MAGIC QUADRANT FOR ENDPOINT PROTECTION PLATFORMS 2013 PDF DOWNLOAD

Pages: 209
File size: 4.92MB
License: Free PDF
Added: Fenrir
Downloads: 40.555

It can also manage the Windows firewall. This enhancement provides analyst commentary on the market and notable vendors from key client contexts.

Gartner Magic Quadrant for Endpoint Protection Platforms

Disruptions to this relationship could have consequences for Lumension’s customers. The vendor’s strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the “home” or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market. The Win32 console is complicated and is not designed for nontechnical users.

Gartner is a registered trademark of Gartner, Inc. Recommended Reading Some documents may not be available as part of your current Gartner subscription. McAfee’s ePolicy Orchestrator ePO policy management and reporting framework provides a platform that is very capable and scalable to support all McAfee products.

Page 14 of 35 Gartner, Inc. We primarily used reference customers’ satisfaction scoring of the vendor in an online survey, and data received from EPP vendor reference customers and resellers and Gartner clients during our inquiry process to score the vendor on customer satisfaction with the company and the product. See our Privacy Policy and User Agreement for details. Ultimately, all EPP solutions must provide a range of protection options — from very restrictive application control for single-purpose devices to light-touch configuration compliance checks for unmanaged employee devices.

Automated malware damage cleanup capabilities are limited. How do I use a Gartner Magic Quadrant?

Magic Quadrant for Endpoint Protection Platforms

Visionaries Understand where the market is going or have a vision for changing market rules, but do not yet execute well. G Page 19 of 35 Consider the level of optimization and integration for virtual servers, but do not kagic that solutions must be centralized to provide good performance.

Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. In particular, application control, which restricts execution to known good applications, is proving effective in demanding security environments.

Two major 201 in the current crop of EPP solutions that need to be addressed in future products are improved security state assessments with recommended actions and an platforma forensic incident response capability. A lack of consumer market presence further reduces opportunities for visibility.

There is significant variation in the quality of attack prevention, as illustrated by malware testing. Arkoon’s Ability to Execute score is hampered by its relatively small market share and limited geographic presence, as well as its still-maturing management capabilities. Mac OS is on its road map.

G Page 9 of 35 G Page 5 of 35 6. G Page 13 of 35 This is the quantity and quality of integrated technology to protect data that resides on endpoints, such as full-disk encryption and DLP. A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the website, advertising, customer programs and positioning statements.

Magic Quadrant for Endpoint Protection Platforms

Market acceptance of Deep Defender has been lackluster and plans for additional Deep products are less comprehensive than comparable products, such as Bromium.

Smaller organizations will likely find the offering too complex for their resources and requirements. Page 24 of 35 Gartner, Inc. Inclusion and Exclusion Criteria Inclusion in this Magid Quadrant was limited to vendors that met these minimum criteria: Improving test results is a key McAfee product management objective for Buyers should favor solutions that have a short-term road map of integration of the MDM capability into the broader suite.

Neither SkyRecon nor its parent company Arkoon has significant brand recognition 22013 a significant enterprise client base outside of Europe. Current Lumension customers, or those seeking integrated solutions for security, operations and compliance, should add the vendor to their shortlists. System Center Configuration Manager is not as easy to deploy and maintain as purpose- built EPP management platforms, and is overkill for organizations that use progection PC management solutions.

It also allows Webroot to mine aggregate maigc information from endpoints for new threats, and it removes the need for signature definition updates. These vendors now appear under their parent company names. G Page 21 of 35 The information contained in this publication has been obtained from sources believed to be reliable. The acquisition of CoreTrace will bolster this capability, but integration will take some time. Lumension Security The Lumension Endpoint Management and Security Suite LEMSS is delivered as a single-server, single-console, single-agent architecture that includes AV, application control, encryption, device control, patch management and remediation.

Webroot SecureAnywhere is a reasonable shortlist inclusion for organizations in supported geographies seeking fro lightweight behavior-based approach to malware detection.

Magic Quadrant Research Methodology | Gartner Inc.

Indeed, even a simple indicator of potential dwell time is lacking. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. Clipping is a handy way to collect important slides you want to go back to later. Buyers should look for good repair tools, as well as the capability to alert administrators about threats that may have had a longer dwell time or more virulent infections.

However, it is clear that malware that has a longer residence or dwell time and those that are components of multiphased attacks require a different response.