Category: Gartner
Market Guide for Network Detection and Response
Market Guide for Network Detection and Response
Published 11 June 2020 – ID G00718877 – 23 min read
Network detection and response (formerly known as network traffic analysis) vendors are adding more automated and manual response features to their solutions. Here, we provide an overview of the market and highlight some of the key vendors to be considered by security and risk management leaders.
Overview
Key Findings
- Applying machine learning and other analytical techniques to network traffic is helping enterprises detect suspicious traffic that other security tools are missing.
- Network detection and response (NDR) remains a crowded market with a low barrier to entry, as many vendors can apply common analytical techniques to traffic monitored from a SPAN port. Customer references, from a broad set of vendors, are generally satisfied with their tools.
- Response capabilities fall into two categories: manual and automatic. Vendors have been actively enhancing their manual (threat hunting and incident response) features, and have been adding partners to broaden their automatic response functionality.
Recommendations
To improve infrastructure security and the detection of suspicious network traffic, security and risk management leaders should:
- Implement behavioral-based NDR tools to complement signature-based detection solutions.
- Include NDR-as-a-feature solutions in their evaluations, if they are available from their current security information and event management (SIEM), firewall or other security vendors.
- Decide early on in the evaluation process if they desire automated response versus manual response capabilities. A clearly defined response strategy is valuable in selecting a shortlist of NDR vendors.
Market Definition
NDR solutions primarily use non-signature-based techniques (for example, machine learning or other analytical techniques) to detect suspicious traffic on enterprise networks. NDR tools continuously analyze raw traffic and/or flow records (for example, NetFlow) to build models that reflect normal network behavior. When the NDR tools detect suspicious traffic patterns, they raise alerts. In addition to monitoring north/south traffic that crosses the enterprise perimeter, NDR solutions can also monitor east/west communications by analyzing traffic from strategically placed network sensors.Response is also an important function of NDR solutions. Automatic responses (for example, sending commands to a firewall so that it drops suspicious traffic) or manual responses (for example, providing threat hunting and incident response tools) are common elements of NDR tools. In 2019, Gartner named this market “network traffic analysis.” This year, we renamed it “network detection and response,” because this term more accurately reflects the functionality of these solutions.
Market Description
Dozens of vendors claim to analyze network traffic (or flow records) and to detect suspicious activity on the network. We have applied the following criteria to identify the most relevant vendors.Inclusion CriteriaVendors must:
- Analyze raw network packet traffic or traffic flows (for example, NetFlow records) in real time or near real time.
- Monitor and analyze north/south traffic (as it crosses the perimeter), as well as east/west traffic (as it moves laterally throughout the network).
- Be able to model normal network traffic and highlight suspicious traffic that falls outside the normal range.
- Offer behavioral techniques (non-signature-based detection), such as machine learning or advanced analytics that detect network anomalies.
- Provide automatic or manual response capabilities to react to the detection of suspicious network traffic.
Exclusion CriteriaWe exclude solutions that:
- Require a prerequisite component — for example, those that require a SIEM or firewall platform.
- Emphasize network forensics over detection functionality, primarily through the storage and analysis of full PCAP data.
- Work primarily on log analysis.
- Are based primarily on analytics of user session activity — for example, user and entity behavior analytics (UEBA) technology.
- Focus primarily on analyzing traffic in Internet of Things (IoT) or operational technology (OT) environments, because specialized solutions are optimized to address this use case.
Market Direction
Vendors are focused on enhancing their detection and response capabilities. For detection, we expect vendors to continue enhancing their ability to detect suspicious patterns in encrypted traffic. Some vendors will add the ability to terminate, decrypt and analyze TLS traffic natively in their sensors. However, most vendors, particularly the ones with out-of-band sensors, will enhance their ability to detect suspicious traffic without decrypting the TLS traffic and inspecting the payload. Some vendors detect suspicious SSL/TLS Server Certificates for this purpose. Also, some vendors use techniques such as analyzing the length of individual packets, the timing between packets, the duration of connections and other methods to detect suspicious TLS traffic. We expect that more vendors will enhance their solutions with similar functionality.Vendors will also be enhancing their response capabilities. For automated responses, they will broaden partnerships with firewall vendors (send commands to firewalls to drop suspicious traffic), network access control vendors (send commands to the network access control [NAC] solution to isolate an endpoint), security operations automation response (SOAR) vendors (respond to events with playbooks), endpoint detection and response (EDR) vendors (to contain compromised endpoints) and other security vendors. For manual response, vendors will improve their threat hunting and incident response functions by improving workflow features (for example, helping incident responders prioritize which security events they need to respond to first).
Market Analysis
Here, we analyze the segments of the NDR market:
- Pure-play NDR companies. The vendors in this category are mostly smaller specialty companies whose only product is an NDR solution.
- Network-centric companies: Several companies that have historically targeted network use cases, such as network performance monitoring and diagnostics (NPMD; see “Market Guide for Network Performance Monitoring and Diagnostics”), have developed solutions to address security use cases. These network-centric solutions were already monitoring network traffic, and these vendors have applied analytical techniques, such as machine learning, to detect anomalous traffic.
- Others. A few vendors do not fit cleanly in the two categories defined above. For example, large, diversified network security providers, such as Cisco and Hillstone Networks, also offer NDR solutions. Cisco has Stealthwatch, and Hillstone has the Server Breach Detection System.
Representative Vendors
Market Introduction
Table 1 highlights the NDR vendors that meet our inclusion criteria and were not eliminated by our exclusion criteria.
Table 1: Representative Vendors in Network Detection and Response
Enlarge Table
Vendor | Product, Service or Solution Name |
---|---|
Awake Security | Awake Security Platform |
Blue Hexagon | Blue Hexagon |
Bricata | Bricata |
Cisco | Stealthwatch |
Corelight | Corelight Sensors |
Darktrace | Enterprise Immune System |
ExtraHop | Reveal(x) |
Fidelis Cybersecurity | Fidelis Elevate |
FireEye | SmartVision |
Flowmon | Flowmon Anomaly Detection System (ADS) |
Gigamon | ThreatINSIGHT |
GREYCORTEX | MENDEL |
Hillstone Networks | Server Breach Detection System (sBDS) |
IronNet | IronDefense |
Lastline | Lastline Defender |
Plixer | Scrutinizer |
Vectra | Cognito Detect |
Source: Gartner (June 2020)Please refer to Note 2 for a list of other vendors that we are tracking.The vendors listed in this Market Guide do not imply an exhaustive list. This section is intended to provide more understanding of the market and its offerings.
Vendor Profiles
Awake Security
Based in Santa Clara, California, Awake Security uses supervised machine learning, unsupervised machine learning and some deep learning techniques to detect suspicious traffic. Awake does not decrypt TLS traffic. It also does not use JA3 signatures, but Awake has developed its own application/TLS fingerprinting algorithms. It also uses encrypted traffic analysis techniques. For example, it can identify attempts to tunnel malicious traffic over DNS and other protocols.Awake’s solution includes manual and automatic response capabilities. Its Ava tool performs automated threat hunting, incident triage and response. Awake partners with multiple firewall vendors, orchestration tools and other solutions to enforce automated responses. Awake sells the solution as an annual subscription, based on aggregate throughput. Virtual appliances are available at no charge, and physical devices are available for a fee. Customers can deploy Awake in two modes. With the first option, no customer sensitive data ever leaves the customer’s environment. With the second option, customers deploy the central analytics and management in an Awake hosted cloud. In this scenario, each customer’s data is isolated and can only be accessed by the customer that owns the data. Awake also offers a managed network detection and response service built on the technology platform.
Blue Hexagon
Blue Hexagon is based in Sunnyvale, California. It launched its network and IaaS (Amazon Web Services [AWS] and Microsoft Azure) network detection solution in 2019, with a cloud management console. The vendor serves the U.S. market and plans expansion internationally in 2020. Blue Hexagon’s detection engine inspects network traffic and files, and is based on deep learning to detect threats. The solution cannot decrypt TLS. It relies on TLS handshake and tunnel characteristics to detect anomalies on encrypted traffic, using its deep learning models. The vendor uses threat intelligence feeds, but also uses deep learning to classify sources as malicious.Blue Hexagon can be deployed in-line and out-of-band. When deployed out-of-band, it integrates with endpoint security and firewall solutions, as well as SIEM, SOAR and AWS/Azure to provide automated response. When deployed in-line (“bump in the wire” or through ICAP), it can directly block traffic. Licensing for Blue Hexagon follows a traditional network security approach, with hardware purchase (virtual appliance is free of charge) and licensing based on required bandwidth, which includes vendor support. IaaS pricing can be bandwidth-based or per hour.
Bricata
Headquartered in Columbia, Maryland, Bricata is a network security vendor primarily targeting the U.S. and European markets. The vendor’s solution leverages the Suricata IDPS module for signature-based controls and the Zeek (formerly Bro) engine for protocol and behavioral analysis, while capturing full-packet traffic data for retrospective analysis. Bricata is a highly customizable solution, where users can tune detections and create specialized detections. Bricata also includes the Cylance Infinity engine for file analysis. The network sensors and centralized management are available in physical and virtual appliances. They can also be deployed on the main IaaS platforms. The sensors do not decrypt TLS traffic, and rely on JA3 fingerprinting to provide encrypted session analysis. The vendor recently released the ability to tag alerts based on the MITRE ATT&CK framework, to aggregate similar events in the dashboard, and to run files in the Cuckoo Sandbox.The vendor’s response capabilities rely on SIEM and SOAR integration, and API documentation is available to create custom response scenarios with firewall, NAC and other products. Bricata’s software pricing is based on aggregated bandwidth of inspected traffic. Customers can also purchase hardware appliances through Bricata’s channel partners.
Cisco
Cisco, based in San Jose, California, offers two deployment options for its Stealthwatch solution. Stealthwatch Enterprise collects, stores and analyzes information in the customer’s environment. Stealthwatch Cloud is a SaaS offering. It can monitor a customer’s private network or a public cloud environment (through integrations with AWS, Azure or Google Cloud Platform). Stealthwatch detects suspicious traffic primarily by analyzing NetFlow, IPFIX or sFlow records. Stealthwatch uses multiple analytical techniques to detect suspicious traffic, including supervised machine learning, unsupervised machine learning and some deep learning algorithms. The solution does not decrypt TLS traffic. Stealthwatch uses Cisco’s Encrypted Traffic Analysis (ETA) functionality to analyze TLS traffic without decrypting it.Stealthwatch provides historical information to enable a security analyst to manually respond to incidents. It also enables automated responses through integration with Cisco’s Identity Services Engine (ISE). Stealthwatch alarms and events can be shared with Cisco’s SecureX platform, where responses can be automated via SecureX playbooks. Stealthwatch is sold as a subscription based on the necessary flows per second, network device count or total monthly flows.
Corelight
Corelight is headquartered in San Francisco, California, serving customers essentially in North America and Europe. The vendor’s founders created the Zeek (formerly Bro) network monitoring framework and the solution’s sensors are available in the form of appliances (physical and virtual) on AWS and, more recently, on Azure. Corelight uses Zeek as its main engine and as a support for its own detections and integrating third-party threat intelligence feeds. Corelight mainly relies on its own analysis of the traffic metadata, and can also extract files to forward them to third-party file inspection devices. Corelight Sensors do not decrypt TLS, but the vendor just added additional encrypted traffic analysis for SSH — to detect brute force attempts and interactive connections — and TLS, including JA3 fingerprinting and certificate analysis.As Corelight Sensors are more frequently deployed out of band, the vendor focused its response capabilities on integrating with a broad portfolio of SIEM and SOAR tools. Customers interested in Corelight will purchase hardware appliances and attached subscriptions based on sensors’ expected bandwidth capacity.
Darktrace
Darktrace is based in Cambridge, U.K., and San Francisco, California. It’s detection capability is primarily based on unsupervised machine learning, and it also utilizes supervised machine learning and deep learning algorithms. To analyze encrypted traffic, Darktrace relies primarily on unsupervised machine learning to detect unusual and anomalous JA3s. Darktrace offers a SaaS module to monitor traffic between users and Microsoft Office 365. In 2019, Darktrace introduced the Cyber AI Analyst capability. It uses analytical techniques to automatically investigate threats detected by Darktrace’s flagship Enterprise Immune System (EIS). Cyber AI Analyst investigates the most important incidents on a dashboard, and it provides written reports on these incidents.Darktrace’s optional Antigena tool automates the response to incidents detected by EIS. It sends commands to leading firewall vendors to drop suspicious traffic. It also integrates with some SOAR tools, some EDR tools and NAC tools. Cyber AI Analyst is Darktrace’s primary tool for automatically investigating and responding to threats. Pricing for EIS is based on an annual subscription. The price for Antigena for Network is 50% of the cost of the EIS license. The price for Antigena for Email is based on the number of users in the organization.
ExtraHop
ExtraHop is a large network monitoring and security vendor, based in Seattle, Washington. It launched its NDR product, named Reveal(x), in January 2018. The vendor quickly gained visibility on shortlists among its existing customers and across multiple regions in pure NDR evaluations. ExtraHop delivers Reveal(x) as a self-service on-premises or IaaS appliance solution, or as cloud-hosted SaaS. Reveal(x) sensors extract enriched metadata to feed multiple analysis engines and build correlated security events. ExtraHop also offers full-packet capture or event-triggered packet capture. Users can drill down from summary metadata into the raw packets as Reveal(x) allows filtering and downloading of only the range of packets required. Reveal(x) can decrypt TLS traffic, if given access to the server secret keys or the symmetric session key, and relies on JA3 fingerprinting and other traffic analysis techniques when decryption is not an option. ExtraHop detection capabilities leverage a combination of techniques, including rule- and reputation-based controls, but also combine supervised and unsupervised machine learning to detect anomalies and deviation from normal network behaviors.ExtraHop chose to integrate with ticketing, SIEM and SOAR for automated orchestration, and with firewalls or endpoint protection solutions for automated response. Reveal(x) is priced as a set of subscriptions, which depends on the number of endpoints, and so-called “critical assets” combined with bandwidth tiers. Additional features, such as full-packet capture and physical appliances, are priced separately.
Fidelis
Fidelis is based in Bethesda, Maryland. In addition to its NDR solution, the vendor also sells its own EDR and deception products. Fidelis combines multiple techniques to detect malicious traffic, including supervised and unsupervised machine learning, signatures, and statistical analysis. In April 2020, Fidelis launched a stand-alone TLS decryption appliance. It plans to add TLS decryption as an option on its sensors in 3Q20. It also uses JA3 signatures and machine learning techniques to analyze encrypted TLS traffic.Fidelis Network does not directly integrate with any firewall solutions. It provides automated responses, such as packet drops, TCP resets and email quarantine, as well as quarantining files and custom playbooks, through its integration with its own EDR tool, Fidelis Endpoint. Fidelis also integrates with Carbon Black Cloud and other EDR tools. Fidelis can export data to SIEM and SOAR products. Manual response capabilities include the ability to search metadata, which can be stored for as long as the customer decides to keep it. Fidelis Network is licensed on an aggregate bandwidth and metadata storage model. An on-premises license can be purchased as a subscription or a perpetual model. A cloud license (managed from the cloud with data stored in the cloud) can only be licensed as a subscription.
FireEye
FireEye is a global security company, based in Milpitas, California. FireEye SmartVision is its NDR solution, specialized on server-side traffic. SmartVision physical or virtual sensors are deployed typically to intercept client-to-server traffic. SmartVision detection engines heavily leverage IDS and threat intelligence rule-based controls. FireEye products are powered by a proprietary Multi-Vector Execution (MVX) engine, which can be hosted on-premises or in the cloud. FireEye Network Forensics provides full-packet capture and analysis of traffic. Machine learning techniques also apply to traffic and file analysis.FireEye SmartVision response capabilities are available through the vendor’s orchestration and endpoint solutions, or via numerous integrations. Additional investigation tools are part of the FireEye Helix threat hunting and managed security service offering. The SmartVision solution can be purchased with a perpetual license (customers buy appliances), or as an annual subscription (based on Mbps of throughput or on a per-user basis).
Flowmon
Flowmon is based in Brno, Czechia. Its detection algorithms are based on a combination of multiple techniques, including machine learning, heuristics, statistical and signature-based methods. Flowmon does not decrypt TLS traffic. It uses encrypted traffic analysis techniques to look for indicators of compromise and compliance-related risks. It also uses JA3 fingerprints, but it does not rely heavily on this technique. Flowmon can ingest flow data (for example, NetFlow, IPFIX and others) from the network infrastructure, but it achieves the best results when customers implement its probes. These probes generate metadata that provides visibility into Layer 7 traffic across multiple protocols. The probes also include a memory buffer to support event-triggered packet captures.Flowmon supports some automated response capabilities through formal partnerships and integration with Cisco’s NAC tool, Fortinet and Hillstone firewalls, and some other products. The tool also enables manual response by providing the ability to query and analyze origin data for threat hunting and incident analysis. Flowmon’s detection engine is licensed per volume of processed flows per second (fps). Customers can purchase yearly subscriptions or perpetual licenses. Flowmon collectors are licensed based on performance (fps) and storage capacity. Stand-alone probes are licensed per number of interfaces and speeds.
Gigamon
Based in Santa Clara, California, Gigamon’s ThreatINSIGHT solution is based on technology from its acquisition of ICEBRG in 2018. ThreatINSIGHT uses a combination of techniques to detect suspicious traffic, including supervised and unsupervised machine learning, deep learning, and signatures. ThreatINSIGHT can analyze decrypted TLS traffic when it is coupled with Gigamon’s SSL decryption feature (an optional component of Gigamon’s flagship GigaVUE network packet broker). To analyze unencrypted TLS traffic, ThreatINSIGHT uses JA3 signatures and it applies machine learning techniques to detect anomalous patterns of communication within the encrypted traffic stream.When compared to many of its competitors, ThreatINSIGHT has limited integrations with technology partners to automatically respond to detections. It integrates with Demisto, Splunk and Mimecast, but it does not have any partnerships with firewall vendors (to drop suspicious traffic) or NAC vendors (to isolate a compromised endpoint). The Insight Query Language (IQL) feature allows incident responders to perform threat hunting and incident response by searching through a store of metadata. ThreatINSIGHT is available as a subscription service, priced according to bandwidth. As part of the subscription, every ThreatINSIGHT customer receives a dedicated Technical Account Manager, regardless of their size.
GREYCORTEX
With headquarters in Brno, Czechia, GREYCORTEX is a pure-play NDR vendor offering a solution called MENDEL. GREYCORTEX offers its solution mainly in Europe and the Asia/Pacific region. MENDEL consists of virtual and physical appliances. It can work with a single device, combining traffic gathering (sensors) and analysis (collectors), and expand to a three-tier architecture by adding a centralized management to handle multiple collectors. GREYCORTEX combines numerous supervised and unsupervised machine learning models, then correlates it with rule-based controls. It also provides solutions for ICS/SCADA networks. GREYCORTEX NDR supports configurable packet capture, and uses JA3 fingerprinting for TLS analysis and supports TLS decryption.MENDEL can automatically block by instrumenting third-party network and security devices, leveraging their management API. Default configuration includes one month of searchable metadata. Two pricing models are available. Customers can purchase perpetual licenses based on sensor throughput and flows per second. Alternatively, customers can purchase a subscription license, also based on sensor throughput and flows per second (the subscription price includes support).
Hillstone Networks
Hillstone Networks is a large network security vendor, based in Suzhou, China, with regional headquarters in Santa Clara, California. Its Server Breach Detection System (sBDS) can be deployed as a stand-alone product, and its threat detection sensors can also be bundled in the vendor’s centralized analytics solution (i-Source). Hillstone’s solution combines the various engines from its security portfolio, including IDS and malware inspection, but does not decrypt or analyze TLS sessions. Its use of unsupervised machine learning is focused on baselining client-to-server traffic patterns and spotting deviations.Hillstone’s NDR solution integrates with other products from the vendor for incident response. Pricing is based on appliance purchase and attached subscriptions.
IronNet
Based in Fulton, Maryland, IronNet targets large enterprises that are concerned about attacks from nation states. Its solution uses a combination of behavioral detection techniques, including supervised and unsupervised machine learning and some deep learning. It also uses statistical analysis and some heuristic techniques to detect suspicious traffic. IronNet does not decrypt TLS traffic, and it does not support JA3 fingerprints. However, it uses a range of artificial intelligence and machine learning techniques to detect suspicious TLS traffic.Unlike many vendors in this market, IronNet does not automatically respond to threats by integrating with firewalls to drop suspicious network traffic. However, it does integrate with leading SOAR and SIEM products. IronNet has strong manual hunt capabilities, enabling threat hunters to investigate across network flow data and pull packet capture (PCAP) on any flow (not just what IronDefense deems as high risk). The Expert System feature in the IronDefense product prioritizes threats and provides contextual information for incident responders. The solution also provides a crowdsourcing feature that enables communities of peer enterprises to collaborate against targeted threats. Pricing for IronDefense is based on a flat monthly fee based on analytical throughput (not ingest throughput) or by number of users. Customers must purchase IronDefense physical or virtual sensors.
Lastline
On 4 June 2020, VMware announced the intent to acquire Lastline. Gartner expects the deal to close by the end of June. After the deal has closed, Gartner expects that VMware will integrate Lastline technology into its NSX product.Lastline is based in San Mateo, California. Its Defender product uses a combination of techniques to detect suspicious traffic, including supervised and unsupervised machine learning, and some deep learning functions. It also uses signatures, statistical analysis and heuristics, as well as a sandbox to detect malicious files. Defender does not natively decrypt TLS traffic. Instead, it applies anomaly detection to JA3 hashes. It also applies encrypted traffic analysis techniques to detect suspicious traffic without inspecting the payload.Lastline’s automated response with firewall vendors (to send a command to the firewall, so it drops suspicious traffic) is limited to only Check Point Software Technologies. However, Lastline integrates with many other security products, including VMware Carbon Black Cloud, Symantec (Blue Coat), Splunk (Phantom), Trend Micro (Tipping Point), Palo Alto Networks and several others. When the Lastline sensors are deployed in-line, they can block suspicious traffic. For manual response, Lastline provides good threat hunting and incident response capabilities. The solution includes the open-source Kibana search and visualization product. Lastline has also built a query language to do more complex searches. The solution includes a triage functionality that correlates multiple alerts into a single high-fidelity alert. Defender is sold as a subscription. Organizations can purchase based on either the number of protected hosts or the number of protected users.
Plixer
Based in Kennebunk, Maine, Plixer is a network performance monitoring and security vendor, offering an NDR solution based around Scrutinizer. Its customer base is mainly in the U.S. and Europe. Scrutinizer is deployed as physical/virtual sensors or as a SaaS. Scrutinizer collects metadata from the existing network infrastructure (switches, routers, firewalls, packet brokers, etc.), as well as from Plixer FlowPro, which is an optional sensor. The vendor recently acquired endpoint monitoring software, which promises to add more endpoint-related monitoring. Plixer offers integration with Endace for full-packet capture. Scrutinizer includes multiple rule-based and heuristic detections, detecting network anomalies, and security incidents. It complements these techniques with traffic baselining for anomaly detection and JA3 fingerprinting for TLS session analysis.Scrutinizer’s response capabilities include incident-based and threshold-based triggers to update firewall or other network equipment through API calls. Plixer’s subscription licensing is based on flow rate and the number of metadata-exporting network devices. Threat hunting capabilities are integral to Scrutinizer.
Vectra
Vectra is a global NDR vendor, with headquarters in San Jose, California. Vectra Cognito is the company’s main product offering. The vendor was early on the NDR market with its Cognito platform. Vectra is highly visible in Gartner client inquiries across the Americas and EMEA regions, and growing in the Asia/Pacific region. Cognito Detect, the NDR product, leverages physical appliance sensors and virtual machines deployable on hypervisors and on IaaS platforms, and can interact with some SaaS through APIs to gather SaaS events. The analysis engine (Vectra Brain) can be deployed on-premises or on public cloud. Vectra uses supervised machine learning to detect global threats, and combines it with threat intelligence for more accurate detection of known bad actors. It uses unsupervised learning models for more contextualized anomaly detection. The vendor uses JA3 fingerprinting and other techniques to provide detection coverage for encrypted traffic, but does not decrypt TLS. Vectra provides easy-to-understand dashboards, and a “campaign view,” which puts multiple events in context and eases the investigation. Vectra recently launched a beta program for an Office 365 monitoring offering, and released Lockdown, an event aggregation and automated response (via partner integrations) feature that is part of Cognito Detect.Vectra’s Lockdown solution integrates with endpoint controls, firewalls, SOAR and SIEM to provide response capabilities. It can also directly integrate with the infrastructure, taking down workload or temporarily disabling compromised user accounts. Vectra’s pricing, in addition to the hardware costs, is based on the number of active monitored IP addresses. Additional subscriptions are available to forward enriched, Zeek-formatted data in real time to a third-party data lake (Cognito Stream), or to a SaaS that is integrated with Cognito Detect (Cognito Recall) for threat hunting purposes.
Market Recommendations
Enterprises should strongly consider NDR solutions to complement signature-based tools and network sandboxes. Many Gartner clients have reported that NDR tools have detected suspicious network traffic that other perimeter security tools had missed.When evaluating NDR vendors, assess these factors:
- Response — Some vendors focus more on automated responses (for example, sending a command to a firewall to drop suspicious traffic), whereas other vendors focus more on manual responses (for example, providing strong threat hunting tools). Enterprises should decide which approach is a better fit for them and should analyze the vendors with response features that best meet their requirements.
- Pure-play versus NDR as a feature — Is it more sensible to implement NDR as a feature from another technology vendor (for example, SIEM), or do you require a more full-featured, pure-play NDR solution from one of the vendors analyzed in this Market Guide?
Note 1Representative Vendor Selection
These vendors were selected because they met Gartner’s inclusion criteria, and were not eliminated by our exclusion criteria.
Note 2Other Vendors That We Are Tracking
IoT and OT Specialization Vendors
- Armis
- Cyberbit
NDR as a Feature Vendors
- IBM (QRadar Network Insights)
- LogRhythm (NetMon)
- Palo Alto Networks (Cortex XDR)
Other Vendors
- Accedian
- aizoOn
- Braintrace
- cPacket
- Kaspersky (see Note 3)
- Lumu
- MistNet
- MixMode
- Noble
- Nominet
- Quadminers
- Qianxin Technology Co., Ltd. (SkyEye)
- Qihoo 360
- RSA
- Stellar Cyber
- Tencent (T-Sec NTA)
- ThreatBook
- Vehere
- VIAVI
Note 3: Kaspersky
In September 2017, the U.S. government ordered all federal agencies to remove Kaspersky’s software from their systems. Several media reports, citing unnamed intelligence sources, made additional claims. Gartner is unaware of any evidence brought forward in this matter. At the same time, Kaspersky’s initial complaints have been dismissed by a U.S. District of Columbia Court.Kaspersky has launched a transparency center in Zurich where trusted stakeholders can inspect and evaluate product internals. Kaspersky has also committed to store and process customer data in Zurich, Switzerland. Gartner clients, especially those who work closely with U.S. federal agencies, should consider this information in their risk analysis and continue to monitor this situation for updates.
Cyentia Cybersecurity Research Library
One of the first places I go when performing cyber security research is Cyentia Institute.

Cyentia Cybersecurity Research Library
Selecting the Right SOC Model for Your Organization
Selecting the Right SOC Model for Your Organization
Published 24 February 2020 – ID G00464962 – 22 min read
Overview
Key Findings
-
Security operations centers (SOCs) will fail in their mission without a clear target operating model, and if their deliverables are not tightly coupled to business use cases, risks and outcomes.
-
A hybrid SOC working with external providers is a credible option that is increasingly being adopted by many organizations, specifically midsize enterprises.
-
Organizations are increasingly interested in multifunction SOCs, extending SOC duties to incident response, threat intelligence and threat hunting, while adding OT/ICS/IoT in scope.
-
Building, implementing, running and sustaining a fully staffed 24/7 SOC is cost-prohibitive for most organizations.
Recommendations
-
Develop an SOC target operating model, taking into account current risks and threats, as well as the business objectives, focusing on specific threat detection and response use cases.
-
Use managed detection and response (MDR) or other security services to offset the cost of 24/7 SOC operations and to fill coverage and skills gaps, tactically or as a long-term strategy.
-
Expand the SOC’s capabilities beyond just SIEM solutions to provide greater visibility into the IT, OT and IoT environment where appropriate, but do not expect a full SOC/NOC integration.
-
Likewise, plan for SOC functions beyond reactive incident monitoring and into threat detection and response, and even proactive threat hunting.
Strategic Planning Assumption
Analysis
Definition
-
A mission, usually focused on threat detection and response.
-
A facility, dedicated to the SOC, either physical or virtual.
-
A team, often operating in around-the-clock shifts to provide 24/7 coverage.
-
A set of processes and workflows that support the SOC’s functions.
-
A tool or set of tools to help predict, prevent, detect, assess and respond to security threats and incidents.
Description
-
Security event monitoring, detection, investigation and alert triaging
-
Security incident response management, including malware analysis and forensic analysis
-
Threat intelligence management (ingestion, production, curation and dissemination)
-
Risk-based vulnerability management (notably, the prioritization of patching)
-
Threat hunting
-
Security device management and maintenance (for the SOC technology stack)
-
Development of data and metrics for compliance reporting/management
SOC Models
Table 1: Five Primary Operational SOC Models for Typical Organizations
SOC Model
|
Typical Maturity of SOC Workflows
|
Main Attribute
|
When to Select
|
---|---|---|---|
Virtual SOC
|
Very low
|
No dedicated facility
|
|
Multifunction SOC
|
Low to medium
|
Simple SOC with IoT/OT/ICS and some 24/7 NOC
|
|
Hybrid SOC
|
Low to very high
|
Mixes internal resources and outsourced security services
Any SOC model can be qualified as hybrid when it uses outsourced security services
|
|
Dedicated SOC
|
Medium to high
|
Self-contained, in-house, dedicated 24/7 threat detection and response
|
|
Command SOC
|
High to very high
|
Manages and coordinates other SOCs and activities
|
|
Virtual SOC
Multifunction SOC
Hybrid SOC
Dedicated SOC
-
Laws, regulations or governance issues prevent the outsourcing option.
-
There are concerns about specific/targeted threats.
-
Specialized expertise and knowledge about the business cannot be outsourced.
-
The organization’s technology stack is not supported by third-party security services.
Command SOC
Benefits and Uses
Adoption Rate
-
Maturing of information security programs
-
Centralization of incident detection, threat detection and response capabilities, as well as consolidation of security operations functions expanded throughout the entire organization
-
Current and future legislation and regulatory frameworks that mandate security event monitoring and detection and response capabilities (see “A Technical Solution Landscape to Support Selected GDPR Requirements”)
-
An increase in risks/threats via breaches and incidents
-
Growth of technology usage due to digitalization of business (see “Hype Cycle for Threat-Facing Technologies, 2019”)
-
Increased adoption of external service support for security event monitoring and device management
Risks
-
Can we continue to deliver our products/services?
-
What competitive disruptions or players in our market will cause clients to shift from our products/services?
-
Are we conducting our activities legally?
Recommendations
-
Gather and centralize required security personnel. These can be present either physically or virtually, and can belong to the organization’s security, operations, IT or network teams, or belong to a service provider. Likewise, these resources can be assigned on a full-time or part-time basis.
-
Define repeatable and automatable processes and workflows. These will depend on the scope of the SOC and should tend to address not only threat detection but also response. When an outside service provider is involved, it is then particularly important to define the “who is doing what, when” by using a responsible, accountable, consulted, informed RACI matrix to define roles and responsibilities, and expose integrations and communications between the client and the service provider.
-
Appropriately implement tools. Depending on scope, these tools (which can include, for example, CLM, SIEM, SOAR, SIRP or ITSM) should be selected and implemented to not only support current SOC requirements, but also current or planned SOC scope creep beyond security. This includes, for example, supporting the IT operations team and its NOC, or the ICS owners and their IoT ecosystem.
-
Breadth of scope. As an example, does the SOC address only a subset of the infrastructure, or a subset of the user population, entire BUs or even the entire organization?
-
Depth of scope. As an example, does the SOC address basic, best-practice cyber-hygiene use cases, or does it address more complex use cases such as advanced persistent threat (APT) or insider threat? Does it include the IoT ecosystem, and does it deliver some NOC services as well?
Note 1ITIL 4 Incident and Incident Management Definitions
Magic Quadrant for Application Security Testing
Magic Quadrant for Application Security Testing
Published 29 April 2020 – ID G00394281 – 61 min read
Strategic Planning Assumptions
Market Definition/Description
-
Static AST (SAST) technology analyzes an application’s source, bytecode or binary code for security vulnerabilities, typically at the programming and/or testing software life cycle (SLC) phases.
-
Dynamic AST (DAST) technology analyzes applications in their dynamic, running state during testing or operational phases. It simulates attacks against an application (typically web-enabled applications and services and APIs), analyzes the application’s reactions and, thus, determines whether it is vulnerable.
-
Interactive AST (IAST) technology combines elements of DAST simultaneously with instrumentation of the application under test. It is typically implemented as an agent within the test runtime environment (for example, instrumenting the Java Virtual Machine [JVM] or .NET CLR) that observes operation or attacks and identifies vulnerabilities.
-
Software composition analysis (SCA) technology used to identify open-source and third-party components in use in an application, their known security vulnerabilities, and typically adversarial license restrictions.
Magic Quadrant
Vendor Strengths and Cautions
CAST
Strengths
-
CAST offers a single solution that can be used for quality analysis as well as security analysis, which can be appealing to organizations with DevSecOps use cases.
-
Client feedback highly rated the ability to get a single view into issues across security, quality and architecture. CAST’s analysis engine provides an architectural blueprint of the software that helps test composite applications in multiple languages, visualize the architecture to improve code security by detecting insider threats via rogue data access and reduce false positives.
-
The vendor provides a scoring mechanism that can be calibrated to organization-specific criteria to track whether an application’s health is increasing or deteriorating from security, reliability and multiple other standpoints.
-
CAST provides the ability to set up a plan of action based on a particular objective, such as reducing technical debt or improving the security score.
-
Client feedback favorably rated the scalability and performance of the SAST engine in analyzing larger applications.
Cautions
-
Clients perceive CAST as an application quality testing solution provider, rather than an established application security vendor.
-
The vendor does not provide SCA as part of its main SAST offering, AIP, but only with CAST Highlight.
-
CAST’s SAST solution is missing key software development life cycle (SDLC) integration features, such as a spellchecker, incremental scanning and, most importantly, an integrated development environment (IDE) plug-in.
-
CAST clients often cite setup, implementation and customization as areas for improvement. Also, the vendor does not provide 24/7 support.
-
CAST does not provide DAST or IAST, and has no partnerships to deliver either.
Checkmarx
Strengths
-
The vendor’s portfolio competes well for various use cases, including DevSecOps, cloud-native development and more traditional development approaches where SAST is a central requirement. SAST capabilities support a broad variety of programming languages and frameworks, and include support for incremental and parallel tests.
-
CxIAST employs a passive scanning model and results are correlated with SAST findings, as are issues discovered within open-source packages. This helps with validation of results, and can aid in confirming that a vulnerability is within executable code.
-
Tool integration within IDEs and the build environment is frequently cited as a strength by customers.
-
Remediation guidance, augmented by the optional CxCodebashing education component, helps developers understand vulnerabilities and how they can be resolved. A graph-based display of code execution paths and vulnerabilities highlights a proposed “best fix” location. Also, chat-based guidance provides fix advice from Checkmarx support staff.
-
The product suite offers guidance on the prioritization of vulnerabilities, with reports factoring in data such as the severity of the vulnerability, impact, source and sink information, and confidence level. Confidence levels are derived from a mix of technologies, including an ML algorithm to validate results and correlation between SAST findings and those discovered by IAST or SCA tests.
-
Through its various components, the Checkmarx portfolio offers basic support for both API security testing and container scanning. The vendor indicates that it plans to continue investment in these areas.
Cautions
-
Reflecting its history, the bulk of the vendor’s customers are for its CxSAST product, although Checkmarx continues to invest in expanding its portfolio and capabilities, and other products show growth.
-
CxDAST is based on a third-party technology relationship and is only available as part of a managed service offering. For use cases where DAST is a primary — or the only — element of an AST effort, the offering may be less attractive.
-
CxOSA, despite retaining the existing name and feature set, is essentially a new product and is available only as an add-on to the CxSAST product.
-
Licensing continues to be raised as a source of dissatisfaction by some customers, which may be a consequence of the mix of pricing models offered. Especially for SAST, these are generally based on the number of users or projects/applications — an approach that is emerging as an industry standard. When combined with multiple license models (perpetual, term and subscription), prospective customers gain flexibility, along with complexity. Rankings for negotiation flexibility, pricing and value are on par with competitive vendors, and are generally positive.
Contrast Security
Strengths
-
Contrast Assess, combined with the vendor’s SCA product (Contrast OSS), is a good choice for organizations leveraging a DevOps or agile approach, offering a quick starting point and rapid integration across the entire SDLC. Gartner client feedback indicates that this also helps in embedding AST among development teams without security testing expertise, because the agent can identify vulnerabilities through normal application testing. Contrast Assess is one of the most broadly adopted IAST solutions and continues to compete on nearly every IAST shortlist.
-
Contrast’s reporting tool, TeamServer, provides a comprehensive view of code, dependencies, vulnerabilities and project security status in an easy-to-use, intuitive platform. Status is reported as a grade (A through F), making it simple to consume status quickly across complex DevSecOps projects. It also includes a tool for representing dependencies and services in the form of a map, which makes it easier to visualize the attack surface.
-
Contrast has put significant effort into scanning COTS software, making it a good choice for enterprises with large implementations of third-party code that might be concerned with COTS application security and dependencies on third-party application libraries.
-
Clients highly rate the ease of use of the tool and the vendor’s support. Contrast introduced a Community Edition for Assess and Protect to allow users to utilize the fully functional platform for a limited number of applications.
-
Contrast’s platform support provides AST, SCA and RASP for Java, .NET Framework, .NET Core, Node.js, Ruby, and Python.
Cautions
-
Contrast Security offers a full IAST and SCA solution, and does not provide stand-alone SAST or DAST tools or services, although its IAST tools can do similar testing in some cases.
-
Client feedback suggests that, due to the passive testing model, effective test coverage requires clients to have mature test automation capabilities or to run Contrast Assess in conjunction with DAST or “DAST-lite” tools. To address this, Contrast introduced a “route coverage” feature to give clients visibility into their test coverage by highlighting which parts of the application were exercised or still need to be covered.
-
Contrast can test mobile application back ends, but not the client-side code of the mobile app, and does not conduct behavioral analysis or check front-end code vulnerabilities, such as DOM-based XSS.
-
Contrast does not feature some of the nice-to-have ongoing support mechanisms that organizations with no AST experience often look for (for example, IDE gamification, human-checked results), although it does support chat with staff for specific questions.
GitLab
Strengths
-
GitLab has a single platform for development and security for the entire SDLC, which allows for easier integration of security, as well as easier acceptance and adoption for developers. Security professionals have visibility into the vulnerabilities at the time the code is committed, and when modifications, approvals and exceptions are made, and can also enforce security policies in the merge request flow.
-
The vendor’s SAST, Secret Detection; DAST, Dependency Scanning; and Container Scanning and License Compliance offerings are included in the Ultimate/Gold tier. Its pricing is publicly available, and provides a relatively affordable option.
-
GitLab provides DAST on a developer’s individual code changes within the code repository. It does so by recreating a review application based on the code that is already committed in the repository.
-
Users can configure requirements for pipelines, and ensure that some, or all, of the security scans are a part of that.
-
GitLab provides container scanning for vulnerabilities, and for code deployments in Docker containers and those using Kubernetes.
Cautions
-
GitLab’s SAST lacks features that are available in more mature offerings. Language coverage is limited and the dashboard lacks the granularity and customizability of more established tools. Its SAST offering lacks features such as quick fix recommendations. Although GitLab can test developer code before merging it, it does not have an IDE plug-in and does not provide real-time spell checking.
