throbber
Magic Quadrant for Secure Email Gateways
`
`Magic Quadrant for Secure Email Gateways
`
`2 July 2013 ID:G00247704
`
`Analyst(s): Peter Firstbrook, Brian Lowans
`
`VIEW SUMMARY
`
`The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss
`prevention capability encryption and better protection from targeted phishing attacks.
`
`Market Definition/Description
`This document was revised on 26 July 2013. The document you are viewing is the
`corrected version. For more information, see the Corrections page on gartner.com.
`
`Secure email gateways (SEGs) provide protection from email spam and malware, and also provide
`outbound email content inspection and encryption of emails.
`
`The SEG market is mature. The penetration rate of commercial SEG solutions is close to 100% of
`enterprises. Buyers are becoming more price-sensitive; slightly less than 80% of recently surveyed
`reference customers (see Note 1) said that price was important or very important in their next SEG
`purchase.
`
`The market growth rate has leveled off, and there are no significant market entrants or acquisitions
`— all classic signs of a mature market.
`
`Despite the market maturity, companies can't do without SEG solutions. Global spam volumes
`declined again slightly in 20121 as spammers moved to other mediums, such as social networks, but
`spam still represents as much as 69% of email. Phishing and malware attachments also declined
`slightly in 2012; however, there is ample evidence that email is the preferred channel to launch
`advanced targeted attacks.
`
`Better protection from targeted phishing attacks is the most critical inbound protection capability
`(98% of respondents indicated that this was an important or very important capability), but only a
`few vendors have advanced the state of the art against these attacks. Leading solutions are
`incorporating methods to double check — or better, proxy — URL links in email at the "time of click"
`rather than the time of delivery. These methods are more effective in detecting fast fluxing link-
`based malware/phishing attacks. To address attachment malware, leading solutions are adding the
`ability to strip active content (that is, Java and macros) from common document types (that is, PDFs,
`Office) to neuter their malicious intent. More advanced solutions are actually executing suspicious
`files in virtual environments to detect malicious behavior and provide forensic information. Some
`vendors are also creating reporting that is specific to targeted attacks to provide forensic information
`about attacks and users' behavior. These reports are valuable for incident response as well as
`employee education.
`
`Eighty-two percent of respondents to our 2013 survey indicated that bulk email filtering was an
`important or very important critical capability of their next SEG. Dissatisfaction with current bulk
`email capabilities is a significant pain point of existing solutions. End users don't care about the
`clinical definition of spam and are frustrated with the level of "unwanted" email in their inboxes. Most
`solutions include a "bulk" or "marketing" email classifier that can be used to quarantine this type of
`mail, but policy options are typically very coarse and could easily be improved. None of the vendors
`offer personal controls to enable end users to better manage their inboxes.
`
`Interest in outbound email hygiene continues. Outbound capabilities, such as data loss prevention
`(DLP) and encryption, remain the most important feature differentiators. Forty percent of
`respondents indicated that they already use DLP, and 25% plan on adopting DLP in the next 24
`months. Workflow for managing events and predeveloped content (that is, common identifiers,
`dictionaries and regulatory policies) are the main differentiators of DLP capabilities among vendors in
`this analysis. Thirty-nine percent of respondents already use email encryption beyond Transport
`Layer Security (TLS), while another 25% plan on adopting it in the next 24 months. Almost all the
`vendors in this analysis have some encryption capabilities; however, existing encryption customers
`are expressing frustration with the usability of encryption for senders and recipients, especially on
`
`http://www.gartner.com/technology/reprints.do?id=1-1H6BLFE&ct=130715&st=sb[6/18/2014 2:57:34 PM]
`
`STRATEGIC PLANNING ASSUMPTION
`
`Cloud-based (software as a service) deployments of
`the secure email gateway market will grow from 37%
`in 2011 to more than half of the market (by
`revenue) in 2016.
`
`EVIDENCE
`
`1 Symantec's "2013 Internet Security Threat Report,
`Volume 18"
`This research was based on:
`A Magic Quadrant survey sent to vendors in April
`2013
`An online survey of 96 vendor-supplied reference
`customers conducted by Gartner in May 2013
`An online survey of 31 vendor-supplied reference
`value-added resellers conducted by Gartner in
`May 2013
`Inquiry calls and other interactions with Gartner
`clients
`
`NOTE 1
`GARTNER ONLINE SURVEY RESULTS
`
`Gartner conducted an online survey of 96 vendor-
`supplied reference customers in May 2013. Forty-
`three percent of respondents had more than 5,000
`seats, and 24% had fewer than 1,000 seats. Sixty-six
`percent of respondents were self-identified as being
`"responsible for daily operation, policy configuration
`and incident response"; 28% were responsible for
`"selection of the SWG solution"; and 6% said that
`they "get reports and help set policy."
`
`EVALUATION CRITERIA DEFINITIONS
`
`Ability to Execute
`Product/Service: Core goods and services offered
`by the vendor that compete in/serve the defined
`market. This includes current product/service
`capabilities, quality, feature sets, skills and so on,
`whether offered natively or through OEM
`agreements/partnerships as defined in the market
`definition and detailed in the subcriteria.
`Overall Viability (Business Unit, Financial,
`Strategy, Organization): Viability includes an
`assessment of the overall organization's financial
`health, the financial and practical success of the
`business unit, and the likelihood that the individual
`business unit will continue investing in the product,
`will continue offering the product and will advance
`the state of the art within the organization's portfolio
`of products.
`Sales Execution/Pricing: The vendor's capabilities
`in all presales activities and the structure that
`supports them. This includes deal management,
`pricing and negotiation, presales support, and the
`overall effectiveness of the sales channel.
`Market Responsiveness and Track Record: Ability
`to respond, change direction, be flexible and achieve
`
`

`

`competitive success as opportunities develop,
`competitors act, customer needs evolve and market
`dynamics change. This criterion also considers the
`vendor's history of responsiveness.
`Marketing Execution: The clarity, quality, creativity
`and efficacy of programs designed to deliver the
`organization's message to influence the market,
`promote the brand and business, increase awareness
`of the products, and establish a positive identification
`with the product/brand and organization in the minds
`of buyers. This "mind share" can be driven by a
`combination of publicity, promotional initiatives,
`thought leadership, word-of-mouth and sales
`activities.
`Customer Experience: Relationships, products and
`services/programs that enable clients to be
`successful with the products evaluated. Specifically,
`this includes the ways customers receive technical
`support or account support. This can also include
`ancillary tools, customer support programs (and the
`quality thereof), availability of user groups, service-
`level agreements and so on.
`Operations: The ability of the organization to meet
`its goals and commitments. Factors include the
`quality of the organizational structure, including skills,
`experiences, programs, systems and other vehicles
`that enable the organization to operate effectively
`and efficiently on an ongoing basis.
`Completeness of Vision
`Market Understanding: Ability of the vendor to
`understand buyers' wants and needs and to translate
`those into products and services. Vendors that show
`the highest degree of vision listen and understand
`buyers' wants and needs, and can shape or enhance
`those with their added vision.
`Marketing Strategy: A clear, differentiated set of
`messages consistently communicated throughout the
`organization and externalized through the website,
`advertising, customer programs and positioning
`statements.
`Sales Strategy: The strategy for selling products
`that uses the appropriate network of direct and
`indirect sales, marketing, service, and communication
`affiliates that extend the scope and depth of market
`reach, skills, expertise, technologies, services and the
`customer base.
`Offering (Product) Strategy: The vendor's
`approach to product development and delivery that
`emphasizes differentiation, functionality, methodology
`and feature sets as they map to current and future
`requirements.
`Business Model: The soundness and logic of the
`vendor's underlying business proposition.
`Vertical/Industry Strategy: The vendor's strategy
`to direct resources, skills and offerings to meet the
`specific needs of individual market segments,
`including vertical markets.
`Innovation: Direct, related, complementary and
`synergistic layouts of resources, expertise or capital
`for investment, consolidation, defensive or pre-
`emptive purposes.
`Geographic Strategy: The vendor's strategy to
`direct resources, skills and offerings to meet the
`specific needs of geographies outside the "home" or
`native geography, either directly or through partners,
`channels and subsidiaries as appropriate for that
`geography and market.
`
`Magic Quadrant for Secure Email Gateways
`
`mobile devices. A key consideration is the encryption solution's level of integration in the SEG
`management interface.
`
`Significant interest in and deployment of virtual solutions and software as a service (SaaS) solutions
`continue. Leading vendors in this market are expanding their offerings vertically into adjacent
`markets (such as mailbox hosting, hosted archiving, e-discovery and continuity services), and
`horizontally into secure Web gateway (SWG — see "Magic Quadrant for Secure Web Gateway")
`solutions linked by common DLP and management. However, buyers' demand for these services from
`their SEG vendors is mixed, and purchasing decisions rarely coincide.
`
`Return to Top
`
`Magic Quadrant
`
`Figure 1. Magic Quadrant for Secure Email Gateways
`
`Source: Gartner (July 2013)
`
`Return to Top
`
`Vendor Strengths and Cautions
`Barracuda Networks
`Barracuda Networks is a private, California-based company that focuses on producing a range of
`economical, easy-to-use network appliances and SaaS solutions that are aimed primarily at small or
`midsize businesses (SMBs), as well as educational and government institutions. Barracuda continues
`to grow at above market rates. Barracuda Spam & Virus Firewall appliances are shortlist candidates
`for organizations that are seeking "set and forget" functionality at a reasonable price.
`
`Strengths
`Barracuda continues to execute well, with respectable growth in an overall declining market.
`Recent improvements focus on large file attachment handling, configuration backup, better role-
`based administration and better encrypted email reporting.
`An optional cloud-based prefilter, which filters out obvious spam before final filtering, is done
`on-premises.
`Native basic pull-based encryption and DLP capability are included free of charge.
`Barracuda Control Center can manage multiple boxes, and comes as a free cloud-based offering
`or an on-premises appliance.
`
`http://www.gartner.com/technology/reprints.do?id=1-1H6BLFE&ct=130715&st=sb[6/18/2014 2:57:34 PM]
`
`

`

`Magic Quadrant for Secure Email Gateways
`
`Service prices are per box, rather than per user, making Barracuda a significant price leader.
`The vendor's email archiving solution has an interface with a consistent look and feel, and it
`can also be managed from the same Barracuda Control Center.
`
`Cautions
`Barracuda does not offer any other third-party anti-malware engines, and techniques for
`advanced threat detection are missing.
`The user interface and reporting engine are long overdue for a refresh. The addition of
`customizable dashboards with hyperlinks to reports, better reuse of policy objects, simpler
`policy workflow and ad hoc reporting would be welcome.
`DLP is limited to keyword and regular expression filtering. It includes only limited, predefined
`DLP dictionaries, and is not object-oriented or group-policy-integrated. Workflow for compliance
`officers is limited.
`The included encryption capability is a good value, but it could be better optimized for mobile
`devices.
`
`Return to Top
`
`Cisco
`Cisco continues to dominate the market for dedicated on-premises solutions for midsize-to-large
`organizations, but has lost some momentum. It offers three deployment options: hardware
`appliances, managed appliances and virtual appliances. Cisco enjoys strategic vendor status with
`many of its customers and is well-respected in the core network buying centers. It is a good
`candidate for midsize-to-large enterprise customers that are looking for best-of-breed functionality.
`
`Strengths
`Cisco has excellent scalability/reliability, an easy-to-use management interface, deep policy
`control and very granular mail transfer agent (MTA) control capabilities.
`Its Outbreak Filters option provides unique targeted attack protection by scanning suspicious
`URLs at the time of click with Cisco Cloud Web Security. This year, Cisco has made
`improvements in its ability to detect low-volume spam attacks, as well as in assigning IPv6
`addresses a reputation score.
`Cisco provides content-aware DLP capabilities with numerous predefined policies, dictionaries
`and identifiers, as well as a strong compliance officer interface. Integration with RSA Enterprise
`Manager for DLP integration exists between Cisco's solutions and RSA, The Security Division of
`EMC's enterprise DLP.
`It offers native policy-based email push encryption delivered on box or as a service with
`message recall, read receipt and message expiration; proprietary desktop-to-desktop
`encryption capabilities; support for iOS, Android and Windows platforms; and large file
`attachment handling.
`Cisco Email Security benefits from Cisco's installed base of network security appliances, and
`from Cisco Cloud Web Security (formerly ScanSafe), by collecting a massive amount of Internet
`traffic information to spot new malware and spam trends. Cisco's broad array of network
`security components makes it a strategic vendor for many organizations.
`
`Cautions
`Cisco's transition to the general Cisco channel from dedicated IronPort sales representatives
`and email-specific channel partners will be rough for some users.
`Cisco's focus on the needs of large enterprises doesn't always scale down well for SMBs. The
`user interface can be confusing and unintuitive for less experienced operators.
`Cisco spam filtering is highly reliant on reputation, which is less effective for lower-volume
`snowshoe spam.
`Cisco's hosted email offering only has four data centers in the U.S. and Europe so far.
`While on-premises solutions offer local key management, the hosted solutions only offer key
`management from a U.S. data center. None of these solutions currently offer compliance with
`U.S. Federal Information Processing Standard (FIPS) Publication 140-2.
`Cisco put the PostX encryption appliance in end of sale, which eliminates pull functionality and
`support for Pretty Good Privacy (PGP) and Secure Multipurpose Internet Messaging Extensions
`(S/MIME); however, it continues to support on-box push encryption. The former PostX
`functionality will continue to be available via Cisco partner totemo.
`
`Return to Top
`
`Clearswift
`Clearswift has an established presence in the email protection market, primarily in the U.K., Europe
`and Asia/Pacific. It has also branched out to the SWG market. New ownership and management are
`pushing the company in the direction of data protection and information governance. Clearswift
`offers hardware appliances, a bare-metal software and VMware/Hyper-V solutions. The combination
`
`http://www.gartner.com/technology/reprints.do?id=1-1H6BLFE&ct=130715&st=sb[6/18/2014 2:57:34 PM]
`
`

`

`Magic Quadrant for Secure Email Gateways
`
