skip to main content


The cybersecurity challenge is not diminishing. No organization is immune, and the problem is similar for companies large and small, as well as local civic and national government institutions.


  • Ovum believes that TIGs offer an opportunity to quickly apply some blanket rules to provide a bit of breathing space.

Features and Benefits

  • Describes what a TIG does.
  • Explains where a TIG fits in a corporate network and how it can interact with a TIP.

Key questions answered

  • Can a TIG replace a corporate firewall?
  • Is a TIG an alternative to a TIP?

Table of contents


  • Catalyst
  • Ovum view
  • Key messages


  • Recommendations for enterprises
  • Recommendations for vendors

Defining and exploring TIGs

  • TIGs capitalize on existing threat intelligence
  • TIGs enable a shift from a reactive to a proactive posture
  • TIGs make existing security tools more effective by offloading known threats
  • Risk-based triage blocks threats and reduces burden on staff and security tools
  • Key capabilities
  • Business value and applications

Market landscape and participants

  • Market origin and dynamics
  • Key trends in the TIG market
  • Future market development
  • Vendor landscape

Vendors on the Ovum Market Radar in Threat Intelligence Gateways

  • On the radar: Bandura
  • On the radar: Centripetal
  • On the radar: Ixia
  • On the radar: Looking Glass
  • On the radar: Netscout


  • On the Radar
  • Further reading
  • Author