-
GitLab is new to the AST space and Gartner clients haven’t traditionally considered it a security vendor. Its security offering is relatively new, and doesn’t have extensive end-user feedback.
-
GitLab’s AST comes as part of the broader development platform. Organizations that do not use GitLab for development will find stand-alone security scanning from the vendor impractical.
-
The vendor does not provide specific mobile AST support and its DAST offering is essentially Open Web Application Security Project’s (OWASP’s) open-source ZAP tool.
HCL Software
Strengths
-
AppScan enjoys a good reputation for DAST scanning, sharing the same basic technology across the portfolio. The desktop-based AppScan Standard is a customizable offering especially suited for manual assessments. Incremental scanning allows for faster scans, and an “action-based” browser recording technology enables testing of complex workflows and improved insight into single-page applications where not all activity is captured in standard GET/POST operations.
-
AppScan, while still owned by IBM, was one of the first products to heavily leverage ML techniques for application security tasks, including the provision of Intelligent Finding Analytics (IFA), which helps improve accuracy and identify a “best fix” location for vulnerabilities. Under HCL, progress has continued with an effort to apply ML-based analytics to DAST findings generated by the vendor’s cloud customers to significantly improve speed and accuracy.
-
HCL offers good support for mobile application testing, leveraging its SAST, DAST, SCA and IAST components, as well as behavioral analysis.
-
Support for DevOps environments is competitive with other vendors and includes integrations into common IDEs and CI/CD toolchain components. Developers can perform scans in a private sandbox, reviewing results before committing code. The tools provide standard explanatory and supportive information, supplemented by optimal fix information and vulnerability grouping provided by IFA. No formal computer-based training or “just in time” training is provided, although such support — increasingly a staple of AST tools — is reportedly on the roadmap.
Cautions
-
Any change in ownership is potentially disruptive, although the two-year transfer period from IBM to HCL appears to have eased the transition. However, HCL is at a disadvantage in acquiring new customers, given its current lack of brand awareness in the market. Thus, while the vendor offers a similar product vision as other portfolio vendors, it is ranked lower for its ability to execute.
-
The AppScan portfolio is robust, but complex, with inconsistent features across platforms. For example, Open Source Analysis is only available in the cloud, and mobile testing can span environments. HCL is taking steps — such as with the Bring Your Own Language facility — to rationalize features across the full range of the portfolio, although the result is not yet complete.
-
AppScan’s IAST capability is tightly integrated with the DAST offering and cannot be purchased independently. A passive IAST approach, increasingly in favor among DevOps teams, was released on 25 March 2020, after the deadline for this evaluation, and therefore is not considered.
-
The overall pricing model for HCL’s portfolio is complex. First, cloud offerings are based on a subscription model, but on-premises products are only available with traditional perpetual licenses (including a term-based variation). That disparity complicates purchasing for organizations wishing to pursue a hybrid deployment model. Other pricing metrics vary and are based on the number of applications, users (with varied types of user licenses on offer) and per-scan pricing. Buyers must evaluate multiple options to obtain optimal pricing terms.
Micro Focus
Strengths
Cautions
-
While Fortify has begun to show the results of Micro Focus’ investment, overall market awareness has not yet caught up. Gartner client inquiry calls do not yet reflect the new functionality and are still dominated by discussions about the older versions of the product suite.
-
Fortify is known for its depth and accuracy of results, which meets the needs of enterprise customers that then leverage contextual-based analysis. Less mature organizations looking for incremental improvements over time may experience challenges with the complexity and volume of unfiltered results.
-
While Fortify offers highly flexible license and pricing models, during inquiries clients report that the pricing remains complicated and the on-premises operational complexity is high.
-
Automated scans are faster than they were in older versions of the product, and a good fit for DevSecOps, but optional human-audited scan results in FoD are out of band and can take significantly longer. ·Fortify balances this challenge to human auditing by providing customers with the option to enable in-band, AI-driven audits without human intervention, both on-premises and with FoD.
Onapsis
Strengths
-
Onapsis supports the DevSecOps cycle with plug-ins and services that fit into existing business-critical developer workflows.
-
The vendor has good support for SAP and Oracle applications as they move to the cloud, such as S/4HANA, C/4HANA, Workday, Salesforce, SuccessFactors, Ariba and others..
-
Its data flow and tracking options are especially useful for monitoring compliance risks in applications in financial services, human capital management (HCM), supply chain management (SCM) and other applications.
-
Onapsis supports a number of complex programming languages and offers a good web-based interface for scanning and managing results across multiple projects that fits well with other ERP development tools.
-
The vendor also supports SAP HANA Studio, Eclipse, SAP Web IDE and SAP ABAP development workbench, with similar workflows and processes across the different development IDEs.
Cautions
-
Although Onapsis enjoys extensive cooperation with SAP and Oracle, there is some risk as both are still competitors in this space with their own products (e.g., SAP’s Code Vulnerability Analyzer).
-
With a focus on applications supported by SAP and Oracle, overall programming language support is limited compared to other tools in the AST space, but is focused on common business-critical application developers.
-
Onapsis has an IDE plug-in for its toolsets, but the experience varies significantly between them. Results of the scans are available through PDF reports with the developer environment, or via a web interface. Onapsis also offers full integration with SAP’s cloud-based Web IDE, which does provide a fully integrated developer experience. For ABAP, there is also a fully integrated experience.
-
DAST support is limited to workflow and call graph analysis.
Rapid7
Strengths
-
Rapid7 continues to enjoy a strong reputation for its DAST tool, especially in support of in-depth custom manual assessments. Tests can be performed interactively, allowing for the manipulation of parameters, and aiding troubleshooting and the validation of fixes.
-
Rapid7’s Universal Translator technology analyzes requests to identify various formats, parses them and normalizes the data to a standard form to create similar attacks across tested formats. For formats that cannot be crawled, such as JSON and REST web services, this is accomplished via user-recorded traffic.
-
Expanded support for application frameworks makes Rapid7 an attractive choice for testing modern, single-page applications.
-
Rapid7 continues to enjoy good marks from most users for the product’s ease of use, dashboard and reporting. For example, developers are provided information such as recommendations, description and error information, and attack replay functionality, which enables them to understand, patch and retest vulnerabilities.
Cautions
-
Rapid7’s inclusion of vulnerability assessment and RASP in its application security portfolio expands the scope of its offering beyond DAST, but the additional tools don’t offer feature parity with competitive solutions. For example, while InsightVM and tCell help identify vulnerabilities in built applications and containers, it does not warn of restrictive open-source licenses — a standard capability for SCA tools. (Rapid7 announced a partnership with SCA specialist Snyk as this Magic Quadrant was being finalized. Any resulting improvements in SCA capabilities will be reflected in future evaluations, as those changes materialize.)
-
While test results are highly detailed, the tools lack direct integration with IDEs, prompting developers to switch to the InsightAppSec dashboard (or browser extension) to review data and supporting information. It is possible to incorporate vulnerability data into a Jira ticket, which would assist in providing information to a developer more directly.
-
While individual Rapid7 products are built on a common platform, they lack the correlation of results across tools that other vendors provide, such as between IAST and SCA. However, correlation is provided between DAST and a selection of other vendors’ SAST tools. (Rapid7 lacks a SAST offering of its own.)
-
Rapid7 does not support distributed scanning.
Synopsys
Strengths
-
The Synopsys suite is a relatively easy entry point for organizations that may be just starting to take a developer-centric approach to security, as well as more advanced organizations that find integrating and managing a set of point solutions to be too time-consuming.
-
The Code Sight plug-in is a good fit for DevOps shops. It has strong integration with IDEs to provide feedback early in the development phase. The Code Sight plug-in leverages the IDE to act as an interface to all tools on Polaris, with an emphasis on remediation. This fits well with most development teams, regardless of maturity.
-
Support for CI/CD tools (for example, Jenkins and Jira reporting) has increased significantly in 2019, with support in Coverity, Seeker and Black Duck being used as part of the overall build/test/deploy cycle.
-
Seeker continues to be one of the most broadly adopted IAST solutions, with good SDLC integration. Synopsys has an agent-only IAST for Seeker that does not require an inducer. This supports the passive testing model offered by some IAST competitors.
-
Seeker compliance reports now offer GDPR and Common Attack Pattern Enumeration and Classification vulnerability tracking, in addition to its PCI DSS, OWASP and CWE tracking.
Cautions
-
Gartner client feedback indicates that the vulnerability clarification and fix recommendation is limited, compared with some of the competitors.
-
Gartner clients from small and midsize businesses have expressed that, despite interest in the vendor’s solutions, the price is often outside their budgets, especially for nascent programs, leading them to seek less costly alternatives. Synopsys’ sales process is also complicated, and clients have reported trouble navigating it.
-
Synopsys offers DAST only as a managed service. Synopsys AST managed services are orchestrated through a cloud-based portal that is separate from Polaris; however, managed service testing results can be viewed through the Polaris reporting tool. Emphasis for dynamic testing is concentrated on the Seeker IAST product line.
-
While Seeker has reports for various regulatory compliance regimes, compliance is often much more complicated than a set of scans. Users should be aware that they are responsible for the full scope of audit and regulatory compliance measures.
Veracode
Strengths
-
Gartner clients rate highly the quick setup, ease of use and scalability of the solution, as well as the vendor’s willingness to work with customer requirements.
-
Veracode’s services include tailored vulnerability and remediation advice, and reviews of the mitigations where needed, which can be useful to reduce remediation time and in organizations where developers are not application security experts. Veracode results come with “fix first” recommendations that consider how easy an issue is to fix and how much impact it has, and then recommend the best location to fix the issue.
-
Veracode feeds the intelligence collected from its cloud-based scans back to its engine and database. This is used to improve accuracy through SaaS learning, faster SCA updates, as well as advice for rapid response to known vulnerabilities.
-
Veracode’s SCA offering allows both agent-based local and cloud-based scanning, and provides a unique database with 50% more vulnerabilities than the National Vulnerability Database. Veracode can also scan test third-party applications or SaaS cloud with their consent, as well as COTS applications such as the ones provided by independent software vendors. To help with the focus on exposed applications, Veracode’s SCA offering can deprioritize vulnerabilities by checking if they are in the execution path of the application.
Cautions
-
Veracode does not offer AST tools that can be installed on-premises, only AST as a service. It provides Internal Scanning Management that can be located on the client’s network to support the testing of internal applications, with scanning configured and controlled via the cloud service.
-
Veracode does not offer dynamic scanning of APIs, a capability increasingly available from competitors, relying instead on static and interactive AST. Veracode also does not allow discovery of APIs.
-
Some Gartner clients have cited first line of support from the vendor as an item to be improved. Additionally, even though Veracode has a worldwide presence, it only provides support in English.
WhiteHat Security
Strengths
-
WhiteHat has a strong reputation among Gartner clients as a DAST-as-a-service provider and should be considered by buyers seeking an AST SaaS platform.
-
WhiteHat continues to execute toward its strategy of addressing the requirements of DevOps organizations with differentiated SAST, SCA and DAST products for the development, build and deployment phases of the life cycle. Generally, options earlier in the process — such as SAST and SCA for developers — are optimized for fast return of results by limiting the scope of testing. Later phases provide more in-depth checks and add options for human verification and testing. The vendor continues to expand ML-based automated verification to help speed the process, and to better align to the needs of rapidly iterating development teams.
-
WhiteHat’s customers continue to value the vendor’s strong support services. As noted, these include vulnerability verification, manual business logic assessments/penetration testing and the ability to leverage its Threat Research Center engineers to discuss findings.
-
WhiteHat SAST remediation capabilities extend beyond identifying the optimal point of remediation to automatically provide custom code patches that can be copied and pasted into the code to fix identified vulnerabilities for a portion of findings for Java and C#.
-
WhiteHat Sentinel Dynamic provides continuous, production-safe DAST of production websites with automatic detection and assessment, and alerts for newly discovered vulnerabilities.
-
DAST results can be fed to a variety of web application firewall solutions, enabling the creation of rules to mitigate vulnerabilities until they can be remediated in code.
Cautions
-
WhiteHat does not offer an IAST solution. It does use SAST findings to inform DAST scans for improved accuracy.
-
Customer feedback indicates some dissatisfaction with the products’ user interfaces. IDE plug-ins, for example, are functional, but supplementary and explanatory information is often poorly formatted. Findings can be fed to defect tracking systems, such as Jira.
-
WhiteHat’s SAST offering has limited language support, compared with competitive offerings.
-
WhiteHat does not offer AST as a tool, only as a cloud service. However, it can provide an on-premises virtual appliance that performs scans at a customer’s site, feeding results to the cloud for verification, correlation and inclusion in dashboards for reporting and analysis.
Vendors Added and Dropped
Added
Dropped
Inclusion and Exclusion Criteria
-
Market participation: Provide a dedicated AST solution (product, service or both) that covers at least two of the following four AST capabilities: SCA, SAST, DAST or IAST, as described in the Market Definition/Description section.
-
Market traction:
-
During the past four quarters (4Q18 and the first three quarters of 2019):
-
Must have generated at least $22 million of AST revenue, including $17 million in North America and/or Europe, the Middle East and Africa (excluding professional services revenue)
-
-
-
Technical capabilities relevant to Gartner clients:
-
Provide a repeatable, consistent subscription-based engagement model (if the vendor provides AST as a service) using mainly its own testing tools to enable its testing capabilities. Specifically, technical capabilities must include:
-
An offering primarily focused on security tests to identify software security vulnerabilities, with templates to report against OWASP top 10 vulnerabilities
-
An offering with the ability to integrate via plug-in, API or command line integration into CI/CD tools (such as Jenkins) and bug-tracking tools (such as Jira)
-
-
For SAST products and/or services:
-
Support for Java, C#, PHP and JavaScript at a minimum
-
Provide a direct plug-in for Eclipse or Visual Studio IDE at a minimum
-
-
For DAST products and/or services:
-
Provide a stand-alone AST solution with dedicated web-application-layer dynamic scanning capabilities.
-
Support for web scripting and automation tools such as Selenium
-
-
For IAST products and/or services:
-
Support for Java and .NET applications
-
-
For SCA products and/or services:
-
Ability to scan for commonly known malware
-
Ability to scan for out-of-date vulnerable libraries
-
-
For containers:
-
Ability to integrate with application registries and container registries
-
Ability to scan open-source OS components for known vulnerabilities and to map to common vulnerabilities and exposures (CVEs)
-
-
-
Business capabilities relevant to Gartner clients: Have phone, email and/or web customer support. They must offer contract, console/portal, technical documentation and customer support in English (either as the product’s/service’s default language or as an optional localization).
-
Focus only on mobile platforms or a single platform/language
-
Provide services, but not on a repeatable, predefined subscription basis — for example, providers of custom consulting application testing services, contract pen testing or professional services
-
Provide network vulnerability scanning but do not offer a stand-alone AST capability, or offer only limited web application layer dynamic scanning
-
Offer only protocol testing and fuzzing solutions, debuggers, memory analyzers, and/or attack generators
-
Primarily focus on runtime protection
-
Focus on application code quality and integrity testing solutions or basic security testing solutions, which have limited AST capabilities
Open-Source Software Considerations
Other Players
-
Business-critical application security
-
Application security orchestration and correlation (ASOC)
-
Application security requirements and threat management (ASRTM)
-
Crowdsourced security testing platforms (CSSTPs)
-
API-security-focused solutions
-
Container security solutions
Evaluation Criteria
Ability to Execute
Table 1: Ability to Execute Evaluation Criteria
Evaluation Criteria
|
Weighting
|
---|---|
Product or Service
|
High
|
Overall Viability
|
High
|
Sales Execution/Pricing
|
Medium
|
Market Responsiveness/Record
|
High
|
Marketing Execution
|
High
|
Customer Experience
|
High
|
Operations
|
Not Rated
|
Completeness of Vision
-
Integration with the SDLC (including emerging and more flexible approaches)
-
Assessment of third-party and open-source components
-
The tool’s ease of use and integration with the enterprise infrastructure and processes
-
How this awareness translates into its AST products and services
Table 2: Completeness of Vision Evaluation Criteria
Evaluation Criteria
|
Weighting
|
---|---|
Market Understanding
|
High
|
Marketing Strategy
|
High
|
Sales Strategy
|
Medium
|
Offering (Product) Strategy
|
High
|
Business Model
|
Not Rated
|
Vertical/Industry Strategy
|
Not Rated
|
Innovation
|
High
|
Geographic Strategy
|
High
|
Quadrant Descriptions
Leaders
Challengers
Visionaries
Niche Players
Context
-
Require solutions that expose and integrate automated functionality through plug-ins (including IDE, build, repository, QA and preproduction) into the SDLC. This will enable developers to fix issues earlier in the process, and it will improve coordination between development and security.
-
Favor vendors that specialize in comprehensive testing of APIs, applications deployed in containers and other aspects of modern development (e.g., single-page applications, microservices, serverless, edge computing, etc.) to support those use cases. Clients increasingly are seeking out point solutions with a specific focus on these technologies, particularly with respect to testing their APIs.
-
Require solutions that provide SCA, which is a critical or mandatory feature of an overall approach to security testing of applications, because open-source and third-party components are proliferating in applications that enterprises build. Vendors in the industry are introducing their own SCA solutions, as well as partnering with specialized SCA vendors. Gartner clients should pay special attention to those SCA solutions that offer OSS governance capabilities to enable the organization to proactively enforce its policy with respect to OSS when components are being onboarded or pulled in from external repositories and package managers. This should be further augmented with production time SCA, such as that available from container security products to alert to new vulnerabilities as they become known.
-
Favor a risk-based approach to vulnerability management rather than a “fix all the bugs” mentality. Too often, the perfect becomes the enemy of the good, wasting time and resources and demotivating developers and teams. There is often a trade-off to be made between speed and depth, so buyers should ensure that any resulting diminishment in the accuracy of results that often accompanies lower turnaround times remains acceptable.
-
Press vendors for specifics on their roadmap with respect to false positive reduction and how they will be employed to enhance their solutions. Buyers should look past ML hype and marketing to better understand specifics on how the proposed ML implementations will meaningfully improve areas such as enhancing accuracy, automating remediation efforts or achieving better testing coverage. Gartner clients should weigh vendor plans with respect to ML-based improvements, particularly when considering longer-term engagements, and consider the applicability of the proposed approaches. Artificial intelligence (AI) and ML are overused marketing terms, making it difficult to distinguish between hyperbole and genuine value, and should be evaluated closely.
Market Overview
-
Integration of security and compliance testing seamlessly into DevSecOps, so developers never have to leave their CI or CD toolchain environments
-
Teams embracing a “developers own their code” philosophy, which extends into security (as well as performance, reliability and code quality)
-
Scanning for known vulnerabilities and misconfigurations in all open-source and third-party components
-
An emphasis on removing vulnerabilities with the highest severity and risk, rather than trying to remove all known vulnerabilities in custom code
-
Giving developers more autonomy to use new types of tools and approaches to minimize friction (such as interactive AST) to replace traditional static and dynamic testing
-
Scaling their information security teams into DevOps by using a security champion/coach model rather than putting them directly on the teams (which has scalability and cultural issues)
-
Treating all automation scripts, templates, images and blueprints with the same level of assurance they would apply to any source code
-
Increased interest in containerization
-
There is increased availability of SCA tools as part of product offerings across the Magic Quadrant participants.
-
IDE security plug-ins have not only become the normal expectation for buyers, but increasingly they are expecting the IDE to be the main conduit for reporting, fix suggestions, lessons, gamification and other developer-centric security activity. Anything that requires developers to go “out of band” is generally disfavored.
-
Fix suggestions are becoming more context-aware, not only with specific instructions, but also with options for involving human review and guidance from tool providers. Tool vendors are providing more options for including some human review of results in addition to ML for the elimination of false positives.
-
Vendors are starting to deliver options for covering some of the container and microservice attack surfaces, although full container scanning is still a bit off.
