SlideShare a Scribd company logo
1 of 5
Symantec owns the security software, but a slew of competitors are vying to gain share away from the
market leader, according to the 2009 CRN Channel Contenders survey. The research sought to identify
the top vendors that solution providers choose as alternatives to market leaders. Here's a look at the top
10 contenders chosen by VARs.




Microsoft

Software giant Microsoft led the pack of channel contenders in the security software category. Microsoft
attributes its rise in the security space to a philosophy that promotes comprehensive integrated security,
as opposed to security that is "bolted on" separately. That philosophy manifested in recent launches of its
hosted e-mail security service Forefront Online Security for Exchange. Meanwhile, the company is giving
antivirus competitors a run for their money with the recent launch of its free Microsoft Security Essentials
antimalware download.
McAfee

McAfee touts a broad security portfolio, calling itself the largest vendor solely dedicated to security, that is
to say, not storage and backup too. In recent months, the Santa Clara, Calif.-based company filled in
valuable niches in its security portfolio with the acquisition of SolidCore Systems, which allowed it to
reach new markets with expanded white-listing capabilities and compliance technologies.




AVG

AVG offers competitively, even aggressively, priced antimalware and Web security products aimed
largely at the SMB, and like Microsoft, has a free antivirus offering. Meanwhile, AVG's focus on
affordability has seemed to serve the company well in the down economy, making it a draw for larger
customers in the midmarket space as well as the smallest markets.




Kaspersky Lab
In recent years, Kaspersky Lab has exploded onto the security stage, due in large part to strong sales of
its commercial antivirus product, and has made big waves in the channel as well. Above all else, the
company's executives attribute their success to a steadfast devotion to research and development, and
technical innovation that has resulted in high-quality, reliable products.




CA

Among other things, CA touts a strong set of enterprise-management products, giving it a niche in the
market. It's also been beefing up its portfolio with an array of offerings, including the release of enterprise
log manager, a role and compliance manager and a DLP product, all of which serve to give the company
a big leg up in the compliance and auditing, and reporting arenas.




Check Point

A leader in firewall software, Check Point prides itself on servicing the enterprise market, boasting
superior technical innovation and attention to detail on its high-end perimeter security products. Recently
delving into the Web security arena, Check Point launched an enterprise browser-based security solution,
Check Point Endpoint Security, using virtualization to protect browsers from malware, zero-day exploits
and drive-by downloads.
Websense

Websense pits itself against some of the biggest DLP players while touting some of the most
comprehensive managed Web security offerings in the channel. The company is known for its software
and cloud-based services, but recently launched into the appliance arena with its new V10000 Web
gateway, which categorizes content on specific Web pages.




Webroot

Webroot is best known for its antivirus, endpoint and Web security offerings, and also offers a commercial
Internet security product. Meanwhile, Webroot has recently plunged into the managed services arena with
the release of its on-demand Web, e-mail and archiving products hosted in the cloud.




IBM

The company maintains that it offers an unbeatable array of security products that span endpoint
products to compliance and identity and access management solutions to firewalls. And because its
offerings run a wide range, IBM asserts that it is equipped to offer a comprehensive security analysis of a
customer's entire corporate network while providing all the products and services necessary to fill glaring
security holes left in most enterprise security infrastructures.




Juniper Networks

Juniper has often given its larger competitor, Cisco Systems, a run for its money in networking gear,
coming in with stronger products and a more competitive price point. Subsequently, the company touts
one of the strongest lines of firewalls, SSL VPN, Web gateways and IDP offerings around.

More Related Content

More from guest1c2dfc2

2009 Channel Contenders Printers
2009  Channel  Contenders  Printers2009  Channel  Contenders  Printers
2009 Channel Contenders Printersguest1c2dfc2
 
2009 Channel Contenders Printers
2009 Channel Contenders Printers2009 Channel Contenders Printers
2009 Channel Contenders Printersguest1c2dfc2
 
Ppa Advertisingin Recession 27.05.09 Jgv3
Ppa Advertisingin Recession 27.05.09 Jgv3Ppa Advertisingin Recession 27.05.09 Jgv3
Ppa Advertisingin Recession 27.05.09 Jgv3guest1c2dfc2
 
2009 Channel Contenders Vo Ip
2009 Channel Contenders Vo Ip2009 Channel Contenders Vo Ip
2009 Channel Contenders Vo Ipguest1c2dfc2
 
Gfk Rel Travel 060809 Ukr
Gfk Rel Travel 060809 UkrGfk Rel Travel 060809 Ukr
Gfk Rel Travel 060809 Ukrguest1c2dfc2
 
2009 Channel Contenders Servers
2009 Channel Contenders Servers2009 Channel Contenders Servers
2009 Channel Contenders Serversguest1c2dfc2
 
2009 Channel Contenders Server Virtualization
2009 Channel Contenders Server Virtualization2009 Channel Contenders Server Virtualization
2009 Channel Contenders Server Virtualizationguest1c2dfc2
 
2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)guest1c2dfc2
 
2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)guest1c2dfc2
 
2009 Channel Contenders Security Hardware(Rus)
2009 Channel Contenders Security Hardware(Rus)2009 Channel Contenders Security Hardware(Rus)
2009 Channel Contenders Security Hardware(Rus)guest1c2dfc2
 
2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)guest1c2dfc2
 
Macro Update0907 Ufinal
Macro Update0907 UfinalMacro Update0907 Ufinal
Macro Update0907 Ufinalguest1c2dfc2
 

More from guest1c2dfc2 (14)

2009 Channel Contenders Printers
2009  Channel  Contenders  Printers2009  Channel  Contenders  Printers
2009 Channel Contenders Printers
 
2009 Channel Contenders Printers
2009 Channel Contenders Printers2009 Channel Contenders Printers
2009 Channel Contenders Printers
 
Ppa Advertisingin Recession 27.05.09 Jgv3
Ppa Advertisingin Recession 27.05.09 Jgv3Ppa Advertisingin Recession 27.05.09 Jgv3
Ppa Advertisingin Recession 27.05.09 Jgv3
 
2009 Channel Contenders Vo Ip
2009 Channel Contenders Vo Ip2009 Channel Contenders Vo Ip
2009 Channel Contenders Vo Ip
 
Techbrands
TechbrandsTechbrands
Techbrands
 
Gfk Rel Travel 060809 Ukr
Gfk Rel Travel 060809 UkrGfk Rel Travel 060809 Ukr
Gfk Rel Travel 060809 Ukr
 
2009 Channel Contenders Servers
2009 Channel Contenders Servers2009 Channel Contenders Servers
2009 Channel Contenders Servers
 
2009 Channel Contenders Server Virtualization
2009 Channel Contenders Server Virtualization2009 Channel Contenders Server Virtualization
2009 Channel Contenders Server Virtualization
 
2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)
 
Exelon Roi Study
Exelon Roi StudyExelon Roi Study
Exelon Roi Study
 
2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)
 
2009 Channel Contenders Security Hardware(Rus)
2009 Channel Contenders Security Hardware(Rus)2009 Channel Contenders Security Hardware(Rus)
2009 Channel Contenders Security Hardware(Rus)
 
2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)2009 Channel Contenders Security Software(Rus)
2009 Channel Contenders Security Software(Rus)
 
Macro Update0907 Ufinal
Macro Update0907 UfinalMacro Update0907 Ufinal
Macro Update0907 Ufinal
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

2009 Channel Contenders Security Software

  • 1. Symantec owns the security software, but a slew of competitors are vying to gain share away from the market leader, according to the 2009 CRN Channel Contenders survey. The research sought to identify the top vendors that solution providers choose as alternatives to market leaders. Here's a look at the top 10 contenders chosen by VARs. Microsoft Software giant Microsoft led the pack of channel contenders in the security software category. Microsoft attributes its rise in the security space to a philosophy that promotes comprehensive integrated security, as opposed to security that is "bolted on" separately. That philosophy manifested in recent launches of its hosted e-mail security service Forefront Online Security for Exchange. Meanwhile, the company is giving antivirus competitors a run for their money with the recent launch of its free Microsoft Security Essentials antimalware download.
  • 2. McAfee McAfee touts a broad security portfolio, calling itself the largest vendor solely dedicated to security, that is to say, not storage and backup too. In recent months, the Santa Clara, Calif.-based company filled in valuable niches in its security portfolio with the acquisition of SolidCore Systems, which allowed it to reach new markets with expanded white-listing capabilities and compliance technologies. AVG AVG offers competitively, even aggressively, priced antimalware and Web security products aimed largely at the SMB, and like Microsoft, has a free antivirus offering. Meanwhile, AVG's focus on affordability has seemed to serve the company well in the down economy, making it a draw for larger customers in the midmarket space as well as the smallest markets. Kaspersky Lab
  • 3. In recent years, Kaspersky Lab has exploded onto the security stage, due in large part to strong sales of its commercial antivirus product, and has made big waves in the channel as well. Above all else, the company's executives attribute their success to a steadfast devotion to research and development, and technical innovation that has resulted in high-quality, reliable products. CA Among other things, CA touts a strong set of enterprise-management products, giving it a niche in the market. It's also been beefing up its portfolio with an array of offerings, including the release of enterprise log manager, a role and compliance manager and a DLP product, all of which serve to give the company a big leg up in the compliance and auditing, and reporting arenas. Check Point A leader in firewall software, Check Point prides itself on servicing the enterprise market, boasting superior technical innovation and attention to detail on its high-end perimeter security products. Recently delving into the Web security arena, Check Point launched an enterprise browser-based security solution, Check Point Endpoint Security, using virtualization to protect browsers from malware, zero-day exploits and drive-by downloads.
  • 4. Websense Websense pits itself against some of the biggest DLP players while touting some of the most comprehensive managed Web security offerings in the channel. The company is known for its software and cloud-based services, but recently launched into the appliance arena with its new V10000 Web gateway, which categorizes content on specific Web pages. Webroot Webroot is best known for its antivirus, endpoint and Web security offerings, and also offers a commercial Internet security product. Meanwhile, Webroot has recently plunged into the managed services arena with the release of its on-demand Web, e-mail and archiving products hosted in the cloud. IBM The company maintains that it offers an unbeatable array of security products that span endpoint products to compliance and identity and access management solutions to firewalls. And because its
  • 5. offerings run a wide range, IBM asserts that it is equipped to offer a comprehensive security analysis of a customer's entire corporate network while providing all the products and services necessary to fill glaring security holes left in most enterprise security infrastructures. Juniper Networks Juniper has often given its larger competitor, Cisco Systems, a run for its money in networking gear, coming in with stronger products and a more competitive price point. Subsequently, the company touts one of the strongest lines of firewalls, SSL VPN, Web gateways and IDP offerings around.