Our Enterprise Security Practice (ESP) covers information and analysis on the latest developments in the area of enterprise IT security and insight on the established and up and coming technology firms in the security sector. Learn more...
Market Insight Reports - Enterprise Security
Vendors and users are unable to agree on which security features are most important, but both feel that security products need to provide centralized reporting capabilities. However, definitions and expectations of 'actionable' vary wildly.Javvad Malik
Encryption is sexy again. Veteran encryption provider Vormetric intends to capitalize on this newfound popularity with the introduction of field-level application encryption.Garrett Bekker
Sophos recently bought India-based network security vendor Cyberoam. From a technological perspective, the company might not have obtained anything beyond its own capabilities, but it does gain immediate, deeper access to Asia and the Middle East.Javvad Malik Brenon Daly
ForeScout is known for NAC, even though 40% of its customers don't buy CounterACT for policy enforcement. Learn more about how Vistaprint found success with the product in an area it didn't originally anticipate.Adrian Sanabria
The company looks to further its position in the market with its latest offering – QRadar Incident Forensics – to make intelligence operational and give analysts a tool to streamline the incident-response process.Javvad Malik
The company is looking beyond its SMB roots with a growing IAM portfolio focused on ease of use, rapid deployment and tangible ROI, designed to appeal to both large and small customers.Garrett Bekker
To be a successful defender, you have to think like the adversary, but it takes a special kind of hacker to mess with him. White Ops turns the attack/defense dynamic on its head for great justice.Wendy Nather
In another case of 'know your code,' EDA and semiconductor design player Synopsys reaches for software testing and quality vendor Coverity.Jay Lyman Brenon Daly
With its InSight Platform for continuous automated incident resolution, the company believes it has the perfect blend of technology and expertise to offer automated and integrated real-time threat visibility, analysis, response and resolution.Javvad Malik
To address the potential accidental or malicious weaknesses that can be present within HSMs, Cryptosense offers Cryptosense Analyzer, which is designed to automate the security analysis of cryptographic interfaces.Javvad Malik
Long Form Reports - Enterprise Security
As the arms race escalates between attacker and defender, organizations are trying to make more informed risk decisions and prioritize their responses. This means intelligence - and not just more data, but better information behind it. The threat-intelligence market has blossomed in the past year, but is still inchoate and confusing to vendors and customers alike. This report provides an overview of the many facets of threat-intelligence products and services, identifies major trends and looks at the market size and M&A implications.
Enterprises spend huge sums of money on security products with the best intentions as businesses are under constant attack. But much of this investment is wasted - not due to flaws in product functionality, but because many of these products are never used at all. The growing volume of unused enterprise security products, or 'security shelfware,' is becoming a major problem for both buyers and sellers of technology alike. This report examines the root causes of shelfware and what can be done to avoid it from both the user and vendor perspectives.
Chris Hazelton Katy Ring
IT departments must either develop competency in mobility or outsource mobile deployments to a managed service provider - an important strategic decision regarding a company's money, time and other resources. At a time when IT budgets are stagnant and there is pressure to do more with less, outsourcing becomes increasingly attractive. This report examines the economic and strategic reasons why IT departments will look for external help to deal with the challenges of mobility. It also profiles key managed service providers, including systems integrators, network service providers and hardware vendors.
Enterprise mobility is turning a page in its evolution whereby organizations are grappling with issues of deployment and management of apps across both employee-owned and corporate-liable devices. This second part of our report on app lifecycle management examines the various steps and approaches in deploying, managing and securing mobile apps.
The lines between backup/recovery, DR and business continuity are blurring as vendors combine these functions via integrated products and cloud-based services. This report examines the forces driving the trend toward cloud-based data protection and reviews key technologies and representative vendors. It also provides market sizing and predictions, as well as evaluation criteria for vendors, products or services.
Whether you're launching an enterprise security effort or maintaining an existing program, one critical question looms: How do you know when you've done enough – which technologies and processes are required for effective security, not just compliance? This report examines what 'conventional wisdom' prescribes in terms of security product types, and prices them for a 1,000-person organization.
The ‘Identities of Data’ concept that we introduce in this report is intended to provide a framework to respond to the current requirements for greater integration between identity management, data classification and encryption.
Working from survey data and extensive interviews of information security executives by 451 Research service TheInfoPro, we have analyzed some of the most interesting trends to complement vendor analysis by the 451 Enterprise Security Practice team. The result is a multidimensional view of the security industry.
The application security market is growing in several directions, and although it still receives much less spending than other types of IT security, it is hitting the mainstream in a big way, due in part to the awareness raised by widespread attacks from Anonymous, LulzSec, AntiSec and other chaotic actors. In this report, we look at application security from the perspective of an enterprise that is developing its own software or acquiring it from a third party: which products would work best at different stages?
The federal cyber-security space is becoming a hotbed of incubation, acquisition and opportunity, but how to sell into this complicated market has remained a mystery to many vendors. This report examines and explains the myriad opportunities and related monies made available to vendors by the cyber-security concerns of the government, military and intelligence communities.
Upcoming Long Form Reports - Enterprise Security
There are currently no reports for this category.