8/1/2019 Gartner Reprint Licensed for Distribution Magic Quadrant for Security Awareness Computer-Based Training Published 18 July 2019 - ID G00378818 - 46 min read By Analysts Joanna Huisman People influence security more than technology or policy, and cybercriminals know how to exploit human behaviors. Security and risk management leaders should invest in tools that increase awareness and influence behavior that supports security business objectives through computer-based training. Strategic Planning Assumption By 2022, 60% of large/enterprise organizations will have comprehensive security awareness training programs, with at least one dedicated full-time equivalent (FTE) for fulfillment. Market Definition/Description This document was revised on 24 July 2019. The document you are viewing is the corrected version. For more information, see the Corrections (http://www.gartner.com/technology/about/policies/current_corrections.jsp) page on gartner.com. People affect security outcomes more than technology, policies or processes. The market for security awareness computer-based training (CBT) is driven by the recognition that, without perfect cybersecurity protection systems, people play a critical role in an organization’s overall security and risk posture. This role is defined by inherent strengths and weaknesses: people’s ability to learn and their vulnerability to error, exploitation and manipulation. End-user-focused security education and training is a rapidly growing market. Demand is fueled by the needs of security and risk management (SRM) leaders to help influence the behaviors that affect the security of employees, citizens and consumers. Interactive CBT is a central component of comprehensive security education and behavior management programs. The focus and structure of the content delivered by CBT vary, as do the duration of individual CBT modules and the type of computing endpoints supported. Understanding the diversity of people in the organization is as important to SRM leaders as understanding how security fits into an organization’s larger goals. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 1/30 8/1/2019 Gartner Reprint Security needs require chief information security officers (CISOs) and employee communication leaders — such as human resource (HR) managers — to recognize the increasing impact of employee behavior on enterprise SRM efficacy. This is due in no small part to increased enterprise and employee adoption of mobile, Internet of Things (IoT) and cloud products. Security Awareness Is a Far-Reaching Concept As often emphasized in Gartner research on security awareness, security decisions are closely linked to business objectives. This research focuses on the appreciable market space in which education materials are offered. In this research, Gartner uses “security education” to refer to the overarching set of activities and objectives that elevates security competencies and motivates employees to make better decisions in line with the organization data security postures. The organization’s education process should prepare the staff for decisions that align with enterprise security performance objectives and expectations. Awareness of threats and mitigating actions is one function of a security education program. Direct behavioral conditioning — such as anti-phishing projects (see Note 1) — is another form of security education. Others include security communication and internal marketing campaigns, involving posters, competitions and advertising-style messaging. Products with different objectives for security education share the ultimate goal of supporting enterprise requirements for the management of security risks. Security education can fulfill multiple objectives and requirements, including: ■ Complying with regulations that mandate security training ■ Establishing clear behavioral guidelines to support disciplinary processes, which are typically described in acceptable-use and/or security policies ■ Improving employee knowledge of security and risk topics ■ Motivating desired security behaviors in the appropriate context Education and awareness CBT are licensed on a per-user, per-year pricing structure, with limited exceptions. Security education CBT is suitable for organizations of all sizes and is of particular use to geographically distributed organizations that need common security performance across all employee groups. The increasing diversity of CBT offerings requires prospective buyers to clarify the learning outcomes they are looking for prior to vendor engagement. Relevancy and adaptation are key imperatives for SRM leaders. Most organizations have invested in some form of security awareness activities for decades. New technologies, threats and patterns of work compel organizations to seek more-sophisticated behavioral support approaches. These https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 2/30 8/1/2019 Gartner Reprint incorporate a broad range of deployment models, increased frequency of learning opportunities, context-specific training content and structure, and metrics that support continued investment in awareness and security education. Many SRM leaders prioritize the evidence of the effectiveness, or ROI, of the security awareness program. The result is an increasing demand for the measurement of persistent learning outcomes. Some organizations offer preassessment, so that employees can “test out” some of the courseware, if they are able to demonstrate knowledge mastery, and to create a baseline by which future performance can be measured. The market for CBT