Security icon

Vendor Landscape: Email Security Gateway

The emails that you want are only the tip of the iceberg that you get.

Get Instant Access to this Blueprint


You are currently over the vendor limit, please adjust your weightings to equal exactly 100%.


You are currently over the product limit, please adjust your weightings to equal exactly 100%.

What matters more, the vendor score or the product score? As you weigh the importance, we will generate the vendor shortlist to match your needs.

View Vendor Shortlist

What is a shortlist?

A shortlist is a personalized list of vendors based on the criteria you define. Your shortlist offers more information about vendor's strengths, weaknesses, price-points, etc, and ranks them according to your needs.

Access this Vendor Shortlist by logging in with your Info-Tech Research Group membership or unlocking this content.


What is a Value Score?

The Value Score indexes each vendor’s product offering and business strength relative to their price point. It does not indicate vendor ranking.

Vendors that score high offer more bang for the buck (e.g. features, usability, stability, etc.) than the average vendor, while the inverse is true for those that score lower.

Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes.

View Storyboard

Solution Set Storyboard Thumbnail

Your Challenge

  • Within the email security gateway (ESG) marketplace, there are numerous vendors with varying options who all claim to be the perfect fit for your organization. It becomes challenging to sift through all the offerings and find the right one.
  • An ESG must serve a multitude of functions for the organization, as well as meet an array of requirements, all of which can be hard to accurately assess and include confidently.
  • IT security always struggles with costs. An email gateway can become expensive, but it is vital and thus needs to have a strong case made for implementation, improvement, or replacement scenarios.

Our Advice

Critical Insight

  • Cloud adoption among business functions is already high. Moving email to the cloud is just another step. Take this into consideration when selecting an ESG.
  • Advanced Persistent Threats (APTs) and Zero-Day attacks are changing the way organizations deal with threats. Recognize the need for greater visibility and tools that stay current with these developments.

Impact and Result

  • Understand developments within the ESG market to properly evaluate all capabilities and functions of an ESG.
  • Evaluate ESG vendors and products based on your enterprise requirements.
  • Determine which products are most appropriate for particular use cases and scenarios.

Research & Tools

1. Evaluate the leading solutions for mid-market ESG

Understand the market and available options.

2. Identify the mid-market ESG solution that best meets your needs

Develop a shortlist to speed the selection process.

3. Issue an RFP to the shortlist of vendors

Solicit responses from shortlisted vendors to find optimal enterprise fit.

4. Review RFP winners

Ensure that selected proponents can deliver when it counts.

Guided Implementations

This guided implementation is a three call advisory process.

Call #1 - Shortlist assistance and requirements

Discuss the market space and how vendors are evaluated. Decide which platform suits you best and narrow down the options based on customized requirements.

Call #2 - RFP and budget review

Review vendors’ RFPs and ensure the solution will meet your needs. Discuss average pricing of solutions and what can fit into your budget.

Call #3 - Negotiation and contract review

Review contracts and discuss best practices in negotiation tactics to get the best price for your solution.

Search Code: 74767
Published: April 25, 2014
Last Revised: April 25, 2014