Vendor Comparison in Disaster Recovery as a Service 2017: DIVE Matrix

  • ID: 4173497
  • Report
  • Region: Global
  • 106 Pages
  • Markets and Markets
1 of 4
A Detailed Study of the Major Players Offering Disaster Recovery (DR) Services

FEATURED COMPANIES

  • Amazon Web Services, Inc.
  • Bluelock, Llc
  • Cisco Systems, Inc.
  • Evolve Ip, Llc
  • Infrascale Inc.
  • Peak 10 Inc.
  • MORE

The vendor comparison report on Disaster Recovery as a Service (DRaaS), based on the DIVE methodology covers a detailed study of the major players offering Disaster Recovery (DR) services. The top 25 vendors of DRaaS were analyzed on the basis of their service offerings and business strategies. The vendors were shortlisted based on their service capabilities, technology innovations, industry coverage, viability, and breadth of service offerings.

The report helps stakeholders, such as DRaaS vendors, technology partners, system integrators, consultants, distributors, and value-added resellers, to make business strategies & decisions on the deployment of DR services.

This research defines DRaaS as the protection and replication of company’s data on physical or virtual servers to ensure business continuity in the event of manmade or natural disasters. DRaaS combines various service capabilities, such as cloud-to-cloud recovery, flexible deployment, cloud replication, and mobile backup. It is extremely useful for the Small & Medium Enterprises (SMEs) and the large enterprises that lack the expertise and are unaware of the benefits of cloud-based DR.

Vendors Evaluated:

The report covers a comprehensive study of the key vendors offering services in the DRaaS market. We have evaluated the following 25 key vendors:

  • Acronis International GmbH
  • Amazon Web Services, Inc.
  • Axcient, Inc.
  • Bluelock LLC
  • Cable & Wireless Communications Limited
  • CenturyLink, Inc.
  • Cisco Systems, Inc.
  • Datto, Inc.
  • Evolve IP, LLC
  • Geminare Incorporated
  • HP Enterprise Company
  • IBM Corporation
  • iland Internet Solutions
  • Infrascale Inc.
  • Iron Mountain Incorporated
  • Microsoft Corporation
  • NTT Communications
  • Peak 10, Inc.
  • Recovery Point Systems
  • Sungard AS
  • TierPoint, LLC
  • Vision Solutions Inc.
  • VMware, Inc.
  • Zerto Inc.
  • Zetta, Inc.

Vendor Inclusion Criteria:

We have selected 25 vendors for the evaluation, based on their breadth of service offerings and robust business strategies. The focus of our vendor evaluation was on the service they offer in the DRaaS market. A comprehensive list of all the vendors in this market was created through a service mapping strategy and analysis. Based on their capabilities, innovations, and breadth of service offerings, vendors were shortlisted. Our selected vendor mix includes top 25 DRaaS vendors, selected based on the above-given parameters.

READ MORE
Note: Product cover images may vary from those shown
2 of 4

FEATURED COMPANIES

  • Amazon Web Services, Inc.
  • Bluelock, Llc
  • Cisco Systems, Inc.
  • Evolve Ip, Llc
  • Infrascale Inc.
  • Peak 10 Inc.
  • MORE
1. Introduction
  • About the Document
  • Market Definition
  • Stakeholders
2. Premium Insights

3. Dive Overview
  • Dive Evaluation Criteria
  • Vendor Inclusion Criteria
  • Vendors Evaluated
4. Voice: Disaster Recovery As a Service
  • Disaster Recovery As a Service: a Vital Component of Business Continuity Achieved Through Defined Recovery Point Objective And Recovery Time Objective
  • Disaster Recovery As a Service: Best Practices
5. Disaster Recovery As a Service: Vendor Comparison
  • Dive Vendor Comparison Scorecard
  • View
6. Vendor Profiles
  • Acronis International Gmbh
  • Amazon Web Services, Inc.
  • Axcient, Inc.
  • Bluelock, Llc
  • Cable & Wireless Communications Ltd
  • Centurylink, Inc.
  • Cisco Systems, Inc.
  • Datto, Inc.
  • Evolve Ip, Llc
  • Geminare Incorporated
  • Hewlett Packard Enterprise Company
  • Iland Internet Solutions Corporation
  • Infrascale Inc.
  • International Business Machines Corporation
  • Iron Mountain Incorporated
  • Microsoft Corporation
  • NTT Communications Corporation
  • Peak 10 Inc.
  • Recovery Point Systems
  • Sungard Availability Services
  • Tierpoint, Llc
  • Vision Solutions Inc.
  • Vmware, Inc.
  • Zerto, Inc.
  • Zetta, Inc
7. Appendix
  • Dive: Vendor Comparison Methodology
  • Matrix Description
  • List of Abbreviations
  • Related Research
  • Author Details
Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4

FEATURED COMPANIES

  • Amazon Web Services, Inc.
  • Bluelock, Llc
  • Cisco Systems, Inc.
  • Evolve Ip, Llc
  • Infrascale Inc.
  • Peak 10 Inc.
  • MORE

Application security protects web and mobile-based applications from vulnerabilities via various security testing procedures throughout the application development lifecycle. This involves the measures taken throughout the application code’s lifecycle to identify the security gaps and flaws to protect applications from cybercriminals and malicious attacks. The security testing techniques for securing business critical applications include Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). As the threat landscape is continuously evolving, organizations are struggling to address the sophisticated and advanced threats. Security vulnerabilities hidden within an application remain undetected during the development and deployment process. This weakness can be easily targeted by hackers and exploited to leak private data or cause disruption in the business processes. An application security solution ensures the protection of critical applications from such exploits and vulnerabilities and is concerned with the business risks. This ensures adherence to compliance requirements by safeguarding applications that support business operations.

The major factors driving the growth of the application security market are the rising security breaches targeting business applications and stringent compliance and regulatory requirement for application security. Furthermore, due to the rise in the demand for Software as a Service (SaaS)-based application security solutions, the application security market finds huge opportunity to grow in the next five years. The biggest challenge for organizations will be to address the high cost of innovation for application security solutions due to budget constraints as well as lack of application security expertise.

The report on vendor comparison in application security based on MarketsandMarkets DIVE methodology reviews major players that offer application security solutions and outlines the findings and analysis on the basis of two broad categories: product offerings and business strategies. Each category carries various criteria, based on which the vendors are evaluated.

Based on the extensive secondary and primary research, key information about the vendors’ product offerings and business strategies was gathered. After the completion of data gathering and verification process, the scores and weightage for shortlisted vendors against each parameter were finalized. A comparison scorecard was prepared after evaluating all the vendors, and each vendor was placed in the MNM DIVE matrix on the basis of their product offering and business strategy scores.

This report is instrumental in helping the stakeholders, such as application security vendors, cybersecurity vendors, network solution providers, security testing service providers, consulting firms, system integrators, value-added resellers, and Managed Security Service Providers (MSSPs) to understand the capabilities of the major players in the application security market.

The report covers the comprehensive study of key application security vendors, including Acunetix, Checkmarx Ltd., Contrast Security, Fasoo, Hewlett Packard Enterprise (HPE), High-Tech Bridge, International Business Machines (IBM) Corporation, Pradeo, Qualys, Inc., Rapid7, Inc., SiteLock, Synopsys, Inc., Veracode, Inc. (CA, Inc.), Trustwave Holdings, Inc. (Singtel), and WhiteHat Security, Inc.

Note: Product cover images may vary from those shown
5 of 4
  • Acronis International Gmbh
  • Amazon Web Services, Inc.
  • Axcient, Inc.
  • Bluelock, Llc
  • Cable & Wireless Communications Ltd
  • Centurylink, Inc.
  • Cisco Systems, Inc.
  • Datto, Inc.
  • Evolve Ip, Llc
  • Geminare Incorporated
  • Hewlett Packard Enterprise Company
  • Iland Internet Solutions Corporation
  • Infrascale Inc.
  • International Business Machines Corporation
  • Iron Mountain Incorporated
  • Microsoft Corporation
  • NTT Communications Corporation
  • Peak 10 Inc.
  • Recovery Point Systems
  • Sungard Availability Services
  • Tierpoint, Llc
  • Vision Solutions Inc.
  • Vmware, Inc.
  • Zerto, Inc.
  • Zetta, Inc
Note: Product cover images may vary from those shown
6 of 4
Note: Product cover images may vary from those shown
Adroll
adroll