SlideShare a Scribd company logo
1 of 18
Download to read offline
Forrester research, inc., 60 acorn Park Drive, cambridge, Ma 02140 uSa
tel: +1 617.613.6000 | Fax: +1 617.613.5000 | www.forrester.com
The Forrester Wave™: Emerging
Managed Security Service Providers,
Q1 2013
by ed Ferrara, January 8, 2013 | updated: February 14, 2013
For: Security &
risk Professionals
Key TaKeaWays
emerging Mssps have laudable Capabilities, Forward-Thinking
strategies, and surprising Client lists
These emerging players deserve a hard look. They offer comprehensive, professionally
delivered security services. Some are pioneering cloud-based delivery, and others
resell their services through a growing MSSP reseller channel. All are growing at rates
of 30% to 40% per year and have great technical depth and flexibility.
Being a Big Fish in a small pond Can Be a good Thing
CISOs interviewed for this research indicated they liked being the vendor’s biggest
customer. This offers better value. One CISO at a financial services company said, “I
don’t need an MSSP with 10 SOCs and analysts fluent in 12 languages. When I call
I want to know the name of the person on the other end of the phone and how they
will help me.”
Cloud, saas security, and Customer satisfaction are Key
differentiators
The Leaders in this Forrester Wave want to grow their businesses. Some aspire to
serve enterprise-class clients, while a few others think their future lies is serving
small and midsize businesses. The cloud, software, and hardware-as-a-service play
a big role with two of the Leaders — differentiating them from the pack and other
MSSPs as well.
© 2013, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available
resources. Opinions reflect judgment at the time and are subject to change. Forrester®
, Technographics®
, Forrester Wave, RoleView, TechRadar,
and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. To
purchase reprints of this document, please email clientsupport@forrester.com. For additional information, go to www.forrester.com.
For Security & Risk Professionals
Why Read This Report
In Forrester’s 15-criteria evaluation of the emerging managed security services provider (MSSP)
market, we identified the 10 most significant providers in this category — Alert Logic; CompuCom;
Integralis; Network Box; Savvis, A CenturyLink Company; Secure Designs; SilverSky; StillSecure; Tata
Communications; and Vigilant— and researched, analyzed, and scored them. These 10 providers have less
revenue, smaller physical plants, and fewer staff than the nine North American MSSP firms covered in our
Forrester Wave™ published in March 2012, but they are growing rapidly. To help security and risk (S&R)
professionals select the right managed security services partner, this report uses our criteria to evaluate
each service provider and plots where they stand in relation to each other.
Table Of Contents
CISOs Now Have Multiple Options For
Managed Security Services
What It Means To Be Emerging
Emerging MSSPs Address Security
Complexity And Contain Costs
Managed Security Services: Emerging Player
Evaluation Overview
Evaluation Focused On Breadth Of Capabilities,
Flexibility, And Customer Satisfaction
Evaluated Vendors Offer A Full Suite Of
Managed Security Services
Evaluation Analysis
Vendor Profiles
Supplemental Material
Notes & Resources
Forrester conducted services evaluations
in Q2 2012 and interviewed 10 managed
security service providers: Alert Logic;
CompuCom; Integralis; Network Box; Savvis,
A CenturyLink Company; Secure Designs;
SilverSky; StillSecure; Tata Communications;
and Vigilant.
Related Research Documents
Source Your Security Services
April 25, 2012
The Forrester Wave™: Managed Security
Services: North America, Q1 2012
March 26, 2012
2012 Budget And Planning Guide For CISOs
December 15, 2011
The Forrester Wave™: Emerging Managed
Security Service Providers, Q1 2013
Ten Emerging Service Providers That Have The Chops To Be Your
Managed Security Service Provider
by Ed Ferrara
with Laura Koetzle, Chris McClean, Nick Hayes and Kelley Mak
2
2
4
6
9
11
14
January 8, 2013
Updated: February 14, 2013
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 2
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
CISOs now have multiple options for managed security services
Although information security is a critical function, it’s no longer necessary to do it all in-house.
Thus, 21% of those surveyed in Forrester’s Forrsights™ Security Survey, Q2 2012 planned to spend
more of their budget with managed security service providers (MSSP) in the coming year.1
This
growth percentage was the same in our 2011 survey, and MSSPs are currently reporting between
18% and 21% growth on an annualized basis. The numbers show a clear trend, and there’s a growing
consensus that outsourcing security is a viable option for many companies. In response to this new
demand, MSSPs are expanding and new firms are entering the managed security services (MSS)
market. This is good news for security and risk (S&R) professionals because it increases choice and
makes services pricing more competitive. It also makes provider selection more challenging because
of the increased number of choices.
WHAT IT MEANS TO BE EMERGING
The companies in this Forrester Wave represent some of the best emerging players in the market.
Forrester uses the term “emerging” to distinguish this group of MSSPs from the larger, more
established players in the market we covered in our March 2012 Wave.2
Forrester divides the MSSP
market into three categories or divisions (see Figure 1).3
Division 1 includes the largest enterprise-
class providers. These MSSPs offer multiple security operations centers (SOCs) in multiple
geographies, employ from 100 to more than 1,500 engineers, and have revenues between $70
million and $400 million. Division 2 includes the emerging MSSPs. These companies have from 20
to 100 engineers, one or two SOCs, and revenues between $25 million and $70 million. Division 3
includes many smaller firms that serve the small business market. These companies have a single
SOC and a small staff of security analysts numbering no more than 10. Revenues for these firms are
less than $25 million. This Forrester Wave evaluates nine Division 2 and one Division 3 emerging
MSSPs. These firms offer:
■	Competent security technology skills. These firms use both proprietary and licensed
technology for their service offerings. In some cases, these firms will extend licensed technology
to improve the licensed technology’s capabilities, and some firms resell other firms’ services.4
These MSSPs support a variety of different technologies, including firewalls (current, next-
generation, and web application); intrusion detection; endpoint and server antivirus; host
intrusion and detection and protection; log management, archival, and maintenance; systems
management; threat intelligence; intrusion protection; proxies; security incident and event
management; and web application monitoring technology.
■	Effective pricing. The firms evaluated in this Wave don’t have the same cost structures as larger
firms. They have smaller physical plants, lower marketing costs, and lower cost structures
overall. These lower costs allow them to offer services that are similar to those provided by the
Division 1 MSSPs but with lower overall cost.
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 3
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
■	Excellent customer service. Clients of the emerging MSSPs gave their providers very positive
feedback on their pricing and quality of service. There was variability in the client responses, but
overall, the MSSPs in this Wave did well in the customer satisfaction category. When the clients
needed help, the best MSSPs didn’t simply point to a contract but demonstrated flexibility and
worked with their clients to resolve the issue.
■	Experienced and trained staff. The firms reviewed here, in general, have very capable staffs that
know the technologies they support. All the firms have formal training programs and apprentice
programs, to provide staff necessary skills and experience. These firms use their experience to
detect network, application, and server intrusions. The firms also have the necessary experience
to identify and address cyberthreats in a number of modes, ranging from simple monitor and
alert all the way to complete incident response management.5
Although the number of staff
for these firms is not large — the smallest has a staff of 10 and the largest a staff of 200 — these
companies are able to demonstrate effective technical and operational competence.
■	Flexibility. Clients praised these emerging MSSPs for their operational flexibility and
appreciated their response during security incidents: Rather than spending time analyzing the
SLAs and the contract to determine whether the incident was covered, the emerging MSSPs
jumped in and worked with their customers to resolve the problems.
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 4
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
Figure 1 MSSP Market Segmentation
Source: Forrester Research, Inc.86781
MSS revenue $70M to $400M
SOCs More than two, with significant redundancy and BCP-DR
Analysts/engineers More than 100 analysts, engineers, and advanced threat engineers
Technology Proprietary orsignificantly enhanced technology
Portfolio Full portfolio of standard services (someOEM and white-label possible,
but a lowpercentage)
Language support Multilanguage support
Average client profile Morethan 2,000 employees
MSS revenue Greater than $25M and less than $70M
SOCs One to two SOCs
Analysts/engineers More than 10 and fewer than 100 analysts, engineers, and advanced
threat engineers
Technology Significantly enhanced licensed technology
Portfolio Full portfolio of services (morewhite-label relationships than
in Division 1)
Language support One to two languages
Average client profile Morethan 100 but usually fewer than 2,000 employees
MSS revenue Less than $25M
SOCs One, with limited redundancy
Analysts/engineers Fewer than 10 analysts, engineers, and advanced threat engineers
Technology No threat intelligence services, unless reselling another company’s service
Portfolio Narrow portfolio of services
Language support One
Average client profile Fewer than 100 employees; 20to 50 employees is most common
Division 1
Division 2
Division 3
EMERGING MSSPs ADDReSS SECURITY COMPLEXITY AND CONTAIN COSTS
Historically, MSSPs offered a series of point solutions without much integration. S&R professionals
today want to simplify security operations and lower their costs, which they can do by sourcing their
tools and processes for network and application security from an MSSP. This also allows the S&R
pros to focus on other security issues.6
The MSSP’s ability to reduce complexity and provide great
situational awareness separates the Leader from the Strong Performer and the Strong Performer
from the Contender. The MSSPs in this Wave vary in their ability to deliver consistently. S&R pros
should focus on these elements when doing due diligence on emerging MSSPs:
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 5
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
■	Advanced delivery models — security software- and hardware-as-a-service. The economy
of scale that encourages companies to move other workloads to the cloud also applies to
security. Several of the emerging MSSPs offer cloud-based solutions for activity monitoring,
log management, and distributed denial of service (DDoS) protection including CompuCom,
Network Box, Savvis/Century Link, and Tata Communications. Alert Logic, SilverSky, and
Savvis/Century Link provide log management as a cloud-based service, and Network Box
provides both hardware and software as part of its unified threat management (UTM) service,
providing the hardware as part of the company’s security protection services.
■	Different value propositions. Information security is an activity built on trust. If an MSSP is
a good fit for your company it will become immediately obvious, and trust soon follows. The
MSSP market is very broad and dynamic, with players offering similar services. Security and
risk pros should consider a potential provider’s value proposition. For example, some MSSPs
offer low cost, others service bundles, all have different pricing models. Not all companies need
an MSSP that operates seven SOCs and supports 10 languages. What they do need is excellent
technical competence, responsiveness, and flexibility.
■	White-label reselling of services. The MSSP market is fast becoming a bazaar of OEM services
resold by various providers. Alert Logic, for example, resells its Threat Manager and Log
Manager services to other MSSPs.7
You’ll need to know the integration points between providers
in the service you’ve contracted for so that you can ensure you’re protected from any integration
failures. Security and risk professionals should also be careful of third-party “carve-outs” in
cases where information security compliance is an issue.8
A carve-out is a clause in the service
provider’s contract that says they will provide some level of certainty regarding the security of
client data, except when they are reselling a service from another third party.
■	Licensed technology. Licensed technology is at the core of these MSSPs’ offerings. The
emerging MSSPs we analyze all deliver services using licensed technology from security
solution vendors such as EMC-RSA, Fortinet, HP-ArcSight, Kaspersky, McAfee, SonicWall,
and Symantec, to name just a few. Depending on the technology, the MSSPs either enhance or
configure the technology to meet client requirements.
■	A broad portfolio of services. All the MSSPs in this Forrester Wave provide what we consider
to be a core set of services — the most important services an MSSP should offer (see Figure 2).
These providers all provide good coverage of these core services.
■	Service line importance. We asked the MSSPs what percentage of their customers use a
particular service. Depending on the service, the answers varied from as little as 2% to as high
as 80%. Unless the service is new and targeted for growth, the firm may just offer the service as
a sideline. This is a good indicator of the MSSP’s ability to provide the service.
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 6
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
Figure 2 Core MSSP Services List
Source: Forrester Research, Inc.86781
APT detection and remediation Identity and access management services
Distributed/denial of service (DDoS) Log management, monitoring, and archive
Email filtering (spam, AV, etc.)
Network intrusion detection/protection systems
management
Emergency response services Server patch management
Endpoint antivirus
SIEM (security information and event
management)
Endpoint patch management Threat intelligence
Firewall management Vulnerability testing
Governance, risk, and, compliance consulting Web application firewall
Web application monitoring
Host intrusion detection/protection system
management
Managed security services: emerging Player evaluation overview
To assess the state of the North American market for emerging managed security services players
and see how the vendors stack up against each other, Forrester evaluated the strengths and
weaknesses of top emerging MSSPs with a substantial client base.
Evaluation Focused On Breadth Of Capabilities, Flexibility, And Customer Satisfaction
After examining past research, user need assessments, and vendor and expert interviews, we
developed a comprehensive set of evaluation criteria. We evaluated vendors against 15 criteria,
which we grouped into three high-level categories:
■	Current offering. Each vendor’s position on the vertical axis of the Forrester Wave graphic
indicates the strength of its current MSS product offering. The sets of capabilities evaluated in
this category are value proposition, customer satisfaction, delivery capabilities, cloud and hosted
services, infrastructure and perimeter, value-added services, content and application security,
and staff dedication to MSS.
■	Strategy. A vendor’s position on the horizontal access indicates the strength of its MSS strategy,
specifically focused on innovation and thought leadership, and company growth plans. This
includes plans for new service offerings and capabilities such as threat intelligence.
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 7
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
■	Market presence. The size of the vendor’s bubble on the chart indicates its market presence,
which Forrester measured based on the company’s overall presence in the marketplace, its
North American market presence, and its overall and MSS-specific financials.
Evaluated Vendors Offer A Full Suite Of Managed Security Services
Forrester included 10 vendors in the assessment: Alert Logic, CompuCom, Integralis, Network Box,
SilverSky, Savvis/CenturyLink, Secure Designs, Still Secure, Tata Communications, and Vigilant.
Each of these vendors has (see Figure 3):
■	A focus on managed security services. All of the participants in this Wave have a focused MSS
business. However, Savvis/CenturyLink, Integralis, and Tata Communications are business units
of larger companies that offer other products’ services in addition to managed security.9
CompuCom is a large IT services company that offers other IT services in addition to managed
security. This Wave, however, focuses solely on the vendors’ managed security service capabilities.
■	Significant interest from Forrester customers. Forrester considered the level of interest from
our clients based on our various interactions, including inquiries, advisories, and consulting
engagements.
■	A comprehensive set of service offerings. A comprehensive suite of offerings means more than
having multiple SOCS. It also means having a portfolio of services. This portfolio should include
services such as distributed denial of service protection; security event analysis and correlation;
firewall management; intrusion detection and protection management; log monitoring,
management, and retention; security incident and event monitoring and management (SIEM);
web filtering and monitoring; virus, spyware; and instant messaging protection.
■	Experienced SOC analysts. The provider has 10 or more analysts or engineers that spend at
least 80% of their time dedicated to the provider’s managed security services. Junior analysts
should have one to two years of experience; mid-level analysts should have three to five years of
experience, and senior analysts should have more than five years of experience.
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 8
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
Figure 3 Evaluated Vendors: Vendor Information And Selection Criteria
Source: Forrester Research, Inc.
Vendor
Alert Logic
CompuCom Systems
Integralis
Network Box
Savvis, A CenturyLink
Company
Secure Designs
SilverSky
StillSecure
Tata Communications
Vigilant
No. of
SOCs
1
1
7
12
4
1
1
2
2
1
SOC locations
Houston, Texas
Dallas
Singapore, US (Calif, Va.), UK,
Norway, Sweden, Japan
US, UK, Japan, Korea, Hong Kong,
Taiwan, Malaysia, Indonesia,
Thailand, China, Australia
US (Mo., Minn.); Bangalore, India;
London
Greensboro, N.C.
Raleigh, N.C.
Fort Lauderdale, Fla.; Denver
Chennai, India; Singapore
Jersey City, N.J.
No. of MSS clients
(deal size $25K+)
200
89
674
Forrester
estimate: 250+
Forrester
estimate: 250+
4
95
Forrester
estimate:~30
Forrester
estimate: ~30
28
Portal
evaluated
Alert Logic
web interface
CompuCom
proprietary
ISIS portal
UTM+ Portal
SavvisStation
SDI Portal
ViewPoint
RADAR
Shiva
Fusion
Portal
version
N/A
3.0
3.14.0
3.2
6.0
1.2
2.6
1.48
3.0
1.2
Vendor selection criteria
A focus on managed security services. All of the participants in this Wave have a focused MSS business.
Significant interest from Forrester customers. Forrester considered the level of interest from our clients
based on our various interactions, including inquiries, advisories, and consulting engagements.
A comprehensive set of service offerings. A comprehensive suite of offerings means more than having
multiple SOCs. It also means having a portfolio of services.
Experienced SOC analysts. The provider has 10 or more analysts or engineers that spend at least 80% of
their time dedicated to the provider’s managed security services.
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 9
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
Evaluation analysis
All of the MSSPs reviewed for this research have different strengths and value propositions. The
Leaders all had the common characteristics of sound technology, strong execution, and good to
great strategies. The Strong Performers also had their list of strengths but did not rate as well in
areas such as number of service offerings, client success metrics, and security certifications for staff.
Rapid growth characterizes all the firms in this review. Please consult the Wave Model for specific
category scores. The evaluation uncovered a market in which (see Figure 4):
■	Alert Logic, SilverSky, and Integralis are Leaders. Alert Logic and SilverSky strengths were
business and technical value. Integralis’ strength was the breadth of its offerings. Overall, these
firms were found to be Leaders because of their ability to execute for their clients. These Leaders
plan to continue investing their MSS offerings to make sure that they remain competitive and
advance in the marketplace.
■	StillSecure, Savvis/CenturyLink, and Network Box are Strong Performers. The Strong
Performers all offer solid service offerings. Network Box offers a software- and hardware-as-a-
service UTM device that includes device monitoring and event reporting services. StillSecure
and Savvis/CenturyLink offer both cloud-based and traditional managed security services, and
both companies are working to expand their cloud-based security solutions. Savvis/Century
Link, for example, has very aggressive cloud offerings, and the company’s DDoS capabilities
round out a strong portfolio of services. Clients looking to outsource security and reduce
complexity and costs should consider these companies.
■	Vigilant, Tata Communications, Secure Designs, and CompuCom are Contenders. The
Contenders all offer security services and competitive levels of expertise and pricing. These
firms scored inconsistently across the scoring categories. Vigilant, for example, scored well in
the SLA adherence and threat intelligence categories of the review. This shows vision, but the
company didn’t score as well in the client reference category. Secure Designs did well with its
client reference score but not as well in business and technical value. Tata Communications
scored well in SLA adherence and not as well in the client reference score. CompCom has a
similar profile. These providers are strong contenders and have value propositions that will be
attractive to clients looking for value from the MSSP partner.
This evaluation of these emerging managed security services market is intended to be a starting
point. We encourage readers to view detailed product evaluations and adapt the criteria weightings
to fit their individual needs through the Forrester Wave Excel-based vendor comparison tool.
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 10
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
Figure 4 Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013
Source: Forrester Research, Inc.
Go online to download
the Forrester Wave tool
for more detailed product
evaluations, feature
comparisons, and
customizable rankings.
Risky
Bets Contenders Leaders
Strong
Performers
StrategyWeak Strong
Current
offering
Weak
Strong
Market presence
Full vendor participation
Alert Logic
CompuCom
Integralis
Network Box
SilverSkySavvis, A CenturyLink
Company
Secure
Designs
StillSecure
Tata Communications
Vigilant
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 11
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
Figure 4 Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 (Cont.)
Source: Forrester Research, Inc.
AlertLogic
CompuCom
Integralis
NetworkBox
Savvis,ACenturyLink
Company
SecureDesigns
SilverSky
StillSecure
CURRENT OFFERING
Business and technical value
Client references
Client success metrics
SLA adherence
MSS employees
Security services
SOCs and BC/DR
Portal functionality and reporting
Threat intelligence and analytics
Key differentiators
STRATEGY
R&D investments in 2012
Innovation for 2H 2012
and 1H 2013
Geographic/vertical reach
and future expansion
MARKET PRESENCE
Corporate and MSS revenues
Number of unique MSS clients
4.14
5.00
5.00
3.00
5.00
4.00
1.00
1.00
5.00
3.00
0.00
4.60
5.00
5.00
1.00
3.10
1.00
4.00
Forrester’s
Weighting
50%
25%
35%
3%
2%
10%
10%
5%
5%
5%
0%
50%
50%
40%
10%
0%
30%
70%
2.58
3.00
3.00
0.00
4.00
2.00
2.00
2.00
3.00
1.00
0.00
1.50
1.00
2.00
2.00
2.30
3.00
2.00
3.30
3.00
3.00
0.00
5.00
4.00
4.00
5.00
4.00
3.00
0.00
4.40
5.00
4.00
3.00
4.10
2.00
5.00
3.16
3.00
3.00
3.00
1.00
5.00
3.00
5.00
1.00
3.00
0.00
2.40
3.00
2.00
1.00
2.10
0.00
5.00
3.44
3.00
4.00
2.00
4.00
2.00
4.00
4.00
4.00
3.00
0.00
3.00
3.00
3.00
3.00
4.10
2.00
5.00
3.62
5.00
3.00
4.00
5.00
3.00
4.00
1.00
3.00
4.00
0.00
4.70
5.00
5.00
2.00
2.40
1.00
3.00
2.39
1.00
4.00
3.00
5.00
1.00
2.00
2.00
3.00
0.00
0.00
1.90
2.00
2.00
1.00
0.70
0.00
1.00
2.90
1.00
4.00
5.00
5.00
3.00
2.00
3.00
4.00
3.00
0.00
3.60
5.00
2.00
3.00
1.00
1.00
1.00 TataCommunications
Vigilant
2.40
3.00
2.00
0.00
5.00
2.00
2.00
3.00
3.00
3.00
0.00
2.70
5.00
0.00
2.00
1.00
1.00
1.00
1.86
3.00
1.00
2.00
5.00
1.00
2.00
1.00
1.00
4.00
0.00
3.50
5.00
2.00
2.00
0.70
0.00
1.00
All scores are based on a scale of 0 (weak) to 5 (strong).
Vendor Profiles
Leaders
■	Alert Logic. Alert Logic provides intrusion detection services, event analysis and correlation,
log monitoring, log retention, vulnerability management, and web application firewall (WAF)
services, based almost entirely on internally developed technology. Most customers report
being pleased with the service. Alert Logic also provides these services as an OEM to hosting
companies and other MSSPs such as SunGard, Rackspace, and NaviSite. Alert Logic’s very
strong customer satisfaction rating, business and technical value, SLA adherence, and portal put
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 12
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
Alert Logic on the Leaders list. Alert Logic’s cloud-based delivery model demonstrates what’s
possible for cloud-based services and security.
■	SilverSky. SilverSky, formerly known as Perimeter E-Security, has more than 6,000 clients,
including many financial services firms.10
SilverSky has positioned its security service as a SaaS
offering. Services offered include log management, vulnerability management, and unified
threat management.11
The combination of strong business and technical value, SLA adherence,
plus SilverSky’s innovative use of the cloud to deliver managed security services puts SilverSky
solidly in the Leaders category. SilverSky is also working hard on the R&D front to deliver
security from the cloud more effectively.
■	Integralis. Integralis has one of the broadest service portfolios of the emerging MSSPs we
evaluated. Its offerings include email filtering and management, encryption, event analysis and
correlation, firewall and next-generation firewall management, intrusion detection and
protection systems management, log monitoring and retention, mobile security/mobile device
management (MDM), vulnerability scanning and patching services, web (filtering and
monitoring), virus, spyware, and instant messaging (IM) protection. Integralis’ scores for SLA
adherence, SOC operations, and employee retention push this company into the Leader category.
Strong Performers
■	StillSecure. StillSecure provides a good breadth of managed security services and specializes in
services packages for HIPAA and PCI compliance. Other offerings include firewall management
services, IDS, IPS, log monitoring, management and archival services, vulnerability
management, web application firewall, and multi-factor authentication. StillSecure also offers
threat intelligence services using StillSecure and third-party information sources.
■	Savvis, A CenturyLink Company. Forrester estimates that Savvis/Century Link has more than
1,000 security clients; it has delivered security services for more than 12 years. Savvis offers a
full portfolio of security services, including both traditional and cloud-based offerings, notably
DDoS and log management. The company boasts strong customer references, an excellent
customer information portal, and comprehensive business continuity planning for SOC
operations. Savvis/Century link will be attractive to customers that want a robust MSSP backed
by one of the largest enterprise networking providers in the United States.
■	Network Box. Network Box uses a proprietary unified threat management device for network
monitoring. Network Box trains its team well on Network Box’s technology, and clients confirm
that the UTM service reduces operational risk and enhances operational performance. Network
Box’s offering will appeal to companies that are looking for a managed UTM appliance with
active support from a professional security staff.
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 13
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
Contenders
■	Vigilant. Vigilant’s Fusion Service for SIEM offers modules for SIEM systems management,
use case development, threat intelligence, and incident response that it can combine into a
customized service for risk-focused SIEM program management. Vigilant’s business model
is to provide support for Fortune 500 clients and their on-premises-based SIEMs. This co-
sourcing model leaves the equipment, security software, and data in the customer’s data center.
Vigilant manages the client technologies from its SOC, leaving the equipment, security software,
and data in the customer’s data center. The company also has very good threat intelligence
capabilities, and as noted in other research, this is a significant differentiator for MSSPs.11
Vigilant will be attractive to customers that want to maintain control of their physical assets and
data and those that want to tie threat awareness directly to monitoring use cases.
■	Tata Communications. As an offshore MSSP, Tata Communications provides security
monitoring services as well as DDoS mitigation services, event analysis and correlation services,
firewall management services, identity and access management services, IPS, IDS and log
monitoring, management and archival services, SIEM and cross-correlation services, and
vulnerability patching services at a very competitive price. Tata Communications provides 24x7
service from two locations (Chennai, India; and Singapore). Tata would be a good choice for
companies looking for an emerging offshore MSSP.
■	Secure Designs. Secure Designs (SDI) provides a majority of its services to the Fortune 1000,
although it also claims some Fortune 500 clients. The company provides white-label services
to other MSSPs for the following services: DDoS; email security and encryption; whole disk
encryption; event analysis and correlation; firewall and next-generation firewall management
services; IPS; log monitoring, management and archival; web application firewalls (WAFs); web
filtering and monitoring; and virus, spyware, and instant messaging protection. Secure Designs
focuses on micro SMB business clients.13
This makes Secure Designs a good fit for a widely
distributed company, such as an insurance firm with independent representatives or brokers
who also need information security services.
■	CompuCom. CompuCom emphasizes a simple and methodical approach to managed security
services. CompuCom operates one SOC on a 24x7x365 basis. Its service offerings include DDoS
mitigation services; event analysis and correlation services; firewall; IDS; IPS management
services; log monitoring, management, and archival; SIEM and event cross-correlation; and web
(filtering and monitoring), virus, spyware, and IM protection services.
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 14
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
Supplemental Material
Online Resource
The online version of Figure 4 is an Excel-based vendor comparison tool that provides detailed
product evaluations and customizable rankings.
Data Sources Used In This Forrester Wave
Forrester used a combination of three data sources to assess the strengths and weaknesses of each
solution:
■	Vendor surveys. Forrester surveyed vendors on their capabilities as they relate to the evaluation
criteria. Once we analyzed the completed vendor surveys, we conducted vendor calls where
necessary to gather details of vendor qualifications.
■	Portal demos. We asked vendors to conduct demonstrations of their portal’s functionality. We
used findings from these product demos to validate details of each vendor’s product capabilities.
■	Customer reference calls. To validate product and vendor qualifications, Forrester also
conducted reference calls with two of each vendor’s current customers.
The Forrester Wave Methodology
We conduct primary research to develop a list of vendors that meet our criteria to be evaluated
in this market. From that initial pool of vendors, we then narrow our final list. We choose these
vendors based on: 1) product fit; 2) customer success; and 3) Forrester client demand. We eliminate
vendors that have limited customer references and products that don’t fit the scope of our evaluation.
After examining past research, user need assessments, and vendor and expert interviews, we develop
the initial evaluation criteria. To evaluate the vendors and their products against our set of criteria, we
gather details of product qualifications through a combination of lab evaluations, questionnaires,
demos, and/or discussions with client references. We send evaluations to the vendors for their review,
and we adjust the evaluations to provide the most accurate view of vendor offerings and strategies.
We set default weightings to reflect our analysis of the needs of large user companies — and/or
other scenarios as outlined in the Forrester Wave document — and then score the vendors based
on a clearly defined scale. These default weightings are intended only as a starting point, and we
encourage readers to adapt the weightings to fit their individual needs through the Excel-based
tool. The final scores generate the graphical depiction of the market based on current offering,
strategy, and market presence. Forrester intends to update vendor evaluations regularly as product
capabilities and vendor strategies evolve.
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 15
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
Endnotes
1	
Source: Forrsights Security Survey, Q2 2012.
2	
In Forrester’s 60-criteria evaluation of the North American managed security services market, we identified
the nine significant service providers in this category. This report details our findings about how each
service provider measures up, to help security and risk (S&R) professionals select the right partner for their
managed security services. For more information, see the March 26, 2012, “The Forrester Wave™: Managed
Security Services: North America, Q1 2012” report.
3	
Forrester had originally divided the MSS market into two segments — enterprise and other. However, upon
further research, we found substantial differences between the emerging providers we analyze in this Wave
and the MSSPs geared for serving the small business segments. Therefore, we’ve specified three MSSP
divisions, based on the size and capabilities of the firm.
4	
Reseller agreements are widely used in the emerging MSSP market. It’s sometimes more cost-effective and
efficient to resell a service than to try to create the service from scratch. Contracts with resellers typically
prohibit MSSPs from revealing the names of their resellers.
5	
MSSPs offer different levels of service based on consultation with their clients. At one end of the service
spectrum, MSSPs can offer simple monitor and alert services where the MSSP’s role is to monitor and
report suspicious events but not perform any threat remediation or incident response. At the other end
of the spectrum, the MSSP is responsible for threat monitoring, breach event remediation, and complete
incident response. MSSPs also offer different levels of support between the two ends of the spectrum based
on the type of contracted service.
6	
Selecting the correct services to outsource is an important decision for security and risk professionals.
Before security and risk professionals can determine what the organization can and should outsource, they
should organize security operations as a catalog or portfolio of services. Once they have this list they should
consider which are core to the business and core to security. These functions should probably remain with
employees. Everything else could potentially be outsourced. For more information, see the April 25, 2012,
“Source Your Security Services” report.
7	
Information on specific OEM relationships is difficult to determine in the MSSP market. The reseller does
not advertise these relationships, and the reseller will brand the service as its own. Companies considering
managed security services should ask specific questions about who will actually provide the service.
8	
Third-party carve-outs are an important issue when it comes to third-party security providers. This
obfuscates the relationship, as well as the accountability, of who is responsible for the security of client data.
For more information, see the October 31, 2011, “SAS 70 Out, New Service Organization Control Reports
In” report.
9	
CenturyLink is the third largest telecommunications company in the United States. The company provides
data, voice, managed services, cloud infrastructure, and hosted IT solutions, in local, national, and some
international markets. CenturyLink acquired Savvis in 2011.
For Security & Risk Professionals
The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 16
© 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013
Integralis is a subsidiary of NTT Communications. The company is one of the largest telecommunications
services providers in the world. NTT Communications is a subsidiary of NTT Group. In 2012, the NTT
Group ranked 29th in the Fortune Global 500 list. NTT had operating revenues of ¥10,507 billion for the
fiscal year ended March 31, 2012. The group employed 224,250 people worldwide as of March 2012.
Tata Communications Limited, along with its global subsidiaries (Tata Communications), provides globally
managed solutions to the Fortune 1000 and midsize enterprises, service providers, and consumers. Tata
Communications Ltd. is a part of the $100.09 billion Tata Companies; it is listed on the Bombay Stock
Exchange and the National Stock Exchange of India, and its ADRs are listed on the New York Stock
Exchange.
10	
SilverSky chose to rebrand this year based on plans to expand its service capabilities and address broader
areas of the IT services market.
11	
UTM is actually a portfolio of services that includes email and spam filtering, antivirus, and site white/
blacklisting.
12	
Forrester sees threat intelligence and sophisticated event correlation as new and important tools in the
battle against cybercrime. For more information, see the March 26, 2012, “The Forrester Wave™: Managed
Security Services: North America, Q1 2012” report.
13	
Microbusinesses are businesses with between one and 19 employees. This is a largely underserved market
and one that is growing rapidly for security services.
Forrester Research, Inc. (Nasdaq: FORR) is an independent research company that provides pragmatic and forward-thinking advice to
global leaders in business and technology. Forrester works with professionals in 17 key roles at major companies providing proprietary
research, customer insight, consulting, events, and peer-to-peer executive programs. For more than 29 years, Forrester has been making
IT, marketing, and technology industry leaders successful every day. For more information, visit www.forrester.com.	86781
«
Forrester Focuses On
Security & Risk Professionals
To help your firm capitalize on new business opportunities safely,
you must ensure proper governance oversight to manage risk while
optimizing security processes and technologies for future flexibility.
Forrester’s subject-matter expertise and deep understanding of your
role will help you create forward-thinking strategies; weigh opportunity
against risk; justify decisions; and optimize your individual, team, and
corporate performance.
Sean Rhodes, client persona representing Security & Risk Professionals
About Forrester
A global research and advisory firm, Forrester inspires leaders,
informs better decisions, and helps the world’s top companies turn
the complexity of change into business advantage. Our research-
based insight and objective advice enable IT professionals to
lead more successfully within IT and extend their impact beyond
the traditional IT organization. Tailored to your individual role, our
resources allow you to focus on important business issues —
margin, speed, growth — first, technology second.
for more information
To find out how Forrester Research can help you be successful every day, please
contact the office nearest you, or visit us at www.forrester.com. For a complete list
of worldwide locations, visit www.forrester.com/about.
Client support
For information on hard-copy or electronic reprints, please contact Client Support
at +1 866.367.7378, +1 617.613.5730, or clientsupport@forrester.com. We offer
quantity discounts and special pricing for academic and nonprofit institutions.

More Related Content

What's hot

Cryptika cybersecurity - company profile
Cryptika cybersecurity - company profileCryptika cybersecurity - company profile
Cryptika cybersecurity - company profileSafwan Talab
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentationJoseph Schorr
 
Data Sheet - Services Overview
Data Sheet - Services OverviewData Sheet - Services Overview
Data Sheet - Services OverviewStefania G Gilea
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert TriageSqrrl
 
Mindtree agile offering.
Mindtree agile offering.Mindtree agile offering.
Mindtree agile offering.Mindtree Ltd.
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualDayo Olujekun
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYSecureData Europe
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALMichael Bunn
 
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™Katie Nickels
 
NCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesNCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesOllie Whitehouse
 
RSA Advisory Part I
RSA Advisory Part IRSA Advisory Part I
RSA Advisory Part IOnomi
 
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...Priyanka Aash
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodologyciso_insights
 
If We Only Had the Time: How Security Teams Can Focus On What’s Important
If We Only Had the Time: How Security Teams Can Focus On What’s ImportantIf We Only Had the Time: How Security Teams Can Focus On What’s Important
If We Only Had the Time: How Security Teams Can Focus On What’s ImportantNathan Burke
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Javier Losa
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud SecurityPeak 10
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-managementAmit Bhargava
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 

What's hot (19)

Cryptika cybersecurity - company profile
Cryptika cybersecurity - company profileCryptika cybersecurity - company profile
Cryptika cybersecurity - company profile
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentation
 
Data Sheet - Services Overview
Data Sheet - Services OverviewData Sheet - Services Overview
Data Sheet - Services Overview
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
Mindtree agile offering.
Mindtree agile offering.Mindtree agile offering.
Mindtree agile offering.
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government Individual
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
 
NCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesNCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory Services
 
RSA Advisory Part I
RSA Advisory Part IRSA Advisory Part I
RSA Advisory Part I
 
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodology
 
If We Only Had the Time: How Security Teams Can Focus On What’s Important
If We Only Had the Time: How Security Teams Can Focus On What’s ImportantIf We Only Had the Time: How Security Teams Can Focus On What’s Important
If We Only Had the Time: How Security Teams Can Focus On What’s Important
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud Security
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 

Viewers also liked

LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewRobert Herjavec
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityRobert Herjavec
 
Three Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramThree Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramMorphick
 
LIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud ComputingLIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud ComputingRobert Herjavec
 
Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015Morphick
 
Rapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7
 
Le gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectivesLe gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectivesEASY EGOV
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveRobert Herjavec
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the CloudAlert Logic
 
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupsTapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupseFolder
 
Key Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP OfferingKey Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP OfferingeFolder
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave
 
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)Gabriel Dusil
 
How to Develop Your SaaS Pricing Model
How to Develop Your SaaS Pricing ModelHow to Develop Your SaaS Pricing Model
How to Develop Your SaaS Pricing ModelLincoln Murphy
 

Viewers also liked (17)

LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
 
Three Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramThree Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response Program
 
LIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud ComputingLIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud Computing
 
Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015Gamification of your Global Information Security Operations Center - RSA 2015
Gamification of your Global Information Security Operations Center - RSA 2015
 
Rapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance GuideRapid7 NERC-CIP Compliance Guide
Rapid7 NERC-CIP Compliance Guide
 
Le gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectivesLe gouvernement électronique au Togo : Etat des lieux et prospectives
Le gouvernement électronique au Togo : Etat des lieux et prospectives
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
 
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupsTapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
 
Key Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP OfferingKey Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP Offering
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
 
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
 
Ultimate Guide to SaaS Pricing
Ultimate Guide to SaaS PricingUltimate Guide to SaaS Pricing
Ultimate Guide to SaaS Pricing
 
How to Develop Your SaaS Pricing Model
How to Develop Your SaaS Pricing ModelHow to Develop Your SaaS Pricing Model
How to Develop Your SaaS Pricing Model
 

Similar to Forrester Emerging MSSP Wave

Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write UpClaudia Toscano
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016Tim Grieveson
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperMarc St-Pierre
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
MFX Services Brochure
MFX Services BrochureMFX Services Brochure
MFX Services BrochureMFX Fairfax
 
The_Forrester_Wave_Enterp
The_Forrester_Wave_EnterpThe_Forrester_Wave_Enterp
The_Forrester_Wave_EnterpYann Hermouet
 
Security analytics market
Security analytics marketSecurity analytics market
Security analytics marketpallavi_1234
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014Symantec
 
