Hype Cycle for Infrastructure Protection, 2008


Analyst(s): | | | | | | | | | | | | | |

Purchase this Document

Price: $1,995.00 USD (PAGES: 32)

To purchase this document, you will need to register or sign in above.


The safeguards available for protecting our networks and endpoints have seen significant shifts in 2007 and 2008, including the convergence of safeguards at the endpoint, the progress of "in the cloud" protection and an overall failure to meet the growing threat of arbitrary malware.

Table of Contents

  • Analysis
    • What You Need to Know
    • The Hype Cycle
    • The Priority Matrix
    • On the Rise
      • Botnet Detection
      • Penetration Testing Tools
      • Identity-Aware Networks
    • At the Peak
      • Virtualization Security
      • Security in the Switch
      • Security Switch
      • 'In the Cloud' Security Services
      • Quality-of-Service Threat Throttling
      • Database Activity Monitoring (DAM)
    • Sliding Into the Trough
      • SMB Multifunction Firewall (formerly Multifunction Security Appliances)
      • Static Application Security Testing
      • Endpoint Protection Platform
      • Network Access Control
      • Network Security Silicon
      • Handheld Device Antivirus
      • HIPS on PCs
      • Network IDS
      • XML Firewalls
      • Dynamic Application Security Testing
      • WLAN IPS
    • Climbing the Slope
      • Next-Generation Firewalls
      • Secure Web Gateway
      • SIEM
      • Web Application Firewall
      • Network IPS
      • DDOS Defense (formerly Distributed Denial of Service)
      • E-Mail Security Boundary
      • HIPS on Servers
    • Entering the Plateau
      • Network Vulnerability Scanning
      • Stateful Firewalls
    • Appendixes
      • Hype Cycle Phases, Benefit Ratings and Maturity Levels
  • Recommended Reading
© 2008 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartners research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

Not a Gartner Client?

Want more research like this?
Learn the benefits of becoming a Gartner client.

Contact us online





Why Gartner

Gartner delivers the technology-related insight you need to make the right decisions, every day.

Find out more