|By Business Wire||
|August 13, 2014 11:02 AM EDT||
Dell announced today that the company has been positioned in the Leaders quadrant of the 2014 Magic Quadrant for Unified Threat Management by Gartner, Inc. This is the second consecutive time Dell has been named to the Leaders Quadrant for network security for small and medium businesses. Prior to Dell’s acquisition in 2012, SonicWALL had been placed in the leader quadrant for the Magic Quadrant for Unified Threat Management since 2009.
The Gartner report notes that vendors in the Leaders quadrant “are at the forefront of making and selling UTM products that are built for midsize-business requirements. The requirements necessary for leadership include a wide range of models to cover midsize-business use cases, support for multiple features, and a management and reporting capability that's designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and products that are intuitive to manage and administer.”
Dell offers thirteen UTM products in two main product lines to meet the needs of the small and midsize business (SMB) markets: the SonicWALL TZ Series for the smallest businesses, and the SonicWALL NSA Series for small and midsize companies. Dell targets the enterprise market with its SonicWALL SuperMassive Series, and also provides other network security solutions, such as SSL VPN and email security gateway. “Gartner defines the UTM market as multifunction network security products used by small or midsize businesses (SMBs). Gartner defines midsize businesses as those with 100 to 1,000 employees, and with revenue ranging from $50 million to $1 billion. UTM products for this market need to provide the following feature areas at a minimum:
- Network security (stateful firewall and intrusion prevention)
- Web security gateway
- Remote access for mobile employees (VPNs)
- Email security
“Gartner noted recently that the unified threat management market grew by 14.1 percent from $1.3 billion in 2012 to $1.54 billion in 2013."
Patrick Sweeney, executive director of product management, Dell Security
“The Dell SonicWALL unified threat management product line offers our customers performance, productivity without compromise, and deep network security – all at an affordable price – which is very attractive to small and mid-sized organizations. Our customers tell us that the low price and comprehensive set of features are what differentiate our UTM products from others in the market, and we will continue to invest in these solutions to ensure we maintain and grow our industry-leading capabilities to meet our customers’ most pressing needs. We believe our positioning in the Leaders’ quadrant once again is evidence of our strong commitment to the UTM market.”
Delivering Complete and Connected Software Solutions
Dell Software empowers companies of all sizes to experience Dell’s “Power to Do More” by delivering scalable yet simple-to-use solutions that can increase productivity, responsiveness and efficiency. Dell Software is uniquely positioned to address today’s most pressing business and IT challenges with holistic, connected software offerings across five core solution areas, encompassing data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, helps customers simplify IT, mitigate risk and accelerate business results.
Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.
Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
#Dell recognized as a Leader in @Gartner 2014 Magic Quadrant for Unified Threat Management (#UTM): http://dell.to/1mJ8AvR @DellSecurity
Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.
 Gartner “Magic Quadrant for Unified Threat Management” by Jeremy D’Hoinne, Adam Hils and Greg Young, August 7, 2014
 Gartner, “Market Share: Unified Threat Management (SMB Multifunction Firewalls), Worldwide, 2013,” Lawrence Pingree, March 6, 2014
Oct. 8, 2015 02:00 PM EDT Reads: 103
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Oct. 8, 2015 02:00 PM EDT Reads: 311
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Oct. 8, 2015 02:00 PM EDT Reads: 201
Oct. 8, 2015 02:00 PM EDT Reads: 123
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Oct. 8, 2015 02:00 PM EDT Reads: 1,051
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Oct. 8, 2015 02:00 PM EDT Reads: 147
Oct. 8, 2015 02:00 PM EDT Reads: 358
Oct. 8, 2015 01:45 PM EDT
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Oct. 8, 2015 01:45 PM EDT Reads: 222
Oct. 8, 2015 01:45 PM EDT Reads: 109
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Oct. 8, 2015 01:30 PM EDT Reads: 205
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
Oct. 8, 2015 01:30 PM EDT Reads: 198
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Oct. 8, 2015 01:15 PM EDT Reads: 168
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
Oct. 8, 2015 01:00 PM EDT Reads: 770