The Forrester Wave: Email Content Security, Q4 2012

Page created by Virgil Sims
 
CONTINUE READING
The Forrester Wave: Email Content Security, Q4 2012
FOR: Security &                The Forrester Wave™: Email Content
Risk Professionals
                               Security, Q4 2012
                               by Rick Holland, november 15, 2012

                               Key TaKeaWays

                               email security is a Critical Component of your portfolio
                               Email is a key component of business processes within enterprises and must be
                               secured. Despite the fact that email security is low on the spending priority list,
                               it’s critical that organizations safeguard email. Email is a popular attack vector for
                               targeted attacks, and HIPAA and PCI mandate that emails containing confidential
                               data be secured.

                               advanced Capabilities differentiate Vendor offerings
                               Vendors are delivering enhanced capabilities in response to the threat and
                               compliance landscape. Big data analytics are leveraged to combat targeted attacks.
                               Encryption capabilities have been improved and simplified. Channel DLP is now
                               robust and feature-rich.

                               The delivery Model is shifting
                               The deployment of appliance-based email security gateways is declining.
                               Enterprises are adopting new models, such as software-as-a-service. Many
                               outsource their entire email infrastructure and rely on hosted email providers for
                               security, while those that are cloud-averse deploy virtual appliances that run in
                               their VMware and Microsoft environments.

                     Forrester Research, Inc., 60 Acorn Park Drive, cambridge, MA 02140 USA
                        Tel: +1 617.613.6000 | Fax: +1 617.613.5000 | www.forrester.com
For Security & Risk Professionals                                                                                              November 15, 2012

                     The Forrester Wave™: Email Content Security,
                     Q4 2012
                     The Nine Providers That Matter Most And How They Stack Up
                      by Rick Holland
                      with Stephanie Balaouras and Jessica McKee

Why Read This Report
In Forrester’s 47-criteria evaluation of email content security vendors, we identified the nine most
significant vendors in the category and researched, analyzed, and scored them: Barracuda Networks, Cisco,
McAfee, Proofpoint, Sophos, Symantec, Trend Micro, Trustwave, and Websense. This report details our
findings about how well each vendor fulfills our criteria and where they stand in relation to each other to
help security and risk professionals select the right partner for their email content security solution.

Table Of Contents                                                                Notes & Resources
2 Email Security Is A Critical Component Of                                      Forrester conducted lab-based evaluations
  Your Portfolio                                                                 in May 2012 and interviewed nine vendor
                                                                                 and 18 user companies: Barracuda
  Advanced Capabilities Differentiate Vendor
                                                                                 Networks, Cisco, McAfee, Proofpoint,
  Offerings
                                                                                 Sophos, Symantec, Trend Micro, Trustwave,
  Vendors Are Shifting Their Delivery Models                                     and Websense.
4 Email Content Security Evaluation Overview
                                                                                 Related Research Documents
  Evaluation Criteria
                                                                                 Content Security: 2012 Budget And Planning
  Market Presence And Advanced Capabilities                                      Guide
  Narrow The Field                                                               November 16, 2011
6 Evaluation Analysis                                                            The Content Security Forecast Calls For
                                                                                 Clouds
8 Vendor Profiles
                                                                                 October 24, 2011
  Leaders: Deliver On Large Enterprise                                           Market Overview: Content Security, Q3 2011
  Requirements                                                                   October 17, 2011
  Strong Performers: Close Behind But Lack
  Enterprise Grade DLP And Encryption
11 Supplemental Material

                  © 2012, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available
                  resources. Opinions reflect judgment at the time and are subject to change. Forrester®, Technographics®, Forrester Wave, RoleView, TechRadar,
                  and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. To
                  purchase reprints of this document, please email clientsupport@forrester.com. For additional information, go to www.forrester.com.
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                    2

Email Security is a critical component of your portfolio
Email is a critical business function that is deeply embedded in the DNA of business processes
within organizations. Ensuring that email messages are delivered and received in a safe and secure
manner is paramount. Enterprises rely on email content security solutions to ensure this. However,
despite the importance of email, companies invest a relatively small percentage of the security
budget to protect it. The overall content security budget, including web and email, makes up just 7%
of the security budget. Despite this, it has never been more important to safeguard email because:

