Our Enterprise Security Practice (ESP) covers information and analysis on the latest developments in the area of enterprise IT security and insight on the established and up and coming technology firms in the security sector. Learn more...
Market Insight Reports - Enterprise Security
Incident response, investigations and forensics are the new hot topics. DFLabs is poised to capitalize on the market opportunity with the IncMan Suite, an advanced data breach, incident and investigation management platform.Javvad Malik
The Internet's oldest professions, phishing and malware, are continual problems for any organization trying to protect its brand. Malcovery aims to be the one-stop shop for in-depth intelligence on this and other email-borne threats.Wendy Nather
The Los Angeles-based startup launched in October 2013 with an approach that tries to split the difference between the rock and the hard place. Dubbing it 'application security as a service,' the company is getting the attention of some big customers.Wendy Nather
Following the acquisition in November of ID card provider INTRAPROC, neXus has picked up application whitelisting vendor SE46. Both deals are intended to further neXus' goal of becoming a one-stop shop for converged physical and logical access control.Garrett Bekker
Encryption is hard. Gazzang has announced a family of encryption products for big data designed specifically for AWS that allows non-technical users to spin up and tear down new instances with pre-configured security settings.Garrett Bekker
US Federal Trade Commission enforcement actions for privacy violations are nothing new, but an April 7, 2014, federal court decision in FTC v. Wyndham Worldwide Corp bolsters the FTC's power to punish corporations for data breaches on their networks.David Horrigan
Users and clicking are like bears and honey - no matter how many times they get stung, they can't resist going back for more. Spikes Security aims to address this issue by not just hardening the browser, but by removing it from the endpoint entirely.Adrian Sanabria
In an effort to get in the door of companies that say they don't need or can't afford monitoring technology, EventTracker has launched its EventTracker Cloud offering, which includes a version that contains a subset of the total functionality at no cost.Javvad Malik
No more extensions; this is it for XP. Millions of systems still run it. One of the last rounds of security patches was just released for it. What happens now?Adrian Sanabria
Thin is in again. Authentic8 is looking to address a range of browser-related threats with a unique combination of single sign-on and sandbox-based secure browsing that evokes memories of thin client computing.Garrett Bekker
Long Form Reports - Enterprise Security
As the arms race escalates between attacker and defender, organizations are trying to make more informed risk decisions and prioritize their responses. This means intelligence - and not just more data, but better information behind it. The threat-intelligence market has blossomed in the past year, but is still inchoate and confusing to vendors and customers alike. This report provides an overview of the many facets of threat-intelligence products and services, identifies major trends and looks at the market size and M&A implications.
Enterprises spend huge sums of money on security products with the best intentions as businesses are under constant attack. But much of this investment is wasted - not due to flaws in product functionality, but because many of these products are never used at all. The growing volume of unused enterprise security products, or 'security shelfware,' is becoming a major problem for both buyers and sellers of technology alike. This report examines the root causes of shelfware and what can be done to avoid it from both the user and vendor perspectives.
Chris Hazelton Katy Ring
IT departments must either develop competency in mobility or outsource mobile deployments to a managed service provider - an important strategic decision regarding a company's money, time and other resources. At a time when IT budgets are stagnant and there is pressure to do more with less, outsourcing becomes increasingly attractive. This report examines the economic and strategic reasons why IT departments will look for external help to deal with the challenges of mobility. It also profiles key managed service providers, including systems integrators, network service providers and hardware vendors.
Enterprise mobility is turning a page in its evolution whereby organizations are grappling with issues of deployment and management of apps across both employee-owned and corporate-liable devices. This second part of our report on app lifecycle management examines the various steps and approaches in deploying, managing and securing mobile apps.
The lines between backup/recovery, DR and business continuity are blurring as vendors combine these functions via integrated products and cloud-based services. This report examines the forces driving the trend toward cloud-based data protection and reviews key technologies and representative vendors. It also provides market sizing and predictions, as well as evaluation criteria for vendors, products or services.
Whether you're launching an enterprise security effort or maintaining an existing program, one critical question looms: How do you know when you've done enough – which technologies and processes are required for effective security, not just compliance? This report examines what 'conventional wisdom' prescribes in terms of security product types, and prices them for a 1,000-person organization.
The ‘Identities of Data’ concept that we introduce in this report is intended to provide a framework to respond to the current requirements for greater integration between identity management, data classification and encryption.
Working from survey data and extensive interviews of information security executives by 451 Research service TheInfoPro, we have analyzed some of the most interesting trends to complement vendor analysis by the 451 Enterprise Security Practice team. The result is a multidimensional view of the security industry.
The application security market is growing in several directions, and although it still receives much less spending than other types of IT security, it is hitting the mainstream in a big way, due in part to the awareness raised by widespread attacks from Anonymous, LulzSec, AntiSec and other chaotic actors. In this report, we look at application security from the perspective of an enterprise that is developing its own software or acquiring it from a third party: which products would work best at different stages?
The federal cyber-security space is becoming a hotbed of incubation, acquisition and opportunity, but how to sell into this complicated market has remained a mystery to many vendors. This report examines and explains the myriad opportunities and related monies made available to vendors by the cyber-security concerns of the government, military and intelligence communities.
Upcoming Long Form Reports - Enterprise Security
There are currently no reports for this category.