Our Enterprise Security Practice (ESP) covers information and analysis on the latest developments in the area of enterprise IT security and insight on the established and up and coming technology firms in the security sector. Learn more...
Market Insight Reports - Enterprise Security
Firewall monitoring and management appeared about a decade ago as a much-needed solution to firewall sprawl. While the technology serves an important purpose, none of the vendors have grown much past $25m in annual revenue.Javvad Malik Scott Denne
This report gives an overview of the current state of the market in application security and how it has evolved in the past year – who's still playing, who's left the field, and who's new.Wendy Nather
Since going private in 2007, SafeNet has sharpened its go-to-market strategy and product focus, with its HSMs as the centerpiece of a platform strategy intended to open up adjacent encryption opportunities in cloud, VMs and secure file sharing.Garrett Bekker
The market for cloud orchestration and automation has taken off, and now it is security's turn. CloudPassage offers a mature offering, but newcomers in the market are catching up quickly, and there's plenty of room to grow.Adrian Sanabria
Enterprises haven't been quick to adopt additional endpoint controls - very likely due to the strong influence of traditional antivirus vendors. Ziften's product aims to provide continuous monitoring and decrease incident resolution time.Javvad Malik
The MSSP has announced its Advanced Endpoint Threat Detection service (powered by Bit9/Carbon Black), which extends its view into its customers' environment. We take a closer look.Wendy Nather
Incident response, investigations and forensics are the new hot topics. DFLabs is poised to capitalize on the market opportunity with the IncMan Suite, an advanced data breach, incident and investigation management platform.Javvad Malik
The Internet's oldest professions, phishing and malware, are continual problems for any organization trying to protect its brand. Malcovery aims to be the one-stop shop for in-depth intelligence on this and other email-borne threats.Wendy Nather
The Los Angeles-based startup launched in October 2013 with an approach that tries to split the difference between the rock and the hard place. Dubbing it 'application security as a service,' the company is getting the attention of some big customers.Wendy Nather
Following the acquisition in November of ID card provider INTRAPROC, neXus has picked up application whitelisting vendor SE46. Both deals are intended to further neXus' goal of becoming a one-stop shop for converged physical and logical access control.Garrett Bekker
Long Form Reports - Enterprise Security
As the arms race escalates between attacker and defender, organizations are trying to make more informed risk decisions and prioritize their responses. This means intelligence - and not just more data, but better information behind it. The threat-intelligence market has blossomed in the past year, but is still inchoate and confusing to vendors and customers alike. This report provides an overview of the many facets of threat-intelligence products and services, identifies major trends and looks at the market size and M&A implications.
Enterprises spend huge sums of money on security products with the best intentions as businesses are under constant attack. But much of this investment is wasted - not due to flaws in product functionality, but because many of these products are never used at all. The growing volume of unused enterprise security products, or 'security shelfware,' is becoming a major problem for both buyers and sellers of technology alike. This report examines the root causes of shelfware and what can be done to avoid it from both the user and vendor perspectives.
Chris Hazelton Katy Ring
IT departments must either develop competency in mobility or outsource mobile deployments to a managed service provider - an important strategic decision regarding a company's money, time and other resources. At a time when IT budgets are stagnant and there is pressure to do more with less, outsourcing becomes increasingly attractive. This report examines the economic and strategic reasons why IT departments will look for external help to deal with the challenges of mobility. It also profiles key managed service providers, including systems integrators, network service providers and hardware vendors.
Enterprise mobility is turning a page in its evolution whereby organizations are grappling with issues of deployment and management of apps across both employee-owned and corporate-liable devices. This second part of our report on app lifecycle management examines the various steps and approaches in deploying, managing and securing mobile apps.
The lines between backup/recovery, DR and business continuity are blurring as vendors combine these functions via integrated products and cloud-based services. This report examines the forces driving the trend toward cloud-based data protection and reviews key technologies and representative vendors. It also provides market sizing and predictions, as well as evaluation criteria for vendors, products or services.
Whether you're launching an enterprise security effort or maintaining an existing program, one critical question looms: How do you know when you've done enough – which technologies and processes are required for effective security, not just compliance? This report examines what 'conventional wisdom' prescribes in terms of security product types, and prices them for a 1,000-person organization.
The ‘Identities of Data’ concept that we introduce in this report is intended to provide a framework to respond to the current requirements for greater integration between identity management, data classification and encryption.
Working from survey data and extensive interviews of information security executives by 451 Research service TheInfoPro, we have analyzed some of the most interesting trends to complement vendor analysis by the 451 Enterprise Security Practice team. The result is a multidimensional view of the security industry.
The application security market is growing in several directions, and although it still receives much less spending than other types of IT security, it is hitting the mainstream in a big way, due in part to the awareness raised by widespread attacks from Anonymous, LulzSec, AntiSec and other chaotic actors. In this report, we look at application security from the perspective of an enterprise that is developing its own software or acquiring it from a third party: which products would work best at different stages?
The federal cyber-security space is becoming a hotbed of incubation, acquisition and opportunity, but how to sell into this complicated market has remained a mystery to many vendors. This report examines and explains the myriad opportunities and related monies made available to vendors by the cyber-security concerns of the government, military and intelligence communities.
Upcoming Long Form Reports - Enterprise Security
There are currently no reports for this category.