-
Clients with experienced security staff are looking more seriously at using IAST solutions. Gartner saw a 40% increase in inquiry volume around IAST in 2019. For organizations with staff that have previously used SAST/DAST, IAST becomes a viable quick-start alternative, especially if they are making their first AST purchase and the staff are experienced in DevSecOps from previous work. It fits well into the DevSecOps workflow and give developers the opportunity to mix and correlate aspects of both dynamic testing and static analysis. While this is still a small percentage of the volume of DevSecOps calls, its growth represents an interesting, if minor, trend.
-
Container/microservice security is beginning to appear as an important trend in AST. In 2019, Gartner saw a 60% increase in the number of clients asking about container security. While this still represents a small portion of our call volume on AST, we feel it’s significant. Vendors are beginning to address container security concerns by repurposing some of their existing product suites (e.g., SCA for scanning OS components, SAST for payload scanning, etc.). These solutions do not yet cover the full, complex attack surface that containers represent.
-
Human-assisted DevSecOps is being offered by more vendors to reduce false positives and to assist developers in their IDE and developer environments. While ML continues to do the heavy lifting for false positive reduction, AST vendors are increasingly offering the option to have results reviewed by humans who can help remove false positives. While fast DevOps organizations continue to prefer automated, rapid turnaround times, other organization with less rigid deadlines and less security experience are taking advantage of FP reduction via human review. Similarly, while many organizations are adopting a “developer security coach” model for assisting coders grappling with security tasks, some are opting to use coaches from vendors provided through chat or other dedicated channels. This supports the goal of making security easy for developers to consume and provides rapid response to common questions.
-
Many clients are still seeking “one-stop shop” vendors that offer multiple technologies as part of a unified platform, a trend we noted in 2019. To support this effort, buyers are prioritizing vendors that provide multiple technologies and deployment options. Feedback from clients suggests that efforts to “glue together” various specialty tools suffer from complexity and reporting problems (i.e., the results of one tool not being consumable by others, resulting in a loss of context). Efforts to correlate these in-house do not yield the same level of rich data and project tracking and reporting as integrated, enterprisewide platform providers. Application vulnerability correlation helps with this.
Evidence
Evaluation Criteria Definitions
Ability to Execute
Completeness of Vision
Critical Capabilities for Security Information and Event Management
Critical Capabilities for Security Information and Event Management
Published 24 February 2020 – ID G00381141 – 52 min read
Overview
Key Findings
-
SIEM solution capabilities and support, specifically for consumption models, architecture, analytics, user monitoring and operations, are increasingly varying across vendors.
-
SIEM vendors are trying to solve, with varying degrees of success, the inherent complexities in deploying and operating SIEM tools. However, most SIEM solutions are still too complex for buyers with limited resources and expertise.
-
Big data technologies as core components of SIEM solutions are starting to become table stakes — for example, Hadoop or Elasticsearch, which are now leveraged by most SIEM solutions.
-
SIEM vendors have embraced security orchestration, automation and response (SOAR) via native capabilities, OEM and partnerships, or deeper integrations with leading SOAR vendors.
-
Although most SIEM buyers continue to purchase on-premises software or appliance SIEM solutions, SaaS SIEM is gaining traction, and more SIEM tools are offered as SaaS SIEM only.
Recommendations
-
Focus your evaluation on the critical capabilities that align to their use cases (e.g., forensics, advanced threat detection and response), requirements, and current and future IT environments (e.g., on-premises versus cloud-based services).
-
Improve response by leveraging new SOAR-type functionality that the SIEMs are providing natively before purchasing a dedicated SOAR.
-
Give preference to SIEM solutions that can be consumed as a service to minimize overhead and management if you don’t have complex, on-premises SIEM architecture requirements and are, or plan to be, a heavy user of cloud-based services.
Strategic Planning Assumptions
What You Need to Know
-
The scale and complexity of the deployment — for example, the types and locations of data sources in scope for distributed organizations or hybrid multicloud environments.
-
Architectural considerations for deployment and consumption — for example, will the solution be deployed on-premises, in the cloud, via a hybrid approach or consumed as software as a service (SaaS)?
-
Operational roles, such as use of internal resources versus service providers, and managed SIEM services
-
Applicable compliance regimes and mandates, such as data retention and reporting requirements
Analysis
Critical Capabilities Use-Case Graphics
Source: Gartner (February 2020)

Source: Gartner (February 2020)

Source: Gartner (February 2020)

Source: Gartner (February 2020)

Source: Gartner (February 2020)

Vendors
AT&T Cybersecurity
Dell Technologies (RSA)
-
RSA NetWitness Logs (version 11.3)
-
RSA NetWitness Endpoint (version 11.3)
-
RSA NetWitness Network (version 11.3)
-
RSA NetWitness UEBA (version 11.3), with competencies derived from the acquisition of Fortscale in 2018
-
RSA NetWitness Orchestrator (version 4.5 introduced in July 2019), an OEM of Demisto’s SOAR solution
Exabeam
-
Data Lake (version i31) for CLM-type functionality
-
Advanced Analytics (version i48), a user-focused UEBA
-
Threat Hunter (version i48), for forensics, investigations and searches
-
Entity Analytics (version i48), an entity-focused UEBA
-
Incident Responder (version i48), a workflow-automation-focused SOAR
-
Case Manager (version i48), an incident response/case management platform
-
Cloud Connectors (SkyFormation v2.4) from the SkyFormation acquisition for cloud coverage
FireEye
Fortinet
-
Fortinet FortiSIEM
-
FortiSIEM Advanced Agent (a for-pay, server-focused endpoint agent for Windows and Linux with some file integrity monitoring [FIM] and EDR capabilities)
-
FortiGuard IOC (a for-pay threat intelligence subscription feed)
-
FortiInsight (a for-pay pure-play UEBA tool derived from the ZoneFox acquisition)
HanSight
IBM
-
IBM QRadar Vulnerability Manager provides vulnerability assessment.
-
Network monitoring support in SIP includes IBM QRadar Network Insights for network flows, and the IBM QRadar Network Packet Capture appliance.
-
QRadar Risk Manager monitors device configurations.
-
IBM QRadar Incident Forensics provides investigation support.
-
IBM QRadar Advisor with Watson provides automated research for threats and actors.
-
IBM QRadar User Behavior Analytics (UBA) is a free add-on module for user-monitoring use cases.
-
IBM Resilient SOAR, a solution that has supported bidirectional integration between Resilient and the QRadar SIEM solution.
LogPoint
-
LogPoint Core SIEM (version 6.6.1)
-
LogPoint UEBA (version 2.1.0)
-
LogPoint Director Console (version 1.5.0)
-
LogPoint Director Fabric (version 1.5.0)
-
LogPoint Applied Analytics (version 2.0)
LogRhythm
-
UserXDR (for UEBA capabilities)
-
NetworkXDR (for NTA capabilities)
-
LogRhythm System Monitor (aka SysMon version 7.4), a host agent for data collection and EDR capabilities available in Lite and Pro versions
-
Network Monitor (aka NetMon version 3.9 and NetMon Freemium), the means to collect network data to support NetworkXDR
ManageEngine
-
ManageEngine ADAudit Plus (version 6.0; Active Directory change auditing and reporting)
-
ManageEngine EventLog Analyzer (version 12.0.5; central log management)
-
ManageEngine Cloud Security Plus (version 4.0; CLM and SIEM for AWS and Azure)
-
ManageEngine Log360 UEBA (version 4.0; user and entity behavior analysis)
-
ManageEngine DataSecurity Plus (version 5.0; data discovery and file server auditing)
-
ManageEngine O365 Manager Plus (version 4.3; Office 365 security and compliance)
-
ManageEngine Exchange Reporter Plus (version 5.4; Exchange Server change audits and reporting)
McAfee
-
McAfee Event Receiver (ERC), for collection and correlation of data
-
McAfee Enterprise Log Search (ELS), for Elastic-based log search
-
McAfee Enterprise Log Manager (ELM), for long-term log storage and management
-
McAfee Advanced Correlation Engine (ACE), for dedicated correlation including risk and ruleless (behavior-based) correlation, as well as statistical and baseline anomaly detection
Micro Focus
-
ArcSight Enterprise Security Manager (ESM; version 7.0 introduced in May 2019), providing core SIEM functions of real-time analytics and monitoring and incident management
-
ArcSight Logger (version 6.7.1 introduced in May 2019), providing event and data processing and storage
-
ArcSight Transformation Hub (version 3.0 introduced in July 2019) as part of the Security Open Data Platform (SODP) for data management and routing
-
Interset UEBA (version 5.8 as of the July 2019 cutoff date for this research) for user and entity monitoring
-
ArcSight Investigate (version 2.3 introduced in July 2018) for data searching and visualizations to support incident investigation and threat hunting use cases
-
ArcSight Management Center (ArcMC; version 2.92 introduced in July 2019) is the stand-alone utility used to manage ArcSight components
-
SmartConnector (version 7.13 introduced in July 2019), Micro Focus’ content for data parsing and normalization
Rapid7
-
InsightVM (vulnerability assessment)
-
InsightAppSec (application security)
-
InsightConnect (SOAR)
-
InsightOps (log management for IT operations).
Securonix
-
Securonix SIEM (v.6.2, CU4)
-
Securonix Security Data Lake (v.6.2, CU4)
-
Securonix UEBA (v.6.2, CU4)
-
Securonix SOAR (v.2.0)
-
Securonix NTA (v.2.0)
-
Securonix Threat Intelligence (v.2.0)
-
Securonix Apps (v.6.2, CU4): Insider Threat, Cyber Threat, Cloud Security Analytics, Identity and Access Analytics, Fraud Analytics, Trade Surveillance, Patient Data Analytics, Application Analytics
SolarWinds
Splunk
-
Splunk Enterprise for core log management capabilities, delivered either on-premises (Splunk Enterprise version 7.3 introduced in May 2019) or as SaaS SIEM via Splunk CloudSplunk Enterprise Security (ES version 5.3.1 introduced in July 2019), also available on-premises or in the cloud as a service
-
Additional (on-premises-only and for-pay) premium apps include Splunk User Behavior Analytics (UBA) and Splunk Phantom, as well as Splunk Security Essentials for Ransomware and Splunk App for PCI Compliance for more specific use cases
Context
-
Easier consumption models, such as SaaS SIEM along with predictable pricing models
-
Stronger packaging of the content, availability of an app store and overall better user experience around the inherent complexity of these tools
-
Use of advanced analytics to supplement the lack of this skill set in organizations
-
Use of automation features to augment the availability of organizations
-
As security teams deal with the challenges of increasing volumes of data from a variety of new sources with growing velocities, SIEM technology vendors are adopting big data technologies, such as Hadoop, NoSQL, Elasticsearch and Kafka to replace legacy data management capabilities oriented around proprietary methods and relational databases.
-
To cope with an evermore hostile threat environment, both external attackers and insider threats, SIEM vendors are adding more sophisticated analytics methods, such as machine learning, to complement existing analytics capabilities, in addition to custom content focused on specific types of threats, such as ransomware or threat profiles modeled after their tactics, techniques and procedures. UEBA technologies (see “Market Guide for User and Entity Behavior Analytics”) have been quickly embraced by existing SIEM vendors (either via self-developed technology or acquisition, or through white labeling), in addition to UEBA vendors that have pivoted to the SIEM technology market. Machine-readable threat intelligence is increasingly made available, both with the core SIEM solution and as a premium feature. However, the quality of out-of-the-box threat intelligence and support for third-party feeds varies among vendors.
-
At the operational tier, SIEM solution buyer requirements are driving demand for more sophisticated case and incident management features, as well as ways to measure, track, report on and improve the mean time to detect (MTTD) and mean time to respond (MTTR) to threats. The automation of specific activities done manually by SIEM tool users in both investigating events and alerts, as well as in initiating response actions, strongly aligns to the SOAR tool market and its use cases. As a result, SOAR features (see “Innovation Insight for Security Orchestration, Automation and Response”) are starting to be added to SIEM solutions in a trajectory similar to the adoption of UEBA — via acquisitions, white-label partnerships, third-party integrations and native development.
Product/Service Class Definition
-
The collection of security event information from a wide variety of sources in a central repository where it can be processed and stored in various forms (e.g., raw version, enriched, normalized)
-
Real-time and historical analysis, and alerting of potential threats
-
Reporting and dashboards
-
Searching across historical data for forensics and threat hunting
-
Workflow and case management
-
Integrations and automation for extending the value proposition and achieving more functionality
-
Monitor, correlate and analyze activity across multiple systems and applications
-
Discover external and internal threats
-
Monitor the activities of users and specific types of users, such as those with privileged access (both internal and third parties), and users with access to critical data assets such as intellectual property, and executives
-
Monitor server and database resource access, and offer some data exfiltration monitoring capabilities
-
Provide compliance reporting
-
Provide analytics and workflow to support incident response, and increasingly the ability to orchestrate and automate actions and workflows, powering SOC types of use cases
Critical Capabilities Definition
Architecture/Deployment/Scalability
Cloud Readiness
Operations and Support
Data Management Capabilities
Analytics Capabilities
Response and Incident Management
Content Packaging and Management
Forensics and Threat Hunting
User Experience and User Interface
Use Cases
Basic Searching and Reporting
Compliance and Control Monitoring
Basic Security Monitoring
Complex Security Monitoring
Advanced Threat Detection and Response
Vendors Added and Dropped
Added
Dropped
Inclusion Criteria
-
The product must provide SIM and security event management capabilities to end-user customers via software and/or appliance and/or SaaS.
-
The SIEM features, functionality and add-on solutions must be generally available as of 31 July 2019.
-
The product must support data capture and analysis from heterogeneous, third-party sources (that is, other than from the SIEM vendors’ products/SaaS), including from market-leading network technologies, endpoints/servers, cloud (IaaS, SaaS) and business applications
-
The vendor must have SIEM (product/SaaS license and maintenance, excluding managed services) revenue exceeding $32 million for the 12 months prior to 30 June 2019, or have 100 production customers as of the end of that same period. Production customers are defined as those who have licensed the SIEM and are monitoring production environments with the SIEM. Gartner requires that vendors provide a written confirmation of achievement of this requirement and others that stipulate revenue or customer thresholds. The confirmation must be from an appropriate finance executive within the organization.
-
The vendor must receive 15% of SIEM product/SaaS revenue for 12 months prior to 30 June 2019 from outside the geographical region of the vendor’s headquarters location, and must have at least 10 production customers in each of at least two of the following geographies: North America, EMEA, the Asia/Pacific region or Latin America.
-
The vendor must have sales and marketing operations (via print/email campaigns and/or local language translations for sales/marketing materials) targeting at least two of the following geographies as of 30 June 2019: North America, EMEA, the Asia/Pacific region or Latin America.
-
Capabilities that are available only through a managed service relationship — that is, SIEM functionality that is available to customers only when they sign up for a vendor’s managed security or managed detection and response or managed SIEM or other managed service offering. By “managed services,” we mean those in which the customer engages the vendor to establish, monitor, escalate and/or respond to alerts/incidents/cases.
Table 1: Weighting for Critical Capabilities in Use Cases
Critical Capabilities
|
Basic Searching and Reporting
|
Compliance and Control Monitoring
|
Basic Security Monitoring
|
Complex Security Monitoring
|
Advanced Threat Detection and Response
|
---|---|---|---|---|---|
Architecture/Deployment/Scalability
|
5%
|
5%
|
10%
|
15%
|
15%
|
Cloud Readiness
|
5%
|
5%
|
5%
|
5%
|
5%
|
Operations and Support
|
10%
|
10%
|
10%
|
10%
|
5%
|
Data Management Capabilities
|
15%
|
15%
|
15%
|
15%
|
15%
|
Analytics Capabilities
|
5%
|
10%
|
10%
|
15%
|
20%
|
Response and Incident Management
|
5%
|
5%
|
10%
|
10%
|
20%
|
Content Packaging and Management
|
5%
|
25%
|
15%
|
10%
|
5%
|
Forensics and Threat Hunting
|
20%
|
5%
|
5%
|
10%
|
10%
|
User Experience and User Interface
|
30%
|
20%
|
20%
|
10%
|
5%
|
Total
|
100%
|
100%
|
100%
|
100%
|
100%
|
Critical Capabilities Rating
Table 2: Product/Service Rating on Critical Capabilities
Critical Capabilities
|
AT&T Cybersecurity
|
Dell Technologies (RSA)
|
Exabeam
|
FireEye
|
Fortinet
|
HanSight
|
IBM
|
LogPoint
|
LogRhythm
|
ManageEngine
|
McAfee
|
Micro Focus
|
Rapid7
|
Securonix
|
SolarWinds
|
Splunk
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Architecture/Deployment/Scalability
|
3.0
|
3.4
|
3.9
|
3.2
|
2.8
|
2.8
|
4.1
|
2.5
|
3.8
|
2.3
|
3.3
|
2.9
|
3.5
|
4.0
|
2.3
|
4.0
|
Cloud Readiness
|
3.1
|
3.5
|
4.1
|
3.4
|
2.5
|
2.7
|
4.1
|
2.7
|
3.6
|
2.4
|
3.2
|
2.9
|
3.1
|
4.1
|
1.8
|
4.0
|
Operations and Support
|
3.2
|
3.6
|
4.5
|
3.5
|
3.1
|
3.0
|
4.7
|
2.8
|
4.0
|
2.5
|
3.4
|
3.3
|
3.7
|
4.4
|
2.4
|
4.2
|
Data Management Capabilities
|
2.9
|
3.4
|
4.0
|
2.9
|
2.8
|
2.8
|
4.0
|
2.5
|
3.5
|
2.3
|
3.1
|
2.9
|
3.3
|
3.9
|
2.3
|
4.0
|
Analytics Capabilities
|
2.4
|
3.6
|
4.3
|
3.0
|
2.8
|
3.1
|
4.1
|
2.7
|
3.5
|
2.6
|
3.0
|
3.3
|
3.5
|
4.5
|
2.1
|
4.0
|
Response and Incident Management
|
2.7
|
3.3
|
4.0
|
3.3
|
2.7
|
2.8
|
3.8
|
2.7
|
3.5
|
2.3
|
2.9
|
3.0
|
3.2
|
3.9
|
1.8
|
3.7
|
Content Packaging and Management
|
2.7
|
3.3
|
3.9
|
3.1
|
2.7
|
2.7
|
4.0
|
2.5
|
3.5
|
2.4
|
3.0
|
2.9
|
3.3
|
3.9
|
2.2
|
3.7
|
Forensics and Threat Hunting
|
2.8
|
3.4
|
4.0
|
3.3
|
2.7
|
2.8
|
3.7
|
2.6
|
3.5
|
2.3
|
2.9
|
2.9
|
3.2
|
4.0
|
1.8
|
3.6
|
User Experience and User Interface
|
2.6
|
3.3
|
3.9
|
3.1
|
2.7
|
2.7
|
3.9
|
2.5
|
3.4
|
2.3
|
3.0
|
2.9
|
3.3
|
3.9
|
2.1
|
3.7
|
Table 3: Product Score in Use Cases
Use Cases
|
AT&T Cybersecurity
|
Dell Technologies (RSA)
|
Exabeam
|
FireEye
|
Fortinet
|
HanSight
|
IBM
|
LogPoint
|
LogRhythm
|
ManageEngine
|
McAfee
|
Micro Focus
|
Rapid7
|
Securonix
|
SolarWinds
|
Splunk
|
||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Basic Searching and Reporting
|
2.79
|
3.40
|
4.03
|
3.18
|
2.76
|
2.80
|
3.99
|
2.58
|
3.54
|
2.35
|
3.06
|
2.97
|
3.33
|
4.02
|
2.09
|
3.82
|
||||
Compliance and Control Monitoring
|
2.77
|
3.40
|
4.04
|
3.14
|
2.76
|
2.80
|
4.05
|
2.58
|
3.55
|
2.38
|
3.07
|
2.99
|
3.35
|
4.03
|
2.15
|
3.85
|
||||
Basic Security Monitoring
|
2.79
|
3.40
|
4.04
|
3.16
|
2.77
|
2.81
|
4.04
|
2.59
|
3.57
|
2.37
|
3.08
|
2.99
|
3.36
|
4.04
|
2.14
|
3.87
|
||||
Complex Security Monitoring
|
2.80
|
3.43
|
4.07
|
3.17
|
2.78
|
2.84
|
4.05
|
2.60
|
3.59
|
2.38
|
3.09
|
3.01
|
3.37
|
4.08
|
2.13
|
3.89
|
||||
Advanced Threat Detection and Response
|
2.77
|
3.43
|
4.07
|
3.16
|
2.76
|
2.86
|
4.00
|
2.62
|
3.57
|
2.38
|
3.06
|
3.02
|
3.35
|
4.08
|
2.08
|
3.88
|
Critical Capabilities Methodology
Magic Quadrant for Security Information and Event Management
Magic Quadrant for Security Information and Event Management
Published 18 February 2020 – ID G00381093 – 72 min read
https://www.gartner.com/doc/reprints?id=1-5WG67KN&ct=181205&st=sb
Market Definition/Description
Magic Quadrant
Vendor Strengths and Cautions
AT&T Cybersecurity
Strengths
-
Deployment: The SaaS form factor, combined with predefined content for detections and dashboards, offers relatively quick deployment and initial operation, compared with on-premises SIEM.
-
Operations: Detection content is updated frequently by the vendor. The USM Anywhere detection rules and dashboards are updated weekly, based on the findings of the AT&T Alien Labs threat intelligence team.
-
Product: AT&T Cybersecurity offers strong integrations with its own technologies for endpoint agent deployment/management, network intrusion detection, vulnerability scanning/asset discovery and threat intelligence. Native file integrity monitoring (FIM) and EDR capability is above average, although support for third-party solutions is more limited than that of many of its competitors.
-
Product: Customers that must manage data residency requirements for multiple geographic regions can monitor 13 Amazon Web Services (AWS) regions, with central management available via the USM Central App. Data residency is supported in nine countries: the U.S., Ireland, Germany, Japan, Australia, U.K., Canada, India and Brazil.
Cautions
-
Market Understanding: AT&T Cybersecurity must manage a complex go-to-market approach for security monitoring. AT&T Cybersecurity offers SaaS SIEM and a managed security offering to end users; however, it competes with a large number of third-party service providers that offer managed services to end users via USM Appliance. AT&T Cybersecurity must create clear messaging regarding its target buyers, and how those buyers can get managed services support for their monitoring solutions. In addition, vendors must balance investments in capabilities relevant to MSE buyers with those relevant to managed services providers, because these target markets typically have differing priorities for features and functions.
-
Product: Out-of-the-box integrations relevant to enterprise SIEM deployments are missing or limited. USM Anywhere does not integrate with identity repositories for user authentication, nor is there integration with ERP solutions or third-party, big data platforms or security orchestration, automation and response solutions. Other integrations, via the AlienApps ecosystem, are limited. Support for infrastructure as a service (IaaS) monitoring depends on the deployment of USM Anywhere sensors in AWS and Azure, and Google Cloud Platform (GCP). Monitoring of SaaS via AlienApps is limited to Microsoft Office 365, Google G Suite, Box and Okta, and a handful of others.
-
Product: USM Anywhere support for user monitoring is basic, compared with many of its competitors. The product does not have native user and entity behavior analytics (UEBA) capability, nor does it provide integrations with third-party UEBA solutions.
-
Product: There is no feature parity between USM Appliance and USM Anywhere, with more development funding being invested in USM Anywhere.
-
Customer Experience: AT&T Cybersecurity received clearly mixed reviews for service and support, log management/reporting, and for real-time monitoring from customers, based on Gartner customer feedback via inquiry, and Peer Insights and vendor references.
Dell Technologies (RSA)
-
RSA NetWitness Endpoint — based on the number of endpoints
-
RSA NetWitness UEBA — based on the number of users monitored
-
RSA NetWitness Network — based on metered volume or legacy appliance capacity
-
RSA NetWitness Orchestrator (Demisto OEM reviewed in this research) — based on the number of security analysts
Strengths
-
Deployment: Organizations can mix and match appliances, virtual appliances and software to build functional stacks, enabling flexible deployments and horizontal scalability capabilities.
-
Product: This is mature technology that’s well-suited to advanced threat defense (ATD) use cases, thanks to multistage analytics encompassing RSA NWP’s wide portfolio of additional, natively integrated solutions for ubiquitous view and analytics across endpoints and networks.
-
Product: RSA NWP offers a multistage analytics engine with interesting, unsupervised modeling capabilities across endpoints, network and users.
-
Product: RSA NWP has a strong feature set in support of forensics and threat hunting, with ubiquitous access of forensics artifacts across a wide RSA technology stack — e.g., fetch running process list from endpoints, or packet capture (PCAP) analysis natively inside the NWP user interface (UI).
-
Deployment/Support: RSA offers RSA Live accessible directly from the NWP console, for access to all RSA NWP content.
-
Sales Execution: RSA has an extensive worldwide ecosystem of channel partners and service providers offering local support for NWP, for integration, management and/or operations.
Cautions
-
Product Strategy: RSA’s NWP SOAR strategy is based on OEM relationships in a dynamic market (Demisto before the Palo Alto Networks acquisition, and Threat Connect after. RSA indicated they will support Demisto for several years). Clients should validate that RSA’s SOAR partner fits their requirements.
-
Product: The UEBA capabilities offer fewer models than some of its competitors. RSA NetWitness’s Network UEBA models are slated for release in 1Q20.
-
Deployment/Support: RSA NWP is not available from the vendor as a SaaS offering, although some RSA partners offer that capability. Organizations that want a vendor-delivered SaaS SIEM may find limitations in the product and should be comfortable with its cloud security roadmap.
-
Product: Compared with competitors targeting the midmarket, the RSA NetWitness Platform is more complex to deploy and operate for less-mature buyers.
Exabeam
-
A single UI for Advanced Analytics, Threat Hunter, Case Manager and Incident Responder
-
Threat intelligence services delivered via the cloud
-
Better alignment with the MITRE ATT&CK framework
-
Improved alert triaging, allowing for richer user and entity context with alerts
-
Risk-score-based activities related to an alert
Strengths
-
Deployment/Support: SMP enables phased adoption of capabilities that can start with a core SIEM (Data Lake, Advanced Analytics, Case Manager), then expand to Incident Responder for SOAR or Cloud Connectors for SaaS and IaaS use cases.
-
Product: Exabeam SMP provides a strong foundation for monitoring users, entities and identities. This is performed by the core analytics module (Advanced Analytics) via the native UEBA features in the application (e.g., peer group analysis and monitoring for deviations in behavior).
-
Product: Exabeam’s Smart Timelines supports less-experienced SIEM users by leveraging machine learning (ML) to organize relevant logs and events in a timeline view, which simplifies investigation and response activities.
-
Sales: Exabeam’s pricing model is simple. It reduces the buying friction, because it’s not based on volume, but rather on the number of employees in the organization per product, except for Entity Analytics, which is licensed by number of assets.
-
Market Understanding: Exabeam has demonstrated strong growth and increased visibility with Gartner clients, primarily in North America, through its marketing efforts.
-
Customer Experience: In Gartner customer inquiry, Peer Insights and vendor references, customers give positive evaluations of several elements, such as deployment and support services, evaluation and contract negotiation, and stronger-than-typical marks for behavior analytics.
Cautions
-
Market Understanding: Although it has sales operations in multiple geographies, Exabeam is still predominantly purchased by buyers in North America. Buyers outside of North America should validate coverage for sales, professional services and support (whether direct or through partners) for their organizations’ locations.
-
Market Understanding: Exabeam is still building out its partner network, especially for services such as managed SIEM. Buyers looking for an SIEM-plus-services engagement should confirm the companies Exabeam has identified as partners that are trained/certified, and can address operational and use-case development requirements.
-
Marketing Execution: Exabeam should better define capabilities relevant to buyers in vertical industries in which the challenges may be different from those of the general buying public (e.g., energy and utilities). Buyers looking for vertical-specific capabilities should confirm that there is appropriate coverage with Exabeam SMP — e.g., content specific to their verticals in the form of out-of-the-box detections and compliance report templates.
-
Customer Experience: Based on Gartner inquiry feedback, Peer Insights and vendor references, Exabeam can improve on its integration and deployment, and ease of customization of existing rules, predefined reports, and product quality and stability in SMP.
FireEye
Strengths
-
Product: Helix includes packaged queries, curated by FireEye, to provide next-step guidance for investigations. More-extensive playbooks and response integrations are available with the FireEye Security Orchestrator.
-
Product: FireEye provides an extensive, open API that enables access to all elements available through the UI, which enables users to develop integrations and programmatically interact with the solution.
-
Deployment/Support: The Helix platform has an extensive set of threat detection rules managed by FireEye and updated daily based on the vendor’s strong threat intelligence data acquisition capabilities.
-
Product: Integrations with the FireEye Endpoint (formerly HX), Network (formerly NX) and Email products for endpoint, network and email forensics provide extensive capabilities for investigations based on forensic data. FireEye threat intelligence is fully integrated, and additional FireEye utilities support evidence collection (Evidence Collector) and response actions (FireEye Security Orchestration).
-
Deployment/Support: FireEye’s Managed Detection and Response service offering enables customers to use the Helix platform to perform their own searches and investigations, with 24/7 monitoring and response support from the vendor.
-
Product: FireEye references give positive marks for most capabilities of the product. There is limited feedback from Gartner customers via inquiry or Peer Insights.
Cautions
-
Product: Support for IaaS and SaaS threat detection is less mature than several competitors. Helix provides detection rules for AWS and Microsoft Office 365, but not yet for other popular IaaS and SaaS applications.
-
Deployment/Support: Helix’s event acquisition features are not as mature as those of many of its competitors. Helix lacks autodiscovery of event sources, and there is no capability for end users to develop new parsers. Log management capabilities depend on the features available from the underlying AWS platform. Customers should validate that the data management available on the AWS platform is sufficient for their requirements.
-
Product: Compliance reporting capabilities are limited, compared with those of more-established competitors — e.g., there are dashboards only for Payment Card Industry Data Security Standard (PCI DSS) and Health Insurance Portability and Accountability Act (HIPAA) mandates.
-
Product: FireEye is growing its technology partner ecosystem, but not all integrations are available throughout the FireEye portfolio. Potential customers should validate that the third-party integrations available with FireEye products — through Security Orchestration, the Helix platform, or the FireEye Network, FireEye Endpoint or other products — support the use cases required.
Fortinet
-
FortiSIEM Advanced Agent — an agent for Windows and Linux, with some FIM and EDR capabilities
-
FortiGuard IoC — a for-pay threat intelligence subscription feed
-
FortiInsight — a for-pay, pure-play UEBA tool derived from the ZoneFox acquisition
Strengths
-
Product Strategy: Fortinet FortiSIEM will appeal to Fortinet-centric organizations, because it directly integrates with several of Fortinet’s technologies (e.g., endpoint, sandbox, mail and deception) via the Fortinet Security Fabric for bidirectional automated remediation actions.
-
Product: Fortinet FortiSIEM offers a solid set of compliance packages natively out of the box (e.g., PCI, COBIT, SOX, ISO, ISO 27001, HIPAA, GLBA, FISMA, NERC, GPG13 and SANS), as well as IT operations and network operations use cases via packaged content.
-
Product: Fortinet FortiSIEM has powerful asset discovery features and can automatically build an organization’s configuration management database (CMDB) by actively scanning the environment and passively listening to network traffic.
-
Product: Fortinet FortiSIEM delivers on most nonadvanced security use cases, but can also be used as an IT operations and network operations tool, due to its performance and availability monitoring and CMDB capabilities.
-
Customer Experience: Overall customer satisfaction with FortiSIEM in Gartner inquiry feedback and Peer Insights is generally positive, and aligned with that of many competitors, with higher marks than several competitors for the product’s threat intelligence capabilities.
-
Sales Strategy: Fortinet has a partner program for MSSP with pay as you go (PAYG) partnership models that can encourage MSSPs to deliver FortiSIEM as a service.
Cautions
-
Product Strategy: Fortinet customers planning to support OT/Internet of Things (IoT) monitoring will need to use partner products to parse events and integrate CMDB information.
-
Product Strategy: Fortinet FortiSIEM’s cloud security functional coverage is not as strong as other competitors — e.g., it lacks support for GCP and IBM Cloud.
-
Product: Fortinet FortiSIEM’s real-time advanced analytics capabilities lag those of some competitors — for example, it can’t dynamically establish peer groups. FortiInsight offers more UEBA features, but only for endpoints running FortiInsight agent.
-
Product: Organizations looking to use Fortinet FortiSIEM as a case and incident management platform for forensics or threat hunting will find that the case creation and management is less intuitive than other tools, and there are no native integrations with threat-hunting tools.
-
Sales Strategy: Fortinet does not offer SaaS SIEM. Clients seeking it will need to use Fortinet’s MSSP partner.
-
Customer Experience: Customers express lower satisfaction with FortiSIEM sales/support-related areas. This may indicate that Fortinet’s partner-led go-to-market strategy is not as strong for SIEM as for other products.
HanSight
Strengths
-
Product: HanSight offers a strong ecosystem of technologies that complement its core SIEM solution, which will appeal to organizations looking to instrument a modern security operations center (SOC) from a single vendor.
-
Product: The platform leverages modern big data technologies and approaches, and also offers a version delivered as a service.
-
Product: HQL and the search function include features such as an integrated development environment (IDE)-style analysts’ notebook capability, as well as the ability to share saved searches via quick response (QR) code.
-
Customer Experience: Based on Gartner Peer Insights and vendor customer references, users give above-average scores for service and support, compared with the competition, especially for support.
Cautions
-
Operations: HanSight primarily competes in the Chinese market and has limited visibility outside that market. Channel partners outside the APAC region are limited to Latin America. There is no direct sales channel in North America or Europe.
-
Product: Monitoring coverage is still variable. There is good coverage for cloud environments, including AWS and Alibaba; however, support for virtual environments, such as VMware and Hyper-V, is not yet available, nor is data collection from Azure.
-
Product Strategy: Some features and functionality (e.g., threat intelligence management) are localized to Chinese and are unavailable in other languages.
-
Customer Experience: Based on feedback from Gartner Peer Insights and vendor references, log management and incident management capabilities are areas for improvement.
IBM
-
IBM QRadar Vulnerability Manager — integration of vulnerability assessment data
-
IBM QRadar Network Insights — QFl application visibility and packet content inspection
-
QRadar Risk Manager — network device configuration monitoring and threat simulation capabilities
-
IBM QRadar User Behavior Analytics (UBA) — a free add-on module that addresses some insider threat use cases
-
IBM QRadar Incident Forensics — forensic investigation support
-
IBM QRadar Advisor with Watson — advanced-analytics-based root cause identification and attribution engine
-
The number of flows for IBM QRadar Network Insights
-
The number of assets in scope for IBM QRadar Vulnerability Manager
-
The number of systems from which configuration data is pulled for IBM QRadar Risk Manager
Strengths
-
Sales Strategy: IBM has extensive internal resources and partnerships to support sales, deployment and operational support, including managed services for QRadar, across multiple geographic regions.
-
Deployment/Support: QRadar offers users extensive options in deployment architecture, with a choice of form factors that can be deployed in various combinations. These include physical and virtual appliances that can be all-in-one and separate components, as well as bring-you-own-license for cloud deployment. The exception is the Network Insights component, which is available as a physical appliance only.
-
Operations: QRadar has extensive open API to enable customers and partners to develop integrations with the platform. The app marketplace has extensive integrations provided by IBM and by third parties.
-
Product: QRadar offers strong capabilities for managing the collection of events. Users can configure logging to automatically detect multiple event formats, with options to filter them, forward them to real-time analytics or to bypass the analytics tier and send to the data store. Direct forwarding of events to the data store does not contribute to the EPS licensing metric.
-
Sales Strategy: QRadar includes UBA in the base licensing for QRadar, so there is no additional cost to acquire UBA.
-
Product: The QRadar Advisor with Watson offers strong support for incident investigation by providing context enrichment from internal and external sources, suggesting next steps based on attacker actions and prioritizing alerts for further action.
Cautions
-
Pricing: The several licensing models and pricing schemes for the various components associated with the QRadar platform present a complex set of choices for potential customers. Models include perpetual and term licensing, based on several factors that include data velocity, number of assets, and whether the technology is deployed on-premises or in the IBM cloud. A QRadar solution might include a mix of perpetual and term licensing, depending on the technology and deployment choices.
-
Product Strategy: QRadar offers limited options for data collection for forensics from endpoints/hosts. IBM’s lack of native EDR capability is in contrast with the fuller capabilities for network monitoring. Customers must deploy third-party products or rely on its WinCollect agent or Sysmon for Windows collection.
-
Operations: The modernization of the user experience (UX) for QRadar is still a work in progress, and the UI is not consistent across the various components of the platform.
-
Pricing: IBM is demonstrating increasing reliance on their add-on products, available for additional cost, such as Resilient and QRadar Advisor for incident response capabilities, such as prioritization, investigation, context assembly and other response actions.
-
Innovation: The components of the QRadar platform are at differing levels of maturity and integration with other components and with new IBM cloud management offerings. Users should confirm that roadmap commitments for capabilities relevant to their own operations are on track.
-
Customer Experience: Based on Gartner customer feedback via inquiries, Peer Insights reviews and vendor references, QRadar’s analytics and behavior profiling, and the vendor’s sales/contracting processes are areas for improvement.
LogPoint
-
LogPoint Core SIEM
-
LogPoint UEBA
-
LogPoint Director (which includes Console and Fabric)
-
LogPoint Applied Analytics
Strengths
-
Pricing: LogPoint will appeal to organizations looking for an SIEM vendor with predictable pricing based on number of assets. LogPoint offers special pricing models for selected verticals. As an example, LogPoint offers hospitals a fixed fee based on the number of beds, municipalities a fixed fee based on the number of inhabitants, and universities a fixed fee based on the number of students.
-
Product Strategy: LogPoint is an EMEA-based SIEM provider with an acute appreciation of privacy requirements that delivers advanced features in data masking and obfuscation for GDPR and CCPA requirements. LogPoint is the only SIEM that has obtained a Common Criteria EAL 3+ certification.
-
Product: LogPoint offers two stages of enrichment of data: at ingest time for static data (e.g., IP to MAC) and at time of search, with latest available threat intelligence.
-
Sales/Partner Strategy: LogPoint has developed a dense ecosystem of channel and MSSP partners in Europe, making LogPoint widely available as a product or a service.
-
Product: LogPoint is natively multitenant through a federated model in which each tenant is connected to a management fabric, facilitating adoption by MSSPs.
-
Market Understanding: LogPoint has carved some niche markets with interesting capabilities and security use cases for organizations extensively using SAP, or utilities using specific IoT equipment, such as Siemens wind turbines.
Cautions
-
Sales Execution: LogPoint’s U.S. expansion remains nascent; LogPoint has less visibility among Gartner’s North American clients, and outside EMEA generally.
-
Product Strategy: Although LogPoint is natively available as ready-to-run images for AWS and Azure, the SIEM is not available as SaaS from LogPoint, but UEBA is only available as SaaS.
-
Product Strategy: LogPoint makes extensive use of query languages for rules, dashboards and alerts, which require training and familiarity with the syntax.
-
Product: Case management and SOC collaboration features are basic and might not support all aspects of SOC operations. Integrations are provided with several SOAR products.
-
Product: Clients looking to get advanced analytics capabilities for typical UEBA use cases, such as user monitoring need to be ready to purchase the additional UEBA module as the core SIEM’s native ML capabilities are limited.
-
Product: Collection and parsing for custom-made data sources (e.g., custom business applications) is done via “plug-ins,” which need to be developed by LogPoint or configured by the customer. Cloud monitoring feature set is emerging — for example, there is no support for GCP or IBM Cloud.
LogRhythm
Strengths
-
Product Strategy: LogRhythm offers a single-vendor-ecosystem approach for buyers that want a unified solution that includes core SIEM, network monitoring, endpoint monitoring and UEBA.
-
Deployment/Operations: The range of professional services, from onboarding to ongoing support, is extensive. LogRhythm customers can take advantage of various co-pilot products to provide additional support for initial implementation, and for ongoing operations and use of the solutions.
-
Deployment: LogRhythm has a strong set of options for running its core SIEM solution, including physical hardware, software (for installation on-premises or in IaaS, such as AWS, Azure and Google Cloud), and as SaaS.
-
Product: LogRhythm offers an extensive range of compliance reports across a variety of industries and regulations worldwide.
-
Customer Experience: LogRhythm customers offer generally positive feedback on product capabilities.
Cautions
-
Product Strategy: LogRhythm continues to lag competitors in areas such as moving the platform toward a modern SIEM architecture (e.g., it’s still a mix of Windows Server, MS SQL and Linux OS), and the lack of a dedicated SOAR offering.
-
Market Understanding: Support for monitoring in IaaS is lagging, compared with competitors. It’s unclear whether API, Sysmon or other agents (e.g., Beats) may be the preferred mechanism to collect data out of cloud services provider (CSP) environment.
-
Marketing Execution: LogRhythm has added new branding on top of its product names, with the XDR Stack branding. However, this adds more complexity into an existing mix of product names and features (Next Gen SIEM, CloudAI [for UEBA], Sysmon, Netmon, LogRhythm Cloud, AI Engine, etc.). Buyers should validate what is being proposed to them and determine whether the products and components meet their use cases and requirements.
-
Product: Customers that require on-premises-only deployments will need to address the cloud-only delivery of CloudAI capabilities.
-
Customer Experience: Feedback from Gartner customer inquiries, from Peer Insights review and from vendor references on capabilities, such as the usefulness of predefined reports and the effectiveness of predefined rules represent opportunities for improvement. Customers offer mixed feedback on deployment and support ease.
ManageEngine
-
ManageEngine ADAudit Plus — Active Directory (AD) change auditing and reporting
-
ManageEngine EventLog Analyzer — central log management
-
ManageEngine Cloud Security Plus — central log management (CLM) and SIEM for AWS and Azure
-
ManageEngine Log360 UEBA
-
ManageEngine DataSecurity Plus — data discovery and file server auditing
-
ManageEngine O365 Manager Plus — Office 365 security and compliance
-
ManageEngine Exchange Reporter Plus — Exchange Server change audits and reporting
-
The ability to create and manage incident workflows
-
Integration with ManageEngine Log360 UEBA — providing user activity anomaly detection capabilities, storage optimization and the indexing of performance improvements
-
The addition of the DataSecurity Plus module — providing data discovery, file storage analysis and Windows file server auditing capabilities
Strengths
-
Product: ManageEngine provides above-average compliance reporting, including PCI DSS, HIPAA, FISMA, SOX, GLBA, GDPR, and several other industry- and region-specific mandates that are included out of the box.
-
Product: Log360 supports automatic discovery of syslog devices on a customer network, which can be added to the event sources monitored by the solution.
-
Operations: Several response workflows are included with Log360. Actions associated with these include blocking USBs, disabling users and killing processes. Some actions may require other ManageEngine products.
-
Customer Experience: ManageEngine customers, based on Gartner Peer Insights data and vendor-supplied reference data, indicate generally strong satisfaction with ManageEngine and the capabilities of Log360. Areas where there is room for improvement include those identified in the Cautions section, such as integrations with other products, and user, data and application monitoring.
Cautions
-
Product Strategy: Several integrations relevant to enterprise SIEM deployments are missing or limited. There is no support for security orchestration, automation and response solutions, FIM or EDR products, UEBA products, or ERP solutions. Log360 does not have open APIs to support customer integrations.
-
Product: Data monitoring support is limited to MS SQL and Oracle logs, with no support for DLP or database audit and protection (DAP). Network-based monitoring is only supported via third-party solutions.
-
Product: Support for management of log data is limited. For example, Log360 does not support multiple log data retention policies.
-
Product: User monitoring is a work in progress. The ADAudit Plus product provides AD monitoring, and ManageEngine has added basic anomaly detection and risk scoring. However, richer UEBA capabilities are not available.
-
Product: Support for ATD is limited. Payload detection, network traffic analysis and forensics support require third-party products.
McAfee
Strengths
-
Product Strategy: McAfee offers integration among its broad portfolio of solutions addressing security operations and can complement McAfee ESM (e.g., McAfee Threat Intelligence Exchange, or McAfee Active Response for advanced orchestration capabilities).
-
Product: McAfee ESM offers powerful bidirectional integrations for automated responses with McAfee MVISION EDR, Advanced Threat Defense (ATD), Network Security Platform (NSP) and Web Gateway (MWG).
-
Product Strategy: McAfee’s ecosystem of technology alliances (McAfee SIA) offers more than 115 active partners, of which 44 are direct ESM integrations or content contributors.
-
Product: McAfee ESM data acquisition and management feature set is particularly strong — for example, implementing McAfee’s Data Streaming Bus scalability, and support for federated organizations with complex governance requirements.
-
Sales Strategy: McAfee enjoys a strong global presence — for example, in EMEA, with a dense ecosystem of channel and services partners available to organizations requiring consulting, implementation, operations and/or managed services.
Cautions
-
Product: McAfee ESM lacks UEBA, and its UBA content pack affords a limited set of use cases. There is no dynamic peer grouping done by the tool.
-
Product: Although McAfee ESM can provide analytics-based risk scores for suspicious events, the product lags competitors in mapping of these events against frameworks such as Cyber Kill Chain or MITRE ATT&CK to create a timeline of an attack.
-
Product: McAfee’s ESM native SOAR capabilities for response and playbook automation outside McAfee’s portfolio (e.g., MVISION EDR, McAfee Active Response, McAfee Advanced Threat Defense) lag those of competitors.
-
Product: Clients should validate that ESM will support their data governance requirements. There is no native encryption for the data stored (data at rest) in ESM. Masking/obfuscation capabilities for data at rest are limited to IP addresses for events stored in the event database.
Micro Focus
Strengths
-
Product Strategy: Micro Focus acquired Interset UEBA in February 2019, adding an in-house UEBA capability that may be integrated more tightly with the ArcSight SIEM. The Interset technology replaces the OEM version of Securonix previously sold with ArcSight.
-
Product Strategy: The ArcSight platform supports large enterprises and service providers with environments that require scalable and distributed architectures that can prefilter, and then ingest data at high velocities, along with flexible data-routing options — e.g., Logger, Investigate or a stand-alone Elasticsearch environment.
-
Product: ArcSight has a comprehensive set of out-of-the-box compliance use cases and support for mapping events to MITRE ATT&CK.
-
Customer Experience: Reference customers give above-average marks to ArcSight’s real-time monitoring capabilities and its ease of customizing correlation rules.
Cautions
-
Product: Micro Focus must invest in capability upgrades to the ArcSight platform, such as improving the UI/UX and further integrating the Interset product. Buyers and existing ArcSight customers should evaluate the roadmap from Micro Focus to confirm that it will meet their current and planned requirements.
-
Innovation: Micro Focus is lagging competing vendors offering native SOAR capabilities, a SaaS offering, and deeper support for monitoring IaaS and SaaS and other new environments of concern to customers, such as OT and IoT.
-
Deployment: Deployment options for the solution vary by component. Connectors, Logger and ESM are available as software and physical appliances. There are images available for ArcSight Management Center, ESM and Logger in AWS and Azure. Investigate and Transformation Hub have completed the containerization process. No SaaS options are available to buyers.
-
Sales Execution: Based on Gartner customer inquiry, Micro Focus ArcSight rarely appears on shortlists for new SIEM deployments outside the Middle East and India.
-
Customer Experience: Based on Gartner customer inquiries, Peer Insights reviews and vendor references, Micro Focus needs improvement in sales/contracting and technical support. The same sources indicate that product functions that lag those of competitors include deployment and support simplicity, behavior profiling, analytics, query/investigation capabilities, workflow, and case management.
Rapid7
Strengths
-
Deployment and Support: InsightIDR is a SaaS offering, and requires only the deployment of endpoint agents or collectors on-premises. The architecture provides for relatively easy customer proof of concept (POC) engagements, and fast rollover into production use. Rapid7 manages all patches and platform updates, as well as detection, response and report content updates.
-
Product Strategy: Rapid7’s portfolio of complementary technologies (e.g., vulnerability management and SOAR) helps organizations address several aspects of security operations, including threat detection and response. For those clients still concerned with 24/7 monitoring of their Rapid7 environment, Rapid7 can offer managed services for threat detection and response based on InsightIDR.
-
Product: InsightIDR offers strong support for UBA, with out-of-the-box use cases based on anomalous activities. In general, there is a user-centric lens in the incident identification and investigation features of the product, because context and risk scores for users are available to analysts throughout.
-
Product: Native support for FIM and endpoint is strong, compared with that of competitor vendors. The endpoint agent can also be used to deploy deceptive credentials, a differentiator among SIEM products.
-
Customer Experience: Based on feedback from Gartner customer inquiry, Peer Insights reviews and vendor references, Rapid7 users give the vendor generally strong marks, and especially strong for simplicity of deployment (and POC engagements).
Cautions
-
Product Strategy: InsightIDR has integrations among the technology components of the Insight platform, but a relatively small technology alliance ecosystem. Bidirectional integrations with third-party detection, analytics and response technologies are limited, and there are no integrations with big data platforms. The InsightConnect product is required to enable additional integrations with response and bidirectional technologies.
-
Product Strategy: Reliance on agents for log collection limits support for OT/IoT use cases to InsightIDR’s honeypot deployments. The acquisition of Netfort may bring additional capabilities to these use cases via network monitoring.
-
Market Understanding: InsightIDR does not support data masking for obfuscation, although logs can be tokenized. Potential customers should validate that the InsightIDR data collection and analysis features support compliance with specific privacy requirements.
-
Product: InsightIDR runs on top of AWS, and log management, encryption and archiving depend on the capabilities of that platform and are subject to the licensing conditions of the platform. Customers should validate that the log archiving/management capabilities of InsightIDR align with their own requirements.
-
Customer Experience: Feedback from Gartner customers via inquiry, Peer Insights reviews and vendor references indicate that application monitoring and the availability of third-party resources for services are areas for improvement.
Securonix
Strengths
-
Product Strategy: Securonix has strong cloud support and commitment. Its SIEM is cloud-native and is offered as a service, with three different tenant models (shared, dedicated and isolated).
-
Product: Securonix offers multilayer analytics, with UEBA capabilities for advanced analytics and behavior modeling across both users and entities, support for complex and advanced use cases (e.g., APT, insider threat and fraud), and mapping of detected attacks to common frameworks, such as the MITRE ATT&CK framework.
-
Product Strategy: Securonix provides extensive out-of-the-box content, organized in vertical packages (most for an additional cost). It includes complete use cases, analytics, alerts, dashboards and even response playbooks.
-
Product Strategy: The introduction of SNYPR-EYE provides SIEM managers isolation from the Hadoop technologies, while enabling those with sufficient resources to access underlying Hadoop infrastructures.
-
Product: Securonix offers advanced obfuscation features, with role-based access control (RBAC) workflows, as well as native encryption features that go beyond those provided natively by AWS.
-
Customer Experience: Based on Gartner customer inquiry, Peer Insights reviews and vendor reference data, Securonix receives high marks for analytics and user-monitoring capabilities.
Cautions
-
Deployment/Support: Securonix’s approach to filling functional coverage gaps by OEM, resell and technology partnerships introduces risks, because dependencies are created. Clients should understand both parties’ roadmaps and longer-term commitments, and assess support and maintenance structures.
-
Marketing Execution: Securonix’s efforts in marketing its brand and tools need continued investment, and should better leverage its technology alliance, partner and OEM relationships (such as those mentioned above).
-
Product Strategy: Securonix has introduced SNYPR-EYE to improve the platform management experience, and content packages for faster time to value for specific use cases and verticals. However, it will be difficult for Securonix SIEM to continue addressing complex use cases and mature organizations, while remaining simple enough to appeal to nonmature organizations.
-
Deployment and Operations: The enablement of the full functional coverage of Securonix SIEM, especially features that address advanced use cases, such as multiproduct insider threat, requires effort and expertise.
SolarWinds
Strengths
-
Deployment/Operations: SolarWinds emphasizes a do-it-yourself (DIY) approach through a combination of self-service POC (via a 30-day trial version), simplified pricing model, ease of deployment and operation, and a robust peer user community called THWACK. It has received high scores from reference customers.
-
Product: SolarWinds SEM offers a large, out-of-the-box repository of threat detection rules and compliance content, as well as FIM capabilities included with the solution that support a wide variety of operating systems (e.g., Windows, Linux, macOS and IBM AIX).
-
Customer Experience: Reference customers give real-time monitoring capabilities high marks, compared with the product’s other capabilities, and ease of deployment, integration and support simplicity are above average, compared with the competition.
Cautions
-
Marketing Strategy: SolarWinds SEM is predominantly sold in North America and Europe; however, it lacks marketing visibility and channel partners outside these two regions.
-
Pricing: Licensing models are limited to perpetual only, and deployment options are limited to just virtual appliances for SEM.
-
Product: SolarWinds lacks features built into many competing SIEMs — for example, native case management/incident management functionality and support for monitoring cloud environments. Customers can leverage other products in the SolarWinds portfolio to complement SEM — for example, Service Desk for case management, and Papertrail and Loggly for log collection and monitoring from cloud environments.
Splunk
Strengths
-
Deployment: Multiple delivery options for Splunk Enterprise and Enterprise Security include software (which can be deployed on-premises, in IaaS or in a hybrid mode); cloud-hosted; and via appliances (leveraging third parties).
-
Product Strategy: Splunk’s approach to providing centralized data collection and analysis, with premium solutions on top of the core product, appeals to organizations that want one solution that can support multiple teams (e.g., IT operations, security operations, data and analytics). Buyers can start with one use case or team and then expand into others with limited friction.
-
Market Understanding: Splunk has fostered a dense ecosystem of partners and technology alliances capable of extending Splunk’s native value via Apps that are use-case- or vendor-specific. Splunkbase is a strong example of how application marketplaces can be used to deliver content and product integrations in a single UX.
-
Customer Experience: Splunk customers give high marks for ease of integration, quality and availability for end-user training, and the quality of the peer community, compared with their competition.
-
Marketing Execution: Splunk’s marketing approach and cross-organization selling opportunities have made it highly visible with Gartner clients, ranging from midsize to large, global, multinational enterprises.
Cautions
-
Customer Experience: Reference customer overall scores for evaluation and contract negotiation, service and support, pricing and contract flexibility, and value for money spent are below most of its competitors. This reflects ongoing concerns raised by Gartner clients about the cost of Splunk. Splunk has introduced several new pricing options, but it’s too soon to evaluate whether those changes will improve Splunk’s lagging perception on pricing, licensing and cost.
-
Product Strategy: Splunk’s lack of endpoint and network sensors will require buyers to find complementary third-party solutions to fill out the requirements of a modern SOC (e.g., SIEM + UEBA + SOAR + EDR + NTA). Integrations with leading vendors are supported through Splunkbase apps.
-
Product Strategy: Although Splunk has aligned the pricing model of UBA with that of Splunk Enterprise and Splunk Enterprise Security, Splunk UBA is on a separate technology stack. It is not yet integrated into core Splunk, and remains an on-premises or hosted model, which may affect Splunk Cloud buyers.
-
Operations: Splunk’s content is available across several platforms, must be licensed separately to access that content, and requires multiple mechanisms for organizing and updating the content — e.g., across premium apps and solutions (such as ES, UBA and Phantom).
Vendors Added and Dropped
Added
Dropped
Inclusion and Exclusion Criteria
-
A product that provides SIM and SEM capability to end-user customers via software and/or appliance and/or SaaS.
-
SIEM features, functionality and add-on solutions that were generally available as of 31 July 2019.
-
A product that supports data capture and analysis from heterogeneous, third-party sources (that is, other than from the SIEM vendor’s products/SaaS), including market-leading network technologies, endpoints/servers, cloud (IaaS or SaaS), and business applications.
-
SIEM (product/SaaS license and maintenance, and excluding managed services) revenue exceeding $32 million for the 12 months prior to 30 June 2019, or have 100 production customers as of the end of that same period. Production customers are defined as those that have licensed the SIEM and are monitoring production environments with the SIEM. Gartner will require that you provide a written confirmation of achievement of this requirement and others that stipulate revenue or customer thresholds. The confirmation must be from an appropriate finance executive in your organization.
-
To have received 15% of SIEM product/SaaS revenue for 12 months prior to 30 June 2019 from outside the geographical region of the vendor’s headquarters location. It should have at least 10 production customers in each of at least two of the following geographies: North America, EMEA, the APAC region and Latin America.
-
Sales and marketing operations (via print/email campaigns, local language translations for sales/marketing materials) targeting at least two of the following geographies as of 30 June 2019: North America, EMEA, the APAC region and Latin America.
Evaluation Criteria
Ability to Execute
Table 1: Ability to Execute Evaluation Criteria
Evaluation Criteria
|
Weighting
|
---|---|
Product or Service
|
High
|
Overall Viability
|
Medium
|
Sales Execution/Pricing
|
High
|
Market Responsiveness/Record
|
High
|
Marketing Execution
|
Medium
|
Customer Experience
|
High
|
Operations
|
Medium
|
Completeness of Vision
Table 2: Completeness of Vision Evaluation Criteria
Evaluation Criteria
|
Weighting
|
---|---|
Market Understanding
|
High
|
Marketing Strategy
|
Medium
|
Sales Strategy
|
Medium
|
Offering (Product) Strategy
|
High
|
Business Model
|
Not Rated
|
Vertical/Industry Strategy
|
Medium
|
Innovation
|
High
|
Geographic Strategy
|
Medium
|
Quadrant Descriptions
Leaders
Challengers
Visionaries
Niche Players
Context
-
SIM — Log management, analytics and compliance reporting
-
SEM — Real-time monitoring and incident management for security-related events from networks, security devices, systems and applications
-
ATD — Monitoring, alerting in real time, and longer-term analysis and reporting of trends and behaviors regarding user and entity activity, data access, and application activity. Threat detection includes the incorporation of threat intelligence and business context, in combination with effective ad hoc query capabilities.
-
Basic Security Monitoring — Log management, compliance reporting and basic real-time monitoring of selected security controls.
-
Investigation and Incident Response — Dashboards and visualization capabilities, as well as workflow and documentation support to enable effective incident identification, investigation and response.
-
The relative importance of basic capabilities versus advanced features
-
Budget constraints
-
The scale of the deployment
-
The complexity of product (deploying, running, using and supporting)
-
The IT organization’s project deployment and technology support capabilities
-
Integration with established applications, data monitoring and identity management infrastructure
Market Overview
SIEM Vendor Landscape
-
Odyssey Consultants, based in Cyprus, and several vendors based in China — including DBAPPSecurity, Venustech, Qi An Xin Group — offer SIEMs based on modern, big data and analytics architectures, but have limited visibility among Gartner customers.
-
Netsurion-EventTracker is focused on MSEs, and offers a central log management solution, as well as more full-featured SIEM, with optional services available for deployment, tuning and security monitoring.
-
BlackStratus supplies SIEM to MSSP, and offers a cloud-based CyberShark SaaS SIEM focused on midsize buyers.
-
Huntsman Security (the operating name of Tier-3 Pty Ltd.) is an SIEM vendor with a presence primarily in the U.K. and Australia, focused on governments and critical infrastructure organizations.
-
Lookwise has a market presence primarily in Spain and South America. The distinguishing characteristic of Lookwise is the threat intelligence feeds from S21Sec, which are focused on the banking and critical infrastructure sectors.
-
HelpSystems, with its Vityl product suite, provides operational event correlation, business process monitoring and SIEM solutions to customers in Europe and South America.
SIEM Services
SIEM Alternatives
Evidence
Evaluation Criteria Definitions
Ability to Execute
Completeness of Vision
Gartner Observations – SIEM, MDR, NTA, MTA, EDR
Gartner Observations – SIEM, MDR, NTA, MTA, EDR
The Threat Detection Trinity
- Hunt via ArcSight Investigate
- Real-time correlations via ArcSight ESM (now with distributed correlation)
- Detection analytics with ArcSight User Behavior Analytics (UBA)
- https://www.microfocus.com/media/white-paper/power_of_the_threat_detection_trinity_wp.pdf
SOC Visibility Triad is actually missing a few details – Structured and Unstructured Monitoring, East-West/North-South Traffic. (User email, web and application traffic.)