  ■ The threat landscape is constantly evolving. In the nostalgic, not-too-distant past, spam and
    “traditional” signature-based malware were the biggest threats that email content security
     solutions needed to defend against. Antispam and antivirus were largely commoditized
     capabilities in a very mature product space. Today, targeted attacks via spear phishing campaigns
     have replaced spam and antivirus as the primary email threat to enterprises. Until recently, email
     security solutions have been slow to evolve to address this threat. As a result, many companies
     have opted to supplement their existing solutions with offerings specifically designed to address
     these targeted attacks containing advanced malware. Addressing advanced malware requires new
     approaches beyond signature-based detection and first-generation reputation services.

  ■ It will result in serious fines if you fail to do so. The failure to secure email content can
     result in serious fines. The Health Information Technology for Economic and Clinical Health
     (HITECH) Act mandates that covered entities that violate provisions of HIPAA concerning the
     protection of personal health information (PHI) are subject to significant fines. The government
     can levy a maximum penalty of $1.5 million for all violations of an identical provision.1 PCI
     compliance also requires safeguarding of emails. The PCI DSS 4.2 requirement states, “Never
     send unprotected PANs by end-user messaging technologies.” The card brands can fine
     companies from “$5,000 to $100,000 per month for PCI compliance violations.”2 Organizations
     must preserve the confidentiality of emails that contain sensitive information.

Advanced Capabilities Differentiate Vendor Offerings
Capabilities have moved far beyond spam and commodity antimalware. In response to the threat
and compliance landscape, vendors are:

  ■ Using analytics to improve their antimalware capabilities. Vendors have been releasing new
     capabilities to address the advanced malware threat. While there is no silver bullet against a
     patient and well-funded attacker, vendors have made strides to close the malware detection
     gap. Vendors are now leveraging the power of big data analytics to determine if a message is
     malicious. Solutions now include delay queues that dynamically hold the delivery of potentially
     malicious emails until further context can be developed about the message. Suspicious URLs
     embedded into emails are rewritten to ensure that hyperlinks are inspected at the time of click
     instead of the time of delivery.

© 2012, Forrester Research, Inc. Reproduction Prohibited                                 November 15, 2012
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                        3

  ■ Enhancing and simplifying encryption. Highly regulated verticals and companies that
     transmit toxic data are the most likely adopters of email encryption technologies.3 According
     to Forrester survey data, 40% of financial services and 29% of public sector/healthcare
     organizations have embraced email encryption capabilities.4 Firms have traditionally preferred
     gateway-to-gateway transport layer security (TLS) as an alternative to the often complex and
     difficult-to-manage OpenPGP or S/MIME implementations. Today, organizations have the
     option to choose robust, yet scalable, hosted or on-premises solutions. Vendors have simplified
     the sender and recipient key exchange process to improve the user experience, and they have
     extended encryption capabilities to include mobile devices. Some vendors have developed in-
     house offerings while others have sought out OEM relationships. Trustwave and Symantec OEM
     ZixCorp, while Websense OEMs Voltage.

  ■ Building more-robust data loss prevention (DLP). Like email encryption, DLP technology
     hasn’t been widely implemented by enterprises. According to survey respondents, only 21%
     of financial services and 18% of media/entertainment/leisure and public sector/healthcare
     companies have adopted email channel DLP. Other verticals have been very slow to adopt.5
     In Forrester’s “Rethinking DLP” report, we contend that DLP is transitioning from product
     to feature, and we recommend a new process-based approach to effectively deploy it.6
     Organizations that adopt this approach can have success with DLP. The way vendors license
     DLP is also in transition. There is a trend to offer full “enterprise DLP” capabilities out of the
     box. Organizations no longer have to accept “DLP lite” or limited regular expression filtering
     capabilities. Companies can now opt for advanced DLP engines, enforcement controls, and
     policy support out of the box.

Vendors Are Shifting Their Delivery Models
For most companies, the days of physical email security appliances are numbered. There are several
factors shifting the way vendors deliver their email security solutions, including:

  ■ Many firms increasingly prefer software-as-a-service (SaaS). SaaS email content security is
    one of the most mature SaaS offerings available for security and risk professionals. Within the
    next year, 55% of the companies in our survey will have adopted the service (see Figure 1). At a
    minimum, all enterprises should consider inbound email filtering. According to the nonprofit
    The Spamhaus Project, 90% to 96% of all inbound mail is illegitimate.7 Why even process and
    inspect illegitimate messages when a SaaS provider can drop the messages altogether? Inbound
    SaaS can also act as an additional disaster recovery layer. If a company’s messaging platform
    goes down, the email SaaS vendor can queue the messages until the messaging platform
    recovers from an outage. DLP and encryption capabilities aren’t as mature in the SaaS model as
    they are in on-premises, but the verticals most likely to utilize these features are less inclined to
    adopt SaaS services.

© 2012, Forrester Research, Inc. Reproduction Prohibited                                   November 15, 2012
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                             4

  ■ Some firms will opt for hosted email. Organizations are increasingly considering and migrating
     to the hosted email offerings available in the Google Apps and Microsoft Office 365 suites.
     Physical appliances will see further attrition as these organizations adopt the security capabilities
     of the hosted email providers. There will be a subset of enterprises that don’t want to manage on-
     premises solutions but want more-robust security capabilities than are available from the hosted
     email providers. These companies will likely leverage the SaaS offerings of security vendors.
     Emails will first be routed to the security vendor’s SaaS environment for inspection and the
     legitimate traffic will then be forwarded to the hosted email provider for delivery.

  ■ Firms that deploy on-premises will demand a virtual form factor. Virtual email security
     solutions are growing in popularity with enterprises. The ability to leverage the benefits of the
     virtual infrastructure is appealing. For example, enterprises can now easily scale resources to
     meet the demands of increased utilization, and IT can provision new appliances without waiting
     for the traditional procurement process. Today, virtual solutions are available for VMware and
     Microsoft Hyper-V. Companies that are cloud-averse are the most likely adopters of the virtual
     form factor.

Figure 1: Firms Increasingly Prefer Software-As-A-Service For Email Security Management

     “What are your firm’s plans to adopt the following ‘as-a-service’ security offerings/approaches?”

                               Planning to implement       Implemented,     Expanding/upgrading
                               in the next 12 months       not expanding    implementation

           Email filtering      5%                                                   40%              10%

                       Base: 2,154 North American and European IT security decision-makers

Source: Forrsights Security Survey, Q2 2012
61559                                                                              Source: Forrester Research, Inc.

Email Content Security Evaluation Overview
To assess the state of the email content security market and see how the vendors stack up against
each other, Forrester evaluated the strengths and weaknesses of top email content security vendors.

Evaluation Criteria
After examining past research, user need assessments, and vendor and expert interviews, we
developed a comprehensive set of evaluation criteria. We evaluated vendors against 47 criteria,
which we grouped into three high-level buckets:

© 2012, Forrester Research, Inc. Reproduction Prohibited                                       November 15, 2012
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                     5

  ■ Current offering. Each vendor’s position on the vertical axis of the Forrester Wave graphic
     indicates the strength of its current product offering. After the vendor’s demonstration of the
     solution, Forrester requested unfettered access to an online demonstration environment of
     the solution. The sets of capabilities evaluated in this category are: email filtering, data loss
     prevention, encryption, reporting, management, performance, and operations. Forrester also
     evaluated customer satisfaction with the vendor’s solution through customer interviews.

  ■ Strategy. A vendor’s position on the horizontal axis indicates the strength of its go-to-market
     strategy. Forrester looked at investments in research and development as well as threat
     intelligence. Forrester also evaluated the differentiation of the vendor’s technology road map.
     Finally Forrester evaluated the vendor’s partner community. Forrester focused on the scope and
     depth of the vendor’s license, reseller, and consultant/systems integration partnerships.

  ■ Market presence. The size of the vendor’s bubble on the chart indicates its market presence.
     Forrester measured this based on the vendor’s customer base, international presence, and
     market segment diversity. Forrester also estimated the vendor’s email content security revenue
     and year-over-year growth.

Market Presence And Advanced Capabilities Narrow The Field
Forrester included nine vendors in the assessment: Barracuda Networks, Cisco, McAfee, Proofpoint,
Sophos, Symantec, Trend Micro, Trustwave, and Websense. Each of these vendors has (see Figure 2):

  ■ Product revenues greater than $10 million. Forrester evaluated vendors that generate more
     than $10 million annually from content security products. We excluded consulting revenue
     related to custom and specialized solutions.

