It Next Gen Firewall

Embed Size (px)

Citation preview

  • 7/30/2019 It Next Gen Firewall

    1/51

    1Info-Tech Research Group

    Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.

    Info-Techs products and services combine actionable insight and relevant advice withready-to-use tools and templates that cover the full spectrum of IT concerns.

    1997-2012 Info-Tech Research Group Inc.

    Vendor Landscape: Next Generation Firewalls

    The perimeter firewall grows up and becomes a Swiss Army Knife of protection capabilities.

  • 7/30/2019 It Next Gen Firewall

    2/51

    2Info-Tech Research Group

    Network security is just as important as ever; the right perimeter protection

    means more threats stay outside andmore data stays inside.

    Introduction

    Enterprises seeking to select a solution for NextGeneration Firewalls (NGFW).

    Their NGFW use case may include:

    Enterprises looking for a network perimetersecurity appliance for comprehensiveprotection of the network edge.

    Enterprises that have established theirnetwork perimeter NGFW strategy

    independently, and need guidance inevaluating available products.

    This Research Is Designed For: This Research Will Help You:

    Understand whats new in the NGFW market.

    Evaluate NGFW vendors and products for yourenterprise needs.

    Determine which products are most appropriatefor particular use cases and scenarios.

  • 7/30/2019 It Next Gen Firewall

    3/51

    3Info-Tech Research Group

    Executive Summary

    Info-Tech evaluated ten competitors in the NGFW market,

    including the following notable performers:

    Champions:

    Check Point.An incredibly viable vendor with highly flexibleproducts.

    Sophos. Continues to perform well in all security areas, andNGFW is no exception.

    Barracuda.A strong contender, Barracuda offers almost the

    complete advanced features list.

    Fortinet. With competitive advanced features such as WANrouting and optimization, Fortinet stays in the lead.

    WatchGuard.A solid product with great value, WatchGuardmaintains their focus in the SMB space.

    SonicWALL.A continued champion with a solid product and price.

    Value Award:

    Fortinet, a Champion in the space, with an affordable product,makes it an attractive option for SMBs.

    Trend Setter Award:

    Juniper. With the only solution that includes all advanced features,from identity-based control to WAN routing and optimization.Competitors need to take note and catch up.

    1. The only traffic that counts anymore isHTTP/S:

    As all traffic becomes Web traffic, controllingtraffic flow by protocol becomes keyed todigging into Port 80 (and 443) traffic.

    2. Inbound no longer the only direction inwhich threats flow:

    As security focus has shifted frominfrastructure to data, protection needs toaddress outbound flow as much as inboundattacks.

    3. Firewalls cant protect traffic they cantsee:

    Encrypted traffic obfuscates threats fromFirewalls while WiFi networks allow attacksto bypass them entirely. Modern solutionsmust also control these traffic types.

    Info-Tech Insight

  • 7/30/2019 It Next Gen Firewall

    4/51

    4Info-Tech Research Group

    Market Overview

    Firewalls began as a theoretical concept developed inthe late 80s. Shortly after, they were brought into

    existence as traffic-controlling security tools. Firewallsquickly evolved from simple packet-filters (that onlyevaluated source, destination, and protocol) to statefulinspectors (that remembered the nature of ongoing

    communications, and the provenance of packets inthose communications), and proxies (that evaluated

    packet contents, rather than just the packetsthemselves). As threats increased through the early millennium, and

    became complex blended threats, more feature-richUnified Threat Management (UTM) solutions evolved todeal with them. Essentially, firewalls with integrated Anti-Malware and Intrusion Prevention capabilities. UTMsreplaced multiple point solutions with a single integrateddevice that offered improved capability, simplified

    management, and economy of scale cost savings.

    UTMs have morphed into NGFWs that supplement theabilities of the traditional UTM with more content-awarecapabilities, such as:

    URL/Web Content Filtering Data Leakage Protection Application-centric Control User-centric Control

    In many ways, NGFW and UTMare simply

    interchangeable marketing terms as leading NGFWshave been gradually incorporating content-awareprotection.

    As network traffic becomes ubiquitously Web traffic,content-level awareness becomes crucial; enterprisescan continue to achieve appropriate protection throughthe deployment of older UTMs supplied with newer pointsolutions, or they can once again consolidate,streamline, and improve through current NGFW

    solutions.

    How it go t here Where its going

    As the market evolves, capabilities that were once cutting edge become default and new functionalitybecomes differentiating. Integrated IPS and Anti-Malware have become Table Stakes capabilities andshould no longer be used to differentiate solutions. Instead, focus on Application and Identity-centricControl to get the best fit for your requirements.

  • 7/30/2019 It Next Gen Firewall

    5/51

    5Info-Tech Research Group

    NGFW Vendor selection / knock-out criteria: market share,mind share, and platform coverage

    Barracuda. Supplemented its core spam and virus gateways with an NGFW through acquisition of Phion.

    Check Point. One of the progenitors of the firewall space, and still one of the most recognizable names.

    Cisco. The most widely deployed firewall solutions as the company has leveraged its networking market share.

    Fortinet. The vendor that coined the UTM term, and one of the first to incorporate enhanced capabilities.

    Juniper. Entered the firewall market through acquisition of NetScreen and has established a solid foothold since then.

    McAfee.Acquisition of Secure Computing brought appliance lines, including firewall, to an established portfolio.

    Palo Alto. The latest entrant to the market of those reviewed, but the first to focus on application control.

    SonicWALL. SMB-focused player now stretching its legs into the large enterprise space.

    Sophos. Sophos acquired Astaro in 2011 to bolster its UTM portfolio.

    WatchGuard. Another vendor growing into larger markets after early focus in the SMB space.

    Included in this Vendor Landscape:

    Regardless of whether its a Firewall, UTM, orNGFW, the market is extremely stable, and represented by vendors withyears of experience and significant market share. New vendors, such as Palo Alto Networks appear rarely and need torepresent a phase shift to gain any traction in the space.

    For this Vendor Landscape, Info-Tech focused on those vendors that offer broad capabilities across multiple platformsand that have a strong market presence and/or reputational presence among mid and mid-large sized enterprises.

  • 7/30/2019 It Next Gen Firewall

    6/51

    6Info-Tech Research Group

    Criteria Weighting:The Table Stakes

    NGFW criteria & weighting factors

    25%

    10%

    25%

    40%

    50%

    50%

    Vendor is committed to the space and has afuture product and portfolio roadmap.

    Strategy

    Vendor offers global coverage and is able to selland provide post-sales support.

    Reach

    Vendor is profitable, knowledgeable, and will be

    around for the long-term.Viability

    Vendor channel strategy is appropriate and thechannels themselves are strong.

    Channel

    The three year TCO of the solution iseconomical.Affordability

    The delivery method of the solution aligns withwhat is expected within the space.

    Architecture

    The solutions dashboard and reporting tools are

    intuitive and easy to use.Usability

    The solution provides basicand advanced feature/functionality.

    Features

    30%

    30%

    15%

    25%

    Features Usability

    Architecture

    Affordability

    Product

    Vendor

    Viability Strategy

    Channel Reach

    Product Evaluation Criteria

    Vendor Evaluation Criteria

  • 7/30/2019 It Next Gen Firewall

    7/517Info-Tech Research Group

    The Info-Tech Vendor Landscape:

    The Info-TechNGFWVendor Landscape

    Champions receive high scores for most evaluationcriteria and offer excellent value. They have a strongmarket presence and are usually the trend settersfor the industry.

    Market Pillars are established players with verystrong vendor credentials, but with more averageproduct scores.

    Innovators have demonstrated innovative productstrengths that act as their competitive advantage inappealing to niche segments of the market.

    Emerging Players are newer vendors who arestarting to gain a foothold in the marketplace. Theybalance product and vendor attributes, though scorelower relative to market Champions.

    The Zones of the Landsc ape

    For an explanation of how the Info-Tech Vendor Landscape is created, see Information Presentation Vendor Landscape in the Appendix.

    Barracuda

    Check Point

    Cisco

    FortinetJuniper

    McAfee

    Palo Alto

    SonicWALL

    Sophos

    WatchGuard

  • 7/30/2019 It Next Gen Firewall

    8/518Info-Tech Research Group

    =Exemplary =Good =Adequate =Inadequate =Poor

    Balance individual strengths to find the best fit for yourenterprise

    Product Vendor

    Features Usability Viability Strategy Channel

    McAfee*

    Cisco*

    Check Point

    Fortinet

    Juniper

    Barracuda

    ReachOverall Overall

    Palo Alto*

    Sophos

    SonicWALL

    WatchGuard

    Legend

    Afford. Arch.

    For an explanation of how the Info-Tech Harvey Balls are calculated, see Information Presentation Criteria Scores (Harvey Balls) in the Appendix.

    *The vendor declined to provide pricing and publically available pricing could not be found.

  • 7/30/2019 It Next Gen Firewall

    9/519Info-Tech Research Group

    What is a Value Score?

    The Info-Tech NGFW Value Index

    4050

    6070

    8090

    30 2010

    The Value Score indexes each vendorsproduct offering and business strengthrelative to their price point. It doesnot indicate vendor ranking.

    Vendors that score high offer more bang-for-the-buck (e.g. features, usability, stability,etc.) than the average vendor, while theinverse is true for those that score lower.

    Price-conscious enterprises may wish to givethe Value Score more consideration thanthose who are more focused on specificvendor/product attributes.

    Champion

    27

    Juniper

    66

    SonicWALL

    91

    CheckPoint

    95

    WatchGuard

    97

    Fortinet

    100

    Palo Alto*

    0

    McAfee*

    0

    Cisco*

    0

    Sophos

    11

    Barracuda

    Average Score: 49

    * The vendor declined to provide pricing andpublically available pricing could not be found

    For an explanation of how Price is determined, see Information Presentation Price Evaluation in the Appendix.

    For an explanation of how the Info-Tech Value Index is calculated, see Information Presentation Value Index in the Appendix.

    On a relative basis, Fortinetmaintained the highest Info-TechValue ScoreTMof the vendorgroup. Vendors were indexedagainst Fortinets performance toprovide a complete, relative viewof their product offerings.

  • 7/30/2019 It Next Gen Firewall

    10/5110Info-Tech Research Group

    Table Stakes represent the minimum standard; without these,a product doesnt even get reviewed

    If Table Stakes are all you need from your NGFW solution, the only true differentiator for the organization isprice. Otherwise, dig deeper to find the best price to value for your needs.

    The products assessed in this VendorLandscapeTM meet, at the very least, therequirements outlined as Table Stakes.

    Many of the vendors go above and beyond theoutlined Table Stakes, some even do so inmultiple categories. This section aims tohighlight the products capabilities in excessof the criteria listed here.

    The Table Stakes What Does This Mean?

    Built-in perimeter anti-virus and anti-spywareprotection.

    Anti-Malware

    Ability to recognize and restrict inappropriateand unauthorized access.

    IntrusionPrevention

    Offers IPSEC (for site-to-site tunnels) and SSLVPN (for remote access) options.

    VPN

    The solution includes a stateful inspectionpacket filter firewall.

    Firewall

    What it is:Feature

  • 7/30/2019 It Next Gen Firewall

    11/5111Info-Tech Research Group

    Advanced Features are the capabilities that allow for granularmarket differentiation

    Info-Tech scored each vendors featuresoffering as a summation of their individualscores across the listed advanced features.Vendors were given 1 point for each featurethe product inherently provided. Somecategories were scored on a more granularscale with vendors receiving half points.

    Endpoint integration to ensure each connectingdevice has appropriate security.Network AccessControl

    Restrictive filtering of Web surfing to limitexposure to harmful and inappropriate sites.

    URL Filtering

    Restriction on the egress of sensitive privilegedor confidential data.

    Data LeakageProtection

    Mapping of specific security policies to defineduser groups and individuals.

    Identity-BasedControl

    Ability to restrict, on a granular level, which Webapps are allowed to run.

    ApplicationControl

    Ensuring WiFi networks have the same security

    stance and abilities as the perimeter.

    WiFi Network

    Control

    Dynamic routing of WAN traffic backed by QoSand prioritization capabilities.

    WAN Routing &Optimization

    Native decryption and re-encryption of SSL andSFTP traffic for thorough inspection.

    Encrypted DataControl

    What we looked for:Feature

    Advanced FeaturesScor ing Methodo logy

    For an explanation of how Advanced Features are determined, see Information Presentation Feature Ranks (Stop Lights) in the Appendix.

  • 7/30/2019 It Next Gen Firewall

    12/5112Info-Tech Research Group

    =Feature Absent=Feature partially present/pending=Feature fully present

    Each vendor offers a different feature set; concentrate on whatyour organization needs

    Identity DLP Web Apps WANWiFiNAC Encryption

    Legend

    Evaluated Features

    McAfee

    Cisco

    Check Point

    Fortinet

    Juniper

    Barracuda

    Palo Alto

    Sophos

    SonicWALL

    WatchGuard

    For an explanation of how Advanced Features are determined, see Information Presentation Feature Ranks (Stop Lights) in the Appendix.

  • 7/30/2019 It Next Gen Firewall

    13/5113Info-Tech Research Group

    Product:Employees:

    Headquarters:Website:

    Founded:Presence:

    Endpoint Security & DataProtection1,200+

    Abingdon, UKSophos.com1985Privately Held

    Check Point leads the way with strong solution at adecent price

    Champion

    $1 $1M+

    One of the first firewall providers, and still a market-shareleader, Check Point offers firewalls (and related security tools)of all capacities and capabilities, to clients of all sizes.

    Overview

    Delivers significant architectural flexibility via its Software Bladearchitecture that allows enterprises to customize protection by

    need and platform. The software blades also allow for manyadvanced features, such as full disk encryption and DLP.

    A significantly-sized support network that offers on-site supportin over 250 countries and multi-region stock depots for fastdelivery of spares, even into difficult locations.

    Strengths

    Broad portfolio of deployment options includes significantamount of overlap. Determining optimal solution for every needis potentially confusing and difficult.

    Lack of WiFi Network Control leaves notable gap in CheckPoints advanced features. With increasing amounts of mobile

    devices in the workplace, this type of control becomes importantto the security of a network.

    Challenges

    UTM-12200Tel Aviv, IsraelCheckPoint.com1993NASDAQ: CHKPFY11 Revenue: $1.25B

    Pricing solicited from public sources

    3 year TCO for this solution falls into pricingtier 6, between $50,000 and $100,000

    http://www.checkpoint.com/http://www.checkpoint.com/http://www.checkpoint.com/
  • 7/30/2019 It Next Gen Firewall

    14/5114Info-Tech Research Group

    Check Point

    Features

    Info-Tech Recommends:

    Check Points unique blade architecture creates a solution with a robust portfolio of advanced features

    for an affordable price. An ideal solution for mid-sized organizations looking for flexible architecture.

    Vendor Landscape

    UTM-1 132/134/138 to UTM-1 574/578: Works well for small to mid-sizedorganizations.

    Specs: Ranging from 120 to 300Mbps VPN throughput, and 1 to 1.7GbpsIPS throughput.

    Note: The UTM-1 132/134/138 model only operates as standalone hardware;therefore, not allowing for multi-site management.

    UTM-1 1075/1078 to UTM-1 3075/3078: Ideal for mid- to large-sized organizations. Specs: Ranging from 350 TO 1100Mbps VPN throughput , and 2.2 to 4GbpsIPS throughput.

    Note: These all allow for multi-site management.

    Check Point NGFW Models

    Product Vendor

    Feat. Use. Afford. Via. Strat. Chan.ReachArch. OverallOverall

    953rd out of 10

    Value Index

    Identity DLP Web AppsNAC WiFi WAN Encryption

  • 7/30/2019 It Next Gen Firewall

    15/5115Info-Tech Research Group

    Product:Employees:

    Headquarters:Website:

    Founded:Presence:

    Sophos recent inclusion of endpoint security in theirUTM solution further strengthens the products offerings

    Champion

    $1 $1M+

    Sophos acquired Astaro in July 2011 to bolster their securityportfolio. The company recently added endpoint security for amore complete NGFW.

    Overview

    Well-rounded solution that offers a good blend of capability withflexible deployment options (software primarily, but hardware

    and virtual appliances options available). Sophos recent release of UTM 9 merges endpoint security with

    their UTM under a single management console making it anideal solution for mid-sized enterprises looking for an all-in-one,centrally managed NGFW.

