throbber
Magic Quadrant for Secure Web Gateways
`
`Magic Quadrant for Secure Web Gateways
`
`28 May 2013 ID:G00249600
`
`Analyst(s): Lawrence Orans, Peter Firstbrook
`
`VIEW SUMMARY
`
`Malware detection and cloud services are two areas of continuing disparity among SWG vendors. Our
`market analysis of the vendors highlights key differences in these capabilities and other key
`functions.
`
`Market Definition/Description
`Secure Web gateways (SWGs) utilize URL filtering, malware detection and application control
`technology to protect organizations and enforce Internet policy compliance. SWGs are delivered as
`on-premises appliances (hardware and virtual) or cloud-based services.
`
`We estimate that the combined SWG revenue of the Magic Quadrant participants in 2012 was $1.18
`billion (which includes on-premises and cloud-based offerings). Revenue from solutions that lack full
`SWG functionality has been excluded (for example, URL filtering only or proxies sold without anti-
`malware protection). The market grew approximately 15% over 2011, which is in line with our
`estimate from the 2012 report. We anticipate that the market will grow 13% to 15% in 2013.
`
`Eight of the 13 vendors in this analysis now offer a multitenant cloud service. However, the market is
`still dominated by on-premises solutions (86% share, based on revenue), with SWG as a service
`representing the remainder of the market (14%). Gartner's market share and growth rate estimate
`of the broader market for SWG proxy and URL filtering software can be found in "Market Share:
`Security Software, Worldwide, 2012."
`
`The market is segmented between large enterprises and small or midsize businesses (SMBs). SMB
`solutions are designed for ease of use, cost-effectiveness and basic security protection. Large
`enterprise solutions protect against more-advanced threats, including the capability to detect
`targeted attacks.
`
`Vendors are increasingly integrating content-aware data loss prevention (DLP) to monitor sensitive
`data. Cloud services are being driven by the need to protect mobile devices and secure remote-office
`connections.
`
`Return to Top
`
`Magic Quadrant
`
`Figure 1. Magic Quadrant for Secure Web Gateways
`
`http://www.gartner.com/technology/reprints.do?id=1-1FTQ83E&ct=130530&st=sb[6/18/2014 2:55:42 PM]
`
`ACRONYM KEY AND GLOSSARY TERMS
`
`BYOD
`
`DLP
`
`EPP
`
`ICAP
`
`IP
`
`IPS
`
`NAC
`
`PAC
`
`SaaS
`
`SIEM
`
`SMB
`
`Span
`
`SSL
`
`SWG
`
`TAP
`
`UTM
`
`VAR
`
`bring your own device
`
`data loss prevention
`
`endpoint protection platform
`
`Internet Content Adaptation
`Protocol
`
`Internet Protocol
`
`intrusion prevention system
`
`network access control
`
`proxy autoconfiguration
`
`software as a service
`
`security information and event
`management
`
`small or midsize business
`
`Switched Port Analyzer
`
`Secure Sockets Layer
`
`secure Web gateway
`
`test access point
`
`unified threat management
`
`value-added reseller
`
`EVALUATION CRITERIA DEFINITIONS
`
`Ability to Execute
`Product/Service: Core goods and services offered
`by the vendor that compete in/serve the defined
`market. This includes current product/service
`capabilities, quality, feature sets, skills, etc., whether
`offered natively or through OEM
`agreements/partnerships as defined in the market
`definition and detailed in the subcriteria.
`Overall Viability (Business Unit, Financial,
`Strategy, Organization): Viability includes an
`assessment of the overall organization's financial
`health, the financial and practical success of the
`business unit, and the likelihood of the individual
`business unit to continue investing in the product, to
`continue offering the product and to advance the
`state of the art within the organization's portfolio of
`products.
`Sales Execution/Pricing: The vendor's capabilities
`in all pre-sales activities and the structure that
`supports them. This includes deal management,
`pricing and negotiation, pre-sales support and the
`overall effectiveness of the sales channel.
`Market Responsiveness and Track Record: Ability
`to respond, change direction, be flexible and achieve
`competitive success as opportunities develop,
`competitors act, customer needs evolve and market
`dynamics change. This criterion also considers the
`vendor's history of responsiveness.
