG implementations were on-premises and 23% were cloud-based. Comparing
these values to those from 2012 (86% on-premises and 14% cloud) indicates that. cloud-based services are growing more
quickly than on-premises appliances.
 The market for cloud-based SWG services is far from mature.
 The evolving threat landscape has forced SWG vendors to respond by adding technologies to defend against advanced threats.
There are several techniques for combating advanced threats, and sandboxing has emerged as the most commonly
implemented approach by SWG vendors in 2013 and 2014.
 Some have implemented sandboxing with separate on-premises appliances, whereas others have taken a cloud-based
approach.
A brief on the first 3 leaders of the latest Gartner report magic Quadrant 2014 in the web security field:
In the first place: Blue Coat Systems
 Blue Coat Systems Inc., formerly CacheFlow, based in Sunnyvale, California, United States is a provider of security and
networking solutions.
 In February 2012, Blue Coat was acquired by private equity investment firm Thoma Bravo for $1.3 billion and began
operating as a privately held company.
 Blue Coat provides products to more than 15,000 customers worldwide.
 Since the acquisition, Blue Coat acquired several security companies, including
I. Netronome (SSL appliances) in May 2013
II. Solera Networks (full packet capture for network forensics) in May 2013
III.Norman Shark (appliance based sandbox) in December 2013.
 Blue Coat also introduced the Content Analysis System (CAS), an internally developed malware detection appliance that
analyzes traffic forwarded to it by Blue Coat's ProxySG.
 In addition to its appliance-based offerings, Blue Coat offers a cloud-based SWG service.
 Blue Coat's appliances are good candidates for most large-enterprise customers, particularly those requiring highly scalable
SWGs.
 Blue Coat's cloud service is a good option for most enterprises.
 Strengths:
 The ProxySG is the strongest proxy in the market in terms of breadth of protocols and the number of advanced features. It
supports a broad set of protocols as well as extensive authentication and directory integration options.
 Blue Coat has made good progress in integrating the products that it has acquired.
 For example, its CAS (Content Analysis System) can automatically deposit suspicious files in the Malware Analysis
Appliance (sandbox).
 The CAS also integrates with FireEye's Web Malware Protection System (MPS; however, the CAS does not yet integrate
with FireEye's NX series, which is the updated version of the MPS).
 The Security Analytics solution (Solera Networks technology) integrates with the Malware Analysis Appliance (Norman
Shark technology) and provides a forensic analysis of packets associated with a suspicious file.
 Blue Coat's cloud offering includes multitenant IPsec gateways, which enable it to support a wide range of mobile devices.
Blue Coat agents are available for Windows, Mac OS X, Apple iOS and Android.
 Cautions:
 Because Blue Coat's advanced threat defense solution requires multiple components, it is expensive.
 The ProxySG does not deposit suspicious files in the Malware Analysis Appliance.
 Customers must purchase the CAS if they want to automatically detect suspicious files and analyze them in the Malware
Analysis Appliance.
 Blue Coat's hybrid implementation of its cloud and on-premises offerings is incomplete.
 Policy synchronization is not bidirectional (it supports synchronization only from the cloud to on-premises appliances).
 Downloading logs from the cloud to on-premises appliances can be scheduled only hourly.
 Blue Coat's Reporter application lacks severity indicators for prioritizing alerts.
In the second place: Cisco
 Cisco Systems, Inc. is an American multinational corporation headquartered in San Jose, California, that designs, manufactures, and sells
networking equipment.
 Cisco offers the appliance-based Web Security Appliance (WSA) and the cloud-based Cloud Web Security (CWS) service.
 The WSAs are implemented as proxies.
 Cisco's WSA products are good options for most midsize and large enterprises, while the CWS service is a good option for
most enterprises.
 Cisco acquired a variety of companies to spin products and talent into the company. A total of 160 companies have been
acquired as of July 27, 2014.
 A total of 160 companies have been acquired as of July 27, 2014.
I. In October 2013, Cisco acquired cyber-security firm Sourcefire.
II. In June 16, 2014, Cisco announced that it has completed the acquisition of threatGRID, whose primary offering is a cloud-based
sandboxing service.
 Strengths:
 Cisco has integrated a traffic redirection feature - a critical component of any cloud service into some of its on-premises
equipment.
 The ASA firewall, Integrated Services Router (ISR) Generation 2 and WSA all support Cisco's "connector" software, which
directs traffic to the CWS service.
 Mobile platform support is a strength of the CWS service for customers that have already implemented Cisco's popular
AnyConnect client. The cloud service supports Windows, Mac OS X, Apple iOS, Android, Windows Phone 8 and
BlackBerry.
 Sourcefire's Advanced Malware Protection (AMP) technology is available as an option on Cisco's WSA and CWS service
(separate license fees apply).
 Cisco's intended acquisition of ThreatGRID and its sandboxing technology will complement the file-based advanced threat
defense technology that it acquired from Sourcefire.
 Gartner expects that Cisco will integrate the WSA with a ThreatGRID-based appliance (but not before 2015), so that
suspicious files can be further analyzed in a sandbox environment.
 The combination of file-based and sandboxing technologies should reduce false positives and improve the accuracy of
malware and advanced threat detection.
 Cautions:
 Cisco has been slow to integrate its cloud-based SWG (ScanSafe acquisition of 2009) with its on premises SWG (IronPort
acquisition of 2007).
 Customers seeking a hybrid cloud/on-premises solution will need two consoles.
1. The consoles lack policy synchronization (to share policies between cloud and on-premises users).
2. Log synchronization is not configurable by the customer, but on customer request, Cisco can automate log synchronization
up to four times per day.
 The CTA (Cisco Trust Agent) capability is not available to WSA customers. Only CWS customers can utilize the CTA
functionality.
 Getting maximum value from AMP (Advanced Malware Protection, From Sourcefire) requires implementing FireAMP
Connector agents on network endpoints. The FireAMP Connectors are optional, but without them, the AMP-integrated SWG
provides reduced monitoring and investigative functionality.
 Cisco's cloud service has a surprisingly small global footprint (15 countries), given Cisco's resources and the number of years
it has been in the SWG market. Newer rivals have been more aggressive in global expansion.
 The cloud service also lacks support for IPsec.
In the third place: Websense
 Websense was founded by Phil Trubey in 1994, and went public in the year 2000.
 Websense is a San Diego-based company specializing in computer security software.
 Websense was acquired by private equity firm Vista Equity Partners in June 2013.
 In 2014, Websense began moving its headquarters from San Diego to Austin, Texas.
 Websense offers SWG appliances (hardware and software) and a cloud-based service.
 In October 2013, it announced RiskVision, an appliance that forwards suspicious files to Websense's cloud-based sandbox
(known as ThreatScope).
 Websense appliances are good options for midsize enterprises, and its cloud service is a good option for most enterprises.
 Strengths:
 Websense has a strong offering for organizations that are interested in a hybrid SWG strategy (on-premises and cloud-based).
 Its Triton management console (Real-time web content analysis and malware protection of the Web Security Gateway)
provides a common point for policy management, reporting and logging in hybrid environments.
 Websense's Web Security Gateway automatically deposits suspicious files in the ThreatScope cloud sandbox, which was
developed in-house by Websense.
 Websense has extended its DLP “Data Loss Prevention” technology to its cloud service. The deep packet inspection
capabilities of its DLP technology are used to inspect outbound traffic for malware behavior. This feature, which was
previously only available on Websense appliances, does not require a DLP license.
 The Websense cloud service supports multiple options for traffic redirection (including IPsec), and multiple options for user
authentication (including SAML v2).
 Cautions:
 Websense's SWG product portfolio limits the vendor to a primarily midmarket customer base.
 Websense continues to experience challenges with its service and support organization, based on feedback Gartner has
gathered from several Websense customers. Gartner believes that some of the support issues were the result of disruption
associated with Websense's corporate relocation to Texas.
 Prospective customers should verify SLA commitments with Websense's service and support organization.
 The console for the cloud-only service is different from Websense's Triton console, which is used to manage the hybrid and
on-premises solutions. Customers that begin with a cloud-only service and add appliances later (for example, to improve
responsiveness in bottleneck locations) would need to switch to the Triton console.