    Strengths

    Appliances have attractive pricing, but TCO grows rapidly as aresult of expensive subscription services; what seems a cheapsolution at first really isnt when bells and whistles are added.

    Sophos was the second most expensive solution evaluated. Sophos is lacking identify-based control, claiming it is not

    applicable to this product. However, the majority of itscompetitors feature it, making it almost a table stakes capability.

    Challenges

    Pricing provided by vendor

    Sophos UTM1700

    Abingdon, Oxfordshire, UKSophos.com1985Private

    3 year TCO for this solution falls into pricingtier 7, between $100,000 and $250,000

    http://www.sophos.com/en-us/http://www.sophos.com/en-us/
  • 7/30/2019 It Next Gen Firewall

    16/5116Info-Tech Research Group

    Sophos

    Features

    Info-Tech Recommends:

    Sophos may be slightly more costly, but with products that can adapt to different sized organizations andvendor viability, its a great vendor to partner with long-term.

    Vendor Landscape

    Sophos UTM 110-220: Ideal for small organizations. Specs: VPN throughput 180 to 480Mbps, antivirus throughput (proxy) 70 to165Mbps.

    Sophos UTM 320 to 625: Suited for mid-sized to large organizations. Specs: VPN throughput 700 to 1100Mbps, antivirus throughput (proxy) 235to 980Mbps.

    Sophos NGFW Models

    Product Vendor

    Feat. Use. Afford. Via. Strat. Chan.ReachArch. OverallOverall

    117th out of 10

    Value Index

    Identity DLP Web AppsNAC WiFi WAN Encryption

  • 7/30/2019 It Next Gen Firewall

    17/5117Info-Tech Research Group

    Product:Employees:

    Headquarters:Website:

    Founded:Presence:

    Endpoint Security & DataProtection1,200+

    Abingdon, UKSophos.com1985Privately Held

    Fortinet continues to be a champion in the spacewith its feature-rich solution

    Champion

    $1 $1M+

    Fortinet broke the firewall mold with its original FortiGate andhelped define the UTM market. While its portfolio hasbroadened since, its FW is still their strongest product.

    Overview

    A strong product with most advanced features, includingcompetitive ones, such as WiFi Network Control and WAN

    routing, and now optimization. Dedicated threat and product research teams ensure

    capabilities and protection always on the leading edge. The products attractive interface also gives users the ability to

    customize it through widgets.

    Strengths

    The use of dedicated FortiASIC processors drives highperformance today, but may limit flexibility tomorrow as itrequires the company to invest in hardware R&D as well asfunctionality R&D.

    As markets consolidate, the question exists whether Fortinet islarge enough to maintain viability and fend off acquisitionadvances.

    Challenges

    FortiGate1600+Sunnyvale, CAFortinet.com2000NASDAQ: FTNTFY11 Revenue: $434M

    Pricing solicited from public sources

    3 year TCO for this solution falls into pricingtier 6, between $50,000 and $100,000

    http://www.fortinet.com/http://www.fortinet.com/http://www.fortinet.com/
  • 7/30/2019 It Next Gen Firewall

    18/51

    18Info-Tech Research Group

    Fortinet

    Features

    Info-Tech Recommends:

    Fortinet remains a strong vendor and solution in the security space, all with an affordable price.

    Vendor Landscape

    Fortigate 20 to 110/111C: Ideal for small, branch or mid-sized enterprises. Specs: IPS throughput ranges from 20 to 450Mbps, antivirus throughput(proxy) starts at 12 and reaches 65Mbps.

    Fortigate 300C to 1240B: Well-suited for mid-sized to large enterprises.

    Specs: IPS throughput ranges from 1.4Gbps, the antivirus throughput(proxy) ranges from 200Mbps to 1.2Gbps.

    Fortigate 3040B to 5000-series: Ideal for large enterprises. Specs: IPS throughput starts at 6Gbps and ends at 9.4Gbps, antivirusthroughput (proxy) starts at 2.3Gbps, ending at 2.0Gbps.

    Fortinet NGFW Models

    Product Vendor

    Feat. Use. Afford. Via. Strat. Chan.ReachArch. OverallOverall

    1001stout of 10

    Value Index

    Identity DLP Web AppsNAC WiFi WAN Encryption

  • 7/30/2019 It Next Gen Firewall

    19/51

    19Info-Tech Research Group

    Product:Employees:

    Headquarters:Website:

    Founded:Presence:

    Barracuda NG Firewall1000Campbell, CABarracuda.com2003Private

    Barracuda offers flexible deployment options andsolid support

    Champion

    Barracuda built its business on low-cost, high function spamand malware firewalls, and has continued to grow its portfolio.

    It entered the NGFW market via its 2009 acquisition of Phion.

    Overview

    NGFW offers flexibility of hardware, software, and virtualappliance deployment methods, and is integrated well into the

    broad Barracuda product line. Unique 100% historical revision auditing system allows clients

    to easily roll back to previous configuration versions, shoulderrors or mis-configurations be detected.

    Strengths

    Based on the pricing acquired during this evaluation, Barracudawas one of the more expensive options.

    Barracuda is missing encrypted data control, which wouldfurther strengthen its ability to protect the network. Barracudaindicated that they are working on closing this gap in the nearfuture.

    Challenges

    $1 $1M+

    3 year TCO for this solution falls into pricingtier 7, between $100,000 and $250,000

    Pricing provided by vendor

    https://www.barracudanetworks.com/https://www.barracudanetworks.com/
  • 7/30/2019 It Next Gen Firewall

    20/51

    20Info-Tech Research Group

    Barracuda

    Identity DLP Web AppsNAC

    Features

    Info-Tech Recommends:

    Barracuda has most advanced features and is highly comprehensive. For enterprises where cost isnt a

    concern, Barracuda would be an ideal vendor as theyre also backed up by strong support offerings.

    WiFi WAN Encryption

    Vendor Landscape

    F300-600: Ideal for small to mid-sized organizations. Specs: Ranging from 160 to 950Mbps for VPN throughput, and 84 to3100Mbps IPS throughput.

    F800-900: Suits large enterprises. Specs: Ranging from 2200 to 3780Mbps VPN throughput, and 3100 to4650Mbps IPS throughput.

    Each Barracuda model is managed by the same console, making them not onlyscalable but easily integrated.

    Barracuda NGFW Models

    Product Vendor

    Feat. Use. Afford. Via. Strat. Chan.ReachArch. OverallOverall

    276th out of 10

    Value Index

  • 7/30/2019 It Next Gen Firewall

    21/51

    21Info-Tech Research Group

    Product:Employees:

    Headquarters:Website:

    Founded:Presence:

    Endpoint Security & DataProtection1,200+

    Abingdon, UKSophos.com1985Privately Held

    WatchGuard needs to improve advanced featureofferings to remain competitive as a NGFW

    Champion

    $1 $1M+

    WatchGuard strongly, though no longer exclusively, focuses onthe firewalling needs of the SMB space. The company is strong,and the products able.

    Overview

    XTM Series line comprised of four license key upgradeablemodels; when requirements outgrow capabilities, a rip-and-

    replace upgrade is completey avoided. Company earns top strategy marks by focusing exclusively on

    the edge protection market and primarily on the needs of smallto mid-sized businesses.

    Excellent usability owing to a clean and easy-to-navigateinterface.

    Strengths

    A feature set that is good, but not great (no DLP, NAC, or fullWiFi network management) may limit the appeal for businessesseeking comprehensively consolidated solutions.

    On-going market consolidation may exert considerable pressureon WatchGuard as competition gets deeper pockets andleveraged sales opportunities.

    Challenges

    XTM Series400+Seattle, WAWatchGuard.com1996Private

    3 year TCO for this solution falls into pricingtier 6, between $50,000 and $100,000

    Pricing provided by vendor

    http://www.watchguard.com/http://www.watchguard.com/http://www.watchguard.com/
  • 7/30/2019 It Next Gen Firewall

    22/51

    22Info-Tech Research Group

    WatchGuard

    Features

    Info-Tech Recommends:

    WatchGuard offers a significant range of models for its NGFWs, reaching small to large businesses.However, its feature set puts it behind other vendors solutions.

    Vendor Landscape

    XTM 3 and XTM 5 Series: Ideal for small to mid-sized organizations. Specs: VPN throughput 100Mbps to 750Mbps, IPS throughput 238Mbps to1.9Gbps. UTM throughput 100Mbps to 1.2Gbps.

    XTM 5 and XTM 8 Series: Suited to mid-size to large enterprises. Specs: VPN throughput 210Mbps to 1.7Gbps, IPS throughput 500Mbps to2.7Gbps, UTM throughput 275Mbps to 1.4Gbps.

    WatchGuard also features devices for high-performance, enterprise-classrequirements: XTM 1050 and 2050.

    WatchGuard NGFW Models

    Product Vendor

    Feat. Use. Afford. Via. Strat. Chan.ReachArch. OverallOverall

    Identity DLP Web AppsNAC WiFi WAN Encryption

    972nd out of 10

    Value Index

  • 7/30/2019 It Next Gen Firewall

    23/51

    23Info-Tech Research Group

    Product:Employees:

    Headquarters:Website:

    Founded:Presence:

    Endpoint Security & DataProtection1,200+

    Abingdon, UKSophos.com1985Privately Held

    SonicWALL offers a robust solution for a good price

    Champion

    $1 $1M+

    SonicWALL offers a broad range of network security productsand services, for enterprises of all sizes (although core focuscontinues to be SMB).

    Overview

    SonicWALLs Cavium multi-core processor architecture offersmassively parallel processing allowing for proxy and

    reassembly-free, packet-by-packet Deep Packet inspection. The company is a market leader in its target SMB market (and

    is growing in the enterprise) and is likely to be around for thelong-haul.

    Strengths

    The use of specialized processors means no software-onlyproducts exist, and raises questions of how functional theforthcoming virtual appliances will be.

    SonicWALL writes its own signatures for its detection engines,this gives them notable control and flexibility, but may impederesponse rates compared to syndicated feeds.

    Challenges

    Network Security Appliance900+San Jose, CASonicWALL.com1991Private

    Pricing provided by vendor

    3 year TCO for this solution falls into pricingtier 6, between $50,000 and $100,000

    http://www.sonicwall.com/us/en/http://www.sonicwall.com/us/en/http://www.sonicwall.com/us/en/
  • 7/30/2019 It Next Gen Firewall

    24/51

    24Info-Tech Research Group

    SonicWALL

    Features

    Info-Tech Recommends:

    SonicWALL has one of the best feature sets amongst the solutions evaluated; in addition to anaffordable price which will be of interest to mid-market organizations.

    Vendor Landscape

    TZ-Series (100-215): Ideal for small businesses. Specs: UTM performance 25 to 50Mbps. IP throughput 50 to 110Mbps.VPN throughput is 75Mbps across all models.

    NSA Series (220-4500): Best suited for mid-sized to large enterprises. Specs: IP throughput 195Mbps to 1.4Gbps, VPN throughput is 150Mbps to1.0Gbps.

    SonicWALL NGFW Models

    Product Vendor

    Feat. Use. Afford. Via. Strat. Chan.ReachArch. OverallOverall

    914th out of 10

    Value Index

    Identity DLP Web AppsNAC WiFi WAN Encryption

  • 7/30/2019 It Next Gen Firewall

    25/51

    25Info-Tech Research Group

    Product:Employees:

    Headquarters:Website:

    Founded:Presence:

    Endpoint Security & DataProtection1,200+

    Abingdon, UKSophos.com1985Privately Held

    McAfee continues to perform at a high-level with itsNGFW product

    Market Pil lar

    $1 $1M+

    Now a wholly-owned division of Intel, McAfee is the worldslargest dedicated security solutions provider. It entered thefirewall market via its 2008 acquisition of Secure Computing.

    Overview

    Viability, reach, and channel capabilities that are second to nonemake this a vendor that enterprises can trust if theyre looking

    for a long-term relationship with a vendor. Management console integrates with ePolicy Orchestrator

    (ePO), McAfees holistic management platform. This allows formanagement of the entire McAfee stack via a single console.

    Strengths

    Third-party integration (i.e. CrossBeam) indicate that companyfocus is on the large enterprise, not SMB, client.

    McAfee is missing some key advanced features, such as DLPand NAC, which smaller competitors have surpassed them on.

    Challenges

    Firewall Enterprise6839Santa Clara, CAMcAfee.com1987NASDAQ: INTCFY10: $2.1B

    The vendor declined to provide pricing, andpublicly available pricing could not be found

    http://www.mcafee.com/us/http://www.mcafee.com/us/http://www.mcafee.com/us/
  • 7/30/2019 It Next Gen Firewall

    26/51

    26Info-Tech Research Group

    McAfee

    Features

    Info-Tech Recommends:

    McAfee continues to be a key vendor for mid-sized organizations looking for that all-in-one managementplatform capability and a stable vendor.

    Vendor Landscape

    S1104 to S3008: Suited for small to mid-sized organizations. Specs: Threat prevention ranges from 250Mbps to 2.0Gbps. IPSec VPNranges from 60 to 350Mbps.

    S4016 to S7032-X: Ideal for mid-sized, primarily large enterprises. Specs: Threat prevention ranges from 3.0 to 5.0Gbps. IPSec VPN rangesfrom 400 to 450 (7032-X) to 500Mbps (6032).

    McAfee NGFW Models

    Product Vendor

    Feat. Use. Afford. Via. Strat. Chan.ReachArch. OverallOverall

    Identity DLP Web AppsNAC WiFi WAN Encryption

    N/AValue Index

    The vendor declined to provide pricing,and publicly available pricing could not be

    found

  • 7/30/2019 It Next Gen Firewall

    27/51

    27Info-Tech Research Group

    Product:Employees:

    Headquarters:Website:

    Founded:Presence:

    Endpoint Security & DataProtection1,200+

    Abingdon, UKSophos.com1985Privately Held

    Juniper is the only vendor with all advanced features,serving as a warning to others to catch up

    Innovator

    $1 $1M+

    Juniper is a high performance networking and securitycompany. The acquisition of NetScreen in 2004 formed thebasis of its enterprise firewall capabilities, one segment of itsmarket-leading security portfolio.

    Overview

    Junipers built-from-the-ground-up JUNOS operating system isused across all product lines, resulting in easily integrated

    products, each with consistency of performance andconsistency of management for Juniper shops.

    AppSecure portfolio of interlinked capabilities (AppTrack,AppQoS, AppFW, and AppDoS) is one of the strongestapplication control solutions currently available.

    Juniper is also the only solution with all the advanced featuresin this evaluation.

    Strengths

    Deployment options effectively limited to hardware solutions;though virtual appliances exist, their functionality at this time is asubset of that offered by the dedicated hardware appliances.

    Challenges

    SRX9100+Sunnyvale, CAJuniper.net1996NYSE: JNPRFY11: $4.48B

    Pricing provided by vendor

    3 year TCO for this solution falls into pricingtier 7, between $100,000 and $250,000

    http://www.juniper.net/us/en/http://www.juniper.net/us/en/http://www.juniper.net/us/en/
  • 7/30/2019 It Next Gen Firewall

    28/51

  • 7/30/2019 It Next Gen Firewall

    29/51

    29Info-Tech Research Group

    Product:Employees:

    Headquarters:Website:

    Founded:Presence:

    Endpoint Security & DataProtection1,200+

    Abingdon, UKSophos.com1985Privately Held

    Lack of deployment options keeps Palo Alto from seeing fullNGFW potential

    Emerging Player

    $1 $1M+

    Founded by ex-Check Point and NetScreen executives andengineers, Palo Alto released its first appliances in 2007, andinstantly established itself as a leader in the NGFW revolution.

    Overview

    App-ID, Content-ID, User-ID are market-leading capabilities andhave forced other UTM vendors into catch-up mode on these

    next generation capabilities. Palo Alto scored high in terms of product usability for its clean

    and attractive administrator interface, a key component forusers looking for an easy-to-use solution.

    Strengths

    Products are extremely capable, but market penetration so far isvery low with the count of deployed devices in the thousands,rather than the hundreds of thousands for competitors.Definitely the smallest player evaluated.

    Hardware-only deployment options (though model line notoverly cluttered like many competitors) may limit applicability.

