cyber security solutions - t-systems.com...cyber security in germany: fewer resources against...
TRANSCRIPT
Cyber Security Solutions & ServicesGermany 2019/2020
June 2019
QuadrantReport
A research report comparing provider strengths, challenges and competitive differentiators
Section Name
© 2019 Information Services Group, Inc. All Rights Reserved.
22
ISG Provider Lens™ delivers leading-edge and actionable research studies, reports
and consulting services focused on technology and service providers’ strengths and
weaknesses and how they are positioned relative to their peers in the market. These
reports provide influential insights accessed by our large pool of advisors who are
actively advising outsourcing deals as well as large numbers of ISG enterprise clients
who are potential outsourcers.
For more information about our studies, please email [email protected],
call +49 (0) 561-50697537, or visit ISG Provider Lens™ under ISG Provider Lens™.
ISG Research™ provides subscription research, advisory consulting and executive
event services focused on market trends and disruptive technologies driving change
in business computing. ISG Research™ delivers guidance that helps businesses
accelerate growth and create more value.
For more information about ISG Research™ subscriptions, please email [email protected], call +49 (0) 561-50697537 or visit research.isg-one.com.
Information Services Group, Inc. is solely responsible for the content of this report.
Unless otherwise cited, all content, including illustrations, research, conclusions,
assertions and positions contained in this report were developed by and are the sole
property of Information Services Group, Inc.
The research and analysis presented in this report includes research from the ISG
Provider Lens™ program, ongoing ISG Research programs, interviews with ISG advisors,
briefings with services providers and analysis of publicly available market information
from multiple sources. The data collected for this report represents information that
was current as of March, 2019. ISG recognizes that many mergers and acquisitions have
taken place since that time but those changes are not reflected in this report.
The author of this report is Frank Heuer.
About this Report
ISG Provider Lens™ Quadrant Report | June 2019
1 Executive Summary
3 Introduction
15 Identity & Access Management
24 Data Leakage/Loss Prevention (DLP), Data Security
37 Network Security
47 Cloud/Datacenter Security
61 Security Services – Midmarket
70 Security Services – Large Accounts
83 Methodology
© 2019 Information Services Group, Inc. All rights reserved. Reproduction of this publication in any form without prior permission is strictly prohibited. Information contained in this report is based on the best available and reliable resources. Opinions expressed in this report reflect ISG’s judgment at the time of this report and are subject to change without notice. ISG has no liability for omissions, errors or completeness of information in this report. ISG Research™ and ISG Provider Lens™ are trademarks of Information Services Group, Inc.
Section Name
© 2019 Information Services Group, Inc. All Rights Reserved.
1111
ISG Provider Lens™ Quadrant Report | June 2019
The providers of security solutions and services have increasingly adapted to this
situation with their portfolios. In addition to solutions from a single source, they also offer
increasingly extensive cloud services and managed security services to allow customers
to conserve capital reserves whilst benefiting from the latest security expertise without
having to build them up themselves.
Identity & Access Management (IAM) has experienced a “renaissance” in recent
years. After a period of average demand IAM has risen to the top of the security agenda.
Going forward, it will become a critical capability. An important reason for this is that the
increasing digitalization of all sectors contributes to the fact that not only users and their
identities must be protected, but also machines and other corporate assets (keyword:
Industry 4.0). Going forward, securing identity will be the basis for ensuring digital systems
and networking among each other in general. In addition, the number of users, devices
and services is constantly increasing, as well as the number of digital identities to be
managed.
This is becoming the first imperative in times of permanent threat to data by cyber attacks.
Providers of IAM solutions promise to ensure an effective and efficient control of
identity management. Digital identities are the key to data, devices and services; hence,
these must be specially secured.
EXECUTIVE SUMMARYCyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT) and Industry 4.0 (I4.0)
initiatives, business processes are increasingly shifting towards IT. The security of IT and
communication systems is becoming increasingly important as a means to protect overall
corporate resources. Thus, IT security is transformed into corporate security.
However, threats to IT security also pose a potential threat to the company's existence. Data
and IT infrastructures are exposed to more sophisticated and constantly changing criminal
threats and daily attacks. In addition, there are dangers due to negligence of end users. In
addition to the company's own protection, there is increasing regulation forcing measures
against cyber attacks. In Europe and Germany, the General Data Protection Regulation that
came into force in May 2018 is currently the most prominent example. Its implementation is
still a major challenge for many companies.
Cyber Security and the protection of information and communication systems is therefore
an increasingly important task. Still, IT managers often find it difficult to get security
investments approved by management, in particular by the CFO, often the first person who
holds them accountable.
The ROI for investments in security is difficult to prove as for other IT projects. Alongside
limited financial means, a shortage of skilled workers Not only the financial means are
often limited, the shortage of skilled workers is becoming increasingly noticeable.
Executive Summary
© 2019 Information Services Group, Inc. All Rights Reserved.
22
ISG Provider Lens™ Quadrant Report | Juni 2019
22
© 2019 Information Services Group, Inc. All Rights Reserved.
ISG Provider Lens™ Quadrant Report | June 2019 Executive Summary
The increasing interest in DLP (Data-Leakage-/Loss-Prevention-) solutions is due to
various factors affecting the security of data in the company. The increasing business
use of private terminal devices is a challenge with regard to protecting against undesired
data flows. These clients often defy the configuration and control by the operational
administration and may not be monitored operationally for reasons such as legal
complications (data protection) in some cases. DLP solutions must take such restrictions
into account without allowing operational vulnerabilities. With looming sanctions against
the breach of GDPR regulation, the importance of data protection - and solutions including
DLP - has become critical.
The network security service providers must adapt to new forms of cyber attacks.
In the past, it was assumed that attackers could be excluded from the company’s own
network; the starting point of all considerations is now the assumption that the attacker
operates from within the network. This fundamentally changes network security
requirements.
The GDPR also impacts cloud/data center security. Violations that result in the loss of
personal data are subject to draconian punishments.
For security - in particular against this background - compliance guidelines must be
monitored and adhered to. These claims can only be met by robust security systems. The
solutions of cloud/data center security service providers must comprehensively monitor
physical and virtual infrastructure environments in the cloud and in their own data center,
automatically detect attacks in real time, block them and log them using a tamper-proof
method.
Security services attract increasing interest among SMEs. The shortage of IT security
specialists is affecting medium-sized companies in particular. In the competition for
specialists and talents, they often lose out to the larger companies. This strongly increases
the demand for external IT security services, in particular in this target group. In particular
the demand for cloud services, managed security services and offers from a single source
increase significantly. This enables service providers with a broad portfolio of services for
numerous different issues to position themselves successfully in particular in this market.
In order to succeed in the demanding security services market for large customers,
service providers must be able to demonstrate extensive, international experience
in this market segment with a broad range of solutions. Efficient, often internationally
represented teams must be available for support. In view of the increasingly intensive and
sophisticated cyberattacks that are directed at well-known large companies,
Managed security services are also moving more and more into the focus of large
customers. Less qualified resources, the increasing frequency of incidents and the need
for always up-to-date specialist knowledge promote the demand for these services.
© 2019 Information Services Group, Inc. All Rights Reserved.
33
Definition This study examines five issues in the market for cyber security in six chapters.
The main difference between the issues examined in this study is the
differentiation of security solutions und security services.
In this study, Security solutions comprise hardware, software and cloud
services from product providers. The considered issues are Identity & Access
Management, Data Leakage/Loss Prevention, network security and cloud-/data
center security.
Security services are services relating to security solutions. This category
also comprises cloud services from service providers who are not
product providers. Due to the heterogeneity of the target groups and the
corresponding markets, security services are considered with regard to
user companies with 50 to 4,999 employees (“midmarket” or “SME”) and
user companies with more than 5,000 employees (“large accounts” or “large
companies”).
Simplified illustration
Cyber Security Solutions & Services
Security Solution
Identity & Access Management Data Leakage/Loss Prevention (DLP), Data Security
Network Security Cloud/Datacenter Security
Security Services
Midmarket Large Accounts
Source: ISG 2019
ISG Provider Lens™ Quadrant Report | June 2019
Einleitung
Introduction
© 2019 Information Services Group, Inc. All Rights Reserved.
