Tracxn Research: Enterprise Security Landscape, August 2016
-
Upload
tracxn -
Category
Data & Analytics
-
view
500 -
download
5
Transcript of Tracxn Research: Enterprise Security Landscape, August 2016
![Page 1: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/1.jpg)
![Page 2: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/2.jpg)
Enterprise Security Report, August 2016
TracxnWorld’s Largest Startup Research Platform
2
![Page 3: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/3.jpg)
Enterprise Security Report, August 2016
Contents
Topic Page No.
Scope of Report 05
Entrepreneur Activity 07
Investment Trend 11
Who is Investing 19
Exit Outlook - IPO, Acquisitions 23
Sub Sector Analysis 30
Interesting Companies 47
Useful Links 58
Company List 60
Team 609
3
3
![Page 4: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/4.jpg)
Enterprise Security Report, August 20164
Illustrative Sectors We Track
MOBILE
EDUCATION
MOBILE COMMERCE
MOBILE PAYMENTS
MOBILE MARKETING
MOBILE DEV TOOLS
MOBILE HEALTH
MOBILE GAMING
MOBILE LEARNING
MOBILE COMMUNICATION
EDUCATION IT
SELF LEARNING
CONSUMER
HEALTHCARE
MARKETPLACES
SUBSCRIPTION COMM.
FOOD TECH
INTERNET FIRST BRANDS
UBER FOR X
SECOND HAND GOODS
TRAVEL
GAMING
LIFE SCIENCES
DIGITAL HEALTH
FINTECH
BITCOIN
PAYMENTS
SECURITY
STORAGE
NETWORKING
MOBILITY
IT OPS
CLOUD INFRASTRUCTURE
API MANAGEMENT
BIGDATA INFRASTRUCTURE
ENTERPRISEINFRASTRUCTURE
TECH
INTERNET OF THINGS
3D PRINTING
HR TECH
BUSINESS INTELLIGENCE
MOBILE-FIRST ENT. APPS
INTELLIGENT ENT. APPS
OPEN SOURCE
RETAIL TECH
MARKETING TECH
STEALTH MODE
ENTERPRISEAPPLICATIONS
![Page 5: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/5.jpg)
Enterprise Security Report, August 20165
Sector Overview
Scope of report
The report covers companies that provide cybersecurity product & services for enterprises. Companies providing exclusively
services like cybersecurity consultancy, Managed Security Service Providers (MSSP) and resellers are out of the scope. Personal
security & privacy provider and Governance, Risk & Compliance (GRC) companies are also excluded from consideration.
• Total $25.67 Billion in Funding with $20.54 Billion invested in 1020 Companies between 2008 and 2016 YTD
• Total of 422 acquisitions with 99 Acquisitions between 2015 and 2016 YTD
Most active funds (In last 50 months)
• Sequoia Capital – (FireEye, Qihoo 360, Palo Alto Networks, Okta, Barracuda Networks, SumoLogic)
• Intel Capital – (OpenPeak, ForeScout, AlienVault, Bromium, Mocana)
• Accel Partners – (Tenable Network, Lookout, Airwatch, SumoLogic, Crowdstrike, Illumio, Netskope)
The scope of this report includes equity as well as debt funding received by the companies.
![Page 6: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/6.jpg)
Enterprise Security Report, August 2016
Scope of Report
Entrepreneur Activity
Investment Trend
Who is Investing
Exit Outlook - IPO, Acquisitions
Sub Sector Analysis
Interesting Companies
Useful Links
Company List
Team
6
6
![Page 7: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/7.jpg)
Enterprise Security Report, August 2016
95
178190
229
248
195
27
0
60
120
180
240
300
2010 2011 2012 2013 2014 2015 2016
Nu
mb
er o
f C
om
pan
ies
7
YoY – Number of companies founded
Sumo Logic CrowdStrike Cylance Illumio Vera Cato Networks Deceitware
Bromium Bracket Computing Netskope Darktrace IronNet Cybersecurity Tascent DDoS Net
![Page 8: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/8.jpg)
Enterprise Security Report, August 20168
Niche Upcoming Sectors
![Page 9: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/9.jpg)
Enterprise Security Report, August 20169
Niche Upcoming Sectors
![Page 10: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/10.jpg)
Enterprise Security Report, August 2016
Scope of Report
Entrepreneur Activity
Investment Trend
Who is Investing
Exit Outlook - IPO, Acquisitions
Sub Sector Analysis
Interesting Companies
Useful Links
Company List
Team
10
10
![Page 11: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/11.jpg)
Enterprise Security Report, August 201611
YoY – Number of Rounds and Total Funding
Note: The funding includes debt rounds also.
$0.9B $0.9B
$1.2B$1.3B
$1.9B
$4.0B
$3.1B
$4.8B
$2.3B
113
130
165172
209
325
354
332
151
0
80
160
240
320
400
0
1
2
4
5
6
2008 2009 2010 2011 2012 2013 2014 2015 2016
Nu
mb
er of R
ou
nd
sFu
nd
ing
Am
ou
nt
(in
Bill
ion
s)
Funding Amount Number of Rounds
![Page 12: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/12.jpg)
Enterprise Security Report, August 201612
YoY – Number of Rounds by Stage
![Page 13: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/13.jpg)
Enterprise Security Report, August 201613
YoY – Funding by Stage
![Page 14: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/14.jpg)
Enterprise Security Report, August 201614
Average Ticket Size – Early Stage
![Page 15: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/15.jpg)
Enterprise Security Report, August 201615
Top investments in last one year
![Page 16: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/16.jpg)
Enterprise Security Report, August 201616
Top investments in last one year
![Page 17: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/17.jpg)
Enterprise Security Report, August 201617
Funnel view of Sector
![Page 18: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/18.jpg)
Enterprise Security Report, August 2016
Scope of Report
Entrepreneur Activity
Investment Trend
Who is Investing
Exit Outlook - IPO, Acquisitions
Sub Sector Analysis
Interesting Companies
Useful Links
Company List
Team
18
18
![Page 19: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/19.jpg)
Enterprise Security Report, August 201619
Most Active Investors in Sector
81
68
62
5451
47
38 38 3834
0
18
36
54
72
90
Sequoia Capital Intel Capital Accel KPCB GreylockPartners
Norwest VenturePartners
AndreessenHorowitz
BessemerVenture Partners
Venrock BenchmarkCapital
Tota
l Nu
mb
er o
f C
om
pan
ies
ServiceNow Zumigo Webroot Workspot Zenprise Workspot Pindrop Security Wandera Vontu Vontu
Skyhigh Networks SecureKey SentinelOne Shape Security Wandera Shape Security SIGNIFYD Virtru Shape Security Skybox Security
![Page 20: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/20.jpg)
Enterprise Security Report, August 201620
Where are Top Investors investing
![Page 21: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/21.jpg)
Enterprise Security Report, August 201621
Top Investor by Stage of Entry
![Page 22: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/22.jpg)
Enterprise Security Report, August 2016
Scope of Report
Entrepreneur Activity
Investment Trend
Who is Investing
Exit Outlook - IPO, Acquisitions
Sub Sector Analysis
Interesting Companies
Useful Links
Company List
Team
22
22
![Page 23: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/23.jpg)
Enterprise Security Report, August 201623
Top IPOs in last three years
IPO Date Company OverviewFunding Amount
Ticker
Apr-2016 secureworks.comSecureWorks
(Atlanta, 1999)
Cloud based SIEM solution as managed serviceNoro Moseley Partners, Frontier Capital, Navigation Capital Partners, GE Equity, Centerview Capital
$61.5MSCWX
Feb-2016 quickheal.co.inQuick Heal
(Pune, 1993)
Provider of IT security solutionsSequoia Capital, Westbridge Capital $12.8M
QUICKHEAL
Oct-2015 mimecast.comMimecast
(London, 2003)
Email security and managementInsight Venture Partners, Index Ventures, Dawn Capital $83.15M
MIME
Jun-2015 sophos.comSophos
(Abingdon, 1985)
Enterprise security suite for network, endpoint and serversTA Associates, Apax Partners
SOPH
Jun-2015 rapid7.comRapid7
(Boston, 2000)
Data analytics based threat detection and vulnerability assessmentBain Capital Ventures, TCV, Bain Capital $91M
RPD
Apr-2015 apigee.comApigee
(Palo Alto, 2004)
API Management & analytics to predict customer behaviourAccenture, Juniper Networks, Norwest Venture Partners, BlackRock, Net One Systems, Focus Ventures, Bay Partners, Wing Venture Capital, Wellington Management, Vilicus Ventures, Pine River Capital, Third Point Ventures, Sapphire Ventures
$198.18MAPIC
Mar-2015 isignthis.comISignthis
(Collingwood, 2012)
AML/KYC software for preventing Card Not Present (CNP) fraud$14.95M
ASX:ISX
Sep-2014 cyberark.comCyberArk
(Newton, 1999)
Privileged account security solutionSoftBank, Vertex Ventures Israel, Viola Group, Goldman Sachs, Viola Credit, JPMorgan Chase & Co., Jerusalem Venture Partners, Nomura Holdings, Seed Capital Partners, IDB, CrossConti, Viola Credit, Bregal Sagemount, oramapartners.com
$59MCYBR
![Page 24: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/24.jpg)
Enterprise Security Report, August 201624
Major Acquisitions (2016 YTD)
![Page 25: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/25.jpg)
Enterprise Security Report, August 201625
Major Acquisitions (2016 YTD)
![Page 26: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/26.jpg)
Enterprise Security Report, August 201626
Major Acquisitions (2016 YTD)
![Page 27: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/27.jpg)
Enterprise Security Report, August 201627
Major Acquisitions (2016 YTD)
![Page 28: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/28.jpg)
Enterprise Security Report, August 201628
Major Acquisitions (2016 YTD)
![Page 29: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/29.jpg)
Enterprise Security Report, August 2016
Scope of Report
Entrepreneur Activity
Investment Trend
Who is Investing
Exit Outlook - IPO, Acquisitions
Sub Sector Analysis
Interesting Companies
Useful Links
Company List
Team
29
29
![Page 30: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/30.jpg)