    Challenges

    PA Series420Santa Clara, CAPaloAltoNetworks.com2005Private

    The vendor declined to provide pricing, andpublicly available pricing could not be found

    http://www.paloaltonetworks.com/http://www.paloaltonetworks.com/http://www.paloaltonetworks.com/
  • 7/30/2019 It Next Gen Firewall

    30/51

    30Info-Tech Research Group

    Palo Alto

    Features

    Info-Tech Recommends:

    Palo Altos NGFW solution features leading capabilities, but the company lacks the clout and deployment

    options to attract SMB attention.

    Vendor Landscape

    PA-200: Ideal for small and branch offices. Specs: Threat prevention throughput is 50Mbps, IPSec VPN throughputequals 50Mbps as well.

    PA-500 to 2000 Series: Suited for medium-sized enterprises, large branches.

    Specs: 50 to 200Mbps for IPSec VPN throughput. 100 to 200Mbps threatprevention throughput.PA-4000 Series to 5000 Series: Suited for large enterprises, high performancestructures.

    Specs: 2 to 4Gbps for IPSec VPN throughput. 5 to 10Gbps (PA-5060) threatprevention throughput.

    Palo Alto NGFW Models

    Product Vendor

    Feat. Use. Afford. Via. Strat. Chan.ReachArch. OverallOverall

    Identity DLP Web AppsNAC WiFi WAN Encryption

    N/AValue Index

    The vendor declined to provide pricing,and publicly available pricing could not be

    found

  • 7/30/2019 It Next Gen Firewall

    31/51

    31Info-Tech Research Group

    Product:Employees:

    Headquarters:Website:

    Founded:Presence:

    Endpoint Security & DataProtection1,200+

    Abingdon, UKSophos.com1985Privately Held

    Without key advanced features, Ciscos solution loses strength

    Emerging Player

    $1 $1M+

    By virtue of leveraging its dominant networking market share,Cisco is one of the largest firewall vendors in the world.

    Overview

    As the largest vendor in the space, and indeed one of thelargest technology companies in the world, Ciscos viability is

    unparalleled. Partner and support networks are unmatched in terms of size

    and distribution. Strong application control capabilities. The product is able to

    granularly control app functions like Farmville, and behavior likeallowing Facebook but not video streaming through Facebook.

    Strengths

    Ciscos predominant focus, so security is definitively a non-corefocus.

    The solution is lacking some advanced features, such as DLPand WiFi Network Control, leaving it somewhat incomplete interms of protection.

    Challenges

    ASA 5500 Series65,223Location of HQCisco.com1984NASDAQ: CSCOFY11 Revenue: $43B

    The vendor declined to provide pricing, andpublicly available pricing could not be found

    http://www.cisco.com/http://www.cisco.com/http://www.cisco.com/
  • 7/30/2019 It Next Gen Firewall

    32/51

  • 7/30/2019 It Next Gen Firewall

    33/51

    33Info-Tech Research Group

    The Info-Tech Next Generat ion Firewal l Vendo r Sho rt l is t Toolis designed to

    generate a customized shortlist of vendors based on yourkey priorities.

    Identify leading candidates with theNGFWVendor ShortlistTool

    Overall Vendor vs. Product Weightings

    Individual product criteria weightings:Features

    UsabilityAffordabilityArchitecture

    Individual vendor criteria weightings:ViabilityStrategyReachChannel

    This tool offers the ability to modify:

    http://www.infotech.com/research/it-next-generation-firewall-vendor-shortlist-toolhttp://www.infotech.com/research/it-next-generation-firewall-vendor-shortlist-tool
  • 7/30/2019 It Next Gen Firewall

    34/51

    34Info-Tech Research Group

    Wireless and encrypted traffic can bypass the perimeter; protecting these

    entry methods is key.

    To protect against subversive traffic, network protection mustfirst be able to see it

    Why Scenar ios?

    In reviewing the products includedin each Vendor LandscapeTM ,certain use-cases come to theforefront. Whether those use-casesare defined by applicability in

    certain locations, relevance forcertain industries, or as strengths indelivering a specific capability, Info-Tech recognizes those use-casesas Scenarios, and calls attention tothem where they exist.

    32

    Protection from allinbound traffic1

    For an explanation of how Scenarios are determined, see Information Presentation Scenarios in the Appendix.

    Wifi & Encryption

    Encryption only

    WiFi only

    *

    *WatchGuard does not have full protection capabilities in WiFi and Encryption;however, it does have some abilities in terms these areas.

  • 7/30/2019 It Next Gen Firewall

    35/51

    35Info-Tech Research Group

    Cost-concerned users still want a high-quality product. The results come

    from evaluating price and features together.

    Price and performance remain key factors for SMBs

    Why Scenar ios?

    In reviewing the products includedin each Vendor LandscapeTM ,certain use-cases come to theforefront. Whether those use-casesare defined by applicability in

    certain locations, relevance forcertain industries, or as strengths indelivering a specific capability, Info-Tech recognizes those use-casesas Scenarios, and calls attention tothem where they exist.

    3

    1

    Balance BetweenCost & Capability2

    Exemplary Performers

    Viable Performers

    Adequate Performers

    For an explanation of how Scenarios are determined, see Information Presentation Scenarios in the Appendix.

  • 7/30/2019 It Next Gen Firewall

    36/51

    36Info-Tech Research Group

    Evaluating functionality and usability to find the top performing products,

    costs aside.

    The top of the line, sparing no expenses

    Why Scenar ios?

    In reviewing the products includedin each Vendor LandscapeTM ,certain use-cases come to theforefront. Whether those use-casesare defined by applicability in

    certain locations, relevance forcertain industries, or as strengths indelivering a specific capability, Info-Tech recognizes those use-casesas Scenarios, and calls attention tothem where they exist.

    Exemplary Performers

    Viable Performers

    Adequate Performers

    21

    Complete Protection3

    For an explanation of how Scenarios are determined, see Information Presentation Scenarios in the Appendix.

  • 7/30/2019 It Next Gen Firewall

    37/51

    37Info-Tech Research Group

    Appendix

    1. Vendor Landscape Methodology: Overview

    2. Vendor Landscape Methodology: Product Selection & Information Gathering

    3. Vendor Landscape Methodology: Scoring

    4. Vendor Landscape Methodology: Information Presentation

    5. Vendor Landscape Methodology: Fact Check & Publication

    6. Product Pricing Scenario

  • 7/30/2019 It Next Gen Firewall

    38/51

    38Info-Tech Research Group

    Vendor Landscape Methodology:Overview

    Info-Techs Vendor Landscapes are research materials that review a particular IT market space, evaluating the strengths and abilities of boththe products available in that space, as well as the vendors of those products. These materials are created by a team of dedicated analysts

    operating under the direction of a senior subject matter expert over a period of six weeks.

    Evaluations weigh selected vendors and their products (collectively solutions) on the following eight criteria to determine overall standing: Features: The presence of advanced and market-differentiating capabilities. Usability: The intuitiveness, power, and integrated nature of administrative consoles and client software components. Affordability: The three-year total cost of ownership of the solution. Architecture: The degree of integration with the vendors other tools, flexibility of deployment, and breadth of platform applicability. Viability: The stability of the company as measured by its history in the market, the size of its client base, and its financial performance. Strategy: The commitment to both the market-space, as well as to the various sized clients (small, mid-sized, and enterprise clients). Reach: The ability of the vendor to support its products on a global scale.

    Channel: The measure of the size of the vendors channel partner program, as well as any channel strengthening strategies.Evaluated solutions are plotted on a standard two by two matrix:

    Champions: Both the product and the vendor receive scores that are above the average score for the evaluated group. Innovators: The product receives a score that is above the average score for the evaluated group, but the vendor receives a score that is

    below the average score for the evaluated group. Market Pillars: The product receives a score that is below the average score for the evaluated group, but the vendor receives a score that

    is above the average score for the evaluated group. Emerging Players: Both the product and the vendor receive scores that are below the average score for the evaluated group.

    Info-Techs Vendor Landscapes are researched and produced according to a strictly adhered to process that includes the following steps:

    Vendor/product selection Information gathering Vendor/product scoring Information presentation Fact checking Publication

    This document outlines how each of these steps is conducted.

  • 7/30/2019 It Next Gen Firewall

    39/51

    39Info-Tech Research Group

    Vendor Landscape Methodology:Vendor/Product Selection & Information Gathering

    Info-Tech works closely with its client base to solicit guidance in terms of understanding the vendors with whom clients wish to work and theproducts that they wish evaluated; this demand pool forms the basis of the vendor selection process for Vendor Landscapes. Balancing this

    demand, Info-Tech also relies upon the deep subject matter expertise and market awareness of its Senior and Lead Research Analysts toensure that appropriate solutions are included in the evaluation. As an aspect of that expertise and awareness, Info-Techs analysts may, attheir discretion, determine the specific capabilities that are required of the products under evaluation, and include in the Vendor Landscapeonly those solutions that meet all specified requirements.

    Information on vendors and products is gathered in a number of ways via a number of channels.

    Initially, a request package is submitted to vendors to solicit information on a broad range of topics. The request package includes: A detailed survey. A pricing scenario (see Vendor Landscape Methodology: Price Evaluation and Pricing Scenario, below). A request for reference clients.

    A request for a briefing and, where applicable, guided product demonstration.

    These request packages are distributed approximately twelve weeks prior to the initiation of the actual research project to allow vendors ampletime to consolidate the required information and schedule appropriate resources.

    During the course of the research project, briefings and demonstrations are scheduled (generally for one hour each session, though more timeis scheduled as required) to allow the analyst team to discuss the information provided in the survey, validate vendor claims, and gain directexposure to the evaluated products. Additionally, an end-user survey is circulated to Info-Techs client base and vendor-supplied referenceaccounts are interviewed to solicit their feedback on their experiences with the evaluated solutions and with the vendors of those solutions.

    These materials are supplemented by a thorough review of all product briefs, technical manuals, and publicly available marketing materials

    about the product, as well as about the vendor itself.Refusal by a vendor to supply completed surveys or submit to participation in briefings and demonstrations does not eliminate a vendor frominclusion in the evaluation. Where analyst and client input has determined that a vendor belongs in a particular evaluation, it will be evaluatedas best as possible based on publicly available materials only. As these materials are not as comprehensive as a survey, briefing, anddemonstration, the possibility exists that the evaluation may not be as thorough or accurate. Since Info-Tech includes vendors regardless ofvendor participation, it is always in the vendors best interest to participate fully.

    All information is recorded and catalogued, as required, to facilitate scoring and for future reference.

  • 7/30/2019 It Next Gen Firewall

    40/51

    40Info-Tech Research Group

    Vendor Landscape Methodology:Scoring

    Once all information has been gathered and evaluated for all vendors and products, the analyst team moves to scoring. All scoring isperformed at the same time so as to ensure as much consistency as possible. Each criterion is scored on a ten point scale, though the manner

    of scoring for criteria differs slightly: Features is scored via Cumulative Scoring Affordability is scored via Scalar Scoring All other criteria are scored via Base5 Scoring

    In Cumulative Scoring, a single point is assigned to each evaluated feature that is regarded as being fully present, a half point to each featurethat is partially present or pending in an upcoming release, and zero points to features that are deemed to be absent. The assigned points aresummed and normalized to a value out of ten. For example, if a particular Vendor Landscape evaluates eight specific features in the FeatureCriteria, the summed score out of eight for each evaluated product would be multiplied by 1.25 to yield a value out of ten.

    In Scalar Scoring, a score of ten is assigned to the lowest cost solution, and a score of one is assigned to the highest cost solution. All other

    solutions are assigned a mathematically determined score based on their proximity to / distance from these two endpoints. For example, in anevaluation of three solutions, where the middle cost solution is closer to the low end of the pricing scale it will receive a higher score, andwhere it is closer to the high end of the pricing scale it will receive a lower score; depending on proximity to the high or low price it is entirelypossible that it could receive either ten points (if it is very close to the lowest price) or one point (if it is very close to the highest price). Wherepricing cannot be determined (vendor does not supply price and public sources do not exist), a score of 0 is automatically assigned.

    In Base5 scoring a number of sub-criteria are specified for each criterion (for example, Longevity, Market Presence, and Financials are sub-criteria of the Viability criterion), and each one is scored on the following scale:

    5 - The product/vendor is exemplary in this area (nothing could be done to improve the status).4 - The product/vendor is good in this area (small changes could be made that would move things to the next level).

    3 - The product/vendor is adequate in this area (small changes would make it good, more significant changes required to be exemplary).2 - The product/vendor is poor in this area (this is a notable weakness and significant work is required).1 - The product/vendor is terrible/fails in this area (this is a glaring oversight and a serious impediment to adoption).

    The assigned points are summed and normalized to a value out of ten as explained in Cumulative Scoring above.

    Scores out of ten, known as Raw scores, are transposed as-is into Info-Techs Vendor Landscape Shortlist Tool, which automaticallydetermines Vendor Landscape positioning (see Vendor Landscape Methodology: Information Presentation - Vendor Landscape, below),Criteria Score (see Vendor Landscape Methodology: Information Presentation - Criteria Score, below), and Value Index (see VendorLandscape Methodology: Information Presentation - Value Index, below).

  • 7/30/2019 It Next Gen Firewall

    41/51

    41Info-Tech Research Group

    Vendor Landscape Methodology:Information Presentation Vendor Landscape

    Info-Techs Vendor Landscape is a two-by-two matrix that plots solutions based on thecombination of Product score and Vendor score. Placement is not determined by

    absolute score, but instead by relative score. Relative scores are used to ensure aconsistent view of information and to minimize dispersion in nascent markets, whileenhancing dispersion in commodity markets to allow for quick visual analysis by clients.

    Relative scores are calculated as follows:

    1. Raw scores are transposed into the Info-Tech Vendor Landscape Shortlist Tool(for information on how Raw scores are determined, see Vendor LandscapeMethodology: Scoring, above).

    2. Each individual criterion Raw score is multiplied by the pre-assigned weightingfactor for the Vendor Landscape in question. Weighting factors are determined

    prior to the evaluation process to eliminate any possibility of bias. Weightingfactors are expressed as a percentage such that the sum of the weighting factorsfor the Vendor criteria (Viability, Strategy, Reach, Channel) is 100% and the sumof the Product criteria (Features, Usability, Affordability, Architecture) is 100%.

    3. A sum-product of the weighted Vendor criteria scores and of the weighted Productcriteria scores is calculated to yield an overall Vendor score and an overall Productscore.

    4. Overall Vendor scores are then normalized to a 20 point scale by calculating thearithmetic mean and standard deviation of the pool of Vendor scores. Vendors for

    whom their overall Vendor score is higher than the arithmetic mean will receive anormalized Vendor score of 11-20 (exact value determined by how much higherthan the arithmetic mean their overall Vendor score is), while vendors for whomtheir overall Vendor score is lower than the arithmetic mean will receive anormalized Vendor score of between one and ten (exact value determined by howmuch lower than the arithmetic mean their overall Vendor score is).

    5. Overall Product score is normalized to a 20 point scale according to the sameprocess.

    6. Normalized scores are plotted on the matrix, with Vendor score being used as thex-axis, and Product score being used as the y-axis.

    Vendor Landscape

    Champions:solutions with above

    average Vendorscores and aboveaverage Product

    scores.

    Innovators:solutions with below

    average Vendorscores and aboveaverage Product

    scores.

    Market Pillars:solutions with above

    average Vendorscores and belowaverage Product

    scores.

    Emerging Players:solutions with below

    average Vendorscores and belowaverage Product

    scores.

  • 7/30/2019 It Next Gen Firewall

    42/51

    42Info-Tech Research Group

    Harvey Balls

    Vendor Landscape Methodology:Information Presentation Criteria Scores (Harvey Balls)Info-Techs Criteria Scores are visual representations of the absolute score assigned to each individual criterion, as well as of the calculatedoverall Vendor and Product scores. The visual representation used is Harvey Balls.

    Harvey Balls are calculated as follows:1. Raw scores are transposed into the Info-Tech Vendor Landscape Shortlist Tool (for information on how Raw scores are determined, see

    Vendor Landscape Methodology: Scoring, above).

