Access "Editor's Desk: When customers become victims of acquisitions"
This article is part of the February 2006 issue of Best-of-breed: Security Products of the Year: 2006
Is the security market's rapid consolidation a natural evolution or survival of the most intelligently designed? We've all heard the horror stories: Company X buys company Y and all customer support goes out the window; calls go unanswered, promises are broken and frustrations mount. Yet while the transition can be difficult, vendor consolidation is a good thing for the security industry for a number of reasons. First, let's talk about the capacity of the security market. There are more than 700 companies touting their security wares, and, despite an onslaught of emerging threats, the security market can't sustain that sheer number of vendors. Now, let's move on to integration. Users want to deal with fewer players--not more--and they want comprehensive and integrated suites. While you can argue the merits of a best-of-breed approach, today's security vendors don't do a particularly good job of integrating products. Fewer, larger players offering plug-and-play capabilities will make your job easier. And how about dollars and cents? Larger vendors can sell ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Stopping the Next Heist
Storage and backup systems are rife with vulnerabilities. Take seven steps to secure them, or risk unflattering headlines and legal problems.
-
Secure Reads: Real Digital Forensics
Read a review of the security book Real Digital Forensics.
-
Portable device security: Safend's Safend Protector
Read a security product review of Safend's Safend Protector.
-
Recent Releases: Security product briefs, February 2006
Read about the security products released in February 2006.
-
Game Over?
Where do you turn when the security vendor you've banked on gets gobbled up?
-
Stopping the Next Heist
-
-
Products of the Year 2006
Antispyware; Antivirus; Authentication; E-mail Security; Identity & Access Management; Intrusion Detection; Intrusion Prevention; Network Firewall; Remote Access; Network Security Management; Vulnerability Management; Wireless; Emerging Technologies
-
Hot Pick: Stonesoft's StoneGate SG-4000
Stonesoft's StoneGate SG-4000
-
E-mail Security: Barracuda Spam Firewall
by Tom Bowers, Contributor
Barracuda Networks' Barracuda Spam Firewall
-
Intrusion Prevention: Lucid Security's ipAngel 4.0
Lucid Security's ipAngel 4.0
-
Products of the Year 2006
-
Columns
-
On The Radar: Avoiding security upgrade disaster
Upgrade Agony
-
Perspectives: Pwning the C-suite
Losing a few too many battles? Positive social engineering can help.
-
Ping: Yan Noblot
Yan Noblot
-
Editor's Desk: When customers become victims of acquisitions
Survival of the Fittest?
-
On The Radar: Avoiding security upgrade disaster
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO