2012 Intrusion Prevention Systems Security Value Map

Published on January 2017 | Categories: Documents | Downloads: 27 | Comments: 0 | Views: 142
of 2
Download PDF   Embed   Report

Comments

Content

Security Intelligence

2012 Intrusion Prevention Systems Security Value Map
value (cost per protected Mbps) of tested product configurations.

TM

Empirical data from our individual Product Analysis Reports (PAR) and Comparative Analysis Reports (CAR) is used to create the unique Security Value Map (SVM). This high-level document illustrates clearly the relative value of your security investment options by mapping security effectiveness and

Want a quick overview of our detailed findings without having to delve into the reams of data that went into them? Start here, and then dig deeper into individual products and capabilities as required.

Intrusion Prevention Systems SVM
Q4
CheckPoint 12600

TM

100%
Stonesoft 1302 Fortinet FortiGate 3240C SonicWALL SuperMassive Palo Alto PA-5020 HP TippingPoint 6100 Juniper SRX 3600 Juniper IDP 8200

95%
McAfee M-8000

Q1

90%

Average Protection

85%

Block Rate

80%

Q3
75%

IBM GX7800

Q2

70%

65%

60%

McAfee XC Cluster

55%

Average Value

$110

$100

$90

$80

$70

$60

$50

$40

$30

$20

$10

$0

Price per Protected-Mbps
6207 Bee Caves Road, Suite 350 Austin, TX 78746 512.961.5300 www.nsslabs.com
© 2012 NSS Labs, Inc. All rights reserved.

2012 Intrusion Prevention Systems Security Value Map
What Do The Values Mean?
The SVM depicts the Total Cost of Ownership (TCO) of a typical deployment of five devices plus a central management unit, to provide a more accurate reflection of cost versus that of a single IPS device. The x-axis charts the Price Per Protected Mbps, a value that incorporates the 3 year TCO with measured performance and security effectiveness to provide a single figure that can be used to compare the real cost of each product tested. Further to the right (lower cost) is better. The y-axis charts the effective block rate as measured via the NSS security effectiveness tests. For IPS, only the tuned settings are used in security effectiveness tests. Further up the scale (higher block rate) is better. Some devices will have two data points. The upper point represents the values based on the effective block rate only. However, this is not the only measure of security effectiveness. By factoring in weightings for evasions, stability and leakage of malicious traffic we arrive at a second data point that more realistically depicts the actual security effectiveness of a product, and the lower effectiveness rating will raise the Price Per Protected Mbps value. Those products with only a single data point achieved 100% ratings in all the evasion, stability and leakage tests.

TM

How To Use The SVM
By mapping the data points against the Average Protection and Average Value we can see there are 4 quadrants in the SVM. Focus on the lower data point for each product, since this represents the actual protection level, taking into account block rate, evasions, leakage and stability. Further up and to the right is the best. The upper-right quadrant contains those products that are Recommended for both security effectiveness and value. These devices provide a very high level of protection and value for money. Further down and left is poor, and the lower left quadrant would comprise the NSS Labs Caution category – these products offer poor value for money given the 3 year TCO and measured security effectiveness rating. The remaining two quadrants comprise the NSS Labs Neutral category. These products may still be worthy of a place on your short list based on your specific requirements, For example, products in the upper-left quadrant score as Recommended for security effectiveness, but Neutral for value. These products would be suitable for environments where security is paramount since they offer an extremely high level of protection, although at a higher than average cost. Conversely, devices in the lower-right quadrant score as Neutral for security effectiveness, but Recommended for value. These devices would be suitable for environments where budget is paramount, and a slightly lower level of protection is acceptable in exchange for a lower cost of ownership. In all cases, the SVM should only be a starting point. NSS Labs Security Intelligence subscribers can schedule an inquiry call (or a written response) with one of the analysts involved in the actual testing and report production. Only by combining the wealth of knowledge contained within these reports and the experience and direct feedback from our analysts based on your own unique requirements can you make the right decision.

Visit us at www.nsslabs.com or contact us today for more information: [email protected] or 512.961.5300

© 2012 NSS Labs, Inc. All rights reserved.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close