44
Definition
Identity & Access Management
Identity & Access Management (IAM) solutions are used to collect, record and manage
user identities and the associated access rights. These ensure that access rights are
granted according to the defined guidelines. In order to deal with existing and new
requirements from the application world, security providers are increasingly required
to incorporate mechanisms, frameworks and automation, e.g. of risk assessment into
their management suites that are able to carry out user and attack profiling in real time.
Influence of Social Media and mobile users necessitates further requirements to cover
the security needs of customers than was previously the case with web and context-
related authorization management. This category also comprises cloud services from
product providers.
ISG Provider Lens™ Quadrant Report | June 2019
Scope of the Report
Data Leakage/Loss Prevention (DLP), Data Security
By DLP (Data Leakage Prevention oder auch Data Loss Prevention), we refer to products that
identify and monitor sensitive data to ensure that it is only accessible to authorized users and no
data leaks occur. DLP products are becoming increasingly important, since companies are finding
it increasingly difficult to control data movement and data transfer. The number of (mobile)
terminal devices in the companies on which data can be stored is growing. These terminal
devices usually have a separate connection to the Internet, so that data can be sent and received
without using the central Internet gateway. In addition, the terminal devices have a large number
of interfaces (such as USB, Bluetooth, WLAN, NFC), via which data can also be exchanged. This
category also includes cloud services from product providers.
Introduction
© 2019 Information Services Group, Inc. All Rights Reserved.
55
ISG Provider Lens™ Quadrant Report | June 2019
Network Security
Currently, dangers threaten the corporate network in different ways. These include:
� unauthorized accesses to computers by outsiders,
� attacks intended to bring the services of the target company to their
knees (DoS / DDoS),
� dangers that can result from the careless behavior of own employees,
� “profitable targets”, the attackers work with great effort and increasing sophistication,
penetrating deep into the network infrastructure and spying out sensitive data
unnoticed over a longer period of time as part of these cyber attacks (Advanced
Persistent Threats).
The task of network security products is to counter these dangers. In this study, network
security includes the protection of physical network structures, including wireless LANs.
This category also comprises cloud services from providers.
Cloud/Datacenter Security
By cloud/data center security ISG refers to products to protect against attacks or threats to the IT
infrastructure - regardless of whether it is installed in the cloud (private, public, hybrid or multi-
cloud) or on-premise. This category also comprises cloud services from product providers.
Security Services
Security services comprise services for security solutions. Services include consulting, training,
integration, maintenance, support or managed security services. By managed security services,
we refer to operation and management of an IT security infrastructure for one or more customers
through a Security Operations Center. The target group of midmarket (SME) includes companies
with minimum 50, but less than 5,000 employees. The target group large accounts (large
companies) comprises companies with a minimum 5,000 employees. The following consideration
in this chapter deals with services that do not concern exclusively a service provider's own
products. This category also comprises cloud services from service providers who source the
solutions from third parties.
Definition
Introduction
© 2019 Information Services Group, Inc. All Rights Reserved.
66
ISG Provider Lens™ Quadrant Report | June 2019
The ISG Provider Lens™ quadrants were created using an evaluation matrix containing four segments, where the providers are positioned accordingly.
Leader
The “leaders” among the vendors/
providers have a highly attractive
product and service offering and a
very strong market and competitive
position; they fulfill all requirements
for successful market cultivation.
They can be regarded as opinion
leaders, providing strategic
impulses to the market. They also
ensure innovative strength
and stability.
Product Challenger
The “product challengers” offer a
product and service portfolio that
provides an above-average cover-
age of corporate requirements, but
are not able to provide the same
resources and strengths as the
leaders regarding the individual
market cultivation categories. Often,
this is due to the respective vendor’s
size or their weak footprint within
the respective target segment.
Market Challenger
“Market challengers” are also
very competitive, but there is still
significant portfolio potential and
they clearly lag behind the “leaders.”
Often, the market challengers
are established vendors that
are somewhat slow to address
new trends, due to their size and
company structure, and have
therefore still some potential to
optimize their portfolio and increase
their attractiveness.
Contender
“Contenders” are still lacking mature
products and services or sufficient
depth and breadth of their offering,
while also showing some strengths
and improvement potentials in their
market cultivation efforts. These
vendors are often generalists or
niche players.
Provider Classifications
Introduction
© 2019 Information Services Group, Inc. All Rights Reserved.