- Detection technologies such as SIEM, EDR and NTA are effective only when use cases are appropriately defined, implemented and tuned. (Key points by Anton Chuvakin at Gartner on 1/28/2019)
- A process to manage security monitoring use cases is a prerequisite for the success of any detection capability.
- Most organisation include some third-party providers, such as MSSPs or MDR providers, in their detection and response plans. However, outsourcing functions and responsibilities does not mean outsourcing accountability.
- Ensuring the effectiveness of both basic and advanced detection and response capabilities requires not just tools, but also the entire triad of people, processes and technology.
- Security operations center (SOC) owners struggle to make the right technology investments, and unfortunately chase the latest and greatest technologies that may dilute, rather than enhance, the efficacy of the SOC. (‘Selecting the Right Tools for your SOC’ by Tony Busa at Gartner on 1/23/2020)
- Looking to peers with SOCs or trying to benchmark against others in their vertical is of limited use. Each SOC is constructed to meet its own organization’s nuances, and current and target maturity level.
- Artificial intelligence (AI)- and machine learning (ML)-powered technologies, or any that promise to fully automate your SOC, are not going to magically transform an SOC from low maturity to high maturity overnight. Your SOC needs trained staff and fine-tuned workflows to use and operate tools that support its goals and capabilities.
- SRM leaders are failing to identify and understand relevant threats and risks to the organization, which increases the chances of devastating security incidents. Lack of initial and continuous threat modeling affects all components of the SOC target operating model, resulting in increased risk and reduced efficacy of SOC operations. (‘Create a SOC Target Operating Model to Drive Success’ by John Collins at Gartner on 1/15/2020.)
- Without operational alignment and defined agreements for an SOC, SRM leaders face resistance and avoidance from other business units, increasing the risk of security incidents with direct fiscal impact on the business.
- Security and risk management leaders often struggle to convey the business value of their security operations centers to non security leaders, resulting in reduced investment, poor collaboration and eroding support.
- ‘SOCs are like snowflakes, no two are alike…’
- Infrastructure, People Process Technology
- Digital Transformation
- Digital Workforce
- Business Innovation
- Mergers, Acquisitions & Divestitures
- Geography Expansion
- Regulations and Laws
- Cloud, NOC, SOC, Fraud
References;
- Create an SOC Target Operating Model to Drive Success
- Gartner, Tips for Selecting the Right Tools for Your Security Operations Center, Toby Bussa, Jeremy D’Hoinne, 23 January 2020.
- https://swimlane.com/resources/gartner-selecting-right-tools-soc/
- https://www.fireeye.com/offers/rpt-gartner-selecting-the-right-soc-model.html
- https://www.dxc.technology/security/insights/144650-putting_on_the_right_soc_to_fit_your_security_operations
- https://www.huntsmansecurity.com/blog/choosing-soc-service-model-considerations/
- https://www.splunk.com/en_us/blog/security/find-your-matching-soc.html
- https://logrhythm.com/solutions/security/soc-enablement/
- Anton Chuvakin
- https://blogs.gartner.com/anton-chuvakin/2019/06/06/the-last-blog-post/
- https://blogs.gartner.com/anton-chuvakin/
- https://blogs.gartner.com/anton-chuvakin/2019/05/31/should-you-buy-a-piece-of-siem/
- https://blogs.gartner.com/anton-chuvakin/2019/01/22/our-solution-path-for-implementing-threat-detection-and-incident-response-publishes/
- https://medium.com/anton-on-security/detection-coverage-and-detection-in-depth-16137e6c203b
- Applying Network-Centric Approaches for Threat Detection and Response
Market Guide for Security Orchestration, Automation and Response Solutions
Market Guide for Security Orchestration, Automation and Response Solutions
Published 27 June 2019 – ID G00389446 – 26 min read
Overview
Key Findings
-
The SOAR technology market aims to converge security orchestration and automation (SOA), security incident response (SIR) and threat intelligence platform (TIP) capabilities into single solutions.
-
Early adopters of SOAR technologies have been organizations and managed security service providers with mature security operations centers (SOCs) that understood the benefits of incorporating SOAR capabilities into their operations. However, use cases implemented by early adopters have not evolved over the last 12 months and are stuck in a rut, limiting the long-term potential for SOAR in security operations.
-
SOAR solutions are not “plug-and-play.” Even though solutions have a library of out-of-the-box use cases and integrations, buyers are reporting multiweek professional services engagements to implement their initial use cases, as every organization’s processes and technologies deployed are different.
-
Orchestration and automation are starting to be localized in point security technologies, usually in the form of predefined, automated workflows. This is not the same as a full-featured SOAR solution.
Recommendations
-
Prepare for their SOAR implementations by having a starting set of defined processes and workflows that can be implemented. Out-of-the-box plays and integrations are a starting point but can rarely be implemented without some customizations.
-
Plan for the implementation and the ongoing operation and administration of SOAR tools by using a mix of professional services and internal resources.
-
Put a contingency plan in place in the event the SOAR tool is acquired by another vendor. Acquisitions are occurring with some frequency as the market evolves. Buyers should be prepared.
Strategic Planning Assumption
Market Definition
Market Description
-
Aggregation: The ability to aggregate/ingest data across sources. This may take the form of alerts, signals or other inputs from other technologies such as an alert from a SIEM tool or an email sent to a group mailbox. Other data that is ingested may include user information from an identity and access management (IAM) tool or threat intelligence from multiple sources.
-
Enrichment: Whether after incident identification or during data collection and processing, SOAR solutions can help integrate external threat intelligence, perform internal contextual look-ups or run processes to gather further data according to defined actions.
-
Orchestration: The complexity of combining resources involves coordination of workflows with manual and automated steps, involving many components and affecting information systems and often humans as well.
-
Automation: This concept involves the capability of software and systems to execute functions on their own, typically to affect other information systems and applications.
-
Response: Manual or automated response provides canned resolution to programmatically defined activities. This includes activities from a basic level — ticket creation in an IT service desk application — to more advanced activities like applying some form of response via another security control, like blocking an IP address by changing a firewall rule. This functionality is the most impactful, but also applies to the most complex use cases.
-
Staff shortages: Due to staff shortages in security operations, clients describe a growing need to automate repeatable tasks, streamline workflows and orchestrate security tasks resulting in operational scale. For instance, if you have a team, SOAR can give them more reach — but this is not a tool to get instead of a team. Also, organizations need the ability to demonstrate to management the organization’s ability to reduce the impact of inevitable incidents.
-
Continued evolution of threats and increases in volume: As organizations consider threats that destroy data and can result in disclosure of intellectual property and monetary extortion, they require rapid, consistent, continuous and more frequent responses with fewer manual steps.
-
Improving alert triage quality and speed: Security monitoring systems (such as SIEMs) are known to cost a significant amount to run and generate a high number of alerts, including many found to be “false positives” or simply not relevant after additional investigation. Security and risk management leaders then treat alert triage in a very manual way, which is subject to mistakes by the analysts. This leaves real incidents ignored. SOAR helps improve the signal-to-noise ratio by automating the repeatable, mundane aspects of incident investigation. This creates a positive situation where analysts can spend more time investigating and responding to an event instead of spending most of their time collecting all the data required to perform the investigation.
-
Need for a centralized view of threat intelligence: A large number of security controls on the market today benefit from threat intelligence. SOAR tools allow for the centralized collection, aggregation, deduplication, enrichment of existing data with threat intelligence and, importantly, conversion of intelligence into action.
-
Reducing time to respond, contain and remediate: Organizations are dealing with increasingly aggressive threats, such as ransomware, where rapid response of only minutes at best is required in order to stand a chance of containing the threat that is spread laterally in your environment. This scenario forces organizations to reduce the time they take to respond to those incidents, typically by delegating more tasks to machines. Reducing the response time, including incident containment and remediation, is one of the most effective ways to control the impact of security incidents. Like a brush fire, the sooner you can get to it, the smaller it is, and therefore the easier it is to put out.
-
Reducing unnecessary, routine work for the analysts: SOC analysts are often working with multiple tools. They are looking at a stream of row and column SIEM console alerts, threat intelligence (TI) service portals for information about the entities involved, and endpoint detection and response (EDR) for context on what is happening on the affected endpoint. They may even be using workflow tools to control the triage and investigation processes.
-
Prioritizing security operations activities: Use of a SOAR solution requires organizations to consider questions about their processes. Which are most critical? Which ones consume the most staff time and resources? Which ones would benefit from automation? Where do we have gaps in our documented procedures? The preparation and planning for SOAR, and its ongoing use, help organizations prioritize and manage where orchestration and automation should be applied and where it can help improve response. This response can then lead to improvements in security operations and showing a demonstrable impact on business operations (e.g., faster time to detect and respond to threats that could impact business operations and optimization of security operations staff and budget).
-
Formalizing triage and incident response: Security operations teams must be consistent in their responses to incident and threats. They must also follow best practices, provide an audit trail and be measurable against business objectives.
-
Automating response: Speed is of the essence in today’s threat landscape. Attacks are increasing in speed (e.g., ransomware is now being automated to spread with worm functionality), but security operations are not automated. Having the ability to automate response action offers SOC teams the ability to quickly isolate/contain security incidents. Some responses can be fully automated, but at this time many SOAR users still inject a human to make the final decision. However, even this reduces the mean time to respond for the organization compared to being fully dependent on “human power.”
Market Direction
-
SOC optimization
-
Threat monitoring and response
-
Threat investigation and response
-
Threat intelligence management
Table 1: SOAR Acquisitions
Month/Year
|
Acquisitions
|
---|---|
February/2016
|
FireEye (Helix) acquired Invotas
|
April/2016
|
IBM acquired Resilient Systems
|
June/2016
|
ServiceNow acquired Brightpoint Security
|
June/2017
|
Microsoft acquired Hexadite
|
July/2017
|
Rapid7 acquired Komand
|
February/2018
|
Splunk acquired Phantom Cyber
|
February/2019
|
Palo Alto Networks acquired Demisto
|
Market Analysis
Clients should recall that the selection of the right product will depend on the use cases.
-
The number of (named) analysts using the tool
-
The number of events coming to the SOAR
-
The number of playbooks or actions the SOAR will perform
-
A tiered approach with higher tiers unlocking additional functionality and value
Representative Vendors
Market Introduction
Table 2: Representative Vendors in the Security Orchestration, Automation and Response Market
Vendor
|
Product, Service or Solution Name
|
---|---|
ATAR Labs
|
ATAR
|
Ayehu
|
Ayehu NG Platform
|
Cyberbit
|
SOC 3D
|
CyberSponse
|
CyOPs
|
D3 Security
|
D3 SOAR
|
Demisto
|
Demisto Enterprise
|
DFLabs
|
IncMan
|
EclecticIQ
|
EclecticIQ Platform
|
IBM
|
Resilient
|
Splunk
|
Phantom
|
Rapid7
|
InsightConnect
|
Resolve
|
Resolve
|
ServiceNow
|
Security Operations
|
Siemplify
|
Siemplify
|
Swimlane
|
Swimlane
|
Syncurity
|
IR Flow
|
ThreatConnect
|
ThreatConnect
|
ThreatQuotient
|
ThreatQ
|
Vendor Profiles
ATAR Labs
Ayehu
Cyberbit
CyberSponse
D3 Security
Demisto
DFLabs
EclecticIQ
IBM Resilient
Rapid7
Resolve
ServiceNow
Siemplify
Splunk
Swimlane
Syncurity
ThreatConnect
ThreatQuotient
Market Recommendations
-
Performing the task faster equals better time to resolution. The longer an issue is left unaddressed, the worse it can become, leaving the organization in a potentially risky situation for longer periods of time. Ransomware, for example, is a threat that can get exponentially worse with time.
-
Staff shortages are a critical issue for many organizations. The ability to handle processes more efficiently means that security analysts can spend less time with each incident and will thus be able to handle and respond to more incidents, allowing response to more incidents despite fewer resources being available.
-
Deliver the use cases needed to complement their set of security products to manage their SOC. For instance, some clients prefer to use the company ticket system instead of a dedicated case management solution; but, instead, they value the threat investigation capabilities more. Buying a SOAR solution today must be driven by the use case: SOC optimization, threat monitoring and response, threat investigation and hunting, and threat intelligence management.
-
Offer the capability to easily code an organization’s existing playbooks that the tool can then automate, either via an intuitive UI and/or via a simple script.
-
Optimize the collaboration of analysts in the SOC, for example, with a chat or IM framework that makes analysts’ communication more efficient, or with the ability to work together on complex cases.
-
Have a pricing cost that is aligned with the needs of the organization and that is predictable. Avoid pricing structures based on the volume of data managed by the tool or based on the number of playbooks run per month, as these metrics carry an automatic penalty for more frequent use of the solution.
-
Offer flexibility in the deployment and hosting of the solution — either in the cloud, on-premises or a hybrid of these — to accommodate organizations’ security policies and privacy considerations, or organizations’ cloud-first initiatives.
Note 1Representative Vendor Selection
Note 2Gartner’s Initial Market Coverage
Magic Quadrant for WAN Edge Infrastructure
Magic Quadrant for WAN Edge Infrastructure
Published 26 November 2019 – ID G00376745 – 67 min read
Strategic Planning Assumptions
Market Definition/Description
-
Ease of use
-
Application performance — including WAN optimization, voice optimization and ensuring quality of experience (QoE)
-
Security
-
Pricing and pricing models
-
Support for cloud workloads
Magic Quadrant
Vendor Strengths and Cautions
Aryaka
Strengths
-
Aryaka provides an all-in-one SD-WAN, private backbone and managed service solution, making procurement easier for customers interested in that model.
-
The private global backbone, with direct cloud gateways offered by Aryaka, provides a solution to optimize application performance.
-
Aryaka’s SD-WAN includes WAN optimization, to boost application performance, especially over long distances.
Cautions
-
Aryaka supports only internet and Ethernet connections to its services, limiting hybrid SD-WAN configurations and making migrations from MPLS more complex.
-
SmartCONNECT is a managed service that will not appeal to those enterprises that prefer to manage their own SD-WAN networks (DIY clients).
-
Enterprises with footprints limited to a single country/smaller area or are too far from an Aryaka point of presence (POP), will not benefit as much from the Aryaka backbone and WAN optimization features.
Barracuda
Strengths
-
Barracuda includes comprehensive security capabilities including NGFW, antivirus, botnet and spyware protection, Domain Name System (DNS) security, and a built-in secure web gateway (SWG).
-
The solution has broad capabilities, including SD-WAN with enterprise-grade features, such as WAN optimization and real-time traffic remediation.
-
The vendor offers wide support for deployment as a VNF via most major virtualization platforms, including VMware, Xen, Kernel-based Virtual Machine (KVM) and Hyper-V.
Cautions
-
Gartner has had few SD-WAN inquiries in which Barracuda has been mentioned, which suggests the vendor has limited visibility and awareness in the SD-WAN market.
-
The path selection mechanism uses less-sophisticated techniques for failover. For example, for real-time traffic, packet loss and jitter are not used in the failover algorithm.
-
At the time of this research, traffic analytics is overly technical and managing the data is cumbersome. This is in conflict with the otherwise simple operation of the solution.
Cisco
Strengths
-
Cisco has a broad range of SD-WAN offers and platforms, together with complementary features, such as security, LAN/WLAN and application performance.
-
Cisco has strong enterprise network channels, brand awareness, and existing customer base, and it offers support for both DIY and MNS deployment.
-
Cisco’s cloud security platform, Umbrella, integration is supported on both the Viptela and Meraki platforms.
Cautions
-
Cisco’s SD-WAN, powered by Viptela on the IOS XE platform, has stability and scaling issues, as reported by Gartner clients and Cisco channels. Also, some customers who’ve purchased Cisco ISR hardware during the past few years have informed Gartner that they had to upgrade their hardware platforms to support Viptela due to throughput limitations.
-
Cisco has broad, separate and overlapping SD-WAN offerings that don’t share a common management platform, hardware platform or sales teams. Consequently, clients and channel partners have a hard time choosing the most appropriate solution, which increases the likelihood of a suboptimal selection.
-
The Cisco licensing structure is complex and can be confusing to end clients.
Citrix
Strengths
-
Citrix SD-WAN includes an optional, fully featured WAN optimization capability, as well as cloud gateways for cloud onramp access to cloud workloads.
-
Citrix SD-WAN is managed via the same user interface (UI) as other Citrix products, which can simplify operations for existing Citrix customers.
-
Citrix can sell its SD-WAN solution in combination with its digital workspace solutions providing added performance and convenience for end customers.
Cautions
-
Citrix only has a small number of service provider partners offering managed SD-WAN services using its platform; hence, this may limit the vendors’ ability to grow in the market.
-
Citrix SD-WAN lacks a full, native, advanced security suite beyond its native application layer firewall; instead, it relies on partners for unified threat management (UTM) or cloud security services.
-
Some enterprises don’t see Citrix as a network vendor, which may limit its growth in the market.
CloudGenix
Strengths
-
CloudGenix’s CloudBlades provides turnkey service chaining that allows users to integrate their SD-WAN with various cloud services that are part of the vendor’s ecosystem.
-
The vendor’s Clarity solution offers visibility into network health and application performance.
-
The vendor’s graphical user interface (GUI) is straightforward and intuitive for organizations to operate.
Cautions
-
The vendor has a limited geographic installed base and channel coverage outside North America, which may limit the vendor’s growth in the market or support for customers in other regions.
-
CloudGenix has had limited adoption by carriers offering managed services as it tends to be adopted by more DIY-focused clients, so this may limit the vendor’s ability to grow.
-
The vendor lacks several capabilities offered by competitors, including support for WAN optimization and native advanced security features.
Cradlepoint
Strengths
-
Cradlepoint’s expertise in providing cost-effective small branch solutions makes it attractive for deployments in which integrated security, WAN edge and Wi-Fi functionality is required.
-
The vendor offers advanced built-in security including a NGFW, SWG, IPS and IDS, micro-segmentation capabilities, network access control (NAC), and content filtering.
-
Cradlepoint has proven experience with successful deployments larger than 1,000 sites with small footprint environments.
Cautions
-
Although Cradlepoint offers traditional quality of service (QoS), it does not support real-time traffic remediation, such as forward error correction (FEC) or Packet Duplication, which may be a requirement for challenging WAN circuit environments such as broadband and LTE.
-
Lack of cloud provider support beyond AWS, as well as the lack of availability on cloud marketplaces, makes Cradlepoint a less attractive solution for enterprises that are expanding their cloud presence.
-
Cradlepoint’s solution lacks the ability to failover to another transport, due to elevated packet loss, and provides limited wireline performance metrics data.
FatPipe Networks
Strengths
-
FatPipe has a broad set of capabilities, including SD-WAN, application performance, and some security that have been deployed across customers, mainly in the midmarket.
-
FatPipe was a pioneer in path selection, which is now a key SD-WAN capability; thus, it has expertise supporting hybrid WAN use cases.
-
FatPipe has been operating for approximately 18 years, so it has proved itself over a long period of time.
Cautions
-
FatPipe has limited market presence outside North America, which restricts the pool of networking personnel familiar with its products. This limits FatPipe’s ability to sell and support its products in geographic locations outside North America.
-
FatPipe has limited experience in complex deployments beyond 100 sites, which limits applicability for many larger organizations.
-
FatPipe has limited visibility in the market, as evidenced by Gartner taking few inquiry calls regarding its solution.
Fortinet
Strengths
-
Fortinet’s direction of delivering a highly integrated solution consisting of SD-WAN, routing, advanced security and application performance gives them broad market and use case appeal, regardless of organizational size.
-
Fortinet’s investments in new custom SD-WAN-specific application-specific integrated circuits (ASICs) yield throughput and performance at a competitive price point when leveraging the full suite of SD-WAN features.
-
Fortinet’s global channel, managed services and partner ecosystem ensure that it can support both DIY and managed services adopters.
Cautions
-
Fortinet has minimal presence with carrier-based SD-WAN service portfolios, which will limit its ability to be sourced globally.
-
Despite their enterprise-class features, Fortinet’s products have been used mainly as security appliances and less as networking solutions; this limits its experience in this market.
