The Forrester Wave™: Endpoint Security Suites, Q3 2019

  • Endpoint security suites are now more than ever being tasked with protecting against targeted-style threats that utilize multiple stages.
  • As mass threats increase in sophistication, buyers and vendors have begun focusing on behavioral detection with automatic response.
  • The Forrester Wave evaluation highlights Leaders, Strong Performers, Contenders, and Challengers.

Security leaders are concerned with increasing complexity in their endpoint environment, compounded by advanced, multistage attacks going beyond typical malware.

  1. Endpoint security suites are now more than ever being tasked with protecting against targeted-style threats that utilize multiple stages involving user interactions, exploit chaining, and script-based attacks.
  2. As mass threats increase in sophistication, buyers and vendors have begun focusing on behavioral detection with automatic response.

As a result of these trends, endpoint security suite customers should look for providers that:

  • Tightly integrate threat prevention, detection, and response. Many organizations have experimented with endpoint point-products such as endpoint detection and response (EDR) and app isolation tools but failed to see significant business value due to the steep operational requirements of managing these solutions. Endpoint security suites help address this gap by automating and orchestrating multiple threat prevention, detection, and response capabilities into a single product.
  • Extend visibility and control over a broad endpoint ecosystem. Endpoint buyers are looking to protect an increasing number of devices brought into the workplace. Mature suite offerings today offer threat prevention and detection capabilities across Windows, Mac, and Linux. Chromebooks and embedded device coverage are also offered by some of the suites on the market.
  • Offer flexibility in a variety of environments and risk tolerances. Endpoint security suites generally offer a myriad of configurations and deployment models (i.e., cloud-managed, on-prem) to meet the needs of the most restricted to the most culturally relaxed environments. The best solutions use risk-based approaches to policy architecture and enforcement in order to help support a Zero Trust device posture.

Evaluation Summary

The Forrester Wave evaluation highlights Leaders, Strong Performers, Contenders, and Challengers. It’s an assessment of the top vendors in the market and does not represent the entire vendor landscape. You’ll find more information about this market in Forrester’s annual state of endpoint security report.

Forrester Wave™: Endpoint Security Suites

We evaluated vendors against 25 criteria, which we grouped into three high-level categories: Current Offering, Strategy, and Market Presence.

Vendor Offerings

Forrester included 15 vendors in this assessment: Bitdefender, BlackBerry Cylance, Carbon Black, Check Point, Cisco, CrowdStrike, ESET, FireEye, Kaspersky, McAfee, Microsoft, Palo Alto Networks, Sophos, Symantec, and Trend Micro.

Forrester included 15 vendors in this assessment: Bitdefender, BlackBerry Cylance, Carbon Black, Check Point, Cisco, CrowdStrike, ESET, FireEye, Kaspersky, McAfee, Microsoft, Palo Alto Networks, Sophos, Symantec, and Trend Micro.

We evaluated vendors against 25 criteria, which we grouped into three high-level categories:

  • Current offering. Each vendor’s position on the vertical axis of the Forrester Wave graphic indicates the strength of its current offering. Key criteria for these solutions include threat
    prevention, threat detection, control, and product performance.
  • Strategy. Placement on the horizontal axis indicates the strength of the vendors’ strategies. We evaluated product road map, corporate vision and focus, Zero Trust framework alignment, and security community involvement.
  • Market presence. Represented by the size of the markers on the graphic, our market presence scores reflect each vendor’s partner ecosystem and enterprise customer base.

Vendor Inclusion Criteria

Forrester included 15 vendors in the assessment: Bitdefender, BlackBerry Cylance, Carbon Black, Check Point, Cisco, CrowdStrike, ESET, FireEye, Kaspersky, McAfee, Microsoft, Palo Alto Networks, Sophos, Symantec, and Trend Micro. Each of these vendors has:

  • A security suite that can prevent, detect, and remediate endpoint threats. We consider solutions that offer only one or two of these three capabilities to be point products, not suites.
  • A high degree of interest from enterprise buyers. We only included vendors that have substantial interest from enterprise security decision makers. For example, Forrester clients ask questions about each vendor by name during inquiries and other interactions.

Gain greater confidence in your decisions by working with Forrester thought leaders to apply our research to your specific business and technology initiatives.

For More Details Visit Tech Cloud Link

Only $1/click

Submit Your Ad Here

techcloud link

Tech Cloud Link is the place to get free technology whitepapers downloads in a variety of formats, including PDF versions of popular articles tech briefs, tech whitepapers, and research articles into profoundly diverse spectrum within IT landscape. Here you will resolve trending IT concerns on topics like – Network Communication – Storage – Data Center – Server – Network Security. The whitepapers accurately address convergence between industrial and enterprise networks and collections of Articles, Features, Slide Shows and Analysis on Enterprise IT, Business and Leadership strategies that focus on critical
https://techcloudlink.com/

Leave a Reply