Skip Navigation

Home Page
Market Research Reports

Analyst Letter & Report Highlights


Dear Colleague:

If you're puzzled about the kinds of cyber solutions your enterprise needs, you're not alone.

Market confusion abounds today over what constitutes a truly "advanced cyber security system", especially for enterprises with large scale, always-on networks.

It's mainly a can't-tell-the-forest-from-the-trees problem. Security users -- even savvy systems integrators -- look at the cyber security solutions market and see a bewildering array of products that are seemly disconnected with one another.

Of course, a key reason you're befuddled is that cyber defense constantly evolves to meet new threats.   And because cyber criminals are ever-elusive and adaptive, cyber defense systems must also adapt and absorb new functions and solutions.

Almost by definition, then, cyber security is a highly dynamic marketplace -- the polar opposite of a mature market like enterprise CRM where an Oracle or SAP can stake out a magic quadrant position and dominate.

Leadership in the cyber security solutions business is a far more fickle thing. 

For example, the most dangerous cyber threat today is the botnet-based attack that spawns Denial of Service (DoS), data theft, and malicious spam.   But where were botnets three years ago?  They were relatively unknown -- which means a lot of recently purchased security solutions are in place that weren't designed with botnets in mind.

Untangling Cyber Security Solutions for Large Enterprises

Hello, this is Dan Baker, Research Director of TRI, and I'm pleased to say that our new 188-page research report delivers the kind of in-depth analysis on cyber security technology and vendor players that's been missing up to now.

Four months of research in the making, our new study, Advanced Network Security Solutions for the Large Enterprise, shows how you and your company can find the best the solutions, understand how the diverse solutions fit together into a full security system, and -- if you're a solution vendor -- avoid excursions into solution areas that are either too competitive or too  specialized to attract enough large enterprise security clients.

The premise of our research was to scan the horizon for innovation and talk to key solution vendors large and small who serve many clients and are pioneering the newest technologies and techniques.

As you'd expect, we covered the big solution categories such as Security Information and Event Management, (SIEM), and Intrusion Prevention Systems, (IPS).  But, in search of the latest advances, we spent equal time looking at not-so-mainstream solution categories such as Security Posture Management, Network Behavioral Analysis, Data Capture and Replay, Data Loss Prevention, Denial of Service Mitigation, and other product categories.

For our product analysis, we held conversations with 16 leading cyber security solution firms and we've analyzed those companies and their solutions in detailed profiles that average 7 pages of analysis per company.

Highlights of the Study

Here are some highlights from our research study:

The Report's Value to Your Organization

The trends just discussed are a just a few highlights of the analysis shown in our full Report. 

Whether you're a security or IT executive aiming to improve your security revenue management or a supplier delivering solutions, the Report will help you discover:

Besides its sweeping coverage of security solution trends, the Report provides quantitative data on the individual vendor companies, the size of industry segments, and 3-year forecasts. The quantitative data is presented in Excel sheets with pivot tables to let you view the market segments you're interested in.

Please scan the full table of contents and descriptive web pages here. You'll see why this report delivers the tactical and strategic information you need to fully understand where advanced network security solutions for large enterprises are headed.
To access this market intelligence today, contact us at +1-570-620-2320.


Dan Baker
Report Author & Research Director, TRI