Enterprise Security Report, August 201630
August 2016Tracxn BlueBox : Enterprise Security
2205+ companies in the sector, 407 funded since 2015, $6.93B invested in 2015/16
![Page 31: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/31.jpg)
Enterprise Security Report, August 201631
Enterprise Security – Business Model Description
![Page 32: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/32.jpg)
Enterprise Security Report, August 201632
Top Business Models by Funding
$3.5B$3.3B
$2.9B$2.6B
$2.2B $2.2B
$1.8B
$1.5B$1.4B
$1.1B
0.0
0.8
1.6
2.4
3.2
4.0
Network Security
EndpointSecurity
BYODSecurity
Suite IAM SecurityAnalytics
DataSecurity
CloudSecurity
Anti Fraud ApplicationSecurity
Tota
l Fu
nd
ing
Am
ou
nt
(in
Bill
ion
s)
# Cos. 288 228 188 18 306 176 253 75 122 110
Avg. Age 2007 2006.8 2007.9 1993.3 2007.2 2008.3 2007.1 2011.1 2008.6 2008.1
Palo Alto Networks Qihoo 360 Good Technology FireEye Okta Tenable Network SafeNet Illumio LifeLock Apigee
Barracuda Tanium Lookout Symantec Ping Identity Sumo Logic Digital Guardian Netskope Pindrop Security Veracode
![Page 33: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/33.jpg)
Enterprise Security Report, August 201633
Network Security – Business Model Description
![Page 34: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/34.jpg)
Enterprise Security Report, August 201634
Network Security – Entrepreneur Activity and Investment Trend
![Page 35: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/35.jpg)
Enterprise Security Report, August 201635
Network Security – Most Funded Companies
![Page 36: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/36.jpg)
Enterprise Security Report, August 201636
Endpoint Security – Business Model Description
![Page 37: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/37.jpg)
Enterprise Security Report, August 201637
Endpoint Security – Entrepreneur Activity and Investment Trend
![Page 38: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/38.jpg)
Enterprise Security Report, August 201638
Endpoint Security – Most Funded Companies
![Page 39: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/39.jpg)
Enterprise Security Report, August 201639
BYOD Security – Business Model Description
![Page 40: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/40.jpg)
Enterprise Security Report, August 201640
BYOD Security – Entrepreneur Activity and Investment Trend
![Page 41: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/41.jpg)
Enterprise Security Report, August 201641
BYOD Security – Most Funded Companies
![Page 42: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/42.jpg)
Enterprise Security Report, August 201642
IAM – Business Model Description
![Page 43: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/43.jpg)
Enterprise Security Report, August 201643
IAM – Entrepreneur Activity and Investment Trend
![Page 44: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/44.jpg)
Enterprise Security Report, August 201644
IAM – Most Funded Companies
![Page 45: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/45.jpg)
Enterprise Security Report, August 2016
Stealth Mode Cybersecurity Startup
45
![Page 46: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/46.jpg)
Enterprise Security Report, August 2016
Scope of Report
Entrepreneur Activity
Investment Trend
Who is Investing
Exit Outlook - IPO, Acquisitions
Sub Sector Analysis
Interesting Companies
Useful Links
Company List
Team
46
46
![Page 47: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/47.jpg)
Enterprise Security Report, August 201647
Interesting Seed Companies
Curated list of companies by the sector analyst are defined as Interesting
Company Overview Business ModelTotal
Funding
smyte.comSmyte
(2014, San Francisco)
Machine learning and classification engine based fraud detectionY Combinator, Founder Collective, Harrison Metal, Baseline Ventures, Upside Partnership
Website Security > Fraud Prevention
$2.25M
blockscore.comBlockScore
(2013, Palo Alto)
Identity verification for anti-fraud and regulatory complianceY Combinator, Lightspeed Venture Partners, Khosla Ventures, Battery Ventures, New Atlantic Ventures, Boost VC, Bitcoin Opportunity Corp, Digital Currency Group
Anti Fraud > Payment Fraud $2.025M
drawbridge.ioDrawbridge Networks(2014, New York City)
Agent-based micro-segmentation for data center securityBowery Capital, Paladin Capital Group, Bloomberg Beta, Antecedent Ventures, QueensBridge Venture Partners, Primary Venture Partner
Cloud Security > Cloud Infrastructure Security
$1.7M
chainalysis.comChainalysis
(2014, Manhattan)
Blockchain based payment fraud prevention & compliance solutionsTechstars, Point Nine Capital, FundersClub, Common Angels, Barclays Accelerator, Digital Currency Group, Converge Venture
Anti Fraud > Payment Fraud $1.6M
appknox.comAppknox
(2014, Bangalore)
Automated security testing for mobile appsStart-Up Chile, Joyful Frog Digital Innovation
Application Security > Dynamic & Static Security Testing
$19.9k
![Page 48: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/48.jpg)
Enterprise Security Report, August 201648
Interesting Series A Companies
![Page 49: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/49.jpg)
Enterprise Security Report, August 201649
Interesting Series A Companies
![Page 50: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/50.jpg)
Enterprise Security Report, August 201650
Interesting Series A Companies
![Page 51: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/51.jpg)
Enterprise Security Report, August 201651
Interesting Series B Companies
![Page 52: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/52.jpg)
Enterprise Security Report, August 201652
Interesting Series B Companies
![Page 53: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/53.jpg)
Enterprise Security Report, August 201653
Interesting Late Stage Companies
![Page 54: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/54.jpg)
Enterprise Security Report, August 201654
Interesting Late Stage Companies
![Page 55: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/55.jpg)
Enterprise Security Report, August 201655
Interesting Late Stage Companies
![Page 56: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/56.jpg)
Enterprise Security Report, August 201656
Top Funded Deadpooled Companies
![Page 57: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/57.jpg)
Enterprise Security Report, August 2016
Scope of Report
Entrepreneur Activity
Investment Trend
Who is Investing
Exit Outlook - IPO, Acquisitions
Sub Sector Analysis
Interesting Companies
Useful Links
Company List
Team
57
57
![Page 58: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/58.jpg)
Enterprise Security Report, August 201658
Useful Links
Slide Title Content Platform Link
List of All Companies in readable format Companies Link
Upcoming Sectors Entrepreneur Activity Link
Niche Upcoming Sectors Entrepreneur Activity Link
Investments in last one year Investment Trend Link
Top IPOs in last three years Exit Outlook - IPO, Acquisitions Link
Major Acquisitions in last one year Exit Outlook - IPO, Acquisitions Link
Enterprise Security – Most Funded Companies Sub Sector Understand Link
Top Funded Deadpooled Companies Companies Link
![Page 59: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/59.jpg)
Enterprise Security Report, August 2016
Scope of Report
Entrepreneur Activity
Investment Trend
Who is Investing
Exit Outlook - IPO, Acquisitions
Sub Sector Analysis
Interesting Companies
Useful Links
Company List
Team
59
59
![Page 60: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/60.jpg)
Enterprise Security Report, August 201660
Enterprise Security – Company List
COVERS THE FOLLOWING SECTORS
Anti FraudApplication
SecurityBYOD
SecurityCloud
SecurityData
SecurityDatabase Security
Email Security
Endpoint Security
IAM
IndustrialSecurity
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 61: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/61.jpg)
Enterprise Security Report, August 201661
Anti Fraud (1/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
Company Details Funding Investors
Versafe [Zion, 2009]: Versafe provided anti-fraud based enterprise security solution to protect online customerfrom fraud, phishing, pharming, man-in-the-middle and malware threats across all device. Its cloud-basedservice, Versafe advanced web and mobile protection detected malware-initiated fraud and other client sideonline threats for mobile and web applications Acquired by F5 Networks in 2013 to integrate its anti-fraudtechnology.
FraudMetrix [Hangzhou, 2013]: FraudMetrix (Hangzhou Tongdun Technology) is engaged in the development ofsecurity products against internet risks and fraud. Tongdun (FraudMetrix) brings value for enterprises with dataintelligence. It covers antifraud areas including account fraud, transaction fraud, payment fraud, business fraud,internet credit fraud, and corporate internal fraud. It was founded in 2013 by a group of antifraud scientists andtechnology executives of the former Ali Group Security Department, PayPal, and RSA.
$85.3M
IDG Capital Partners, CBC Capital, China Growth Capital, Oriza Holdings,
Qiming Venture Partners, Linear Venture, China Growth Capital
Authicate [Los Angeles, 2016]: Authicate is a stealth mode cybersecurity startup which is developing two factorauthentication and 2-way push messaging based anti fraud solution. Intergrates with existing native applicationsemploying encrypted 2-way push messaging and 2FA. Currently focusing on internet retailers, banks and socialapps to deliver security for their existing native apps.
