MAGIC QUADRANT FOR SECURE EMAIL GATEWAYS 2013 PDF

Buyers should focus onstrategic vendors, data loss prevention capability encryption and betterprotection from targeted phishing attacks. The SEG market is mature. The market growth rate has leveled off, and there are no significant market entrants or acquisitions— all classic signs of a mature market. Despite the market maturity, companies can't do without SEG solutions. Phishing and malware attachments alsodeclined slightly in ; however, there is ample evidence that email is the preferred channel tolaunch advanced targeted attacks. Leading solutions areincorporating methods to double check — or better, proxy — URL links in email at the "time ofclick" rather than the time of delivery.

Author:Mezik Faukus
Country:Argentina
Language:English (Spanish)
Genre:Politics
Published (Last):22 April 2008
Pages:54
PDF File Size:6.8 Mb
ePub File Size:15.16 Mb
ISBN:972-8-35389-886-1
Downloads:38460
Price:Free* [*Free Regsitration Required]
Uploader:Maujar



Buyers should focus onstrategic vendors, data loss prevention capability encryption and betterprotection from targeted phishing attacks. The SEG market is mature. The market growth rate has leveled off, and there are no significant market entrants or acquisitions— all classic signs of a mature market.

Despite the market maturity, companies can't do without SEG solutions. Phishing and malware attachments alsodeclined slightly in ; however, there is ample evidence that email is the preferred channel tolaunch advanced targeted attacks. Leading solutions areincorporating methods to double check — or better, proxy — URL links in email at the "time ofclick" rather than the time of delivery. To address attachment malware, leading solutions are addingthe ability to strip active content that is, Java and macros from common document types that is,.

PDFs, Office to neuter their malicious intent. More advanced solutions are actually executingsuspicious files in virtual environments to detect malicious behavior and provide for ensicin for mation. Some vendors are also creating reporting that is specific to targeted attacks to provide for ensic in for mation about attacks and users' behavior. These reports are valuable for incidentresponse as well as employee education. Eighty-two percent of respondents to our survey indicated that bulk email filtering was animportant or very important critical capability of their next SEG.

Dissatisfaction with current bulkemail capabilities is a significant pain point of existing solutions. End users don't care about theclinical definition of spam and are frustrated with the level of "unwanted" email in their inboxes. Most solutions include a "bulk" or "marketing" email classifier that can be used to quarantine thistype of mail, but policy options are typically very coarse and could easily be improved.

None of thevendors offer personal controls to enable end users to better manage their inboxes. Interest in outbound email hygiene continues.

Outbound capabilities, such as data loss prevention DLP and encryption, remain the most important feature differentiators. Workflow for managing events and predeveloped content that is, common identifiers,dictionaries and regulatory policies are the main differentiators of DLP capabilities among vendorsin this analysis. Almost all thevendors in this analysis have some encryption capabilities; however, existing encryption customersare expressing frustration with the usability of encryption for senders and recipients, especially onmobile devices.

A key consideration is the encryption solution's level of integration in the SEGmanagement interface. Significant interest in and deployment of virtual solutions and software as a service SaaS solutionscontinue. Leading vendors in this market are expanding their offerings vertically into adjacentmarkets such as mailbox hosting, hosted archiving, e-discovery and continuity services , andhorizontally into secure Web gateway SWG — see " Magic Quadrant for Secure Web Gateway" solutions linked by common DLP and management.

However, buyers' demand for these servicesfrom their SEG vendors is mixed, and purchasing decisions rarely coincide. Page 2 of 29Gartner, Inc. Magic Quadrant Figure 1. Magic Quadrant for Secure Email Gateways Source: Gartner July Vendor Strengths and CautionsBarracuda NetworksBarracuda Networks is a private, Cali for nia-based company that focuses on producing a range ofeconomical, easy-to-use network appliances and SaaS solutions that are aimed primarily at small ormidsize businesses SMBs , as well as educational and government institutions.

Barracudacontinues to grow at above market rates. Recent improvements focus on large file attachment handling, configuration backup, betterrole-based administration and better encrypted email reporting. Gartner, Inc. G Page 3 of Native basic pull-based encryption and DLP capability are included free of charge. Barracuda Control Center can manage multiple boxes, and comes as a free cloud-basedoffering or an on-premises appliance.

Service prices are per box, rather than per user, making Barracuda a significant price leader. The vendor's email archiving solution has an interface with a consistent look and feel, and it canalso be managed from the same Barracuda Control Center.

The user interface and reporting engine are long overdue for a refresh. The addition ofcustomizable dashboards with hyperlinks to reports, better reuse of policy objects, simplerpolicy workflow and ad hoc reporting would be welcome. DLP is limited to keyword and regular expression filtering. It includes only limited, predefinedDLP dictionaries, and is not object-oriented or group-policy-integrated. Workflow for compliance officers is limited. The included encryption capability is a good value, but it could be better optimized for mobiledevices.

CiscoCisco continues to dominate the market for dedicated on-premises solutions for midsize-to-largeorganizations, but has lost some momentum. It offers three deployment options: hardwareappliances, managed appliances and virtual appliances. Cisco enjoys strategic vendor status withmany of its customers and is well-respected in the core network buying centers. It is a goodcandidate for midsize-to-large enterprise customers that are looking for best-of-breed functionality.

This year, Cisco has madeimprovements in its ability to detect low-volume spam attacks, as well as in assigning IPv6addresses a reputation score.

Cisco provides content-aware DLP capabilities with numerous predefined policies, dictionariesand identifiers, as well as a strong compliance officer interface.

Nontechnical users will find it easy to use, and it has a lot of context-sensitiverecommendations and help functions. The proprietary Clearswift DLP engine provides fast scanning of more than file for mats.

