Content of Figures
1 How to use the Buyer‘s Guide
This KuppingerCole Buyer’s Guide on Ransomware Protection provides information about
- Use Cases
- Functional Selection Criteria
- Non-functional Se ...
2 Market segments defined
This document analyzes the Endpoint-based Ransomware Protection market segment. Most anti-malware products provide capabilities to protect against ran ...Login Get full Access
3 Top 5 Use Cases
The top 5 use cases for ransomware protection are listed in table 1.
|Prevent data loss||If users’ computer ...|
There may be more use cases, however most will fit well into one of these categories.Login Get full Access
4 Top 20 Selection Criteria – functional
When looking at products in detail - for instance, during an RfI or RfP - there frequently are hundreds of different criteria to be evaluated. However ...
Certainly, there are more criteria to look at in the later stages of an evaluation process, both functional and non-functional. However, the ones ment ...Login Get full Access
5 Top 10 Selection Criteria – non-functional
Aside from the functional selection criteria listed above, there are a number of non-functional criteria to take into account when deciding on a Ranso ...
Again, there are more criteria to take into account during a vendor selection process, such as the financial strength of the vendor, where the number ...Login Get full Access
6 Use cases / Selection Criteria Matrix
Having identified the most important use cases and selection criteria for vendors in Ransomware Protection, this section provides a matrix that maps u ...
KuppingerCole Advisory Services can support you with adapting criteria to your specific requirements and further services around selecting the appropr ...Login Get full Access
7 Top 5 Prerequisites – technical
Ransomware and malware protection are topics that cannot be seen as isolated from other areas of IT Security. Thus, there are some technical prerequis ...
From our perspective, it is important to understand how the various components of this segment of the cybersecurity toolset fit together with other ar ...Login Get full Access
8 Top 10 Prerequisites – organizational
Success in Ransomware Protection solution rollout depends not only on the technology selected. There are also various organizational prerequisites. Th ...
We see many situations that struggle not because of technical weaknesses and wrong products, but because of a lack of organizational maturity.Login Get full Access
9 Top 10 Questions to ask the vendors
Aside from asking for specific features, there are some more questions that are worth asking vendors. The following questions help in understanding th ...
There are many questions you can ask of vendors. However, the ones listed above are the ones which are most important from our experience, if we limit ...Login Get full Access