Gartner Inc. recently released its security software market revenue rankings. What indicators do you typically take away from such rankings, and how should they affect enterprise security software purchasing decisions?
Ask the expert!
Have questions about enterprise security? Send them via email today! (All questions are anonymous.)
Security software market revenue rankings should have little to do with decisions to acquire and deploy enterprise security software products. I don’t feel that the revenue of one company increasing while another decreases actually speaks to the quality or capability of its security software. Quite the contrary, I am often looking for new vendors that propose solving security problems in new and unique ways. I don't find that innovation tends to come from the larger companies. They often have to acquire these new ventures to find new products and enter new markets.
Cisco Systems Inc.'s acquisition of Sourcefire Inc. is a perfect example. Cisco has been trying to enter the security space for years but couldn't seem to get the right technology at the right time. Next-generation firewalls were not developed at Cisco, for example, even though the company known as the "networking giant" has held a strong presence in that market for many years. Sourcefire, which was started as a personal project in Martin Roesch's basement, was able to innovate because smaller companies can take more risk. This is where new ideas are born, and this is where I look for my security software solutions.
The only use I have found for vendor revenue reports is to determine if a vendor is failing completely. I want to make sure that my security software partners will be around for the foreseeable future to provide updates and support. I don't want to select a security software product only to have the company disappear. I suggest selecting software security based on its technical merit and leaving the revenue ranking reports to the investors.
Dig Deeper on Security industry market trends, predictions and forecasts
Related Q&A from Joseph Granneman
The consequences of phishing attacks could fall on the victims as enterprises start to punish employees who fall for this age-old scam. Expert Joseph... Continue Reading
CERT's ITPM certification is designed to help enterprises with their insider threat programs. Expert Joseph Granneman discusses the certification and... Continue Reading
Privileged users pose a growing threat to organizations. Expert Joseph Granneman looks at this insider threat and shares ways to mitigate it. Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.