This research includes findings from: * 246 survey completes * 8 attendees CIO focus group * 10 CIO primary research interviews *

Artificial intelligence is a new and growing technology market, with the potential to greatly simplify the lives of IT professionals. With machine and deep learning, tools now exist to more easily handle the huge amount of data that companies generate and collect every day.

But cyber criminals are using AI as well, and the only way to combat them is to do the same. The cyber arms race has reached a new level, where machine fights machine, and vendors are adding these capabilities to their tools, or developing new ones. These AI-enhanced security solutions (AIS) rely on machine and deep learning to detect, predict and respond to threats in real time.

This report covers the following areas:

  • An introduction to modern AI-enhanced Security
  • Trends and challenges in the market, including rising autonomy; the rising use of adversarial solutions; and the pressing need for, but difficulty in finding, trust.
  • An analysis of the major vendors in the space: Microsoft, McAfee, Darktrace, Sophos, Symantec, Fortinet, IBM, Check Point and more. The report covers their history, products and pricing, as well as – crucially – their differences.

Table of contents

AIS Vendor Ratings

  • Interacting with charts
  • Methodology
  • AIS Vendors
  • AIS Solutions

Executive Summary

The AIS Marketplace

  • Introduction
  • Modern AIS
  • General trends
    • Mutable threat landscape drives adoption
    • Little difference between deployment environments
    • Solutions must be versatile
  • Future trends
    • Rising autonomy
    • Need for adversarial solutions
  • Challenges
    • Choosing the right product
    • Trust
    • Data
    • Skills gap
    • Measuring success
  • Factors in choosing a vendor or solution
  • Vendor awareness
  • Leading vendors
  • Falling vendors
  • End-user sentiment
    • Hype or reality?
  • Conclusion
  • Appendix

Microsoft

  • Summary
  • Company background
  • Solution
  • Pricing
    • Capacity Reservations
    • Pay-as-you-go
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

McAfee

  • Summary
  • Company background
  • Solution
    • McAfee Advanced Threat Defence
    • McAfee Endpoint Security
  • Pricing
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

Darktrace

  • Summary
  • Company background
  • Solution
  • Pricing
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

Sophos

  • Summary
  • Company background
  • Solution
    • Sophos Intercept X
    • Sophos XG Firewall
  • Pricing
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

Symantec

  • Summary
  • Company background
  • Solution
    • Symantec Endpoint Security
    • Endpoint Detection and Response
  • Pricing
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

Fortinet

  • Summary
  • Company background
  • Solution
    • FortiEDR
    • FortiWeb
    • FortiAI
  • Pricing
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

IBM

  • Summary
  • Company background
  • Solution
    • IBM MaaS360 with Watson
    • IBM QRadar Advisor with Watson
  • Pricing
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

Check Point

  • Summary
  • Company background
  • Solution
  • Pricing
  • Adoption
  • Positive sentiment
  • Negative sentiment
  • In the news
  • Appendix

Other Vendors

  • Cisco
  • Trend Micro
  • CrowdStrike
  • LogRhythm
  • SentinelOne
  • Cylance
  • Palo Alto Networks
  • Zscaler
  • Vectra
  • Tessian
  • FireEye

Avoid making costly errors (when making IT investment and implementation decisions)

UK and European research, not USA focused or vendor biased

Actionable advice from Computing’s industry experts and community, saving you time and money