for security awareness is characterized by vendor portfolios that include readyto-use, interactive software modules. These modules are available as internet-based services or onpremises deployments via client-managed learning management systems (LMSs) and vendor support for the Sharable Content Object Reference Model (SCORM) standard. The products included in this Magic Quadrant support multilingual and multicultural audiences — that is, they are available in English and at least one other language. They offer delivery via a variety of digital endpoints and assessments of trainee participation and completion. Vendors that support this market target end-user organizations of all sizes. However, enterprise clients commonly demand ancillary capabilities, such as customization of content, creation of new content, and advanced assessment and reporting capabilities (see “Effective Security Awareness Starts With Defined Objectives”). They must also integrate security education CBT into a consistent program of security maturity improvement across the enterprise. Market Trends As products in this market mature, each vendor looks to differentiate its products and services in a variety of ways. At the end of the day, content continues to be paramount. Vendor differentiators in 2018 and 2019 are described in the sections that follow. Variety of Content Formats, Lengths and Styles, Including Mobile Capabilities Content continues to be the most prominent differentiator. Many clients and vendors recognize that their security training cannot effectively be approached with a “one-size-fits-all” mentality. They are developing content of different lengths (one- to two-minute microlearning lessons, interactive lessons, and episode-based, Netflix-like shows) and in different styles — e.g., ranging from extremely corporate-friendly and “safe” to more edgy, humorous styles. Learners have different styles (e.g., visual, aural, logical, verbal, physical, social and solitary), which means audiences can receive the same information in multiple forms, thereby increasing the possibility for information absorption and retention. Customization of content also addresses the needs of particular roles or audiences. For instance, although training for all audiences should include foundational awareness, there may be a need for additional/different training for call center employees, executives or HR personnel. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 3/30 8/1/2019 Gartner Reprint Many vendors are also offering content that reflects diversity of characters (elements of the learning) with a more global perspective. The more relatable the content is to the learner, the more interested and engaged they will be. This also increases the potential of increased followership across your awareness curriculum. The potential for mobile attack is increasing. Many vendors offer not only content that can be delivered via mobile device, but also phishing campaigns. Clients that have large moving populations need to consider “learning-on-the-go” and a good alternative to traditional CBT methods. Gamification Some vendors include a focus on gamification, although the definition of gamification varies from vendor to vendor. Clients initially expect an experience that is similar to Xbox or PlayStation, but quickly realize that the security awareness gamified content is nowhere near that level of sophistication. In this context, “gamification” includes the establishment of multidepartment leaderboards and badges, so that departments/employees are ranked against each other in various ways. Some vendors that provide gamification as an option are also thinking differently about reward and recognition options for users who exhibit heightened security behaviors (see “Rewards and Consequences Motivate Employee Secure Behavior”). Some vendors are also introducing virtual reality content to provide learners with unique experiences. Multilanguage Support Most long-standing vendors offer support for all major language groups. However, many vendors are now distinguishing themselves by offering out-of-the-box language support for 20 or more languages, and some offer more than 50 languages, including cultural variants/dialects of languages. However, Gartner recommends that organizations verify the accuracy of languages with their own in-country personnel before deploying pretranslated materials. Although some vendors promote many languages, only subsets of their library are offered in every language. Demand clarification upfront on what is translated into all the languages you require across your enterprise. Supplemental Internal Marketing Content In recognizing that SRM leaders are not full-time content writers, graphic designers or marketing experts, many security awareness CBT vendors offer large libraries of predesigned content to serve as additional/supplemental campaign artifacts or for ad hoc communications. These can include materials for newsletters, intranet postings, emails, security alerts, digital banners and security information for families and more. Competitive Pricing Price continues to be the biggest disruptor in the market. As a result, most of the vendors in this space offer some free CBT or internal marketing materials. Some vendors have adjusted pricing downward to differentiate on price and to seek a large share of the small or midsize business (SMB) market, which will not tolerate traditional pricing for products. The current pricing environment feels like a race to the bottom; it is certainly a buyer’s market, in which the art of negotiation and https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 4/30 8/1/2019 Gartner Reprint competitive bids go a long way toward savings for like services. Gartner cautions clients to ensure they’re comparing the price of “like” products and services. Integration Partnerships and Possibilities Some vendors are also exploring interesting partnerships with core security technology vendors, such as employee-monitoring vendors, endpoint detection and response (EDR) vendors, endpoint protection platform (EPP) vendors, secure email gateway (SEG) vendors, data security vendors and others. The goal of such partnerships is to be able to: ■ Leverage real-time data generated or collected by core technologies ■ Log data to provide just-in-time learning, based on observed unsecure behavior exhibited by an employee ■ Provide a comprehensive product that covers technology to human behavior When unsecure or risky behavior is logged, the behavior could trigger autoenrollment into a contextually relevant training module. This is a natural evolution of the anti-phishing behavior management market. The aim is to create observed and individualized, behavior-based training specifically relevant to the learner. Market Dynamics and Growth The market for security awareness CBT became dynamic in 2017, and this dynamism continues. Multiple mergers and acquisitions occurred in 2018, resulting in market consolidation. This movement indicates an ongoing trend — i.e., additional mergers and acquisitions (M&A). This research focuses primarily on the vendor market performance during the 2018 calendar year, but also includes market and capability changes that took place in the first quarter of 2019. In 2018, the market grew to roughly $451 million, which falls approximately $40 million short of our original projection. This miss was the result of inaccurate reporting from two separate vendors. However, all indications suggest that the market is well-positioned for high growth and will remain so during the next five years. We estimate the market will grow by approximately 47% in 2019 and reach $660 million (see Note 2). Gartner continues to experience an increase in inquiries year over year, as end-user organizations continue to struggle with changing employee behaviors with respect to the security and protection of valuable assets. The market has experienced nearly 25% growth from 2017 through 2018. Most organizations of any size need to provide security training for their employees, due to regulatory requirements and other internal objectives. Product vendors mine a large, anticipated, total addressable market (approximately $2.5 billion, depending on product price tolerances). Gartner anticipates the market will grow at a 42% compound annual growth rate (CAGR) through at least 2023. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 5/30 8/1/2019 Gartner Reprint Advice to SRM Leaders Purchasing Security Awareness CBTs CISOs and other purchasers of security awareness CBT products should resist basing their vendor evaluations solely on technical/functional requirements. Security awareness materials are the touchpoint of the security department for the rest of the organization. As such, ensuring that the tone, production value, and overall look and feel of the product are a good match for your specific organization is fundamental to success. Comparisons are important when considering interfaces and user experience. If the product you are evaluating does not have content and an interface that is as good as or better than anything else your company has released, then other vendors should be evaluated. Magic Quadrant Figure 1. Magic Quadrant for Security Awareness Computer-Based Training https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 6/30 8/1/2019 Gartner Reprint Vendor Strengths and Cautions Barracuda Barracuda acquired PhishLine in January 2018 and markets Barracuda PhishLine as a key component of Barracuda’s Total Email Protection product. Barracuda PhishLine is an anti-phishing behavior management and security awareness CBT product with a strong focus on the data science of phishing measurement. Along with Barracuda PhishLine’s library of CBT content, the company partners with six security providers to offer clients CBT content through its Content Center Marketplace, which is able to meet the needs of many learners and styles. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 7/30 8/1/2019 Gartner Reprint Barracuda PhishLine’s content is completely customizable and user-friendly. Through its Click Thinking bundle, it provides monthly content updates, including training videos, newsletters, infographics, email templates and landing page content. Extensive analytics enable more complex behavioral assessment and targeted education than is common with competitive anti-phishing products. Assessment capabilities include a variety of social engineering and phishing simulations that enable users to apply and demonstrate acquired knowledge. Content is offered in 21 languages. Strengths ■ Barracuda PhishLine offers a data-scientist-level view into how to create a simulated phishing attack, which can assist with continuous performance improvements and how to measure and report on the data available through simulated phishing tests and CBT assessments. Thus, it gives end users insight into how effectively their phishing simulation training is performing. ■ Barracuda PhishLine’s Content Center Marketplace provides a simple platform from which customers can choose from a variety of CBT modules and associated content from multiple vendors; the content is then aligned to specific, Barracuda PhishLine-created, social engineering testing. Cautions ■ PhishLine has been Privacy Shield certified since 2016, which ensures that all stored personally identifiable information (PII) meets all data privacy regulatory requirements, including the General Data Protection Regulation (GDPR). That said, some clients have expressed concerns about the amount of data that can be collected and analyzed. Customers with data collection and privacy concerns should ensure that Barracuda PhishLine deploys advanced configuration options that address their individual regulatory or other security/privacy needs. ■ Although Barracuda PhishLine focuses on phishing and provides security awareness and training artifacts, its CBT package is not as robust and innovative as many of the market leaders. Cofense PhishMe was acquired through a private equity consortium in February 2018 and renamed Cofense. Cofense benefits from strong brand recognition in the security awareness market with its former PhishMe name. Its approach to CBT is “learning through doing.” Cofense’s strategy is focused on training users to spot and report phishing attacks, and then using that opportunity to provide immediate training and reinforcement. Its large market base enables Cofense to benchmark client performance against industry performance. This capability is supported by flexible analysis and advanced reporting capabilities, including executive-level board reports. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 8/30 8/1/2019 Gartner Reprint In addition to anti-phishing, Cofense offers a moderate library of interactive content that incorporates games, videos and a variety of learning artifacts. It also offers CBFree, a set of standard compliance courses offered free to all enterprises. Cofense offers the only free content and anti-phishing product, PhishMe Free, which provides a no-cost phishing and CBT product to small businesses with fewer than 500 employees. Content is offered in 56 languages. Strengths ■ Industry-leading Cofense Reporter and Cofense Triage enable users to report suspected phishing emails via a “report” button in their email. Incident response teams can use these features for significant automated analysis, risk ranking and orchestration of real phishing attacks. ■ Advanced and flexible analysis and reporting enable training optimization and phishing vulnerability assessment. Cautions ■ Although Cofense focuses on phishing and provides a number of security awareness and training artifacts and a free service offer, its CBT package is not as robust and innovative as many of the market leaders. ■ Although Cofense has an established a content library, clients would benefit if Cofense expanded and strengthened its partner approach to diversify its content offering. Global Learning Systems Global Learning Systems (GLS) offers strong learning services in the design, development, deployment and ongoing management of security training. The vendor offers a wide range of scalable, multilanguage, customizable products through its continuously expanding GLS OnDemand Learning Management System (LMS), which features portal functionality. Its Securing Your Human Firewall covers topics such as traditional security awareness information and regulatory compliance. GLS segments its offering into distinctive, user-friendly bundles, and clients can quickly create, deliver and track training via the LMS. Its offerings cover general and role-specific security awareness, anti-phishing, GDPR, ethics, Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI-DSS), privacy and other compliance topics. GLS can address the needs of its clients’ businesses, while providing a roadmap as needs change and programs mature. The vendor offers a good assessment tool, SecureGenius, for ongoing evaluation of competency levels in a user base. GLS’s integrated anti-phishing testing and remediation capabilities create a comprehensive portfolio for security education and behavior management. GLS continues to grow its gamified content, animated video product suite, and internal marketing and communication tools. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 9/30 8/1/2019 Gartner Reprint Content is offered in 34 languages. Strengths ■ GLS offers an out-of-the-box product for security awareness managers who need an immediate multiyear roadmap with prestructured campaigns and supporting materials. GLS also provides expanded professional services, internal marketing and communication tools designed to promote ongoing reinforcement. ■ The interactive training content and varied formats are designed to keep learners engaged, reinforce core messages and aid in knowledge retention. Optimization for content presentation on smartphones and tablets provides strong support for modern endpoint portfolios and digital workplaces. Cautions ■ Although GLS maintains its focus on international growth, its U.S.-centric sales may inhibit uptake of the product by clients outside North America. Clients should watch how the company prioritizes growth outside the region. ■ The vendor provides several useful options and products to its clients and prospect base, but GLS needs to strengthen its brand recognition when competing with market leaders. GLS needs to continue focusing on expanding marketing efforts to reach a broader share of the market. Infosec Infosec continues to be one of the fastest-growing providers in the security awareness space. Infosec provides a strong general security awareness program, while offering skills training and certifications for IT security professionals. Infosec has several distinct approaches. Infosec IQ offers precise training to all employees. It combines anti-phishing simulation, general security awareness CBT and role-based training into a 12-month, best-practices program with a default curriculum. Infosec Skills focuses on skill and career advancement of IT professionals, whereas Infosec Flex assists IT professionals through boot camp learning environments. Infosec offers the largest and most diverse variety of CBT security awareness topics for general awareness and for role-based and security professionals, coupled with pre-engagement surveys, preassessments, quizzes and survey assessments. Infosec has expanded its target market outside large/enterprise companies and is now competing heavily for the SMB market share. Infosec offers a variety of packages and pricing options to meet the unique educational needs of any size organization. Also, Infosec has a “match or exceed” pricing program, allowing it to remain competitive among the more prominent vendors. Content is offered in 32 languages. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 10/30 8/1/2019 Gartner Reprint Strengths ■ Infosec provides high-touch customer service and works with clients and prospects to tailor content for general security awareness training, or for a role-based, industry or IT professional focus. ■ Infosec offers a broad range of security awareness training, meeting most key enterprise needs. It focuses on growing and diversifying its content to offer multiple varieties and flavors for any single topic of learning. Cautions ■ Although language support for training modules and assessments is good, not every Infosec IQ module is localized in every language that may be required by some multicultural enterprises and audiences. ■ To compete with other leaders in this market, Infosec needs to focus on marketing. Infosec has solid recognition in the IT professional training/certification sector. The company needs to continue strengthening its brand in the general awareness space to avoid being prematurely left off customer shortlists. Inspired eLearning Inspired eLearning (IeL) continues to provide a large portfolio of current, role-based turnkey content and phishing simulations through its Security First and PhishProof products. The vendor’s training content is available in user-friendly packages — Select, Preferred and Elite — that adapt as organizational needs change and mature. These product packages can be tailored to fit an organization’s needs. Inspired eLearning also offers HR and Compliance training programs. The vendor offers a solid assessment tool, Cybersecurity Quotient (CyQ), which enables customers to identify and quantify high-risk areas in the organization. The CBT portfolio is augmented with internal marketing tools, such as newsletters, security alerts and reminders, and instructional design and customization services. Multilingual support across multiple media is available for diverse employee populations. The Inspired eLearning mobile app enables your audience to download content directly to their mobile devices, so learners can complete training on their own schedule. Inspired eLearning has more than 15 years of experience using proven adult-learning principles and immersive educational experiences to prepare learners to defend themselves and their organizations from an ever-evolving cyberthreat landscape. Content is offered in more than 40 languages. Strengths https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 11/30 8/1/2019 Gartner Reprint ■ Inspired eLearning continues to innovate in new security awareness education paradigms, such as virtual reality and mobile learning. These enhancements boost learner engagement and the ability to recall important security tactics to identity and report security threats to your organization. ■ Inspired eLearning’s Security First offering is its most channel-friendly offering. Its accelerated onboarding, automated program execution, and systemic generation of roll-up and role-based reporting make it easier to track learner progress and security-risk value across single or multiple organizations. Cautions ■ The lack of a physical presence beyond the U.S. may be an obstacle for clients based outside North America. Clients should investigate how multilanguage support can enhance service. ■ Inspired eLearning needs to focus on extending its reach, finding new ways to position and differentiate itself from market leaders, and making a favorable impact on consumers through engaging and interesting marketing techniques. Junglemap Junglemap’s NanoLearning method is based on a process of delivering a three-minute digital security lesson to employees every three weeks, all year round. This is designed to transfer knowledge in small-enough modules to align with today´s user impatience and attention spans, mobile workstyles, and to create and maintain organizational alertness and dialogue around information security throughout the year. Junglemap offers a portfolio of separate processes for employees, managers, executives and board members for businesses, the public sector and healthcare. With the increased demands of leadership and digital transformation pressing on business leaders, Junglemap addresses this group’s need for fundamental and special track learning in security matters. Junglemap has a large client base in Europe and enjoys a growing client base in the U.S. Content is offered in more than 44 languages; agency and AI-based translation services are available. Strengths ■ NanoLearning has been proved to be highly effective in creating lasting organizational awareness. ■ End-user satisfaction with the NanoLearning method is high, because it requires little time to complete any given module, and modules are spread out in time. Cautions ■ Junglemap is a nascent entry in the U.S. market. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 12/30 8/1/2019 Gartner Reprint ■ To compete with the leaders in this space, Junglemap needs to market the integral benefits of its approach and service in this space. KnowBe4 KnowBe4 continues to be the fastest-growing vendor in this space in revenue and customer count. KnowBe4 markets anti-phishing behavior management, coupled with general security awareness CBT offered through a variety of comprehensive packages. Its most popular offering level, Diamond, provides access to the industry’s largest library of general security awareness content, as a result of numerous acquisitions and partnerships. KnowBe4 is skilled at acquiring and partnering with content providers, enabling it to offer its clients the most engaging and innovative security awareness content available through its Modular Store (ModStore) Recently, through a partnership with Twist & Shout Media, KnowBe4 has created a new story-driven episode series called The Inside Man, providing a movielike experience for learners. KnowBe4 continues to offer several free tools to help clients proactively understand and, in turn, secure their footprint from mischief and missteps. KnowBe4’s newest product, PhishER, allows incident response teams to evaluate and automate the management of suspected phishing emails reported via the vendor’s “Phish Alert Button.” This helps create a closed-loop ecosystem in which trained employees can report suspected threats, and the incident response team is equipped with the tools necessary to evaluate and respond to the threats. KnowBe4’s platform also has capabilities to improve employee resistance to different kinds of social engineering attacks through various forms of penetration tests. Content is offered in 35 languages. Strengths ■ KnowBe4 has an aggressive M&A strategy. It invests heavily in its company, uses the parts of the acquired companies to improve what it offers and, as a result, is winning customers with its continued focus on innovation. ■ KnowBe4 maintains an aggressive pricing structure that’s attractive to any size company looking to purchase security awareness and anti-phishing behavior management products. It often offers the most-competitive quotes. Cautions ■ Clients should ensure that account services staff are familiar with relevant awareness topics and practices for a more complete service experience. ■ Most clients will need guidance to effectively build content into their core curricula. As KnowBe4’s content library continues to grow, the company should find new ways to organize it to ensure it is more user-friendly for admins to provide the most value to their clients. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 13/30 8/1/2019 Gartner Reprint MediaPRO MediaPRO provides all the components needed to run a complete security awareness program. MediaPRO TrainingPacks combine highly flexible, out-of-the-box courses with internal marketing and reinforcement tools, reports, anti-phishing campaigns and knowledge assessments. Its CourseFlex technology enables the automatic personalization of courses to deliver only the training that each learner needs. Enterprise customers have noted that content can be customized easily and quickly. MediaPRO also provides Human Risk Scorecards measured across eight categories to understand the readiness level of each employee. MediaPRO regularly adds to and updates content to align with risks and use cases. Content is interactive, with a nearly continuous assessment of skills and knowledge acquisition. MediaPRO’s phishing and knowledge assessment services are integrated with its CBT and LMS, enabling dynamic delivery of CBT topics, based on user behavior and assessment responses. Content is offered in 21 languages, and translation services are available. Strengths ■ MediaPRO offers one of the most flexible integrated content products in this market. This enables clients to simulate course customization and creation capabilities in an easy, drag-and-drop environment. ■ MediaPRO’s ability to assign a risk score to each employee enables organizations to understand the gaps across their enterprises and remedy them. Cautions ■ MediaPRO’s phishing simulation tool is not as feature-rich as some other leading offerings, and those whose primary focus is phishing would be wise to look elsewhere. ■ The MediaPRO brand name is not as well-known as some of its competitors, and, thus, it may be prematurely dismissed from customer shortlists. It needs to ramp up its marketing efforts to be more competitive with the other market leaders. MetaCompliance The cornerstone of the MetaCompliance approach to security awareness is threefold: keeping your staff safe online, securing your digital assets and protecting your corporate reputation. The MetaCompliance approach is anchored on bite-size, nanolearning awareness modules offered on a variety of topics found in its Elements Library. MetaCompliance encourages customers to build their own curricula to create highly focused learning playbooks for their audiences. This approach is available for executives and senior business leaders. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 14/30 8/1/2019 Gartner Reprint Strengths ■ The MetaCompliance approach to learning, increasing frequency, while decreasing time spent in training, is continuously surfacing as a need for all enterprises. ■ The library of user-friendly, entertaining, CBT nanolearning provides a good umbrella of topics most requested by Gartner clients. Cautions ■ MetaCompliance does not enjoy the same level of brand awareness as many of its competitors. As a result, it may be prematurely dismissed from customer shortlists, simply because it is not a known name. It needs to reconsider its strategy in terms of geography, competition, differentiators and pricing. ■ Organizations seeking a wide variety of CBT presentational formats and styles in multiple languages may find MetaCompliance’s content limiting. Expanding content offerings into different versions and flavors would be beneficial to a broader audience and reach. PhishLabs The PhishLabs training approach is anchored on increasing the frequency of training engagements, while maximizing how adult learners consume information in small, bite-size portions. PhishLabs’ approach is engaging and focused. Its programs are offered in three bundles: Anti-Phishing MicroLearnings, General Security MicroLearnings and Phishing Simulations. PhishLabs has a laserlike focus on the nanolearning space, offering a level of experience and a package of offerings that fits well with the needs of clients that are looking for this type of learning. PhishLabs is also one of the only providers that offers a fully managed service. Content is offered in 11 languages. Strengths ■ PhishLabs’ approach to learning — increasing frequency, while decreasing time spent in training — is continuously surfacing as a need for all enterprises. ■ The library of user-friendly, entertaining CBT nanolearning provides a good umbrella of topics most requested by Gartner clients. Cautions ■ PhishLabs does not enjoy the same level of brand awareness as many of its competitors. As such, it may be prematurely dismissed from customer shortlists, simply because it is not well-known. It needs to reconsider its strategy in terms of geography, competition, differentiators and pricing. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 15/30 8/1/2019 Gartner Reprint ■ Organizations seeking a wide variety of CBT presentational formats and styles in multiple languages may find PhishLabs content limiting. Expanding content offerings into different versions and flavors would be beneficial to a broader audience and reach. Proofpoint Cybersecurity company Proofpoint acquired Wombat Security in March 2018. The product is marketed under Proofpoint Security Awareness Training. It can be sold stand-alone or in combination with other Proofpoint products. Proofpoint Security Awareness Training provides innovative security education and behavior management CBT and continues to be a market leader. In addition to a portfolio of CBT on traditional security awareness topics, Proofpoint provides effective phishing training and suspicious email reporting, with an automated remediation product. Proofpoint provides extensive services in training needs analysis, content development, CBT customization and security essentials training for executives and other essential vertical/role-based positions. Proofpoint provides guidance on curriculum scheduling, based on continuous assessment, refinement, targeted education and behavioral metrics to optimize the retention of learned behaviors. Proofpoint has a solid approach to learning anchored on learning science principles. Through its Continuous Training Methodology, learners are provided a flexible, on-demand format that minimizes disruptions to their daily work routines. Proofpoint also keeps adding to its series of clever awareness video campaign as a companion to its current CBT offering to show the “lighter side” of security awareness. Proofpoint has been focused on further expansion of its global footprint, with more penetration into Europe and Asia. It has also taken aim at the SMB market, bundling and pricing its products to deliver enterpriselike service at a small-business price. Content is translated and localized in 37 languages. Strengths ■ The company’s continuing innovation in support of measurable security performance also supports the customers’ need to enhance risk mitigation based on intelligence from the changing threat landscape and through the management of user behavior. ■ Proofpoint is well-suited to enterprises of all sizes looking to deploy broad-based security awareness and anti-phishing training, with a consistent corporate look and feel that uses adultlearning principles applicable across a variety of learning styles. Cautions ■ Organizations looking for a wide variety of CBT presentational formats and styles may find Proofpoint’s content limiting. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 16/30 8/1/2019 Gartner Reprint ■ Proofpoint’s pricing remains relatively high, compared with many competitors, depending on the bundle being purchased and the length of agreement. SANS Institute SANS Institute declined to provide data for use in the 2019 Magic Quadrant. SANS continues to be a major force in the training market for IT security professionals, offering wellregarded certification and degree programs, such as the Global Information Assurance Certification (GIAC). The SANS Security Awareness CBT portfolio is extensive, offering bite-size video modules and a focus on general security awareness, specific vertical industries, regulatory environments and roles, including senior leadership. With its extensive customer base in IT professional training and security awareness, SANS offers a community approach to learning and information