Log InTrial Access

Enterprise Security Dashboard

Our Enterprise Security Practice (ESP) covers information and analysis on the latest developments in the area of enterprise IT security and insight on the established and up and coming technology firms in the security sector.  Learn more...

Market Insight Reports - Enterprise Security

TDM Sector IQ - April 23, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
Firewall monitoring and management appeared about a decade ago as a much-needed solution to firewall sprawl. While the technology serves an important purpose, none of the vendors have grown much past $25m in annual revenue.
Javvad Malik     Scott Denne     
MIS Spotlight - April 22, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
This report gives an overview of the current state of the market in application security and how it has evolved in the past year – who's still playing, who's left the field, and who's new.
Wendy Nather     
MIS Impact Report - April 22, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
Since going private in 2007, SafeNet has sharpened its go-to-market strategy and product focus, with its HSMs as the centerpiece of a platform strategy intended to open up adjacent encryption opportunities in cloud, VMs and secure file sharing.
Garrett Bekker     
MIS Impact Report - April 21, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
The market for cloud orchestration and automation has taken off, and now it is security's turn. CloudPassage offers a mature offering, but newcomers in the market are catching up quickly, and there's plenty of room to grow.
Adrian Sanabria     
MIS Impact Report - April 21, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
Enterprises haven't been quick to adopt additional endpoint controls - very likely due to the strong influence of traditional antivirus vendors. Ziften's product aims to provide continuous monitoring and decrease incident resolution time.
Javvad Malik     
MIS Impact Report - April 17, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
The MSSP has announced its Advanced Endpoint Threat Detection service (powered by Bit9/Carbon Black), which extends its view into its customers' environment. We take a closer look.
Wendy Nather     
MIS Impact Report - April 17, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
Incident response, investigations and forensics are the new hot topics. DFLabs is poised to capitalize on the market opportunity with the IncMan Suite, an advanced data breach, incident and investigation management platform.
Javvad Malik     
MIS Impact Report - April 16, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
The Internet's oldest professions, phishing and malware, are continual problems for any organization trying to protect its brand. Malcovery aims to be the one-stop shop for in-depth intelligence on this and other email-borne threats.
Wendy Nather     
MIS Impact Report - April 11, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
The Los Angeles-based startup launched in October 2013 with an approach that tries to split the difference between the rock and the hard place. Dubbing it 'application security as a service,' the company is getting the attention of some big customers.
Wendy Nather     
TDM Deal Analysis - April 9, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
Following the acquisition in November of ID card provider INTRAPROC, neXus has picked up application whitelisting vendor SE46. Both deals are intended to further neXus' goal of becoming a one-stop shop for converged physical and logical access control.
Garrett Bekker     

Long Form Reports - Enterprise Security

Security QuarterlyFebruary 26, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      executive summary Executive Summary
As the arms race escalates between attacker and defender, organizations are trying to make more informed risk decisions and prioritize their responses. This means intelligence - and not just more data, but better information behind it. The threat-intelligence market has blossomed in the past year, but is still inchoate and confusing to vendors and customers alike. This report provides an overview of the many facets of threat-intelligence products and services, identifies major trends and looks at the market size and M&A implications.
Wendy Nather     

Security QuarterlyJanuary 14, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      executive summary Executive Summary
Enterprises spend huge sums of money on security products with the best intentions as businesses are under constant attack. But much of this investment is wasted - not due to flaws in product functionality, but because many of these products are never used at all. The growing volume of unused enterprise security products, or 'security shelfware,' is becoming a major problem for both buyers and sellers of technology alike. This report examines the root causes of shelfware and what can be done to avoid it from both the user and vendor perspectives.
Javvad Malik     

Security QuarterlyDecember 05, 2013
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      executive summary Executive Summary
IT departments must either develop competency in mobility or outsource mobile deployments to a managed service provider - an important strategic decision regarding a company's money, time and other resources. At a time when IT budgets are stagnant and there is pressure to do more with less, outsourcing becomes increasingly attractive. This report examines the economic and strategic reasons why IT departments will look for external help to deal with the challenges of mobility. It also profiles key managed service providers, including systems integrators, network service providers and hardware vendors.
Chris Hazelton     Katy Ring     

Security QuarterlyJune 20, 2013
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
Enterprise mobility is turning a page in its evolution whereby organizations are grappling with issues of deployment and management of apps across both employee-owned and corporate-liable devices. This second part of our report on app lifecycle management examines the various steps and approaches in deploying, managing and securing mobile apps.
Vishal Jain     

Security QuarterlyApril 26, 2013
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
The lines between backup/recovery, DR and business continuity are blurring as vendors combine these functions via integrated products and cloud-based services. This report examines the forces driving the trend toward cloud-based data protection and reviews key technologies and representative vendors. It also provides market sizing and predictions, as well as evaluation criteria for vendors, products or services.


Security QuarterlyApril 03, 2013
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
Whether you're launching an enterprise security effort or maintaining an existing program, one critical question looms: How do you know when you've done enough – which technologies and processes are required for effective security, not just compliance? This report examines what 'conventional wisdom' prescribes in terms of security product types, and prices them for a 1,000-person organization.


Security QuarterlyMarch 28, 2012
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
The ‘Identities of Data’ concept that we introduce in this report is intended to provide a framework to respond to the current requirements for greater integration between identity management, data classification and encryption.


Security QuarterlyFebruary 21, 2012
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
Working from survey data and extensive interviews of information security executives by 451 Research service TheInfoPro, we have analyzed some of the most interesting trends to complement vendor analysis by the 451 Enterprise Security Practice team. The result is a multidimensional view of the security industry.


Security QuarterlyAugust 12, 2011
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
The application security market is growing in several directions, and although it still receives much less spending than other types of IT security, it is hitting the mainstream in a big way, due in part to the awareness raised by widespread attacks from Anonymous, LulzSec, AntiSec and other chaotic actors. In this report, we look at application security from the perspective of an enterprise that is developing its own software or acquiring it from a third party: which products would work best at different stages?


Security QuarterlyApril 27, 2011
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
The federal cyber-security space is becoming a hotbed of incubation, acquisition and opportunity, but how to sell into this complicated market has remained a mystery to many vendors. This report examines and explains the myriad opportunities and related monies made available to vendors by the cyber-security concerns of the government, military and intelligence communities.


Upcoming Long Form Reports - Enterprise Security

There are currently no reports for this category.


 

Subscribers

Forgotten password?

Not a Subscriber

Apply for a trial account today to obtain access to insight from 451 Research analysts worldwide and experience our products and services first hand.

Apply → Close

Browse By Sector

Select a sector from the list below.

Close
loading
Sector Browser Loading.

Subscribers

Forgotten password?

Not a Subscriber

Apply for a trial account today to obtain access to insight from 451 Research analysts worldwide and experience our products and services first hand.

Apply → Close