Visionary malware needs visionary protection

Company focus and malware protection effectiveness as key to securing ”Visionary” status in Gartner Magic Quadrant.

Author: Eija Paajanen
Date: 24.03.2016
Read Time: 3 Minutes

In the digital age, every company is a target. The evolution of cyber threats has been driven by monetary gain over the past 10 years. Business assets are worth money. Whether it is your customer data, your personnel information, your intellectual property or your access to infrastructure. There is always someone who will happily take it when offered.

Our approach to cyber security is based on a 360° process that covers the prediction, prevention and detection of attacks, as well as the response to possible successful ones.

The majority of threats out there are still widely distributed and utilise vulnerabilities that are already known. This makes every company, big or small, a potential target of opportunistic attacks. Which in turn makes it vital to take proper care of business security with modern malware protection software. However, preventative protection is no longer enough to cover modern cyber threats.

Today, it is not a question of whether someone gets through your defenses, but rather when. And when it happens, you better know that it happens. This is why you need to think about cyber security as a process rather than a solution. In this process, endpoint protection is still a key element of security, and we approach that with behavioral and heuristic protection, sandboxing and other modern protection technologies that complement the static scanning engines.

This year, we believe Gartner acknowledged our efficiency in malware protection and the renewed company focus on B2B security by recognizing us as a “Visionary” in their Magic Quadrant for Endpoint Protection Platforms.

Visionaries invest in the leading-edge (aka “bleeding edge”) features — such as advanced malware protection, data protection and/or management capabilities — that will be significant in the next generation of products, and will give buyers early access to improved security and management. Visionaries can affect the course of technological developments in the market, but they haven’t yet demonstrated execution. Clients pick Visionaries for best-of-breed features, and, in the case of small vendors, clients may enjoy more personal attention. Source: Gartner Magic Quadrant for Endpoint Protection Platforms 2016 *)

Mira Sivonen from Corporate Business Development says:

We are proud to see that Gartner appreciates the new company focus on holistic cyber security and the unparalleled efficiency of our endpoint protection. Our way forward is clear: we continue to provide effective endpoint protection to our customers and further build our capabilities in advanced threat protection to be able to meet future challenges.

Gartner Magic Quadrant for Endpoint Protection Platforms

Source: Gartner Magic Quadrant for Endpoint Protection Platforms 2016 *1)


*1) This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from https:

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

Post Comment

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s