    2. Each individual criterion Raw score is multiplied by a pre-assigned weighting factor for the Vendor Landscape in question. Weightingfactors are determined prior to the evaluation process, based on the expertise of the Senior or Lead Research Analyst, to eliminate anypossibility of bias. Weighting factors are expressed as a percentage, such that the sum of the weighting factors for the Vendor criteria(Viability, Strategy, Reach, Channel) is 100%, and the sum of the Product criteria (Features, Usability, Affordability, Architecture) is100%.

    3. A sum-product of the weighted Vendor criteria scores and of the weighted Product criteria scores is calculated to yield an overall Vendorscore and an overall Product score.

    4. Both overall Vendor score / overall Product score, as well as individual criterion Raw scores are converted from a scale of one to ten toHarvey Ball scores on a scale of zero to four, where exceptional performance results in a score of four and poor performance results in ascore of zero.

    5. Harvey Ball scores are converted to Harvey Balls as follows: A score of four becomes a full Harvey Ball. A score of three becomes a three-quarter full Harvey Ball. A score of two becomes a half full Harvey Ball. A score of one becomes a one-quarter full Harvey Ball. A score of zero (zero) becomes an empty Harvey Ball.

    6. Harvey Balls are plotted by solution in a chart where rows represent individual solutions and columns represent overall Vendor / overallProduct, as well as individual criteria. Solutions are ordered in the chart alphabetically by vendor name.

    Product Vendor

    Feat. Use. Afford. Via. Strat. Chan.ReachArch. OverallOverall

    Overall HarveyBalls representweightedaggregates.

    Criteria HarveyBalls representindividual Raw

    scores.

  • 7/30/2019 It Next Gen Firewall

    43/51

    43Info-Tech Research Group

    Stop Lights

    Vendor Landscape Methodology:Information Presentation Feature Ranks (Stop Lights)

    Info-Techs Feature Ranks are visual representations of the presence/availability of individual features that collectively comprise the Featurescriterion. The visual representation used is Stop Lights.

    Stop Lights are determined as follows:

    1. A single point is assigned to each evaluated feature that is regarded as being fully present, a half point to each feature that is partiallypresent or pending in an upcoming release, and zero points to features that are deemed to be fully absent.

    Fully present means all aspects and capabilities of the feature as described are in evidence. Fully absent means all aspects and capabilities of the feature as described are in evidence. Partially present means some, but not all, aspects and capabilities of the feature as described are in evidence, OR all aspects and

    capabilities of the feature as described are in evidence, but only for some models in a line. Pending means all aspects and capabilities of the feature, as described, are anticipated to be in evidence in a future revision of the

    product and that revision is to be released within the next 12 months.

    2. Feature scores are converted to Stop Lights as follows: Full points become a Green light. Half points become a Yellow light. Zero points become a Red light.

    3. Stop Lights are plotted by solution in a chart where rows represent individual solutions and columns represent individual features.Solutions are ordered in the chart alphabetically by vendor name.

    For example, a set of applications is being reviewed and a feature of Integration with Mobile Devices that is defined as availability of

    dedicated mobile device applications for iOS, Android, and BlackBerry devices is specified. Solution A provides such apps for all listed

    platforms and scores Green, solution B provides apps foriOS and Android only and scores Yellow, while solution C provides mobile device

    functionality through browser extensions, has no dedicated apps, and so scores Red.

    Feature 1 Feature 2 Feature 4 Feature 5Feature 3

    Features

    Feature 6 Feature 7 Feature 8

    Yellow showspartial availability(such as in somemodels in a line).

    Green means afeature is fullypresent; Red,fully absent.

  • 7/30/2019 It Next Gen Firewall

    44/51

    44Info-Tech Research Group

    Value Index

    Vendor Landscape Methodology:Information Presentation Value Index

    Info-Techs Value Index is an indexed ranking of solution value per dollar as determinedby the Raw scores assigned to each criteria (for information on how Raw scores are

    determined, see Vendor Landscape Methodology: Scoring, above).

    Value scores are calculated as follows:

    1. The Affordability criterion is removed from the overall Product score and theremaining Product score criteria (Features, Usability, Architecture) are reweightedso as to retain the same weightings relative to one another, while still summing to100%. For example, if all four Product criteria were assigned base weightings of25%, for the determination of the Value score, Features, Usability, andArchitecture would be reweighted to 33.3% each to retain the same relativeweightings while still summing to 100%.

    2. A sum-product of the weighted Vendor criteria scores and of the reweightedProduct criteria scores is calculated to yield an overall Vendor score and areweighted overall Product score.

    3. The overall Vendor score and the reweighted overall Product score are thensummed, and this sum is multiplied by the Affordability Raw score to yield aninterim Value score for each solution.

    4. All interim Value scores are then indexed to the highest performing solution bydividing each interim Value score by the highest interim Value score. This resultsin a Value score of 100 for the top solution and an indexed Value score relative to

    the 100 for each alternate solution.5. Solutions are plotted according to Value score, with the highest score plotted first,

    and all remaining scores plotted in descending numerical order.

    Where pricing is not provided by the vendor and public sources of information cannot befound, an Affordability Raw score of zero is assigned. Since multiplication by zero resultsin a product of zero, those solutions for which pricing cannot be determined receive aValue score of zero. Since Info-Tech assigns a score of zero where pricing is notavailable, it is always in the vendors best interest to provide accurate and up to datepricing

    Those solutions that are ranked asChampions are differentiated for point of

    reference.

    E

    10

    D

    30

    C

    40

    B

    80

    A

    100Average Score: 52

    Vendors are arranged in order of Value Score.The Value Score each solution achieved is

    displayed, and so is the average score.

  • 7/30/2019 It Next Gen Firewall

    45/51

    45Info-Tech Research Group

    Vendor Landscape Methodology:Information Presentation Price Evaluation

    Info-Techs Price Evaluation is a tiered representation of the three year Total Cost ofOwnership (TCO) of a proposed solution. Info-Tech uses this method of communicating

    pricing information to provide high-level budgetary guidance to its end-user clients whilerespecting the privacy of the vendors with whom it works. The solution TCO is calculatedand then represented as belonging to one of ten pricing tiers.

    Pricing tiers are as follows:

    1. Between $1 and $2,500

    2. Between $2,500 and $5,000

    3. Between $5,000 and $10,000

    4. Between $10,000 and $25,000

    5. Between $25,000 and $50,0006. Between $50,000 and $100,000

    7. Between $100,000 and $250,000

    8. Between $250,000 and $500,000

    9. Between $500,000 and $1,000,000

    10. Greater than $1,000,000

    Where pricing is not provided, Info-Tech makes use of publicly available sources ofinformation to determine a price. As these sources are not official price lists, thepossibility exists that they may be inaccurate or outdated, and so the source of thepricing information is provided. Since Info-Tech publishes pricing information regardlessof vendor participation, it is always in the vendors best interest to supply accurate andup to date information.

    Info-Techs Price Evaluations are based on pre-defined pricing scenarios (see ProductPricing Scenario, below) to ensure a comparison that is as close as possible betweenevaluated solutions. Pricing scenarios describe a sample business and solicit guidanceas to the appropriate product/service mix required to deliver the specified functionality,the list price for those tools/services, as well as three full years of maintenance andsupport.

    Price Evaluation

    Call-out bubble indicates within which pricetier the three year TCO for the solution falls,provides the brackets of that price tier, and

    links to the graphical representation.

    Scale along the bottom indicates that thegraphic as a whole represents a price scale

    with a range of $1 to $1M+, while the notationindicates whether the pricing was supplied by

    the vendor or derived from public sources.

    3 year TCO for this solution falls into pricingtier 6, between $50,000 and $100,000.

    $1 $1M+

    Pricing solicited from public sources.

  • 7/30/2019 It Next Gen Firewall

    46/51

    46Info-Tech Research Group

    Vendor Landscape Methodology:Information Presentation Scenarios

    Info-Techs Scenarios highlight specific use cases for the evaluated solution to provide as complete (when taken in conjunction with theindividual written review, Vendor Landscape, Criteria Scores, Feature Ranks, and Value Index) a basis for comparison by end-user clients as

    possible.

    Scenarios are designed to reflect tiered capability in a particular set of circumstances. Determination of the Scenarios in question is at thediscretion of the analyst team assigned to the research project. Where possible, Scenarios are designed to be mutually exclusive andcollectively exhaustive, or at the very least, hierarchical such that the tiers within the Scenario represent a progressively greater or broadercapability.

