382939769e8bae042632276ce6509b6b.ppt
- Количество слайдов: 17
HARK! Competitive Overview Magnacom Sales Training June 1, 2001 Steven Greenberg Director of Online Marketing HARK! Competitive Overview
Contents 1. Competitive Landscape 2. Primary Differentiators 3. “Top Five” Competitors Review 4. Other Competitors Review 5. Keywords HARK! Competitive Overview
Competitive Landscape Extranet Access Control Internal Access Control Security Management HARK! Texar CA – e. Trust – A. C Securant BMC – Control-SA Oblix Access 360 App. Gate Securant Netegrity Aventail Cross. Logix Open. Network Conclave SYSTOR - SAM HARK! Competitive Overview
Primary Differentiators HARK! is… Our Competitors offer Automated – time & resource saving Manual – resourceintensive, hidden costs, time consuming Easy to implement – cost effective and FAST Lengthy, complex & costly implementation and integration Intelligent & accurate – discovery algorithms allow highly-granular permissions based on actual network usage Guesswork – requires rough grouping of users, resulting in coarse & inaccurate permission granularity, and more permissions than necessary HARK! Competitive Overview
Competitors Review 1. Computer Associates 2. Access 360 3. BMC 4. Securant 5. Texar More on these companies on the “Competitor Brief” handout HARK! Competitive Overview
Company: CA Product: e. Trust Access Control Issue Who Are They? The Product Top Business Differentiators Fact Founded in 1976, CA boasts over $6 billion in revenue for the fiscal year 2000, with 18, 000 employees. They have offices in countries all over the world. Part of e. Trust enterprise package - including access control, authentication, authorization, administration, auditing, real-time monitoring, central point of management, single user ID and password. Difficult and complex implementation – takes at least three months to get up and running – requires heavy resource commitment. • Requires manual permissions configuration Top Technological Differentiators FACTS • No real-time alerting • Limited platform support (NT/UNIX Only) • Slows network traffic HARK! Competitive Overview
Company: CA Product: e. Trust Access Control They Ask Who Are They? What do they have? Q/A Your Answer Could Be… CA is a well-known name in security software – and e. Trust is a comprehensive package for enterprise security. However, e. Trust Access Control could not be considered “best of breed. ” With Camelot, you get BOTH a best-of-breed technology and a dynamic company committed to supporting its customers. e. Trust Access Control is part of a package that encompasses all aspects of network security. They don’t specialize in automated access control, or have the resource saving discovery algorithms. With Hark!, you get state of the art technology that actually SAVES you money. What differentiates Hark! (Business)? There is a hidden cost when you buy e. Trust – it takes at least 3 months to install, and involves expensive and imprecise manual permissions configuration. Hark! can be up and running in a matter of hours, and can do the permissions configuration for you. What differentiates Hark! (Technical)? e. Trust requires manual permissions configuration, and is difficult to master. Its architecture actually slows network traffic (because each access attempt requires the system to refer to the permissions table, which CA saves in the user mode, whereas Hark! operates solely in kernel level filter mode for real-time response) and it doesn't alert you to access violations in real-time. HARK! Competitive Overview
Company: Access 360 Product: en. Role Issue Who Are They? FACTS Fact Access 360 was founded in 1999 and has received $69 million in funding; they have 260 employees and consider themselves a resource provisioning company. The Product en. Role is a centralized resource management system that matches users with access rights, and automatically sets up accounts on a wide variety of computing systems and applications. Top Business Differentiators en. Role is complimentary to Hark! – since it is not an access control product. Access 360 is not a competitor – and they have even passed on potential access control customers to Camelot! • Coarse granularity – application/server level only Top Technological Differentiators • No real-time alerting • Communication between elements is not encrypted • No discovery algorithms HARK! Competitive Overview
Company: Access 360 Product: en. Role They Ask Who Are They? What do they have? Q/A Your Answer Could Be… Access 360 is not marketing itself as a security company. Their product doesn’t encrypt traffic. They’re not a competitor, per se. They’ve got a good system for resource provisioning – but if you want to control exactly which user accesses which resource – they’ll tell you to look elsewhere. What differentiates Hark! (Business)? en. Role is not a competing product – it’s complimentary. It’s not access control. In fact, Camelot has received access control sales referrals from Access 360 in the past. What differentiates Hark! (Technical)? en. Role is not access control. HARK! Competitive Overview
Company: BMC Product: Control-SA Issue Who Are They? The Product Top Business Differentiators FACTS Fact BMC was founded in 1980. BMC Software has $1. 7 billion in revenue and employs over 7, 000 employees in offices in 50 major markets around the globe. Control-SA is a security management product, and enables management of all enterprise security systems from a central point of control. Control-SA is not an access control product – but rather a security management product, which centralizes management of server permissions. • Not access control Top Technological Differentiators • Difficult implementation • VERY expensive – few $100 K’s • Less than 150 units sold HARK! Competitive Overview
Company: BMC Product: Control-SA They Ask Q/A Your Answer Could Be… Who Are They? BMC is a well-known software vendor. BMC is used to HUGE sales; they have not innovated beyond slow, labor-intensive implementations. What do they have? Control-SA is not an automated access control product. Control-SA uses imprecise, built-in operating system access control tools. It centralizes management – but requires labor-intensive manual definition of access permissions. What differentiates Hark! (Business)? Control-SA is not an automated access control product. It lacks Hark!’s adaptive capabilities and it can not respond to security policies in realtime. It involves tremendous cost and implementation. What differentiates Hark! (Technical)? Control-SA is not an access control product. It relies on OS-based access control permissions, and does not automatically define access rights. HARK! Competitive Overview
Company: Securant Product: Clear. Trust Issue Who Are They? FACTS Fact Founded in 1995, privately-held Securant grew from 40 to 200 employees in the last 2 years and received $31 million last year in extra funding. The Product Controls user access to web-based resources including applications, content and transactions. An enterprise access control and security management system that incorporates single sign-on, authorization, authentication and auditing capabilities. Top Business Differentiators Clear. Trust is a comprehensive tool – but still lacks Hark!s primary advantage – automation. Clear. Trust requires labor-intensive manual permission configuration. Top Technological Differentiators § No automatic permissions configuration § Poor granularity of permissions definition § No File Server protection § No alerting § Expensive – 150 K$ + $20/user § Role-based access control ONLY HARK! Competitive Overview
Company: Securant Product: Clear. Trust They Ask Q/A Your Answer Could Be… Who Are They? Clear. Trust is a solid product – and Securant already has some sales under their belt. What they don’t have is Network Intelligence. Camelot’s automated access control, based on this unique technology, makes all the difference to resource-strapped companies. What do they have? There’s really nothing that Clear. Turst can’t do for an organization. However, if you are thinking of purchasing Securant, you should ask yourself if you are willing to invest the time and manpower to configure and manage access permissions across your organization. What differentiates Hark! (Business)? Simply put, Clear. Trust can do with web servers and web applications everything that Hark! does – but it’s much more expensive, and has a serious hidden cost – resource-intensive manual access permissions configuration. Hark! lets you put your resources to better use, and that saves your organization money in the short and long term. What differentiates Hark! (Technical)? Clear. Trust focuses on access control to web servers & web applications. However, there are other – very significant – information resources in organizations. Hark! protects the heart of enterprise – your fileservers – and with the Hark! Development Kit (HDK), protects your web-based resources, too. HARK! Competitive Overview
Company: Texar Product: Secure. Realms Issue Who Are They? The Product Top Business Differentiators FACTS Fact Founded in 1998, Texar is based in Ottawa with sales offices in NC and CA. Although they doubled their size in the last year to 80, it looks like they might be looking for more financing. Secure. Realms was just released this April. Secure. Realms works by dynamically creating trusted, virtual realms - a closed community of business partners whom are given the right to selectively access information from member servers according to the policies or rules that are defined by the information owner. Texar is a young company and their technology is innovative. However, they are still in development and haven’t yet established a 24/7 support center. They also lack Hark!s primary advantage – resource-saving automation. • No redundancy – single point of failure access Top Technological Differentiators • Not all communications encrypted • Slows network traffic • No automatic permissions configuration HARK! Competitive Overview
Company: Texar Product: Secure. Realms They Ask Who Are They? What do they have? What differentiates Hark! (Business)? What differentiates Hark! (Technical)? Q/A Your Answer Could Be… Texar is an up-and-coming company with a promising product, but their technology is still in developmental stages, as is their company infrastructure. They haven’t yet established a 24/7 support center. Camelot is already well into version 1. 3 and has a two year technological advantage. Without Hark!s automatic access permissions definition, the infrastructure and experience to compete for enterprise clients, or even a secure system architecture, Secure. Realms will be long in development before it will truly compete with Hark!. Secure. Realms lacks Hark!s resource-saving automation – which means you spend more money in the short and the long term. Texar still lacks the infrastructure and experience to compete for enterprise clients. Camelot’s two year advantage means that Hark! is stable, tested and that the bugs have been worked out already. Secure. Realms technology appears compelling on paper – but there are some big security holes that are typical of beta phase products. Some of their traffic is not encrypted, they’ve got some redundancy issues, and Secure. Realms actually slows your network response speed. HARK! Competitive Overview
Other Competitors Review - I Name Primary Differentiator IBM (Tivoli) Part of a family of products - you can't just buy access control. Requires manual permissions configuration. Checkpoint Not a competitor – they don’t do access control. Cisco Protects only their own devices, requires manual permissions configuration. Symantec UNIX only. No high granularity. Requires manual permissions configuration. Netegrity Does not protect file servers - only web-based applications. Requires manual permissions configuration. Oblix Protects web servers, not file servers. No high granularity and alerting. Requires manual permissions configuration. HARK! Competitive Overview
CAMELOT Network Secure. Go Compete. HARK! Competitive Overview