02统一威胁管理UTMMagic Quadrant for Unified Threat Management.docx
- 文档编号:30170551
- 上传时间:2023-08-05
- 格式:DOCX
- 页数:27
- 大小:141.92KB
02统一威胁管理UTMMagic Quadrant for Unified Threat Management.docx
《02统一威胁管理UTMMagic Quadrant for Unified Threat Management.docx》由会员分享,可在线阅读,更多相关《02统一威胁管理UTMMagic Quadrant for Unified Threat Management.docx(27页珍藏版)》请在冰豆网上搜索。
02统一威胁管理UTMMagicQuadrantforUnifiedThreatManagement
MagicQuadrantforUnifiedThreatManagement
19July2013 ID:
G0*******
Analyst(s):
GregYoung, JeremyD'Hoinne
VIEWSUMMARY
Unifiedthreatmanagementdevicesprovidesmallormidsizebusinesseswithmultiplenetworksecurityfunctionsinasingleappliance.Buyersshouldfocusonperformancewheneverytargetedfeatureisenabled,andontotalcostofownershipinsteadofinitialpurchaseprice.
MarketDefinition/Description
Gartnerdefinestheunifiedthreatmanagement(UTM)marketasmultifunctionnetworksecurityproductsusedbysmallormidsizebusinesses(SMBs).Typically,midsizebusinesseshave100to1,000employees,withrevenuerangingfrom$50millionto$1billion.UTMproductsfortheSMBmarketmustprovidethefollowingfunctionsataminimum:
∙Standardnetworkstatefulfirewallfunctions
∙Remoteaccessandsite-to-sitevirtualprivatenetwork(VPN)support
∙SecureWebgateway(SWG)functionality(anti-malware,URLandapplicationcontrol)
∙Networkintrusionpreventionfocusedonworkstationprotection
AllUTMproductscontainvariousothersecuritycapabilities,suchasemailsecurity,Webapplicationfirewalls(WAFs)anddatalossprevention.However,thevastmajorityofSMBsonlyutilizethefirewall,intrusionpreventionandSWGfunctionalities.Theyalsorequestabasiclevelofapplicationcontrol,mostlytorestricttheuseofWebapplicationsandcloudservices(suchassocialmedia,filesharingandsoon).Featuresrelatedtothemanagementofmobiledevicescreateapotentiallyattractivedifferentiatorforthismarket(see"HowUnifiedThreatManagementTacklestheConsumerizationofIT").Browser-basedmanagement,basicembeddedreporting,andlocalizedsoftwareanddocumentation,whichdon'tappealtolargeenterprises,arehighlyvaluedbySMBsinthismarket.SMBsshouldevaluateUTMdevicesbasedonthecontrolstheywillactuallyuse,theperformancetheywillgetforthosefeatures,andthequalityofvendorandchannel(andmanagedservices)supportthatisavailable.
Giventhecontinuingeconomicuncertainty,mostSMBshavestrongITbudgetaryandstaffingconstraints.Thiscausesthemtohighlyvalueeaseofdeploymentanduse,stronglocalchannelsupport,andflexiblepricing.LeadingUTMvendorswill:
∙Beaggressiveandflexibleinpricing,reducingupfrontcosts,eliminatinghiddenfees,andensuringdurablesoftwareandhardwaresupport.
∙Focusonmidsizebusinesses'needfortherightnetworksecurityattherightprice,ratherthantryingtoupsellthemtoenterpriseproductsandcapabilities.
∙Provideproductmanagementfeaturesthatsimplifydeploymentandongoingoperations.
∙Makeiteasyforcustomerswithevolvingsecurityneedstoaddlicensestoexistingplatformsbyunifyingtheirsupportcontractrenewaldates.
∙Offerefficientvendortechnicalsupportandeasy-to-diagnosesystemstovalue-addedresellers(VARs),whichoftenhandlealargenumberofdeviceswithunderstaffedtechnicalteams.
∙Beearlytoaddnewsecurityfeaturesthatareshowingupasseparatepointproducts.
ManyUTMvendorsareheadingtowardtheconsoleandmanagementbeingfullyinthecloud.Gartnerbelievesthat,althoughit'sconvenientforthevendorstodoso,aportionoftheSMBmarketwillnotacceptthisexclusivelycloudmodelforreasonsoflatency,trust,andbeingabletoaccesstheconsolewhenunderattack.Reportingandlogretentionarewell-suitedtothecloud,butnotexclusively.
For2012,GartnerestimatesthatworldwiderevenueintheUTMmarkettotaledapproximately$1.53billion,whichrepresentsan18.7%growthoverourestimatefor2011(seeNote1).GartnerbelievesthattheUTMmarketwillcontinuetogrowfasterthanmanyothersecuritymarkets,butwealsoseeanumberoftrendsapplyingdownwardpressureonmarketgrowth.Regardless,weforecastcontinuedgrowthintheUTMmarketofapproximately15%compoundannualgrowthratethrough2018.
WeseethefollowingpositivetrendscontinuingtodrivegrowthintheUTMmarket:
∙Asteadynumberofnew,small(thatis,fewerthan100employees)organizations.
∙SMBsinemergingcountriesbuyingtheirfirstUTMproductstosecureincreasinglyfasterandmorehighlybusiness-criticalbroadbandInternetconnections.Thisscenariorepresents"greenfield"growthforthemarket—oftenwithapreferenceforcountryorregion-specificvendors.
∙Acontinuedrefreshoffirst-generationUTMproductsbySMBs—especiallymidsizebusinesses(100to999employees),andespeciallyinNorthAmericaandWesternEurope—duetoproductagingandthedemandforhigher-speedInternetconnectivity.Thisdemanddrivesthereplacementofexistingproductwiththeincumbent'snewerversion,orreplacementoftheincumbentbyacompetitor.
Sometrendswilllimitmarketgrowth:
∙Theincreaseduseofsmartphones,tabletsandeven4G-equippedlaptopsmovesmoresmallbusinessInternettraffictodirectconnectionstowirelessdataserviceproviders,asopposedtothroughUTMappliancestowiredInternetserviceproviders(ISPs).
∙Thepricingandfeaturesofcloud-basedSWGservices(see"MagicQuadrantforSecureWebGateways")areveryattractivetosmallbusinessesbecausetheyofferflexiblepricingandmeettheneedsforsecuringmobileusers.WhilemostofthoseservicesonlydealwithSecureSocketsLayer(SSL)andHTTPtraffic,theyrepresentmostoftheneedsofmanysmallbusinesses,andcanreducetheirUTMneedstoasimplefirewall/router.However,theSWGmarketissmallerthantheUTMmarketandfollowsaslightlyslowergrowth.
∙Theincreaseduseofcloud-basedemail(suchasGoogleAppsforBusinessorMicrosoftOffice365)reducesthedemandforemailsecurity,sincethoseservicesincludeintegratedemailantivirusfunctionality.
∙Aslower-midsizecompaniesgrowtobecomeupper-midsizeandenterprisesize,theirsecurityneedswillgetmorecomplex,andtheywilloutgrowtheirUTMappliancesanddeployenterprisenetworksecurityplatforms,suchasnext-generationfirewallsandSWGs.
Gartnerbelievesthatthedownwardtrendsnowbalancethepositivetrendsandmightputincreasedpressureonthemarketinthefuture,therebycausingustomaintainourUTMmarketgrowthforecastfromourpreviousoutlook.Thesetrendshavealsoledtolimitedentries/exitsofvendorsinto/fromthismarket.In2012,CassidianCyberSecurity,asubsidiaryoftheEADSGroup,acquiredNetasq.ArkoonNetworkSecurity,BarracudaNetworks,EndianandeSoftdidnotmeettheinclusioncriteria.
ReturntoTop
MagicQuadrant
Figure1. MagicQuadrantforUnifiedThreatManagement
Source:
Gartner(July2013)
ReturntoTop
VendorStrengthsandCautions
CheckPointSoftwareTechnologies
CheckPointSoftwareTechnologies isoneofthelargestpure-playsecuritycompanies,andhasbeenexpandingfromtheenterprisesecuritymarkettotheUTMmarketsince2004.CheckPointhasbeenveryactiveintheUTMsegment.Inthepast18months,ithastargetedSMBswithnewappliances(primarilythe600and1100series),withpartofaglobalproductlineupdate(referredtoasthe"2012appliances")andwiththereleaseofacommonoperatingsystem(OS)foreverysecuritygateway(GAiA).ItsSMBportfolionowincludes11appliancesandacloud-basedsecurityservice.FundamentaltoCheckPointfirewallofferingsisthesetofsoftwareoptionsreferredtoasSoftwareBlades.
Strengths
∙CheckPoint'sreportingandmanagementconsoleishighlyratedbymidsizecompanies.Knownprimarilyasanenterprisesecurityprovider,CheckPointhasexpandedintotheSMBspaceformidsizecompaniesthatareseekingpremiumfirewallproducts.
∙CheckPoint'sUTMsolutionsbenefitfromitsenterprise-levelsecurityfeatures,suchasThreatCloudandAnti-Bot.TheSoftwareBladesapproachallowsforcustomizationoffeatures.
∙SelectivedirectuserinvolvementwithitsUserChecktechnologyimprovessecurityawarenessandreducestheriskofpolicyinfringement.
∙TheconsolidationoftheapplianceportfolioandtheunificationofthedifferentSoftwareBladesundertheGAiAOSwilleasemaintenanceandreducethelearningcurveforSMBresellersandendusers.
∙CheckPointhasverystrongcapabilitiesforvirtualizedversionsandsecuringvirtualization.
Cautions
∙PriceisoftencitedastheprimaryreasonfornotselectingCheckPointsolutions.
∙CheckPointhasapproximately30differentSoftwareBlades.HavingsomanyoptionscreatesanoverlycomplexpricingschemeformanySMBsandsmallresellers,comparedwiththecompetition.Bladepackages,however,areavailableforthepurposeofsimplification.
ReturntoTop
Cisco
Cisco usesitsnetworkinfrastructureplacementsasanentreetobundleinadjunctsecuritysolutionsforSMBs.CisconowaddressesSMBswiththeISA500Seriesforsmallbusinesses(fourmodels),theASA5500-XSeriesformidsizecompanies(twomodels)andthecloud-managedMXseries(sixappliances)basedontheMerakisolutions(acquiredin2012).Inadditiontothededicatedsecuritysolutions,Ciscohasalargeportfolioofnetworksolutionsthatcanprovidesecurityfeatures,suchastheIntegratedServicesRouter(ISR).
Strengths
∙CiscosupportisratedwellbyGartnercustomers;itsentrenchmentinthenetworkinfrastructuremakesiteasytofindwell-trainedstafftosupportCiscosecurityimplementations.
∙TheISA500SeriesandASA5500-XSeriesshowfeatureimprovementscomparedwiththepreviousgenerationsofproducts;theremovaloftherequirementforhardwareadd-inmodulesforintrusionpreventionorcontentinspectionallowsthenewASAproductlinetocompetewithothermidsizeUTMdevices.
∙Thecloud-basedMXseriesprovidesaneasywaytocentrallymanagedistributedorganizationslookingforPCIcompliance.
∙Theintegrationof
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 02统一威胁管理UTMMagic Quadrant for Unified Threat Management 02 统一 威胁 管理 UTMMagic
链接地址:https://www.bdocx.com/doc/30170551.html