{"id":15162,"date":"2016-10-27T10:36:57","date_gmt":"2016-10-27T10:36:57","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=6217"},"modified":"2019-11-15T22:47:54","modified_gmt":"2019-11-15T11:47:54","slug":"forrester-wave-assessment","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/forrester-wave-assessment\/15162\/","title":{"rendered":"Forrester names Kaspersky Lab a leader in endpoint security"},"content":{"rendered":"<p>Today we are pleased to share the results of Forrester Research\u2019s Wave assessment, which places Kaspersky Lab in the highest tier \u2014 the Leaders tier \u2014 of endpoint security vendors.<\/p>\n<p>The Forrester Wave is a 25-criteria evaluation of 15 prequalified endpoint security suite providers.\u00a0 It incorporates an evaluation of products\u2019 capabilities \u2014 which is typical of any product evaluation \u2014 but adds analysis of strategy and market presence based on interviews with vendors and their customers and partners. It is widely recognized as an influential resource for organizations evaluating IT products and services.<\/p>\n<p>Forrester\u2019s independent expert analysis of the endpoint security market indicates that this market continues to be a competitive battlefield. Endpoint security is a growing field because more security professionals see endpoint security suites as a means to address their top challenges. As well, security pros increasingly trust and rely on providers to advise them on security decisions.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Forrester names @kaspersky\u00a0a leader in endpoint #security.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FX3kj&amp;text=Forrester+names+%40kaspersky%C2%A0a+leader+in+endpoint+%23security.+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>As readers of this blog no doubt know, traditional approaches to endpoint security are nowhere near sufficient to secure users in the ever-evolving threat landscape. Therefore, threat detection accuracy and automatic containment measures are key competitive differentiators.<\/p>\n<p>The \u00a0Forrester Wave\u2122: Endpoint Security Suites, Q4 2016 determined: \u201cKaspersky Lab meets most enterprise requirements in a tightly integrated package.\u201d Kaspersky Endpoint Security for Business was cited for strong prevention, detection, and remediation capabilities. Because we developed each of these capabilities in-house, integration between the various components is strong and meaningful. And overall, customers report a high level of effectiveness in both malware and exploit prevention, with solid post-execution detection capabilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Forrester Research interviewed vendors and customers to evaluate top endpoint security providers.<\/p>\n","protected":false},"author":2415,"featured_media":15305,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[2420,2017,2474,352,732],"class_list":{"0":"post-15162","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-endpoint","10":"tag-endpoint-security","11":"tag-forrester","12":"tag-kaspersky-lab","13":"tag-research"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/forrester-wave-assessment\/15162\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/forrester-wave-assessment\/4290\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/forrester-wave-assessment\/15162\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/forrester-wave-assessment\/6723\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/forrester-wave-assessment\/13325\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/forrester-wave-assessment\/15162\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/endpoint\/","name":"endpoint"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2415"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=15162"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15162\/revisions"}],"predecessor-version":[{"id":24391,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15162\/revisions\/24391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15305"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=15162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=15162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=15162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}