Dell Named A Leader In Gartner’s 2013 Magic Quadrant For Unified Threat Management

Dell announced today that the company has been positioned in the Leaders quadrant of the 2013 Magic Quadrant for Unified Threat Management by Gartner, Inc. 1 In its report, Gartner analysts Greg Young and Jeremy D'Hoinne emphasize the importance of unified threat management (UTM) devices, which provide small and midsize businesses multiple network security functions in a single appliance.

News Facts:

Dell offers two UTM product lines to the small and midsize business (SMB) markets: the SonicWALL TZ line for the smallest businesses, and the SonicWALL NSA Series for small and midsize companies. “Gartner defines the UTM market as multifunction network security products used by SMBs. Gartner defines midsize businesses as having 100 to 1,000 employees, with revenue ranging from $50 million to $1 billion. UTM products for the SMB market must provide the following functions at a minimum:
  • Standard network stateful firewall functions
  • Remote access and site-to-site virtual private network (VPN) support
  • Secure Web gateway functionality (anti-malware, URL and application control)
  • Network intrusion prevention focused on workstation protection”

“For 2012, Gartner estimates that worldwide revenue in the UTM market totaled approximately $1.53 billion, which represents an 18.7 percent growth over its estimate for 2011 1.”

The Gartner report notes that vendors in the Leaders quadrant “are at the forefront of making and selling UTM products that are built for midsize business requirements. The requirements necessary for leadership include a wide range of models to cover midsize business use cases, support for multiple features, and a management and reporting capability that's designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. Vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and products that are intuitive to manage and administer.”

If you liked this article you might like

DiCaprio, De Niro Headline List of Major Celebrities Hosting Hurricane Telethon

Lenovo Posts Surprise Loss as Chip Shortages Squeeze Margins

Dell Takes On Cloud Leaders With New Payment Model

How to Play a U.S. Trade War With China

How to Play a Trade War Between the United States and China