`of SWG and SEG with the provision of basic DLP capabilities across both channels makes Clearswift a
`reasonable shortlist candidate for buyers that are looking for on-premises SEG and SWG solutions
`from the same vendor.
`
`Strengths
`The Web-based management interface provides centralized management, dashboards, and
`reporting for the Web and email products; a centralized reporting engine; and the content
`scanning engine. Nontechnical users will find it easy to use, and it has a lot of context-sensitive
`recommendations and help functions.
`The proprietary Clearswift DLP engine provides fast scanning of more than 150 file formats. It
`contains features to protect against denial-of-service attacks, and provides a selection of
`prebuilt patterns for common data types (PCI/personally identifiable information), as well as
`common Boolean and proximity operators.
`Users can manage their quarantines from any browser, or via an iPhone/iPad interface.
`Clearswift exploits Commtouch for a portion of its anti-spam capability, and has upgraded to
`the most recent engine.
`The solution includes a "bulk email" category, which is useful for reducing nuisance email.
`The ImageLogic detection engine for inappropriate and registered images is an extra utility
`service for organizations with this need.
`On-box encryption with support for S/MIME, PGP and password-protected email encryption, and
`with a built-in certificate store, was recently improved with automatic certificate, key extraction
`and lookup capabilities. The Echoworx partnership provides enhanced encryption capabilities via
`a Web portal ("pull") or mailbox ("push").
`
`Cautions
`Clearswift is recovering its growth due to a focus on the core email and Web gateway business,
`and it is improving customer support; however, its market share and mind share are very low
`in a rapidly maturing market. The vendor is late to deliver industry-leading features and
`functionality. It does not directly offer a SaaS-based delivery model or vertical products, such
`as email archiving. As buyers increasingly look for more strategic integrated vendors, Clearswift
`may have a difficult time standing out in a crowded market.
`Although the interface is easy to use for nontechnical users, it is limited in detail for more
`technical enterprise users.
`Advanced encryption provided by Echoworx is not integrated with the management interface. It
`lacks any control or visibility of sent messages, and it lacks self-service configuration of the
`encryption experience.
`DLP enhancements are needed in the ability to describe sensitive content beyond regular
`expressions, along with support for more advanced detection techniques (such as partial
`document matching). Policy management, workflow reporting and event management are
`rudimentary.
`
`Return to Top
`
`Dell
`Dell acquired SonicWALL and now offers a broad suite of SonicWALL network security solutions,
`including firewalls, virtual private networks, backup and a range of SEGs. It offers several SEG form
`factors, including hardware appliances, software and VMware versions, and hosted versions. Dell also
`offers a subset of SEG functionality that is delivered as SaaS prefilters for its unified threat
`management (UTM) customers. Dell is a candidate for shortlist inclusion — primarily for existing Dell
`SonicWALL firewall customers.
`
`Strengths
`Dell is one of the largest resellers of Microsoft Exchange solutions, and, with SonicWALL, it is
`able to sell a full Hosted Email stack, including security.
`Dell has its own malware research team developing new spam signatures and detection
`techniques, which leverage data from its installed base of appliances. The solution also
`leverages contact databases and communication partners to lower false positives.
`Dell has the most advanced Domain-based Message Authentication, Reporting and Conformance
`(DMARC) support and reporting, which enables more precise and useful DomainKeys Identified
`Mail (DKIM) and Sender Policy Framework (SPF) message handling.
`The management interface is localized in a number of languages and easy to use. It has
`multitenancy support, and reporting is adequate for most organizations' needs.
`The solution includes basic content-aware DLP functionality with prebuilt dictionaries and
`number identifiers. The policy interface is easy to use with natural-language policy all on a
`single page.
`
`Cautions
`It is difficult for any company to compete in many markets and across company segments —
`ranging from large enterprises to small offices — while providing market-leading features in
`
`http://www.gartner.com/technology/reprints.do?id=1-1H6BLFE&ct=130715&st=sb[6/18/2014 2:57:34 PM]
`
`

`

`Magic Quadrant for Secure Email Gateways
`
`each market segment. Dell does not provide any market-leading SEG functionality. Only a small
`percentage of its revenue is email-security-related. Its market share and mind share among
`Gartner customers are low.
`Dell's Ability to Execute score was largely impacted by a low score in overall customer
`satisfaction compared with other vendors in this analysis; however, we do note an improvement
`in this year's survey. Still, some reference customers commented on the necessity for better
`spam and malware detection accuracy.
`Dell does not offer any advanced malware detection techniques.
`The management dashboard interface is not customizable.
`DLP functionality is basic and supports only regular expression matching. Only two prebuilt
`dictionaries and a handful of number format identifiers are included. It does not include any
`predefined policy, and event management is rudimentary.
`At the time of this analysis, Dell did not have integrated encryption; however, it was embarking
`on a beta program for cloud-based encryption that is integrated with the management console.
`
`Return to Top
`
`Fortinet
`Fortinet is a public company with a broad geographical market presence that offers a wide array of
`UTM and dedicated appliances for all organization sizes. It also offers an array of anti-spam
`technology in various forms, from client to UTM. This analysis, however, focuses on the dedicated
`SEG FortiMail appliances. FortiMail is a shortlist candidate primarily for Fortinet customers that are
`looking for a basic SEG solution.
`
`Strengths
`FortiMail's widget-based management interface is customizable, easy to use and similar to other
`Fortinet products. FortiManager can manage up to 40 Fortinet devices, and FortiAnalyzer
`provides centralized log storage dashboards and reporting.
`The FortiGuard cloud-based sandboxing service uses behavioral attributes to detect malware by
`executing them within a virtual environment. Suspicious files can be submitted automatically to
`the new hosted service for further scanning and detailed status reports.
`FortiMail provides a number of high-availability and scalability features, such as native
`clustering, load balancing and high-throughput FortiMail hardware appliances.
`Basic DLP capability and identity-based push and pull encryption are included free of charge in
`the standard FortiMail feature set.
`Appliance-based, rather than user-based, service pricing makes FortiMail very affordable.
`On-box or off-box policy-based message archiving is fully indexed and available from the
`FortiMail management interface.
`
`Cautions
`Fortinet offers very basic SEG functionality, and is missing more advanced MTA functions for
`larger enterprise or more demanding environments. Improvements since our last analysis have
`focused on managed security service provider (MSSP) functions, and planned improvements are
`focused mostly on better integration with other Fortinet systems.
`Fortinet only offers its own antivirus scan engine, although it does well in Virus Bulletin
`Reactive and Proactive (RAP) tests. It does not have a big or well-known research organization,
`especially when compared with the Leaders in this Magic Quadrant.
`The FortiAnalyzer component is required for in-depth, per-domain report and log access across
`multiple logs in a single interface. However, this component costs extra. Disposition information
`to show why email is quarantined is more cryptic than users would like.
`There is no SaaS deployment option, although it is in the planning stage.
`DLP functionality is relatively basic; it lacks good policy or compliance workflow, or deep
`content inspection capabilities.
`
`Return to Top
`
`McAfee
`McAfee, a subsidiary of Intel, has a broad range of endpoint and network security products. It
`consolidated its two on-premises gateway solutions in v.7.0 (now v.7.7), which is a free version
`upgrade that is supported on hardware appliances that are less than three years old. McAfee also
`offers blade server appliances with free additional virtual appliances, integrated hybrid email security
`(with single management and reporting), and SaaS-based SEG, archiving and disaster recovery
`services. McAfee is a good choice for an integrated hybrid solution, to augment the security of hosted
`mailboxes, and for existing McAfee customers and prospects looking for an integrated suite of
`security products.
`
`Strengths
`McAfee's respected threat research team consolidates message, network, Web and file
`
`http://www.gartner.com/technology/reprints.do?id=1-1H6BLFE&ct=130715&st=sb[6/18/2014 2:57:34 PM]
`
`

`

`Magic Quadrant for Secure Email Gateways
`
`reputation data into its Global Threat Intelligence (GTI) technology. The time-of-click URL
`redirection for targeted threat protection is very good. We particularly like the "safe preview"
`capability.
`McAfee Email Protection's native DLP capability is strong and leverages the abilities of its stand-
`alone, enterprise-class, content-aware DLP offering. McAfee provides numerous predefined
`policies and dictionaries as part of the base product, and it supports self-defined content for
`policy creation.
`Basic encryption methods (TLS, S/MIME and PGP gateway encryption) are supported, along
`with push (secure envelope) and pull encryption. McAfee Email Protection also supports the
`secure transfer of arbitrarily large files via its encrypted email pull capability.
`The SaaS offering provides a simple, clean, Web-based interface that is very easy to use. It is
`hosted in seven geographies, and the service can lock message traffic to a specific geography
`to avoid processing traffic in foreign legal environments. The time-of-click URL redirection
`targeted threat protection is very good. We particularly like the safe preview option. The time-
`of-click URL redirection capability is included in the base package, and policy-based pull/push
`email encryption — which includes the DLP capabilities — is an optional add-on. McAfee
`customers can switch between solutions without any additional charge.
`McAfee Content Security Suite bundles of secure email, Web and DLP in a combined package
`that can be deployed in SaaS, appliances or hybrid for a single price can be very attractive.
`
`Cautions
`McAfee has not significantly expanded its market share in the enterprise SEG market over the
`past three years, and interviews with Gartner clients and reference customers show that
`customer satisfaction remains lower than average. These issues affect its Ability to Execute
`score in this analysis.
`McAfee has some promising sandboxing technology for its on-premises appliances for targeted
`threats, but it was not in general availability at the time of this analysis. McAfee does not yet
`make use of its cloud Web Gateway technology for time-of-click protection for these appliances.
`Native DLP compliance workflow is weak, it does not offer a compliance-specific role to restrict
`view to compliance issues, and it does not allow for log annotation.
`Several reference customers pointed out the need for reporting improvements.
`McAfee offers the choice to host encrypted email in only one of the seven data center
`geographies. No options are offered for on-premises key management, which is automated by
`McAfee. Currently, there is no compliance with key management standards.
`
`Return to Top
`
`Microsoft
`Microsoft has now consolidated all its anti-spam capabilities into its SaaS-based Exchange Online
`Protection (EOP) product. Microsoft's dominance in the email market makes it a strategic provider of
`SEG solutions, and it is making big strides in integrating and improving the service. However, it is
`not as polished as the other Leaders.
`
`Strengths
`Microsoft is capable of tighter integration of SEG functions with Exchange/Outlook than its
`competitors are. EOP is part of the Office 365 admin center, which provides centralized
`management of Microsoft cloud services. EOP management concepts will be familiar to
`Exchange administrators. Exchange Server 2013 and Exchange Online include much improved
`DLP capabilities that are tightly integrated with the Outlook client.
`EOP mirrors email across multiple data centers for redundancy. Microsoft supports in-geography
`mail processing for two geographies: the U.S. and the European Union.
`EOP also offers Exchange Hosted Encryption, a solution that is based on Voltage Security
`technology.
`Microsoft Active Directory Rights Management Services (AD RMS) has been added as an option
`for end-to-end email encryption services, with Microsoft Windows Azure Active Directory Rights
`Management services as the hosted equivalent. Windows Azure Active Directory Rights
`Management services offer native, policy-based, on-premises email push encryption with
`message recall, read receipt and message expiration.
`EOP is included in Exchange Enterprise CAL with Services licenses and in Microsoft Enterprise
`CAL Suite. Buyers should check their license entitlements before they consider alternatives.
`
`Cautions
`Microsoft is not on the leading edge of functionality in this market, and has been slow to offer
`major new improvements. We anticipate an acceleration of feature improvements as Microsoft
`embraces a cloud-first agile development model.
`Navigating Microsoft licensing can be difficult. EOP is bundled with other services, but it is also
`sold separately; however, Gartner clients report difficulty in getting sales to provide EOP-only
`quotes.
`Microsoft is migrating all customers from the legacy Forefront Online Protection for Exchange
`
`http://www.gartner.com/technology/reprints.do?id=1-1H6BLFE&ct=130715&st=sb[6/18/2014 2:57:34 PM]
`
`

`

`Magic Quadrant for Secure Email Gateways
`
`(FOPE) to the new EOP starting in 3Q13, which will cause extra work for existing customers
`(see "Forefront Online Protection for Exchange [FOPE] Transition Center").
`Specific advanced targeted threat protection features, such as time-of-click URL protection or
`active content stripping, are absent.
`EOP does not allow end-user-specific blacklists.
`In-geography-only routing is available only in the U.S. and the EU. While on-premises solutions
`offer local key management, the hosted solutions only offer key management from the U.S.
`Microsoft AD RMS only supports Windows mobile platforms and is not useful for sending
`messages to external recipients.
`Buyers that have not standardized on Active Directory require Forefront Identity Manager to
`consolidate directories into a single addressable entity for synchronization with the EOP service.
`Although the DLP capability has been updated, it still lacks some of the more advanced features
`of other solutions, such as lexicon, file matching and fingerprinting.
`The Exchange Hosted Encryption solution is not integrated with the management console, and
`lacks self-service configuration of the encryption experience as well as significant control or
`visibility of sent messages.
`Policy changes take some time to propagate through the EOP network, which lacks a feedback
`loop to certify that the changes have been implemented.
`
`Return to Top
`
`Mimecast
`Mimecast remains one of a few companies in this analysis that is solely dedicated to email security
`and management issues. However, it has ambitions to solve more complex end-user problems, such
`as improving email collaboration and file sharing, and also aims to enhance the end-user experience
`and the value of the information flowing through the gateway. Mimecast is a good fit for
`organizations looking for archiving and SEG, and for those looking to provide knowledge workers
`with email utilities to improve collaboration.
`
`Strengths
`Mimecast has a multitenant SaaS email infrastructure with simple administration for archiving
`and SEG services. It is hosted in 10 data centers in the U.S., the U.K., South Africa and the
`Channel Islands.
`Mimecast provides a set of email utilities via its Outlook plug-in, making i

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket