SlideShare a Scribd company logo
1 of 12
Download to read offline
695 Campbel l Technology Parkway • Suite 200 • Campbel l • Cali fornia • 95008 • t 408.583.0011 • f 408.583.0031 
www. infonetics.com • Silicon Val ley, CA • Boston, MA • London, UK 
Network and Content Security 
Vendor Scorecard 
Report Excerpts 
September 2014 
INFONETICS RESEARCH REPORT EXCERPTS
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Table of Contents 
TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES 1 
PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED 2 
SCORECARD RESULTS 3 
Top 3 Vendors by Criterion 5 
VENDOR PROFILES 5 
#1 Cisco 5 
Markets and Technology Segments 6 
Score Analysis 6 
Strengths and Weaknesses 7 
Bottom Line 7 
BOTTOM LINE 7 
METHODOLOGY 8 
REPORT AUTHOR 10 
ABOUT INFONETICS RESEARCH 10 
REPORT REPRINTS AND CUSTOM RESEARCH 10 
List of Exhibits 
Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 1 
Exhibit 2 Network and Content Security Vendor Scorecard Summary 3 
Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 4 
Exhibit 4 Top 3 Network and Content Security Vendors by Criterion 5 
Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 6
1 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES 
This service profiles, analyzes, and ranks the 8 largest global vendors of network and content security solutions. We chose the 8 vendors who had product offerings in network and content security and 2013 revenue of $240M or more. 
To eliminate subjective scoring and accurately and fairly evaluate vendors, we established 8 criteria using actual data and metrics, including market share data, publicly available financial data, and buyer feedback. Criteria include market share, market share momentum, financials, solution breadth, and 4 key metrics from our survey research on security (security, technology innovation, product reliability, and service and support). 
McAfee is second on the strength of a good market share position, solid financials (thanks Intel!), a broad product portfolio, and excellent scores in the end-user metrics from our survey data (aided by strong brand awareness since McAfee is a household name for consumers and business buyers). 
Check Point is in third, with great performance in market share and financials, though they have room to improve when it comes to end-user perception; they score below average in all 4 survey-based categories. 
Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 
012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALL
2 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED 
Network and content security products are the first line of defense for many organizations looking to protect networks, users, applications, and data, and a group of security vendors focusing on delivering network and content security products have emerged over the last 20 years and become critical technology suppliers to enterprises and service providers worldwide. This scorecard profiles, analyzes, and ranks the 8 leading vendors of network and content security products. The key product categories covered in this report are: 
Network security: 
● Integrated security appliances and software 
● SSL VPN 
● IDS/IPS 
● DDoS 
Content security: 
● Web security 
● Mail security 
Please see “Methodology” (excerpted methodology is at the end of this document; the full version, including detailed descriptions of the categories and scoring process, is available from Infonetics Research).
3 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
SCORECARD RESULTS 
The table below summarizes the 8 vendors’ scores and revenue. We’ll discuss the individual vendors in more detail in the profile sections of the report. 
Exhibit 2 Network and Content Security Vendor Scorecard Summary 
Rank 
Vendor 
Score 
2013 Revenue 
Score Analysis 
1 
Cisco 
4.5 
$2,457M 
Scored above 4 in every category with perfect scores of 5 in financial and market share 
2 
McAfee 
3.8 
$798M 
A broad product portfolio and strong financials due to Intel ownership bolster McAfee’s score 
3 
Check Point 
3.5 
$918M 
Solid scores in solution breadth, financials, market share, and momentum keep Check Point in the top 3 
4 
Fortinet 
3.4 
$444M 
Fortinet has strong share momentum and a broad offering 
5 
Juniper 
3.2 
$565M 
Strong share and solution breadth are offset by weak share momentum 
6 
Palo Alto Networks 
3.0 
$341M 
Highest share momentum of the group, held back temporarily by financial score due to patent lawsuit Juniper settlement 
7 
Blue Coat 
2.9 
$401M 
Good share momentum and solution breadth due to acquisitions over the last 18 months but held back by financial and survey category scores 
8 
Dell SonicWALL 
2.7 
$245M 
Middle-of-the road scores overall, but solid share momentum (over 3)
4 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
The next chart details the individual criteria scores making up the total score. 
Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 
012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALLMarket shareMarket share momentumFinancialsSolution breadthSecurity*Technology innovation* Product reliability*Service and support* *Score is based on survey research
5 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Top 3 Vendors by Criterion 
Another way to analyze leadership is to look at the top rankings in each of the 8 scoring criteria (see table below). Not surprisingly, Cisco shows up the most in the top 3 table (showing up among the top 3 in all criteria, and #1 in 6 of 8 criteria). What really stands out beyond that is Palo Alto’s first place finish in market share momentum (which should surprise nobody, considering how much the company has been outgrowing the competition in their primary space, the integrated appliance market). Also notable is that McAfee does quite well in all of our survey- based criteria; they’ve generated significant goodwill (and brand awareness) as a leading provider of anti-virus technology and volumes of threat research, and this has significant potential value. 
Exhibit 4 Top 3 Network and Content Security Vendors by Criterion 
VENDOR PROFILES 
#1 Cisco 
Cisco is one of the best-known telecom and datacom equipment manufacturers globally, targeting service providers, enterprises of all sizes, and consumers. Cisco’s fiscal year 2013 revenue was US$48.6B. 
Cisco built their security portfolio through internal development and acquisition over the last 16 years, and they’ve been busy in the last 18 months. In 2013 they acquired 2 security firms: Cognitive Security for an unknown amount and Sourcefire for approximately US$2.7B. Also, in 2014 they acquired ThreatGrid for an undisclosed amount to enhance their Advanced Malware Protection (AMP) portfolio, a solution they obtained as a result of their Sourcefire acquisition.
6 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Markets and Technology Segments 
Cisco has a vast security product portfolio that spans firewall, intrusion prevention, remote access, unified clients, network admission control (a suite of access control and authentication solutions), web and mail security, advanced threat protection solutions, and data center and virtualized security solutions. 
They have products in every segment we track in this service outside of standalone DDoS mitigation (they EOL’d their Guard DDoS mitigation product in 2008). They have multiple integrated appliance offerings (traditional Cisco ASA firewalls and Sourcefire’s NGFW products), multiple standalone IPS solutions (again a mix of existing Cisco products and new Sourcefire products), standalone SSL VPN gateways, and web and mail security gateways (courtesy of their IronPort acquisition). 
Score Analysis 
Cisco has the highest score overall and above-average scores in every single category. They have strong fundamentals (market share, share momentum, and financials), a very broad product portfolio (they have significant share in nearly every segment we track in this report), and they receive excellent buyer feedback in our surveys. They’re an example of a large network infrastructure company who has decided to put their significant resources behind building a serious security business, and over the last 16 years have built themselves into the market leader. 
Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 
012345MarketshareMarket sharemomentumFinancialsSolutionbreadthTechnologyinnovationSecurityProductreliabilityService andsupportWeightedtotalCisco2013 average score
7 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Strengths and Weaknesses 
As discussed, Cisco’s overall size, significant share in most of the markets we track in this report, excellent brand strength (not just in security, but in nearly all areas of their business, including networking and communications) and comprehensive product portfolio help them stay ahead of the pack. They have also been involved in developing security solutions for data centers and other virtualized environments for several years, and as the market for security solutions starts to move toward virtualized solutions, they’re positioned to take advantage of the transition. 
In addition to the products, they have a strong threat research and intelligence capability, and buyer perception of security vendors moving forward will be significantly influenced by how deeply involved in conducting threat research and publishing meaningful threat reports, which Cisco is placing serious resources behind. We expect this investment will pay off in the future, helping keep the survey-based scores in this report high. 
They do have some key issues to confront over the next several years; multiple acquisitions have left them with a mountain of technology and products to rationalize. They need to carefully streamline their product offering so they put their best foot forward (with the right product) in each product segment. This means resolving overlaps between existing Cisco products and the Sourcefire products they acquired and finding ways to integrate the new advanced threat protection platforms they’ve acquired recently into their overall product portfolio. Complex product portfolios are challenging for customers and resellers and can cause decision-making delays and create openings for the competition. 
Bottom Line 
Cisco is the clear leader in the network and content security space, and we don’t expect this to change in the next year, but the lead isn’t necessarily insurmountable. Unfortunately for the competition, it will take some ingredients that are hard to acquire to pass Cisco; namely the brand strength and strong financials that come with being one of the largest networking and telecom equipment suppliers in the world—a supplier that also happens to be interested in building market-leading security solutions. 
BOTTOM LINE 
The network and content security space is complex; there are many vendors and countless market forces all pushing and pulling on those vendors. Though Cisco has stiff competition in a variety of the criteria we cover in this report, they have a strong lead in market share (their revenue is more than 2.5x their next closest competitor’s) that should keep them on top for the next year. They might not be toppled, but there are more than a few vendors (namely Palo Alto, Fortinet, and Check Point) eating into their growth potential, and some wildcard vendors have built disruptive product portfolios that could lead to explosive growth in revenue and increases in their scores in future versions of this report.
8 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
METHODOLOGY 
This scorecard includes Blue Coat, Check Point, Cisco, Dell SonicWALL, Fortinet, Juniper, McAfee, and Palo Alto Networks; these are the top 8 network and content security vendors, each with $240M or more in 2013 network and content security product revenue and significant product offerings in network (integrated security appliances, IDS/IPS, SSL VPN, DDoS) and content (web and mail) security. 
We evaluate the top 8 vendors in 8 criteria using actual data and metrics. For each criterion, we scored vendors on a 5-point scale, with 1 being the lowest possible score, 3 being an average score, and 5 being a perfect score. Specifically, we evaluated vendors on the following: 
● Market share and market share momentum: a measure of how successfully a company has penetrated its target markets; having significant market share creates awareness with buyers, improves scale, and reassures buyers that companies are here to stay for the long term; some RFPs require vendors to meet certain market share thresholds to ensure vendor viability; successful vendors will have above-average market share that is increasing year over year 
● Market share: vendors’ percentage share of network and content security product revenue 
● Market share momentum: changes in revenue market share over time 
● Financials: an analysis of a vendor’s financials; a strong financial position improves long-term viability and allows a company to stay ahead of the competition by investing in R&D and/or acquiring other companies/technologies; we base the score on the Altman Z-score non-manufacturing model 
● Solution breadth: a measure of how many network and content security product segments a vendor addresses; a broader solution set improves a vendor's potential and efficiency of its operations and allows it to differentiate by innovating across segments; we calculated scores based on whether a vendor participates in a given sub-segment of the market, and its relative revenue contribution to the overall market 
● Buyer feedback on security, technology innovation, product reliability, and service/support: assessments of a vendor’s performance by buyers, based on interviews we conduct with hundreds of end-users every year 
Based on the scores for each of the 8 criteria, we created a single composite vendor score, using the same 5- point scale, and weighted the individual criterion based on its importance in the buying process.
9 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
The information in this report is based on findings from multiple Infonetics Research services, including: 
● Market share, size, and forecasts 
● Network Security Appliances and Software Quarterly Worldwide and Regional Market Share, Size, and Forecasts 
● Content Security Gateway Appliances, Software, and SaaS Quarterly Worldwide and Regional Market Share, Size, and Forecasts 
● DDoS Prevention Appliances Quarterly Worldwide and Regional Market Share, Size, and Forecasts 
● Survey-based research 
● Next Generation Threat Prevention Strategies and Vendor Leadership: North American Enterprise Survey 
● Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey
10 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
REPORT AUTHOR 
Jeff Wilson 
Principal Analyst, Security 
Infonetics Research 
+1 408.583.3337 | jeff@infonetics.com 
Twitter: @securityjeff 
ABOUT INFONETICS RESEARCH 
Infonetics Research is an international market research and consulting analyst firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete more effectively. 
REPORT REPRINTS AND CUSTOM RESEARCH 
To learn about distributing excerpts from Infonetics reports or custom research, please contact: 
North America (West) and Asia Pacific 
Larry Howard, Vice President, larry@infonetics.com, +1 408.583.3335 
North America (East, Midwest, Texas), Latin America and EMEA 
Scott Coyne, Senior Account Director, scott@infonetics.com, +1 408.583.3395 
Greater China and Southeast Asia 大中华区及东南亚地区 
Jeffrey Song, Market Analyst 市场分析师及客户经理jeffrey@infonetics.com, +86 21.3919.8505

More Related Content

What's hot

Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Ulf Mattsson
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALMichael Bunn
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016Ulf Mattsson
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesInfosec
 
How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016Ulf Mattsson
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Zoe Gilbert
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsMuhammad FAHAD
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web securityxKinAnx
 
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
NIST releases SP 800-160  Multi-discplinary approach to cybersecurityNIST releases SP 800-160  Multi-discplinary approach to cybersecurity
NIST releases SP 800-160 Multi-discplinary approach to cybersecurityDavid Sweigert
 
From Code to Customer: How to Make Software Products Secure
From Code to Customer: How to Make Software Products SecureFrom Code to Customer: How to Make Software Products Secure
From Code to Customer: How to Make Software Products SecureKaspersky
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid finalDevOps.com
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsurancePriyanka Aash
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security TrainingBryan Len
 

What's hot (20)

Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
NIST releases SP 800-160  Multi-discplinary approach to cybersecurityNIST releases SP 800-160  Multi-discplinary approach to cybersecurity
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
 
From Code to Customer: How to Make Software Products Secure
From Code to Customer: How to Make Software Products SecureFrom Code to Customer: How to Make Software Products Secure
From Code to Customer: How to Make Software Products Secure
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
 

Viewers also liked

Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Sounil Yu
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Enterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveEnterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveAnusha Vaidyanathan
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
 
Kasus neurobehaviour ke
Kasus neurobehaviour keKasus neurobehaviour ke
Kasus neurobehaviour keArya Ningrat
 
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...Saverio Massaro
 
Taylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipTaylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipRita_E
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataCisco Security
 
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...MobileCreation
 
Counterstories” The Real Knowledge About Going to College
Counterstories”The Real Knowledge About Going to CollegeCounterstories”The Real Knowledge About Going to College
Counterstories” The Real Knowledge About Going to Collegepatty_mndz
 
Interni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàInterni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàSaverio Massaro
 
Kisah katak kecil
Kisah katak kecilKisah katak kecil
Kisah katak kecilhamdEy
 
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...FLUZO
 
Presentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San PedroPresentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San Pedrowww.tumarketing.co
 

Viewers also liked (20)

Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Enterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveEnterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's Perspective
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
Kasus neurobehaviour ke
Kasus neurobehaviour keKasus neurobehaviour ke
Kasus neurobehaviour ke
 
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
 
Taylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipTaylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zip
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
 
Counterstories” The Real Knowledge About Going to College
Counterstories”The Real Knowledge About Going to CollegeCounterstories”The Real Knowledge About Going to College
Counterstories” The Real Knowledge About Going to College
 
Interni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàInterni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolarità
 
Kisah katak kecil
Kisah katak kecilKisah katak kecil
Kisah katak kecil
 
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
 
Fathers day
Fathers dayFathers day
Fathers day
 
Presentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San PedroPresentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San Pedro
 
Rpp bio vii smt 2
Rpp bio vii smt 2Rpp bio vii smt 2
Rpp bio vii smt 2
 
Jawaban 1
Jawaban  1Jawaban  1
Jawaban 1
 
Bab ii
Bab iiBab ii
Bab ii
 
Intannnnn5555
Intannnnn5555Intannnnn5555
Intannnnn5555
 

Similar to Infonetics Network and Content Security Vendor Scorecard

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxArianeSpano
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Skywork Solutions INC.
Skywork Solutions INC.Skywork Solutions INC.
Skywork Solutions INC.Levi Saada
 
Frost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketNetMotion Wireless
 
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channelflashnewsrelease
 
fso-landscape
fso-landscape fso-landscape
fso-landscape CH431
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecurePouria Ghatrenabi
 
Sample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesResearchFox
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Value Plus April014
Value Plus April014 Value Plus April014
Value Plus April014 aditya0312
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APACResearchFox
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingResearchFox
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChannelAegify Inc.
 
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform JourneyCisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform JourneyLluis Altes
 
G02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewallG02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewallSatya Harish
 

Similar to Infonetics Network and Content Security Vendor Scorecard (20)

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Skywork Solutions INC.
Skywork Solutions INC.Skywork Solutions INC.
Skywork Solutions INC.
 
Frost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products Market
 
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
 
fso-landscape
fso-landscape fso-landscape
fso-landscape
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-Secure
 
Sample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial Services
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Value Plus April014
Value Plus April014 Value Plus April014
Value Plus April014
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APAC
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - Manufacturing
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
 
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform JourneyCisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
G02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewallG02.2013 magic quadrant for enterprise network firewall
G02.2013 magic quadrant for enterprise network firewall
 

More from Cisco Security

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls InfographicCisco Security
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report InfographicCisco Security
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Security
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCisco Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsCisco Security
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School DistrictCisco Security
 
William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson UniversityCisco Security
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 

More from Cisco Security (19)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
 
William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson University
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Infonetics Network and Content Security Vendor Scorecard

  • 1. 695 Campbel l Technology Parkway • Suite 200 • Campbel l • Cali fornia • 95008 • t 408.583.0011 • f 408.583.0031 www. infonetics.com • Silicon Val ley, CA • Boston, MA • London, UK Network and Content Security Vendor Scorecard Report Excerpts September 2014 INFONETICS RESEARCH REPORT EXCERPTS
  • 2. Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Table of Contents TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES 1 PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED 2 SCORECARD RESULTS 3 Top 3 Vendors by Criterion 5 VENDOR PROFILES 5 #1 Cisco 5 Markets and Technology Segments 6 Score Analysis 6 Strengths and Weaknesses 7 Bottom Line 7 BOTTOM LINE 7 METHODOLOGY 8 REPORT AUTHOR 10 ABOUT INFONETICS RESEARCH 10 REPORT REPRINTS AND CUSTOM RESEARCH 10 List of Exhibits Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 1 Exhibit 2 Network and Content Security Vendor Scorecard Summary 3 Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 4 Exhibit 4 Top 3 Network and Content Security Vendors by Criterion 5 Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 6
  • 3. 1 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES This service profiles, analyzes, and ranks the 8 largest global vendors of network and content security solutions. We chose the 8 vendors who had product offerings in network and content security and 2013 revenue of $240M or more. To eliminate subjective scoring and accurately and fairly evaluate vendors, we established 8 criteria using actual data and metrics, including market share data, publicly available financial data, and buyer feedback. Criteria include market share, market share momentum, financials, solution breadth, and 4 key metrics from our survey research on security (security, technology innovation, product reliability, and service and support). McAfee is second on the strength of a good market share position, solid financials (thanks Intel!), a broad product portfolio, and excellent scores in the end-user metrics from our survey data (aided by strong brand awareness since McAfee is a household name for consumers and business buyers). Check Point is in third, with great performance in market share and financials, though they have room to improve when it comes to end-user perception; they score below average in all 4 survey-based categories. Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALL
  • 4. 2 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED Network and content security products are the first line of defense for many organizations looking to protect networks, users, applications, and data, and a group of security vendors focusing on delivering network and content security products have emerged over the last 20 years and become critical technology suppliers to enterprises and service providers worldwide. This scorecard profiles, analyzes, and ranks the 8 leading vendors of network and content security products. The key product categories covered in this report are: Network security: ● Integrated security appliances and software ● SSL VPN ● IDS/IPS ● DDoS Content security: ● Web security ● Mail security Please see “Methodology” (excerpted methodology is at the end of this document; the full version, including detailed descriptions of the categories and scoring process, is available from Infonetics Research).
  • 5. 3 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. SCORECARD RESULTS The table below summarizes the 8 vendors’ scores and revenue. We’ll discuss the individual vendors in more detail in the profile sections of the report. Exhibit 2 Network and Content Security Vendor Scorecard Summary Rank Vendor Score 2013 Revenue Score Analysis 1 Cisco 4.5 $2,457M Scored above 4 in every category with perfect scores of 5 in financial and market share 2 McAfee 3.8 $798M A broad product portfolio and strong financials due to Intel ownership bolster McAfee’s score 3 Check Point 3.5 $918M Solid scores in solution breadth, financials, market share, and momentum keep Check Point in the top 3 4 Fortinet 3.4 $444M Fortinet has strong share momentum and a broad offering 5 Juniper 3.2 $565M Strong share and solution breadth are offset by weak share momentum 6 Palo Alto Networks 3.0 $341M Highest share momentum of the group, held back temporarily by financial score due to patent lawsuit Juniper settlement 7 Blue Coat 2.9 $401M Good share momentum and solution breadth due to acquisitions over the last 18 months but held back by financial and survey category scores 8 Dell SonicWALL 2.7 $245M Middle-of-the road scores overall, but solid share momentum (over 3)
  • 6. 4 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. The next chart details the individual criteria scores making up the total score. Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALLMarket shareMarket share momentumFinancialsSolution breadthSecurity*Technology innovation* Product reliability*Service and support* *Score is based on survey research
  • 7. 5 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Top 3 Vendors by Criterion Another way to analyze leadership is to look at the top rankings in each of the 8 scoring criteria (see table below). Not surprisingly, Cisco shows up the most in the top 3 table (showing up among the top 3 in all criteria, and #1 in 6 of 8 criteria). What really stands out beyond that is Palo Alto’s first place finish in market share momentum (which should surprise nobody, considering how much the company has been outgrowing the competition in their primary space, the integrated appliance market). Also notable is that McAfee does quite well in all of our survey- based criteria; they’ve generated significant goodwill (and brand awareness) as a leading provider of anti-virus technology and volumes of threat research, and this has significant potential value. Exhibit 4 Top 3 Network and Content Security Vendors by Criterion VENDOR PROFILES #1 Cisco Cisco is one of the best-known telecom and datacom equipment manufacturers globally, targeting service providers, enterprises of all sizes, and consumers. Cisco’s fiscal year 2013 revenue was US$48.6B. Cisco built their security portfolio through internal development and acquisition over the last 16 years, and they’ve been busy in the last 18 months. In 2013 they acquired 2 security firms: Cognitive Security for an unknown amount and Sourcefire for approximately US$2.7B. Also, in 2014 they acquired ThreatGrid for an undisclosed amount to enhance their Advanced Malware Protection (AMP) portfolio, a solution they obtained as a result of their Sourcefire acquisition.
  • 8. 6 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Markets and Technology Segments Cisco has a vast security product portfolio that spans firewall, intrusion prevention, remote access, unified clients, network admission control (a suite of access control and authentication solutions), web and mail security, advanced threat protection solutions, and data center and virtualized security solutions. They have products in every segment we track in this service outside of standalone DDoS mitigation (they EOL’d their Guard DDoS mitigation product in 2008). They have multiple integrated appliance offerings (traditional Cisco ASA firewalls and Sourcefire’s NGFW products), multiple standalone IPS solutions (again a mix of existing Cisco products and new Sourcefire products), standalone SSL VPN gateways, and web and mail security gateways (courtesy of their IronPort acquisition). Score Analysis Cisco has the highest score overall and above-average scores in every single category. They have strong fundamentals (market share, share momentum, and financials), a very broad product portfolio (they have significant share in nearly every segment we track in this report), and they receive excellent buyer feedback in our surveys. They’re an example of a large network infrastructure company who has decided to put their significant resources behind building a serious security business, and over the last 16 years have built themselves into the market leader. Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 012345MarketshareMarket sharemomentumFinancialsSolutionbreadthTechnologyinnovationSecurityProductreliabilityService andsupportWeightedtotalCisco2013 average score
  • 9. 7 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Strengths and Weaknesses As discussed, Cisco’s overall size, significant share in most of the markets we track in this report, excellent brand strength (not just in security, but in nearly all areas of their business, including networking and communications) and comprehensive product portfolio help them stay ahead of the pack. They have also been involved in developing security solutions for data centers and other virtualized environments for several years, and as the market for security solutions starts to move toward virtualized solutions, they’re positioned to take advantage of the transition. In addition to the products, they have a strong threat research and intelligence capability, and buyer perception of security vendors moving forward will be significantly influenced by how deeply involved in conducting threat research and publishing meaningful threat reports, which Cisco is placing serious resources behind. We expect this investment will pay off in the future, helping keep the survey-based scores in this report high. They do have some key issues to confront over the next several years; multiple acquisitions have left them with a mountain of technology and products to rationalize. They need to carefully streamline their product offering so they put their best foot forward (with the right product) in each product segment. This means resolving overlaps between existing Cisco products and the Sourcefire products they acquired and finding ways to integrate the new advanced threat protection platforms they’ve acquired recently into their overall product portfolio. Complex product portfolios are challenging for customers and resellers and can cause decision-making delays and create openings for the competition. Bottom Line Cisco is the clear leader in the network and content security space, and we don’t expect this to change in the next year, but the lead isn’t necessarily insurmountable. Unfortunately for the competition, it will take some ingredients that are hard to acquire to pass Cisco; namely the brand strength and strong financials that come with being one of the largest networking and telecom equipment suppliers in the world—a supplier that also happens to be interested in building market-leading security solutions. BOTTOM LINE The network and content security space is complex; there are many vendors and countless market forces all pushing and pulling on those vendors. Though Cisco has stiff competition in a variety of the criteria we cover in this report, they have a strong lead in market share (their revenue is more than 2.5x their next closest competitor’s) that should keep them on top for the next year. They might not be toppled, but there are more than a few vendors (namely Palo Alto, Fortinet, and Check Point) eating into their growth potential, and some wildcard vendors have built disruptive product portfolios that could lead to explosive growth in revenue and increases in their scores in future versions of this report.
  • 10. 8 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. METHODOLOGY This scorecard includes Blue Coat, Check Point, Cisco, Dell SonicWALL, Fortinet, Juniper, McAfee, and Palo Alto Networks; these are the top 8 network and content security vendors, each with $240M or more in 2013 network and content security product revenue and significant product offerings in network (integrated security appliances, IDS/IPS, SSL VPN, DDoS) and content (web and mail) security. We evaluate the top 8 vendors in 8 criteria using actual data and metrics. For each criterion, we scored vendors on a 5-point scale, with 1 being the lowest possible score, 3 being an average score, and 5 being a perfect score. Specifically, we evaluated vendors on the following: ● Market share and market share momentum: a measure of how successfully a company has penetrated its target markets; having significant market share creates awareness with buyers, improves scale, and reassures buyers that companies are here to stay for the long term; some RFPs require vendors to meet certain market share thresholds to ensure vendor viability; successful vendors will have above-average market share that is increasing year over year ● Market share: vendors’ percentage share of network and content security product revenue ● Market share momentum: changes in revenue market share over time ● Financials: an analysis of a vendor’s financials; a strong financial position improves long-term viability and allows a company to stay ahead of the competition by investing in R&D and/or acquiring other companies/technologies; we base the score on the Altman Z-score non-manufacturing model ● Solution breadth: a measure of how many network and content security product segments a vendor addresses; a broader solution set improves a vendor's potential and efficiency of its operations and allows it to differentiate by innovating across segments; we calculated scores based on whether a vendor participates in a given sub-segment of the market, and its relative revenue contribution to the overall market ● Buyer feedback on security, technology innovation, product reliability, and service/support: assessments of a vendor’s performance by buyers, based on interviews we conduct with hundreds of end-users every year Based on the scores for each of the 8 criteria, we created a single composite vendor score, using the same 5- point scale, and weighted the individual criterion based on its importance in the buying process.
  • 11. 9 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. The information in this report is based on findings from multiple Infonetics Research services, including: ● Market share, size, and forecasts ● Network Security Appliances and Software Quarterly Worldwide and Regional Market Share, Size, and Forecasts ● Content Security Gateway Appliances, Software, and SaaS Quarterly Worldwide and Regional Market Share, Size, and Forecasts ● DDoS Prevention Appliances Quarterly Worldwide and Regional Market Share, Size, and Forecasts ● Survey-based research ● Next Generation Threat Prevention Strategies and Vendor Leadership: North American Enterprise Survey ● Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey
  • 12. 10 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. REPORT AUTHOR Jeff Wilson Principal Analyst, Security Infonetics Research +1 408.583.3337 | jeff@infonetics.com Twitter: @securityjeff ABOUT INFONETICS RESEARCH Infonetics Research is an international market research and consulting analyst firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete more effectively. REPORT REPRINTS AND CUSTOM RESEARCH To learn about distributing excerpts from Infonetics reports or custom research, please contact: North America (West) and Asia Pacific Larry Howard, Vice President, larry@infonetics.com, +1 408.583.3335 North America (East, Midwest, Texas), Latin America and EMEA Scott Coyne, Senior Account Director, scott@infonetics.com, +1 408.583.3395 Greater China and Southeast Asia 大中华区及东南亚地区 Jeffrey Song, Market Analyst 市场分析师及客户经理jeffrey@infonetics.com, +86 21.3919.8505