KuppingerCole Report
Leadership Compass
By Mike Small

Cloud Access Security Brokers

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.
By
sm@kuppingercole.com

1 Introduction

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadersh ...

Login Get full Access

1.1 Market Segment

Most organizations are now using several cloud services as well as on-premises and hosted IT services. This hybrid environment has given rise to many ...

Figure 1 illustrates how CASBs fit into the overall cloud governance process. The basic functionalities that CASBs provide are:

  • Discovery of what ...
Login Get full Access

1.2 Required Capabilities

The core features and functionalities that we are looking for include but are not limited to:

  • Discovery - of cloud services being used from within ...
Login Get full Access

1.2.1 Discovery of Cloud Usage

How the product helps an organization to discover and control the use of cloud services from within and from outside of the organization. This include ...

Login Get full Access

1.2.2 Access Control

How the product helps to control access to cloud services. This may be at a service by service level – giving the ability to prohibit or allow the u ...

Login Get full Access

1.2.3 Securing Data in the Cloud

This includes the functionality provided by the product to implement data security controls. These may include controls based on the classification or ...

Login Get full Access

1.2.4 Compliance

How the product helps to support the use of cloud services by the organization in a way that is compliance with laws and regulations, specifically:

    ...
Login Get full Access

1.2.5 Cyber Security

This area covers how the products help the organization to protect against cyber risks. Using cloud services increased the attack surface for cyber cr ...

Login Get full Access

1.2.6 Other Unique Features

We also consider any other unique features or functionality provided by the product.

Login Get full Access

2 Leadership

Selecting a vendor of a product or service must not be only based on the comparison provided by a KuppingerCole Leadership Compass. The Leadership Com ...

Login Get full Access

2.1 Overall Leadership

In the Overall Leadership rating, we find several vendors in the Leaders segment.

Microsoft and Symantec now take the leadership positions following ...

Login Get full Access

2.2 Product Leadership

The first of the three specific Leadership ratings is about Product Leadership. This view is mainly based on the analysis of product/service features ...

Product Leadership is the view where we look specifically at the functional strength and completeness of products. Here, we find some more vendors tha ...

Login Get full Access

2.3 Innovation Leadership

Another angle we take when evaluating products/services concerns innovation. Innovation is, from our perspective, a key capability in IT market segmen ...

When looking at Innovation Leadership, we see a different picture. The Innovation Leadership rating shows the vendors as the leaders in this segment t ...

Login Get full Access

2.4 Market Leadership

Finally, we looked at Market Leadership, i.e. the number of customers, the partner ecosystem, the global reach, and related factors affecting the lead ...

In this segment, the leading vendors are those that have a global presence with large customer bases and extensive partner ecosystems. These include t ...

Login Get full Access

3 Correlated View

While the Leadership charts identify leading vendors in certain categories, many customers are looking not only for, say, a product leader, but for a ...

Login Get full Access

3.1 The Market/Product Matrix

The first of these correlated views looks at Product Leadership and Market Leadership.

In this comparison, it becomes clear which vendors are better positioned in our analysis of Product Leadership compared to their position in the Marke ...

Login Get full Access

3.2 The Product/Innovation Matrix

The second view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation be ...

This chart shows a quite interesting picture with a spread of innovation and product capabilities. Vendors below the line are more innovative, vendors ...

Login Get full Access

3.3 The Innovation/Market Matrix

The third matrix shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innova ...

Vendors above the line are performing well in the market compared to their relative position in the Innovation Leadership rating, while vendors below ...

Login Get full Access

4 Products and Vendors at a glance

This section provides an overview of the various products we have analyzed within this KuppingerCole Leadership Compass on Cloud Access Security Broke ...

Login Get full Access

4.1 Ratings at a glance

Based on our evaluation, a comparative overview of the ratings of all the products covered in this document is shown in this table.

Login Get full Access

In addition, we provide in the second table an overview which also contains four additional ratings for the vendor, going beyond the product view prov ...

Login Get full Access

The second table requires some additional explanation regarding the “critical” rating.

In Innovativeness, this rating is applied if vendors provide ...

Login Get full Access

5 Product/service evaluation

This section contains a quick rating for every product/service we’ve included in this KuppingerCole Leadership Compass document. For many of the pro ...

Login Get full Access

5.1 CensorNet Cloud Access Security Broker

CensorNet has its headquarters in Basingstoke, UK with offices in Austin, US; Copenhagen, Denmark, and Munich, Germany. CensorNet provides a range of ...

Login Get full Access

5.2 CipherCloud CASB+ Platform

CipherCloud has its US headquarters in San Jose CA with offices worldwide. CipherCloud was founded in 2010 with a focus on enabling enterprises in a w ...

Login Get full Access

5.3 Cisco Cloudlock

Cisco is a is the worldwide technology company founded in 1984. Cisco’s Cloud security portfolio is comprised of Cisco Cloudlock CASB which was acqu ...

Login Get full Access

5.4 Forcepoint CASB

Forcepoint was formed in 2016 as a result of the combination of the Raytheon Cyber Products, Websense and Stonesoft organizations. In 2017 Forcepoint ...

Login Get full Access

5.5 McAfee MVISION Cloud

McAfee, from its foundation in 1987, has a long history in the world of cyber-security. Acquired by Intel in 2010, it was spun back out, becoming McAf ...

Login Get full Access

5.6 Microsoft Cloud App Security

Microsoft Cloud App Security is based on the Adallom Cloud Access Security Broker which was acquired in 2015. This has now been fully integrated with ...

Login Get full Access

5.7 Netskope Security Cloud

Netskope, which was founded in 2012, has its headquarters in Los Altos CA USA and offices in the UK, Australia, and India. This report covers Netskope ...

Login Get full Access

5.8 Oracle CASB Cloud Service

Oracle is a major IT software and hardware vendor. In September 2016 Oracle signed an agreement to acquire Palerra. Oracle has invested significantly ...

Login Get full Access

5.9 Palo Alto Networks Security Operating Platform

Palo Alto Networks Inc. is a security company with a mission to help organizations worldwide prevent cyber breaches. Palo Alto Networks acquired Cirro ...

Login Get full Access

5.10 Proofpoint Cloud App Security Broker

Proofpoint is a security and compliance company that was founded by Eric Hahn, former CTO of Netscape, founded the company in 2002. The company went p ...

Login Get full Access

5.11 Symantec CloudSOC

Symantec is an US software company headquartered in Mountain View, California that specializes in IT security software and services. This report cover ...

Login Get full Access

6 Vendors and Market Segments to watch

Besides the vendors covered in this KuppingerCole Leadership Compass on the Cloud Access Security Brokers market segment, there are several other vend ...

Login Get full Access

6.1 Bitglass

Bitglass was founded in 2013 and has its headquarters in Campbell CA, with offices in the Netherlands, Australia, Singapore, and Brazil. Bitglass’s ...

Login Get full Access

6.2 Centraya

Centraya is the European Cloud Access Security Broker produced by e3 AG a Swiss company with offices in Zurich and Frankfurt in Germany. Centraya prot ...

Login Get full Access

6.3 CyberArk and Vaultive

In March 2018, CyberArk announced the acquisition of certain assets of privately-held Vaultive, Inc., a cloud security provider. Vaultive had previous ...

Login Get full Access

6.4 FireMon 40Cloud

In October 2016 – FireMon, a Network Security Policy Management company, acquired FortyCloud, a Cloud Infrastructure Security Broker (CISB) 40Cloud ...

Login Get full Access

6.5 Fortinet FortiCASB

Fortinet is a cybersecurity company founded in 2000 with headquarters in Sunnyvale CA in the USA. FortiCASB is a Cloud Access Security Broker (CASB) w ...

Login Get full Access

6.6 NextLabs

NextLabs® has its USA headquarters in San Mateo, CA with offices worldwide. Although it does not have a pure CASB product that fits into this analys ...

Login Get full Access

6.7 Nexus

The Identity and security company Nexus Group was founded in 1984. It has its headquarters in Hägersten, Sweden. Nexus’s focus is on supporting org ...

Login Get full Access

6.8 Salesforce Shield

The Salesforce Platform is extensively used by organizations to improve the service that they give to their customers. Therefore, the platform stores ...

Login Get full Access

6.9 SkyFormation

SkyFormation offers a solution that provides an “Operations Centric CASB” that delivers cloud visibility and threat detection by leveraging the or ...

Login Get full Access

Methodology

Copyright

©2019 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top