SlideShare a Scribd company logo
1 of 17
Download to read offline
NGIPS:  MARKET  DRIVERS,  
ARCHITECTURE,  AND  NSS  
TEST  RESULTS
NSS	
  Labs	
  Research	
  
November	
  12,	
  2015
Jason	
  Pappalexis
Research	
  Director
Andrew	
  Braunberg
Research	
  VP	
  
Thomas	
  Skybakmoen
Research	
  VP
Slide	
  2
NSS  Labs
The	
  World’s	
  Leading	
  Security	
  Insight	
  Company	
  
Slide	
  3
NSS  Labs  Experts
Andrew	
  Braunberg
Research	
  VP	
  
Jason	
  Pappalexis
Research	
  Director
Thomas	
  Skybakmoen
Research	
  VP
Slide	
  4
Agenda
• The	
  Need	
  for	
  Independent	
  Testing
• NGIPS	
  Definition
• Market	
  and	
  Market	
  Drivers
• Architectural	
  &	
  Deployment
• NGIPS	
  Group	
  Test	
  
• Methodology
• Results
• NGIPS:	
  Why	
  invest	
  in	
  this	
  technology?
• Q&A
Slide	
  5
Trust  me  …  I'm  a  security  vendor
Slide	
  6
Unmatched  Security  Testing  Expertise
Slide	
  7
NGIPS  Defined
Key	
  Next	
  Generation	
  Characteristics
Traditional	
  IPS	
  Plus:
• Application	
  Control	
  
• User	
  Identification	
  
• Threat	
  Intelligence	
  Integration
User	
  
Identification
Application	
  
Control
Reputation
Slide	
  8
State  of  the  Market  (CY2014)
• Market	
  Size
• US$1.40B	
  in	
  2014
• US$1.46B	
  in	
  2015	
  (NSS	
  est.)
• Current	
  buyers
• Large	
  Enterprise	
  made	
  up	
  
46%	
  of	
  sales	
  in	
  2014
• Evolving	
  market	
  
requirements
PLACEHOLDER	
  for	
  
Pie	
  Chart	
  with	
  Market	
  
Share	
  leaders
Slide	
  9
Three  Key  Market  Drivers
1. Security	
  effectiveness	
  
• Increasingly	
  complex	
  threat	
  landscape
2. Improve	
  security	
  workflow
• Integration	
  with	
  signatureless products,	
  SIEM,	
  incident	
  response
3. Architecture
• Internal	
  data	
  center	
  traffic	
  +	
  Perimeter
Slide	
  10
• Deployment	
  options
• Complexity
• Protocol	
  support
• Network	
  and	
  Endpoint
• Adjacent	
  technology
Architecture  &  Deployment
Slide	
  11
Group  Test  Results  :  Definitions
TCO
• Purchase
• Maintenance	
  -­‐ incl.	
  subscription	
  fees
• Administration	
  – incl.	
  installation	
  and	
  tuning
Security	
  Effectiveness
• Equation:	
  (Exploit	
  Block	
  Rate)	
  x	
  (Evasions)	
  x	
  (Stability	
  and	
  Reliability)
TCO	
  per	
  Protected	
  Mbps
• Equation:	
  (3-­‐Year	
  TCO)/(Security	
  Effectiveness	
   x	
  NSS	
  Tested	
  Throughput)
Slide	
  12
Group  Test  Results:  Protection  and  TCO
Map	
  TCO	
  per	
  Protected	
  Mbps	
  against	
  Security	
  Effectiveness	
  
• Further	
  up	
  and	
  right	
  is	
  best	
  — results	
  can	
  be	
  surprising!
Slide	
  13
Group  Test  Results:  Breakdown
• Security
• NGIPS	
  protection	
  ranged	
  from	
  86.6%	
  to	
  99.5%	
  
for	
  overall	
  security	
  effectiveness.
• Average	
  Security	
  Effectiveness	
  Rating	
  96.3%
• Evasion	
  effectiveness 100%
• Performance
• Throughput	
  2,973	
  Mbps	
  to	
  24,194	
  Mbps
• Total	
  Cost	
  of	
  Ownership	
  (TCO)
• 3-­‐year	
  TCO	
  ranged	
  from	
  $68,596	
  to	
  $489,236
• Average	
  3-­‐year	
  TCO	
  was	
  $253,213
• TCO per	
  Protected	
  Mbps
• TCO	
  per	
  Protected	
  Mbps	
  ranged	
  from	
  5	
  to	
  25
• Average	
  TCO	
  per	
  Protected	
  Mbps	
  was	
  US$20
Slide	
  14
2015  NGIPS  Group  Test  Results
NGIPS  v2.0
Slide	
  15
NGIPS:  Worth  the  Investment  to  You?
• Architecturally	
  straightforward
• Signature-­‐based	
  +	
  Signatureless technologies	
  
• Designed	
  to	
  perform	
  at	
  line-­‐rate
• Total	
  cost	
  of	
  ownership
• Becoming	
  part	
  of	
  overall	
  platform:	
  Perimeter,	
  Internal,	
  Agent
Slide	
  16
In-­‐Depth  Research  
Market	
  Analysis
Buyers	
  Guide
Company	
  Reports
Technical	
  Briefs Test	
  Reports
Comparatives	
  Reports
• Security	
  Value	
  Map	
  
• TCO	
  
• Security	
  
• Performance
Product	
  Test	
  Reports
Thank  you  for  your  interest!
www.nsslabs.com/reports

More Related Content

Similar to NGIPS: Market Drivers, Architecture, and NSS Test Results

InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsVMware Tanzu
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixJohn Yeoh
 
Have your cake and eat it too: Trackers with lowest cost of ownership and hi...
Have your cake and eat it too:  Trackers with lowest cost of ownership and hi...Have your cake and eat it too:  Trackers with lowest cost of ownership and hi...
Have your cake and eat it too: Trackers with lowest cost of ownership and hi...Array Technologies, Inc.
 
APM Best Practices - Reliability Added Value
APM Best Practices - Reliability Added ValueAPM Best Practices - Reliability Added Value
APM Best Practices - Reliability Added ValueStork
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020Brian Levine
 
Null application security in an agile world
Null application security in an agile worldNull application security in an agile world
Null application security in an agile worldStefan Streichsbier
 
First bankcard presentation 3.3.15
First bankcard presentation 3.3.15First bankcard presentation 3.3.15
First bankcard presentation 3.3.15Julie McDonald
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...Amazon Web Services
 
Six Sigma Yellow Belt Training
Six Sigma Yellow Belt TrainingSix Sigma Yellow Belt Training
Six Sigma Yellow Belt TrainingInvensis Learning
 
Marlabs capabilities overview: cloud services
Marlabs capabilities overview: cloud servicesMarlabs capabilities overview: cloud services
Marlabs capabilities overview: cloud servicesMarlabs
 
Webinar: 5 Steps To The Perfect Storage Refresh
Webinar: 5 Steps To The Perfect Storage RefreshWebinar: 5 Steps To The Perfect Storage Refresh
Webinar: 5 Steps To The Perfect Storage RefreshStorage Switzerland
 
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon London 2017: Threat modeling in a CI environment by Steven WierckxDevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon London 2017: Threat modeling in a CI environment by Steven WierckxDevSecCon
 
Cloud computing pricing models
Cloud computing pricing modelsCloud computing pricing models
Cloud computing pricing modelsHadi Fadlallah
 
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureEnergySec
 

Similar to NGIPS: Market Drivers, Architecture, and NSS Test Results (20)

InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
 
Have your cake and eat it too: Trackers with lowest cost of ownership and hi...
Have your cake and eat it too:  Trackers with lowest cost of ownership and hi...Have your cake and eat it too:  Trackers with lowest cost of ownership and hi...
Have your cake and eat it too: Trackers with lowest cost of ownership and hi...
 
Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...
 
APM Best Practices - Reliability Added Value
APM Best Practices - Reliability Added ValueAPM Best Practices - Reliability Added Value
APM Best Practices - Reliability Added Value
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
LEFTERIS_PROJECT_FINAL
LEFTERIS_PROJECT_FINALLEFTERIS_PROJECT_FINAL
LEFTERIS_PROJECT_FINAL
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
 
Null application security in an agile world
Null application security in an agile worldNull application security in an agile world
Null application security in an agile world
 
First bankcard presentation 3.3.15
First bankcard presentation 3.3.15First bankcard presentation 3.3.15
First bankcard presentation 3.3.15
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
 
Six Sigma Yellow Belt Training
Six Sigma Yellow Belt TrainingSix Sigma Yellow Belt Training
Six Sigma Yellow Belt Training
 
Marlabs capabilities overview: cloud services
Marlabs capabilities overview: cloud servicesMarlabs capabilities overview: cloud services
Marlabs capabilities overview: cloud services
 
Webinar: 5 Steps To The Perfect Storage Refresh
Webinar: 5 Steps To The Perfect Storage RefreshWebinar: 5 Steps To The Perfect Storage Refresh
Webinar: 5 Steps To The Perfect Storage Refresh
 
Going cloud
Going cloudGoing cloud
Going cloud
 
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon London 2017: Threat modeling in a CI environment by Steven WierckxDevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
 
Cloud computing pricing models
Cloud computing pricing modelsCloud computing pricing models
Cloud computing pricing models
 
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

NGIPS: Market Drivers, Architecture, and NSS Test Results

  • 1. NGIPS:  MARKET  DRIVERS,   ARCHITECTURE,  AND  NSS   TEST  RESULTS NSS  Labs  Research   November  12,  2015 Jason  Pappalexis Research  Director Andrew  Braunberg Research  VP   Thomas  Skybakmoen Research  VP
  • 2. Slide  2 NSS  Labs The  World’s  Leading  Security  Insight  Company  
  • 3. Slide  3 NSS  Labs  Experts Andrew  Braunberg Research  VP   Jason  Pappalexis Research  Director Thomas  Skybakmoen Research  VP
  • 4. Slide  4 Agenda • The  Need  for  Independent  Testing • NGIPS  Definition • Market  and  Market  Drivers • Architectural  &  Deployment • NGIPS  Group  Test   • Methodology • Results • NGIPS:  Why  invest  in  this  technology? • Q&A
  • 5. Slide  5 Trust  me  …  I'm  a  security  vendor
  • 6. Slide  6 Unmatched  Security  Testing  Expertise
  • 7. Slide  7 NGIPS  Defined Key  Next  Generation  Characteristics Traditional  IPS  Plus: • Application  Control   • User  Identification   • Threat  Intelligence  Integration User   Identification Application   Control Reputation
  • 8. Slide  8 State  of  the  Market  (CY2014) • Market  Size • US$1.40B  in  2014 • US$1.46B  in  2015  (NSS  est.) • Current  buyers • Large  Enterprise  made  up   46%  of  sales  in  2014 • Evolving  market   requirements PLACEHOLDER  for   Pie  Chart  with  Market   Share  leaders
  • 9. Slide  9 Three  Key  Market  Drivers 1. Security  effectiveness   • Increasingly  complex  threat  landscape 2. Improve  security  workflow • Integration  with  signatureless products,  SIEM,  incident  response 3. Architecture • Internal  data  center  traffic  +  Perimeter
  • 10. Slide  10 • Deployment  options • Complexity • Protocol  support • Network  and  Endpoint • Adjacent  technology Architecture  &  Deployment
  • 11. Slide  11 Group  Test  Results  :  Definitions TCO • Purchase • Maintenance  -­‐ incl.  subscription  fees • Administration  – incl.  installation  and  tuning Security  Effectiveness • Equation:  (Exploit  Block  Rate)  x  (Evasions)  x  (Stability  and  Reliability) TCO  per  Protected  Mbps • Equation:  (3-­‐Year  TCO)/(Security  Effectiveness   x  NSS  Tested  Throughput)
  • 12. Slide  12 Group  Test  Results:  Protection  and  TCO Map  TCO  per  Protected  Mbps  against  Security  Effectiveness   • Further  up  and  right  is  best  — results  can  be  surprising!
  • 13. Slide  13 Group  Test  Results:  Breakdown • Security • NGIPS  protection  ranged  from  86.6%  to  99.5%   for  overall  security  effectiveness. • Average  Security  Effectiveness  Rating  96.3% • Evasion  effectiveness 100% • Performance • Throughput  2,973  Mbps  to  24,194  Mbps • Total  Cost  of  Ownership  (TCO) • 3-­‐year  TCO  ranged  from  $68,596  to  $489,236 • Average  3-­‐year  TCO  was  $253,213 • TCO per  Protected  Mbps • TCO  per  Protected  Mbps  ranged  from  5  to  25 • Average  TCO  per  Protected  Mbps  was  US$20
  • 14. Slide  14 2015  NGIPS  Group  Test  Results NGIPS  v2.0
  • 15. Slide  15 NGIPS:  Worth  the  Investment  to  You? • Architecturally  straightforward • Signature-­‐based  +  Signatureless technologies   • Designed  to  perform  at  line-­‐rate • Total  cost  of  ownership • Becoming  part  of  overall  platform:  Perimeter,  Internal,  Agent
  • 16. Slide  16 In-­‐Depth  Research   Market  Analysis Buyers  Guide Company  Reports Technical  Briefs Test  Reports Comparatives  Reports • Security  Value  Map   • TCO   • Security   • Performance Product  Test  Reports
  • 17. Thank  you  for  your  interest! www.nsslabs.com/reports