Table of Content



Table of Contents

Executive Summary
Key Findings

Defining the Integrated Cybersecurity Framework Paradigm
Definition—Integrated Cybersecurity Frameworks
Definition—Integrated Cybersecurity Frameworks (continued)
Coverage of Integrated Cybersecurity Frameworks
Coverage of Integrated Cybersecurity Frameworks (continued)

Challenges in Cybersecurity Operations
Challenges in Cybersecurity Operations Today
Challenges in Cybersecurity Operations Today (continued)
Challenges in Cybersecurity Operations Today (continued)

The Value of an Integrated Cybersecurity Framework
Today’s Cybersecurity Scenarios

Traditional Approach versus Integrated Approach
Traditional Security Framework—Best-of-Breed Approach
Integrated Security Framework—Holistic Approach

Integrated Cybersecurity Framework Vendor Profiles
Market Landscape
Measurement Definitions
Vendor Assessment Table
Check Point Software Technologies
Check Point Software Technologies (continued)
Cisco Systems
Cisco Systems (continued)
FireEye
FireEye (continued)
Fortinet
Fortinet (continued)
McAfee
McAfee (continued)
Palo Alto Networks
Palo Alto Networks (continued)
Pulse Secure
Pulse Secure (continued)
Symantec
Symantec (continued)

Growth Opportunities and Companies to Action
Transformation in the Cybersecurity EcosystemMany
Growth Opportunity 1—Enterprises Need to Understand the Benefits that Integrated Frameworks can Offer
Growth Opportunity 2—Crucial to Have Integration Both Within the Brand and Outside of the Ecosystem
Growth Opportunity 3—Need to Expand the Portfolio to Cover as Many Enterprise Pain Points as Possible
Strategic Imperatives for Success and Growth

The Last Word
The Last Word
Legal Disclaimer

Appendix
List of Exhibits