Microsoft Security a Leader in Five of Gartner’s Magic Quadrants

Microsoft continues to be a leader in Gartner’s Magic Quadrants on security. With Microsoft’s leading technology platforms and services combined with Satalyst’s comprehensive cloud security consulting and implementation knowledge, we are confident we are delivering best in class cyber security solutions to our clients.
Gartner has named Microsoft Security a Leader in five Magic Quadrants:
- Access Management
- Cloud Access Security Brokers
- Unified Endpoint Management Tools
- Enterprise Information Archiving
- Endpoint Protection Platforms
Access Management
Technologies (e.g. Microsoft Azure AD) that use access control engines (identity providers, authorization servers, policy servers, etc.) to provide the following core capabilities:
- Support for internal or external types of identities, and AM use cases
- Authorisation and adaptive access
- User self-service capabilities, including registration, password management, profile management and delegated administration
- User authentication methods, multifactor authentication and single sign-on
- Session management
- Access enforcement for standard and nonstandard target applications
- Support for modern identity protocols
- Event logging and reporting
- API access control
- Bring your own identification (BYOI) integration
- Directory and identity synchronisation, including identity repository services
Figure 1: Magic Quadrant for Access Management
Cloud Access Security Brokers (CASBs)
CASBs identify and protect sensitive information, detect and mitigate threats, and institute effective cloud governance and compliance. The core functionality areas include:
- Visibility. Detect all cloud services; assign each a risk ranking; identify all users and third-party apps able to log in
- Data security. Identify and control sensitive information; respond to classification labels on content
- Threat protection. Offer adaptive access control; provide user and entity behavior analysis; mitigate malware
- Compliance. Supply reports and dashboards to demonstrate cloud governance; assist efforts to conform to data residency and regulatory compliance requirements
Figure 2: Magic Quadrant for Cloud Access Security Brokers
Unified Endpoint Management tools (UEM)
An offering (e.g. Microsoft Endpoint Manager) comprising mobile device management and management of personal computers, via traditional client management tools or modern management, through a single console that also combines the application of data protection, device configuration and usage policies. Modern UEM tools:
- Provide a user-centric view of devices across device platforms.
- Enable modern PC management through native Windows 10, macOS and Chrome OS controls.
- Enable mobile device management through native iOS and Android controls.
- Aggregate analytics and telemetry from users, apps and devices to help inform policy and related actions.
- Provide insights into user experience through aggregation of telemetry signals, events, logs and synthetic transactions.
- Integrate with unified endpoint security tools to support security policy management, execute administrative actions and improve integration with identity and access management tools.
Figure 3: Magic Quadrant for Unified Endpoint Management tools
Enterprise Information Archiving
EIA solutions (e.g. Microsoft’s archiving solution is built on the Microsoft 365 platform) are designed to archive user-generated data, principally from varying unstructured data sources. Key features of EIA solutions include:
- Archiving electronic communications (e-communications), such as email, IM, SMS/text, workstream collaboration, public and business social media data.
- Additional content may include website data, voice, video, file systems, content collaboration platforms (CCPs), content services platforms and cloud office data sources.
- A focus on e-communications compliance and retention with features such as retention policy management, content indexing, classification, search, data reduction, and at least basic tools for e-discovery and supervision. Supervision provides proactive oversight to content in scope, based on predefined criteria and rules.
Figure 4: Magic Quadrant for Enterprise Information Archiving
Endpoint Protection Platforms
Solutions (e.g. Microsoft Defender Advanced Threat Protection) are important for detecting and and preventing file-based malware, malicious scripts and memory-based threats, and for investigating and responding dynamically to them.
Figure 4: Magic Quadrant for Enterprise Information Archiving
To help manage cyber security in your organisation, whilst your team is working remotely and/or in the office, find out more about Satalyst Secure or contact our Security and Managed Services team for a chat.
Categories:
Tags: