Table of Contents
- Market Categories and Deployment Types
- Key Criteria Comparison
- GigaOm Radar
- Vendor Insights
- Analyst’s Take
- About Paul Stringfellow
In February 2020, GigaOm published its first analysis of the phishing detection and prevention market, “Key Criteria for Evaluating Phishing Protection Platforms.” Since then, the enterprise landscape has changed significantly, and many businesses have altered their practices due to the COVID-19 pandemic. Workforces are more distributed, and enterprises have increasingly adopted cloud applications and messaging technologies.
In keeping with this IT evolution, cybercriminals have evolved their use of phishing as an attack method. It’s no longer restricted to email but instead targeted at all enterprise messaging channels, productivity and collaboration suites, conferencing, social media, support chat functions, and ticketing systems. Attackers exploit all of these targets to breach an identity so they can gain access to applications, systems, and data.
As such, the security market has evolved as well, and we see a mix of approaches in this space. Some vendors remain focused on protecting against the more traditional email phishing (which remains a primary attack vector), while others are developing solutions to help enterprises defend a broader range of attack targets. Some vendors are focused on protecting the perimeter, others on protecting the endpoint. There are also vendors that provide effective anti-phishing capabilities as a byproduct of delivering comprehensive security elsewhere.
It’s important to recognize these changes, both in threat and approach, because while vendors take different approaches, none of them are wrong as long as they achieve the end goal and meet an enterprise’s business requirements. Therefore, it’s essential that enterprises understand exactly the risk they want to mitigate and select appropriate technology to meet those needs.
This GigaOm Radar report highlights leading comprehensive anti-phishing vendors and equips IT decision-makers with the information needed to select the best fit for their business and use case requirements. In the corresponding GigaOm report “Key Criteria for Evaluating Anti-Phishing Solutions,” we describe in more detail the key features and metrics that are used to evaluate vendors in this market.
How to Read this Report
This GigaOm report is one of a series of documents that helps IT organizations assess competing solutions in the context of well-defined features and criteria. For a fuller understanding, consider reviewing the following reports:
Key Criteria report: A detailed market sector analysis that assesses the impact that key product features and criteria have on top-line solution characteristics—such as scalability, performance, and TCO—that drive purchase decisions.
GigaOm Radar report: A forward-looking analysis that plots the relative value and progression of vendor solutions along multiple axes based on strategy and execution. The Radar report includes a breakdown of each vendor’s offering in the sector.
Solution Profile: An in-depth vendor analysis that builds on the framework developed in the Key Criteria and Radar reports to assess a company’s engagement within a technology sector. This analysis includes forward-looking guidance around both strategy and product.