Infonetics Network and Content Security Vendor Scorecard

Cisco Security
Cisco SecurityFounding Partner at Cisco Security

Profiles, analyzes and ranks the 8 largest global vendors of network and content security solutions.

695 Campbel l Technology Parkway • Suite 200 • Campbel l • Cali fornia • 95008 • t 408.583.0011 • f 408.583.0031 
www. infonetics.com • Silicon Val ley, CA • Boston, MA • London, UK 
Network and Content Security 
Vendor Scorecard 
Report Excerpts 
September 2014 
INFONETICS RESEARCH REPORT EXCERPTS
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Table of Contents 
TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES 1 
PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED 2 
SCORECARD RESULTS 3 
Top 3 Vendors by Criterion 5 
VENDOR PROFILES 5 
#1 Cisco 5 
Markets and Technology Segments 6 
Score Analysis 6 
Strengths and Weaknesses 7 
Bottom Line 7 
BOTTOM LINE 7 
METHODOLOGY 8 
REPORT AUTHOR 10 
ABOUT INFONETICS RESEARCH 10 
REPORT REPRINTS AND CUSTOM RESEARCH 10 
List of Exhibits 
Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 1 
Exhibit 2 Network and Content Security Vendor Scorecard Summary 3 
Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 4 
Exhibit 4 Top 3 Network and Content Security Vendors by Criterion 5 
Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 6
1 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES 
This service profiles, analyzes, and ranks the 8 largest global vendors of network and content security solutions. We chose the 8 vendors who had product offerings in network and content security and 2013 revenue of $240M or more. 
To eliminate subjective scoring and accurately and fairly evaluate vendors, we established 8 criteria using actual data and metrics, including market share data, publicly available financial data, and buyer feedback. Criteria include market share, market share momentum, financials, solution breadth, and 4 key metrics from our survey research on security (security, technology innovation, product reliability, and service and support). 
McAfee is second on the strength of a good market share position, solid financials (thanks Intel!), a broad product portfolio, and excellent scores in the end-user metrics from our survey data (aided by strong brand awareness since McAfee is a household name for consumers and business buyers). 
Check Point is in third, with great performance in market share and financials, though they have room to improve when it comes to end-user perception; they score below average in all 4 survey-based categories. 
Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 
012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALL
2 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED 
Network and content security products are the first line of defense for many organizations looking to protect networks, users, applications, and data, and a group of security vendors focusing on delivering network and content security products have emerged over the last 20 years and become critical technology suppliers to enterprises and service providers worldwide. This scorecard profiles, analyzes, and ranks the 8 leading vendors of network and content security products. The key product categories covered in this report are: 
Network security: 
● Integrated security appliances and software 
● SSL VPN 
● IDS/IPS 
● DDoS 
Content security: 
● Web security 
● Mail security 
Please see “Methodology” (excerpted methodology is at the end of this document; the full version, including detailed descriptions of the categories and scoring process, is available from Infonetics Research).
3 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
SCORECARD RESULTS 
The table below summarizes the 8 vendors’ scores and revenue. We’ll discuss the individual vendors in more detail in the profile sections of the report. 
Exhibit 2 Network and Content Security Vendor Scorecard Summary 
Rank 
Vendor 
Score 
2013 Revenue 
Score Analysis 
1 
Cisco 
4.5 
$2,457M 
Scored above 4 in every category with perfect scores of 5 in financial and market share 
2 
McAfee 
3.8 
$798M 
A broad product portfolio and strong financials due to Intel ownership bolster McAfee’s score 
3 
Check Point 
3.5 
$918M 
Solid scores in solution breadth, financials, market share, and momentum keep Check Point in the top 3 
4 
Fortinet 
3.4 
$444M 
Fortinet has strong share momentum and a broad offering 
5 
Juniper 
3.2 
$565M 
Strong share and solution breadth are offset by weak share momentum 
6 
Palo Alto Networks 
3.0 
$341M 
Highest share momentum of the group, held back temporarily by financial score due to patent lawsuit Juniper settlement 
7 
Blue Coat 
2.9 
$401M 
Good share momentum and solution breadth due to acquisitions over the last 18 months but held back by financial and survey category scores 
8 
Dell SonicWALL 
2.7 
$245M 
Middle-of-the road scores overall, but solid share momentum (over 3)
4 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
The next chart details the individual criteria scores making up the total score. 
Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 
012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALLMarket shareMarket share momentumFinancialsSolution breadthSecurity*Technology innovation* Product reliability*Service and support* *Score is based on survey research
5 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Top 3 Vendors by Criterion 
Another way to analyze leadership is to look at the top rankings in each of the 8 scoring criteria (see table below). Not surprisingly, Cisco shows up the most in the top 3 table (showing up among the top 3 in all criteria, and #1 in 6 of 8 criteria). What really stands out beyond that is Palo Alto’s first place finish in market share momentum (which should surprise nobody, considering how much the company has been outgrowing the competition in their primary space, the integrated appliance market). Also notable is that McAfee does quite well in all of our survey- based criteria; they’ve generated significant goodwill (and brand awareness) as a leading provider of anti-virus technology and volumes of threat research, and this has significant potential value. 
Exhibit 4 Top 3 Network and Content Security Vendors by Criterion 
VENDOR PROFILES 
#1 Cisco 
Cisco is one of the best-known telecom and datacom equipment manufacturers globally, targeting service providers, enterprises of all sizes, and consumers. Cisco’s fiscal year 2013 revenue was US$48.6B. 
Cisco built their security portfolio through internal development and acquisition over the last 16 years, and they’ve been busy in the last 18 months. In 2013 they acquired 2 security firms: Cognitive Security for an unknown amount and Sourcefire for approximately US$2.7B. Also, in 2014 they acquired ThreatGrid for an undisclosed amount to enhance their Advanced Malware Protection (AMP) portfolio, a solution they obtained as a result of their Sourcefire acquisition.
6 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Markets and Technology Segments 
Cisco has a vast security product portfolio that spans firewall, intrusion prevention, remote access, unified clients, network admission control (a suite of access control and authentication solutions), web and mail security, advanced threat protection solutions, and data center and virtualized security solutions. 
They have products in every segment we track in this service outside of standalone DDoS mitigation (they EOL’d their Guard DDoS mitigation product in 2008). They have multiple integrated appliance offerings (traditional Cisco ASA firewalls and Sourcefire’s NGFW products), multiple standalone IPS solutions (again a mix of existing Cisco products and new Sourcefire products), standalone SSL VPN gateways, and web and mail security gateways (courtesy of their IronPort acquisition). 
Score Analysis 
Cisco has the highest score overall and above-average scores in every single category. They have strong fundamentals (market share, share momentum, and financials), a very broad product portfolio (they have significant share in nearly every segment we track in this report), and they receive excellent buyer feedback in our surveys. They’re an example of a large network infrastructure company who has decided to put their significant resources behind building a serious security business, and over the last 16 years have built themselves into the market leader. 
Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 
012345MarketshareMarket sharemomentumFinancialsSolutionbreadthTechnologyinnovationSecurityProductreliabilityService andsupportWeightedtotalCisco2013 average score
7 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
Strengths and Weaknesses 
As discussed, Cisco’s overall size, significant share in most of the markets we track in this report, excellent brand strength (not just in security, but in nearly all areas of their business, including networking and communications) and comprehensive product portfolio help them stay ahead of the pack. They have also been involved in developing security solutions for data centers and other virtualized environments for several years, and as the market for security solutions starts to move toward virtualized solutions, they’re positioned to take advantage of the transition. 
In addition to the products, they have a strong threat research and intelligence capability, and buyer perception of security vendors moving forward will be significantly influenced by how deeply involved in conducting threat research and publishing meaningful threat reports, which Cisco is placing serious resources behind. We expect this investment will pay off in the future, helping keep the survey-based scores in this report high. 
They do have some key issues to confront over the next several years; multiple acquisitions have left them with a mountain of technology and products to rationalize. They need to carefully streamline their product offering so they put their best foot forward (with the right product) in each product segment. This means resolving overlaps between existing Cisco products and the Sourcefire products they acquired and finding ways to integrate the new advanced threat protection platforms they’ve acquired recently into their overall product portfolio. Complex product portfolios are challenging for customers and resellers and can cause decision-making delays and create openings for the competition. 
Bottom Line 
Cisco is the clear leader in the network and content security space, and we don’t expect this to change in the next year, but the lead isn’t necessarily insurmountable. Unfortunately for the competition, it will take some ingredients that are hard to acquire to pass Cisco; namely the brand strength and strong financials that come with being one of the largest networking and telecom equipment suppliers in the world—a supplier that also happens to be interested in building market-leading security solutions. 
BOTTOM LINE 
The network and content security space is complex; there are many vendors and countless market forces all pushing and pulling on those vendors. Though Cisco has stiff competition in a variety of the criteria we cover in this report, they have a strong lead in market share (their revenue is more than 2.5x their next closest competitor’s) that should keep them on top for the next year. They might not be toppled, but there are more than a few vendors (namely Palo Alto, Fortinet, and Check Point) eating into their growth potential, and some wildcard vendors have built disruptive product portfolios that could lead to explosive growth in revenue and increases in their scores in future versions of this report.
8 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
METHODOLOGY 
This scorecard includes Blue Coat, Check Point, Cisco, Dell SonicWALL, Fortinet, Juniper, McAfee, and Palo Alto Networks; these are the top 8 network and content security vendors, each with $240M or more in 2013 network and content security product revenue and significant product offerings in network (integrated security appliances, IDS/IPS, SSL VPN, DDoS) and content (web and mail) security. 
We evaluate the top 8 vendors in 8 criteria using actual data and metrics. For each criterion, we scored vendors on a 5-point scale, with 1 being the lowest possible score, 3 being an average score, and 5 being a perfect score. Specifically, we evaluated vendors on the following: 
● Market share and market share momentum: a measure of how successfully a company has penetrated its target markets; having significant market share creates awareness with buyers, improves scale, and reassures buyers that companies are here to stay for the long term; some RFPs require vendors to meet certain market share thresholds to ensure vendor viability; successful vendors will have above-average market share that is increasing year over year 
● Market share: vendors’ percentage share of network and content security product revenue 
● Market share momentum: changes in revenue market share over time 
● Financials: an analysis of a vendor’s financials; a strong financial position improves long-term viability and allows a company to stay ahead of the competition by investing in R&D and/or acquiring other companies/technologies; we base the score on the Altman Z-score non-manufacturing model 
● Solution breadth: a measure of how many network and content security product segments a vendor addresses; a broader solution set improves a vendor's potential and efficiency of its operations and allows it to differentiate by innovating across segments; we calculated scores based on whether a vendor participates in a given sub-segment of the market, and its relative revenue contribution to the overall market 
● Buyer feedback on security, technology innovation, product reliability, and service/support: assessments of a vendor’s performance by buyers, based on interviews we conduct with hundreds of end-users every year 
Based on the scores for each of the 8 criteria, we created a single composite vendor score, using the same 5- point scale, and weighted the individual criterion based on its importance in the buying process.
9 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
The information in this report is based on findings from multiple Infonetics Research services, including: 
● Market share, size, and forecasts 
● Network Security Appliances and Software Quarterly Worldwide and Regional Market Share, Size, and Forecasts 
● Content Security Gateway Appliances, Software, and SaaS Quarterly Worldwide and Regional Market Share, Size, and Forecasts 
● DDoS Prevention Appliances Quarterly Worldwide and Regional Market Share, Size, and Forecasts 
● Survey-based research 
● Next Generation Threat Prevention Strategies and Vendor Leadership: North American Enterprise Survey 
● Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey
10 
Network and Content Security Vendor Scorecard: Excerpts 
Reprinted with permission from Infonetics Research. 
© 2014 Infonetics Research, Inc. 
REPORT AUTHOR 
Jeff Wilson 
Principal Analyst, Security 
Infonetics Research 
+1 408.583.3337 | jeff@infonetics.com 
Twitter: @securityjeff 
ABOUT INFONETICS RESEARCH 
Infonetics Research is an international market research and consulting analyst firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete more effectively. 
REPORT REPRINTS AND CUSTOM RESEARCH 
To learn about distributing excerpts from Infonetics reports or custom research, please contact: 
North America (West) and Asia Pacific 
Larry Howard, Vice President, larry@infonetics.com, +1 408.583.3335 
North America (East, Midwest, Texas), Latin America and EMEA 
Scott Coyne, Senior Account Director, scott@infonetics.com, +1 408.583.3395 
Greater China and Southeast Asia 大中华区及东南亚地区 
Jeffrey Song, Market Analyst 市场分析师及客户经理jeffrey@infonetics.com, +86 21.3919.8505

Recommended

The Evolution of and Need for Secure Network Access by
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
2.6K views11 slides
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
7.3K views15 slides
Cisco 2015 Midyear Security Report Slide Deck by
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
4.4K views28 slides
Cisco Addresses the Full Attack Continuum by
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
4.4K views21 slides
3 Tips for Choosing a Next Generation Firewall by
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
2.5K views1 slide
Enterprise Strategy Group: Security Survey by
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
3.1K views5 slides

More Related Content

What's hot

Tomorrow Starts Here - Security Everywhere by
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
2.3K views45 slides
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo... by
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Ulf Mattsson
1.2K views62 slides
Zero Trust Framework for Network Security​ by
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
2.5K views27 slides
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL by
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALMichael Bunn
1.3K views11 slides
Darktrace white paper_ics_final by
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
2K views12 slides
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise... by
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
6.1K views20 slides

What's hot(20)

Tomorrow Starts Here - Security Everywhere by Cisco Canada
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada2.3K views
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo... by Ulf Mattsson
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Ulf Mattsson1.2K views
Zero Trust Framework for Network Security​ by AlgoSec
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
AlgoSec2.5K views
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL by Michael Bunn
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Michael Bunn1.3K views
Darktrace white paper_ics_final by CMR WORLD TECH
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
CMR WORLD TECH2K views
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise... by Kaspersky
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Kaspersky6.1K views
How can i find my security blind spots ulf mattsson - aug 2016 by Ulf Mattsson
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
Ulf Mattsson623 views
Solar winds supply chain breach - Insights from the trenches by Infosec
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
Infosec737 views
How can i find my security blind spots in Oracle - nyoug - sep 2016 by Ulf Mattsson
How can i find my security blind spots in Oracle - nyoug - sep 2016How can i find my security blind spots in Oracle - nyoug - sep 2016
How can i find my security blind spots in Oracle - nyoug - sep 2016
Ulf Mattsson282 views
Top 7 Security Measures for IoT Systems by Zoe Gilbert
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
Zoe Gilbert29 views
The Top 20 Cyberattacks on Industrial Control Systems by Muhammad FAHAD
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
Muhammad FAHAD1K views
Presentation cisco iron port email & web security by xKinAnx
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
xKinAnx4.4K views
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity by David Sweigert
NIST releases SP 800-160  Multi-discplinary approach to cybersecurityNIST releases SP 800-160  Multi-discplinary approach to cybersecurity
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
David Sweigert437 views
From Code to Customer: How to Make Software Products Secure by Kaspersky
From Code to Customer: How to Make Software Products SecureFrom Code to Customer: How to Make Software Products Secure
From Code to Customer: How to Make Software Products Secure
Kaspersky1.1K views
Pactera - Cloud, Application, Cyber Security Trend 2016 by Kyle Lai
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
Kyle Lai584 views
Securing medical apps in the age of covid final by DevOps.com
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
DevOps.com132 views
Reference Security Architecture for Mobility- Insurance by Priyanka Aash
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
Priyanka Aash753 views
Cisco Web and Email Security Overview by Cisco Security
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security26.5K views
SCADA Security Training by Bryan Len
SCADA Security TrainingSCADA Security Training
SCADA Security Training
Bryan Len300 views

Viewers also liked

Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R... by
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Sounil Yu
14.5K views27 slides
Understanding the Cyber Security Vendor Landscape by
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
8.6K views22 slides
Cisco 2014 Midyear Security Report by
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
2.4K views53 slides
Enterprise Network Security & Compliance - A Vendor's Perspective by
Enterprise Network Security & Compliance - A Vendor's PerspectiveEnterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveAnusha Vaidyanathan
231 views19 slides
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo... by
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
869 views53 slides
Kasus neurobehaviour ke by
Kasus neurobehaviour keKasus neurobehaviour ke
Kasus neurobehaviour keArya Ningrat
2.6K views8 slides

Viewers also liked(20)

Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R... by Sounil Yu
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Sounil Yu14.5K views
Understanding the Cyber Security Vendor Landscape by Sounil Yu
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
Sounil Yu8.6K views
Cisco 2014 Midyear Security Report by Cisco Security
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Cisco Security2.4K views
Enterprise Network Security & Compliance - A Vendor's Perspective by Anusha Vaidyanathan
Enterprise Network Security & Compliance - A Vendor's PerspectiveEnterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's Perspective
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo... by FLUZO
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
FLUZO869 views
Kasus neurobehaviour ke by Arya Ningrat
Kasus neurobehaviour keKasus neurobehaviour ke
Kasus neurobehaviour ke
Arya Ningrat2.6K views
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works... by Saverio Massaro
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
Saverio Massaro286 views
Taylor rita visual_resumestoryboard.zip by Rita_E
Taylor rita visual_resumestoryboard.zipTaylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zip
Rita_E955 views
Leveraging Context-Aware Security to Safeguard Patient Data by Cisco Security
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
Cisco Security1.1K views
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a... by MobileCreation
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
MobileCreation934 views
Counterstories” The Real Knowledge About Going to College by patty_mndz
Counterstories”The Real Knowledge About Going to CollegeCounterstories”The Real Knowledge About Going to College
Counterstories” The Real Knowledge About Going to College
patty_mndz967 views
Interni urbani: tra scarti e nuove circolarità by Saverio Massaro
Interni urbani: tra scarti e nuove circolaritàInterni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolarità
Saverio Massaro848 views
Kisah katak kecil by hamdEy
Kisah katak kecilKisah katak kecil
Kisah katak kecil
hamdEy404 views
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2... by FLUZO
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
FLUZO913 views
Presentación institucional - Urbanización San Pedro by www.tumarketing.co
Presentación institucional - Urbanización San PedroPresentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San Pedro

Similar to Infonetics Network and Content Security Vendor Scorecard

Fortinet Corporate Overview Deck.pptx by
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxArianeSpano
238 views54 slides
[Webinar] Why Security Certification is Crucial for IoT Success by
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
1K views35 slides
Product security by Blockchain, AI and Security Certs by
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
648 views38 slides
Skywork Solutions INC. by
Skywork Solutions INC.Skywork Solutions INC.
Skywork Solutions INC.Levi Saada
130 views13 slides
Frost & Sullivan Global Mobile VPN Products Market by
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketNetMotion Wireless
11.9K views119 slides
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel by
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channelflashnewsrelease
78 views2 slides

Similar to Infonetics Network and Content Security Vendor Scorecard(20)

Fortinet Corporate Overview Deck.pptx by ArianeSpano
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano238 views
[Webinar] Why Security Certification is Crucial for IoT Success by Electric Imp
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
Electric Imp1K views
Product security by Blockchain, AI and Security Certs by LabSharegroup
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup648 views
Skywork Solutions INC. by Levi Saada
Skywork Solutions INC.Skywork Solutions INC.
Skywork Solutions INC.
Levi Saada130 views
Frost & Sullivan Global Mobile VPN Products Market by NetMotion Wireless
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products Market
NetMotion Wireless11.9K views
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel by flashnewsrelease
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
flashnewsrelease78 views
fso-landscape by CH431
fso-landscape fso-landscape
fso-landscape
CH43119 views
Stc Five Forces Model And Competitive Advantage by Elizabeth Temburu
Stc Five Forces Model And Competitive AdvantageStc Five Forces Model And Competitive Advantage
Stc Five Forces Model And Competitive Advantage
Security as as Service: Case Study of F-Secure by Pouria Ghatrenabi
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-Secure
Pouria Ghatrenabi2.3K views
Sample Cloud Security - Financial Services by ResearchFox
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial Services
ResearchFox206 views
Steps to Scale Internet of Things (IoT) by Rafael Maranon
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
Rafael Maranon2.7K views
Wireless survey-report-saa-2016 by Samir Kotarwar
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
Samir Kotarwar66 views
Value Plus April014 by aditya0312
Value Plus April014 Value Plus April014
Value Plus April014
aditya0312471 views
Sample Cloud Security - APAC by ResearchFox
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APAC
ResearchFox205 views
Sample Cloud Security - Manufacturing by ResearchFox
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - Manufacturing
ResearchFox443 views
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel by Aegify Inc.
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
Aegify Inc.101 views
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey by Lluis Altes
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform JourneyCisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
Cisco's FY 2Q14 Earnings Reflect IDC's 3rd Platform Journey
Lluis Altes1.3K views

More from Cisco Security

Incident Response Services Template - Cisco Security by
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
11.2K views2 slides
Infographic: Security for Mobile Service Providers by
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
4.6K views1 slide
Cisco ISE Reduces the Attack Surface by Controlling Access by
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
4.4K views1 slide
Pervasive Security Across Your Extended Network by
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
6.4K views1 slide
AMP Helps Cisco IT Catch 50% More Malware threats by
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
4.9K views1 slide
A Reality Check on the State of Cybersecurity by
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
3.1K views1 slide

More from Cisco Security(19)

Incident Response Services Template - Cisco Security by Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security11.2K views
Infographic: Security for Mobile Service Providers by Cisco Security
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco Security4.6K views
Cisco ISE Reduces the Attack Surface by Controlling Access by Cisco Security
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security4.4K views
Pervasive Security Across Your Extended Network by Cisco Security
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security6.4K views
AMP Helps Cisco IT Catch 50% More Malware threats by Cisco Security
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security4.9K views
A Reality Check on the State of Cybersecurity by Cisco Security
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Cisco Security3.1K views
Balance Data Center Security and Performance by Cisco Security
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
Cisco Security2.5K views
The Cost of Inactivity: Malware Infographic by Cisco Security
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security1.7K views
Data Center Security Challenges by Cisco Security
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
Cisco Security8.5K views
Malware and the Cost of Inactivity by Cisco Security
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
Cisco Security8.8K views
Midsize Business Solutions: Cybersecurity by Cisco Security
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
Cisco Security3.4K views
String of Paerls Infographic by Cisco Security
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
Cisco Security1.4K views
Midyear Security Report Infographic by Cisco Security
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
Cisco Security478 views
Cisco Annual Security Report Infographic by Cisco Security
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
Cisco Security602 views
City of Tomorrow Builds in Next-Generation Security by Cisco Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
Cisco Security2.2K views
Laser Pioneer Secures Network End-to-End to Protect Assets by Cisco Security
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security1.1K views
McAllen Intermediate School District by Cisco Security
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
Cisco Security1.3K views
Secure, Automated Network Access for Any Device on Campus by Cisco Security
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
Cisco Security669 views

Recently uploaded

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
58 views8 slides
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
19 views49 slides
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
21 views15 slides
Microsoft Power Platform.pptx by
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptxUni Systems S.M.S.A.
53 views38 slides
Special_edition_innovator_2023.pdf by
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdfWillDavies22
18 views6 slides
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
40 views69 slides

Recently uploaded(20)

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab21 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2218 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker40 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays17 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10300 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely25 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson92 views

Infonetics Network and Content Security Vendor Scorecard

  • 1. 695 Campbel l Technology Parkway • Suite 200 • Campbel l • Cali fornia • 95008 • t 408.583.0011 • f 408.583.0031 www. infonetics.com • Silicon Val ley, CA • Boston, MA • London, UK Network and Content Security Vendor Scorecard Report Excerpts September 2014 INFONETICS RESEARCH REPORT EXCERPTS
  • 2. Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Table of Contents TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES 1 PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED 2 SCORECARD RESULTS 3 Top 3 Vendors by Criterion 5 VENDOR PROFILES 5 #1 Cisco 5 Markets and Technology Segments 6 Score Analysis 6 Strengths and Weaknesses 7 Bottom Line 7 BOTTOM LINE 7 METHODOLOGY 8 REPORT AUTHOR 10 ABOUT INFONETICS RESEARCH 10 REPORT REPRINTS AND CUSTOM RESEARCH 10 List of Exhibits Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 1 Exhibit 2 Network and Content Security Vendor Scorecard Summary 3 Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 4 Exhibit 4 Top 3 Network and Content Security Vendors by Criterion 5 Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 6
  • 3. 1 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. TOP TAKEAWAYS: CISCO LEADS, BUT HUNGRY CHALLENGERS ARE MAKING BIG MOVES This service profiles, analyzes, and ranks the 8 largest global vendors of network and content security solutions. We chose the 8 vendors who had product offerings in network and content security and 2013 revenue of $240M or more. To eliminate subjective scoring and accurately and fairly evaluate vendors, we established 8 criteria using actual data and metrics, including market share data, publicly available financial data, and buyer feedback. Criteria include market share, market share momentum, financials, solution breadth, and 4 key metrics from our survey research on security (security, technology innovation, product reliability, and service and support). McAfee is second on the strength of a good market share position, solid financials (thanks Intel!), a broad product portfolio, and excellent scores in the end-user metrics from our survey data (aided by strong brand awareness since McAfee is a household name for consumers and business buyers). Check Point is in third, with great performance in market share and financials, though they have room to improve when it comes to end-user perception; they score below average in all 4 survey-based categories. Exhibit 1 Overall Scores for the Top 8 Network and Content Security Vendors 012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALL
  • 4. 2 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. PORTFOLIO OF INFRASTRUCTURE AND SERVICES COVERED Network and content security products are the first line of defense for many organizations looking to protect networks, users, applications, and data, and a group of security vendors focusing on delivering network and content security products have emerged over the last 20 years and become critical technology suppliers to enterprises and service providers worldwide. This scorecard profiles, analyzes, and ranks the 8 leading vendors of network and content security products. The key product categories covered in this report are: Network security: ● Integrated security appliances and software ● SSL VPN ● IDS/IPS ● DDoS Content security: ● Web security ● Mail security Please see “Methodology” (excerpted methodology is at the end of this document; the full version, including detailed descriptions of the categories and scoring process, is available from Infonetics Research).
  • 5. 3 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. SCORECARD RESULTS The table below summarizes the 8 vendors’ scores and revenue. We’ll discuss the individual vendors in more detail in the profile sections of the report. Exhibit 2 Network and Content Security Vendor Scorecard Summary Rank Vendor Score 2013 Revenue Score Analysis 1 Cisco 4.5 $2,457M Scored above 4 in every category with perfect scores of 5 in financial and market share 2 McAfee 3.8 $798M A broad product portfolio and strong financials due to Intel ownership bolster McAfee’s score 3 Check Point 3.5 $918M Solid scores in solution breadth, financials, market share, and momentum keep Check Point in the top 3 4 Fortinet 3.4 $444M Fortinet has strong share momentum and a broad offering 5 Juniper 3.2 $565M Strong share and solution breadth are offset by weak share momentum 6 Palo Alto Networks 3.0 $341M Highest share momentum of the group, held back temporarily by financial score due to patent lawsuit Juniper settlement 7 Blue Coat 2.9 $401M Good share momentum and solution breadth due to acquisitions over the last 18 months but held back by financial and survey category scores 8 Dell SonicWALL 2.7 $245M Middle-of-the road scores overall, but solid share momentum (over 3)
  • 6. 4 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. The next chart details the individual criteria scores making up the total score. Exhibit 3 Score Composition for Top 8 Network and Content Security Vendors 012345CiscoMcAfeeCheck PointFortinetJuniperPalo AltoNetworksBlue CoatDellSonicWALLMarket shareMarket share momentumFinancialsSolution breadthSecurity*Technology innovation* Product reliability*Service and support* *Score is based on survey research
  • 7. 5 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Top 3 Vendors by Criterion Another way to analyze leadership is to look at the top rankings in each of the 8 scoring criteria (see table below). Not surprisingly, Cisco shows up the most in the top 3 table (showing up among the top 3 in all criteria, and #1 in 6 of 8 criteria). What really stands out beyond that is Palo Alto’s first place finish in market share momentum (which should surprise nobody, considering how much the company has been outgrowing the competition in their primary space, the integrated appliance market). Also notable is that McAfee does quite well in all of our survey- based criteria; they’ve generated significant goodwill (and brand awareness) as a leading provider of anti-virus technology and volumes of threat research, and this has significant potential value. Exhibit 4 Top 3 Network and Content Security Vendors by Criterion VENDOR PROFILES #1 Cisco Cisco is one of the best-known telecom and datacom equipment manufacturers globally, targeting service providers, enterprises of all sizes, and consumers. Cisco’s fiscal year 2013 revenue was US$48.6B. Cisco built their security portfolio through internal development and acquisition over the last 16 years, and they’ve been busy in the last 18 months. In 2013 they acquired 2 security firms: Cognitive Security for an unknown amount and Sourcefire for approximately US$2.7B. Also, in 2014 they acquired ThreatGrid for an undisclosed amount to enhance their Advanced Malware Protection (AMP) portfolio, a solution they obtained as a result of their Sourcefire acquisition.
  • 8. 6 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Markets and Technology Segments Cisco has a vast security product portfolio that spans firewall, intrusion prevention, remote access, unified clients, network admission control (a suite of access control and authentication solutions), web and mail security, advanced threat protection solutions, and data center and virtualized security solutions. They have products in every segment we track in this service outside of standalone DDoS mitigation (they EOL’d their Guard DDoS mitigation product in 2008). They have multiple integrated appliance offerings (traditional Cisco ASA firewalls and Sourcefire’s NGFW products), multiple standalone IPS solutions (again a mix of existing Cisco products and new Sourcefire products), standalone SSL VPN gateways, and web and mail security gateways (courtesy of their IronPort acquisition). Score Analysis Cisco has the highest score overall and above-average scores in every single category. They have strong fundamentals (market share, share momentum, and financials), a very broad product portfolio (they have significant share in nearly every segment we track in this report), and they receive excellent buyer feedback in our surveys. They’re an example of a large network infrastructure company who has decided to put their significant resources behind building a serious security business, and over the last 16 years have built themselves into the market leader. Exhibit 5 Cisco’s Scores vs. Average Scores of All 8 Vendors 012345MarketshareMarket sharemomentumFinancialsSolutionbreadthTechnologyinnovationSecurityProductreliabilityService andsupportWeightedtotalCisco2013 average score
  • 9. 7 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. Strengths and Weaknesses As discussed, Cisco’s overall size, significant share in most of the markets we track in this report, excellent brand strength (not just in security, but in nearly all areas of their business, including networking and communications) and comprehensive product portfolio help them stay ahead of the pack. They have also been involved in developing security solutions for data centers and other virtualized environments for several years, and as the market for security solutions starts to move toward virtualized solutions, they’re positioned to take advantage of the transition. In addition to the products, they have a strong threat research and intelligence capability, and buyer perception of security vendors moving forward will be significantly influenced by how deeply involved in conducting threat research and publishing meaningful threat reports, which Cisco is placing serious resources behind. We expect this investment will pay off in the future, helping keep the survey-based scores in this report high. They do have some key issues to confront over the next several years; multiple acquisitions have left them with a mountain of technology and products to rationalize. They need to carefully streamline their product offering so they put their best foot forward (with the right product) in each product segment. This means resolving overlaps between existing Cisco products and the Sourcefire products they acquired and finding ways to integrate the new advanced threat protection platforms they’ve acquired recently into their overall product portfolio. Complex product portfolios are challenging for customers and resellers and can cause decision-making delays and create openings for the competition. Bottom Line Cisco is the clear leader in the network and content security space, and we don’t expect this to change in the next year, but the lead isn’t necessarily insurmountable. Unfortunately for the competition, it will take some ingredients that are hard to acquire to pass Cisco; namely the brand strength and strong financials that come with being one of the largest networking and telecom equipment suppliers in the world—a supplier that also happens to be interested in building market-leading security solutions. BOTTOM LINE The network and content security space is complex; there are many vendors and countless market forces all pushing and pulling on those vendors. Though Cisco has stiff competition in a variety of the criteria we cover in this report, they have a strong lead in market share (their revenue is more than 2.5x their next closest competitor’s) that should keep them on top for the next year. They might not be toppled, but there are more than a few vendors (namely Palo Alto, Fortinet, and Check Point) eating into their growth potential, and some wildcard vendors have built disruptive product portfolios that could lead to explosive growth in revenue and increases in their scores in future versions of this report.
  • 10. 8 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. METHODOLOGY This scorecard includes Blue Coat, Check Point, Cisco, Dell SonicWALL, Fortinet, Juniper, McAfee, and Palo Alto Networks; these are the top 8 network and content security vendors, each with $240M or more in 2013 network and content security product revenue and significant product offerings in network (integrated security appliances, IDS/IPS, SSL VPN, DDoS) and content (web and mail) security. We evaluate the top 8 vendors in 8 criteria using actual data and metrics. For each criterion, we scored vendors on a 5-point scale, with 1 being the lowest possible score, 3 being an average score, and 5 being a perfect score. Specifically, we evaluated vendors on the following: ● Market share and market share momentum: a measure of how successfully a company has penetrated its target markets; having significant market share creates awareness with buyers, improves scale, and reassures buyers that companies are here to stay for the long term; some RFPs require vendors to meet certain market share thresholds to ensure vendor viability; successful vendors will have above-average market share that is increasing year over year ● Market share: vendors’ percentage share of network and content security product revenue ● Market share momentum: changes in revenue market share over time ● Financials: an analysis of a vendor’s financials; a strong financial position improves long-term viability and allows a company to stay ahead of the competition by investing in R&D and/or acquiring other companies/technologies; we base the score on the Altman Z-score non-manufacturing model ● Solution breadth: a measure of how many network and content security product segments a vendor addresses; a broader solution set improves a vendor's potential and efficiency of its operations and allows it to differentiate by innovating across segments; we calculated scores based on whether a vendor participates in a given sub-segment of the market, and its relative revenue contribution to the overall market ● Buyer feedback on security, technology innovation, product reliability, and service/support: assessments of a vendor’s performance by buyers, based on interviews we conduct with hundreds of end-users every year Based on the scores for each of the 8 criteria, we created a single composite vendor score, using the same 5- point scale, and weighted the individual criterion based on its importance in the buying process.
  • 11. 9 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. The information in this report is based on findings from multiple Infonetics Research services, including: ● Market share, size, and forecasts ● Network Security Appliances and Software Quarterly Worldwide and Regional Market Share, Size, and Forecasts ● Content Security Gateway Appliances, Software, and SaaS Quarterly Worldwide and Regional Market Share, Size, and Forecasts ● DDoS Prevention Appliances Quarterly Worldwide and Regional Market Share, Size, and Forecasts ● Survey-based research ● Next Generation Threat Prevention Strategies and Vendor Leadership: North American Enterprise Survey ● Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey
  • 12. 10 Network and Content Security Vendor Scorecard: Excerpts Reprinted with permission from Infonetics Research. © 2014 Infonetics Research, Inc. REPORT AUTHOR Jeff Wilson Principal Analyst, Security Infonetics Research +1 408.583.3337 | jeff@infonetics.com Twitter: @securityjeff ABOUT INFONETICS RESEARCH Infonetics Research is an international market research and consulting analyst firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete more effectively. REPORT REPRINTS AND CUSTOM RESEARCH To learn about distributing excerpts from Infonetics reports or custom research, please contact: North America (West) and Asia Pacific Larry Howard, Vice President, larry@infonetics.com, +1 408.583.3335 North America (East, Midwest, Texas), Latin America and EMEA Scott Coyne, Senior Account Director, scott@infonetics.com, +1 408.583.3395 Greater China and Southeast Asia 大中华区及东南亚地区 Jeffrey Song, Market Analyst 市场分析师及客户经理jeffrey@infonetics.com, +86 21.3919.8505