Preview

Gartner 2013 Magic Quadrant For Secure Email Gateways 070213

Good Essays
Open Document
Open Document
10558 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gartner 2013 Magic Quadrant For Secure Email Gateways 070213
G00247704

Magic Quadrant for Secure Email Gateways
Published: 2 July 2013

Analyst(s): Peter Firstbrook, Brian Lowans

The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability encryption and better protection from targeted phishing attacks.

Strategic Planning Assumption
Cloud-based (software as a service) deployments of the secure email gateway market will grow from 37% in 2011 to more than half of the market (by revenue) in 2016.

Market Definition/Description
Secure email gateways (SEGs) provide protection from email spam and malware, and also provide outbound email content inspection and encryption of emails.
The SEG market is mature. The penetration rate of commercial SEG solutions is close to 100% of enterprises. Buyers are becoming more price-sensitive; slightly less than 80% of recently surveyed reference customers (see Note 1) said that price was important or very important in their next SEG purchase. The market growth rate has leveled off, and there are no significant market entrants or acquisitions
— all classic signs of a mature market.
Despite the market maturity, companies can't do without SEG solutions. Global spam volumes
1

declined again slightly in 2012 as spammers moved to other mediums, such as social networks, but spam still represents as much as 69% of email. Phishing and malware attachments also declined slightly in 2012; however, there is ample evidence that email is the preferred channel to launch advanced targeted attacks.
Better protection from targeted phishing attacks is the most critical inbound protection capability
(98% of respondents indicated that this was an important or very important capability), but only a few vendors have advanced the state of the art against these attacks. Leading solutions are incorporating methods to double check — or better, proxy — URL links in email at the "time of click" rather than the time of delivery. These methods are more effective in

You May Also Find These Documents Helpful

Related Topics