skip to main content

Introduction

The cybersecurity challenge is not diminishing. No organization is immune, and the problem is similar for companies large and small, as well as local civic and national government institutions.

Highlights

  • Ovum believes that TIGs offer an opportunity to quickly apply some blanket rules to provide a bit of breathing space.

Features and Benefits

  • Describes what a TIG does.
  • Explains where a TIG fits in a corporate network and how it can interact with a TIP.

Key questions answered

  • Can a TIG replace a corporate firewall?
  • Is a TIG an alternative to a TIP?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key messages

Recommendations

  • Recommendations for enterprises
  • Recommendations for vendors

Defining and exploring TIGs

  • TIGs capitalize on existing threat intelligence
  • TIGs enable a shift from a reactive to a proactive posture
  • TIGs make existing security tools more effective by offloading known threats
  • Risk-based triage blocks threats and reduces burden on staff and security tools
  • Key capabilities
  • Business value and applications

Market landscape and participants

  • Market origin and dynamics
  • Key trends in the TIG market
  • Future market development
  • Vendor landscape

Vendors on the Ovum Market Radar in Threat Intelligence Gateways

  • On the radar: Bandura
  • On the radar: Centripetal
  • On the radar: Ixia
  • On the radar: Looking Glass
  • On the radar: Netscout

Appendix

  • On the Radar
  • Further reading
  • Author