tracxn research: enterprise security landscape, august 2016

609

Upload: tracxn

Post on 14-Jan-2017

498 views

Category:

Data & Analytics


5 download

TRANSCRIPT

Page 1: Tracxn Research: Enterprise Security Landscape, August 2016
Page 2: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

TracxnWorld’s Largest Startup Research Platform

2

Page 3: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

Contents

Topic Page No.

Scope of Report 05

Entrepreneur Activity 07

Investment Trend 11

Who is Investing 19

Exit Outlook - IPO, Acquisitions 23

Sub Sector Analysis 30

Interesting Companies 47

Useful Links 58

Company List 60

Team 609

3

3

Page 4: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 20164

Illustrative Sectors We Track

MOBILE

EDUCATION

MOBILE COMMERCE

MOBILE PAYMENTS

MOBILE MARKETING

MOBILE DEV TOOLS

MOBILE HEALTH

MOBILE GAMING

MOBILE LEARNING

MOBILE COMMUNICATION

EDUCATION IT

SELF LEARNING

CONSUMER

HEALTHCARE

MARKETPLACES

SUBSCRIPTION COMM.

FOOD TECH

INTERNET FIRST BRANDS

UBER FOR X

SECOND HAND GOODS

TRAVEL

GAMING

LIFE SCIENCES

DIGITAL HEALTH

FINTECH

BITCOIN

PAYMENTS

SECURITY

STORAGE

NETWORKING

MOBILITY

IT OPS

CLOUD INFRASTRUCTURE

API MANAGEMENT

BIGDATA INFRASTRUCTURE

ENTERPRISEINFRASTRUCTURE

TECH

INTERNET OF THINGS

3D PRINTING

HR TECH

BUSINESS INTELLIGENCE

MOBILE-FIRST ENT. APPS

INTELLIGENT ENT. APPS

OPEN SOURCE

RETAIL TECH

MARKETING TECH

STEALTH MODE

ENTERPRISEAPPLICATIONS

Page 5: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 20165

Sector Overview

Scope of report

The report covers companies that provide cybersecurity product & services for enterprises. Companies providing exclusively

services like cybersecurity consultancy, Managed Security Service Providers (MSSP) and resellers are out of the scope. Personal

security & privacy provider and Governance, Risk & Compliance (GRC) companies are also excluded from consideration.

• Total $25.67 Billion in Funding with $20.54 Billion invested in 1020 Companies between 2008 and 2016 YTD

• Total of 422 acquisitions with 99 Acquisitions between 2015 and 2016 YTD

Most active funds (In last 50 months)

• Sequoia Capital – (FireEye, Qihoo 360, Palo Alto Networks, Okta, Barracuda Networks, SumoLogic)

• Intel Capital – (OpenPeak, ForeScout, AlienVault, Bromium, Mocana)

• Accel Partners – (Tenable Network, Lookout, Airwatch, SumoLogic, Crowdstrike, Illumio, Netskope)

The scope of this report includes equity as well as debt funding received by the companies.

Page 6: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

Scope of Report

Entrepreneur Activity

Investment Trend

Who is Investing

Exit Outlook - IPO, Acquisitions

Sub Sector Analysis

Interesting Companies

Useful Links

Company List

Team

6

6

Page 7: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

95

178190

229

248

195

27

0

60

120

180

240

300

2010 2011 2012 2013 2014 2015 2016

Nu

mb

er o

f C

om

pan

ies

7

YoY – Number of companies founded

Sumo Logic CrowdStrike Cylance Illumio Vera Cato Networks Deceitware

Bromium Bracket Computing Netskope Darktrace IronNet Cybersecurity Tascent DDoS Net

Page 8: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 20168

Niche Upcoming Sectors

Page 9: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 20169

Niche Upcoming Sectors

Page 10: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

Scope of Report

Entrepreneur Activity

Investment Trend

Who is Investing

Exit Outlook - IPO, Acquisitions

Sub Sector Analysis

Interesting Companies

Useful Links

Company List

Team

10

10

Page 11: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201611

YoY – Number of Rounds and Total Funding

Note: The funding includes debt rounds also.

$0.9B $0.9B

$1.2B$1.3B

$1.9B

$4.0B

$3.1B

$4.8B

$2.3B

113

130

165172

209

325

354

332

151

0

80

160

240

320

400

0

1

2

4

5

6

2008 2009 2010 2011 2012 2013 2014 2015 2016

Nu

mb

er of R

ou

nd

sFu

nd

ing

Am

ou

nt

(in

Bill

ion

s)

Funding Amount Number of Rounds

Page 12: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201612

YoY – Number of Rounds by Stage

Page 13: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201613

YoY – Funding by Stage

Page 14: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201614

Average Ticket Size – Early Stage

Page 15: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201615

Top investments in last one year

Page 16: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201616

Top investments in last one year

Page 17: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201617

Funnel view of Sector

Page 18: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

Scope of Report

Entrepreneur Activity

Investment Trend

Who is Investing

Exit Outlook - IPO, Acquisitions

Sub Sector Analysis

Interesting Companies

Useful Links

Company List

Team

18

18

Page 19: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201619

Most Active Investors in Sector

81

68

62

5451

47

38 38 3834

0

18

36

54

72

90

Sequoia Capital Intel Capital Accel KPCB GreylockPartners

Norwest VenturePartners

AndreessenHorowitz

BessemerVenture Partners

Venrock BenchmarkCapital

Tota

l Nu

mb

er o

f C

om

pan

ies

ServiceNow Zumigo Webroot Workspot Zenprise Workspot Pindrop Security Wandera Vontu Vontu

Skyhigh Networks SecureKey SentinelOne Shape Security Wandera Shape Security SIGNIFYD Virtru Shape Security Skybox Security

Page 20: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201620

Where are Top Investors investing

Page 21: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201621

Top Investor by Stage of Entry

Page 22: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

Scope of Report

Entrepreneur Activity

Investment Trend

Who is Investing

Exit Outlook - IPO, Acquisitions

Sub Sector Analysis

Interesting Companies

Useful Links

Company List

Team

22

22

Page 23: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201623

Top IPOs in last three years

IPO Date Company OverviewFunding Amount

Ticker

Apr-2016 secureworks.comSecureWorks

(Atlanta, 1999)

Cloud based SIEM solution as managed serviceNoro Moseley Partners, Frontier Capital, Navigation Capital Partners, GE Equity, Centerview Capital

$61.5MSCWX

Feb-2016 quickheal.co.inQuick Heal

(Pune, 1993)

Provider of IT security solutionsSequoia Capital, Westbridge Capital $12.8M

QUICKHEAL

Oct-2015 mimecast.comMimecast

(London, 2003)

Email security and managementInsight Venture Partners, Index Ventures, Dawn Capital $83.15M

MIME

Jun-2015 sophos.comSophos

(Abingdon, 1985)

Enterprise security suite for network, endpoint and serversTA Associates, Apax Partners

SOPH

Jun-2015 rapid7.comRapid7

(Boston, 2000)

Data analytics based threat detection and vulnerability assessmentBain Capital Ventures, TCV, Bain Capital $91M

RPD

Apr-2015 apigee.comApigee

(Palo Alto, 2004)

API Management & analytics to predict customer behaviourAccenture, Juniper Networks, Norwest Venture Partners, BlackRock, Net One Systems, Focus Ventures, Bay Partners, Wing Venture Capital, Wellington Management, Vilicus Ventures, Pine River Capital, Third Point Ventures, Sapphire Ventures

$198.18MAPIC

Mar-2015 isignthis.comISignthis

(Collingwood, 2012)

AML/KYC software for preventing Card Not Present (CNP) fraud$14.95M

ASX:ISX

Sep-2014 cyberark.comCyberArk

(Newton, 1999)

Privileged account security solutionSoftBank, Vertex Ventures Israel, Viola Group, Goldman Sachs, Viola Credit, JPMorgan Chase & Co., Jerusalem Venture Partners, Nomura Holdings, Seed Capital Partners, IDB, CrossConti, Viola Credit, Bregal Sagemount, oramapartners.com

$59MCYBR

Page 24: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201624

Major Acquisitions (2016 YTD)

Page 25: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201625

Major Acquisitions (2016 YTD)

Page 26: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201626

Major Acquisitions (2016 YTD)

Page 27: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201627

Major Acquisitions (2016 YTD)

Page 28: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201628

Major Acquisitions (2016 YTD)

Page 29: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

Scope of Report

Entrepreneur Activity

Investment Trend

Who is Investing

Exit Outlook - IPO, Acquisitions

Sub Sector Analysis

Interesting Companies

Useful Links

Company List

Team

29

29

Page 30: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201630

August 2016Tracxn BlueBox : Enterprise Security

2205+ companies in the sector, 407 funded since 2015, $6.93B invested in 2015/16

Page 31: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201631

Enterprise Security – Business Model Description

Page 32: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201632

Top Business Models by Funding

$3.5B$3.3B

$2.9B$2.6B

$2.2B $2.2B

$1.8B

$1.5B$1.4B

$1.1B

0.0

0.8

1.6

2.4

3.2

4.0

Network Security

EndpointSecurity

BYODSecurity

Suite IAM SecurityAnalytics

DataSecurity

CloudSecurity

Anti Fraud ApplicationSecurity

Tota

l Fu

nd

ing

Am

ou

nt

(in

Bill

ion

s)

# Cos. 288 228 188 18 306 176 253 75 122 110

Avg. Age 2007 2006.8 2007.9 1993.3 2007.2 2008.3 2007.1 2011.1 2008.6 2008.1

Palo Alto Networks Qihoo 360 Good Technology FireEye Okta Tenable Network SafeNet Illumio LifeLock Apigee

Barracuda Tanium Lookout Symantec Ping Identity Sumo Logic Digital Guardian Netskope Pindrop Security Veracode

Page 33: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201633

Network Security – Business Model Description

Page 34: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201634

Network Security – Entrepreneur Activity and Investment Trend

Page 35: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201635

Network Security – Most Funded Companies

Page 36: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201636

Endpoint Security – Business Model Description

Page 37: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201637

Endpoint Security – Entrepreneur Activity and Investment Trend

Page 38: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201638

Endpoint Security – Most Funded Companies

Page 39: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201639

BYOD Security – Business Model Description

Page 40: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201640

BYOD Security – Entrepreneur Activity and Investment Trend

Page 41: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201641

BYOD Security – Most Funded Companies

Page 42: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201642

IAM – Business Model Description

Page 43: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201643

IAM – Entrepreneur Activity and Investment Trend

Page 44: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201644

IAM – Most Funded Companies

Page 45: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

Stealth Mode Cybersecurity Startup

45

Page 46: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

Scope of Report

Entrepreneur Activity

Investment Trend

Who is Investing

Exit Outlook - IPO, Acquisitions

Sub Sector Analysis

Interesting Companies

Useful Links

Company List

Team

46

46

Page 47: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201647

Interesting Seed Companies

Curated list of companies by the sector analyst are defined as Interesting

Company Overview Business ModelTotal

Funding

smyte.comSmyte

(2014, San Francisco)

Machine learning and classification engine based fraud detectionY Combinator, Founder Collective, Harrison Metal, Baseline Ventures, Upside Partnership

Website Security > Fraud Prevention

$2.25M

blockscore.comBlockScore

(2013, Palo Alto)

Identity verification for anti-fraud and regulatory complianceY Combinator, Lightspeed Venture Partners, Khosla Ventures, Battery Ventures, New Atlantic Ventures, Boost VC, Bitcoin Opportunity Corp, Digital Currency Group

Anti Fraud > Payment Fraud $2.025M

drawbridge.ioDrawbridge Networks(2014, New York City)

Agent-based micro-segmentation for data center securityBowery Capital, Paladin Capital Group, Bloomberg Beta, Antecedent Ventures, QueensBridge Venture Partners, Primary Venture Partner

Cloud Security > Cloud Infrastructure Security

$1.7M

chainalysis.comChainalysis

(2014, Manhattan)

Blockchain based payment fraud prevention & compliance solutionsTechstars, Point Nine Capital, FundersClub, Common Angels, Barclays Accelerator, Digital Currency Group, Converge Venture

Anti Fraud > Payment Fraud $1.6M

appknox.comAppknox

(2014, Bangalore)

Automated security testing for mobile appsStart-Up Chile, Joyful Frog Digital Innovation

Application Security > Dynamic & Static Security Testing

$19.9k

Page 48: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201648

Interesting Series A Companies

Page 49: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201649

Interesting Series A Companies

Page 50: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201650

Interesting Series A Companies

Page 51: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201651

Interesting Series B Companies

Page 52: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201652

Interesting Series B Companies

Page 53: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201653

Interesting Late Stage Companies

Page 54: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201654

Interesting Late Stage Companies

Page 55: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201655

Interesting Late Stage Companies

Page 56: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201656

Top Funded Deadpooled Companies

Page 57: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

Scope of Report

Entrepreneur Activity

Investment Trend

Who is Investing

Exit Outlook - IPO, Acquisitions

Sub Sector Analysis

Interesting Companies

Useful Links

Company List

Team

57

57

Page 58: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201658

Useful Links

Slide Title Content Platform Link

List of All Companies in readable format Companies Link

Upcoming Sectors Entrepreneur Activity Link

Niche Upcoming Sectors Entrepreneur Activity Link

Investments in last one year Investment Trend Link

Top IPOs in last three years Exit Outlook - IPO, Acquisitions Link

Major Acquisitions in last one year Exit Outlook - IPO, Acquisitions Link

Enterprise Security – Most Funded Companies Sub Sector Understand Link

Top Funded Deadpooled Companies Companies Link

Page 59: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

Scope of Report

Entrepreneur Activity

Investment Trend

Who is Investing

Exit Outlook - IPO, Acquisitions

Sub Sector Analysis

Interesting Companies

Useful Links

Company List

Team

59

59

Page 60: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201660

Enterprise Security – Company List

COVERS THE FOLLOWING SECTORS

Anti FraudApplication

SecurityBYOD

SecurityCloud

SecurityData

SecurityDatabase Security

Email Security

Endpoint Security

IAM

IndustrialSecurity

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 61: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201661

Anti Fraud (1/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Company Details Funding Investors

Versafe [Zion, 2009]: Versafe provided anti-fraud based enterprise security solution to protect online customerfrom fraud, phishing, pharming, man-in-the-middle and malware threats across all device. Its cloud-basedservice, Versafe advanced web and mobile protection detected malware-initiated fraud and other client sideonline threats for mobile and web applications Acquired by F5 Networks in 2013 to integrate its anti-fraudtechnology.

FraudMetrix [Hangzhou, 2013]: FraudMetrix (Hangzhou Tongdun Technology) is engaged in the development ofsecurity products against internet risks and fraud. Tongdun (FraudMetrix) brings value for enterprises with dataintelligence. It covers antifraud areas including account fraud, transaction fraud, payment fraud, business fraud,internet credit fraud, and corporate internal fraud. It was founded in 2013 by a group of antifraud scientists andtechnology executives of the former Ali Group Security Department, PayPal, and RSA.

$85.3M

IDG Capital Partners, CBC Capital, China Growth Capital, Oriza Holdings,

Qiming Venture Partners, Linear Venture, China Growth Capital

Authicate [Los Angeles, 2016]: Authicate is a stealth mode cybersecurity startup which is developing two factorauthentication and 2-way push messaging based anti fraud solution. Intergrates with existing native applicationsemploying encrypted 2-way push messaging and 2FA. Currently focusing on internet retailers, banks and socialapps to deliver security for their existing native apps.

Abravant [San Francisco, 2015]: Abravant is a stealth mode cybersecurity company which is developing solutionfor security in social media. Application is under development which employs a proprietary human interactionprocessing. Claims to have team members with background at Stanford and Google.

BigID [New York City, 2015]: BigID is a cyber security company which is developing privacy managementplatform for the global enterprise. Solution will monitor the dispersed customer data adhering compliance &privacy regulations for reducing liability of enterprise from potential customer identity theft and misuse. Anearly stage Israeli-US security company to deliver privacy risk & compliance management for customer identitydata.

$2.1MGenacast Ventures, Boldstart Ventures, Deep Fork Capital

Page 62: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201662

Anti Fraud (2/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Company Details Funding Investors

RevReal [Beijing, 2015]: RevReal is a stealth mode security and authentication company which claims to assistChinese consumers with authenticating their purchases for ensuring products are not fake. Founder JohannesDavidsson studied Chinese in Shanghai and International Sale in Sweden. He's member of Swedish YoungProfessionals initiated under guidance of the Swedish Chamber of Commerce in China.

41st Parameter [San Jose, 2004]: 41st Parameter provides solutions for detecting and preventing fraud acrossmultiple channels for the world’s most valued and recognizable brands. Technology protects from cybercrimethreats including card not present fraud, new account origination fraud, phishing and account compromise,credit bust outs, and fraud ring attacks. Acquired by Experian in 2013.

$42.41MNorwest Venture Partners, KPCB,

Jafco Ventures, Georgian Partners, Icon Ventures

Sentrant [Fredericton, 2012]: Sentrant provides fraud detection solution to detect botnet generated traffic.Product detects fraud schemes used by botnet for generating fake traffic & clicks to skew the results of aadvertising campaign. Solution is cloud based which provides tracking & detection of fraud publishers & fraudvisitors on campaign basis. Employs dynamic behavioral signature & botnet security intelligence to protectonline advertisers' budget and their ad campaigns against fraudsters by detecting, reporting, and mitigatingnon-human users and fraudulent websites in real-time.

$500KTechnology Ventures, New Brunswick

Innovation Foundation

Threat Mark [Brno, 2015]: Threat Mark is a cybersecurity startup which delivers solution to prevent cybercrime& fraud in online environment. Developed neXtGEN security methods as Digital Identity Sensing Technology(DIST) that analyzes users transactions and active operation, browsing habits, GUI interaction, devicecharacteristics, and geolocation to ensure it matches the behavior of application legitimate users. Claims to haveapproach which is aware of device, session, user, transaction and employs big data analytics to perform signalaggregation, data comparison and anomaly detection.

Page 63: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201663

Anti Fraud (3/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Company Details Funding Investors

CustomerXPs [Bangalore, 2006]: CustomerXPs provides softwares and SaaS based services for enterprise fraudmanagement (EFM) and customer experience management (CEM). Solution employs real time big data, artificialintelligence and behavioral and psychology based analytics to provide tacit, actionable and conversationalinsight & direct the outcome of enhanced customer engagement and fraud-free transactions. Product Clari5EFM is an EFM solution which detects and alerts about employee fraud, transaction monitoring, SMitch, OnlineBanking fraud and card fraud using neural networks, time series & complex analytics. Clari5 CEM is CEM solutionto provide personalized & contextual interactions with customers in real time and include modules like Needanalysis, Seeker, Right sell, Direct channel booster, branch booster, Smart teller, iRM (integrated RelationshipManager) and paperless branch banking. Solution is focused at customers in financial services, e-commerce,retail and telecom industry. Named as Cool Vendor in Marketing by Gartner 2012 and part Of MicrosoftVentures Summer 2015 Batch under Scale Up Accelerator Program.

$4M JAFCO Asia

Sentropi [Ahmedabad, 2012]: Sentropi provides online identification and fraud detection and preventionsolutions using device fingerprinting technology and tagging methods. Software analyses parameters regardingthe visitor’s browser, OS and hardware configuration in order to create a unique identity that can be tracked todetect account takeover and fraudulent logins. Other products include Sentropi3D to automate over-the-phoneautomated 3rd step authentication process for online ordering, SentroPay to automate online payment via anautomated outbound IVR pay-over-the phone payment solution and Sentropi 360 to detect fraud in organizatonoperating in card-not-present environments.. Listed as fast track TLV finalist by StartupbootCamp.

$40K Start-Up Chile

Easy Solutions [Doral, 2007]: Easy Solutions Total Fraud Protection platform provides detection and preventionof electronic fraud across all devices, channels and clouds. Provides products for Fraud intelligence and securebrowsing, Anomaly Transaction Detection, Anti-phishing, Anti-pharming, Man-in-the-middle and man-in-the-browser protection, client-less malware detection, Mobile Fraud Protection and Multifactor/MultichannelAuthentication like cloud, email, strong& mobile. Awarded with Silver (Email Security and Management) andTotal Fraud Protection Platform, its flagship multi-layered prevention and detection solution, won a BronzeAward (Fraud Prevention) at Global Excellence Award, 2015

$14.2MMedina Capital, Promotora de

Proyectos

Page 64: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201664

Anti Fraud (4/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 65: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201665

Anti Fraud (5/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 66: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201666

Anti Fraud (6/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 67: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201667

Anti Fraud (7/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 68: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201668

Anti Fraud (8/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 69: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201669

Anti Fraud (9/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 70: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201670

Anti Fraud (10/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 71: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201671

Anti Fraud (11/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 72: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201672

Anti Fraud (12/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 73: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201673

Anti Fraud (13/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 74: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201674

Anti Fraud (14/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 75: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201675

Anti Fraud (15/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 76: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201676

Anti Fraud (16/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 77: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201677

Anti Fraud (17/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 78: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201678

Anti Fraud (18/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 79: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201679

Anti Fraud (19/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 80: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201680

Anti Fraud (20/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 81: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201681

Anti Fraud (21/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 82: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201682

Anti Fraud (22/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 83: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201683

Anti Fraud (23/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 84: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201684

Anti Fraud (24/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 85: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201685

Anti Fraud (25/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 86: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201686

Anti Fraud (26/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 87: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201687

Anti Fraud (27/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 88: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201688

Anti Fraud (28/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 89: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201689

Anti Fraud (29/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 90: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201690

Anti Fraud (30/30)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 91: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201691

Application Security (1/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 92: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201692

Application Security (2/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 93: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201693

Application Security (3/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 94: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201694

Application Security (4/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 95: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201695

Application Security (5/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 96: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201696

Application Security (6/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 97: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201697

Application Security (7/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 98: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201698

Application Security (8/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 99: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 201699

Application Security (9/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 100: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016100

Application Security (10/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 101: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016101

Application Security (11/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 102: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016102

Application Security (12/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 103: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016103

Application Security (13/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 104: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016104

Application Security (14/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 105: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016105

Application Security (15/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 106: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016106

Application Security (16/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 107: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016107

Application Security (17/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 108: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016108

Application Security (18/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 109: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016109

Application Security (19/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 110: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016110

Application Security (20/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 111: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016111

Application Security (21/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 112: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016112

Application Security (22/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 113: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016113

Application Security (23/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 114: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016114

Application Security (24/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 115: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016115

Application Security (25/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 116: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016116

Application Security (26/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 117: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016117

Application Security (27/27)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 118: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016118

BYOD Security (1/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 119: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016119

BYOD Security (2/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 120: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016120

BYOD Security (3/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 121: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016121

BYOD Security (4/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 122: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016122

BYOD Security (5/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 123: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016123

BYOD Security (6/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 124: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016124

BYOD Security (7/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 125: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016125

BYOD Security (8/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 126: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016126

BYOD Security (9/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 127: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016127

BYOD Security (10/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 128: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016128

BYOD Security (11/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 129: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016129

BYOD Security (12/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 130: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016130

BYOD Security (13/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 131: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016131

BYOD Security (14/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 132: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016132

BYOD Security (15/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 133: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016133

BYOD Security (16/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 134: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016134

BYOD Security (17/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 135: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016135

BYOD Security (18/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 136: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016136

BYOD Security (19/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 137: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016137

BYOD Security (20/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 138: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016138

BYOD Security (21/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 139: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016139

BYOD Security (22/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 140: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016140

BYOD Security (23/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 141: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016141

BYOD Security (24/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 142: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016142

BYOD Security (25/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 143: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016143

BYOD Security (26/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 144: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016144

BYOD Security (27/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 145: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016145

BYOD Security (28/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 146: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016146

BYOD Security (29/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 147: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016147

BYOD Security (30/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 148: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016148

BYOD Security (31/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 149: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016149

BYOD Security (32/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 150: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016150

BYOD Security (33/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 151: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016151

BYOD Security (34/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 152: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016152

BYOD Security (35/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 153: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016153

BYOD Security (36/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 154: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016154

BYOD Security (37/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 155: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016155

BYOD Security (38/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 156: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016156

BYOD Security (39/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 157: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016157

BYOD Security (40/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 158: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016158

BYOD Security (41/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 159: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016159

BYOD Security (42/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 160: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016160

BYOD Security (43/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 161: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016161

BYOD Security (44/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 162: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016162

BYOD Security (45/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 163: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016163

BYOD Security (46/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 164: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016164

BYOD Security (47/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 165: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016165

BYOD Security (48/48)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 166: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016166

Cloud Security (1/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 167: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016167

Cloud Security (2/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 168: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016168

Cloud Security (3/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 169: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016169

Cloud Security (4/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 170: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016170

Cloud Security (5/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 171: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016171

Cloud Security (6/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 172: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016172

Cloud Security (7/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 173: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016173

Cloud Security (8/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 174: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016174

Cloud Security (9/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 175: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016175

Cloud Security (10/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 176: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016176

Cloud Security (11/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 177: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016177

Cloud Security (12/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 178: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016178

Cloud Security (13/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 179: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016179

Cloud Security (14/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 180: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016180

Cloud Security (15/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 181: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016181

Cloud Security (16/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 182: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016182

Cloud Security (17/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 183: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016183

Cloud Security (18/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 184: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016184

Cloud Security (19/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 185: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016185

Cloud Security (20/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 186: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016186

Data Security (1/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 187: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016187

Data Security (2/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 188: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016188

Data Security (3/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 189: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016189

Data Security (4/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 190: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016190

Data Security (5/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 191: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016191

Data Security (6/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 192: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016192

Data Security (7/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 193: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016193

Data Security (8/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 194: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016194

Data Security (9/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 195: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016195

Data Security (10/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 196: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016196

Data Security (11/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 197: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016197

Data Security (12/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 198: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016198

Data Security (13/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 199: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016199

Data Security (14/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 200: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016200

Data Security (15/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 201: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016201

Data Security (16/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 202: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016202

Data Security (17/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 203: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016203

Data Security (18/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 204: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016204

Data Security (19/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 205: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016205

Data Security (20/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 206: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016206

Data Security (21/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 207: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016207

Data Security (22/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 208: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016208

Data Security (23/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 209: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016209

Data Security (24/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 210: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016210

Data Security (25/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 211: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016211

Data Security (26/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 212: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016212

Data Security (27/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 213: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016213

Data Security (28/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 214: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016214

Data Security (29/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 215: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016215

Data Security (30/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 216: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016216

Data Security (31/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 217: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016217

Data Security (32/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 218: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016218

Data Security (33/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 219: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016219

Data Security (34/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 220: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016220

Data Security (35/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 221: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016221

Data Security (36/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 222: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016222

Data Security (37/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 223: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016223

Data Security (38/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 224: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016224

Data Security (39/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 225: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016225

Data Security (40/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 226: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016226

Data Security (41/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 227: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016227

Data Security (42/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 228: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016228

Data Security (43/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 229: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016229

Data Security (44/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 230: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016230

Data Security (45/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 231: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016231

Data Security (46/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 232: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016232

Data Security (47/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 233: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016233

Data Security (48/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 234: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016234

Data Security (49/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 235: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016235

Data Security (50/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 236: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016236

Data Security (51/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 237: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016237

Data Security (52/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 238: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016238

Data Security (53/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 239: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016239

Data Security (54/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 240: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016240

Data Security (55/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 241: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016241

Data Security (56/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 242: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016242

Data Security (57/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 243: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016243

Data Security (58/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 244: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016244

Data Security (59/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 245: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016245

Data Security (60/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 246: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016246

Data Security (61/61)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 247: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016247

Database Security (1/4)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 248: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016248

Database Security (2/4)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 249: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016249

Database Security (3/4)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 250: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016250

Database Security (4/4)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 251: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016251

Email Security (1/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 252: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016252

Email Security (2/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 253: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016253

Email Security (3/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 254: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016254

Email Security (4/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 255: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016255

Email Security (5/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 256: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016256

Email Security (6/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 257: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016257

Email Security (7/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 258: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016258

Email Security (8/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 259: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016259

Email Security (9/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 260: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016260

Email Security (10/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 261: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016261

Email Security (11/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 262: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016262

Email Security (12/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 263: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016263

Email Security (13/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 264: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016264

Email Security (14/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 265: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016265

Email Security (15/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 266: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016266

Email Security (16/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 267: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016267

Email Security (17/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 268: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016268

Email Security (18/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 269: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016269

Email Security (19/19)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 270: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016270

Endpoint Security (1/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 271: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016271

Endpoint Security (2/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 272: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016272

Endpoint Security (3/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 273: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016273

Endpoint Security (4/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 274: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016274

Endpoint Security (5/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 275: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016275

Endpoint Security (6/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 276: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016276

Endpoint Security (7/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 277: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016277

Endpoint Security (8/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 278: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016278

Endpoint Security (9/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 279: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016279

Endpoint Security (10/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 280: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016280

Endpoint Security (11/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 281: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016281

Endpoint Security (12/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 282: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016282

Endpoint Security (13/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 283: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016283

Endpoint Security (14/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 284: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016284

Endpoint Security (15/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 285: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016285

Endpoint Security (16/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 286: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016286

Endpoint Security (17/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 287: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016287

Endpoint Security (18/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 288: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016288

Endpoint Security (19/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 289: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016289

Endpoint Security (20/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 290: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016290

Endpoint Security (21/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 291: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016291

Endpoint Security (22/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 292: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016292

Endpoint Security (23/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 293: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016293

Endpoint Security (24/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 294: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016294

Endpoint Security (25/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 295: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016295

Endpoint Security (26/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 296: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016296

Endpoint Security (27/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 297: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016297

Endpoint Security (28/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 298: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016298

Endpoint Security (29/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 299: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016299

Endpoint Security (30/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 300: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016300

Endpoint Security (31/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 301: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016301

Endpoint Security (32/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 302: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016302

Endpoint Security (33/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 303: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016303

Endpoint Security (34/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 304: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016304

Endpoint Security (35/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 305: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016305

Endpoint Security (36/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 306: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016306

Endpoint Security (37/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 307: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016307

Endpoint Security (38/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 308: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016308

Endpoint Security (39/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 309: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016309

Endpoint Security (40/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 310: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016310

Endpoint Security (41/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 311: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016311

Endpoint Security (42/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 312: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016312

Endpoint Security (43/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 313: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016313

Endpoint Security (44/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 314: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016314

Endpoint Security (45/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 315: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016315

Endpoint Security (46/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 316: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016316

Endpoint Security (47/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 317: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016317

Endpoint Security (48/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 318: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016318

Endpoint Security (49/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 319: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016319

Endpoint Security (50/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 320: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016320

Endpoint Security (51/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 321: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016321

Endpoint Security (52/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 322: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016322

Endpoint Security (53/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 323: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016323

Endpoint Security (54/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 324: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016324

Endpoint Security (55/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 325: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016325

Endpoint Security (56/56)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 326: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016326

IAM (1/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 327: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016327

IAM (2/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 328: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016328

IAM (3/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 329: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016329

IAM (4/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 330: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016330

IAM (5/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 331: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016331

IAM (6/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 332: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016332

IAM (7/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 333: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016333

IAM (8/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 334: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016334

IAM (9/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 335: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016335

IAM (10/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 336: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016336

IAM (11/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 337: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016337

IAM (12/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 338: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016338

IAM (13/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 339: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016339

IAM (14/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 340: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016340

IAM (15/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 341: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016341

IAM (16/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 342: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016342

IAM (17/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 343: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016343

IAM (18/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 344: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016344

IAM (19/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 345: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016345

IAM (20/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 346: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016346

IAM (21/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 347: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016347

IAM (22/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 348: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016348

IAM (23/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 349: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016349

IAM (24/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 350: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016350

IAM (25/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 351: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016351

IAM (26/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 352: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016352

IAM (27/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 353: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016353

IAM (28/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 354: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016354

IAM (29/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 355: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016355

IAM (30/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 356: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016356

IAM (31/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 357: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016357

IAM (32/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 358: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016358

IAM (33/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 359: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016359

IAM (34/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 360: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016360

IAM (35/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 361: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016361

IAM (36/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 362: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016362

IAM (37/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 363: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016363

IAM (38/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 364: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016364

IAM (39/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 365: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016365

IAM (40/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 366: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016366

IAM (41/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 367: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016367

IAM (42/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 368: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016368

IAM (43/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 369: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016369

IAM (44/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 370: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016370

IAM (45/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 371: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016371

IAM (46/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 372: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016372

IAM (47/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 373: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016373

IAM (48/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 374: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016374

IAM (49/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 375: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016375

IAM (50/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 376: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016376

IAM (51/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 377: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016377

IAM (52/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 378: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016378

IAM (53/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 379: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016379

IAM (54/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 380: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016380

IAM (55/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 381: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016381

IAM (56/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 382: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016382

IAM (57/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 383: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016383

IAM (58/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 384: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016384

IAM (59/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 385: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016385

IAM (60/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 386: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016386

IAM (61/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 387: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016387

IAM (62/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 388: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016388

IAM (63/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 389: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016389

IAM (64/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 390: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016390

IAM (65/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 391: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016391

IAM (66/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 392: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016392

IAM (67/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 393: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016393

IAM (68/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 394: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016394

IAM (69/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 395: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016395

IAM (70/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 396: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016396

IAM (71/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 397: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016397

IAM (72/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 398: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016398

IAM (73/73)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 399: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016399

Industrial Security (1/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 400: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016400

Industrial Security (2/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 401: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016401

Industrial Security (3/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 402: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016402

Industrial Security (4/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 403: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016403

Industrial Security (5/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 404: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016404

Industrial Security (6/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 405: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016405

Industrial Security (7/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 406: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016406

Industrial Security (8/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 407: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016407

Industrial Security (9/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 408: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016408

Industrial Security (10/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 409: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016409

Industrial Security (11/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 410: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016410

Industrial Security (12/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 411: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016411

IoT Security (1/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 412: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016412

IoT Security (2/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 413: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016413

IoT Security (3/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 414: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016414

IoT Security (4/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 415: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016415

IoT Security (5/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 416: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016416

IoT Security (6/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 417: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016417

IoT Security (7/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 418: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016418

IoT Security (8/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 419: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016419

IoT Security (9/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 420: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016420

IoT Security (10/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 421: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016421

IoT Security (11/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 422: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016422

IoT Security (12/12)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 423: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016423

Network Security (1/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 424: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016424

Network Security (2/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 425: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016425

Network Security (3/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 426: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016426

Network Security (4/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 427: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016427

Network Security (5/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 428: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016428

Network Security (6/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 429: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016429

Network Security (7/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 430: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016430

Network Security (8/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 431: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016431

Network Security (9/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 432: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016432

Network Security (10/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 433: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016433

Network Security (11/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 434: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016434

Network Security (12/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 435: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016435

Network Security (13/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 436: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016436

Network Security (14/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 437: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016437

Network Security (15/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 438: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016438

Network Security (16/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 439: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016439

Network Security (17/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 440: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016440

Network Security (18/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 441: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016441

Network Security (19/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 442: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016442

Network Security (20/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 443: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016443

Network Security (21/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 444: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016444

Network Security (22/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 445: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016445

Network Security (23/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 446: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016446

Network Security (24/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 447: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016447

Network Security (25/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 448: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016448

Network Security (26/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 449: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016449

Network Security (27/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 450: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016450

Network Security (28/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 451: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016451

Network Security (29/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 452: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016452

Network Security (30/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 453: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016453

Network Security (31/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 454: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016454

Network Security (32/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 455: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016455

Network Security (33/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 456: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016456

Network Security (34/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 457: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016457

Network Security (35/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 458: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016458

Network Security (36/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 459: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016459

Network Security (37/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 460: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016460

Network Security (38/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 461: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016461

Network Security (39/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 462: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016462

Network Security (40/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 463: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016463

Network Security (41/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 464: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016464

Network Security (42/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 465: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016465

Network Security (43/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 466: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016466

Network Security (44/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 467: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016467

Network Security (45/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 468: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016468

Network Security (46/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 469: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016469

Network Security (47/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 470: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016470

Network Security (48/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 471: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016471

Network Security (49/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 472: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016472

Network Security (50/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 473: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016473

Network Security (51/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 474: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016474

Network Security (52/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 475: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016475

Network Security (53/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 476: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016476

Network Security (54/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 477: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016477

Network Security (55/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 478: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016478

Network Security (56/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 479: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016479

Network Security (57/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 480: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016480

Network Security (58/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 481: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016481

Network Security (59/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 482: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016482

Network Security (60/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 483: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016483

Network Security (61/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 484: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016484

Network Security (62/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 485: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016485

Network Security (63/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 486: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016486

Network Security (64/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 487: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016487

Network Security (65/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 488: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016488

Network Security (66/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 489: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016489

Network Security (67/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 490: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016490

Network Security (68/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 491: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016491

Network Security (69/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 492: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016492

Network Security (70/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 493: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016493

Network Security (71/71)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 494: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016494

Security Analytics (1/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 495: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016495

Security Analytics (2/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 496: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016496

Security Analytics (3/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 497: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016497

Security Analytics (4/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 498: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016498

Security Analytics (5/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 499: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016499

Security Analytics (6/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 500: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016500

Security Analytics (7/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 501: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016501

Security Analytics (8/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 502: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016502

Security Analytics (9/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 503: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016503

Security Analytics (10/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 504: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016504

Security Analytics (11/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 505: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016505

Security Analytics (12/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 506: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016506

Security Analytics (13/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 507: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016507

Security Analytics (14/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 508: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016508

Security Analytics (15/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 509: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016509

Security Analytics (16/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 510: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016510

Security Analytics (17/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 511: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016511

Security Analytics (18/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 512: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016512

Security Analytics (19/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 513: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016513

Security Analytics (20/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 514: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016514

Security Analytics (21/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 515: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016515

Security Analytics (22/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 516: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016516

Security Analytics (23/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 517: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016517

Security Analytics (24/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 518: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016518

Security Analytics (25/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 519: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016519

Security Analytics (26/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 520: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016520

Security Analytics (27/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 521: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016521

Security Analytics (28/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 522: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016522

Security Analytics (29/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 523: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016523

Security Analytics (30/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 524: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016524

Security Analytics (31/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 525: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016525

Security Analytics (32/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 526: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016526

Security Analytics (33/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 527: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016527

Security Analytics (34/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 528: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016528

Security Analytics (35/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 529: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016529

Security Analytics (36/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 530: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016530

Security Analytics (37/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 531: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016531

Security Analytics (38/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 532: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016532

Security Analytics (39/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 533: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016533

Security Analytics (40/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 534: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016534

Security Analytics (41/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 535: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016535

Security Analytics (42/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 536: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016536

Security Analytics (43/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 537: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016537

Security Analytics (44/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 538: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016538

Security Analytics (45/45)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 539: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016539

Server Security (1/5)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 540: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016540

Server Security (2/5)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 541: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016541

Server Security (3/5)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 542: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016542

Server Security (4/5)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 543: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016543

Server Security (5/5)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 544: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016544

Suite (1/5)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 545: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016545

Suite (2/5)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 546: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016546

Suite (3/5)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 547: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016547

Suite (4/5)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 548: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016548

Suite (5/5)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 549: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016549

Threat Intelligence (1/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 550: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016550

Threat Intelligence (2/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 551: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016551

Threat Intelligence (3/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 552: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016552

Threat Intelligence (4/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 553: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016553

Threat Intelligence (5/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 554: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016554

Threat Intelligence (6/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 555: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016555

Threat Intelligence (7/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 556: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016556

Threat Intelligence (8/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 557: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016557

Threat Intelligence (9/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 558: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016558

Threat Intelligence (10/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 559: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016559

Threat Intelligence (11/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 560: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016560

Threat Intelligence (12/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 561: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016561

Threat Intelligence (13/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 562: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016562

Threat Intelligence (14/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 563: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016563

Threat Intelligence (15/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 564: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016564

Threat Intelligence (16/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 565: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016565

Threat Intelligence (17/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 566: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016566

Threat Intelligence (18/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 567: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016567

Threat Intelligence (19/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 568: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016568

Threat Intelligence (20/20)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 569: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016569

Website Security (1/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 570: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016570

Website Security (2/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 571: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016571

Website Security (3/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 572: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016572

Website Security (4/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 573: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016573

Website Security (5/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 574: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016574

Website Security (6/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 575: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016575

Website Security (7/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 576: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016576

Website Security (8/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 577: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016577

Website Security (9/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 578: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016578

Website Security (10/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 579: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016579

Website Security (11/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 580: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016580

Website Security (12/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 581: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016581

Website Security (13/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 582: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016582

Website Security (14/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 583: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016583

Website Security (15/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 584: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016584

Website Security (16/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 585: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016585

Website Security (17/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 586: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016586

Website Security (18/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 587: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016587

Website Security (19/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 588: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016588

Website Security (20/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 589: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016589

Website Security (21/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 590: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016590

Website Security (22/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 591: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016591

Website Security (23/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 592: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016592

Website Security (24/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 593: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016593

Website Security (25/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 594: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016594

Website Security (26/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 595: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016595

Website Security (27/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 596: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016596

Website Security (28/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 597: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016597

Website Security (29/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 598: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016598

Website Security (30/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 599: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016599

Website Security (31/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 600: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016600

Website Security (32/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 601: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016601

Website Security (33/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 602: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016602

Website Security (34/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 603: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016603

Website Security (35/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 604: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016604

Website Security (36/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 605: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016605

Website Security (37/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 606: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016606

Website Security (38/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 607: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016607

Website Security (39/39)

Anti Fraud

Application Security

BYOD Security

Cloud Security

Data SecurityDatabase Security

Email Security

Endpoint Security

IAMIndustrial Security

IoT SecurityNetwork Security

Security Analytics

Server Security

SuiteThreat

IntelligenceWebsite Security

Page 608: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016

Scope of Report

Entrepreneur Activity

Investment Trend

Who is Investing

Exit Outlook - IPO, Acquisitions

Sub Sector Analysis

Interesting Companies

Useful Links

Company List

Team

608

608

Page 609: Tracxn Research: Enterprise Security Landscape, August 2016

Enterprise Security Report, August 2016609

Team

Shubham Anand

Analyst, Enterprise Security

Chaitanya Karthik Vellanki

Lead Analyst, Enterprise Infrastructure