-
Fortinet has limited experience in highly complex networking solutions and cloud-first deployments.
HPE (Aruba)
Strengths
-
Aruba Central Cloud Platform is a solid, scalable orchestration platform that simplifies deployment, management and service assurance of wireless, wired and SD-WAN environments.
-
Aruba has experience supporting enterprise network clients with its existing WLAN and wired LAN customer base.
-
Aruba has seen some recent success in winning large WAN edge enterprise accounts.
Cautions
-
Aruba is better known in the wired LAN and WLAN market segment and less known in the WAN edge segment, which may limit its ability to compete.
-
Aruba has limited application performance capabilities for real-time traffic, such as forward error FEC and packet duplication, and WAN optimization for non-real-time traffic.
-
Aruba has been late to this market, so many of the channel partners have already selected other SD-WAN solutions, which may limit its ability to compete.
Huawei
Strength
-
Huawei’s broad portfolio checks most of the WAN edge feature boxes, including full SD-WAN, flexible deployment form factors, a capable integrated security stack and basic WAN optimization.
-
Huawei is a dominant vendor in China, and it is also a major presence in the APAC region, as well as in South America, and Europe, the Middle East and Africa (EMEA).
-
Huawei has experience and proven scale, with extremely large deployments — more than 5,000 branch locations.
Cautions
-
Geopolitical upheaval and security concerns by North American and, to a lesser extent, some EU governments have severely limited adoption and availability in these geographies. Potential adopters in these locations should verify government restrictions, which may preclude adoption.
-
Huawei SD-WAN cloud service, which is useful when deploying SD-WAN over public internet, is available only in China.
-
Huawei’s GUI is more complicated and less-user-friendly than other vendors included in this research.
Juniper Networks
Strengths
-
Juniper has a broad set of WAN edge network capabilities, including a variety of form factors, interfaces, a cloud-managed solution, routing and security, along with a service orchestrator (Contrail Service Orchestration), which simplifies deployment and management.
-
Juniper has longstanding relationships with communications service providers (CSPs), and a large and loyal installed base. This means there is a large pool of networking personnel familiar with Juniper’s products who can aid with implementation and operation.
-
Juniper is focused on leveraging its recent Mist Systems acquisition to incorporate more LAN/WLAN/WAN integration, which will simplify orchestration and management for end users.
Cautions
-
Many of Juniper’s target service providers have already aligned with Juniper’s competitors for SD-WAN. As a result, it may be difficult for customers to obtain Juniper-based managed services from their preferred service providers.
-
Juniper lacks native WAN optimization and doesn’t support FEC for voice optimization.
-
Juniper lacks visibility and awareness in the market as evidenced by the vendor being mentioned in few SD-WAN inquiries, compared with the larger competitors in this market.
Nuage Networks
Strengths
-
Nuage’s SD-WAN products are available through a large number of service provider partners.
-
The Nuage SD-WAN products are architected for software deployment on NFV platforms, allowing them to integrate easily with other virtual network software.
-
Nuage’s VNS SD-WAN offer integrates with its Virtualized Cloud Services (VCS) data center network overlay offering a more simplified solution.
Cautions
-
Because Nuage predominantly delivers its products via service providers, it has a limited number of direct enterprise customers and channels, limiting its brand recognition and experience with customers who prefer a DIY approach to sourcing their SD-WAN products.
-
Nuage has limited native advanced security and WAN optimization functionality, preferring to rely on third-party software on NFV platforms to support these capabilities.
-
Nuage’s path selection capability is limited to supporting two underlay connections, thereby restricting its applicability to some enterprises.
Oracle (Talari Networks)
Strength
-
Oracle has experience supporting mission-critical traffic requirements, such as call centers, government agencies and emergency responders.
-
Oracle offers strong path selection, application analytics and application performance capabilities.
-
Oracle’s enterprise voice experience — with its widely deployed SBC and global sales, support, and partner network complement its SD-WAN offering, thereby increasing capabilities, as well as reach.
Cautions
-
Oracle has limited experience deploying SD-WAN with networks greater than 250 branches.
-
Although Oracle has some native security features, it lacks a native advanced security stack (such as NGFW), which may limit the appeal of its SD-WAN product for companies requiring a turnkey WAN edge solution. Instead, it relies on partners to deliver this functionality.
-
Oracle’s SD-WAN solution has limited adoption into MSPs and carrier SD-WAN portfolios, reducing its appeal to organizations that prefer to consume from those providers.
Peplink
Strengths
-
Peplink’s SpeedFusion technology enables link bonding flexibility, which can enable capabilities to use multiple links to be combined to meet increased bandwidth needs, while keeping costs low.
-
Peplink has experience with WAN edge deployments in challenging environmental conditions, such as those found in the oil and gas, maritime, and transportation markets.
-
Peplink has proven scalability in large, distributed deployments with more than 5,000 sites.
Cautions
-
Peplink’s application analytics capabilities are not as granular as the other solutions described in this research.
-
Although most of Peplink’s customers are in North America and Europe, it has limited sales and support resources of its own in these areas. The company relies heavily on its limited channel partnerships at all levels of the sales and support cycle.
-
Peplink’s security capabilities are not as comprehensive as some other solutions described in this research.
Riverbed
Strengths
-
The vendor has substantial experience in large global enterprises with WAN optimization and has incumbency in many accounts. Leveraging this capability, Riverbed provides an integrated appliance that includes WAN optimization and SD-WAN.
-
Riverbed recently announced an OEM partnership with Versa in an attempt to address the large-enterprise market more effectively.
-
Riverbed offers a vendor-hosted SaaS acceleration solution offered as a cloud-managed service.
Cautions
-
The Versa deal attempts to offer an SD-WAN solution for large-enterprise organizations; however, Riverbed is the only vendor in this research that will be sourcing core SD-WAN functionality via an OEM agreement. Consequently, there is increased risk going forward, as opposed to Riverbed having full organic control.
-
Riverbed has limited native advanced security capabilities and needs to rely on partners for this functionality; this complicates sourcing and management for enterprise clients.
-
Gartner has received reports of code instability from clients, which has limited Riverbed’s ability to grow in the market.
Silver Peak
Strengths
-
Silver Peak’s SD-WAN product has strong application performance capabilities, including WAN optimization and real-time traffic optimization (e.g., FEC). Its WAN optimization solution also can be priced as a subscription and shared across a domain.
-
Gartner sees more channels and MSPs selling the Silver Peak solution, which shows the vendor’s channel expansion and relevance to various client consumption models.
-
Silver Peak’s roadmap is aligned with future client needs, with a focus on automation and ease of use.
Cautions
-
The Silver Peak SD-WAN products lack a native full advanced security suite, instead relying on third-party firewalls or cloud security services.
-
Silver Peak’s WAN edge offering lacks cloud gateways, requiring enterprises or MSPs to create these, if required.
-
Silver Peak has limitations with their small footprint devices (such as not having integrated Wi-Fi) typically required for small, remote branch offices.
Teldat
Strengths
-
Teldat has a strong presence in Europe and Latin America, where more than 95% of its customers are headquartered.
-
Teldat has successfully deployed large-scale WANs of more than 1,000 locations.
-
Teldat offers a management console that is available as an over-the-top service, which many customers prefer to simplify operations.
Cautions
-
Teldat has limited expertise with DIY enterprises, because it focuses heavily on selling through carrier and MSP partnerships in Europe and Latin America.
-
Teldat doesn’t support WAN optimization capabilities, nor does it support any voice optimization capabilities.
-
Although hard down failover is immediate, performance-based path selection rerouting can take up to 30 seconds.
Versa
Strengths
-
Versa offers advanced feature depth and breadth, with enhanced security, SD-WAN and voice optimization in an integrated solution.
-
Versa has strong relationships with CSPs and managed service partners as its primary go to market.
-
Versa has expanded its partner base with a strategic OEM partnership with Riverbed (integrating Versa VNFs on Riverbed platforms). This will give it access to large global enterprises in which Riverbed is the incumbent and increase its ability to grow and sustain in the market.
Cautions
-
Versa lacks native WAN optimization, relying instead on hosting third-party virtual appliances.
-
Versa has less experience with direct enterprise DIY, because most of its customers are sold through MSPs.
-
Current production network deployments are limited beyond 800 branches.
VMware
Strengths
-
The VMware SD-WAN solution offers a wide range of deployment options for the edge devices. They can be physical or virtual with optional cloud gateways and orchestration, which can be cloud-based, MSP-hosted or cloud-hosted.
-
VMware SD-WAN has a proven track record of being able to fulfill large, complex global networks of greater than 1,000 sites. In fact, it has some of the largest SD-WAN deployments.
-
VMware has a wide range of go-to-market partners, including multiple global NSPs, as well as VMware and Dell channels; this provides enterprises with many ways to consume the solution.
Cautions
-
The VMware product lacks native advanced security functionality; instead, it relies on partner firewalls instantiated on its platform or cloud security services.
-
VMware lacks traditional WAN optimization capabilities.
-
VMware lacks native support for IPv6, which may limit the vendor’s ability to support certain types of deployments.
Vendors Added and Dropped
Added
Dropped
Inclusion and Exclusion Criteria
-
Providing hardware and/or software that addresses the enterprise WAN edge requirements outlined in the Market Definition/Description section. Alternatively, they may address this need by delivering a managed service that uses in-house developed hardware/software to deliver the service.
-
Producing and releasing enterprise WAN edge networking products for general availability as of 1 June 2019. All components must be publicly available, be shipping and be included on the vendors’ published price list as of this date. Products shipping after this date, and any publicly available marketing information may only have an influence on the Completeness of Vision axis.
-
Provide commercial support and maintenance for their enterprise WAN edge products (24/7) to support deployments on multiple continents. This includes hardware/software support, access to software upgrades, and troubleshooting and technical assistance.
Product Capabilities
-
The ability to function as/replace the branch office router/CPE (including BGP, OSPF, support hub and spoke, mesh, and partial mesh topologies for a minimum of a 100-site network) with traffic shaping and/or QoS
-
Centralized management for devices (with GUI), including reporting and configuration changes, and software upgrades
-
Zero-touch configuration for branch devices
-
VPN (Advanced Encryption Standard [AES] 256-bit encryption) and NGFW or firewall with the ability to redirect to an SWG
-
Dynamic traffic steering based on business or application policy (not limited to only DiffServ Code Point [DSCP]/ports, IPs/circuits or 5tuple) that responds to network conditions (changes in packet loss, latency, jitter, etc.) in an active/active configuration
-
At least 100 well-known application profiles included (auto discovered)
-
Application visibility identifying specific traffic that traverses the WAN
-
At least two of the following WAN interfaces: Ethernet, xDSL, Tx/Ex, fiber and 4G/LTE
-
Software (ability to operate as a VNF at the branch or in the network and to be hosted in at least one cloud provider, such as AWS) and hardware form factors
Financial Performance
-
Demonstrate scalability by servicing at least three customers with active support contracts that have at least 100 sites each.
-
Show relevance to Gartner’s enterprise clients on a global basis with at least one of the two below criteria:
-
At least 25 customers with active support contracts and 10 sites each headquartered in two or more geographic regions (NA, SA, EMEA or APAC). This means 25 customers in one region and another 25 customers in a different region.
-
At least 10 customers with active support contracts and 10 sites each headquartered in three or more geographic regions (North America, South America, EMEA or APAC). This means 10 customers each in three different regions, for a total of more than 20 customers.
-
-
Meet at least one of the four criteria below:
-
Total WAN edge infrastructure revenue of at least $20 million in the 12 months ending December 2018
-
Total WAN edge infrastructure revenue of $13 million in the 12 months ending December 2018, with at least a 100% growth rate during the previous 12 months
-
At least 20,000 WAN edge infrastructure sites deployed and under active support contracts
-
At least 300 WAN edge infrastructure customers under active support contracts with 10 or more sites deployed each
-
Exclusion Criteria
Vendors of Note
-
128 Technology is a privately held company based in Burlington, MA. Although 128 Technology didn’t meet the inclusion criteria, it is relevant to enterprises looking for a software-driven solution.
-
Bigleaf Networks is a privately held company based in Beaverton, Oregon. Although Bigleaf didn’t meet the inclusion criteria, they are relevant to some midmarket customers.
-
Cybera is a privately held company based in Franklin, Tennessee. Although Cybera didn’t meet the inclusion criteria, it is relevant to large, distributed retail enterprises that are primarily U.S.-based.
-
Infovista is a privately held company based in Massy, France. Although Infovista didn’t meet the inclusion criteria, it is relevant to enterprises with a specific focus on application performance.
-
Forcepoint is a privately held company based in Austin, Texas. Although Forcepoint didn’t meet the inclusion criteria, it is relevant to enterprises with a specific focus on security.
-
Cato Networks is a privately held company based in Israel. Although Cato didn’t meet the inclusion criteria, it is relevant to the midmarket, with security and cloud access requirements.
-
Sangfor Technologies is a public company based in China. Although Sangfor didn’t meet the inclusion criteria, it is relevant to enterprises that have a specific focus on security and are based in the APAC region.
-
Lavelle Networks is a private company based in India. Although Lavelle didn’t meet the inclusion criteria, it is relevant for enterprises located in India.
-
Multapplied is a private company based in North Vancouver, BC, Canada. Although Multapplied didn’t meet the inclusion criteria, it is relevant to organizations that purchase from selected service providers.
-
Lancom Systems is a private company based in Munich, Germany. Although Lancom didn’t meet the inclusion criteria, it is relevant to distributed organizations that are based primarily in Europe.
Evaluation Criteria
Ability to Execute
Table 1: Ability to Execute Evaluation Criteria
Evaluation Criteria
|
Weighting
|
---|---|
Product or Service
|
High
|
Overall Viability
|
High
|
Sales Execution/Pricing
|
Medium
|
Market Responsiveness/Record
|
High
|
Marketing Execution
|
Medium
|
Customer Experience
|
High
|
Operations
|
Not Rated
|
Completeness of Vision
Table 2: Completeness of Vision Evaluation Criteria
Evaluation Criteria
|
Weighting
|
---|---|
Market Understanding
|
High
|
Marketing Strategy
|
Medium
|
Sales Strategy
|
Medium
|
Offering (Product) Strategy
|
High
|
Business Model
|
Medium
|
Vertical/Industry Strategy
|
Low
|
Innovation
|
High
|
Geographic Strategy
|
Low
|
Quadrant Descriptions
Leaders
Challengers
Visionaries
Niche Players
Context
Market Forecast
Popular and Emerging Topics
Internet Substitution for MPLS Connections
-
Due to the simpler operational environment and the ability to use multiple circuits from multiple carriers, enterprises can abstract the transport layer from the logical layer and depend less on their service providers.
-
This decoupling of layers is enabling new MNS providers to emerge to take advantage of the above for customers that still want to outsource their WANs.
Thin Versus Thick Branch
Merging of Security and Networking
Virtualization and NFV
Routing From Nontraditional Suppliers
Feature Breadth Versus Feature Depth
Automation and Agility
Combining LAN, WLAN and WAN
Leveraging AI/ML
Application Analytics
Market Overview
Market Drivers
-
Refresh of existing branch office router equipment that is at end of support or lacks the desired capabilities
-
Renewal of NSP or managed service contracts, where a new service provider also means new equipment
-
The changing traffic patterns resulting from the increasing use of cloud and multicloud resources, which renders the traditional hub-and-spoke from remote branch to on-premises data center WAN architecture obsolete
-
By distributing internet access to the branch, the security perimeter changes, which typically drives new solutions
-
The expansion of capacity (i.e., physical build-outs) within existing locations
-
The desire to increase agility and automation to address the needs of digital business transformation and lower opex
-
The desire to consolidate more than one branch function, such as routing, security and WAN optimization
Vendor Landscape Changes
Market Recommendations
-
Build a hybrid WAN architecture with SD-WAN products, if you have a mix of public and private applications.
-
Shortlist at least two vendors (for example, pure play or pivoting vendor) in addition to your incumbent WAN Edge vendor for any significant WAN expansion or router refresh.
-
Quantify the total cost of ownership (TCO) for any SD-WAN deployment. Savings may fund an early refresh, but a detailed end-to-end, life cycle analysis is required (see “Fact or Fiction: Does SD-WAN Really Save You Money?,” “Technology Insight for SD-WAN” and “Toolkit: Calculate the Before-and-After SD-WAN Expenses”). It is more common that WAN edge solutions have more opex-friendly business models, with a strong shift from upfront capital expenditures (capex) to annual license subscriptions, which may dramatically increase your TCO. Quotes should include all platform, license and support costs for a three-year baseline to perform a proper evaluation.
-
Choose WAN as a service for your next refresh if you are looking for a managed network service, prefer opex to capex, or prefer to rent, rather than own your equipment (see “DIY vs. MNS: Enterprises Must Reassess Their Network Sourcing Model to Prepare for SD-WAN” and “Debunk the Misperceptions About Network as a Service”).
-
If choosing managed SD-WAN, then evaluate both NSP and non-NSP (such as MSPs, independent software provider (ISP) aggregators and SIs) options (see “Market Guide for Managed SD-WAN Services”).
-
Favor WAN edge vendors that can facilitate automation. As a key part of vendor evaluation, include an evaluation of the operational model of any new WAN edge solution to determine potential savings and differentiation among competing vendors.
-
In highly distributed organizations, leverage ISP aggregators who can ease the procurement and management of internet access circuits (see “4 Steps in Selecting ISP Aggregation Services”).
Extended Market Definition
Characteristics of the Market
Characteristics of WAN Edge Solutions
-
Network performance problems as traffic is backhauled, which typically increases latency and congestion
-
WAN expenses increase due to backhauled internet traffic with cost of paying for bandwidth twice (MPLS to the data center and from the data center to the internet).
Routing, WAN Optimization and Security
Deployment Options
-
Dedicated hardware appliance — This is the traditional style of deployment, in which a single network function is delivered as a turnkey integrated hardware appliance. Although still common, the trend is to move aware from this option as on-site technology becomes obsolete or inefficient. If retained, we do see the trend of at least the on-site router migrating to an SD-WAN solution.
-
Multifunctional integrated platform — This platform combines proprietary hardware and software to deliver multiple functions, such as WAN optimization, routing and security. This can be deployed in two ways:
-
Native functionality by the vendor
-
Partnership by the vendor with another best-of-breed solution that is tightly integrated
-
-
Examples include FortiGate appliances, Silver Peak Unity EdgeConnect with Unity Boost, VMware SD-WAN by VeloCloud, and Versa’s FlexVNF.
-
Virtualized network function — This is a software-based instance of a network function that can be delivered on an x86-based computing platform. Nearly all routing, WAN optimization and SD-WAN vendors deliver a VNF version of their software.
-
uCPE platform — This multifunctional platform supports an NFV architecture, designed around industry standards to run multiple virtual functions, with possibly different vendors’ functions in the same device. The platform allows multiple VNFs to be installed, and typically makes use of industry-standard x86 devices, rather than function-specific appliances. Juniper Networks’ NFX and Cisco ENCS are examples of a hardware uCPE platform. Universal CPE is one delivery method for an NFV deployment with the functions residing on-premises. With the goal to increase the agility of enterprise networks, enabling them to respond to changing needs more rapidly in a more on-demand manner and avoid vendor lock-in. Today, uCPE is primarily a carrier-driven technology, and has near-term adoption challenges with pricing, performance, standard orchestration and networking integration. However, we expect these challenges to subside in the next couple of years.
-
Cloud-based OTT — Network function is delivered via a cloud platform, and the enterprise subscribes to the functionality. An example is Aryaka, which provides WAN optimization and other application performance functionality. Additionally, we are seeing security delivered in this model, which will drive adoption of the thin CPE model.
Consumption Models for WAN Edge Infrastructure
-
DIY — Enterprise owns and manages WAN edge functionality itself.
-
NSP — NSP manages the WAN transport and, optionally, the WAN edge equipment.
-
MNS — Managed NSPs include SIs, MSPs, and ISP aggregators that managed the WAN edge equipment and may resell third-party access or, in some cases, allow organizations to bring your own access (BYOA)
-
Hybrid — This is a combination of at least two of the above.