77
Introduction
Rising Star
Rising stars are mostly product challengers with high future potential. When receiving the “rising stars” award, such companies have a promis-ing portfolio, including the required roadmap and an adequate focus on key market trends and customer requirements. Also, the “rising stars” has an excellent management and understanding of the local market. This award is only given to vendors or service providers that have made extreme progress towards their goals within the last 12 months and are on a good way to reach the leader quadrant within the next 12-24 months, due to their above-average impact and innovative strength.
Each ISG Provider Lens™ quadrant may include a service provider(s) who ISG believes has a strong potential to move into the leader’s quadrant.
Provider Classifications (cont.)
Not In
This service provider or vendor was not included in this quadrant as ISG could not obtain enough information to position them. This omission does not imply that the service provider or vendor does not provide this service.
ISG Provider Lens™ Quadrant Report | June 2019
Cyber Security Solutions & Services Quadrants
© 2019 Information Services Group, Inc. All Rights Reserved.
1515
ISG Provider Lens™ Quadrant Report | June 2019
SOCIAL ENTERPRISE NET-WORKING SUITES
DefinitionIdentity & Access Management (IAM) products are used to collect, record and manage user identities and the associated access rights. These ensure that access rights are granted according to the defined guidelines. In order to deal with existing and new requirements from the application world, security providers are increasingly required to incorporate mechanisms, frameworks and automation, e.g. of risk assessment into their management suites that are able to carry out user and attack profiling in real time. Influence of Social Media and mobile users necessitates further requirements to cover the security needs of customers than was previously the case with web and context-related authorization management. This category also comprises cloud services from product providers.
IDENTITY & ACCESS MANAGEMENT
Managed Services for Midmarket
© 2019 Information Services Group, Inc. All Rights Reserved.
2424
SOCIAL ENTERPRISE NET-WORKING SUITES
DefinitionDLP (Data Leakage Prevention or Data Loss Prevention) refers to
products that identify and monitor sensitive data to enforce access
by authorized users only, thus preventing data leaks. DLP solutions
are becoming increasingly important, since companies are finding it
increasingly difficult to control data movement and transfer. The number
of (mobile) terminal devices on which data can be stored is growing.
These terminal devices usually have a separate connection to the
Internet, so that data can be sent and received without using the central
Internet gateway. In addition, the terminal devices have large number of
interfaces (such as USB, Bluetooth, WLAN, NFC), via which data can also
be exchanged. This category includes cloud services from DLP solution
providers.
DATA LEAKAGE/LOSS PREVENTION (DLP), DATA SECURITY
Managed Services for Large AccountsISG Provider Lens™ Quadrant Report | June 2019
© 2019 Information Services Group, Inc. All Rights Reserved.
2525
The following criteria were taken into account for assessing solution
providers for DLP in Germany:
� Scope and functionality of the DLP solution
� Choice of DLP delivery models, e.g. on-premise, private cloud, public
cloud, hybrid cloud
� Scope of additional features with the DLP solution
� Performance of the DLP solution; the level of automation and - related
to this - the use of artificial intelligence
� Market presence in Germany: Number of customers, partner network,
awareness, etc.
� Innovations and portfolio roadmap of the DLP solution set
The increasing interest in DLP solutions is due to various factors that affect the security of data in the
company. The increasing business use of private end user devices provides a challenge for preventing
undesired data flows. These clients often defy the configuration and control by the operational administra-
tion and may not be comprehensively monitored. One of the reasons for the lack of control is regulatory
requirements relating to end user privacy. DLP solutions must account for these restrictions in the control
without allowing operational vulnerabilities. With the sanctions of the General Data Protection Regulation
applicable since the end of May 2018, the importance of data protection - and thus also of DLP solutions -
has increased.
In addition to the diversification of mobile devices, IT trends including big data, social business and
cloud computing add to the complexity for controlling data movements and lead to highrequirements
for DLP solutions. The enormously growing data volume demands efficient DLP solutions, which quickly
detect, classify and protect data from unauthorized actions such as copying or moving according to their
protection needs. Cloud storage solutions and cloud apps can cause data to leave the corporate network
unintentionally during processing. There is also the danger that operational data may be transferred to
private cloud storage services. Social networks and other social media platforms open up new communi-
cation channels through which data can flow, in addition to the risks of data transfer via e-mail.
Eligibility Criteria Observations
DATA LEAKAGE/LOSS PREVENTION (DLP), DATA SECURITY
Data Leakage/Loss Prevention (DLP), Data SecurityISG Provider Lens™ Quadrant Report | June 2019
© 2019 Information Services Group, Inc. All Rights Reserved.
3737
SOCIAL ENTERPRISE NET-WORKING SUITES
DefinitionCurrently, corporate network are threatened in different ways. In
addition to unauthorized accesses to computers by outsiders, threats
include attacks intended to bring the services of the target company to
their knees (DoS/ DDoS), but also the dangers that can result from the
careless behavior of own employees. In the event of “profitable targets”,
the attackers work with great effort and increasing sophistication,
penetrating deep into the network infrastructure and spying out
sensitive data unnoticed over a longer period of time as part of these
cyber attacks (Advanced Persistent Threats).
The task of network security products is to counter these dangers. In
this study, network security includes the protection of physical network
structures and mobile extensions including wireless LANs. This category
also comprises cloud solutions from providers.
NETWORK SECURITY
Managed Container as a ServiceISG Provider Lens™ Quadrant Report | June 2019
© 2019 Information Services Group, Inc. All Rights Reserved.
4747
SOCIAL ENTERPRISE NET-WORKING SUITES
DefinitionBy cloud/data center security ISG refers to solutions designed to protect
against attacks or threats to the IT infrastructure - regardless of whether
it is installed in the cloud (private, public, hybrid or multi-cloud) or
on-premise.
CLOUD/DATACENTER SECURITY
Managed Hosting for MidmarketISG Provider Lens™ Quadrant Report | June 2019
© 2019 Information Services Group, Inc. All Rights Reserved.
6161
SOCIAL ENTERPRISE NET-WORKING SUITES
DefinitionSecurity Services include consulting, training, integration, maintenance,
support or managed security services. Managed security services refer
to operation and management of an IT security infrastructure for one or
more customers through a Security Operations Center. The target group
of midmarket (SME) includes companies with minimum 50, but less
than 5,000 employees. This category also comprises cloud services from
service providers who are not equipment vendors.
SECURITY SERVICES – MIDMARKET
Managed Hosting for Large AccountsISG Provider Lens™ Quadrant Report | June 2019
© 2019 Information Services Group, Inc. All Rights Reserved.
6262
The following criteria were taken into account for rating the security
provider for medium-sized companies:
� Scope of service portfolio
� Location of cloud data centers in Germany and the European Union
and international presence
� Locations of Security Operations Centers in Germany and the
European Union and international presence
� Size of cyber security team
� Market presence in Germany: Branches, number of customers,
awareness etc.
� Partnerships with technology service providers#
� Innovations and portfolio roadmap with regard to the security
service range
The shortage of IT security specialists has a strong affect on medium-sized companies. In the
competition for specialists and talents, they often lose out to the larger companies, who can usually
offer better conditions. This strongly increases the demand for external IT security services. In
order to keep the coordination effort low, customers look for services from a single source. This
enables service providers with a broad portfolio which addresses numerous different issues to
position themselves successfully in this market.
The issues for mid-sized customers are aggregated by the fact that cybercriminals are increasingly
targeting SMEs with increasingly sophisticated attacks. The indiscriminate behavior of users is
increasingly exploited, e.g. in trojan and phishing attacks. In addition to a modern ICT equipment,
consulting and training continue to play a central role for users (companies). In addition, the
requirements by the lawmaker are also increasing, e.g. with regard to data security and data
protection. An example for this is the General Data Protection Regulation (GDPR). Even after one
year of its enforcement, the implementation still represents a major challenge for many SMEs.
Medium-sized companies are increasingly dependent on the support of external service providers
to master these challenges. Medium-sized companies are also increasingly interested in managed
Eligibility Criteria Observations
Security Services – Midmarket
SECURITY SERVICES – MIDMARKET
ISG Provider Lens™ Quadrant Report | June 2019
© 2019 Information Services Group, Inc. All Rights Reserved.