Clearswift exploits Commtouch for a portion of its anti-spam capability, and has upgraded tothe most recent engine. The solution includes a "bulk email" category, which is useful for reducing nuisance email. The ImageLogic detection engine for inappropriate and registered images is an extra utilityservice for organizations with this need. The Echoworx partnership provides enhanced encryptioncapabilities via a Web portal "pull" or mailbox "push". The vendor is late to deliver industry-leading features andfunctionality.

It does not directly offer a SaaS-based delivery model or vertical products, suchas email archiving. As buyers increasingly look for more strategic integrated vendors, Clearswiftmay have a difficult time standing out in a crowded market. Although the interface is easy to use for nontechnical users, it is limited in detail for moretechnical enterprise users. Advanced encryption provided by Echoworx is not integrated with the management interface.

Itlacks any control or visibility of sent messages, and it lacks self-service configuration of theencryption experience. DLP enhancements are needed in the ability to describe sensitive content beyond regularexpressions, along with support for more advanced detection techniques such as partialdocument matching.

Policy management, workflow reporting and event management arerudimentary. Page 6 of 29Gartner, Inc. It offers several SEG for mfactors, including hardware appliances, software and VMware versions, and hosted versions. Dell has its own malware research team developing new spam signatures and detectiontechniques, which leverage data from its installed base of appliances. The solution alsoleverages contact databases and communication partners to lower false positives.

The management interface is localized in a number of languages and easy to use. It hasmultitenancy support, and reporting is adequate for most organizations' needs. The solution includes basic content-aware DLP functionality with prebuilt dictionaries andnumber identifiers. The policy interface is easy to use with natural-language policy all on asingle page. Dell does not provide any market-leading SEG functionality.

Only a smallpercentage of its revenue is email-security-related. Its market share and mind share amongGartner customers are low. Still, some reference customers commented on the necessity for betterspam and malware detection accuracy. Dell does not offer any advanced malware detection techniques. The management dashboard interface is not customizable. DLP functionality is basic and supports only regular expression matching.

Only two prebuiltdictionaries and a handful of number for mat identifiers are included. It does not include anypredefined policy, and event management is rudimentary. G Page 7 of FortinetFortinet is a public company with a broad geographical market presence that offers a wide array ofUTM and dedicated appliances for all organization sizes. It also offers an array of anti-spamtechnology in various for ms, from client to UTM.

FortiMail is a shortlist candidate primarily for Fortinet customers that arelooking for a basic SEG solution. FortiManager can manage up to 40 Fortinet devices, and FortiAnalyzerprovides centralized log storage dashboards and reporting. The FortiGuard cloud-based sandboxing service uses behavioral attributes to detect malwareby executing them within a virtual environment.

Suspicious files can be submitted automaticallyto the new hosted service for further scanning and detailed status reports. FortiMail provides a number of high-availability and scalability features, such as nativeclustering, load balancing and high-throughput FortiMail hardware appliances. Basic DLP capability and identity-based push and pull encryption are included free of charge inthe standard FortiMail feature set. Appliance-based, rather than user-based, service pricing makes FortiMail very af for dable.

On-box or off-box policy-based message archiving is fully indexed and available from theFortiMail management interface. Improvements since our last analysis havefocused on managed security service provider MSSP functions, and planned improvementsare focused mostly on better integration with other Fortinet systems.

It does not have a big or well-known research organization,especially when compared with the Leaders in this Magic Quadrant. The FortiAnalyzer component is required for in-depth, per-domain report and log access acrossmultiple logs in a single interface. However, this component costs extra. Disposition in for mationto show why email is quarantined is more cryptic than users would like.

There is no SaaS deployment option, although it is in the planning stage. Page 8 of 29Gartner, Inc. McAfeeMcAfee, a subsidiary of Intel, has a broad range of endpoint and network security products. Itconsolidated its two on-premises gateway solutions in v. McAfee alsooffers blade server appliances with free additional virtual appliances, integrated hybrid emailsecurity with single management and reporting , and SaaS-based SEG, archiving and disasterrecovery services.

3.5 CORMYR PDF

Magic Quadrant for Secure Email Gateways - Proofpoint | Gradian

The authors also reiterate that, "Outbound capabilities, such as data loss prevention DLP and encryption, remain the most important feature differentiators. Of vendors positioned as Leaders, Gartner says, "Leaders are performing well, have a clear vision of market direction and are actively building competencies to sustain their leadership positions in the market. Companies in this quadrant offer a comprehensive and proficient range of email security functionality, and show evidence of superior vision and execution for current and anticipated customer requirements. Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help medium- and large-sized organizations protect their data from attack and enable them to effectively meet the complex and evolving regulatory compliance and data governance mandates:. Advanced, deep content analysis monitors and classifies both structured and unstructured data, ensuring that sensitive email data is protected. About the Magic Quadrant Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings.

DIALECTICA DE LO CONCRETO KAREL KOSIK PDF

Magic Quadrant for Secure Email Gateways

Analyst s : Brian Lowans, Peter Firstbrook. The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability encryption and better protection from targeted phishing attacks. All rights reserved. Gartner is a registered trademark of Gartner, Inc. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information.

CALDEIRA FLAMOTUBULAR PDF

GARTNER: MAGIC QUADRANT FOR SECURE EMAIL GATEWAYS

You received this information as part of your SecurityWeek Email Briefing subscription. Gartner Magic Quadrant for Secure Email Gateway Recommended reading for anyone evaluating messaging security solutions. See how Symantec is once again positioned as a Leader. Gartner positions vendors as Leaders, Challengers, Visionaries or Niche Players bsed on ability to execute and completeness of vision. Get the Report Now Free. You received this information as part of your SecurityWeek Email Briefing subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past.

COLITE ISQUEMICA PDF

.

Related Articles