    Scenario ranking is determined as follows:

    1. The analyst team determines an appropriate use case.For example:

    Clients that have multinational presence and require vendors to provide four hour onsite support.2. The analyst team establishes the various tiers of capability.For example: Presence in Americas Presence in EMEA Presence in APAC

    3. The analyst team reviews all evaluated solutions and determines which ones meet which tiers of capability.For example:

    Presence in Americas Vendor A, Vendor C, Vendor E Presence in EMEA Vendor A, Vendor B, Vendor C

    Presence in APAC Vendor B, Vendor D, Vendor E4. Solutions are plotted on a grid alphabetically by vendor by tier. Where one vendor is deemed to be stronger in a tier than other vendors in

    the same tier, they may be plotted non-alphabetically.For example:

    Vendor C is able to provide four hour onsite support to 12 countries in EMEA while Vendors A and B are only able to provide four houronsite support to eight countries in EMEA; Vendor C would be plotted first, followed by Vendor A, then Vendor B.

  • 7/30/2019 It Next Gen Firewall

    47/51

    47Info-Tech Research Group

    Vendor Landscape Methodology:Information Presentation Vendor Awards

    At the conclusion of all analyses, Info-Tech presents awards to exceptional solutions inthree distinct categories. Award presentation is discretionary; not all awards are

    extended subsequent to each Vendor landscape and it is entirely possible, thoughunlikely, that no awards may be presented.

    Awards categories are as follows:

    Champion Awards are presented to those solutions, and only those solutions, thatland in the Champion zone of the Info-Tech Vendor Landscape (see VendorLandscape Methodology: Information Presentation - Vendor Landscape, above). Ifno solutions land in the Champion zone, no Champion Awards are presented.Similarly, if multiple solutions land in the Champion zone, multiple Champion Awardsare presented.

    Trend Setter Awards are presented to those solutions, and only those solutions,that are deemed to include the most original/inventive product/service, or the mostoriginal/inventive feature/capability of a product/service. If no solution is deemed tobe markedly or sufficiently original/inventive, either as a product/service on thewhole or by feature/capability specifically, no Trend Setter Award is presented. Onlyone Trend Setter Award is available for each Vendor Landscape.

    Best Overall Value Awards are presented to those solutions, and only thosesolutions, that are ranked highest on the Info-Tech Value Index (see VendorLandscape Methodology: Information Presentation Value Index, above). If

    insufficient pricing information is made available for the evaluated solutions, suchthat a Value Index cannot be calculated, no Best Overall Value Award will bepresented. Only one Best Overall Value Award is available for each VendorLandscape.

    Vendor Awards

    Info-Techs ChampionAward is presented tosolutions in the Championzone of the VendorLandscape.

    Info-Techs Trend SetterAward is presented to themost original/inventivesolution evaluated.

    Info-Techs Best OverallValue Award ispresented to the solutionwith the highest ValueIndex score.

    d d h d l

  • 7/30/2019 It Next Gen Firewall

    48/51

    48Info-Tech Research Group

    Vendor Landscape Methodology:Fact Check & Publication

    Info-Tech takes the factual accuracy of its Vendor Landscapes, and indeed of all of its published content, very seriously. To ensure the utmostaccuracy in its Vendor Landscapes, we invite all vendors of evaluated solutions (whether the vendor elected to provide a survey and/or

    participate in a briefing or not) to participate in a process of Fact Check.

    Once the research project is complete and the materials are deemed to be in a publication ready state, excerpts of the material specific to eachvendors solution are provided to the vendor. Info-Tech only provides material specific to the individual vendors solution forreviewencompassing the following:

    All written review materials of the vendor and the vendors product that comprise the evaluated solution. Info-Techs Criteria Scores / Harvey Balls detailing the individual and overall Vendor / Product scores assigned. Info-Techs Feature Rank / Stop Lights detailing the individual feature scores of the evaluated product. Info-Techs Value Index ranking for the evaluated solution. Info-Techs Scenario ranking for all considered scenarios for the evaluated solution.

    Info-Tech does not provide the following: Info-Techs Vendor Landscape placement of the evaluated solution. Info-Techs Value Score for the evaluated solution. End-user feedback gathered during the research project. Info-Techs overall recommendation in regard to the evaluated solution.

    Info-Tech provides a one-week window for each vendor to provide written feedback. Feedback must be corroborated (be provided withsupporting evidence), and where it does, feedback that addresses factual errors or omissions is adopted fully, while feedback that addressesopinions is taken under consideration. The assigned analyst team makes all appropriate edits and supplies an edited copy of the materials tothe vendor within one week for final review.

    Should a vendor still have concerns or objections at that time, they are invited to a conversation, initially via email, but as required and deemedappropriate by Info-Tech, subsequently via telephone, to ensure common understanding of the concerns. Where concerns relate to ongoingfactual errors or omissions they are corrected under the supervision of Info-Techs Vendor Relations personnel. Where concerns relate toongoing differences of opinion they are again taken under consideration with neither explicit not implicit indication of adoption.

    Publication of materials is scheduled to occur within the six weeks immediately following the completion of the research project, but does notoccur until the Fact Check process has come to conclusion, and under no circumstances are pre-publication copies of any materials madeavailable to any client.

  • 7/30/2019 It Next Gen Firewall

    49/51

    49Info-Tech Research Group

    Product Pricing Scenario

    A mid-level clothing manufacturer/retailer with corporate offices on the US west coast, east coast, and Ireland and 2200 global employees islooking to implement a centrally managed endpoint encryption solution. The firm is interested in providing complete and comprehensive

    coverage for all types of mobile devices, as well as coverage for select non-mobile endpoints.

    The corporate office breakdown is as follows:

    US West Coast (Head Office)Employing 1600 people (70% of total staff), the west coast office holds Sales, Finance, Strategy, Marketing, Buyers, and the majority of IT. TheIT staff here consists of 45 employees, three of which are dedicated security professionals consisting of one Security Manager and twoSecurity Analysts.

    US East Coast (Satellite)Employing 200 people (10% of total staff), the east coast office holds solely a Marketing department.

    Ireland (Satellite)Employing 400 people (20% of total staff), the Ireland office employs Buyers and Manufacturing and also a DR facility. Manufacturing consistsof 300 employees. The companys remaining five IT staff are located here, though none have dedicated security responsibilities.

    The expected solution capabilities are as follows:

    The organization described is interested in minimizing its security footprint through consolidation of solutions and reduction of the number ofsecurity partners with which it works. It has recently consolidated endpoint protection via a comprehensive endpoint protection solution andwishes to consolidate network perimeter protection as much as possible.

    The deployed UTM/NGFW solutions will ideally be managed fully centrally by 1 of the IT Security staff at the head off ice with the ability totransfer management to the Ireland facility in the event of a severe outage.

  • 7/30/2019 It Next Gen Firewall

    50/51

  • 7/30/2019 It Next Gen Firewall

    51/51

    Product Pricing Scenario, continued

    VL Specific Infrastructure

    Security Infrastructure

    Spam protection is handled by a cloud-based service

    Endpoint anti-malware (anti-virus, anti-spyware, etc.), encryption, and DLP via a consolidated anti-malware suite

    Perimeter protection provided by single function firewalls, to be replaced

    VPN capabilities provided by single function VPN appliances, to be replaced

    No IPS, Content Filtering, Network Access Control, or network Data Leakage Protection in place, but all are desired.

    Breadth of coverage / duration of deployment

    The organization is interested in providing comprehensive and fully redundant protection (redundant devices) for its west coast officeand Ireland office, and semi-redundant protection (redundant components) for its east coast office. Please specify appropriate number

    and type of devices and software license (including management consoles) that would offer this breadth of coverage or, where products

    are not available to address specific protection capabilities, indicate which protection capabilities are available and which are not.

    Functionality above and beyond the baseline established above (firewall with application control capabilities, IPS, IPSEC and SSL VPN,NAC, DLP, gateway Anti-Malware) should be separately specified and priced.

    The organization wishes to enter into an agreement that provides for three full years of protection, including licensing, support, andmaintenance and pricing should reflect that term.

    Because the organization operates on a 7/24 hour day (due to a self-hosted website and webstore) it requires support availability overextended hours; any quoted support must be sufficient and appropriate to reflect those operational hours.