6969
TELEKOM DEUTSCHLAND
Telekom Deutschland is the German subsidiary of Deutsche Telekom serving medium-sized customers. In the Telekom Security segment, the Telekom group combines its extensive IT security expertise in the “Telekom Security” unit under the management of T-Systems. Telekom Security’s portfolio is marked under the label “Magenta Security”.
Overview
Telekom Security offers an extensive portfolio: With “Magenta Security” Telekom Deutschland offers an extremely comprehensive portfolio of security services, from consulting and implementation to managed services and cloud-based security services. All security technologies are thus covered.
In addition, Telekom Security enhanced its geographical reach; the focus of the expansion is on managed security services. For this year, a new Security Operations Center is planned in Singapore, which means that Telekom Security will also be present in Asia in this respect.
The team also continues to grow significantly. The segment Telekom Security has around 1,450 security specialists, the largest security team in Germany has been increased by more than 200 employees.
Telekom Security runs operations from Germany: Telekom Security operates cloud data centers in Germany, which is appreciated by many medium-sized customers.
With “Security made in Germany” Telekom Deutschland can score especially in view of the data protection discussion – and particularly in the target group of SMEs.
Telekom Deutschland has a great cross-selling potential: The extensive business customer base of one of Europe’s largest telecom providers offers a unique cross-selling potential for Telekom Deutschland’s IT security services.
Strengths
It is recommended to expand internationalization of the security operations: With its cloud data centers in Germany and the European Union, Telekom Deutschland is highly attractive to SMEs, but in view of the needs of internationally active customers, it is recommended that a cloud data center in the United States should also be considered.
Caution
Telekom Deutschland sets the standard for security services for German SMEs.
2019 ISG Provider Lens™ Leader
ISG Provider Lens™ Quadrant Report | June 2019 Security Services – Midmarket
© 2019 Information Services Group, Inc. All Rights Reserved.
7070
SOCIAL ENTERPRISE NET-WORKING SUITES
DefinitionSecurity services include consulting, training, integration, maintenance,
support or managed security services. Managed security services are
referred to operations and management of an IT security infrastructure
for one or more customers through a Security Operations Center. The
target group large accounts (large companies) comprises companies with
minimum 5,000 employees. This category also comprises cloud services
from service providers who are not equipment vendors.
SECURITY SERVICES – LARGE ACCOUNTS
Colocation ServicesISG Provider Lens™ Quadrant Report | June 2019
© 2019 Information Services Group, Inc. All Rights Reserved.
7171
Security Services – Large Accounts
The following criteria were taken into account for rating the security
providers for large companies:
� Scope of the service portfolio
� Locations of cloud data centers in Germany and the European Union
and the international presence
� Locations of Security Operations Centers in Germany and the
European Union and international presence
� Size of the cyber security team
� International experience
� Consulting competence
� Market presence in Germany: Number of customers, awareness etc.
� Partnerships with technology service providers
� Innovation and the portfolio roadmap with regards to the security
service range
In order to succeed in the demanding security services market for large customers, service
providers must be able to demonstrate an extensive, international experience in this market
segment with a broad range of solutions. Efficient, often internationally represented teams must be
available for support.
In view of the increasingly intensive and sophisticated cyberattacks that are directed at well-known
large companies, managed security services are also moving more and more into the focus of
large customers. Less qualified resources, the increasing frequency of incidents and the need for
always up-to-date specialist knowledge promote the demand for these services. All leaders in this
service provider comparison offer managed security services. Similar to small and mediumsized
companies, Security Operations Centers (SOC) with a German location are also relevant for large
companies. But in this segment, globally distributed SOCs, also play a special role due to the
frequent international presence of large companies. The provisions of the General Data Protection
Regulation, enforced in May 2018, continues to create a need for consulting in many large compa-
nies, to the benefit of service providers.
Eligibility Criteria Observations
SECURITY SERVICES – LARGE ACCOUNTS
ISG Provider Lens™ Quadrant Report | June 2019
© 2019 Information Services Group, Inc. All Rights Reserved.
8282
T-Systems sets the standard for security services for large customers in Germany.
T-SYSTEMS
T- Systems is undergoing a transformation process: Although Telekom Security is a strongly growing unit, the past discussions about the future of T-System and the current transformation process could generate reluctance among interested parties.
T-Systems, the ICT service provider, is the enterprise division of Deutsche Telekom. Telekom group combines its extensive IT security expertise in the “Telekom Security” unit under the management of T-Systems. Telekom Security’s portfolio is marked under the label “Magenta Security”.
T-Systems offers an extensive portfolio: With “Magenta Security” T-Systems offers an extremely comprehensive portfolio of security services, from consulting and implementation to managed services and cloud-based security services. All security technologies are thus covered. The “Magenta Security” portfolio was further expanded together with leading technology partners.
In addition, Telekom Security built out its geographical footprint; currently focusing on managed security services. For this year, a new Security Operations Center is planned in Singapore. That will create a Telekom Security presence in Asia Pacific.
The team has been increased significantly: The largest service provider security team now reaches 1,450 staff after the addition of another 200 security specialists taken on board last year.
Telekom Security can show the operation in Germany: Telekom Security operates cloud data centers in Germany, a necessary prerequisite by many large customers.
The strong local presence is a very strong asset: With “Security made in Germany” T-Systems can score highly with Germany-based organisations, especially because of the necessity to comply with the data protection regulation.
Telekom Security shows a strong presence: Telekom Security operates the largest integrated Cyber Defense and Security Operations Center in Europe, situated in Bonn since 2017.
Strengths
Overview Caution
2019 ISG Provider Lens™ Leader
ISG Provider Lens™ Quadrant Report | June 2019 Security Services – Large Accounts
Methodology
Methodology
© 2019 Information Services Group, Inc. All Rights Reserved.
8484
ISG Provider Lens™ Quadrant Report | June 2019
The ISG Provider Lens™ 2019 – "Cyber Security Solutions & Services" research
study analyses the relevant software vendors and service providers in the Germany
market, based on a multi-phased research and analysis process, and positions
these providers based on the ISG Research methodology.
The study was divided into the following steps:
METHODOLOGY
1. Definition of Network - Cyber Security Solutions & Services
2. Use of questionnaire-based surveys of service providers/vendor across all
trend topics
3. Interactive discussions with service providers/vendors on capabilities
& use cases
4. Leverage ISG’s internal databases & advisor knowledge & experience
(wherever applicable)
5. Detailed analysis & evaluation of services & service documentation based
on the facts & figures received from providers & other sources.
6. Use of the following key evaluation criteria:
− Strategy & vision
− Innovation
− Brand awareness and presence in the market
− Sales and partner landscape
− Breadth and depth of portfolio of services offered
− Technology advancements
© 2019 Information Services Group, Inc. All Rights Reserved.
Mr. Heuer is a Manager Advisor at ISG Germany. His main areas of coverage include the digital workspace, communications, social business & collaboration, cloud computing with a special focus on workspace/unified communications & collaboration as a service, and security.
Frank supports and advises renowned IT and telecommunications companies on their go to market, competitive analyses, business planning and general strategic and operational marketing issues. He is the author of many white papers, press releases and articles, blog posts and newsletter contributions on current ICT topics and has co-authored various books on topics such as the workplace of the future / UCC and security. Frank acts as client service manager and editor of the customer newsletter and is engaged in close and regular contact with our DACH customers.
Frank completed training as a banker and holds a master’s degree in business administration of the University of Trier (marketing, statistics and English).
Frank Heuer, AuthorSenior Advisor
AuthorISG Provider Lens™ Quadrant Report | June 2019
ISG Provider Lens™ | Quadrant ReportJune 2019© 2019 Information Services Group, Inc. All Rights Reserved
ISG (Information Services Group) (Nasdaq: III) is a leading global technology research and advisory firm. A trusted business partner to more than 700 clients, including more than 70 of the top 100 enterprises in the world, ISG is committed to helping corporations, public sector organizations, and service and technology providers achieve operational excellence and faster growth. The firm special-izes in digital transformation services, including automation, cloud and data analytics; sourcing adviso-ry; managed governance and risk services; network carrier services; strategy and operations design; change management; market intelligence and technology research and analysis. Founded in 2006, and based in Stamford, Conn., ISG employs more than 1,300 digital-ready professionals operating in more than 20 countries—a global team known for its innovative thinking, market influence, deep industry and technology expertise, and world-class research and analytical capabilities based on the industry’s most comprehensive marketplace data. For more information, visit www.isg-one.com.