451 Research - Biography

There was a problem loading this page. Please bring this to the notice of the site administrator

Reports by this Analyst

Can Identropy reboot identity management?
MIS Impact Report - August, 2012
Drawing on experience in identity management implementation best practices, Identropy aims to push a new model for the management of identities framed by business process and activity data and based on new design principles.
Thirst for cybersecurity technologies drives General Dynamics' Fidelis buy
TDM Deal Analysis - August, 2012
Fidelis' strategy revamp, which shifted the emphasis onto visibility and analysis for security operations and away from DLP, has paid off in the form of an acquisition by an SI that saw value in the target's federal penetration for its cybersecurity push.
Layer 7 targets enterprises with packaged mobile API gateway, as transition looms
MIS Impact Report - August, 2012
Implementing key chain sharing for mobile applications and proxying streaming protocols, Layer 7 is aiming to make early headway in an architectural transition.
Stormpath tackles identity for PaaS with services-based model
MIS Impact Report - August, 2012
Although the company just recently launched, and single-customer-facing applications is where it has seen traction, Stormpath could help shape the role that identity plays in the PaaS wars, and integration into the app development lifecycle.
CipherCloud extends encryption gateway to Gmail, Office365 and private cloud apps
MIS Impact Report - August, 2012
Moving into legal and compliance use cases, CipherCloud has expanded its connector library to Gmail and Office365 alongside a SDK for private cloud apps – reinforcing its ambitions to provide a security gateway for the distributed enterprise edge.
Oracle extends into cloud identity, mobile access, PIM and doubles down on governance
MIS Impact Report - July, 2012
Having ticked off a significant to-do list, Oracle has now turned its attention to tackling the trends transforming identity. Behind the scenes, however, an architectural shift is going on that the company hopes will entrench its enterprise IAM position.
The directory in the cloud shapes up, but what does the future hold?
MIS Spotlight - July, 2012
The launch of Microsoft's WAAD cloud directory has been seen as a turning point. Rather, it's a reflection of the concept of directory in the cloud becoming a reality, and points to a real architectural shift underway.
Dell makes its move on Quest to bolster software ambitions
TDM Deal Analysis - July, 2012
Hardly coming as a surprise, its takeout of Quest demonstrates that Dell has an appetite for management and security businesses to build out its software division. There are some complexities to navigate, but Dell has outlined a clear strategy.
CloudLock makes compliance, governance play for enterprise adoption of Google Docs, Drive
MIS Impact Report - June, 2012
Reinforcing its Google Apps footprint, CloudLock has extended the scope of its data-governance technology to Google Drive. The move is part of CloudLock's broader strategy to contend for the enterprise file share in the cloud.
Gazzang launches custodian vault as a service to contain key, security material sprawl
MIS Impact Report - June, 2012
Cloud encryption, virtualized datacenters, 'big data' systems, federation secure-token services and VM certificate proliferation exacerbate an operational headache that Gazzang is tackling through policy controls on keys stored in a secure vault.
The 'identities of data' meets the eroded enterprise: Will M&A ensue?
TDM Sector IQ - June, 2012
Mobile computing, file synchronization and SaaS are combining to erode enterprise IT topologies. Will the need to secure data in this new environment translate into M&A in the data governance, key management and information rights management sectors?
Varonis takes 'private cloud' approach to tackle file sync and mobile access
MIS Impact Report - June, 2012
Based on a cross-platform abstraction layer to provide a unified end-user experience for remote access and file synchronization, and a centralized mechanism for administrative controls, Varonis is making a claim on the reinvention of the file share.
Symplified targets cloud providers with identity as a service white-label 'underlay'
MIS Impact Report - June, 2012
Taking an arms-dealer approach aimed at cloud service providers to embed or bundle a set of identity services in a hybrid or on-premises model, Symplified has timing and market maturity on its side, but may have to progress beyond a packaged model.
Xceedium looks to AWS federal, technology partnership to underline hybridization controls
MIS Impact Report - June, 2012
The partnership and $12m infusion is a shot in the arm for Xceedium, and a useful tool for AWS to deepen penetration of the federal vertical by extending its security story.
BeyondTrust rolls out DLP integration, in reinvention of endpoint-security strategy
MIS Impact Report - June, 2012
Having rebranded and refined the endpoint data control technology it acquired some months ago, BeyondTrust is now framing the technology as part of a broader strategic realignment around endpoint security.
WatchDox rides mobile wave to reimagine file sharing with its persistent encryption
MIS Impact Report - May, 2012
With private equity giant and customer Blackstone leading a $9m funding round, WatchDox has assumed an enterprise-driven focus on file sharing, especially from mobile devices – with its long-term ambition transcending information rights management.
Cyber-Ark extends scope and granularity of DBA controls to reinforce monitoring push
MIS Impact Report - May, 2012
It's no secret that database servers are a prime target for cyber-criminals. Cyber-Ark is looking to burnish its database admin oversight and monitoring story with granular controls to complement database activity monitoring and firewalling.
CertiVox is aiming to reach the cloudy parts that PKI can't
MIS Impact Report - May, 2012
Building on mature elliptical curve cryptography and certificateless key management, CertiVox has built a platform that is aimed at providing key distribution functionality for the cloud. First up is security for cross-domain information sharing.
ForeScout and Fiberlink forge partnership to offer a tiered mobile security offering
MIS Impact Report - May, 2012
The two IT vendors have combined forces to offer ForeScout MDM, which is powered by Fiberlink's MaaS360 service. We explore the flexibility that these two cloud services provide IT.
April showers bring M&A flowers in BeyondTrust's acquisition of eEye
TDM Deal Analysis - May, 2012
Is the combination of eEye's vulnerability management and BeyondTrust's privilege management and endpoint controls a 'strength in numbers' play, or is it a transformative deal? Perhaps both: some financial alchemy and deeper security smarts.
RSA links up with Zscaler to emphasize Cloud Trust Authority risk management play
MIS Impact Report - April, 2012
The joint development project will federate ZScaler's session and device validation service with RSA's Cloud Trust Authority's authentication in the cloud for ongoing identity validation.
Porticor takes novel key management approach to secure private data in the public cloud
MIS Impact Report - April, 2012
Using technologies that are still new to commercial applications – split-key and homomorphic encryption – Porticor has set out to provide transparent control of data residing on public clouds like Amazon Web Services.
TITUS progresses toward hybrid approach to file classification, metadata exchange
MIS Impact Report - April, 2012
Long an advocate of user-driven classification of files and data, TITUS is now heading in the direction of a hybrid approach encapsulating metadata, establishing the potential to expand into the broader enterprise market
SecureAuth homes in on BYOD management and mobile app access
MIS Impact Report - April, 2012
BYOD creates IT management challenges including authentication from mobile devices and enrolling mobile devices within enterprise management infrastructure. SecureAuth is looking to play a broker role by tackling a challenging email use case.
Courion pushes out Access Insight to drive identity-centric risk analytics
MIS Impact Report - April, 2012
Amounting to what is an alpha release of the real-time access analytics running on top of its data warehousing capabilities, Courion is aiming to deliver on its strategy to revisiting the reason for identity and access management's existence.
Vaultive throws off the covers with funding, focus on Hosted Exchange data security
MIS Impact Report - March, 2012
Emerging from a lengthy stealth mode period, Vaultive can point to substantial funding, a new CEO and a focus on data security for Hosted Exchange. Can Vaultive balance revenue generation and demonstrate differentiated technology?
Okta intensifies focus on 'identity as a service' as market heats up with new entrants
MIS Impact Report - March, 2012
With plenty of VC on hand to fund its expansion plans and drive product development, Okta is getting drawn in more closely to identity-as-a-service opportunities, making for a subtle change in its strategy.
Ping Identity rolls out 'switch in the cloud' for federation as a service
MIS Impact Report - March, 2012
Built from the ground up, the PingOne bidirectional service leverages expertise in implementing identity standards, and is aimed at driving volume by removing heavy lifting for dynamic integration and synchronization. Has Ping found the right model?
EMC picks up file services partner and CIFS specialist Likewise
TDM Deal Analysis - March, 2012
The vendor's Data Domain and Isilon products both relied on Likewise's storage software stack for CIFS functionality. Will ownership of this asset provide EMC with a 'big data' storage boost?
CA targets SharePoint unstructured data access controls with DLP, IAM integration
MIS Impact Report - March, 2012
Aimed at providing dynamic access controls for unstructured data, the company has rolled out automated integration of classification from its DLP technology with granular access controls to CA SiteMinder. Hurdles still loom (but not only for CA).
SafeNet picks up Cryptocard to accelerate authentication-as-a-service ambitions
TDM Deal Analysis - March, 2012
Signaling that the company feels that the window of opportunity for authentication as a service is materializing faster than it could deliver on its own, SafeNet has reached for Cryptocard to fill out its portfolio.
Trustwave makes bold Web and cloud security play with M86 buy
TDM Deal Analysis - March, 2012
Making the first acquisition since its IPO plans were postponed, compliance-focused Trustwave has reached for security consolidator M86 Security. Can it effectively digest the deal, or has Trustwave bitten off more than it can chew?
Intel-McAfee links up identity-in-the-cloud SSO with salesforce.com
MIS Impact Report - March, 2012
The Intel Cloud SSO identity-as-a-service offering incorporates a bundled subscription model and the first step in an integration process with McAfee security functionality. Hooking into the McAfee sales organization may prove crucial.
Centrify embraces mobile in AD-centric ID consolidation platform, looks to cloud
MIS Market Development - February, 2012
Alongside the release that allows administrators to authenticate and control access from mobile sessions through existing AD infrastructure, Centrify is launching a cloud-based certificate service that could set the stage for identity as a service.
Lieberman reaches downmarket, looks to facelift for enterprise customers
MIS Market Development - February, 2012
Looking to cater to entry-level requirements for managing privileged accounts and to establish a footprint for later sales (and prevent others from seeding the market), the company is also in the midst of a platform update and console facelift.
Buoyed by compliance for Windows privilege management, Avecto eyes policy potential
MIS Market Development - February, 2012
With the latest release, the company looks to keep the momentum going for managing Windows enterprise privileges where compliance remains the impetus. Can it establish a broader security and management role based on this foundation?
Do e-banking authentication trends point to a bleak or bright future?
MIS Spotlight - February, 2012
With the deadline approaching for conformance with updated FFIEC regulations on multi-factor authentication, vendors have looked to better address use cases for transaction security and transaction signing. Will new demand foster innovation?
2012 M&A Outlook – Enterprise security
TDM Others - January, 2012
As part of our end-of-year series of M&A analysis, we look at the deals that mattered in 2011 and assess the prospects for the next 12 months in the enterprise security sector. Where will we see acquisitions, and who might be involved?
High Cloud Security unifies key management, storage networking in VM security play
MIS Impact Report - January, 2012
Taking an encryption approach that leans on storage networking to maintain a persistent association with a mobile VM image, High Cloud may be currently overshooting the market, but has come at the cloud security challenge with a fresh approach.
Microsoft and GE Healthcare team up with joint venture to crack healthcare IT nut
MIS Market Development - December, 2011
Healthcare IT shows enormous potential, but has its own dynamics and little history of interoperability and open systems. This new entity would be free of corporate constraints, with an integration story, but can it establish a new model?