McAfee, Inc. Positioned in the Leaders Quadrant for Endpoint Protection in Analyst Firm's Magic Quadrant
Position Based on Ability to Execute and Completeness of Vision
Gartner's Magic Quadrant for Endpoint Protection Platforms is based on an assessment of a company's ability to execute and completeness of vision. According to Gartner, "Leaders demonstrate balanced progress and effort in all execution and vision categories. Their actions in advanced malware protection, data protection and/or management capabilities raise the competitive bar for all products in the market, and they can change the course of the industry. A leading vendor isn't a default choice for every buyer, and clients are warned not to assume that they should buy only from vendors in the Leaders quadrant. Some clients, however, may believe that leaders are spreading their efforts too thinly and aren't pursuing clients' special needs."
Factors contributing to a company's ability to execute include products and services, overall viability, market responsiveness, and track record. Gartner gauges a company's completeness of vision by considering its market understanding, sales and marketing strategy, offering or product strategy, business model, and innovation, among other criteria.
"McAfee feels that its position in the leaders quadrant demonstrates the company's vision of providing customers with the most advanced security solutions to protect their infrastructure," said Matt Fairbanks, senior vice president of product and solution marketing at McAfee. "Customers worldwide, including four of the five largest employers in the world, have chosen McAfee for its thought leadership, superior support and advanced technology to secure their critical systems."
The report observes that "to address the increasing velocity of malware, Endpoint Protection vendors ... are adding some form of client queries directly to an 'in the cloud' master-signature database for unknown, suspicious files."
McAfee was first to recognize and deliver on the need for a cloud-based real-time delivery model to provide faster protection from the new and evolving threats. McAfee's Artemis technology provides real-time comprehensive malware detection by using McAfee's unique Global Threat Intelligence to provide an unprecedented level of protection. Artemis technology is built into McAfee endpoint solutions and can be seamlessly enabled without requiring any additional client side software.
To view a copy of the full report visit: http://resources.mcafee.com/content/EndptMQReport
1) Gartner, Inc., "Magic Quadrant for Endpoint Protection Platforms, 2009" by Peter Firstbrook et al, May 4, 2009
McAfee, Inc., headquartered in Santa Clara, California, is the world's largest dedicated security technology company. McAfee is committed to relentlessly tackling the world's toughest security challenges. The company delivers proactive and proven solutions and services that help secure systems and networks around the world, allowing users to safely connect to the Internet, browse and shop the web more securely. Backed by an award-winning research team, McAfee creates innovative products that empower home users, businesses, the public sector and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. http://www.mcafee.com
NOTE: McAfee and any additional McAfee marks herein are registered trademarks of McAfee, Inc. and/or its affiliates in the U.S. and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. (C) 2009 McAfee, Inc. All rights reserved.
Press releases you might also be interested in
Weitere Informationen zum Thema "Sicherheit":
Was ist eine Backdoor?
Eine Backdoor ist ein alternativer Zugang zu einer Software oder zu einem Hardwaresystem, der den normalen Zugriffsschutz umgeht. Mit einer Backdoor lassen sich Sicherheitsmechanismen der Hard- und Software umgehen. Der Zugang kann gewollt implementiert oder heimlich installiert sein.Weiterlesen