Slideshow

In Pictures: 12 hybrid Cloud security products to watch

Here are 12 security products that you can buy for your hybrid cloud whether they run on premise, in the cloud or a little of both.

  • Hybrid cloud security products can be delivered in a box that gets deployed on premise at a customer’s site. But increasingly security vendors are offering a hybrid approach to their product portfolios whereby customers can buy a physical box or buy the security capability as a service. Here are 12 security products that you can buy for your hybrid cloud whether they run on premise, in the cloud or a little of both.

  • Company name: Cisco Product Names: IronPort S-Series appliances and ScanSafe service Why we are watching: Cisco bought IronPort in 2007 and ScanSafe in 2009 and has been steadily building links between the appliance and the service across its networking and security gear so that both are easier to implement in Cisco-focuses enterprises.

  • Company name: BlueCoat Product Names: Proxy SG and BlueCoat Cloud Service Why we are watching: The on-premises Proxy SG product is well-tested in large enterprise environments for scalability and performance and the list of protocols, authentication options, back-end databases and antivirus platforms it supports are long across the board. The service option is based on the ProxySG boxes.

  • Company name: Websense Product Names: Security Gateway and Securty Gateway Anywhere Why we are watching: The company has a focus on data leak prevention as its main differentiator and it’s got an acclaimed Triton management console that helps enterprises manage both appliances and the service (which has the same name as the appliance with the addition of “Anywhere” from the same pane of glass should they want to run with a hybrid security strategy.

  • Company name: Zscaler Product Name: Zscaler Web Security Why we are watching: Zscaler is a fast growing start-up that offers its product only as a service. Gartner has said this is the fastest growing company in this market segment driven by its very strong reporting capabilities, client redirection functions, granular security controls, and flexible, policy-based controls for social media applications.

  • Company name: Bromium Product Name: vSentry Why we are watching: Led by a team of security and virtualization experts who had worked at Citrix, Bromium developed an approach to desktop security that virtualizes end-user activities when they pose a threat of bringing in outside agents or malware. VSentry is built on a “microvisor,” a security-focused hypervisor that automatically, instantly and invisibly hardware-isolates each vulnerable Windows task in a micro-VM that cannot modify Windows or gain access to enterprise data or network infrastructure.

  • Company name: Catbird Product Name: vSecurity Why we are watching: The recently released vSecurity 5.0 product provides access control, intrusion detection, secure auditing, automated protection, visibility, and efficiency for all virtualized machine because it taps into the hypervisor. It can enforce FISMA, NIST, HIPAA standards so that users can virtualize more assets, more quickly.

  • Company name: HP Product Name: ArcSight Why we are watching: HP placed ArcSight (which always seems to score very well in public, competitive tests of SIEM products) in the Enterprise Security Product group, sharing office space with HP TippingPoint (an IPS) and HP Foritfy and has been working to build close reporting ties between those products to make them collectively easier to use in large companies.

  • Company name: Q1 Labs, an IBM company Product Name: QRadar Why we are watching: IBM bought Q1Labs in 2011 and threw it into a newly formed security systems division, which kind of marked the end of IBM’s own Tivoli SIEM. IBM has since added indexing and query improvements to support keyword search; improvements in event storage scalability; integration with IBM DAM and support for endpoint management, IPS firewall, and governance, risk and compliance technologies. IBM has announced a co-managed service option for QRadar for customers that want to combine an SIEM technology deployment with monitoring services from IBM.

  • Company name: McAfee Product Name: McAfee Enterprise Security Manager Why we are watching: Nitro Security was known for its advanced correlation engine which augments rule-based correlation with risk-based activity profiling. This product also gets really good performance grades in larger deployments. Late last year, McAfee rolled out a new version that allows it to pull in data from McAfee Global Threat Intelligence, risk data from McAfee Risk Advisor, and asset data from McAfee Vulnerability Manager and McAfee ePolicy Orchestrator.

  • Company name: Aveksa Product Name: Access Governance Software Suite Why we are watching: When the company reported its 2012 financials in January, it announced that 45% of its revenue was coming from brand new customers. In December, Aveksa launched Identity and Access Management 6.0, designed specifically to help enterprises fully scale their IAM initiatives and manage the Big Data that is now typically associated with IAM deployments. Shortly thereafter, Aveksa introduced MyAccess Live, a new Software-as-a-Service (SaaS) Identity and Access Management solution that provides integrated visibility and control of both cloud and on-premise applications in a single cloud-based solution.

  • Company name: Courion Product Names: Access Assurance Suite and CourionLive Why we are watching: The unique aspect of this product is that it was designed using a structured process so that it can integrate with other vendor’s administration, analytics, workflow and reporting tools that lets customers easily integrate with other vendors’ analytics, workflow and reporting tools.

  • Company name: Sailpoint Product Name: Identity IQ Why we are watching: Sailpoint is a fast-growing firm that takes a risk-based approach to identity management. Identity combines ID information and log data in the same repository for report intelligence.

Show Comments

Market Place

<img height="1" width="1" style="border-style:none;" alt="" src="//insight.adsrvr.org/track/evnt/?adv=bitgblf&ct=0:jkis3bum&fmt=3"/>