Abravant [San Francisco, 2015]: Abravant is a stealth mode cybersecurity company which is developing solutionfor security in social media. Application is under development which employs a proprietary human interactionprocessing. Claims to have team members with background at Stanford and Google.
BigID [New York City, 2015]: BigID is a cyber security company which is developing privacy managementplatform for the global enterprise. Solution will monitor the dispersed customer data adhering compliance &privacy regulations for reducing liability of enterprise from potential customer identity theft and misuse. Anearly stage Israeli-US security company to deliver privacy risk & compliance management for customer identitydata.
$2.1MGenacast Ventures, Boldstart Ventures, Deep Fork Capital
![Page 62: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/62.jpg)
Enterprise Security Report, August 201662
Anti Fraud (2/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
Company Details Funding Investors
RevReal [Beijing, 2015]: RevReal is a stealth mode security and authentication company which claims to assistChinese consumers with authenticating their purchases for ensuring products are not fake. Founder JohannesDavidsson studied Chinese in Shanghai and International Sale in Sweden. He's member of Swedish YoungProfessionals initiated under guidance of the Swedish Chamber of Commerce in China.
41st Parameter [San Jose, 2004]: 41st Parameter provides solutions for detecting and preventing fraud acrossmultiple channels for the world’s most valued and recognizable brands. Technology protects from cybercrimethreats including card not present fraud, new account origination fraud, phishing and account compromise,credit bust outs, and fraud ring attacks. Acquired by Experian in 2013.
$42.41MNorwest Venture Partners, KPCB,
Jafco Ventures, Georgian Partners, Icon Ventures
Sentrant [Fredericton, 2012]: Sentrant provides fraud detection solution to detect botnet generated traffic.Product detects fraud schemes used by botnet for generating fake traffic & clicks to skew the results of aadvertising campaign. Solution is cloud based which provides tracking & detection of fraud publishers & fraudvisitors on campaign basis. Employs dynamic behavioral signature & botnet security intelligence to protectonline advertisers' budget and their ad campaigns against fraudsters by detecting, reporting, and mitigatingnon-human users and fraudulent websites in real-time.
$500KTechnology Ventures, New Brunswick
Innovation Foundation
Threat Mark [Brno, 2015]: Threat Mark is a cybersecurity startup which delivers solution to prevent cybercrime& fraud in online environment. Developed neXtGEN security methods as Digital Identity Sensing Technology(DIST) that analyzes users transactions and active operation, browsing habits, GUI interaction, devicecharacteristics, and geolocation to ensure it matches the behavior of application legitimate users. Claims to haveapproach which is aware of device, session, user, transaction and employs big data analytics to perform signalaggregation, data comparison and anomaly detection.
![Page 63: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/63.jpg)
Enterprise Security Report, August 201663
Anti Fraud (3/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
Company Details Funding Investors
CustomerXPs [Bangalore, 2006]: CustomerXPs provides softwares and SaaS based services for enterprise fraudmanagement (EFM) and customer experience management (CEM). Solution employs real time big data, artificialintelligence and behavioral and psychology based analytics to provide tacit, actionable and conversationalinsight & direct the outcome of enhanced customer engagement and fraud-free transactions. Product Clari5EFM is an EFM solution which detects and alerts about employee fraud, transaction monitoring, SMitch, OnlineBanking fraud and card fraud using neural networks, time series & complex analytics. Clari5 CEM is CEM solutionto provide personalized & contextual interactions with customers in real time and include modules like Needanalysis, Seeker, Right sell, Direct channel booster, branch booster, Smart teller, iRM (integrated RelationshipManager) and paperless branch banking. Solution is focused at customers in financial services, e-commerce,retail and telecom industry. Named as Cool Vendor in Marketing by Gartner 2012 and part Of MicrosoftVentures Summer 2015 Batch under Scale Up Accelerator Program.
$4M JAFCO Asia
Sentropi [Ahmedabad, 2012]: Sentropi provides online identification and fraud detection and preventionsolutions using device fingerprinting technology and tagging methods. Software analyses parameters regardingthe visitor’s browser, OS and hardware configuration in order to create a unique identity that can be tracked todetect account takeover and fraudulent logins. Other products include Sentropi3D to automate over-the-phoneautomated 3rd step authentication process for online ordering, SentroPay to automate online payment via anautomated outbound IVR pay-over-the phone payment solution and Sentropi 360 to detect fraud in organizatonoperating in card-not-present environments.. Listed as fast track TLV finalist by StartupbootCamp.
$40K Start-Up Chile
Easy Solutions [Doral, 2007]: Easy Solutions Total Fraud Protection platform provides detection and preventionof electronic fraud across all devices, channels and clouds. Provides products for Fraud intelligence and securebrowsing, Anomaly Transaction Detection, Anti-phishing, Anti-pharming, Man-in-the-middle and man-in-the-browser protection, client-less malware detection, Mobile Fraud Protection and Multifactor/MultichannelAuthentication like cloud, email, strong& mobile. Awarded with Silver (Email Security and Management) andTotal Fraud Protection Platform, its flagship multi-layered prevention and detection solution, won a BronzeAward (Fraud Prevention) at Global Excellence Award, 2015
$14.2MMedina Capital, Promotora de
Proyectos
![Page 64: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/64.jpg)
Enterprise Security Report, August 201664
Anti Fraud (4/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 65: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/65.jpg)
Enterprise Security Report, August 201665
Anti Fraud (5/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 66: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/66.jpg)
Enterprise Security Report, August 201666
Anti Fraud (6/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 67: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/67.jpg)
Enterprise Security Report, August 201667
Anti Fraud (7/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 68: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/68.jpg)
Enterprise Security Report, August 201668
Anti Fraud (8/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 69: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/69.jpg)
Enterprise Security Report, August 201669
Anti Fraud (9/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 70: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/70.jpg)
Enterprise Security Report, August 201670
Anti Fraud (10/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 71: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/71.jpg)
Enterprise Security Report, August 201671
Anti Fraud (11/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 72: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/72.jpg)
Enterprise Security Report, August 201672
Anti Fraud (12/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 73: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/73.jpg)
Enterprise Security Report, August 201673
Anti Fraud (13/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 74: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/74.jpg)
Enterprise Security Report, August 201674
Anti Fraud (14/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 75: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/75.jpg)
Enterprise Security Report, August 201675
Anti Fraud (15/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 76: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/76.jpg)
Enterprise Security Report, August 201676
Anti Fraud (16/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 77: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/77.jpg)
Enterprise Security Report, August 201677
Anti Fraud (17/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 78: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/78.jpg)
Enterprise Security Report, August 201678
Anti Fraud (18/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 79: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/79.jpg)
Enterprise Security Report, August 201679
Anti Fraud (19/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 80: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/80.jpg)
Enterprise Security Report, August 201680
Anti Fraud (20/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 81: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/81.jpg)
Enterprise Security Report, August 201681
Anti Fraud (21/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 82: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/82.jpg)
Enterprise Security Report, August 201682
Anti Fraud (22/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 83: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/83.jpg)
Enterprise Security Report, August 201683
Anti Fraud (23/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 84: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/84.jpg)
Enterprise Security Report, August 201684
Anti Fraud (24/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 85: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/85.jpg)
Enterprise Security Report, August 201685
Anti Fraud (25/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 86: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/86.jpg)
Enterprise Security Report, August 201686
Anti Fraud (26/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 87: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/87.jpg)
Enterprise Security Report, August 201687
Anti Fraud (27/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 88: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/88.jpg)
Enterprise Security Report, August 201688
Anti Fraud (28/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 89: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/89.jpg)
Enterprise Security Report, August 201689
Anti Fraud (29/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 90: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/90.jpg)
Enterprise Security Report, August 201690
Anti Fraud (30/30)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 91: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/91.jpg)
Enterprise Security Report, August 201691
Application Security (1/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 92: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/92.jpg)
Enterprise Security Report, August 201692
Application Security (2/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 93: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/93.jpg)
Enterprise Security Report, August 201693
Application Security (3/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 94: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/94.jpg)
Enterprise Security Report, August 201694
Application Security (4/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 95: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/95.jpg)
Enterprise Security Report, August 201695
Application Security (5/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 96: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/96.jpg)
Enterprise Security Report, August 201696
Application Security (6/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 97: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/97.jpg)
Enterprise Security Report, August 201697
Application Security (7/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 98: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/98.jpg)
Enterprise Security Report, August 201698
Application Security (8/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 99: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/99.jpg)
Enterprise Security Report, August 201699
Application Security (9/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 100: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/100.jpg)
Enterprise Security Report, August 2016100
Application Security (10/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 101: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/101.jpg)
Enterprise Security Report, August 2016101
Application Security (11/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 102: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/102.jpg)
Enterprise Security Report, August 2016102
Application Security (12/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 103: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/103.jpg)
Enterprise Security Report, August 2016103
Application Security (13/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 104: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/104.jpg)
Enterprise Security Report, August 2016104
Application Security (14/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 105: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/105.jpg)
Enterprise Security Report, August 2016105
Application Security (15/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 106: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/106.jpg)
Enterprise Security Report, August 2016106
Application Security (16/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 107: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/107.jpg)
Enterprise Security Report, August 2016107
Application Security (17/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 108: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/108.jpg)
Enterprise Security Report, August 2016108
Application Security (18/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 109: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/109.jpg)
Enterprise Security Report, August 2016109
Application Security (19/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 110: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/110.jpg)
Enterprise Security Report, August 2016110
Application Security (20/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 111: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/111.jpg)
Enterprise Security Report, August 2016111
Application Security (21/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 112: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/112.jpg)
Enterprise Security Report, August 2016112
Application Security (22/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 113: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/113.jpg)
Enterprise Security Report, August 2016113
Application Security (23/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 114: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/114.jpg)
Enterprise Security Report, August 2016114
Application Security (24/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 115: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/115.jpg)
Enterprise Security Report, August 2016115
Application Security (25/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 116: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/116.jpg)
Enterprise Security Report, August 2016116
Application Security (26/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 117: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/117.jpg)
Enterprise Security Report, August 2016117
Application Security (27/27)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 118: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/118.jpg)
Enterprise Security Report, August 2016118
BYOD Security (1/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 119: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/119.jpg)
Enterprise Security Report, August 2016119
BYOD Security (2/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 120: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/120.jpg)
Enterprise Security Report, August 2016120
BYOD Security (3/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 121: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/121.jpg)
Enterprise Security Report, August 2016121
BYOD Security (4/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 122: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/122.jpg)
Enterprise Security Report, August 2016122
BYOD Security (5/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 123: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/123.jpg)
Enterprise Security Report, August 2016123
BYOD Security (6/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 124: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/124.jpg)
Enterprise Security Report, August 2016124
BYOD Security (7/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 125: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/125.jpg)
Enterprise Security Report, August 2016125
BYOD Security (8/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 126: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/126.jpg)
Enterprise Security Report, August 2016126
BYOD Security (9/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 127: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/127.jpg)
Enterprise Security Report, August 2016127
BYOD Security (10/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 128: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/128.jpg)
Enterprise Security Report, August 2016128
BYOD Security (11/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 129: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/129.jpg)
Enterprise Security Report, August 2016129
BYOD Security (12/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 130: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/130.jpg)
Enterprise Security Report, August 2016130
BYOD Security (13/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 131: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/131.jpg)
Enterprise Security Report, August 2016131
BYOD Security (14/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 132: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/132.jpg)
Enterprise Security Report, August 2016132
BYOD Security (15/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 133: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/133.jpg)
Enterprise Security Report, August 2016133
BYOD Security (16/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 134: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/134.jpg)
Enterprise Security Report, August 2016134
BYOD Security (17/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 135: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/135.jpg)
Enterprise Security Report, August 2016135
BYOD Security (18/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 136: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/136.jpg)
Enterprise Security Report, August 2016136
BYOD Security (19/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 137: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/137.jpg)
Enterprise Security Report, August 2016137
BYOD Security (20/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 138: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/138.jpg)
Enterprise Security Report, August 2016138
BYOD Security (21/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 139: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/139.jpg)
Enterprise Security Report, August 2016139
BYOD Security (22/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 140: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/140.jpg)
Enterprise Security Report, August 2016140
BYOD Security (23/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 141: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/141.jpg)
Enterprise Security Report, August 2016141
BYOD Security (24/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 142: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/142.jpg)
Enterprise Security Report, August 2016142
BYOD Security (25/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 143: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/143.jpg)
Enterprise Security Report, August 2016143
BYOD Security (26/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 144: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/144.jpg)
Enterprise Security Report, August 2016144
BYOD Security (27/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 145: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/145.jpg)
Enterprise Security Report, August 2016145
BYOD Security (28/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 146: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/146.jpg)
Enterprise Security Report, August 2016146
BYOD Security (29/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 147: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/147.jpg)
Enterprise Security Report, August 2016147
BYOD Security (30/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 148: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/148.jpg)
Enterprise Security Report, August 2016148
BYOD Security (31/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 149: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/149.jpg)
Enterprise Security Report, August 2016149
BYOD Security (32/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 150: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/150.jpg)
Enterprise Security Report, August 2016150
BYOD Security (33/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 151: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/151.jpg)
Enterprise Security Report, August 2016151
BYOD Security (34/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 152: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/152.jpg)
Enterprise Security Report, August 2016152
BYOD Security (35/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 153: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/153.jpg)
Enterprise Security Report, August 2016153
BYOD Security (36/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 154: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/154.jpg)
Enterprise Security Report, August 2016154
BYOD Security (37/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 155: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/155.jpg)
Enterprise Security Report, August 2016155
BYOD Security (38/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 156: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/156.jpg)
Enterprise Security Report, August 2016156
BYOD Security (39/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 157: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/157.jpg)
Enterprise Security Report, August 2016157
BYOD Security (40/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 158: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/158.jpg)
Enterprise Security Report, August 2016158
BYOD Security (41/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 159: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/159.jpg)
Enterprise Security Report, August 2016159
BYOD Security (42/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 160: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/160.jpg)
Enterprise Security Report, August 2016160
BYOD Security (43/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 161: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/161.jpg)
Enterprise Security Report, August 2016161
BYOD Security (44/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 162: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/162.jpg)
Enterprise Security Report, August 2016162
BYOD Security (45/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 163: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/163.jpg)
Enterprise Security Report, August 2016163
BYOD Security (46/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 164: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/164.jpg)
Enterprise Security Report, August 2016164
BYOD Security (47/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 165: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/165.jpg)
Enterprise Security Report, August 2016165
BYOD Security (48/48)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 166: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/166.jpg)
Enterprise Security Report, August 2016166
Cloud Security (1/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 167: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/167.jpg)
Enterprise Security Report, August 2016167
Cloud Security (2/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 168: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/168.jpg)
Enterprise Security Report, August 2016168
Cloud Security (3/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 169: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/169.jpg)
Enterprise Security Report, August 2016169
Cloud Security (4/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 170: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/170.jpg)
Enterprise Security Report, August 2016170
Cloud Security (5/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 171: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/171.jpg)
Enterprise Security Report, August 2016171
Cloud Security (6/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 172: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/172.jpg)
Enterprise Security Report, August 2016172
Cloud Security (7/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 173: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/173.jpg)
Enterprise Security Report, August 2016173
Cloud Security (8/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 174: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/174.jpg)
Enterprise Security Report, August 2016174
Cloud Security (9/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 175: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/175.jpg)
Enterprise Security Report, August 2016175
Cloud Security (10/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 176: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/176.jpg)
Enterprise Security Report, August 2016176
Cloud Security (11/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 177: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/177.jpg)
Enterprise Security Report, August 2016177
Cloud Security (12/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 178: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/178.jpg)
Enterprise Security Report, August 2016178
Cloud Security (13/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 179: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/179.jpg)
Enterprise Security Report, August 2016179
Cloud Security (14/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 180: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/180.jpg)
Enterprise Security Report, August 2016180
Cloud Security (15/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 181: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/181.jpg)
Enterprise Security Report, August 2016181
Cloud Security (16/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 182: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/182.jpg)
Enterprise Security Report, August 2016182
Cloud Security (17/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 183: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/183.jpg)
Enterprise Security Report, August 2016183
Cloud Security (18/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 184: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/184.jpg)
Enterprise Security Report, August 2016184
Cloud Security (19/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 185: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/185.jpg)
Enterprise Security Report, August 2016185
Cloud Security (20/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 186: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/186.jpg)
Enterprise Security Report, August 2016186
Data Security (1/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 187: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/187.jpg)
Enterprise Security Report, August 2016187
Data Security (2/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 188: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/188.jpg)
Enterprise Security Report, August 2016188
Data Security (3/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 189: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/189.jpg)
Enterprise Security Report, August 2016189
Data Security (4/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 190: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/190.jpg)
Enterprise Security Report, August 2016190
Data Security (5/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 191: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/191.jpg)
Enterprise Security Report, August 2016191
Data Security (6/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 192: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/192.jpg)
Enterprise Security Report, August 2016192
Data Security (7/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 193: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/193.jpg)
Enterprise Security Report, August 2016193
Data Security (8/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 194: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/194.jpg)
Enterprise Security Report, August 2016194
Data Security (9/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 195: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/195.jpg)
Enterprise Security Report, August 2016195
Data Security (10/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 196: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/196.jpg)
Enterprise Security Report, August 2016196
Data Security (11/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 197: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/197.jpg)
Enterprise Security Report, August 2016197
Data Security (12/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 198: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/198.jpg)
Enterprise Security Report, August 2016198
Data Security (13/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 199: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/199.jpg)
Enterprise Security Report, August 2016199
Data Security (14/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 200: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/200.jpg)
Enterprise Security Report, August 2016200
Data Security (15/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 201: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/201.jpg)
Enterprise Security Report, August 2016201
Data Security (16/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 202: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/202.jpg)
Enterprise Security Report, August 2016202
Data Security (17/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 203: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/203.jpg)
Enterprise Security Report, August 2016203
Data Security (18/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 204: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/204.jpg)
Enterprise Security Report, August 2016204
Data Security (19/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 205: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/205.jpg)
Enterprise Security Report, August 2016205
Data Security (20/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 206: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/206.jpg)
Enterprise Security Report, August 2016206
Data Security (21/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 207: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/207.jpg)
Enterprise Security Report, August 2016207
Data Security (22/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 208: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/208.jpg)
Enterprise Security Report, August 2016208
Data Security (23/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 209: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/209.jpg)
Enterprise Security Report, August 2016209
Data Security (24/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 210: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/210.jpg)
Enterprise Security Report, August 2016210
Data Security (25/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 211: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/211.jpg)
Enterprise Security Report, August 2016211
Data Security (26/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 212: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/212.jpg)
Enterprise Security Report, August 2016212
Data Security (27/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 213: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/213.jpg)
Enterprise Security Report, August 2016213
Data Security (28/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 214: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/214.jpg)
Enterprise Security Report, August 2016214
Data Security (29/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 215: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/215.jpg)
Enterprise Security Report, August 2016215
Data Security (30/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 216: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/216.jpg)
Enterprise Security Report, August 2016216
Data Security (31/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 217: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/217.jpg)
Enterprise Security Report, August 2016217
Data Security (32/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 218: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/218.jpg)
Enterprise Security Report, August 2016218
Data Security (33/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 219: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/219.jpg)
Enterprise Security Report, August 2016219
Data Security (34/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 220: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/220.jpg)
Enterprise Security Report, August 2016220
Data Security (35/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 221: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/221.jpg)
Enterprise Security Report, August 2016221
Data Security (36/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 222: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/222.jpg)
Enterprise Security Report, August 2016222
Data Security (37/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 223: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/223.jpg)
Enterprise Security Report, August 2016223
Data Security (38/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 224: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/224.jpg)
Enterprise Security Report, August 2016224
Data Security (39/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 225: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/225.jpg)
Enterprise Security Report, August 2016225
Data Security (40/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 226: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/226.jpg)
Enterprise Security Report, August 2016226
Data Security (41/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 227: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/227.jpg)
Enterprise Security Report, August 2016227
Data Security (42/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 228: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/228.jpg)
Enterprise Security Report, August 2016228
Data Security (43/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 229: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/229.jpg)
Enterprise Security Report, August 2016229
Data Security (44/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 230: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/230.jpg)
Enterprise Security Report, August 2016230
Data Security (45/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 231: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/231.jpg)
Enterprise Security Report, August 2016231
Data Security (46/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 232: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/232.jpg)
Enterprise Security Report, August 2016232
Data Security (47/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 233: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/233.jpg)
Enterprise Security Report, August 2016233
Data Security (48/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 234: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/234.jpg)
Enterprise Security Report, August 2016234
Data Security (49/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 235: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/235.jpg)
Enterprise Security Report, August 2016235
Data Security (50/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 236: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/236.jpg)
Enterprise Security Report, August 2016236
Data Security (51/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 237: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/237.jpg)
Enterprise Security Report, August 2016237
Data Security (52/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 238: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/238.jpg)
Enterprise Security Report, August 2016238
Data Security (53/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 239: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/239.jpg)
Enterprise Security Report, August 2016239
Data Security (54/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 240: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/240.jpg)
Enterprise Security Report, August 2016240
Data Security (55/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 241: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/241.jpg)
Enterprise Security Report, August 2016241
Data Security (56/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 242: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/242.jpg)
Enterprise Security Report, August 2016242
Data Security (57/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 243: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/243.jpg)
Enterprise Security Report, August 2016243
Data Security (58/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 244: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/244.jpg)
Enterprise Security Report, August 2016244
Data Security (59/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 245: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/245.jpg)
Enterprise Security Report, August 2016245
Data Security (60/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 246: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/246.jpg)
Enterprise Security Report, August 2016246
Data Security (61/61)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 247: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/247.jpg)
Enterprise Security Report, August 2016247
Database Security (1/4)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 248: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/248.jpg)
Enterprise Security Report, August 2016248
Database Security (2/4)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 249: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/249.jpg)
Enterprise Security Report, August 2016249
Database Security (3/4)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 250: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/250.jpg)
Enterprise Security Report, August 2016250
Database Security (4/4)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 251: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/251.jpg)
Enterprise Security Report, August 2016251
Email Security (1/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 252: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/252.jpg)
Enterprise Security Report, August 2016252
Email Security (2/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 253: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/253.jpg)
Enterprise Security Report, August 2016253
Email Security (3/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 254: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/254.jpg)
Enterprise Security Report, August 2016254
Email Security (4/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 255: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/255.jpg)
Enterprise Security Report, August 2016255
Email Security (5/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 256: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/256.jpg)
Enterprise Security Report, August 2016256
Email Security (6/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 257: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/257.jpg)
Enterprise Security Report, August 2016257
Email Security (7/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 258: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/258.jpg)
Enterprise Security Report, August 2016258
Email Security (8/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 259: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/259.jpg)
Enterprise Security Report, August 2016259
Email Security (9/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 260: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/260.jpg)
Enterprise Security Report, August 2016260
Email Security (10/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 261: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/261.jpg)
Enterprise Security Report, August 2016261
Email Security (11/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 262: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/262.jpg)
Enterprise Security Report, August 2016262
Email Security (12/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 263: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/263.jpg)
Enterprise Security Report, August 2016263
Email Security (13/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 264: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/264.jpg)
Enterprise Security Report, August 2016264
Email Security (14/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 265: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/265.jpg)
Enterprise Security Report, August 2016265
Email Security (15/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 266: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/266.jpg)
Enterprise Security Report, August 2016266
Email Security (16/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 267: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/267.jpg)
Enterprise Security Report, August 2016267
Email Security (17/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 268: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/268.jpg)
Enterprise Security Report, August 2016268
Email Security (18/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 269: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/269.jpg)
Enterprise Security Report, August 2016269
Email Security (19/19)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 270: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/270.jpg)
Enterprise Security Report, August 2016270
Endpoint Security (1/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 271: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/271.jpg)
Enterprise Security Report, August 2016271
Endpoint Security (2/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 272: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/272.jpg)
Enterprise Security Report, August 2016272
Endpoint Security (3/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 273: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/273.jpg)
Enterprise Security Report, August 2016273
Endpoint Security (4/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 274: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/274.jpg)
Enterprise Security Report, August 2016274
Endpoint Security (5/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 275: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/275.jpg)
Enterprise Security Report, August 2016275
Endpoint Security (6/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 276: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/276.jpg)
Enterprise Security Report, August 2016276
Endpoint Security (7/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 277: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/277.jpg)
Enterprise Security Report, August 2016277
Endpoint Security (8/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 278: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/278.jpg)
Enterprise Security Report, August 2016278
Endpoint Security (9/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 279: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/279.jpg)
Enterprise Security Report, August 2016279
Endpoint Security (10/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 280: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/280.jpg)
Enterprise Security Report, August 2016280
Endpoint Security (11/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 281: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/281.jpg)
Enterprise Security Report, August 2016281
Endpoint Security (12/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 282: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/282.jpg)
Enterprise Security Report, August 2016282
Endpoint Security (13/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 283: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/283.jpg)
Enterprise Security Report, August 2016283
Endpoint Security (14/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 284: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/284.jpg)
Enterprise Security Report, August 2016284
Endpoint Security (15/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 285: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/285.jpg)
Enterprise Security Report, August 2016285
Endpoint Security (16/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 286: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/286.jpg)
Enterprise Security Report, August 2016286
Endpoint Security (17/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 287: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/287.jpg)
Enterprise Security Report, August 2016287
Endpoint Security (18/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 288: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/288.jpg)
Enterprise Security Report, August 2016288
Endpoint Security (19/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 289: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/289.jpg)
Enterprise Security Report, August 2016289
Endpoint Security (20/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 290: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/290.jpg)
Enterprise Security Report, August 2016290
Endpoint Security (21/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 291: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/291.jpg)
Enterprise Security Report, August 2016291
Endpoint Security (22/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 292: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/292.jpg)
Enterprise Security Report, August 2016292
Endpoint Security (23/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 293: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/293.jpg)
Enterprise Security Report, August 2016293
Endpoint Security (24/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 294: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/294.jpg)
Enterprise Security Report, August 2016294
Endpoint Security (25/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 295: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/295.jpg)
Enterprise Security Report, August 2016295
Endpoint Security (26/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 296: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/296.jpg)
Enterprise Security Report, August 2016296
Endpoint Security (27/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 297: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/297.jpg)
Enterprise Security Report, August 2016297
Endpoint Security (28/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 298: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/298.jpg)
Enterprise Security Report, August 2016298
Endpoint Security (29/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 299: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/299.jpg)
Enterprise Security Report, August 2016299
Endpoint Security (30/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 300: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/300.jpg)
Enterprise Security Report, August 2016300
Endpoint Security (31/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 301: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/301.jpg)
Enterprise Security Report, August 2016301
Endpoint Security (32/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 302: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/302.jpg)
Enterprise Security Report, August 2016302
Endpoint Security (33/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 303: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/303.jpg)
Enterprise Security Report, August 2016303
Endpoint Security (34/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 304: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/304.jpg)
Enterprise Security Report, August 2016304
Endpoint Security (35/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 305: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/305.jpg)
Enterprise Security Report, August 2016305
Endpoint Security (36/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 306: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/306.jpg)
Enterprise Security Report, August 2016306
Endpoint Security (37/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 307: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/307.jpg)
Enterprise Security Report, August 2016307
Endpoint Security (38/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 308: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/308.jpg)
Enterprise Security Report, August 2016308
Endpoint Security (39/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 309: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/309.jpg)
Enterprise Security Report, August 2016309
Endpoint Security (40/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 310: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/310.jpg)
Enterprise Security Report, August 2016310
Endpoint Security (41/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 311: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/311.jpg)
Enterprise Security Report, August 2016311
Endpoint Security (42/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 312: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/312.jpg)
Enterprise Security Report, August 2016312
Endpoint Security (43/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 313: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/313.jpg)
Enterprise Security Report, August 2016313
Endpoint Security (44/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 314: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/314.jpg)
Enterprise Security Report, August 2016314
Endpoint Security (45/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 315: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/315.jpg)
Enterprise Security Report, August 2016315
Endpoint Security (46/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 316: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/316.jpg)
Enterprise Security Report, August 2016316
Endpoint Security (47/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 317: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/317.jpg)
Enterprise Security Report, August 2016317
Endpoint Security (48/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 318: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/318.jpg)
Enterprise Security Report, August 2016318
Endpoint Security (49/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 319: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/319.jpg)
Enterprise Security Report, August 2016319
Endpoint Security (50/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 320: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/320.jpg)
Enterprise Security Report, August 2016320
Endpoint Security (51/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 321: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/321.jpg)
Enterprise Security Report, August 2016321
Endpoint Security (52/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 322: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/322.jpg)
Enterprise Security Report, August 2016322
Endpoint Security (53/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 323: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/323.jpg)
Enterprise Security Report, August 2016323
Endpoint Security (54/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 324: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/324.jpg)
Enterprise Security Report, August 2016324
Endpoint Security (55/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 325: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/325.jpg)
Enterprise Security Report, August 2016325
Endpoint Security (56/56)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 326: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/326.jpg)
Enterprise Security Report, August 2016326
IAM (1/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 327: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/327.jpg)
Enterprise Security Report, August 2016327
IAM (2/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 328: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/328.jpg)
Enterprise Security Report, August 2016328
IAM (3/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 329: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/329.jpg)
Enterprise Security Report, August 2016329
IAM (4/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 330: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/330.jpg)
Enterprise Security Report, August 2016330
IAM (5/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 331: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/331.jpg)
Enterprise Security Report, August 2016331
IAM (6/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 332: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/332.jpg)
Enterprise Security Report, August 2016332
IAM (7/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 333: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/333.jpg)
Enterprise Security Report, August 2016333
IAM (8/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 334: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/334.jpg)
Enterprise Security Report, August 2016334
IAM (9/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 335: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/335.jpg)
Enterprise Security Report, August 2016335
IAM (10/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 336: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/336.jpg)
Enterprise Security Report, August 2016336
IAM (11/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 337: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/337.jpg)
Enterprise Security Report, August 2016337
IAM (12/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 338: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/338.jpg)
Enterprise Security Report, August 2016338
IAM (13/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 339: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/339.jpg)
Enterprise Security Report, August 2016339
IAM (14/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 340: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/340.jpg)
Enterprise Security Report, August 2016340
IAM (15/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 341: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/341.jpg)
Enterprise Security Report, August 2016341
IAM (16/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 342: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/342.jpg)
Enterprise Security Report, August 2016342
IAM (17/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 343: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/343.jpg)
Enterprise Security Report, August 2016343
IAM (18/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 344: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/344.jpg)
Enterprise Security Report, August 2016344
IAM (19/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 345: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/345.jpg)
Enterprise Security Report, August 2016345
IAM (20/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 346: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/346.jpg)
Enterprise Security Report, August 2016346
IAM (21/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 347: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/347.jpg)
Enterprise Security Report, August 2016347
IAM (22/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 348: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/348.jpg)
Enterprise Security Report, August 2016348
IAM (23/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 349: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/349.jpg)
Enterprise Security Report, August 2016349
IAM (24/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 350: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/350.jpg)
Enterprise Security Report, August 2016350
IAM (25/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 351: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/351.jpg)
Enterprise Security Report, August 2016351
IAM (26/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 352: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/352.jpg)
Enterprise Security Report, August 2016352
IAM (27/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 353: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/353.jpg)
Enterprise Security Report, August 2016353
IAM (28/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 354: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/354.jpg)
Enterprise Security Report, August 2016354
IAM (29/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 355: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/355.jpg)
Enterprise Security Report, August 2016355
IAM (30/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 356: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/356.jpg)
Enterprise Security Report, August 2016356
IAM (31/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 357: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/357.jpg)
Enterprise Security Report, August 2016357
IAM (32/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 358: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/358.jpg)
Enterprise Security Report, August 2016358
IAM (33/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 359: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/359.jpg)
Enterprise Security Report, August 2016359
IAM (34/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 360: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/360.jpg)
Enterprise Security Report, August 2016360
IAM (35/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 361: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/361.jpg)
Enterprise Security Report, August 2016361
IAM (36/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 362: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/362.jpg)
Enterprise Security Report, August 2016362
IAM (37/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 363: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/363.jpg)
Enterprise Security Report, August 2016363
IAM (38/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 364: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/364.jpg)
Enterprise Security Report, August 2016364
IAM (39/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 365: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/365.jpg)
Enterprise Security Report, August 2016365
IAM (40/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 366: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/366.jpg)
Enterprise Security Report, August 2016366
IAM (41/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 367: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/367.jpg)
Enterprise Security Report, August 2016367
IAM (42/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 368: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/368.jpg)
Enterprise Security Report, August 2016368
IAM (43/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 369: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/369.jpg)
Enterprise Security Report, August 2016369
IAM (44/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 370: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/370.jpg)
Enterprise Security Report, August 2016370
IAM (45/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 371: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/371.jpg)
Enterprise Security Report, August 2016371
IAM (46/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 372: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/372.jpg)
Enterprise Security Report, August 2016372
IAM (47/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 373: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/373.jpg)
Enterprise Security Report, August 2016373
IAM (48/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 374: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/374.jpg)
Enterprise Security Report, August 2016374
IAM (49/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 375: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/375.jpg)
Enterprise Security Report, August 2016375
IAM (50/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 376: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/376.jpg)
Enterprise Security Report, August 2016376
IAM (51/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 377: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/377.jpg)
Enterprise Security Report, August 2016377
IAM (52/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 378: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/378.jpg)
Enterprise Security Report, August 2016378
IAM (53/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 379: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/379.jpg)
Enterprise Security Report, August 2016379
IAM (54/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 380: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/380.jpg)
Enterprise Security Report, August 2016380
IAM (55/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 381: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/381.jpg)
Enterprise Security Report, August 2016381
IAM (56/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 382: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/382.jpg)
Enterprise Security Report, August 2016382
IAM (57/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 383: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/383.jpg)
Enterprise Security Report, August 2016383
IAM (58/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 384: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/384.jpg)
Enterprise Security Report, August 2016384
IAM (59/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 385: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/385.jpg)
Enterprise Security Report, August 2016385
IAM (60/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 386: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/386.jpg)
Enterprise Security Report, August 2016386
IAM (61/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 387: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/387.jpg)
Enterprise Security Report, August 2016387
IAM (62/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 388: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/388.jpg)
Enterprise Security Report, August 2016388
IAM (63/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 389: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/389.jpg)
Enterprise Security Report, August 2016389
IAM (64/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 390: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/390.jpg)
Enterprise Security Report, August 2016390
IAM (65/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 391: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/391.jpg)
Enterprise Security Report, August 2016391
IAM (66/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 392: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/392.jpg)
Enterprise Security Report, August 2016392
IAM (67/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 393: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/393.jpg)
Enterprise Security Report, August 2016393
IAM (68/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 394: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/394.jpg)
Enterprise Security Report, August 2016394
IAM (69/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 395: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/395.jpg)
Enterprise Security Report, August 2016395
IAM (70/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 396: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/396.jpg)
Enterprise Security Report, August 2016396
IAM (71/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 397: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/397.jpg)
Enterprise Security Report, August 2016397
IAM (72/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 398: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/398.jpg)
Enterprise Security Report, August 2016398
IAM (73/73)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 399: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/399.jpg)
Enterprise Security Report, August 2016399
Industrial Security (1/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 400: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/400.jpg)
Enterprise Security Report, August 2016400
Industrial Security (2/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 401: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/401.jpg)
Enterprise Security Report, August 2016401
Industrial Security (3/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 402: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/402.jpg)
Enterprise Security Report, August 2016402
Industrial Security (4/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 403: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/403.jpg)
Enterprise Security Report, August 2016403
Industrial Security (5/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 404: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/404.jpg)
Enterprise Security Report, August 2016404
Industrial Security (6/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 405: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/405.jpg)
Enterprise Security Report, August 2016405
Industrial Security (7/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 406: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/406.jpg)
Enterprise Security Report, August 2016406
Industrial Security (8/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 407: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/407.jpg)
Enterprise Security Report, August 2016407
Industrial Security (9/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 408: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/408.jpg)
Enterprise Security Report, August 2016408
Industrial Security (10/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 409: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/409.jpg)
Enterprise Security Report, August 2016409
Industrial Security (11/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 410: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/410.jpg)
Enterprise Security Report, August 2016410
Industrial Security (12/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 411: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/411.jpg)
Enterprise Security Report, August 2016411
IoT Security (1/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 412: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/412.jpg)
Enterprise Security Report, August 2016412
IoT Security (2/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 413: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/413.jpg)
Enterprise Security Report, August 2016413
IoT Security (3/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 414: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/414.jpg)
Enterprise Security Report, August 2016414
IoT Security (4/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 415: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/415.jpg)
Enterprise Security Report, August 2016415
IoT Security (5/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 416: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/416.jpg)
Enterprise Security Report, August 2016416
IoT Security (6/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 417: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/417.jpg)
Enterprise Security Report, August 2016417
IoT Security (7/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 418: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/418.jpg)
Enterprise Security Report, August 2016418
IoT Security (8/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 419: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/419.jpg)
Enterprise Security Report, August 2016419
IoT Security (9/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 420: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/420.jpg)
Enterprise Security Report, August 2016420
IoT Security (10/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 421: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/421.jpg)
Enterprise Security Report, August 2016421
IoT Security (11/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 422: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/422.jpg)
Enterprise Security Report, August 2016422
IoT Security (12/12)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 423: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/423.jpg)
Enterprise Security Report, August 2016423
Network Security (1/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 424: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/424.jpg)
Enterprise Security Report, August 2016424
Network Security (2/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 425: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/425.jpg)
Enterprise Security Report, August 2016425
Network Security (3/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 426: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/426.jpg)
Enterprise Security Report, August 2016426
Network Security (4/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 427: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/427.jpg)
Enterprise Security Report, August 2016427
Network Security (5/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 428: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/428.jpg)
Enterprise Security Report, August 2016428
Network Security (6/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 429: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/429.jpg)
Enterprise Security Report, August 2016429
Network Security (7/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 430: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/430.jpg)
Enterprise Security Report, August 2016430
Network Security (8/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 431: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/431.jpg)
Enterprise Security Report, August 2016431
Network Security (9/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 432: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/432.jpg)
Enterprise Security Report, August 2016432
Network Security (10/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 433: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/433.jpg)
Enterprise Security Report, August 2016433
Network Security (11/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 434: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/434.jpg)
Enterprise Security Report, August 2016434
Network Security (12/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 435: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/435.jpg)
Enterprise Security Report, August 2016435
Network Security (13/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 436: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/436.jpg)
Enterprise Security Report, August 2016436
Network Security (14/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 437: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/437.jpg)
Enterprise Security Report, August 2016437
Network Security (15/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 438: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/438.jpg)
Enterprise Security Report, August 2016438
Network Security (16/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 439: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/439.jpg)
Enterprise Security Report, August 2016439
Network Security (17/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 440: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/440.jpg)
Enterprise Security Report, August 2016440
Network Security (18/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 441: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/441.jpg)
Enterprise Security Report, August 2016441
Network Security (19/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 442: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/442.jpg)
Enterprise Security Report, August 2016442
Network Security (20/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 443: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/443.jpg)
Enterprise Security Report, August 2016443
Network Security (21/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 444: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/444.jpg)
Enterprise Security Report, August 2016444
Network Security (22/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 445: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/445.jpg)
Enterprise Security Report, August 2016445
Network Security (23/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 446: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/446.jpg)
Enterprise Security Report, August 2016446
Network Security (24/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 447: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/447.jpg)
Enterprise Security Report, August 2016447
Network Security (25/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 448: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/448.jpg)
Enterprise Security Report, August 2016448
Network Security (26/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 449: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/449.jpg)
Enterprise Security Report, August 2016449
Network Security (27/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 450: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/450.jpg)
Enterprise Security Report, August 2016450
Network Security (28/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 451: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/451.jpg)
Enterprise Security Report, August 2016451
Network Security (29/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 452: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/452.jpg)
Enterprise Security Report, August 2016452
Network Security (30/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 453: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/453.jpg)
Enterprise Security Report, August 2016453
Network Security (31/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 454: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/454.jpg)
Enterprise Security Report, August 2016454
Network Security (32/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 455: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/455.jpg)
Enterprise Security Report, August 2016455
Network Security (33/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 456: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/456.jpg)
Enterprise Security Report, August 2016456
Network Security (34/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 457: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/457.jpg)
Enterprise Security Report, August 2016457
Network Security (35/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 458: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/458.jpg)
Enterprise Security Report, August 2016458
Network Security (36/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 459: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/459.jpg)
Enterprise Security Report, August 2016459
Network Security (37/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 460: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/460.jpg)
Enterprise Security Report, August 2016460
Network Security (38/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 461: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/461.jpg)
Enterprise Security Report, August 2016461
Network Security (39/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 462: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/462.jpg)
Enterprise Security Report, August 2016462
Network Security (40/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 463: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/463.jpg)
Enterprise Security Report, August 2016463
Network Security (41/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 464: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/464.jpg)
Enterprise Security Report, August 2016464
Network Security (42/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 465: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/465.jpg)
Enterprise Security Report, August 2016465
Network Security (43/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 466: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/466.jpg)
Enterprise Security Report, August 2016466
Network Security (44/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 467: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/467.jpg)
Enterprise Security Report, August 2016467
Network Security (45/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 468: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/468.jpg)
Enterprise Security Report, August 2016468
Network Security (46/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 469: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/469.jpg)
Enterprise Security Report, August 2016469
Network Security (47/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 470: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/470.jpg)
Enterprise Security Report, August 2016470
Network Security (48/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 471: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/471.jpg)
Enterprise Security Report, August 2016471
Network Security (49/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 472: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/472.jpg)
Enterprise Security Report, August 2016472
Network Security (50/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 473: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/473.jpg)
Enterprise Security Report, August 2016473
Network Security (51/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 474: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/474.jpg)
Enterprise Security Report, August 2016474
Network Security (52/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 475: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/475.jpg)
Enterprise Security Report, August 2016475
Network Security (53/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 476: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/476.jpg)
Enterprise Security Report, August 2016476
Network Security (54/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 477: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/477.jpg)
Enterprise Security Report, August 2016477
Network Security (55/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 478: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/478.jpg)
Enterprise Security Report, August 2016478
Network Security (56/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 479: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/479.jpg)
Enterprise Security Report, August 2016479
Network Security (57/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 480: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/480.jpg)
Enterprise Security Report, August 2016480
Network Security (58/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 481: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/481.jpg)
Enterprise Security Report, August 2016481
Network Security (59/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 482: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/482.jpg)
Enterprise Security Report, August 2016482
Network Security (60/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 483: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/483.jpg)
Enterprise Security Report, August 2016483
Network Security (61/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 484: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/484.jpg)
Enterprise Security Report, August 2016484
Network Security (62/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 485: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/485.jpg)
Enterprise Security Report, August 2016485
Network Security (63/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 486: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/486.jpg)
Enterprise Security Report, August 2016486
Network Security (64/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 487: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/487.jpg)
Enterprise Security Report, August 2016487
Network Security (65/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 488: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/488.jpg)
Enterprise Security Report, August 2016488
Network Security (66/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 489: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/489.jpg)
Enterprise Security Report, August 2016489
Network Security (67/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 490: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/490.jpg)
Enterprise Security Report, August 2016490
Network Security (68/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 491: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/491.jpg)
Enterprise Security Report, August 2016491
Network Security (69/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 492: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/492.jpg)
Enterprise Security Report, August 2016492
Network Security (70/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 493: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/493.jpg)
Enterprise Security Report, August 2016493
Network Security (71/71)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 494: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/494.jpg)
Enterprise Security Report, August 2016494
Security Analytics (1/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 495: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/495.jpg)
Enterprise Security Report, August 2016495
Security Analytics (2/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 496: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/496.jpg)
Enterprise Security Report, August 2016496
Security Analytics (3/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 497: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/497.jpg)
Enterprise Security Report, August 2016497
Security Analytics (4/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 498: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/498.jpg)
Enterprise Security Report, August 2016498
Security Analytics (5/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 499: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/499.jpg)
Enterprise Security Report, August 2016499
Security Analytics (6/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 500: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/500.jpg)
Enterprise Security Report, August 2016500
Security Analytics (7/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 501: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/501.jpg)
Enterprise Security Report, August 2016501
Security Analytics (8/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 502: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/502.jpg)
Enterprise Security Report, August 2016502
Security Analytics (9/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 503: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/503.jpg)
Enterprise Security Report, August 2016503
Security Analytics (10/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 504: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/504.jpg)
Enterprise Security Report, August 2016504
Security Analytics (11/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 505: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/505.jpg)
Enterprise Security Report, August 2016505
Security Analytics (12/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 506: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/506.jpg)
Enterprise Security Report, August 2016506
Security Analytics (13/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 507: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/507.jpg)
Enterprise Security Report, August 2016507
Security Analytics (14/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 508: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/508.jpg)
Enterprise Security Report, August 2016508
Security Analytics (15/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 509: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/509.jpg)
Enterprise Security Report, August 2016509
Security Analytics (16/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 510: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/510.jpg)
Enterprise Security Report, August 2016510
Security Analytics (17/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 511: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/511.jpg)
Enterprise Security Report, August 2016511
Security Analytics (18/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 512: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/512.jpg)
Enterprise Security Report, August 2016512
Security Analytics (19/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 513: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/513.jpg)
Enterprise Security Report, August 2016513
Security Analytics (20/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 514: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/514.jpg)
Enterprise Security Report, August 2016514
Security Analytics (21/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 515: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/515.jpg)
Enterprise Security Report, August 2016515
Security Analytics (22/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 516: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/516.jpg)
Enterprise Security Report, August 2016516
Security Analytics (23/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 517: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/517.jpg)
