Log InTrial Access

Enterprise Security Dashboard

Our Enterprise Security Practice (ESP) covers information and analysis on the latest developments in the area of enterprise IT security and insight on the established and up and coming technology firms in the security sector.  Learn more...

Market Insight Reports - Enterprise Security

MIS Impact Report - April 17, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
Incident response, investigations and forensics are the new hot topics. DFLabs is poised to capitalize on the market opportunity with the IncMan Suite, an advanced data breach, incident and investigation management platform.
Javvad Malik     
MIS Impact Report - April 16, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
The Internet's oldest professions, phishing and malware, are continual problems for any organization trying to protect its brand. Malcovery aims to be the one-stop shop for in-depth intelligence on this and other email-borne threats.
Wendy Nather     
MIS Impact Report - April 11, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
The Los Angeles-based startup launched in October 2013 with an approach that tries to split the difference between the rock and the hard place. Dubbing it 'application security as a service,' the company is getting the attention of some big customers.
Wendy Nather     
TDM Deal Analysis - April 9, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
Following the acquisition in November of ID card provider INTRAPROC, neXus has picked up application whitelisting vendor SE46. Both deals are intended to further neXus' goal of becoming a one-stop shop for converged physical and logical access control.
Garrett Bekker     
MIS Impact Report - April 9, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
Encryption is hard. Gazzang has announced a family of encryption products for big data designed specifically for AWS that allows non-technical users to spin up and tear down new instances with pre-configured security settings.
Garrett Bekker     
MIS Spotlight - April 9, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
US Federal Trade Commission enforcement actions for privacy violations are nothing new, but an April 7, 2014, federal court decision in FTC v. Wyndham Worldwide Corp bolsters the FTC's power to punish corporations for data breaches on their networks.
David Horrigan     
MIS Impact Report - April 8, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
Users and clicking are like bears and honey - no matter how many times they get stung, they can't resist going back for more. Spikes Security aims to address this issue by not just hardening the browser, but by removing it from the endpoint entirely.
Adrian Sanabria     
MIS Impact Report - April 8, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
In an effort to get in the door of companies that say they don't need or can't afford monitoring technology, EventTracker has launched its EventTracker Cloud offering, which includes a version that contains a subset of the total functionality at no cost.
Javvad Malik     
MIS Spotlight - April 1, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
No more extensions; this is it for XP. Millions of systems still run it. One of the last rounds of security patches was just released for it. What happens now?
Adrian Sanabria     
MIS Impact Report - March 28, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
Thin is in again. Authentic8 is looking to address a range of browser-related threats with a unique combination of single sign-on and sandbox-based secure browsing that evokes memories of thin client computing.
Garrett Bekker     

Long Form Reports - Enterprise Security

Security QuarterlyFebruary 26, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      executive summary Executive Summary
As the arms race escalates between attacker and defender, organizations are trying to make more informed risk decisions and prioritize their responses. This means intelligence - and not just more data, but better information behind it. The threat-intelligence market has blossomed in the past year, but is still inchoate and confusing to vendors and customers alike. This report provides an overview of the many facets of threat-intelligence products and services, identifies major trends and looks at the market size and M&A implications.
Wendy Nather     

Security QuarterlyJanuary 14, 2014
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      executive summary Executive Summary
Enterprises spend huge sums of money on security products with the best intentions as businesses are under constant attack. But much of this investment is wasted - not due to flaws in product functionality, but because many of these products are never used at all. The growing volume of unused enterprise security products, or 'security shelfware,' is becoming a major problem for both buyers and sellers of technology alike. This report examines the root causes of shelfware and what can be done to avoid it from both the user and vendor perspectives.
Javvad Malik     

Security QuarterlyDecember 05, 2013
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      executive summary Executive Summary
IT departments must either develop competency in mobility or outsource mobile deployments to a managed service provider - an important strategic decision regarding a company's money, time and other resources. At a time when IT budgets are stagnant and there is pressure to do more with less, outsourcing becomes increasingly attractive. This report examines the economic and strategic reasons why IT departments will look for external help to deal with the challenges of mobility. It also profiles key managed service providers, including systems integrators, network service providers and hardware vendors.
Chris Hazelton     Katy Ring     

Security QuarterlyJune 20, 2013
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
Enterprise mobility is turning a page in its evolution whereby organizations are grappling with issues of deployment and management of apps across both employee-owned and corporate-liable devices. This second part of our report on app lifecycle management examines the various steps and approaches in deploying, managing and securing mobile apps.
Vishal Jain     

Security QuarterlyApril 26, 2013
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
The lines between backup/recovery, DR and business continuity are blurring as vendors combine these functions via integrated products and cloud-based services. This report examines the forces driving the trend toward cloud-based data protection and reviews key technologies and representative vendors. It also provides market sizing and predictions, as well as evaluation criteria for vendors, products or services.


Security QuarterlyApril 03, 2013
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
Whether you're launching an enterprise security effort or maintaining an existing program, one critical question looms: How do you know when you've done enough – which technologies and processes are required for effective security, not just compliance? This report examines what 'conventional wisdom' prescribes in terms of security product types, and prices them for a 1,000-person organization.


Security QuarterlyMarch 28, 2012
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
The ‘Identities of Data’ concept that we introduce in this report is intended to provide a framework to respond to the current requirements for greater integration between identity management, data classification and encryption.


Security QuarterlyFebruary 21, 2012
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
Working from survey data and extensive interviews of information security executives by 451 Research service TheInfoPro, we have analyzed some of the most interesting trends to complement vendor analysis by the 451 Enterprise Security Practice team. The result is a multidimensional view of the security industry.


Security QuarterlyAugust 12, 2011
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
The application security market is growing in several directions, and although it still receives much less spending than other types of IT security, it is hitting the mainstream in a big way, due in part to the awareness raised by widespread attacks from Anonymous, LulzSec, AntiSec and other chaotic actors. In this report, we look at application security from the perspective of an enterprise that is developing its own software or acquiring it from a third party: which products would work best at different stages?


Security QuarterlyApril 27, 2011
no access
You do not have access to this report. Log in or contact Client Services at client.services@451research.com
      download report Buy Now    executive summary Executive Summary
The federal cyber-security space is becoming a hotbed of incubation, acquisition and opportunity, but how to sell into this complicated market has remained a mystery to many vendors. This report examines and explains the myriad opportunities and related monies made available to vendors by the cyber-security concerns of the government, military and intelligence communities.


Upcoming Long Form Reports - Enterprise Security

There are currently no reports for this category.


 

Subscribers

Forgotten password?

Not a Subscriber

Apply for a trial account today to obtain access to insight from 451 Research analysts worldwide and experience our products and services first hand.

Apply → Close

Browse By Sector

Select a sector from the list below.

Close
loading
Sector Browser Loading.

Subscribers

Forgotten password?

Not a Subscriber

Apply for a trial account today to obtain access to insight from 451 Research analysts worldwide and experience our products and services first hand.

Apply → Close