  ■ DLP and encryption. Forrester only considered solutions with DLP and encryption capabilities.

  ■ Operation of a threat intelligence center. Forrester only included vendors that operate a
     threat intelligence center that monitors and incorporates threat information into the product to
     improve antispam and antimalware capabilities.

  ■ Significant interest from Forrester customers. Forrester considered the level of interest and
     feedback from our clients based on our various interactions, including inquiries, advisories, and
     consulting engagements.

© 2012, Forrester Research, Inc. Reproduction Prohibited                                 November 15, 2012
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                                 6

Figure 2 Evaluated Vendors: Product Information And Selection Criteria

                                                                            Product version         Version
  Vendor                        Product evaluated                              evaluated            release date
  Barracuda Networks            Barracuda Spam & Virus Firewall                v 5.1.004            March 2012

  Cisco                         Cisco Email Security (formerly known as        AsyncOS              March 2012
                                Cisco IronPort Email Security)                  v7.5.2

  McAfee                        McAfee Email Gateway                              v7                Nov. 2011

  Proofpoint                    Proofpoint Enterprise Protection/               v7.0.2              Feb. 2012
                                Proofpoint Enterprise Privacy

  Sophos                        Sophos Email Appliance                          v3.7.0              April 2012

  Symantec                      Symantec Messaging Gateway                       v9.5               April 2011

  Trend Micro                   Interscan Messaging Security                     v8.2               Oct. 2011

  Trustwave                     Secure Email Gateway                             v7.0               May 2012

  Websense                      Email Security Gateway Anywhere (ESGA)           v7.7               Feb. 2012

                                                Vendor selection criteria
  Product revenues greater than $10 million. Forrester evaluated vendors that generate more than $10
  million annually from content security products. We excluded consulting revenue related to custom and
  specialized solutions.

  DLP and encryption. Forrester only considered solutions with DLP and encryption capabilities.

  Operation of a threat intelligence center. Forrester only included vendors that operate a threat
  intelligence center that monitors and incorporates threat information into the product to improve
  antispam and antimalware capabilities.

  Significant interest from Forrester customers. Forrester considered the level of interest and feedback
  from our clients based on our various interactions, including inquiries, advisories, and consulting
  engagements.

                                                                                       Source: Forrester Research, Inc.

Evaluation Analysis
The evaluation uncovered a very mature market in which the majority of vendors were Strong
Performers or better (see Figure 3):

  ■ Symantec, Cisco, Proofpoint, Trend Micro, Websense, and McAfee lead the pack. These six
     vendors distinguish themselves as the highest scoring Leaders in this evaluation. All of these
     vendors are capable of addressing the unique needs of the largest of enterprise clients.

© 2012, Forrester Research, Inc. Reproduction Prohibited                                            November 15, 2012
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                                   7

  ■ Barracuda Networks, Sophos, and Trustwave offer competitive options. Barracuda Networks
     and Sophos don’t offer the advanced DLP, encryption, reporting, and management capabilities
     that large enterprises require.

This evaluation of the email content security market is intended to be a starting point only. We
encourage readers to view detailed product evaluations and adapt the criteria weightings to fit their
individual needs through the Forrester Wave Excel-based vendor comparison tool.

Figure 3 Forrester Wave™: Email Content Security, Q4 ‘12

           Risky                             Strong
           Bets      Contenders            Performers                 Leaders
 Strong

                                                                                          Go online to download

                                                                       Cisco              the Forrester Wave tool
                                                       Websense                           for more detailed product
                                                           Proofpoint     Symantec
                                                                                          evaluations, feature
                                                             McAfee
                                                                                          comparisons, and
                                                         Barracuda Trend Micro
                                                                                          customizable rankings.

Current                                    Trustwave         Sophos
offering

            Market presence

                                Full vendor participation
 Weak

           Weak                                Strategy                         Strong

                                                                                         Source: Forrester Research, Inc.

© 2012, Forrester Research, Inc. Reproduction Prohibited                                             November 15, 2012
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                                                                              8

Figure 3 Forrester Wave™: Email Content Security, Q4 '12 (Cont.)

                                                                                                                           Trend Micro
                                                                                       Proofpoint
                                        Weighting
                                        Forrester’s

                                                                                                                                          Trustwave

                                                                                                                                                       Websense
                                                       Barracuda

                                                                                                               Symantec
                                                                             McAfee

                                                                                                     Sophos
                                                                    Cisco
CURRENT OFFERING                         50%          3.15         3.84     3.46      3.71          2.67      3.69        3.50           2.61         3.86
 Email filtering                         35%          3.33         3.87     3.39      3.43          2.36      3.87        3.48           2.66         4.02
 Data leak prevention                    15%          2.15         3.20     3.70      4.60          2.80      3.00        3.15           2.80         4.45
 Reporting and management                15%          3.10         3.70     3.80      3.80          1.80      3.60        4.20           2.80         3.80
 Performance and operations              15%          5.00         5.00     5.00      5.00          4.00      5.00        4.50           3.25         4.75
 Client reference scores and             20%          2.25         3.50     2.00      2.50          2.75      3.00        2.50           1.75         2.50
 feedback

STRATEGY                                 50%          2.76         4.00     3.80      3.96          3.04      4.16        4.16           2.80         3.52
  Product strategy                       60%          3.60         4.00     3.00      4.60          3.40      3.60        3.60           3.00         4.20
  Partners                               40%          1.50         4.00     5.00      3.00          2.50      5.00        5.00           2.50         2.50

MARKET PRESENCE                           0%          2.48         3.52     2.68      2.04          2.12      3.56        2.88           2.04         3.00
 Installed base                          60%          2.40         3.60     2.60      1.40          1.80      3.80        3.20           3.00         3.00
 Revenue                                 40%          2.60         3.40     2.80      3.00          2.60      3.20        2.40           0.60         3.00

All scores are based on a scale of 0 (weak) to 5 (strong).
                                                                                                              Source: Forrester Research, Inc.

vENDOR PROFILES

Leaders: Deliver On Large Enterprise Requirements
  ■ Symantec. Symantec has the largest market presence of any vendor we evaluated and continues
     to be a Leader in the email content security space. Symantec rebranded the Brightmail
     solution to Symantec Messaging Gateway in April 2011, and the solution continues to be
     widely deployed. Symantec offers a wide range of deployment options that cater to any size of
     organization. In addition to a VMware appliance, Symantec is developing support for an MS
     HyperV appliance. Symantec is a leader in encryption capabilities. Clients can leverage PGP
     Universal Gateway Email for robust on-premises encryption or opt for Symantec Content
     Encryption service, which leverages OEM relationships with Echoworx or ZixCorp. Symantec
     has strong reporting capabilities, but there are opportunities to improve the dashboard features
     of the solution. Furthermore, Symantec has an opportunity to improve hybrid capabilities,
     including unified reporting and administration capabilities. Like other vendors in this Forrester
     Wave, Symantec charges more for robust DLP capabilities via Symantec Data Loss Prevention.

© 2012, Forrester Research, Inc. Reproduction Prohibited                                                                             November 15, 2012
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                   9

  ■ Cisco Systems. Cisco rebranded Ironport to Cisco Email Security during this Wave. Cisco
     has the second largest install base in our study and continues to be popular among enterprise
     clients. The solution has strong antimalware capabilities and also offers a wide range of
     encryption options. The Cisco Encryption Appliance provides on-premises push, S/MIME,
     and OpenGPG-based encryption. The Cisco Registered Envelope Service offers pull-based
     encryption, in which per-message keys are stored in a cloud service. Cisco is currently testing
     a virtual form factor for VMware environments. With a few exceptions, Cisco is able to meet
     the needs of large enterprises. As a standalone channel DLP solution, the product isn’t as robust
     as the competition. To offer competitive enterprise-scale DLP capabilities, Cisco must leverage
     an RSA DLP integration. Other vendors offer this capability without any additional licensing
     costs. Cisco should focus on unified administration and reporting of the hybrid email offering;
     enterprises should use a single U/I to manage their environments.

  ■ Proofpoint. Proofpoint is one of the top vendors evaluated in this Forrester Wave. Proofpoint
     offers physical and virtual appliances as well as SaaS and hybrid solutions, although the hybrid
     solution doesn’t include centralized reporting or administration. The company went public with
     its initial public offering in April 2012. This should demonstrate to potential customers that
     Proofpoint is a viable, serious player in the space. Proofpoint demonstrates that channel DLP
     need not be limited or constrained in any way. Proofpoint has the strongest DLP capabilities
     in this Forrester Wave. Proofpoint launched a targeted attack protection service in Q2 of this
     year (we did not evaluate this feature in the Wave). This additional pay offering leverages data
     analytics to combat targeted attacks. Proofpoint is the only pure-play vendor evaluated in this
     Forrester Wave. This is a challenge for companies seeking an integrated content security offering.
     Proofpoint relies on technology partnerships to offer customers both email and web content
     security solutions.

  ■ Trend Micro. Trend Micro’s InterScan Messaging Security (IMS) can be deployed as a virtual
     appliance (VMware and Microsoft Hyper-V), software appliance, software, SaaS, and hybrid via
     the optional precloud filter. The reporting and management capabilities of IMS are impressive.
     Trend led all other vendors in these areas. Centralized reporting and management of email
     (including hybrid deployments) and web solutions are possible via the Trend Micro Control
     Manager. Large enterprises may find Trend’s email channel DLP and encryption capabilities
     unable to meet their needs. The IMS has DLP-lite capabilities, but customers must purchase the
     full data loss prevention solution for this advanced functionality. Trend needs to offer advanced
     DLP capability without requiring the larger enterprise DLP suite. If an organization is interested
     in more powerful encryption capabilities than basic TLS, the Email Encryption Gateway
     must be deployed. This solution supports proprietary push-based encryption capabilities. The
     solution is not able to support large enterprises with S/MIME or OpenPGP deployments.

© 2012, Forrester Research, Inc. Reproduction Prohibited                                November 15, 2012
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                   10

  ■ Websense. Websense scored the highest in email filtering capabilities and overall Current
     Offering evaluation criteria. Websense offers a wide variety of deployment options: software,
     physical appliances, SaaS, and hybrid deployments. Websense has a strong story regarding
     hybrid email security deployments. The Triton architecture enables reporting and management
     of both on-premises gateways and SaaS from a single console. Customers can also manage web
     security and DLP solutions from the same interface. Triton offers a compelling “single pane
     of glass” option. Websense is still relatively new to the appliance form factor, and the V-Series
     appliances have not been ported to a virtual form factor at this time. Websense needs to release
     a virtual appliance to meet the increasing demand. A virtual appliance is being developed and
     is targeted for release in the first half of 2013. Websense offers robust DLP capabilities, and the
     email gateway provides the same DLP technology offered in the enterprise Data Security Suite
     at no additional cost. Websense is a significant provider of web security solutions, but the email
     security offerings don’t have as large of a market share.

  ■ McAfee. In December 2011, McAfee released the McAfee EMail Gateway 7.0 (MEG). This was
     an extremely significant product release for McAfee. MEG was released roughly three years
     after the Secure Computing acquisition and combined the best features of Secure Computing’s
     IronMail with the McAfee Email and Web Security (EWS) platform. Competitive displacements
     of IronMail were high, and satisfaction of former Secure Computing customers was very low.
     McAfee now has a compelling story to offer email security prospects. McAfee offers email
     security solutions in appliance, virtual appliance, blade, SaaS, and hybrid (without unified
     administration and reporting) form factors. McAfee is the only vendor to offer a blade form
     factor, which will appeal to carriers and service providers. MEG offers strong DLP capabilities
     built right into the solution; there are no additional costs for robust “enterprise grade” channel
     DLP. McAfee needs to focus on continued integration of email and web security solutions as
     well as a centralized email hybrid story.

Strong Performers: Close Behind But Lack Enterprise Grade DLP And Encryption
  ■ Barracuda Networks. Barracuda offers a wide range of email security deployment options.
    Solutions are available in appliance, VMware virtual appliance, SaaS, and hybrid with unified
    administration and reporting. The Barracuda web security solution can be managed from
    the same interface. This is very appealing to clients interested in managing all of their on-
    premises or SaaS-based email and web security solutions from one console. Barracuda isn’t
    able to meet the DLP and encryption requirements of large enterprises. DLP pattern matching
    is done via regular expressions with a limited set of predefined dictionaries. For encryption
    beyond TLS, the Barracuda Email Security Service provides pull-based AES encryption. There
    are no push-based encryption options or support for S/MIME or OpenPGP. The no per-user
    pricing model for this encryption service and cloud security is very attractive to customers.
    Although navigating the Spam & Virus Firewall is intuitive, the default dashboard has room for
    improvement and isn’t as robust as some of the other vendors we evaluated.

© 2012, Forrester Research, Inc. Reproduction Prohibited                                 November 15, 2012
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                 11

  ■ Sophos. Sophos received high marks from customer references. The Sophos Email Appliances
     are very intuitive and easy-to-use, but many large enterprises will find that feature requirements
     and configuration options aren’t available. To expand market share into larger enterprises,
     Sophos is going to have to develop or strengthen capabilities and features that cater to large
     enterprise needs. Data Loss Prevention is an example of a feature that must be enhanced to meet
     the needs of large highly regulated organizations. Sophos has a virtual appliance that is very
     popular with customers, but beyond this appliance, deployment options are limited. A physical
     appliance is the only other alternative. There is no hosted email security offering; given the
     adoption of SaaS, Sophos needs to develop or acquire this capability to be competitive. Threat
     intelligence is shared across all Sophos products including both the email and web content
     security solutions. Integrated reporting should be the next item on the integration road map.

  ■ Trustwave. Trustwave acquired M86 Security during this Forrester Wave evaluation and has
    rebranded the M86 MailMarshal Secure Email Gateway to the Secure Email Gateway (SEG).
    The acquisition increased Trustwave’s security portfolio and bolstered Trustwave’s international
    presence. The future looks promising for the rebranded SEG, as the acquisition will make it
    more competitive in a highly saturated market. Look for the SEG to be integrated into the larger
    set of the Trustwave security portfolio. This will greatly benefit the SEG, as the solution lacks
    many capabilities needed by large companies. The SEG is only available as Windows software
    for enterprise clients, although a service provider edition is available. Most large enterprises
    prefer an appliance over loading software onto a Windows server, but installing the software on
    a virtual server makes the deployment option more scalable. The SEG will also appeal to shops
    that prefer to run MS Windows infrastructure. The SEG shares reporting and DLP capabilities
    with the Trustwave Secure Web Gateway.

Supplemental MATERIAL

Online Resource
The online version of Figure 3 is an Excel-based vendor comparison tool that provides detailed
product evaluations and customizable rankings.

Data Sources Used In This Forrester Wave
Forrester used a combination of four data sources to assess the strengths and weaknesses of each
solution:

  ■ Vendor surveys. Forrester surveyed vendors on their capabilities as they relate to the evaluation
     criteria. Once we analyzed the completed vendor surveys, we conducted vendor calls where
     necessary to gather details of vendor qualifications.

© 2012, Forrester Research, Inc. Reproduction Prohibited                               November 15, 2012
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                       12

    ■ Product demos. We asked vendors to conduct demonstrations of their product’s functionality. We
      used findings from these product demos to validate details of each vendor’s product capabilities.

    ■ Independent, hands-on product testing. Forrester also requested unfettered access to vendors’
      demonstration environments, where we could “play” with the product, validating its functionality
      and fit for Forrester’s use cases, as well as testing the user interface and its ease of use.

    ■ Customer reference calls. To validate product and vendor qualifications, Forrester also
      conducted reference calls with two of each vendor’s current customers.

The Forrester Wave Methodology
We conduct primary research to develop a list of vendors that meet our criteria to be evaluated
in this market. From that initial pool of vendors, we then narrow our final list. We choose these
vendors based on: 1) product fit; 2) customer success; and 3) Forrester client demand. We eliminate
vendors that have limited customer references and products that don’t fit the scope of our evaluation.

After examining past research, user need assessments, and vendor and expert interviews, we develop
the initial evaluation criteria. To evaluate the vendors and their products against our set of criteria, we
gather details of product qualifications through a combination of lab evaluations, questionnaires,
demos, and/or discussions with client references. We send evaluations to the vendors for their review,
and we adjust the evaluations to provide the most accurate view of vendor offerings and strategies.

We set default weightings to reflect our analysis of the needs of large user companies — and/or
other scenarios as outlined in the Forrester Wave document — and then score the vendors based
on a clearly defined scale. These default weightings are intended only as a starting point, and we
encourage readers to adapt the weightings to fit their individual needs through the Excel-based
tool. The final scores generate the graphical depiction of the market based on current offering,
strategy, and market presence. Forrester intends to update vendor evaluations regularly as product
capabilities and vendor strategies evolve.

Endnotes
1
    Source: US Department of Health and Human Services (http://www.hhs.gov/ocr/privacy/hipaa/
    administrative/enforcementrule/hitechenforcementifr.html).
2
    PCI compliance also requires safeguarding of emails. The PCI DSS 4.2 requirement states, “Never send
    unprotected PANs by end-user messaging technologies.” Companies can be fined from “$5,000 to
    $100,000 per month for PCI compliance violations.” Source: PCI Security Standards Council (https://
    www.pcisecuritystandards.org/documents/pci_dss_v2.pdf) and PCI Compliance Guide (http://www.
    pcicomplianceguide.org/pcifaqs.php#11).

© 2012, Forrester Research, Inc. Reproduction Prohibited                                     November 15, 2012
For Security & Risk Professionals
The Forrester Wave™: Email Content Security, Q4 2012                                                        13

3
    Highly regulated verticals and companies that transmit toxic data are the most likely adopters of email
    encryption technologies. See the July 12, 2012, “Control And Protect Sensitive Information In The Era Of
    Big Data” report.
4
    Source: Forrsights Security Survey, Q2 2012.
5
    Source: Forrsights Security Survey, Q2 2012.
6
    In a Forrester report, we contend that DLP is no longer a product, but a feature, and we recommend a new
    process-based approach to effectively deploy it. See the January 3, 2012, “Rethinking DLP: Introducing The
    Forrester DLP Maturity Grid” report.
7
    According to the nonprofit The Spamhaus Project, 90% to 96% of inbound mail is illegitimate. Source: The
    Spamhaus Project (http://www.spamhaus.org/whitepapers/effective_filtering/).

© 2012, Forrester Research, Inc. Reproduction Prohibited                                      November 15, 2012
About Forrester
                                                 A global research and advisory firm, Forrester inspires leaders,
                                                 informs better decisions, and helps the world’s top companies turn
                                                 the complexity of change into business advantage. Our research-
                                                 based insight and objective advice enable IT professionals to
                                                 lead more successfully within IT and extend their impact beyond
                                                 the traditional IT organization. Tailored to your individual role, our
                                                 resources allow you to focus on important business issues —
                                                 margin, speed, growth — first, technology second.

                                                 for more information
                                                 To find out how Forrester Research can help you be successful every day, please
                                                 contact the office nearest you, or visit us at www.forrester.com. For a complete list
                                                 of worldwide locations, visit www.forrester.com/about.

                                                 Client support
                                                 For information on hard-copy or electronic reprints, please contact Client Support
                                                 at +1 866.367.7378, +1 617.613.5730, or clientsupport@forrester.com. We offer
                                                 quantity discounts and special pricing for academic and nonprofit institutions.

                                                 Forrester Focuses On
                                                 Security & Risk Professionals
                                                 To help your firm capitalize on new business opportunities safely,
                                                 you must ensure proper governance oversight to manage risk while
                                                 optimizing security processes and technologies for future flexibility.
                                                 Forrester’s subject-matter expertise and deep understanding of your
                                                 role will help you create forward-thinking strategies; weigh opportunity
                                                 against risk; justify decisions; and optimize your individual, team, and
                                                 corporate performance.
                                             «   Sean Rhodes, client persona representing Security & Risk Professionals

Forrester Research, Inc. (Nasdaq: FORR) is an independent research company that provides pragmatic and forward-thinking advice to
global leaders in business and technology. Forrester works with professionals in 17 key roles at major companies providing proprietary
research, customer insight, consulting, events, and peer-to-peer executive programs. For more than 29 years, Forrester has been making
IT, marketing, and technology industry leaders successful every day. For more information, visit www.forrester.com.             61559
You can also read