`Marketing Execution: The clarity, quality, creativity
`
`

`
`Magic Quadrant for Secure Web Gateways
`
`and efficacy of programs designed to deliver the
`organization's message in order to influence the
`market, promote the brand and business, increase
`awareness of the products, and establish a positive
`identification with the product/brand and organization
`in the minds of buyers. This "mind share" can be
`driven by a combination of publicity, promotional,
`thought leadership, word-of-mouth and sales
`activities.
`Customer Experience: Relationships, products and
`services/programs that enable clients to be
`successful with the products evaluated. Specifically,
`this includes the ways customers receive technical
`support or account support. This can also include
`ancillary tools, customer support programs (and the
`quality thereof), availability of user groups, service-
`level agreements, etc.
`Operations: The ability of the organization to meet
`its goals and commitments. Factors include the
`quality of the organizational structure including skills,
`experiences, programs, systems and other vehicles
`that enable the organization to operate effectively
`and efficiently on an ongoing basis.
`Completeness of Vision
`Market Understanding: Ability of the vendor to
`understand buyers' wants and needs and to translate
`those into products and services. Vendors that show
`the highest degree of vision listen and understand
`buyers' wants and needs, and can shape or enhance
`those with their added vision.
`Marketing Strategy: A clear, differentiated set of
`messages consistently communicated throughout the
`organization and externalized through the website,
`advertising, customer programs and positioning
`statements.
`Sales Strategy: The strategy for selling product that
`uses the appropriate network of direct and indirect
`sales, marketing, service and communication affiliates
`that extend the scope and depth of market reach,
`skills, expertise, technologies, services and the
`customer base.
`Offering (Product) Strategy: The vendor's
`approach to product development and delivery that
`emphasizes differentiation, functionality, methodology
`and feature set as they map to current and future
`requirements.
`Business Model: The soundness and logic of the
`vendor's underlying business proposition.
`Vertical/Industry Strategy: The vendor's strategy
`to direct resources, skills and offerings to meet the
`specific needs of individual market segments,
`including verticals.
`Innovation: Direct, related, complementary and
`synergistic layouts of resources, expertise or capital
`for investment, consolidation, defensive or pre-
`emptive purposes.
`Geographic Strategy: The vendor's strategy to
`direct resources, skills and offerings to meet the
`specific needs of geographies outside the "home" or
`native geography, either directly or through partners,
`channels and subsidiaries as appropriate for that
`geography and market.
`
`Source: Gartner (May 2013)
`
`Return to Top
`
`Vendor Strengths and Cautions
`Barracuda Networks
`Barracuda Networks, which is based in Campbell, California, offers the Barracuda Web Filter
`appliance (hardware and virtual) and the cloud-based Barracuda Web Security Service. Barracuda
`customers typically implement its appliances in transparent bridge mode to view all network traffic,
`but the appliances can also be implemented in proxy mode. Barracuda Web Filter appliances are
`good candidates for SMBs and selected large enterprises (especially in the education and government
`vertical industries), particularly those that are budget-constrained.
`
`Strengths
`Barracuda offers a low-cost solution that is easy to use with very competitive functionality.
`A partnership with Malwarebytes provides malware cleanup capabilities that can be initiated
`from the gateway.
`Application controls provide heuristic detection across all ports and protocols, with optional
`endpoint agents or in-line deployments.
`Social media controls, including optional archiving capabilities, are very complete.
`For mobile users, Barracuda offers several options for traffic redirection and authentication,
`including endpoint agents for recent versions of Windows and Mac OS X, and a safe browser
`option for Apple iOS.
`
`Cautions
`Barracuda does not offer a choice of antivirus engines. Open-source ClamAV is the only option.
`Barracuda adds internally developed signatures, although its malware research team is
`relatively small.
`The Barracuda Web Filter appliance lacks dynamic URL categorization.
`Some enterprise-class capabilities for management and reporting are absent. For example, the
`dashboard is not customizable, and it only provides limited drill-down into logs or reports.
`The cloud-based service is also missing a number of enterprise features. For example, it lacks
`IPsec support for traffic redirection, and it requires an authentication appliance for directory
`integration.
`
`http://www.gartner.com/technology/reprints.do?id=1-1FTQ83E&ct=130530&st=sb[6/18/2014 2:55:42 PM]
`
`

`
`Magic Quadrant for Secure Web Gateways
`
`Return to Top
`
`Blue Coat Systems
`Blue Coat is in its second year as a privately held company, after private equity firm Thoma Bravo
`acquired it in February 2012. In December 2012, Blue Coat acquired Crossbeam Systems, a blade-
`server platform that integrates firewall, intrusion prevention system (IPS) and other security
`components. Blue Coat plans to port its SWG solution to the Crossbeam platform (no set date has
`been provided), and will continue to offer its dedicated hardware appliances and virtual appliances.
`The company also operates a cloud-based SWG service. In May 2013, Blue Coat acquired the SSL
`appliance product line from Netronome. Also in May 2013, Blue Coat announced its intent to acquire
`Solera Networks. Blue Coat is a very good candidate for most large enterprise customers.
`
`Strengths
`Blue Coat's ProxySG remains the strongest proxy in the market in terms of breadth of protocols
`and the number of advanced features. It supports a long list of protocols (including SOCKS),
`extensive authentication and directory integration options, and the Online Certificate Status
`Protocol (OCSP).
`Blue Coat's cloud offering includes multitenant IPsec gateways, which enable it to support a
`wide range of mobile devices. Blue Coat agents are available for Windows, Mac OS X and Apple
`iOS.
`Blue Coat provides some integrated features with its cloud and on-premises solutions. Its
`Unified Reporting feature allows logs from the cloud service to be rolled up into an on-premises
`Blue Coat Reporter console. Its Unified Policy feature allows policy developed in the cloud to be
`synchronized with its on-premises appliances.
`Blue Coat offers strong reporting capabilities for its on-premises and its cloud-based services.
`Both solutions provided multiple canned reports and the ability to create custom reports.
`
`Cautions
`The ProxySG appliance lacks on-box malware detection. Customers that want antivirus engine
`protection must purchase a separate appliance (ProxyAV). Malware protection is also provided
`by Blue Coat's "cloud assist" WebPulse service.
`The ProxyAV lacks advanced malware techniques, such as code emulation. Instead, it utilizes
`signature-based detection delivered by Blue Coat partners (a choice of four antivirus engines).
`Blue Coat cannot monitor all network traffic (which is helpful for detecting outbound malware)
`in its most commonly deployed proxy mode (known as explicit proxy), but it can be configured
`in other modes to monitor all traffic.
`Unlike several other vendors that offer cloud-based services and on-premises appliances, Blue
`Coat does not offer a "single SKU" price model that allows the option to mix and match cloud
`and on-premises Web-filtering licenses.
`
`Return to Top
`
`Cisco
`Cisco, which is based in San Jose, California, offers an appliance-based SWG and a cloud-based SWG
`service. In 2012, Cisco rebranded these solutions. The appliance-based product is now named Web
`Security Appliance (formerly IronPort) and the cloud-based service is now named Cloud Web
`Security (formerly ScanSafe). The Web Security Appliances (WSAs) are implemented as proxies.
`
`In February 2013, Cisco acquired Cognitive Security, a startup company based in the Czech Republic.
`Cognitive analyzes NetFlow traffic and other data to detect advanced threats. Cisco plans to utilize
`Cognitive's technology in its Security Intelligence Operations, a threat and vulnerability analysis
`center that distributes security updates and reputation data to a range of Cisco products and
`services, including its SWG offerings.
`
`Cisco's WSA products are very good candidates for most midsize and large enterprises, while the
`Cloud Web Security service is a good candidate for all enterprises.
`
`Strengths
`Cisco has integrated a traffic redirection feature — a critical component of any cloud service —
`into some of its on-premises equipment. The ASA firewall, ISR G2 router and WSA all support
`Cisco's "connector" software, which directs traffic to the Cloud Web Security service. The
`configuration is enabled via a menu item on these appliances.
`Cisco provides several options for authenticating users to the Cloud Web Security service,
`including SAML. The connector implementations (noted above) also transport user credentials
`to the cloud.
`Mobile support is a strength of Cisco's cloud offering. The AnyConnect client supports Windows,
`OS X, Apple iOS, Android, Windows Phone 8 and BlackBerry. However, Cisco's cloud lacks
`support for IPsec, which is widely supported on mobile devices.
`In addition to Cisco's reputation database, the WSA provides three choices for on-box signature
`databases (McAfee, Sophos and Webroot), all of which can be supported simultaneously.
`
`http://www.gartner.com/technology/reprints.do?id=1-1FTQ83E&ct=130530&st=sb[6/18/2014 2:55:42 PM]
`
`

`
`Magic Quadrant for Secure Web Gateways
`
`Adaptive scanning utilizes the anti-malware engine that is best suited for the content type.
`Cisco provides a very granular application control capability. The Cisco appliance includes a
`Switched Port Analyzer (Span) port to monitor and block outbound malicious traffic that evades
`the proxy.
`
`Cautions
`Reports and dashboards do not provide sufficient information on outbound malware detection to
`enable prioritized remediation.
`Some customer references noted that reporting could be improved. Advanced reporting
`requires a Cisco version of Splunk at an extra cost.
`Cisco lacks a unified management console for its on-premises WSA appliances and its Cloud
`Web Security service to ease the management of hybrid deployments.
`Some customer references highlighted that Cisco needs to improve its Content Security
`Management Appliance's ability to centrally manage and control individual proxies.
`
`Return to Top
`
`ContentKeeper Technologies
`ContentKeeper Technologies is based in Australia, where it has many large government and
`commercial customers. It offers a family of SWG appliances that deploys in transparent bridge mode,
`and it also offers a hosted cloud-based service. In 2012, ContentKeeper opened a new office in North
`America in Orange Country, California. It also rebranded its family of appliances with the names Web
`Filter Pro and ContentKeeper Secure Internet Gateway (CK-SIG). ContentKeeper is a candidate for
`K-12 schools and for most enterprise customers.
`
`Strengths
`The Behavioral Analysis Engine (a feature of CK-SIG) provides real-time and near-real-time
`analysis of Web objects using browser code emulation.
`ContentKeeper has developed "sandboxing" technology to analyze suspicious files and
`executables in a virtualized Windows environment. The solution produces detailed reports for
`each item that is analyzed. The sandboxing technology can be configured as a hosted service,
`or it can be run locally on an appliance. It comes as a standard feature in CK-SIG and may also
`be configured as a feature of Web Filter Pro.
`A bring your own device (BYOD) feature enables Web Filter Pro and CK-SIG to enforce access
`policies for mobile devices and users. Policies could include blocking Internet access or blocking
`applications (by filtering network traffic). Agents are available for off-network mobile devices.
`Supported operating systems include Windows, OS X, iOS, Linux and Android.
`ContentKeeper appliances support the ability to proxy and analyze Secure Sockets Layer (SSL)
`traffic. Antivirus protection and basic IPS are provided through a combination of third-party and
`internally developed signatures.
`
`Cautions
`ContentKeeper lacks a shared, multitenant, cloud-based SWG service. It provides a hosted
`cloud offering, where customers run virtual appliances hosted in Amazon's cloud service (and
`some ContentKeeper-managed data centers). Hosted offerings are not as flexible (for example,
`dynamic ability to scale) as shared multitenant clouds.
`While the vendor has made good progress in developing malware detection tools, these
`solutions are new, and ContentKeeper has yet to earn recognition as a leading malware
`research and product company. Prospective customers should carefully test ContentKeeper's
`anti-malware capabilities.
`Some customer references requested improvements to the solution's graphical user interface
`(GUI). In January 2013, ContentKeeper released an updated interface, although the console still
`lacks malware severity indicators for enabling prioritized remediation.
`
`Return to Top
`
`McAfee
`McAfee, a subsidiary of Intel, offers a family of on-premises SWG appliances (McAfee Web Gateway
`[MWG]) and a cloud-based SWG service (SaaS Web Protection). The SWG appliances are most
`commonly implemented as proxies, although they can be deployed in other modes, including in-line
`transparent bridges. In February 2013, McAfee announced its acquisition of ValidEdge, which makes
`a sandboxing appliance for detecting advanced malware and targeted attacks. McAfee's solutions are
`good candidates for most enterprise customers, particularly those that are already McAfee ePolicy
`Orchestrator users.
`
`Strengths
`MWG has strong malware protection due to its on-box browser code emulation capabilities. The
`solution provides the ability to adjust the sensitivity of malware detection. A rule-based policy
`engine enables flexible policy creation.
`
`http://www.gartner.com/technology/reprints.do?id=1-1FTQ83E&ct=130530&st=sb[6/18/2014 2:55:42 PM]
`
`

`
`Magic Quadrant for Secure Web Gateways
`
`The SaaS Web Protection cloud service supports SAML for authenticating users.
`McAfee has integrated DLP technology across its product lines. MWG ships with a number of
`preformatted dictionaries.
`Application control is very strong. HTTP manipulation allows organizations to remove selected
`functions from Web applications (for example, blocking posts to social media sites).
`A single SKU pricing model gives customers the flexibility to purchase a single Web gateway
`license, and to mix and match on-premises and cloud-based service models.
`
`Cautions
`The SaaS Web Protection cloud service is missing an important traffic redirection option by not
`supporting IPsec.
`McAfee's mobility strategy needs improvement. It does not offer an endpoint client for Mac OS
`X. Its McAfee Client Proxy for Windows is a strong solution, but it has been late to support
`Windows 8 (a June 2013 release is planned). The lack of IPsec support in the cloud is also an
`impediment to supporting mobile devices.
`The cloud solution does not have the same level of policy granularity that is available with the
`on-premises appliance.
`
`Return to Top
`
`Phantom Technologies-iboss Security
`Phantom Technologies is a privately held company based in San Diego. It offers a family of
`appliance-based platforms (iboss) that is typically deployed in transparent bridge mode. It also offers
`a cloud-based URL filtering solution for mobile users. Phantom is a candidate for organizations that
`are based in North America (more than 90% of its customers are in North America).
`
`Strengths
`Support for features aimed at the K-12 market has helped Phantom develop a strong installed
`base in the education market (approximately one-third of its revenue is from the K-12 vertical
`industry). For example, the iboss SWG Web filter enables schools to easily allow access to
`YouTube's educational site, while blocking access to the main YouTube site.
`Full SSL content inspection is provided utilizing an agent-based solution on endpoints. This is a
`scalable approach that relieves the iboss appliance of the burden of managing certificates, and
`of terminating and decrypting SSL traffic.
`Bandwidth controls are very flexible. For example, bandwidth quotas can be applied to a
`specific organizational unit in Active Directory, and they can also be assigned to a specific
`domain.
`The iboss appliance uses DLP technology to identify high-risk behavior.
`Iboss includes a unique autorecord feature (up to three minutes) that enables a playback for a
`sequence of events. This feature is often used to confirm intentional versus unintentional user
`violations.
`
`Cautions
`Phantom's cloud offering is limited to URL filtering decisions. It lacks a multitenant cloud-based
`service that analyzes traffic and Web objects to detect malware. An on-premises appliance is
`required to handle policy management and reporting.
`Malware detection capabilities are limited. Phantom has only limited resources (a small team of
`researchers) to develop its own signatures. Choices for antivirus engines are limited to
`Bitdefender or ClamAV (both can be combined with Snort rules).
`Uncategorized URLs are not classified in real time.
`
`Return to Top
`
`Sangfor
`Sangfor is a network equipment vendor based in China. Approximately half of its revenue comes
`from its SWG products, and the remaining revenue comes from its VPN, WAN optimization
`controllers and application delivery controller products. Sangfor's SWG comes in a hardware
`appliance form factor, and it is usually implemented as an in-line transparent bridge. The company
`offers two versions of its SWG product: one aimed at the Chinese market, and one aimed at English-
`speaking countries. Nearly all the company's revenue comes from the Asia/Pacific region. Sangfor is
`a candidate for organizations that are based in China and in supported countries in the Asia/Pacific
`region.
`
`Strengths
`Sangfor has strong application control features. It can apply granular policies to Facebook and
`other Web-based applications, and it has also developed network signatures to block port-
`evasive applications like BitTorrent and Skype.
`Sangfor's in-line transparent bridge mode enables flexible and granular bandwidth control
`
`http://www.gartner.com/technology/reprints.do?id=1-1FTQ83E&ct=130530&st=sb[6/18/2014 2:55:42 PM]
`
`

`
`Magic Quadrant for Secure Web Gateways
`
`capabilities. Bandwidth utilization parameters can be specified for uplink and downlink traffic.
`Sangfor has a good Wi-Fi guest network feature. The SWG supports a guest registration portal,
`and it sends credentials to guests via SMS. It uses these credentials to monitor and report on
`guests' Internet behavior. At the time of this writing, this Wi-Fi guest feature is only available
`on the Chinese version of the product.
`
`Cautions
`Mobility is a weak point for Sangfor. It does not offer a cloud-based service.
`The solution lacks some enterprise-class features. The ICAP is not supported, thereby limiting
`the SWG's capability to send content to third-party scanners (such as DLP sensors or antivirus
`scanners).
`The English version of the product does not dynamically classify uncategorized URLs (however,
`the Chinese version has this capability).
`Malware protection is basic and lacks advanced features for detecting new malware and
`targeted attacks. The solution relies heavily on a signature database from Sangfor's antivirus
`partner. Sangfor's malware research team also maintains its own signature database, although
`it does not have a strong reputation for anti-malware research.
`
`Return to Top
`
`Sophos
`Sophos has executive offices in the U.K. and Massachusetts. Best known for its endpoint protection
`platform (EPP), it has a broad range of network gateways through native development and its
`acquisition of Astaro in 2011. The Sophos Web Appliance (SWA) can be deployed in proxy or
`transparent in-line bridge mode. Sophos provides an option for its customers to run virtual instances
`of its SWG in Amazon's EC2 cloud. Sophos' endpoint client is tethered to SWA for policy
`management and logging when off-LAN. Sophos is a candidate for midsize customers and for
`enterprises that are already using its EPP solution.
`
`Strengths
`Sophos is an established player in the malware detection market. SWA uses Sophos-developed
`technology to perform a pre-execution analysis of all downloaded code, including binary files
`and JavaScript.
`Several Sophos reference customers commented on the solution's ease of use. Features include
`automated network and directory discovery, contextual help functions and simple policy
`configuration.
`Sophos has a strong reputation for support and service. It optionally monitors customers'
`appliances and provides proactive assistance for critical conditions.
`
`Cautions
`Sophos' cloud offering is limited to URL filtering decisions. It lacks a multitenant cloud-based
`service that analyzes traffic and Web objects to detect malware. Software on laptops and
`mobile devices sends URL requests to the Sophos cloud, which categorizes the URL and sends a
`response to the Sophos client on the endpoint so it can enforce the policy.
`Social media controls are lacking. SWA does not provide a GUI to easily configure granular
`policies for Facebook.
`SWA is missing some enterprise-class features, such as dashboard customization, bandwidth
`management, time quotas (for Web surfing), ICAP support, and advanced reporting and
`analytics.
`The URL-filtering feature does not provide dynamic classification of uncategorized websites.
`Reporting on compromised endpoints is not hyperlinked to Sophos' threat research.
`
`Return to Top
`
`Symantec
`Symantec, which is based in Mountain View, California, has two offerings in the SWG market: (1) the
`Symantec.cloud service; and (2) the Symantec Web Gateway appliance, which may be deployed as
`an in-line transparent bridge, as a proxy, or in Span or test access point (TAP) mode. Symantec
`bundles a virtual version of its Web Gateway appliance with a suite offering that includes email and
`endpoint protection. Symantec is a good candidate for most enterprise customers.
`
`Strengths
`Symantec.cloud service and Symantec Web Gateway benefit from Symantec's strong malware
`research labs and its Insight file reputation engine.
`The Web Gateway appliance has strong reporting capabilities and provides valuable information
`on malware-compromised endpoints. Reports indicate the type of threat and its severity. It also
`provides quick access to more detail, such as geolocation data, search terms, filenames and
`types, removal information and a malware encyclopedia.
`
`http://www.gartner.com/technology/reprints.do?id=1-1FTQ83E&ct=130530&st=sb[6/18/2014 2:55:42 PM]
`
`

`
`Magic Quadrant for Secure Web Gateways
`
`Symantec Web Gateway can be implemented quickly (in Span/TAP mode), which has enabled
`Symantec to develop a strong value-added reseller (VAR) partnership program. VARs deploy
`the appliance on customers' premises to run Symantec's Malicious Activity Assessment.
`
`Cautions
`Symantec.cloud lacks some enterprise-class features and has been late in supporting others. It
`doesn't support IPsec for traffic redirection, and it doesn't support SAML or cookies for user
`authentication. Symantec.cloud did not support inspecting SSL traffic until 2Q13, and it lacks
`DLP support (which is planned for 3Q13). Because these are new features, enterprises should
`test them carefully.
`Symantec's mobility strategy needs improvement. Its Smart Connect is a strong solution for
`Windows endpoints, but it is not available for Mac OS X. The lack of IPsec support in the cloud
`is also an impediment to supporting mobile devices. The Remote Connect client (for non-
`Windows devices) uses proxy autoconfiguration (PAC) settings to redirect traffic to the cloud,
`but PAC settings can be easily modified by users.
`Neither Symantec Web Gateway nor Symantec.cloud support dynamic classification of unknown
`URLs.
`There is very little integration between Symantec Web Gateway and Symantec.cloud, and the
`vendor does not offer a single SKU pricing model to mix and match licenses from the two
`offerings.
`
`Return to Top
`
`Trend Micro
`Trend Micro is based in Tokyo, and its U.S. headquarters is located in Dallas. It offers an appliance
`version (hardware and software), InterScan Web Security (IWS), and a new cloud service (launching
`in the second half of 2013). IWS can be implemented as a transparent bridge or a proxy. Trend
`Micro is a candidate primarily for organizations that already have a strategic relationship with the
`company.
`
`Strengths
`Malware detection is provided by Trend Micro's signature database, script analysis and a
`reputation service (fed by the company's cloud-based Smart Protection Network). Trend Micro's
`Damage Cleanup Services can provide remote client remediation for known threats. IWS also
`blocks communication to known botnet command-and-control centers.
`Trend Micro recently launched "Deep Discovery," a complementary solution providing a
`centralized sandboxing engine that executes suspect code in a virtual machine to detect
`malicious behavior. Trend Micro products, including the IWS gateway, integrate to deliver
`suspect code to the Deep Discovery solution for advanced detection.
`Integrated DLP, with common compliance templates, was recently added to IWS.
`Application Control includes more than 850 Internet applications, including some peer-to-peer
`and IM traffic types that are detected by network signatures. Browsers, browser versions and
`plug-ins can be blocked by policy. Application Control also offers time of day as well as time
`and bandwidth quota policy options.
`
`Cautions
`At the time of this writing, Trend Micro's cloud is not generally available. The vendor plans to
`launch the service in Japan and the Asia/Pacific region in the second half of 2013, and it is
`targeting a North American launch for 2014.
`Reporting on compromised endpoints (outbound malware detection) does not provide drill-down
`information about threat details, and lacks severity indicators to help security teams prioritize
`remediation efforts.
`Policies are not consistent between the cloud service (once it becomes available) and IWS. For
`example, the cloud service does not block posts to Facebook, but IWS does.
`IWS and the cloud service do not offer dynamic classification of uncategorized URLs.
`
`Return to Top
`
`Trustwave
`Trustwave, based in Chicago, offers a diversified security portfolio, although its primary focus is as a
`PCI Qualified Security Assessor (QSA) and managed service company. Its Secure Web Gateway
`appliance (gained via the 2012 acquisition of M86 Security) is a proxy-based gateway that
`specializes in real-time malware detection. The solution is available in hardware and virtual
`instances. Trustwave also provides an option for its customers to run virtual instances of Secure Web
`Gateway in Amazon's EC2 cloud. Trustwave is a good candidate for security-conscious organizations,
`or those looking for a managed security service.
`
`Strengths
`Trustwave has strong real-time browser code emulation, which enables it to detect new threats
`
`http://www.gartner.com/technology/reprints.do?id=1-1FTQ83E&ct=130530&st=sb[6/18/2014 2:55:42 PM]
`
`

`
`Magic Quadrant for Secure Web Gateways
`
`and targeted attacks.
`Social media controls are strong. The Secure Web Gateway has a "zero post" policy option that
`enables read-only access to selected websites or Web categories to prevent posting to social
`media websites.
`Trustwave has integrated its Secure Web Gateway with its DLP solution to enable content
`security and control.
`Trustwave has integrated its Secure Web Gateway with its network access control (NAC), DLP,
`and security information and event management (SIEM) products to support automated
`responses for BYOD and mobile devices. For example, endpoints that trigger SWG alerts can be
`removed from the network by NAC.
`
`Cautions
`Support for mobile workers is weak due to Trustwave's lack of a multitenant cloud-based SWG
`service.
`The dashboard console, which is restricted to only three panels, is weaker than many
`competing offerings.
`The Secure Web Gateway does not dynamically categorize unknown URLs.
`The Secure Web Gateway lacks the ability to block port-evasive applications, such as
`BitTorrent.
`
`Return to Top
`
`Websense
`Websense, based in San Diego, offers appliances (hardware a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket