Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

Security icon

Vendor Landscape: Secure Web Gateways

Just filter it.

Unlock a Free Sample


You are currently over the vendor limit, please adjust your weightings to equal exactly 100%.


You are currently over the product limit, please adjust your weightings to equal exactly 100%.

What matters more, the vendor score or the product score? As you weigh the importance, we will generate the vendor shortlist to match your needs.

View Vendor Shortlist

What is a shortlist?

A shortlist is a personalized list of vendors based on the criteria you define. Your shortlist offers more information about vendor's strengths, weaknesses, price-points, etc, and ranks them according to your needs.

Access this Vendor Shortlist by logging in with your Info-Tech Research Group membership or unlocking this content.


What is a Value Score?

The Value Score indexes each vendor’s product offering and business strength relative to their price point. It does not indicate vendor ranking.

Vendors that score high offer more bang for the buck (e.g. features, usability, stability, etc.) than the average vendor, while the inverse is true for those that score lower.

Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes.

View Storyboard

Solution Set Storyboard Thumbnail

Your Challenge

  • Secure Web Gateway (SWG) products protect your organization from incoming threats to your network or malicious outbound communication. Products vary in their ability to detect these threats and the environments that they support.
  • Organizations must fully understand their rationale for adopting an SWG. Additional benefits such as web application controls for employee productivity can increase the rationale scope for getting an SWG beyond just security concerns.
  • Organizations today must secure against the most advanced payload malware through advanced detection capabilities. This functionality must also be usable across the various mediums where web traffic is seen. Varying protocols, devices, operating systems, and locations all provide levels of complexity that need to be met.

Our Advice

Critical Insight

  • Malicious web scripts, whether changing dynamically during browser execution or changing quickly on the server-side, can be undetected through simple JavaScript evaluation. Advanced sandboxing or emulation capabilities are needed to detect these obfuscated scripts.
  • Business is about access. Ensure that SWGs support mobile and BYOD security & compliance through OS support and guest Wi-Fi support, enabling anywhere access.
  • Realized value from SWGs requires that productivity tools are included in evaluating a product. Granular control options around specific applications are necessary.

Impact and Result

  • Many SWGs may seem similar in feature sets. Determine which vendor offerings can meet your organizational needs.
  • Understand what threats your organization is facing and what environments you operate in to discover what advanced detection capabilities and environment support are relevant.
  • Info-Tech’s framework for selecting a delivery method and shortlisting vendors will save you time by ensuring you only evaluate the vendors that fit the organization’s SWG needs.

Research & Tools

1. Evaluate the leading solutions for SWG

Understand the market and available options.

2. Identify the SWG solution that best meets organizational needs

Develop a shortlist to speed the selection process.

3. Issue an RFP to the shortlist of vendors

Solicit responses from shortlisted vendors to find optimal enterprise fit.

4. Review RFP winners

Ensure that selected proponents can deliver when it counts.

Guided Implementations

This guided implementation is a three call advisory process.

Call #1 - Shortlist assistance and requirements

Get off to a productive start: Discuss the market space and how vendors are evaluated. Decide on which deployment option suits you best and narrow down the options based on customized requirements.

Call #2 - RFP and budget review

Interpret and act on RFP results: Review vendor RFPs and ensure the solution is meeting your needs. Discuss average pricing of solutions and what can fit into your budget.

Call #3 - Negotiation and contract review

Purchase optimization: Review contracts and discuss best practices in negotiation tactics to get the best price for your solution.