Application Control Software in Retail and eCommerce

  • Symantec is one of the premium providers in the application control market and caters to a large customer base. With the growing trends of IoT and rapid rise in the number of connected devices, the company has changed its focus from protecting endpoints to effectively protecting and managing digital information in endpoint devices, which has become one of the prime necessities of today. Symantec’s investment in its channel partners is helping the company in driving customer satisfaction. Their go-to-market strategy includes direct sales as well as indirect sales resources which support their partner ecosystem. The company firmly adheres to the business strategy of having strong relationships with its partners in the market by forming alliances and partnerships with a number of OEMs towards enhancing its products. They partnered with Giesecke & Devrient (G&D), a global leader in mobile security, to collaborate on the development of protected security applications on smartphones and tablets. Symantec also expanded its incident response services to North America, the U.K., and select APAC regions to leverage comprehensive threat intelligence which would help the organization to predict and respond to cyber-threats. This helped the company to double its customer engagement over the last quarter. Besides this, the company is focused toward global Research and Development (R&D) strategy to drive innovations. For this, the company spent USD 1.14 billion in 2015 on in R&D to develop new technologies and product enhancements.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • McAfee Application Control is one the premium products in the application control market. The strong brand presence of Intel Security in the market is helping the product gain traction. The company’s innovative approach of providing the solutions as a stand-alone option as well as an integrated solution with other products accessible over all types of endpoints, desktops, servers, virtual machines, and PoS terminals, makes it one of the most trusted and deployed solution providers in this market. Its strong portfolio of solutions, with a large number of channel partners and the potential to serve a wide customer base, has helped the company build a strong base for customers across regions. To keep on growing in this highly competitive market, Intel Security adopted both inorganic and organic strategies in the market. As a part of its organic strategy, the company enhanced its product portfolio by launching new solutions and releasing new versions of its existing products. In 2015, the company launched the new McAfee Endpoint Security 10.X to improve performance and visibility into advanced threats detection and remediation for endpoints. In 2014, the company launched its latest version of McAfee Mobile Security to help customers run free privacy and security scans. To cater to large enterprises, the company enhanced its portfolio with the addition of McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. McAfee gets major portions of its sales from follow-up service, support, and subscriptions to its software and managed services. The company sells directly and through resellers to enterprises and consumers mainly in the U.S.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1968
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • Check Point is a leading B2B and B2C IT security service provider. The company offers complete security solutions from internet security, network security, cloud security, device security to data and endpoint security. The company offers reliable 5th generation cybersecurity architecture–Check Point Infinity–designed to protect the enterprises from highly dangerous cyberattacks like ransomware, in the configuration of security software, hardware, and services to all sizes of organizations and consumers. The other software solutions offered by the company are Check Point–Firewall and Check Point–EndPoint.

    Read More
    • Enterprise
    • Tel Aviv, Israel
    • Founded: 1993
    • $1BN to $5BN
    • 1,001 to 5,000
  • McAfee Application Control is one the premium products in the application control market. The strong brand presence of Intel Security in the market is helping the product gain traction. The company’s innovative approach of providing the solutions as a stand-alone option as well as an integrated solution with other products accessible over all types of endpoints, desktops, servers, virtual machines, and PoS terminals, makes it one of the most trusted and deployed solution providers in this market. Its strong portfolio of solutions, with a large number of channel partners and the potential to serve a wide customer base, has helped the company build a strong base for customers across regions. To keep on growing in this highly competitive market, Intel Security adopted both inorganic and organic strategies in the market. As a part of its organic strategy, the company enhanced its product portfolio by launching new solutions and releasing new versions of its existing products. In 2015, the company launched the new McAfee Endpoint Security 10.X to improve performance and visibility into advanced threats detection and remediation for endpoints. In 2014, the company launched its latest version of McAfee Mobile Security to help customers run free privacy and security scans. To cater to large enterprises, the company enhanced its portfolio with the addition of McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. McAfee gets major portions of its sales from follow-up service, support, and subscriptions to its software and managed services. The company sells directly and through resellers to enterprises and consumers mainly in the U.S. Furthermore, in 2014, the company spent around USD 11.5 billion (20.65% of its revenue in 2014) on R&D expenditure towards developing new security products as per the changing market demand.

    Read More
    • Enterprise
    • 51 to 100
  • Heat Software endpoint management solution manages and secures corporate endpoints and helps to detect and protect them from known and zero-day malware.

    • Enterprise
    • 51 to 100
  • The company is a leader in the emerging next-generation endpoint security market. The company's core capabilities include real-time visibility, threat intelligence, endpoint threat detection and response, advanced endpoint prevention, and open and extensible endpoint security. The company offers security solutions to industries such as education, finance, government, healthcare, manufacturing, oil & gas, utilities, and retail.

    Read More
    • SME
    • Massachusetts, US
    • Founded: 2002
    • $51MN to $100MN
    • 501 to 1,000

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Application Control Software tools.
4.35
4.03
3.68
  • Vision Alignment

    • No. of New products launched in the last one year

    • No. of New customers/clients acquired in the last one year

    • No. of patents

    • Challenges

    • R&D spend

  • Viability

    • Expected revenue FY2019-2020

    • No.of customers

    • No.of endpoints protected

    • Total Revenue

    • %Revenue from Region

      Revenue - North America | Revenue - Europe | Revenue - Asia-Pacific | Revenue - Middle East and Africa | Revenue - Latin America |
  • Mergers and Acquisitions Served

    • Mergers and Acquisitions in past one year

    • Joint Ventures in past one year

    • Partnerships and Collaborations in past one year

  • Geographic Footprint

    • Direct Presence - North America

    • Direct Presence - Europe

    • Direct Presence - Asia-Pacific

    • Direct Presence - Middle East and Africa

    • Direct Presence - Latin America

    • Indirect Presence - North America

    • Indirect Presence - Europe

    • Indirect Presence - Asia-Pacific

    • Indirect Presence - Middle East and Africa

    • Indirect Presence - Latin America

    • Sales Offices/Development Centers -North America

    • Sales Offices/Development Centers -Europe

    • Sales Offices/Development Centers -Asia-Pacific

    • Sales Offices/Development Centers -Middle East and Africa

    • Sales Offices/Development Centers -Latin America

  • Channel Strategy and Fit

    • Distributors strategy

    • Strategy to address the un-catered and new target audience

    • Partner Ecosystem

      Distributors | Value Added Resellers (VAR) | System Integrators | Consultants |
  • Breadth of Applications Served

    • New industry vertical

    • % Revenue from industry verticals

      Revenue - Other Industry Verticals | Revenue - Travel and Hospitality | Revenue - Transportation and Logistics | Revenue - Retail and eCommerce | Revenue - Media and Entertainment | Revenue - Manufacturing | Revenue - IT and Telecom | Revenue - Healthcare and Life Sciences | Revenue - Governmnet and Defense | Revenue - Energy and Utilities | Revenue - Education | Revenue - BFSI |
    • Industry Verticals catered

      Governmnet and Defense | BFSI | IT and Telecom | Healthcare and Life Sciences | Retail and eCommerce | Transportation and Logistics | Energy and Utilities | Manufacturing | Education | Media and Entertainment | Travel and Hospitality | Other Industry Verticals |
    • Customized application control solutions

  • Support and Services

    • Levels of support

    • Customer redressal mechanism

    • Type of Support services

      Technical Support | Sales Support | Customer Support | Security Support |
    • Support services

      On-Site Support | Remote Support |
    • Pre-sales support

      Software Requirement Specification (SRS) | Proof of Concept | Product Demos | Dedicated Account Manager (DAM) |
  • Scalability

    • End-users/Work stations

    • System configuration required

    • OS/Platforms supported

      Windows XP | Windows Vista | Windows 7 | Windows 8 | Windows 10 | Windows Server 2008 | Windows Server 2003 | Windows Server 2012 | Mac OS | Linux OS |
  • Product Features and Functionality

    • Type of access points

      Desktop/Laptop | Mobile/Tablet | Servers | Point of Sale (PoS) Systems | Virtual Machines | Removable Devices |
    • Application Control features

      Advanced Persistent Threat (APT) Protection | Application Detection and Usage Control | Policy Management | Application Reputation Scoring | Compliance Management | Visibility and Reporting | Threat Detection | Advanced Memory Protection |
  • Delivery

    • Mode of delivery

      Delivery - Directly | Delivery - Through Partners / Third-Party Vendors |
    • End-users catered

      Information Security Specialists | End-Users/Individuals | Application Development Team | IT Administrators |
    • Deployment model

      On-Premise | Hosted / On-Cloud |
  • Breadth and Depth of Product Offering

    • Products/Solutions offered

    • Product variants/licences

    • Services Offered

      Education & Training | Support & Maintenance | Managed Security Services | Vulnerability Assessment | Consulting Services | Compliance & Risk Management |
    • Application Control techniques

      Whitelisting | Blacklisting | Greylisting |
    • Add-on products

      Threat Intelligence | Backup and Recovery | Identity Management | Patch Management |

TOP REVIEWS

Looking for Application Control Software? Get help
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#4 in Application Control Software

“The only security vendor that match our needs"

(*)(*)(*)(*)(*)5
After researching and experiencing different cybersecurity vendors, we found Check Point Security Solutions that match our needs.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#4 in Application Control Software

“Email attachments malware blocked"

(*)(*)(*)(*)(*)5
Impressed with the defensive system of SandBlast. It blocks out the suspicious mail attachments and prevents them from interfering with the disk space or media stored in removable devices.