Weitere ähnliche Inhalte

Was ist angesagt?

The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachCloudLock
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Report Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 EnReport Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 EnRiccardoPelliccioli
 
CompTIA Managed Services Community Meeting: ChannelCon 2013
CompTIA Managed Services Community Meeting: ChannelCon 2013CompTIA Managed Services Community Meeting: ChannelCon 2013
CompTIA Managed Services Community Meeting: ChannelCon 2013CompTIA
 
jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516Tony Evans
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsYusuf Hadiwinata Sutandar
 
MDR-SOC is a cybersecurity framework services | Ampcus Inc
MDR-SOC is a cybersecurity framework services | Ampcus IncMDR-SOC is a cybersecurity framework services | Ampcus Inc
MDR-SOC is a cybersecurity framework services | Ampcus IncUnified11
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)cyberlocke
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyNandita Nityanandam
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareTzar Umang
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keystrueidentity
 
Anton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsTom Kopko
 

Was ist angesagt? (20)

The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Report Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 EnReport Gartner Magic Quadrant For Security Web Gateway 2011 En
Report Gartner Magic Quadrant For Security Web Gateway 2011 En
 
CompTIA Managed Services Community Meeting: ChannelCon 2013
CompTIA Managed Services Community Meeting: ChannelCon 2013CompTIA Managed Services Community Meeting: ChannelCon 2013
CompTIA Managed Services Community Meeting: ChannelCon 2013
 
jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516jn_fs_tech_insider_march_032516
jn_fs_tech_insider_march_032516
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital Forensics
 
MDR-SOC is a cybersecurity framework services | Ampcus Inc
MDR-SOC is a cybersecurity framework services | Ampcus IncMDR-SOC is a cybersecurity framework services | Ampcus Inc
MDR-SOC is a cybersecurity framework services | Ampcus Inc
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
Finding Your Lost Keys
Finding Your Lost KeysFinding Your Lost Keys
Finding Your Lost Keys
 
Anton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data Centralization
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
 

Ähnlich wie Leaders of Gartner Magic Quadrant 2014 for Secure Web Gateways

G06.2014 magic quadrant for secure web gateways
G06.2014   magic quadrant for secure web gatewaysG06.2014   magic quadrant for secure web gateways
G06.2014 magic quadrant for secure web gatewaysSatya Harish
 
G05.2015 Secure Web Gateways
G05.2015   Secure Web GatewaysG05.2015   Secure Web Gateways
G05.2015 Secure Web GatewaysSatya Harish
 
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADCKemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADCKappa Data
 
G02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewallG02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewallSatya Harish
 
Principales consejos para migrar su solucion a_saas
Principales consejos para migrar su solucion a_saasPrincipales consejos para migrar su solucion a_saas
Principales consejos para migrar su solucion a_saasGeneXus
 
G04.2014 magic quadrant for enterprise network
G04.2014   magic quadrant for enterprise networkG04.2014   magic quadrant for enterprise network
G04.2014 magic quadrant for enterprise networkSatya Harish
 
Silver Peak Award Write Up
Silver Peak Award Write UpSilver Peak Award Write Up
Silver Peak Award Write UpClaudia Toscano
 
G01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionG01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionSatya Harish
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharmaAnil Sharma
 
G05.2014 - Magic quadrant for cloud infrastructure as a service
G05.2014 - Magic quadrant for cloud infrastructure as a serviceG05.2014 - Magic quadrant for cloud infrastructure as a service
G05.2014 - Magic quadrant for cloud infrastructure as a serviceSatya Harish
 
Symantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitSymantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitLluis Altes
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPSmmiznoni
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firmsRobert Westmacott
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
G10.2014 magic quadrant for application delivery controllers
G10.2014   magic quadrant for application delivery controllersG10.2014   magic quadrant for application delivery controllers
G10.2014 magic quadrant for application delivery controllersSatya Harish
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
Century link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalCentury link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalIngram Micro Cloud
 

Ähnlich wie Leaders of Gartner Magic Quadrant 2014 for Secure Web Gateways (20)

G06.2014 magic quadrant for secure web gateways
G06.2014   magic quadrant for secure web gatewaysG06.2014   magic quadrant for secure web gateways
G06.2014 magic quadrant for secure web gateways
 
G05.2015 Secure Web Gateways
G05.2015   Secure Web GatewaysG05.2015   Secure Web Gateways
G05.2015 Secure Web Gateways
 
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADCKemp Technologies rises on Gartner's Magical Quadrant for ADC
Kemp Technologies rises on Gartner's Magical Quadrant for ADC
 
G02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewallG02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewall
 
Principales consejos para migrar su solucion a_saas
Principales consejos para migrar su solucion a_saasPrincipales consejos para migrar su solucion a_saas
Principales consejos para migrar su solucion a_saas
 
G04.2014 magic quadrant for enterprise network
G04.2014   magic quadrant for enterprise networkG04.2014   magic quadrant for enterprise network
G04.2014 magic quadrant for enterprise network
 
Silver Peak Award Write Up
Silver Peak Award Write UpSilver Peak Award Write Up
Silver Peak Award Write Up
 
G01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionG01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protection
 
Product Assessment and Consulting Offerings
Product Assessment and Consulting OfferingsProduct Assessment and Consulting Offerings
Product Assessment and Consulting Offerings
 
Cloud Catalyst Programme | Torry Harris Whitepaper
Cloud Catalyst Programme | Torry Harris WhitepaperCloud Catalyst Programme | Torry Harris Whitepaper
Cloud Catalyst Programme | Torry Harris Whitepaper
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
 
G05.2014 - Magic quadrant for cloud infrastructure as a service
G05.2014 - Magic quadrant for cloud infrastructure as a serviceG05.2014 - Magic quadrant for cloud infrastructure as a service
G05.2014 - Magic quadrant for cloud infrastructure as a service
 
Symantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company splitSymantec's London vision 2014 event more details emerge on the company split
Symantec's London vision 2014 event more details emerge on the company split
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Cyber security basics for law firms
Cyber security basics for law firmsCyber security basics for law firms
Cyber security basics for law firms
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
G10.2014 magic quadrant for application delivery controllers
G10.2014   magic quadrant for application delivery controllersG10.2014   magic quadrant for application delivery controllers
G10.2014 magic quadrant for application delivery controllers
 
Confluence by atlassian
Confluence by atlassianConfluence by atlassian
Confluence by atlassian
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Century link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalCentury link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation final
 

Kürzlich hochgeladen

KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 

Kürzlich hochgeladen (20)

KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 

Leaders of Gartner Magic Quadrant 2014 for Secure Web Gateways

  • 1. Overview:  What is Gartner Magic Quadrant?  How do I use a Gartner Magic Quadrant?  How does a Gartner Magic Quadrant Work?  How can a Gartner Magic Quadrant help me?  What are the new Gartner Magic Quadrant Enhancements?  What is a Gartner Magic Quadrant for Secure Web Gateways?  A brief on the first three leaders of the latest Gartner report magic Quadrant 2014 in the web security field?  What are the first three leaders of a Gartner Magic Quadrant 2014 report Strengths & Cautions? By: Tarek Nader
  • 2. What is Gartner Magic Quadrant? • The Gartner Magic Quadrant (MQ) is the brand name for a series of market research reports published by Gartner Inc. a US- based research and advisory firm. • A Gartner Magic Quadrant is a culmination of research in a specific market, giving you a wide-angle view of the relative positions of the market's competitors. • According to Gartner, the Magic Quadrant aims to provide a qualitative analysis into a market and its direction, maturity and participants. • By applying a graphical treatment and a uniform set of evaluation criteria, a Magic Quadrant helps you quickly ascertain how well technology providers are executing their stated visions and how well they are performing against Gartner's market view. • Their analyses are conducted for several specific technology industries and are updated every 1–2 years.
  • 3. How do I use a Gartner Magic Quadrant?  Use a Gartner Magic Quadrant as a first step to understanding the technology providers you might consider for a specific investment opportunity. • Keep in mind that focusing on the leaders' quadrant isn't always the best course of action. • There are good reasons to consider market challengers. And a niche player may support your needs better than a market leader. • It all depends on how the provider aligns with your business goals.
  • 4. How does a Gartner Magic Quadrant Work?  Gartner rates vendors upon two criteria: completeness of vision and ability to execute. Using a methodology which Gartner does not disclose, these component scores lead to a vendor position in one of four quadrants:  Leaders are said to score higher on both criteria: the ability to execute and completeness of vision. These are said to be typically larger, mature businesses.  Challengers are said to score higher on the ability to execute and lower on the completeness of vision. Typically larger, settled businesses with what Gartner claims to be minimal future plans for that industry.  Visionaries are said to score lower on the ability to execute and higher on the completeness of vision. Typically smaller companies.  Niche players are said to score lower on both criteria: the ability to execute and completeness of vision. Typically new additions to the Magic Quadrant.
  • 5. Magic Quadrants help you:  Get quickly educated about a market's competing technology providers and their ability to deliver on what end users require today and in the future  Understand how a market's technology providers are competitively positioned and the strategies they are using to compete for end-user business  Compare a technology provider's strengths and challenges with your specific needs
  • 6. The new Gartner Magic Quadrant Enhancements: Additional Perspectives 1. New contextual perspectives for key markets that provide critical insight by industry, company size or geography. 2. Connection to a new, interactive Critical Capabilities tool, with features that enable deeper understanding of products and services and vendors in a market. 3. Customization of both the Magic Quadrant and the Critical Capabilities allowing for a personalized view of the market and usage scenarios providing deeper insight aligned to your needs.  It's the same trusted Gartner methodology you've come to rely on, with the flexibility to tailor the analysis to your unique business needs.  This enhancement provides analyst commentary on the market and notable vendors from key client contexts.
  • 7.  Insight into markets and vendors, year-over-year views and ability to customize aligned to your unique needs. I. Gain Deeper Insight for Your Unique Needs
  • 8.  Provides market direction, technology selection, and vendors to consider from an industry, region or company-size perspective. II. Additional Perspectives
  • 9. III. Gartner Critical Capabilities  The insights of the interactive Magic Quadrant, when combined with a companion interactive Critical Capabilities, enable deeper analysis into product or service functionality.
  • 10. IV. Magic Quadrant home page on My Gartner  Search and browse Gartner Magic Quadrants or Critical Capabilities by vendor, topic or industry.
  • 11. Magic Quadrant for Secure Web Gateways  By: Analyst(s): Lawrence Orans, Peter Firstbrook  The SWG market is evolving rapidly as vendors respond to the mobility trend and the evolving threat landscape. SWG vendors are highly differentiated in their ability to deliver cloud-based services, and to protect users with advanced threat defense features. Market Definition/Description:  Secure Web gateways (SWGs) utilize URL filtering, advanced threat defense, legacy malware protection and application control technologies to defend users from Internet-borne threats, and to help enterprises enforce Internet policy compliance.  SWGs are delivered as on-premises appliances (hardware and virtual) or cloud-based services.  Vendors differ greatly in the maturity and features of their cloud-based services, and in their ability to protect enterprises from advanced threats.  Gartner estimates that, in 2013, 77% of SWG implementations were on-premises and 23% were cloud-based. Comparing these values to those from 2012 (86% on-premises and 14% cloud) indicates that. cloud-based services are growing more quickly than on-premises appliances.  The market for cloud-based SWG services is far from mature.  The evolving threat landscape has forced SWG vendors to respond by adding technologies to defend against advanced threats. There are several techniques for combating advanced threats, and sandboxing has emerged as the most commonly implemented approach by SWG vendors in 2013 and 2014.  Some have implemented sandboxing with separate on-premises appliances, whereas others have taken a cloud-based approach.
  • 12. A brief on the first 3 leaders of the latest Gartner report magic Quadrant 2014 in the web security field: In the first place: Blue Coat Systems  Blue Coat Systems Inc., formerly CacheFlow, based in Sunnyvale, California, United States is a provider of security and networking solutions.  In February 2012, Blue Coat was acquired by private equity investment firm Thoma Bravo for $1.3 billion and began operating as a privately held company.  Blue Coat provides products to more than 15,000 customers worldwide.  Since the acquisition, Blue Coat acquired several security companies, including I. Netronome (SSL appliances) in May 2013 II. Solera Networks (full packet capture for network forensics) in May 2013 III.Norman Shark (appliance based sandbox) in December 2013.  Blue Coat also introduced the Content Analysis System (CAS), an internally developed malware detection appliance that analyzes traffic forwarded to it by Blue Coat's ProxySG.  In addition to its appliance-based offerings, Blue Coat offers a cloud-based SWG service.  Blue Coat's appliances are good candidates for most large-enterprise customers, particularly those requiring highly scalable SWGs.  Blue Coat's cloud service is a good option for most enterprises.
  • 13.  Strengths:  The ProxySG is the strongest proxy in the market in terms of breadth of protocols and the number of advanced features. It supports a broad set of protocols as well as extensive authentication and directory integration options.  Blue Coat has made good progress in integrating the products that it has acquired.  For example, its CAS (Content Analysis System) can automatically deposit suspicious files in the Malware Analysis Appliance (sandbox).  The CAS also integrates with FireEye's Web Malware Protection System (MPS; however, the CAS does not yet integrate with FireEye's NX series, which is the updated version of the MPS).  The Security Analytics solution (Solera Networks technology) integrates with the Malware Analysis Appliance (Norman Shark technology) and provides a forensic analysis of packets associated with a suspicious file.  Blue Coat's cloud offering includes multitenant IPsec gateways, which enable it to support a wide range of mobile devices. Blue Coat agents are available for Windows, Mac OS X, Apple iOS and Android.  Cautions:  Because Blue Coat's advanced threat defense solution requires multiple components, it is expensive.  The ProxySG does not deposit suspicious files in the Malware Analysis Appliance.  Customers must purchase the CAS if they want to automatically detect suspicious files and analyze them in the Malware Analysis Appliance.  Blue Coat's hybrid implementation of its cloud and on-premises offerings is incomplete.  Policy synchronization is not bidirectional (it supports synchronization only from the cloud to on-premises appliances).  Downloading logs from the cloud to on-premises appliances can be scheduled only hourly.  Blue Coat's Reporter application lacks severity indicators for prioritizing alerts.
  • 14. In the second place: Cisco  Cisco Systems, Inc. is an American multinational corporation headquartered in San Jose, California, that designs, manufactures, and sells networking equipment.  Cisco offers the appliance-based Web Security Appliance (WSA) and the cloud-based Cloud Web Security (CWS) service.  The WSAs are implemented as proxies.  Cisco's WSA products are good options for most midsize and large enterprises, while the CWS service is a good option for most enterprises.  Cisco acquired a variety of companies to spin products and talent into the company. A total of 160 companies have been acquired as of July 27, 2014.  A total of 160 companies have been acquired as of July 27, 2014. I. In October 2013, Cisco acquired cyber-security firm Sourcefire. II. In June 16, 2014, Cisco announced that it has completed the acquisition of threatGRID, whose primary offering is a cloud-based sandboxing service.
  • 15.  Strengths:  Cisco has integrated a traffic redirection feature - a critical component of any cloud service into some of its on-premises equipment.  The ASA firewall, Integrated Services Router (ISR) Generation 2 and WSA all support Cisco's "connector" software, which directs traffic to the CWS service.  Mobile platform support is a strength of the CWS service for customers that have already implemented Cisco's popular AnyConnect client. The cloud service supports Windows, Mac OS X, Apple iOS, Android, Windows Phone 8 and BlackBerry.  Sourcefire's Advanced Malware Protection (AMP) technology is available as an option on Cisco's WSA and CWS service (separate license fees apply).  Cisco's intended acquisition of ThreatGRID and its sandboxing technology will complement the file-based advanced threat defense technology that it acquired from Sourcefire.  Gartner expects that Cisco will integrate the WSA with a ThreatGRID-based appliance (but not before 2015), so that suspicious files can be further analyzed in a sandbox environment.  The combination of file-based and sandboxing technologies should reduce false positives and improve the accuracy of malware and advanced threat detection.
  • 16.  Cautions:  Cisco has been slow to integrate its cloud-based SWG (ScanSafe acquisition of 2009) with its on premises SWG (IronPort acquisition of 2007).  Customers seeking a hybrid cloud/on-premises solution will need two consoles. 1. The consoles lack policy synchronization (to share policies between cloud and on-premises users). 2. Log synchronization is not configurable by the customer, but on customer request, Cisco can automate log synchronization up to four times per day.  The CTA (Cisco Trust Agent) capability is not available to WSA customers. Only CWS customers can utilize the CTA functionality.  Getting maximum value from AMP (Advanced Malware Protection, From Sourcefire) requires implementing FireAMP Connector agents on network endpoints. The FireAMP Connectors are optional, but without them, the AMP-integrated SWG provides reduced monitoring and investigative functionality.  Cisco's cloud service has a surprisingly small global footprint (15 countries), given Cisco's resources and the number of years it has been in the SWG market. Newer rivals have been more aggressive in global expansion.  The cloud service also lacks support for IPsec.
  • 17. In the third place: Websense  Websense was founded by Phil Trubey in 1994, and went public in the year 2000.  Websense is a San Diego-based company specializing in computer security software.  Websense was acquired by private equity firm Vista Equity Partners in June 2013.  In 2014, Websense began moving its headquarters from San Diego to Austin, Texas.  Websense offers SWG appliances (hardware and software) and a cloud-based service.  In October 2013, it announced RiskVision, an appliance that forwards suspicious files to Websense's cloud-based sandbox (known as ThreatScope).  Websense appliances are good options for midsize enterprises, and its cloud service is a good option for most enterprises.  Strengths:  Websense has a strong offering for organizations that are interested in a hybrid SWG strategy (on-premises and cloud-based).  Its Triton management console (Real-time web content analysis and malware protection of the Web Security Gateway) provides a common point for policy management, reporting and logging in hybrid environments.  Websense's Web Security Gateway automatically deposits suspicious files in the ThreatScope cloud sandbox, which was developed in-house by Websense.
  • 18.  Websense has extended its DLP “Data Loss Prevention” technology to its cloud service. The deep packet inspection capabilities of its DLP technology are used to inspect outbound traffic for malware behavior. This feature, which was previously only available on Websense appliances, does not require a DLP license.  The Websense cloud service supports multiple options for traffic redirection (including IPsec), and multiple options for user authentication (including SAML v2).  Cautions:  Websense's SWG product portfolio limits the vendor to a primarily midmarket customer base.  Websense continues to experience challenges with its service and support organization, based on feedback Gartner has gathered from several Websense customers. Gartner believes that some of the support issues were the result of disruption associated with Websense's corporate relocation to Texas.  Prospective customers should verify SLA commitments with Websense's service and support organization.  The console for the cloud-only service is different from Websense's Triton console, which is used to manage the hybrid and on-premises solutions. Customers that begin with a cloud-only service and add appliances later (for example, to improve responsiveness in bottleneck locations) would need to switch to the Triton console.

Hinweis der Redaktion

  1. X