Enterprise Security Report, August 2016517
Security Analytics (24/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 518: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/518.jpg)
Enterprise Security Report, August 2016518
Security Analytics (25/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 519: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/519.jpg)
Enterprise Security Report, August 2016519
Security Analytics (26/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 520: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/520.jpg)
Enterprise Security Report, August 2016520
Security Analytics (27/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 521: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/521.jpg)
Enterprise Security Report, August 2016521
Security Analytics (28/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 522: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/522.jpg)
Enterprise Security Report, August 2016522
Security Analytics (29/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 523: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/523.jpg)
Enterprise Security Report, August 2016523
Security Analytics (30/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 524: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/524.jpg)
Enterprise Security Report, August 2016524
Security Analytics (31/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 525: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/525.jpg)
Enterprise Security Report, August 2016525
Security Analytics (32/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 526: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/526.jpg)
Enterprise Security Report, August 2016526
Security Analytics (33/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 527: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/527.jpg)
Enterprise Security Report, August 2016527
Security Analytics (34/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 528: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/528.jpg)
Enterprise Security Report, August 2016528
Security Analytics (35/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 529: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/529.jpg)
Enterprise Security Report, August 2016529
Security Analytics (36/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 530: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/530.jpg)
Enterprise Security Report, August 2016530
Security Analytics (37/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 531: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/531.jpg)
Enterprise Security Report, August 2016531
Security Analytics (38/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 532: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/532.jpg)
Enterprise Security Report, August 2016532
Security Analytics (39/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 533: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/533.jpg)
Enterprise Security Report, August 2016533
Security Analytics (40/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 534: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/534.jpg)
Enterprise Security Report, August 2016534
Security Analytics (41/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 535: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/535.jpg)
Enterprise Security Report, August 2016535
Security Analytics (42/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 536: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/536.jpg)
Enterprise Security Report, August 2016536
Security Analytics (43/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 537: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/537.jpg)
Enterprise Security Report, August 2016537
Security Analytics (44/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 538: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/538.jpg)
Enterprise Security Report, August 2016538
Security Analytics (45/45)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 539: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/539.jpg)
Enterprise Security Report, August 2016539
Server Security (1/5)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 540: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/540.jpg)
Enterprise Security Report, August 2016540
Server Security (2/5)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 541: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/541.jpg)
Enterprise Security Report, August 2016541
Server Security (3/5)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 542: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/542.jpg)
Enterprise Security Report, August 2016542
Server Security (4/5)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 543: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/543.jpg)
Enterprise Security Report, August 2016543
Server Security (5/5)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 544: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/544.jpg)
Enterprise Security Report, August 2016544
Suite (1/5)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 545: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/545.jpg)
Enterprise Security Report, August 2016545
Suite (2/5)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 546: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/546.jpg)
Enterprise Security Report, August 2016546
Suite (3/5)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 547: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/547.jpg)
Enterprise Security Report, August 2016547
Suite (4/5)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 548: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/548.jpg)
Enterprise Security Report, August 2016548
Suite (5/5)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 549: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/549.jpg)
Enterprise Security Report, August 2016549
Threat Intelligence (1/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 550: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/550.jpg)
Enterprise Security Report, August 2016550
Threat Intelligence (2/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 551: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/551.jpg)
Enterprise Security Report, August 2016551
Threat Intelligence (3/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 552: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/552.jpg)
Enterprise Security Report, August 2016552
Threat Intelligence (4/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 553: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/553.jpg)
Enterprise Security Report, August 2016553
Threat Intelligence (5/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 554: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/554.jpg)
Enterprise Security Report, August 2016554
Threat Intelligence (6/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 555: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/555.jpg)
Enterprise Security Report, August 2016555
Threat Intelligence (7/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 556: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/556.jpg)
Enterprise Security Report, August 2016556
Threat Intelligence (8/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 557: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/557.jpg)
Enterprise Security Report, August 2016557
Threat Intelligence (9/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 558: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/558.jpg)
Enterprise Security Report, August 2016558
Threat Intelligence (10/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 559: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/559.jpg)
Enterprise Security Report, August 2016559
Threat Intelligence (11/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 560: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/560.jpg)
Enterprise Security Report, August 2016560
Threat Intelligence (12/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 561: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/561.jpg)
Enterprise Security Report, August 2016561
Threat Intelligence (13/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 562: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/562.jpg)
Enterprise Security Report, August 2016562
Threat Intelligence (14/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 563: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/563.jpg)
Enterprise Security Report, August 2016563
Threat Intelligence (15/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 564: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/564.jpg)
Enterprise Security Report, August 2016564
Threat Intelligence (16/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 565: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/565.jpg)
Enterprise Security Report, August 2016565
Threat Intelligence (17/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 566: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/566.jpg)
Enterprise Security Report, August 2016566
Threat Intelligence (18/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 567: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/567.jpg)
Enterprise Security Report, August 2016567
Threat Intelligence (19/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 568: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/568.jpg)
Enterprise Security Report, August 2016568
Threat Intelligence (20/20)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 569: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/569.jpg)
Enterprise Security Report, August 2016569
Website Security (1/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 570: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/570.jpg)
Enterprise Security Report, August 2016570
Website Security (2/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 571: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/571.jpg)
Enterprise Security Report, August 2016571
Website Security (3/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 572: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/572.jpg)
Enterprise Security Report, August 2016572
Website Security (4/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 573: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/573.jpg)
Enterprise Security Report, August 2016573
Website Security (5/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 574: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/574.jpg)
Enterprise Security Report, August 2016574
Website Security (6/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 575: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/575.jpg)
Enterprise Security Report, August 2016575
Website Security (7/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 576: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/576.jpg)
Enterprise Security Report, August 2016576
Website Security (8/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 577: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/577.jpg)
Enterprise Security Report, August 2016577
Website Security (9/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 578: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/578.jpg)
Enterprise Security Report, August 2016578
Website Security (10/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 579: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/579.jpg)
Enterprise Security Report, August 2016579
Website Security (11/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 580: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/580.jpg)
Enterprise Security Report, August 2016580
Website Security (12/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 581: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/581.jpg)
Enterprise Security Report, August 2016581
Website Security (13/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 582: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/582.jpg)
Enterprise Security Report, August 2016582
Website Security (14/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 583: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/583.jpg)
Enterprise Security Report, August 2016583
Website Security (15/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 584: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/584.jpg)
Enterprise Security Report, August 2016584
Website Security (16/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 585: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/585.jpg)
Enterprise Security Report, August 2016585
Website Security (17/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 586: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/586.jpg)
Enterprise Security Report, August 2016586
Website Security (18/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 587: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/587.jpg)
Enterprise Security Report, August 2016587
Website Security (19/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 588: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/588.jpg)
Enterprise Security Report, August 2016588
Website Security (20/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 589: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/589.jpg)
Enterprise Security Report, August 2016589
Website Security (21/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 590: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/590.jpg)
Enterprise Security Report, August 2016590
Website Security (22/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 591: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/591.jpg)
Enterprise Security Report, August 2016591
Website Security (23/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 592: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/592.jpg)
Enterprise Security Report, August 2016592
Website Security (24/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 593: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/593.jpg)
Enterprise Security Report, August 2016593
Website Security (25/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 594: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/594.jpg)
Enterprise Security Report, August 2016594
Website Security (26/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 595: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/595.jpg)
Enterprise Security Report, August 2016595
Website Security (27/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 596: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/596.jpg)
Enterprise Security Report, August 2016596
Website Security (28/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 597: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/597.jpg)
Enterprise Security Report, August 2016597
Website Security (29/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 598: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/598.jpg)
Enterprise Security Report, August 2016598
Website Security (30/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 599: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/599.jpg)
Enterprise Security Report, August 2016599
Website Security (31/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 600: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/600.jpg)
Enterprise Security Report, August 2016600
Website Security (32/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 601: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/601.jpg)
Enterprise Security Report, August 2016601
Website Security (33/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 602: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/602.jpg)
Enterprise Security Report, August 2016602
Website Security (34/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 603: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/603.jpg)
Enterprise Security Report, August 2016603
Website Security (35/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 604: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/604.jpg)
Enterprise Security Report, August 2016604
Website Security (36/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 605: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/605.jpg)
Enterprise Security Report, August 2016605
Website Security (37/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 606: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/606.jpg)
Enterprise Security Report, August 2016606
Website Security (38/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 607: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/607.jpg)
Enterprise Security Report, August 2016607
Website Security (39/39)
Anti Fraud
Application Security
BYOD Security
Cloud Security
Data SecurityDatabase Security
Email Security
Endpoint Security
IAMIndustrial Security
IoT SecurityNetwork Security
Security Analytics
Server Security
SuiteThreat
IntelligenceWebsite Security
![Page 608: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/608.jpg)
Enterprise Security Report, August 2016
Scope of Report
Entrepreneur Activity
Investment Trend
Who is Investing
Exit Outlook - IPO, Acquisitions
Sub Sector Analysis
Interesting Companies
Useful Links
Company List
Team
608
608
![Page 609: Tracxn Research: Enterprise Security Landscape, August 2016](https://reader030.fdocuments.us/reader030/viewer/2022013013/5879159f1a28abf13a8b4871/html5/thumbnails/609.jpg)
Enterprise Security Report, August 2016609
Team
Shubham Anand
Analyst, Enterprise Security
Chaitanya Karthik Vellanki
Lead Analyst, Enterprise Infrastructure