Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against...

26
Cyber Security Solutions & Services Germany 2019/2020 June 2019 Quadrant Report A research report comparing provider strengths, challenges and competitive differentiators

Transcript of Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against...

Page 1: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

Cyber Security Solutions & ServicesGermany 2019/2020

June 2019

QuadrantReport

A research report comparing provider strengths, challenges and competitive differentiators

Page 2: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

Section Name

© 2019 Information Services Group, Inc. All Rights Reserved.

22

ISG Provider Lens™ delivers leading-edge and actionable research studies, reports

and consulting services focused on technology and service providers’ strengths and

weaknesses and how they are positioned relative to their peers in the market. These

reports provide influential insights accessed by our large pool of advisors who are

actively advising outsourcing deals as well as large numbers of ISG enterprise clients

who are potential outsourcers.

For more information about our studies, please email [email protected],

call +49 (0) 561-50697537, or visit ISG Provider Lens™ under ISG Provider Lens™.

ISG Research™ provides subscription research, advisory consulting and executive

event services focused on market trends and disruptive technologies driving change

in business computing. ISG Research™ delivers guidance that helps businesses

accelerate growth and create more value.

For more information about ISG Research™ subscriptions, please email [email protected], call +49 (0) 561-50697537 or visit research.isg-one.com.

Information Services Group, Inc. is solely responsible for the content of this report.

Unless otherwise cited, all content, including illustrations, research, conclusions,

assertions and positions contained in this report were developed by and are the sole

property of Information Services Group, Inc.

The research and analysis presented in this report includes research from the ISG

Provider Lens™ program, ongoing ISG Research programs, interviews with ISG advisors,

briefings with services providers and analysis of publicly available market information

from multiple sources. The data collected for this report represents information that

was current as of March, 2019. ISG recognizes that many mergers and acquisitions have

taken place since that time but those changes are not reflected in this report.

The author of this report is Frank Heuer.

About this Report

ISG Provider Lens™ Quadrant Report | June 2019

Page 3: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

1 Executive Summary

3 Introduction

15 Identity & Access Management

24 Data Leakage/Loss Prevention (DLP), Data Security

37 Network Security

47 Cloud/Datacenter Security

61 Security Services – Midmarket

70 Security Services – Large Accounts

83 Methodology

© 2019 Information Services Group, Inc. All rights reserved. Reproduction of this publication in any form without prior permission is strictly prohibited. Information contained in this report is based on the best available and reliable resources. Opinions expressed in this report reflect ISG’s judgment at the time of this report and are subject to change without notice. ISG has no liability for omissions, errors or completeness of information in this report. ISG Research™ and ISG Provider Lens™ are trademarks of Information Services Group, Inc.

Page 4: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

Section Name

© 2019 Information Services Group, Inc. All Rights Reserved.

1111

ISG Provider Lens™ Quadrant Report | June 2019

The providers of security solutions and services have increasingly adapted to this

situation with their portfolios. In addition to solutions from a single source, they also offer

increasingly extensive cloud services and managed security services to allow customers

to conserve capital reserves whilst benefiting from the latest security expertise without

having to build them up themselves.

Identity & Access Management (IAM) has experienced a “renaissance” in recent

years. After a period of average demand IAM has risen to the top of the security agenda.

Going forward, it will become a critical capability. An important reason for this is that the

increasing digitalization of all sectors contributes to the fact that not only users and their

identities must be protected, but also machines and other corporate assets (keyword:

Industry 4.0). Going forward, securing identity will be the basis for ensuring digital systems

and networking among each other in general. In addition, the number of users, devices

and services is constantly increasing, as well as the number of digital identities to be

managed.

This is becoming the first imperative in times of permanent threat to data by cyber attacks.

Providers of IAM solutions promise to ensure an effective and efficient control of

identity management. Digital identities are the key to data, devices and services; hence,

these must be specially secured.

EXECUTIVE SUMMARYCyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT) and Industry 4.0 (I4.0)

initiatives, business processes are increasingly shifting towards IT. The security of IT and

communication systems is becoming increasingly important as a means to protect overall

corporate resources. Thus, IT security is transformed into corporate security.

However, threats to IT security also pose a potential threat to the company's existence. Data

and IT infrastructures are exposed to more sophisticated and constantly changing criminal

threats and daily attacks. In addition, there are dangers due to negligence of end users. In

addition to the company's own protection, there is increasing regulation forcing measures

against cyber attacks. In Europe and Germany, the General Data Protection Regulation that

came into force in May 2018 is currently the most prominent example. Its implementation is

still a major challenge for many companies.

Cyber Security and the protection of information and communication systems is therefore

an increasingly important task. Still, IT managers often find it difficult to get security

investments approved by management, in particular by the CFO, often the first person who

holds them accountable.

The ROI for investments in security is difficult to prove as for other IT projects. Alongside

limited financial means, a shortage of skilled workers Not only the financial means are

often limited, the shortage of skilled workers is becoming increasingly noticeable.

Executive Summary

Page 5: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

22

ISG Provider Lens™ Quadrant Report | Juni 2019

22

© 2019 Information Services Group, Inc. All Rights Reserved.

ISG Provider Lens™ Quadrant Report | June 2019 Executive Summary

The increasing interest in DLP (Data-Leakage-/Loss-Prevention-) solutions is due to

various factors affecting the security of data in the company. The increasing business

use of private terminal devices is a challenge with regard to protecting against undesired

data flows. These clients often defy the configuration and control by the operational

administration and may not be monitored operationally for reasons such as legal

complications (data protection) in some cases. DLP solutions must take such restrictions

into account without allowing operational vulnerabilities. With looming sanctions against

the breach of GDPR regulation, the importance of data protection - and solutions including

DLP - has become critical.

The network security service providers must adapt to new forms of cyber attacks.

In the past, it was assumed that attackers could be excluded from the company’s own

network; the starting point of all considerations is now the assumption that the attacker

operates from within the network. This fundamentally changes network security

requirements.

The GDPR also impacts cloud/data center security. Violations that result in the loss of

personal data are subject to draconian punishments.

For security - in particular against this background - compliance guidelines must be

monitored and adhered to. These claims can only be met by robust security systems. The

solutions of cloud/data center security service providers must comprehensively monitor

physical and virtual infrastructure environments in the cloud and in their own data center,

automatically detect attacks in real time, block them and log them using a tamper-proof

method.

Security services attract increasing interest among SMEs. The shortage of IT security

specialists is affecting medium-sized companies in particular. In the competition for

specialists and talents, they often lose out to the larger companies. This strongly increases

the demand for external IT security services, in particular in this target group. In particular

the demand for cloud services, managed security services and offers from a single source

increase significantly. This enables service providers with a broad portfolio of services for

numerous different issues to position themselves successfully in particular in this market.

In order to succeed in the demanding security services market for large customers,

service providers must be able to demonstrate extensive, international experience

in this market segment with a broad range of solutions. Efficient, often internationally

represented teams must be available for support. In view of the increasingly intensive and

sophisticated cyberattacks that are directed at well-known large companies,

Managed security services are also moving more and more into the focus of large

customers. Less qualified resources, the increasing frequency of incidents and the need

for always up-to-date specialist knowledge promote the demand for these services.

Page 6: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

33

Definition This study examines five issues in the market for cyber security in six chapters.

The main difference between the issues examined in this study is the

differentiation of security solutions und security services.

In this study, Security solutions comprise hardware, software and cloud

services from product providers. The considered issues are Identity & Access

Management, Data Leakage/Loss Prevention, network security and cloud-/data

center security.

Security services are services relating to security solutions. This category

also comprises cloud services from service providers who are not

product providers. Due to the heterogeneity of the target groups and the

corresponding markets, security services are considered with regard to

user companies with 50 to 4,999 employees (“midmarket” or “SME”) and

user companies with more than 5,000 employees (“large accounts” or “large

companies”).

Simplified illustration

Cyber Security Solutions & Services

Security Solution

Identity & Access Management Data Leakage/Loss Prevention (DLP), Data Security

Network Security Cloud/Datacenter Security

Security Services

Midmarket Large Accounts

Source: ISG 2019

ISG Provider Lens™ Quadrant Report | June 2019

Einleitung

Introduction

Page 7: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

44

Definition

Identity & Access Management

Identity & Access Management (IAM) solutions are used to collect, record and manage

user identities and the associated access rights. These ensure that access rights are

granted according to the defined guidelines. In order to deal with existing and new

requirements from the application world, security providers are increasingly required

to incorporate mechanisms, frameworks and automation, e.g. of risk assessment into

their management suites that are able to carry out user and attack profiling in real time.

Influence of Social Media and mobile users necessitates further requirements to cover

the security needs of customers than was previously the case with web and context-

related authorization management. This category also comprises cloud services from

product providers.

ISG Provider Lens™ Quadrant Report | June 2019

Scope of the Report

Data Leakage/Loss Prevention (DLP), Data Security

By DLP (Data Leakage Prevention oder auch Data Loss Prevention), we refer to products that

identify and monitor sensitive data to ensure that it is only accessible to authorized users and no

data leaks occur. DLP products are becoming increasingly important, since companies are finding

it increasingly difficult to control data movement and data transfer. The number of (mobile)

terminal devices in the companies on which data can be stored is growing. These terminal

devices usually have a separate connection to the Internet, so that data can be sent and received

without using the central Internet gateway. In addition, the terminal devices have a large number

of interfaces (such as USB, Bluetooth, WLAN, NFC), via which data can also be exchanged. This

category also includes cloud services from product providers.

Introduction

Page 8: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

55

ISG Provider Lens™ Quadrant Report | June 2019

Network Security

Currently, dangers threaten the corporate network in different ways. These include:

� unauthorized accesses to computers by outsiders,

� attacks intended to bring the services of the target company to their

knees (DoS / DDoS),

� dangers that can result from the careless behavior of own employees,

� “profitable targets”, the attackers work with great effort and increasing sophistication,

penetrating deep into the network infrastructure and spying out sensitive data

unnoticed over a longer period of time as part of these cyber attacks (Advanced

Persistent Threats).

The task of network security products is to counter these dangers. In this study, network

security includes the protection of physical network structures, including wireless LANs.

This category also comprises cloud services from providers.

Cloud/Datacenter Security

By cloud/data center security ISG refers to products to protect against attacks or threats to the IT

infrastructure - regardless of whether it is installed in the cloud (private, public, hybrid or multi-

cloud) or on-premise. This category also comprises cloud services from product providers.

Security Services

Security services comprise services for security solutions. Services include consulting, training,

integration, maintenance, support or managed security services. By managed security services,

we refer to operation and management of an IT security infrastructure for one or more customers

through a Security Operations Center. The target group of midmarket (SME) includes companies

with minimum 50, but less than 5,000 employees. The target group large accounts (large

companies) comprises companies with a minimum 5,000 employees. The following consideration

in this chapter deals with services that do not concern exclusively a service provider's own

products. This category also comprises cloud services from service providers who source the

solutions from third parties.

Definition

Introduction

Page 9: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

66

ISG Provider Lens™ Quadrant Report | June 2019

The ISG Provider Lens™ quadrants were created using an evaluation matrix containing four segments, where the providers are positioned accordingly.

Leader

The “leaders” among the vendors/

providers have a highly attractive

product and service offering and a

very strong market and competitive

position; they fulfill all requirements

for successful market cultivation.

They can be regarded as opinion

leaders, providing strategic

impulses to the market. They also

ensure innovative strength

and stability.

Product Challenger

The “product challengers” offer a

product and service portfolio that

provides an above-average cover-

age of corporate requirements, but

are not able to provide the same

resources and strengths as the

leaders regarding the individual

market cultivation categories. Often,

this is due to the respective vendor’s

size or their weak footprint within

the respective target segment.

Market Challenger

“Market challengers” are also

very competitive, but there is still

significant portfolio potential and

they clearly lag behind the “leaders.”

Often, the market challengers

are established vendors that

are somewhat slow to address

new trends, due to their size and

company structure, and have

therefore still some potential to

optimize their portfolio and increase

their attractiveness.

Contender

“Contenders” are still lacking mature

products and services or sufficient

depth and breadth of their offering,

while also showing some strengths

and improvement potentials in their

market cultivation efforts. These

vendors are often generalists or

niche players.

Provider Classifications

Introduction

Page 10: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

77

Introduction

Rising Star

Rising stars are mostly product challengers with high future potential. When receiving the “rising stars” award, such companies have a promis-ing portfolio, including the required roadmap and an adequate focus on key market trends and customer requirements. Also, the “rising stars” has an excellent management and understanding of the local market. This award is only given to vendors or service providers that have made extreme progress towards their goals within the last 12 months and are on a good way to reach the leader quadrant within the next 12-24 months, due to their above-average impact and innovative strength.

Each ISG Provider Lens™ quadrant may include a service provider(s) who ISG believes has a strong potential to move into the leader’s quadrant.

Provider Classifications (cont.)

Not In

This service provider or vendor was not included in this quadrant as ISG could not obtain enough information to position them. This omission does not imply that the service provider or vendor does not provide this service.

ISG Provider Lens™ Quadrant Report | June 2019

Page 11: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

Cyber Security Solutions & Services Quadrants

Page 12: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

1515

ISG Provider Lens™ Quadrant Report | June 2019

SOCIAL ENTERPRISE NET-WORKING SUITES

DefinitionIdentity & Access Management (IAM) products are used to collect, record and manage user identities and the associated access rights. These ensure that access rights are granted according to the defined guidelines. In order to deal with existing and new requirements from the application world, security providers are increasingly required to incorporate mechanisms, frameworks and automation, e.g. of risk assessment into their management suites that are able to carry out user and attack profiling in real time. Influence of Social Media and mobile users necessitates further requirements to cover the security needs of customers than was previously the case with web and context-related authorization management. This category also comprises cloud services from product providers.

IDENTITY & ACCESS MANAGEMENT

Managed Services for Midmarket

Page 13: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

2424

SOCIAL ENTERPRISE NET-WORKING SUITES

DefinitionDLP (Data Leakage Prevention or Data Loss Prevention) refers to

products that identify and monitor sensitive data to enforce access

by authorized users only, thus preventing data leaks. DLP solutions

are becoming increasingly important, since companies are finding it

increasingly difficult to control data movement and transfer. The number

of (mobile) terminal devices on which data can be stored is growing.

These terminal devices usually have a separate connection to the

Internet, so that data can be sent and received without using the central

Internet gateway. In addition, the terminal devices have large number of

interfaces (such as USB, Bluetooth, WLAN, NFC), via which data can also

be exchanged. This category includes cloud services from DLP solution

providers.

DATA LEAKAGE/LOSS PREVENTION (DLP), DATA SECURITY

Managed Services for Large AccountsISG Provider Lens™ Quadrant Report | June 2019

Page 14: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

2525

The following criteria were taken into account for assessing solution

providers for DLP in Germany:

� Scope and functionality of the DLP solution

� Choice of DLP delivery models, e.g. on-premise, private cloud, public

cloud, hybrid cloud

� Scope of additional features with the DLP solution

� Performance of the DLP solution; the level of automation and - related

to this - the use of artificial intelligence

� Market presence in Germany: Number of customers, partner network,

awareness, etc.

� Innovations and portfolio roadmap of the DLP solution set

The increasing interest in DLP solutions is due to various factors that affect the security of data in the

company. The increasing business use of private end user devices provides a challenge for preventing

undesired data flows. These clients often defy the configuration and control by the operational administra-

tion and may not be comprehensively monitored. One of the reasons for the lack of control is regulatory

requirements relating to end user privacy. DLP solutions must account for these restrictions in the control

without allowing operational vulnerabilities. With the sanctions of the General Data Protection Regulation

applicable since the end of May 2018, the importance of data protection - and thus also of DLP solutions -

has increased.

In addition to the diversification of mobile devices, IT trends including big data, social business and

cloud computing add to the complexity for controlling data movements and lead to highrequirements

for DLP solutions. The enormously growing data volume demands efficient DLP solutions, which quickly

detect, classify and protect data from unauthorized actions such as copying or moving according to their

protection needs. Cloud storage solutions and cloud apps can cause data to leave the corporate network

unintentionally during processing. There is also the danger that operational data may be transferred to

private cloud storage services. Social networks and other social media platforms open up new communi-

cation channels through which data can flow, in addition to the risks of data transfer via e-mail.

Eligibility Criteria Observations

DATA LEAKAGE/LOSS PREVENTION (DLP), DATA SECURITY

Data Leakage/Loss Prevention (DLP), Data SecurityISG Provider Lens™ Quadrant Report | June 2019

Page 15: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

3737

SOCIAL ENTERPRISE NET-WORKING SUITES

DefinitionCurrently, corporate network are threatened in different ways. In

addition to unauthorized accesses to computers by outsiders, threats

include attacks intended to bring the services of the target company to

their knees (DoS/ DDoS), but also the dangers that can result from the

careless behavior of own employees. In the event of “profitable targets”,

the attackers work with great effort and increasing sophistication,

penetrating deep into the network infrastructure and spying out

sensitive data unnoticed over a longer period of time as part of these

cyber attacks (Advanced Persistent Threats).

The task of network security products is to counter these dangers. In

this study, network security includes the protection of physical network

structures and mobile extensions including wireless LANs. This category

also comprises cloud solutions from providers.

NETWORK SECURITY

Managed Container as a ServiceISG Provider Lens™ Quadrant Report | June 2019

Page 16: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

4747

SOCIAL ENTERPRISE NET-WORKING SUITES

DefinitionBy cloud/data center security ISG refers to solutions designed to protect

against attacks or threats to the IT infrastructure - regardless of whether

it is installed in the cloud (private, public, hybrid or multi-cloud) or

on-premise.

CLOUD/DATACENTER SECURITY

Managed Hosting for MidmarketISG Provider Lens™ Quadrant Report | June 2019

Page 17: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

6161

SOCIAL ENTERPRISE NET-WORKING SUITES

DefinitionSecurity Services include consulting, training, integration, maintenance,

support or managed security services. Managed security services refer

to operation and management of an IT security infrastructure for one or

more customers through a Security Operations Center. The target group

of midmarket (SME) includes companies with minimum 50, but less

than 5,000 employees. This category also comprises cloud services from

service providers who are not equipment vendors.

SECURITY SERVICES – MIDMARKET

Managed Hosting for Large AccountsISG Provider Lens™ Quadrant Report | June 2019

Page 18: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

6262

The following criteria were taken into account for rating the security

provider for medium-sized companies:

� Scope of service portfolio

� Location of cloud data centers in Germany and the European Union

and international presence

� Locations of Security Operations Centers in Germany and the

European Union and international presence

� Size of cyber security team

� Market presence in Germany: Branches, number of customers,

awareness etc.

� Partnerships with technology service providers#

� Innovations and portfolio roadmap with regard to the security

service range

The shortage of IT security specialists has a strong affect on medium-sized companies. In the

competition for specialists and talents, they often lose out to the larger companies, who can usually

offer better conditions. This strongly increases the demand for external IT security services. In

order to keep the coordination effort low, customers look for services from a single source. This

enables service providers with a broad portfolio which addresses numerous different issues to

position themselves successfully in this market.

The issues for mid-sized customers are aggregated by the fact that cybercriminals are increasingly

targeting SMEs with increasingly sophisticated attacks. The indiscriminate behavior of users is

increasingly exploited, e.g. in trojan and phishing attacks. In addition to a modern ICT equipment,

consulting and training continue to play a central role for users (companies). In addition, the

requirements by the lawmaker are also increasing, e.g. with regard to data security and data

protection. An example for this is the General Data Protection Regulation (GDPR). Even after one

year of its enforcement, the implementation still represents a major challenge for many SMEs.

Medium-sized companies are increasingly dependent on the support of external service providers

to master these challenges. Medium-sized companies are also increasingly interested in managed

Eligibility Criteria Observations

Security Services – Midmarket

SECURITY SERVICES – MIDMARKET

ISG Provider Lens™ Quadrant Report | June 2019

Page 19: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

6969

TELEKOM DEUTSCHLAND

Telekom Deutschland is the German subsidiary of Deutsche Telekom serving medium-sized customers. In the Telekom Security segment, the Telekom group combines its extensive IT security expertise in the “Telekom Security” unit under the management of T-Systems. Telekom Security’s portfolio is marked under the label “Magenta Security”.

Overview

Telekom Security offers an extensive portfolio: With “Magenta Security” Telekom Deutschland offers an extremely comprehensive portfolio of security services, from consulting and implementation to managed services and cloud-based security services. All security technologies are thus covered.

In addition, Telekom Security enhanced its geographical reach; the focus of the expansion is on managed security services. For this year, a new Security Operations Center is planned in Singapore, which means that Telekom Security will also be present in Asia in this respect.

The team also continues to grow significantly. The segment Telekom Security has around 1,450 security specialists, the largest security team in Germany has been increased by more than 200 employees.

Telekom Security runs operations from Germany: Telekom Security operates cloud data centers in Germany, which is appreciated by many medium-sized customers.

With “Security made in Germany” Telekom Deutschland can score especially in view of the data protection discussion – and particularly in the target group of SMEs.

Telekom Deutschland has a great cross-selling potential: The extensive business customer base of one of Europe’s largest telecom providers offers a unique cross-selling potential for Telekom Deutschland’s IT security services.

Strengths

It is recommended to expand internationalization of the security operations: With its cloud data centers in Germany and the European Union, Telekom Deutschland is highly attractive to SMEs, but in view of the needs of internationally active customers, it is recommended that a cloud data center in the United States should also be considered.

Caution

Telekom Deutschland sets the standard for security services for German SMEs.

2019 ISG Provider Lens™ Leader

ISG Provider Lens™ Quadrant Report | June 2019 Security Services – Midmarket

Page 20: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

7070

SOCIAL ENTERPRISE NET-WORKING SUITES

DefinitionSecurity services include consulting, training, integration, maintenance,

support or managed security services. Managed security services are

referred to operations and management of an IT security infrastructure

for one or more customers through a Security Operations Center. The

target group large accounts (large companies) comprises companies with

minimum 5,000 employees. This category also comprises cloud services

from service providers who are not equipment vendors.

SECURITY SERVICES – LARGE ACCOUNTS

Colocation ServicesISG Provider Lens™ Quadrant Report | June 2019

Page 21: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

7171

Security Services – Large Accounts

The following criteria were taken into account for rating the security

providers for large companies:

� Scope of the service portfolio

� Locations of cloud data centers in Germany and the European Union

and the international presence

� Locations of Security Operations Centers in Germany and the

European Union and international presence

� Size of the cyber security team

� International experience

� Consulting competence

� Market presence in Germany: Number of customers, awareness etc.

� Partnerships with technology service providers

� Innovation and the portfolio roadmap with regards to the security

service range

In order to succeed in the demanding security services market for large customers, service

providers must be able to demonstrate an extensive, international experience in this market

segment with a broad range of solutions. Efficient, often internationally represented teams must be

available for support.

In view of the increasingly intensive and sophisticated cyberattacks that are directed at well-known

large companies, managed security services are also moving more and more into the focus of

large customers. Less qualified resources, the increasing frequency of incidents and the need for

always up-to-date specialist knowledge promote the demand for these services. All leaders in this

service provider comparison offer managed security services. Similar to small and mediumsized

companies, Security Operations Centers (SOC) with a German location are also relevant for large

companies. But in this segment, globally distributed SOCs, also play a special role due to the

frequent international presence of large companies. The provisions of the General Data Protection

Regulation, enforced in May 2018, continues to create a need for consulting in many large compa-

nies, to the benefit of service providers.

Eligibility Criteria Observations

SECURITY SERVICES – LARGE ACCOUNTS

ISG Provider Lens™ Quadrant Report | June 2019

Page 22: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

8282

T-Systems sets the standard for security services for large customers in Germany.

T-SYSTEMS

T- Systems is undergoing a transformation process: Although Telekom Security is a strongly growing unit, the past discussions about the future of T-System and the current transformation process could generate reluctance among interested parties.

T-Systems, the ICT service provider, is the enterprise division of Deutsche Telekom. Telekom group combines its extensive IT security expertise in the “Telekom Security” unit under the management of T-Systems. Telekom Security’s portfolio is marked under the label “Magenta Security”.

T-Systems offers an extensive portfolio: With “Magenta Security” T-Systems offers an extremely comprehensive portfolio of security services, from consulting and implementation to managed services and cloud-based security services. All security technologies are thus covered. The “Magenta Security” portfolio was further expanded together with leading technology partners.

In addition, Telekom Security built out its geographical footprint; currently focusing on managed security services. For this year, a new Security Operations Center is planned in Singapore. That will create a Telekom Security presence in Asia Pacific.

The team has been increased significantly: The largest service provider security team now reaches 1,450 staff after the addition of another 200 security specialists taken on board last year.

Telekom Security can show the operation in Germany: Telekom Security operates cloud data centers in Germany, a necessary prerequisite by many large customers.

The strong local presence is a very strong asset: With “Security made in Germany” T-Systems can score highly with Germany-based organisations, especially because of the necessity to comply with the data protection regulation.

Telekom Security shows a strong presence: Telekom Security operates the largest integrated Cyber Defense and Security Operations Center in Europe, situated in Bonn since 2017.

Strengths

Overview Caution

2019 ISG Provider Lens™ Leader

ISG Provider Lens™ Quadrant Report | June 2019 Security Services – Large Accounts

Page 23: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

Methodology

Methodology

Page 24: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

8484

ISG Provider Lens™ Quadrant Report | June 2019

The ISG Provider Lens™ 2019 – "Cyber Security Solutions & Services" research

study analyses the relevant software vendors and service providers in the Germany

market, based on a multi-phased research and analysis process, and positions

these providers based on the ISG Research methodology.

The study was divided into the following steps:

METHODOLOGY

1. Definition of Network - Cyber Security Solutions & Services

2. Use of questionnaire-based surveys of service providers/vendor across all

trend topics

3. Interactive discussions with service providers/vendors on capabilities

& use cases

4. Leverage ISG’s internal databases & advisor knowledge & experience

(wherever applicable)

5. Detailed analysis & evaluation of services & service documentation based

on the facts & figures received from providers & other sources.

6. Use of the following key evaluation criteria:

− Strategy & vision

− Innovation

− Brand awareness and presence in the market

− Sales and partner landscape

− Breadth and depth of portfolio of services offered

− Technology advancements

Page 25: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

© 2019 Information Services Group, Inc. All Rights Reserved.

Mr. Heuer is a Manager Advisor at ISG Germany. His main areas of coverage include the digital workspace, communications, social business & collaboration, cloud computing with a special focus on workspace/unified communications & collaboration as a service, and security.

Frank supports and advises renowned IT and telecommunications companies on their go to market, competitive analyses, business planning and general strategic and operational marketing issues. He is the author of many white papers, press releases and articles, blog posts and newsletter contributions on current ICT topics and has co-authored various books on topics such as the workplace of the future / UCC and security. Frank acts as client service manager and editor of the customer newsletter and is engaged in close and regular contact with our DACH customers.

Frank completed training as a banker and holds a master’s degree in business administration of the University of Trier (marketing, statistics and English).

Frank Heuer, AuthorSenior Advisor

AuthorISG Provider Lens™ Quadrant Report | June 2019

Page 26: Cyber Security Solutions - t-systems.com...Cyber Security in Germany: Fewer resources against growing threats In the course of digitization, "Industrial Internet of Things" (IIoT)

ISG Provider Lens™ | Quadrant ReportJune 2019© 2019 Information Services Group, Inc. All Rights Reserved

ISG (Information Services Group) (Nasdaq: III) is a leading global technology research and advisory firm. A trusted business partner to more than 700 clients, including more than 70 of the top 100 enterprises in the world, ISG is committed to helping corporations, public sector organizations, and service and technology providers achieve operational excellence and faster growth. The firm special-izes in digital transformation services, including automation, cloud and data analytics; sourcing adviso-ry; managed governance and risk services; network carrier services; strategy and operations design; change management; market intelligence and technology research and analysis. Founded in 2006, and based in Stamford, Conn., ISG employs more than 1,300 digital-ready professionals operating in more than 20 countries—a global team known for its innovative thinking, market influence, deep industry and technology expertise, and world-class research and analytical capabilities based on the industry’s most comprehensive marketplace data. For more information, visit www.isg-one.com.