Sample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesResearchFox
 
Trends in Enterprise Adoption of MDM Features and Capabilities: Excerpt
Trends in Enterprise Adoption of MDM Features and Capabilities: ExcerptTrends in Enterprise Adoption of MDM Features and Capabilities: Excerpt
Trends in Enterprise Adoption of MDM Features and Capabilities: ExcerptKelly Teal
 
Sample Cloud Security - SMB
Sample Cloud Security - SMBSample Cloud Security - SMB
Sample Cloud Security - SMBResearchFox
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APACResearchFox
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingResearchFox
 
Sample Cloud Security - Healthcare
Sample Cloud Security - HealthcareSample Cloud Security - Healthcare
Sample Cloud Security - HealthcareResearchFox
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
Sample Cloud Security - Government
Sample Cloud Security - GovernmentSample Cloud Security - Government
Sample Cloud Security - GovernmentResearchFox
 
Sample Cloud Security - Enterprise
Sample Cloud Security - EnterpriseSample Cloud Security - Enterprise
Sample Cloud Security - EnterpriseResearchFox
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Risk & compliance magazine compressed
Risk & compliance magazine compressed Risk & compliance magazine compressed
Risk & compliance magazine compressed Mirror Review
 

Similar to Forrester Emerging MSSP Wave (20)

Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write Up
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
MFX Services Brochure
MFX Services BrochureMFX Services Brochure
MFX Services Brochure
 
The_Forrester_Wave_Enterp
The_Forrester_Wave_EnterpThe_Forrester_Wave_Enterp
The_Forrester_Wave_Enterp
 
Security analytics market
Security analytics marketSecurity analytics market
Security analytics market
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014
 
Sample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial Services
 
Trends in Enterprise Adoption of MDM Features and Capabilities: Excerpt
Trends in Enterprise Adoption of MDM Features and Capabilities: ExcerptTrends in Enterprise Adoption of MDM Features and Capabilities: Excerpt
Trends in Enterprise Adoption of MDM Features and Capabilities: Excerpt
 
Sample Cloud Security - SMB
Sample Cloud Security - SMBSample Cloud Security - SMB
Sample Cloud Security - SMB
 
Sample Cloud Security - APAC
Sample Cloud Security - APACSample Cloud Security - APAC
Sample Cloud Security - APAC
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - Manufacturing
 
Sample Cloud Security - Healthcare
Sample Cloud Security - HealthcareSample Cloud Security - Healthcare
Sample Cloud Security - Healthcare
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Sample Cloud Security - Government
Sample Cloud Security - GovernmentSample Cloud Security - Government
Sample Cloud Security - Government
 
Sample Cloud Security - Enterprise
Sample Cloud Security - EnterpriseSample Cloud Security - Enterprise
Sample Cloud Security - Enterprise
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Risk & compliance magazine compressed
Risk & compliance magazine compressed Risk & compliance magazine compressed
Risk & compliance magazine compressed
 

More from Envision Technology Advisors

Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Envision Technology Advisors
 
Unleashing IT: Seize Innovation, Accelerate Business, Drive Outcomes. All thr...
Unleashing IT: Seize Innovation, Accelerate Business, Drive Outcomes. All thr...Unleashing IT: Seize Innovation, Accelerate Business, Drive Outcomes. All thr...
Unleashing IT: Seize Innovation, Accelerate Business, Drive Outcomes. All thr...Envision Technology Advisors
 

More from Envision Technology Advisors (20)

How to Migrate Without Downtime
How to Migrate Without DowntimeHow to Migrate Without Downtime
How to Migrate Without Downtime
 
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
 
The Ultimate Guide To Business Continuity
The Ultimate Guide To Business ContinuityThe Ultimate Guide To Business Continuity
The Ultimate Guide To Business Continuity
 
Defeating Cyber Threats
Defeating Cyber ThreatsDefeating Cyber Threats
Defeating Cyber Threats
 
Cloud Based Email
Cloud Based EmailCloud Based Email
Cloud Based Email
 
Survivors Guide To The Cloud
Survivors Guide To The CloudSurvivors Guide To The Cloud
Survivors Guide To The Cloud
 
Ten Myths About Deleted Files
Ten Myths About Deleted FilesTen Myths About Deleted Files
Ten Myths About Deleted Files
 
Disaster Recovery - Deep Dive
Disaster Recovery - Deep DiveDisaster Recovery - Deep Dive
Disaster Recovery - Deep Dive
 
The State of Global Markets 2013
The State of Global Markets 2013The State of Global Markets 2013
The State of Global Markets 2013
 
Ten Myths About Recovery Deleted Files
Ten Myths About Recovery Deleted FilesTen Myths About Recovery Deleted Files
Ten Myths About Recovery Deleted Files
 
Detecting Stopping Advanced Attacks
Detecting Stopping Advanced AttacksDetecting Stopping Advanced Attacks
Detecting Stopping Advanced Attacks
 
8 Strategies For Building A Modern DataCenter
8 Strategies For Building A Modern DataCenter8 Strategies For Building A Modern DataCenter
8 Strategies For Building A Modern DataCenter
 
Unleashing IT: Seize Innovation, Accelerate Business, Drive Outcomes. All thr...
Unleashing IT: Seize Innovation, Accelerate Business, Drive Outcomes. All thr...Unleashing IT: Seize Innovation, Accelerate Business, Drive Outcomes. All thr...
Unleashing IT: Seize Innovation, Accelerate Business, Drive Outcomes. All thr...
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
Cloud or Onsite BDR?
Cloud or Onsite BDR?Cloud or Onsite BDR?
Cloud or Onsite BDR?
 
RetroFit's Network Monitoring Solution
RetroFit's Network Monitoring SolutionRetroFit's Network Monitoring Solution
RetroFit's Network Monitoring Solution
 
Network Latency
Network LatencyNetwork Latency
Network Latency
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Termination of Windows XP
Termination of Windows XPTermination of Windows XP
Termination of Windows XP
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Forrester Emerging MSSP Wave

  • 1. Forrester research, inc., 60 acorn Park Drive, cambridge, Ma 02140 uSa tel: +1 617.613.6000 | Fax: +1 617.613.5000 | www.forrester.com The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 by ed Ferrara, January 8, 2013 | updated: February 14, 2013 For: Security & risk Professionals Key TaKeaWays emerging Mssps have laudable Capabilities, Forward-Thinking strategies, and surprising Client lists These emerging players deserve a hard look. They offer comprehensive, professionally delivered security services. Some are pioneering cloud-based delivery, and others resell their services through a growing MSSP reseller channel. All are growing at rates of 30% to 40% per year and have great technical depth and flexibility. Being a Big Fish in a small pond Can Be a good Thing CISOs interviewed for this research indicated they liked being the vendor’s biggest customer. This offers better value. One CISO at a financial services company said, “I don’t need an MSSP with 10 SOCs and analysts fluent in 12 languages. When I call I want to know the name of the person on the other end of the phone and how they will help me.” Cloud, saas security, and Customer satisfaction are Key differentiators The Leaders in this Forrester Wave want to grow their businesses. Some aspire to serve enterprise-class clients, while a few others think their future lies is serving small and midsize businesses. The cloud, software, and hardware-as-a-service play a big role with two of the Leaders — differentiating them from the pack and other MSSPs as well.
  • 2. © 2013, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Forrester® , Technographics® , Forrester Wave, RoleView, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. To purchase reprints of this document, please email clientsupport@forrester.com. For additional information, go to www.forrester.com. For Security & Risk Professionals Why Read This Report In Forrester’s 15-criteria evaluation of the emerging managed security services provider (MSSP) market, we identified the 10 most significant providers in this category — Alert Logic; CompuCom; Integralis; Network Box; Savvis, A CenturyLink Company; Secure Designs; SilverSky; StillSecure; Tata Communications; and Vigilant— and researched, analyzed, and scored them. These 10 providers have less revenue, smaller physical plants, and fewer staff than the nine North American MSSP firms covered in our Forrester Wave™ published in March 2012, but they are growing rapidly. To help security and risk (S&R) professionals select the right managed security services partner, this report uses our criteria to evaluate each service provider and plots where they stand in relation to each other. Table Of Contents CISOs Now Have Multiple Options For Managed Security Services What It Means To Be Emerging Emerging MSSPs Address Security Complexity And Contain Costs Managed Security Services: Emerging Player Evaluation Overview Evaluation Focused On Breadth Of Capabilities, Flexibility, And Customer Satisfaction Evaluated Vendors Offer A Full Suite Of Managed Security Services Evaluation Analysis Vendor Profiles Supplemental Material Notes & Resources Forrester conducted services evaluations in Q2 2012 and interviewed 10 managed security service providers: Alert Logic; CompuCom; Integralis; Network Box; Savvis, A CenturyLink Company; Secure Designs; SilverSky; StillSecure; Tata Communications; and Vigilant. Related Research Documents Source Your Security Services April 25, 2012 The Forrester Wave™: Managed Security Services: North America, Q1 2012 March 26, 2012 2012 Budget And Planning Guide For CISOs December 15, 2011 The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 Ten Emerging Service Providers That Have The Chops To Be Your Managed Security Service Provider by Ed Ferrara with Laura Koetzle, Chris McClean, Nick Hayes and Kelley Mak 2 2 4 6 9 11 14 January 8, 2013 Updated: February 14, 2013
  • 3. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 2 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 CISOs now have multiple options for managed security services Although information security is a critical function, it’s no longer necessary to do it all in-house. Thus, 21% of those surveyed in Forrester’s Forrsights™ Security Survey, Q2 2012 planned to spend more of their budget with managed security service providers (MSSP) in the coming year.1 This growth percentage was the same in our 2011 survey, and MSSPs are currently reporting between 18% and 21% growth on an annualized basis. The numbers show a clear trend, and there’s a growing consensus that outsourcing security is a viable option for many companies. In response to this new demand, MSSPs are expanding and new firms are entering the managed security services (MSS) market. This is good news for security and risk (S&R) professionals because it increases choice and makes services pricing more competitive. It also makes provider selection more challenging because of the increased number of choices. WHAT IT MEANS TO BE EMERGING The companies in this Forrester Wave represent some of the best emerging players in the market. Forrester uses the term “emerging” to distinguish this group of MSSPs from the larger, more established players in the market we covered in our March 2012 Wave.2 Forrester divides the MSSP market into three categories or divisions (see Figure 1).3 Division 1 includes the largest enterprise- class providers. These MSSPs offer multiple security operations centers (SOCs) in multiple geographies, employ from 100 to more than 1,500 engineers, and have revenues between $70 million and $400 million. Division 2 includes the emerging MSSPs. These companies have from 20 to 100 engineers, one or two SOCs, and revenues between $25 million and $70 million. Division 3 includes many smaller firms that serve the small business market. These companies have a single SOC and a small staff of security analysts numbering no more than 10. Revenues for these firms are less than $25 million. This Forrester Wave evaluates nine Division 2 and one Division 3 emerging MSSPs. These firms offer: ■ Competent security technology skills. These firms use both proprietary and licensed technology for their service offerings. In some cases, these firms will extend licensed technology to improve the licensed technology’s capabilities, and some firms resell other firms’ services.4 These MSSPs support a variety of different technologies, including firewalls (current, next- generation, and web application); intrusion detection; endpoint and server antivirus; host intrusion and detection and protection; log management, archival, and maintenance; systems management; threat intelligence; intrusion protection; proxies; security incident and event management; and web application monitoring technology. ■ Effective pricing. The firms evaluated in this Wave don’t have the same cost structures as larger firms. They have smaller physical plants, lower marketing costs, and lower cost structures overall. These lower costs allow them to offer services that are similar to those provided by the Division 1 MSSPs but with lower overall cost.
  • 4. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 3 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 ■ Excellent customer service. Clients of the emerging MSSPs gave their providers very positive feedback on their pricing and quality of service. There was variability in the client responses, but overall, the MSSPs in this Wave did well in the customer satisfaction category. When the clients needed help, the best MSSPs didn’t simply point to a contract but demonstrated flexibility and worked with their clients to resolve the issue. ■ Experienced and trained staff. The firms reviewed here, in general, have very capable staffs that know the technologies they support. All the firms have formal training programs and apprentice programs, to provide staff necessary skills and experience. These firms use their experience to detect network, application, and server intrusions. The firms also have the necessary experience to identify and address cyberthreats in a number of modes, ranging from simple monitor and alert all the way to complete incident response management.5 Although the number of staff for these firms is not large — the smallest has a staff of 10 and the largest a staff of 200 — these companies are able to demonstrate effective technical and operational competence. ■ Flexibility. Clients praised these emerging MSSPs for their operational flexibility and appreciated their response during security incidents: Rather than spending time analyzing the SLAs and the contract to determine whether the incident was covered, the emerging MSSPs jumped in and worked with their customers to resolve the problems.
  • 5. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 4 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 Figure 1 MSSP Market Segmentation Source: Forrester Research, Inc.86781 MSS revenue $70M to $400M SOCs More than two, with significant redundancy and BCP-DR Analysts/engineers More than 100 analysts, engineers, and advanced threat engineers Technology Proprietary orsignificantly enhanced technology Portfolio Full portfolio of standard services (someOEM and white-label possible, but a lowpercentage) Language support Multilanguage support Average client profile Morethan 2,000 employees MSS revenue Greater than $25M and less than $70M SOCs One to two SOCs Analysts/engineers More than 10 and fewer than 100 analysts, engineers, and advanced threat engineers Technology Significantly enhanced licensed technology Portfolio Full portfolio of services (morewhite-label relationships than in Division 1) Language support One to two languages Average client profile Morethan 100 but usually fewer than 2,000 employees MSS revenue Less than $25M SOCs One, with limited redundancy Analysts/engineers Fewer than 10 analysts, engineers, and advanced threat engineers Technology No threat intelligence services, unless reselling another company’s service Portfolio Narrow portfolio of services Language support One Average client profile Fewer than 100 employees; 20to 50 employees is most common Division 1 Division 2 Division 3 EMERGING MSSPs ADDReSS SECURITY COMPLEXITY AND CONTAIN COSTS Historically, MSSPs offered a series of point solutions without much integration. S&R professionals today want to simplify security operations and lower their costs, which they can do by sourcing their tools and processes for network and application security from an MSSP. This also allows the S&R pros to focus on other security issues.6 The MSSP’s ability to reduce complexity and provide great situational awareness separates the Leader from the Strong Performer and the Strong Performer from the Contender. The MSSPs in this Wave vary in their ability to deliver consistently. S&R pros should focus on these elements when doing due diligence on emerging MSSPs:
  • 6. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 5 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 ■ Advanced delivery models — security software- and hardware-as-a-service. The economy of scale that encourages companies to move other workloads to the cloud also applies to security. Several of the emerging MSSPs offer cloud-based solutions for activity monitoring, log management, and distributed denial of service (DDoS) protection including CompuCom, Network Box, Savvis/Century Link, and Tata Communications. Alert Logic, SilverSky, and Savvis/Century Link provide log management as a cloud-based service, and Network Box provides both hardware and software as part of its unified threat management (UTM) service, providing the hardware as part of the company’s security protection services. ■ Different value propositions. Information security is an activity built on trust. If an MSSP is a good fit for your company it will become immediately obvious, and trust soon follows. The MSSP market is very broad and dynamic, with players offering similar services. Security and risk pros should consider a potential provider’s value proposition. For example, some MSSPs offer low cost, others service bundles, all have different pricing models. Not all companies need an MSSP that operates seven SOCs and supports 10 languages. What they do need is excellent technical competence, responsiveness, and flexibility. ■ White-label reselling of services. The MSSP market is fast becoming a bazaar of OEM services resold by various providers. Alert Logic, for example, resells its Threat Manager and Log Manager services to other MSSPs.7 You’ll need to know the integration points between providers in the service you’ve contracted for so that you can ensure you’re protected from any integration failures. Security and risk professionals should also be careful of third-party “carve-outs” in cases where information security compliance is an issue.8 A carve-out is a clause in the service provider’s contract that says they will provide some level of certainty regarding the security of client data, except when they are reselling a service from another third party. ■ Licensed technology. Licensed technology is at the core of these MSSPs’ offerings. The emerging MSSPs we analyze all deliver services using licensed technology from security solution vendors such as EMC-RSA, Fortinet, HP-ArcSight, Kaspersky, McAfee, SonicWall, and Symantec, to name just a few. Depending on the technology, the MSSPs either enhance or configure the technology to meet client requirements. ■ A broad portfolio of services. All the MSSPs in this Forrester Wave provide what we consider to be a core set of services — the most important services an MSSP should offer (see Figure 2). These providers all provide good coverage of these core services. ■ Service line importance. We asked the MSSPs what percentage of their customers use a particular service. Depending on the service, the answers varied from as little as 2% to as high as 80%. Unless the service is new and targeted for growth, the firm may just offer the service as a sideline. This is a good indicator of the MSSP’s ability to provide the service.
  • 7. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 6 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 Figure 2 Core MSSP Services List Source: Forrester Research, Inc.86781 APT detection and remediation Identity and access management services Distributed/denial of service (DDoS) Log management, monitoring, and archive Email filtering (spam, AV, etc.) Network intrusion detection/protection systems management Emergency response services Server patch management Endpoint antivirus SIEM (security information and event management) Endpoint patch management Threat intelligence Firewall management Vulnerability testing Governance, risk, and, compliance consulting Web application firewall Web application monitoring Host intrusion detection/protection system management Managed security services: emerging Player evaluation overview To assess the state of the North American market for emerging managed security services players and see how the vendors stack up against each other, Forrester evaluated the strengths and weaknesses of top emerging MSSPs with a substantial client base. Evaluation Focused On Breadth Of Capabilities, Flexibility, And Customer Satisfaction After examining past research, user need assessments, and vendor and expert interviews, we developed a comprehensive set of evaluation criteria. We evaluated vendors against 15 criteria, which we grouped into three high-level categories: ■ Current offering. Each vendor’s position on the vertical axis of the Forrester Wave graphic indicates the strength of its current MSS product offering. The sets of capabilities evaluated in this category are value proposition, customer satisfaction, delivery capabilities, cloud and hosted services, infrastructure and perimeter, value-added services, content and application security, and staff dedication to MSS. ■ Strategy. A vendor’s position on the horizontal access indicates the strength of its MSS strategy, specifically focused on innovation and thought leadership, and company growth plans. This includes plans for new service offerings and capabilities such as threat intelligence.
  • 8. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 7 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 ■ Market presence. The size of the vendor’s bubble on the chart indicates its market presence, which Forrester measured based on the company’s overall presence in the marketplace, its North American market presence, and its overall and MSS-specific financials. Evaluated Vendors Offer A Full Suite Of Managed Security Services Forrester included 10 vendors in the assessment: Alert Logic, CompuCom, Integralis, Network Box, SilverSky, Savvis/CenturyLink, Secure Designs, Still Secure, Tata Communications, and Vigilant. Each of these vendors has (see Figure 3): ■ A focus on managed security services. All of the participants in this Wave have a focused MSS business. However, Savvis/CenturyLink, Integralis, and Tata Communications are business units of larger companies that offer other products’ services in addition to managed security.9 CompuCom is a large IT services company that offers other IT services in addition to managed security. This Wave, however, focuses solely on the vendors’ managed security service capabilities. ■ Significant interest from Forrester customers. Forrester considered the level of interest from our clients based on our various interactions, including inquiries, advisories, and consulting engagements. ■ A comprehensive set of service offerings. A comprehensive suite of offerings means more than having multiple SOCS. It also means having a portfolio of services. This portfolio should include services such as distributed denial of service protection; security event analysis and correlation; firewall management; intrusion detection and protection management; log monitoring, management, and retention; security incident and event monitoring and management (SIEM); web filtering and monitoring; virus, spyware; and instant messaging protection. ■ Experienced SOC analysts. The provider has 10 or more analysts or engineers that spend at least 80% of their time dedicated to the provider’s managed security services. Junior analysts should have one to two years of experience; mid-level analysts should have three to five years of experience, and senior analysts should have more than five years of experience.
  • 9. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 8 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 Figure 3 Evaluated Vendors: Vendor Information And Selection Criteria Source: Forrester Research, Inc. Vendor Alert Logic CompuCom Systems Integralis Network Box Savvis, A CenturyLink Company Secure Designs SilverSky StillSecure Tata Communications Vigilant No. of SOCs 1 1 7 12 4 1 1 2 2 1 SOC locations Houston, Texas Dallas Singapore, US (Calif, Va.), UK, Norway, Sweden, Japan US, UK, Japan, Korea, Hong Kong, Taiwan, Malaysia, Indonesia, Thailand, China, Australia US (Mo., Minn.); Bangalore, India; London Greensboro, N.C. Raleigh, N.C. Fort Lauderdale, Fla.; Denver Chennai, India; Singapore Jersey City, N.J. No. of MSS clients (deal size $25K+) 200 89 674 Forrester estimate: 250+ Forrester estimate: 250+ 4 95 Forrester estimate:~30 Forrester estimate: ~30 28 Portal evaluated Alert Logic web interface CompuCom proprietary ISIS portal UTM+ Portal SavvisStation SDI Portal ViewPoint RADAR Shiva Fusion Portal version N/A 3.0 3.14.0 3.2 6.0 1.2 2.6 1.48 3.0 1.2 Vendor selection criteria A focus on managed security services. All of the participants in this Wave have a focused MSS business. Significant interest from Forrester customers. Forrester considered the level of interest from our clients based on our various interactions, including inquiries, advisories, and consulting engagements. A comprehensive set of service offerings. A comprehensive suite of offerings means more than having multiple SOCs. It also means having a portfolio of services. Experienced SOC analysts. The provider has 10 or more analysts or engineers that spend at least 80% of their time dedicated to the provider’s managed security services.
  • 10. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 9 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 Evaluation analysis All of the MSSPs reviewed for this research have different strengths and value propositions. The Leaders all had the common characteristics of sound technology, strong execution, and good to great strategies. The Strong Performers also had their list of strengths but did not rate as well in areas such as number of service offerings, client success metrics, and security certifications for staff. Rapid growth characterizes all the firms in this review. Please consult the Wave Model for specific category scores. The evaluation uncovered a market in which (see Figure 4): ■ Alert Logic, SilverSky, and Integralis are Leaders. Alert Logic and SilverSky strengths were business and technical value. Integralis’ strength was the breadth of its offerings. Overall, these firms were found to be Leaders because of their ability to execute for their clients. These Leaders plan to continue investing their MSS offerings to make sure that they remain competitive and advance in the marketplace. ■ StillSecure, Savvis/CenturyLink, and Network Box are Strong Performers. The Strong Performers all offer solid service offerings. Network Box offers a software- and hardware-as-a- service UTM device that includes device monitoring and event reporting services. StillSecure and Savvis/CenturyLink offer both cloud-based and traditional managed security services, and both companies are working to expand their cloud-based security solutions. Savvis/Century Link, for example, has very aggressive cloud offerings, and the company’s DDoS capabilities round out a strong portfolio of services. Clients looking to outsource security and reduce complexity and costs should consider these companies. ■ Vigilant, Tata Communications, Secure Designs, and CompuCom are Contenders. The Contenders all offer security services and competitive levels of expertise and pricing. These firms scored inconsistently across the scoring categories. Vigilant, for example, scored well in the SLA adherence and threat intelligence categories of the review. This shows vision, but the company didn’t score as well in the client reference category. Secure Designs did well with its client reference score but not as well in business and technical value. Tata Communications scored well in SLA adherence and not as well in the client reference score. CompCom has a similar profile. These providers are strong contenders and have value propositions that will be attractive to clients looking for value from the MSSP partner. This evaluation of these emerging managed security services market is intended to be a starting point. We encourage readers to view detailed product evaluations and adapt the criteria weightings to fit their individual needs through the Forrester Wave Excel-based vendor comparison tool.
  • 11. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 10 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 Figure 4 Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 Source: Forrester Research, Inc. Go online to download the Forrester Wave tool for more detailed product evaluations, feature comparisons, and customizable rankings. Risky Bets Contenders Leaders Strong Performers StrategyWeak Strong Current offering Weak Strong Market presence Full vendor participation Alert Logic CompuCom Integralis Network Box SilverSkySavvis, A CenturyLink Company Secure Designs StillSecure Tata Communications Vigilant
  • 12. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 11 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 Figure 4 Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 (Cont.) Source: Forrester Research, Inc. AlertLogic CompuCom Integralis NetworkBox Savvis,ACenturyLink Company SecureDesigns SilverSky StillSecure CURRENT OFFERING Business and technical value Client references Client success metrics SLA adherence MSS employees Security services SOCs and BC/DR Portal functionality and reporting Threat intelligence and analytics Key differentiators STRATEGY R&D investments in 2012 Innovation for 2H 2012 and 1H 2013 Geographic/vertical reach and future expansion MARKET PRESENCE Corporate and MSS revenues Number of unique MSS clients 4.14 5.00 5.00 3.00 5.00 4.00 1.00 1.00 5.00 3.00 0.00 4.60 5.00 5.00 1.00 3.10 1.00 4.00 Forrester’s Weighting 50% 25% 35% 3% 2% 10% 10% 5% 5% 5% 0% 50% 50% 40% 10% 0% 30% 70% 2.58 3.00 3.00 0.00 4.00 2.00 2.00 2.00 3.00 1.00 0.00 1.50 1.00 2.00 2.00 2.30 3.00 2.00 3.30 3.00 3.00 0.00 5.00 4.00 4.00 5.00 4.00 3.00 0.00 4.40 5.00 4.00 3.00 4.10 2.00 5.00 3.16 3.00 3.00 3.00 1.00 5.00 3.00 5.00 1.00 3.00 0.00 2.40 3.00 2.00 1.00 2.10 0.00 5.00 3.44 3.00 4.00 2.00 4.00 2.00 4.00 4.00 4.00 3.00 0.00 3.00 3.00 3.00 3.00 4.10 2.00 5.00 3.62 5.00 3.00 4.00 5.00 3.00 4.00 1.00 3.00 4.00 0.00 4.70 5.00 5.00 2.00 2.40 1.00 3.00 2.39 1.00 4.00 3.00 5.00 1.00 2.00 2.00 3.00 0.00 0.00 1.90 2.00 2.00 1.00 0.70 0.00 1.00 2.90 1.00 4.00 5.00 5.00 3.00 2.00 3.00 4.00 3.00 0.00 3.60 5.00 2.00 3.00 1.00 1.00 1.00 TataCommunications Vigilant 2.40 3.00 2.00 0.00 5.00 2.00 2.00 3.00 3.00 3.00 0.00 2.70 5.00 0.00 2.00 1.00 1.00 1.00 1.86 3.00 1.00 2.00 5.00 1.00 2.00 1.00 1.00 4.00 0.00 3.50 5.00 2.00 2.00 0.70 0.00 1.00 All scores are based on a scale of 0 (weak) to 5 (strong). Vendor Profiles Leaders ■ Alert Logic. Alert Logic provides intrusion detection services, event analysis and correlation, log monitoring, log retention, vulnerability management, and web application firewall (WAF) services, based almost entirely on internally developed technology. Most customers report being pleased with the service. Alert Logic also provides these services as an OEM to hosting companies and other MSSPs such as SunGard, Rackspace, and NaviSite. Alert Logic’s very strong customer satisfaction rating, business and technical value, SLA adherence, and portal put
  • 13. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 12 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 Alert Logic on the Leaders list. Alert Logic’s cloud-based delivery model demonstrates what’s possible for cloud-based services and security. ■ SilverSky. SilverSky, formerly known as Perimeter E-Security, has more than 6,000 clients, including many financial services firms.10 SilverSky has positioned its security service as a SaaS offering. Services offered include log management, vulnerability management, and unified threat management.11 The combination of strong business and technical value, SLA adherence, plus SilverSky’s innovative use of the cloud to deliver managed security services puts SilverSky solidly in the Leaders category. SilverSky is also working hard on the R&D front to deliver security from the cloud more effectively. ■ Integralis. Integralis has one of the broadest service portfolios of the emerging MSSPs we evaluated. Its offerings include email filtering and management, encryption, event analysis and correlation, firewall and next-generation firewall management, intrusion detection and protection systems management, log monitoring and retention, mobile security/mobile device management (MDM), vulnerability scanning and patching services, web (filtering and monitoring), virus, spyware, and instant messaging (IM) protection. Integralis’ scores for SLA adherence, SOC operations, and employee retention push this company into the Leader category. Strong Performers ■ StillSecure. StillSecure provides a good breadth of managed security services and specializes in services packages for HIPAA and PCI compliance. Other offerings include firewall management services, IDS, IPS, log monitoring, management and archival services, vulnerability management, web application firewall, and multi-factor authentication. StillSecure also offers threat intelligence services using StillSecure and third-party information sources. ■ Savvis, A CenturyLink Company. Forrester estimates that Savvis/Century Link has more than 1,000 security clients; it has delivered security services for more than 12 years. Savvis offers a full portfolio of security services, including both traditional and cloud-based offerings, notably DDoS and log management. The company boasts strong customer references, an excellent customer information portal, and comprehensive business continuity planning for SOC operations. Savvis/Century link will be attractive to customers that want a robust MSSP backed by one of the largest enterprise networking providers in the United States. ■ Network Box. Network Box uses a proprietary unified threat management device for network monitoring. Network Box trains its team well on Network Box’s technology, and clients confirm that the UTM service reduces operational risk and enhances operational performance. Network Box’s offering will appeal to companies that are looking for a managed UTM appliance with active support from a professional security staff.
  • 14. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 13 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 Contenders ■ Vigilant. Vigilant’s Fusion Service for SIEM offers modules for SIEM systems management, use case development, threat intelligence, and incident response that it can combine into a customized service for risk-focused SIEM program management. Vigilant’s business model is to provide support for Fortune 500 clients and their on-premises-based SIEMs. This co- sourcing model leaves the equipment, security software, and data in the customer’s data center. Vigilant manages the client technologies from its SOC, leaving the equipment, security software, and data in the customer’s data center. The company also has very good threat intelligence capabilities, and as noted in other research, this is a significant differentiator for MSSPs.11 Vigilant will be attractive to customers that want to maintain control of their physical assets and data and those that want to tie threat awareness directly to monitoring use cases. ■ Tata Communications. As an offshore MSSP, Tata Communications provides security monitoring services as well as DDoS mitigation services, event analysis and correlation services, firewall management services, identity and access management services, IPS, IDS and log monitoring, management and archival services, SIEM and cross-correlation services, and vulnerability patching services at a very competitive price. Tata Communications provides 24x7 service from two locations (Chennai, India; and Singapore). Tata would be a good choice for companies looking for an emerging offshore MSSP. ■ Secure Designs. Secure Designs (SDI) provides a majority of its services to the Fortune 1000, although it also claims some Fortune 500 clients. The company provides white-label services to other MSSPs for the following services: DDoS; email security and encryption; whole disk encryption; event analysis and correlation; firewall and next-generation firewall management services; IPS; log monitoring, management and archival; web application firewalls (WAFs); web filtering and monitoring; and virus, spyware, and instant messaging protection. Secure Designs focuses on micro SMB business clients.13 This makes Secure Designs a good fit for a widely distributed company, such as an insurance firm with independent representatives or brokers who also need information security services. ■ CompuCom. CompuCom emphasizes a simple and methodical approach to managed security services. CompuCom operates one SOC on a 24x7x365 basis. Its service offerings include DDoS mitigation services; event analysis and correlation services; firewall; IDS; IPS management services; log monitoring, management, and archival; SIEM and event cross-correlation; and web (filtering and monitoring), virus, spyware, and IM protection services.
  • 15. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 14 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 Supplemental Material Online Resource The online version of Figure 4 is an Excel-based vendor comparison tool that provides detailed product evaluations and customizable rankings. Data Sources Used In This Forrester Wave Forrester used a combination of three data sources to assess the strengths and weaknesses of each solution: ■ Vendor surveys. Forrester surveyed vendors on their capabilities as they relate to the evaluation criteria. Once we analyzed the completed vendor surveys, we conducted vendor calls where necessary to gather details of vendor qualifications. ■ Portal demos. We asked vendors to conduct demonstrations of their portal’s functionality. We used findings from these product demos to validate details of each vendor’s product capabilities. ■ Customer reference calls. To validate product and vendor qualifications, Forrester also conducted reference calls with two of each vendor’s current customers. The Forrester Wave Methodology We conduct primary research to develop a list of vendors that meet our criteria to be evaluated in this market. From that initial pool of vendors, we then narrow our final list. We choose these vendors based on: 1) product fit; 2) customer success; and 3) Forrester client demand. We eliminate vendors that have limited customer references and products that don’t fit the scope of our evaluation. After examining past research, user need assessments, and vendor and expert interviews, we develop the initial evaluation criteria. To evaluate the vendors and their products against our set of criteria, we gather details of product qualifications through a combination of lab evaluations, questionnaires, demos, and/or discussions with client references. We send evaluations to the vendors for their review, and we adjust the evaluations to provide the most accurate view of vendor offerings and strategies. We set default weightings to reflect our analysis of the needs of large user companies — and/or other scenarios as outlined in the Forrester Wave document — and then score the vendors based on a clearly defined scale. These default weightings are intended only as a starting point, and we encourage readers to adapt the weightings to fit their individual needs through the Excel-based tool. The final scores generate the graphical depiction of the market based on current offering, strategy, and market presence. Forrester intends to update vendor evaluations regularly as product capabilities and vendor strategies evolve.
  • 16. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 15 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 Endnotes 1 Source: Forrsights Security Survey, Q2 2012. 2 In Forrester’s 60-criteria evaluation of the North American managed security services market, we identified the nine significant service providers in this category. This report details our findings about how each service provider measures up, to help security and risk (S&R) professionals select the right partner for their managed security services. For more information, see the March 26, 2012, “The Forrester Wave™: Managed Security Services: North America, Q1 2012” report. 3 Forrester had originally divided the MSS market into two segments — enterprise and other. However, upon further research, we found substantial differences between the emerging providers we analyze in this Wave and the MSSPs geared for serving the small business segments. Therefore, we’ve specified three MSSP divisions, based on the size and capabilities of the firm. 4 Reseller agreements are widely used in the emerging MSSP market. It’s sometimes more cost-effective and efficient to resell a service than to try to create the service from scratch. Contracts with resellers typically prohibit MSSPs from revealing the names of their resellers. 5 MSSPs offer different levels of service based on consultation with their clients. At one end of the service spectrum, MSSPs can offer simple monitor and alert services where the MSSP’s role is to monitor and report suspicious events but not perform any threat remediation or incident response. At the other end of the spectrum, the MSSP is responsible for threat monitoring, breach event remediation, and complete incident response. MSSPs also offer different levels of support between the two ends of the spectrum based on the type of contracted service. 6 Selecting the correct services to outsource is an important decision for security and risk professionals. Before security and risk professionals can determine what the organization can and should outsource, they should organize security operations as a catalog or portfolio of services. Once they have this list they should consider which are core to the business and core to security. These functions should probably remain with employees. Everything else could potentially be outsourced. For more information, see the April 25, 2012, “Source Your Security Services” report. 7 Information on specific OEM relationships is difficult to determine in the MSSP market. The reseller does not advertise these relationships, and the reseller will brand the service as its own. Companies considering managed security services should ask specific questions about who will actually provide the service. 8 Third-party carve-outs are an important issue when it comes to third-party security providers. This obfuscates the relationship, as well as the accountability, of who is responsible for the security of client data. For more information, see the October 31, 2011, “SAS 70 Out, New Service Organization Control Reports In” report. 9 CenturyLink is the third largest telecommunications company in the United States. The company provides data, voice, managed services, cloud infrastructure, and hosted IT solutions, in local, national, and some international markets. CenturyLink acquired Savvis in 2011.
  • 17. For Security & Risk Professionals The Forrester Wave™: Emerging Managed Security Service Providers, Q1 2013 16 © 2013, Forrester Research, Inc. Reproduction Prohibited January 8, 2013 | Updated: February 14, 2013 Integralis is a subsidiary of NTT Communications. The company is one of the largest telecommunications services providers in the world. NTT Communications is a subsidiary of NTT Group. In 2012, the NTT Group ranked 29th in the Fortune Global 500 list. NTT had operating revenues of ¥10,507 billion for the fiscal year ended March 31, 2012. The group employed 224,250 people worldwide as of March 2012. Tata Communications Limited, along with its global subsidiaries (Tata Communications), provides globally managed solutions to the Fortune 1000 and midsize enterprises, service providers, and consumers. Tata Communications Ltd. is a part of the $100.09 billion Tata Companies; it is listed on the Bombay Stock Exchange and the National Stock Exchange of India, and its ADRs are listed on the New York Stock Exchange. 10 SilverSky chose to rebrand this year based on plans to expand its service capabilities and address broader areas of the IT services market. 11 UTM is actually a portfolio of services that includes email and spam filtering, antivirus, and site white/ blacklisting. 12 Forrester sees threat intelligence and sophisticated event correlation as new and important tools in the battle against cybercrime. For more information, see the March 26, 2012, “The Forrester Wave™: Managed Security Services: North America, Q1 2012” report. 13 Microbusinesses are businesses with between one and 19 employees. This is a largely underserved market and one that is growing rapidly for security services.
  • 18. Forrester Research, Inc. (Nasdaq: FORR) is an independent research company that provides pragmatic and forward-thinking advice to global leaders in business and technology. Forrester works with professionals in 17 key roles at major companies providing proprietary research, customer insight, consulting, events, and peer-to-peer executive programs. For more than 29 years, Forrester has been making IT, marketing, and technology industry leaders successful every day. For more information, visit www.forrester.com. 86781 « Forrester Focuses On Security & Risk Professionals To help your firm capitalize on new business opportunities safely, you must ensure proper governance oversight to manage risk while optimizing security processes and technologies for future flexibility. Forrester’s subject-matter expertise and deep understanding of your role will help you create forward-thinking strategies; weigh opportunity against risk; justify decisions; and optimize your individual, team, and corporate performance. Sean Rhodes, client persona representing Security & Risk Professionals About Forrester A global research and advisory firm, Forrester inspires leaders, informs better decisions, and helps the world’s top companies turn the complexity of change into business advantage. Our research- based insight and objective advice enable IT professionals to lead more successfully within IT and extend their impact beyond the traditional IT organization. Tailored to your individual role, our resources allow you to focus on important business issues — margin, speed, growth — first, technology second. for more information To find out how Forrester Research can help you be successful every day, please contact the office nearest you, or visit us at www.forrester.com. For a complete list of worldwide locations, visit www.forrester.com/about. Client support For information on hard-copy or electronic reprints, please contact Client Support at +1 866.367.7378, +1 617.613.5730, or clientsupport@forrester.com. We offer quantity discounts and special pricing for academic and nonprofit institutions.