News Feed Item

Data Center Security Buyers May Switch Vendors to Get High Performance Now, Shows Infonetics Survey

Market research firm Infonetics Research released excerpts from its 2014 Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey, which details enterprises’ plans for deploying security solutions in data centers, as well as their thoughts on leading data center security vendors.


“The most significant transformation affecting enterprise data centers today is the adoption of server virtualization technology. It’s the building block of the virtualized data center and the first step towards the eventual rollout of software-defined networking (SDN) in the data center,” notes Jeff Wilson, principal analyst for security at Infonetics Research.

“That said, buyers are performance hungry, and vendors must have the interfaces, connections, and throughput they require TODAY,” Wilson continues. “Buyers will switch vendors this year to get high-performance security infrastructure for the data center.”


  • 77% percent of respondents need security solutions with increased session handling performance, while around 70% need products with throughput and interfaces to match new high-speed networks (40G and 100G interfaces and 200G+ throughput)
  • When it comes to brand strength for key data center security buying criteria, Cisco, McAfee, HP, Juniper, and VMware top the list among those surveyed
  • Vendors that have a compelling roadmap for virtualization and software-defined networking (SDN) and concrete plans for products in mid-to-late 2015 stand to gain a head start in the battle for data center security dominance


Join analyst Jeff Wilson April 29 at 11:00 EDT for New DNS-based DDoS Attacks Demand Advanced Mitigation Tools, a live event on how to protect networks from DNS amplification attacks. Learn more and register to attend live or to access the replay:



For its 23-page data center security survey, Infonetics interviewed purchase-decision makers at 104 medium and large organizations in North America that operate their own data centers about their security plans. The study covers data center security purchase drivers, deployments, interface speed and throughput requirements, spending plans, and suppliers, and features enterprises’ ratings of 11 vendors (Arbor Networks, Check Point, Cisco, F5 Networks, Fortinet, HP, Juniper Networks, McAfee, Palo Alto Networks, Trend Micro, VMware) on 10 criteria. To buy the report, contact Infonetics: http://www.infonetics.com/contact.asp.



Download Infonetics’ 2014 market research brochure, publication calendar, events brochure, report highlights, tables of contents, and more at http://www.infonetics.com/login.


Visit https://www.infonetics.com/infonetics-events to register for upcoming webinars, view recent webinars on demand, or learn about sponsoring a webinar.

  • New DNS-based DDoS Attacks Demand Advanced Mitigation Tools (Apr. 29: Attend)
  • The Increasing Threat of Compromised Web Servers & How to Mitigate It (View on-demand)
  • NFV: The Nitty Gritty (May 8: Attend)
  • Protecting Infrastructure Control Systems from Cyber Attacks (Aug. 14: Sponsor)
  • Using Big Data Analytics to Amplify Security Intelligence (View on-demand)
  • Redefining Network Security Performance: The Speed You Really Need (View on-demand)


N. America (West), Asia Pacific: Larry Howard, [email protected], +1 408-583-3335

N. America (East, Midwest), L. America: Scott Coyne, [email protected], +1 408-583-3395

EMEA, India, Singapore: George Stojsavljevic, [email protected], +44 755-488-1623

Japan, South Korea, China, Taiwan: http://www.infonetics.com/contact.asp


Infonetics Research (www.infonetics.com) is an international market research and consulting firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete effectively. View Infonetics’ About Us slides at http://bit.ly/QUrbrV.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, health...
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, will contrast how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He will show the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He will also have live demos of building immutable pipe...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, you'll learn about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how Docke...
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that ...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Governments around the world are adopting Safe Harbor privacy provisions to protect customer data from leaving sovereign territories. Increasingly, global companies are required to create new instances of their server clusters in multiple countries to keep abreast of these new Safe Harbor laws. Is it worth it? In his session at 19th Cloud Expo, Adam Rogers, Managing Director of Anexia, Inc., will discuss how to keep your data legal and still stay in business.
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and ...