sharing. It provides a practical understanding of what other companies are experiencing and how they are remedying security awareness gaps. The offering includes anti-phishing behavior management functionality for social engineering testing in a flexible product that supplies security awareness out-of-the-box for organizations just beginning their programs. It can support individual and varied learner needs associated with intermediate-tomature security awareness programs. Content is offered with full voice-overs in 31 languages. Strengths ■ A deep knowledge of IT security management, combined with adult-learning psychology and design principles, is reflected in the company’s content and delivery of materials. ■ The large CBT portfolio covers the topics and roles that Gartner clients commonly request, using formats such as videos, games and quizzes. Cautions ■ Many organizations recognize the SANS brand as offering technical training and may have concerns that its end-user training would be over the heads of less technologically oriented staff. We encourage clients to evaluate the products, regardless of this market sentiment. ■ SANS’s fundamental approach to CBT involves video-based modules. Organizations looking for a wide variety of CBT options that are not delivered via video may decide to complement SANS video CBT with other training content. The vendor has shared plans with Gartner to diversify its content, but nothing has been available in the market to date. Security Innovation https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 17/30 8/1/2019 Gartner Reprint Security Innovation provides a diverse set of application security and IT security training content, including traditional CBT and videos. Industry-specific packaging is available for healthcare and government, so customers easily assign the right curricula to their audiences. Its library of supplemental materials, Security Awareness 365, includes tip sheets, posters, lunch-and-learn activities, customer care assets, securing-your-home information, and immersive and scenario-based learning modules. These are all offered in a variety of styles with full animation and narratives in local languages. Security Innovation also offers customization at the course and program levels and consulting services customers often bundle. Security Innovation continues to advance cyber-range learning into general awareness through its CMD+CTRL Cyber Range offering. This product supports the learn-by-doing approach, providing the learner a realistic experience that allows staff to think like attackers, while competing in a gamified, real-world environment. Content is offered in 16 languages. Strengths ■ Security Innovation’s use of diverse media, mixed durations, interactivity and changing visuals in modules enhances the uptake and retention of new skills. Its ability to continuously innovate with new learning approaches is beneficial to clients. ■ The vendor’s holistic life cycle approach to training management promotes close alignment with enterprise risks and performance gaps and provides adults with a comprehensive experience. Cautions ■ Security Innovation does not enjoy the same level of brand awareness as many of its competitors. As such, it may be prematurely dismissed from customer shortlists simply because it is not wellknown. It needs to reconsider its strategy in terms of geography, competition, differentiators and pricing. ■ When compared with other market leaders, the range of end-user-awareness topics covered by Security Innovation may become limited as its program matures and looks to support varied and deeper learning content. Terranova Security Terranova Security empowers its clients to cultivate a security mindset and culture with its proven Terranova security awareness five-step framework. Terranova provides a large, diverse library of CBT modules and supporting materials focused on general security, privacy and compliance awareness supporting the “knowledge, support, motivation” behavior change theory. Its content is packaged for vertical and role, so that customers can minimize the guess work when trying to build the right https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 18/30 8/1/2019 Gartner Reprint curriculum to meet their needs. It also introduced a train-the-trainer module, for customers new to operationalizing a security awareness program or new to leading this kind of training role. Interactive content is supported by an abundance of internal marketing materials, as well as by assessment and customization services. Terranova also provides anti-phishing simulation platform and training. Preassessments and postassessments are available, and employee skills retention is tested in each CBT module. Terranova provides strong support prior to implementation to enable clients to select appropriate content for different user populations, and to develop effective communication and deployment strategies. Terranova delivers its entire content library in the most languages (including narration) of any vendor in this research, meeting the multilingual and multicultural needs of most global enterprises. Content is offered in 40 languages. Strengths ■ Terranova supports each customer in a consultative manner, ensuring that proper customization of content is achieved, and the learning paths are clearly defined and well-suited to the organization’s selected roles and groups of learners. ■ Lessons are highly interactive, graphic-rich and instructionally designed for trainee engagement and learning. Terranova has added gamification to increase user engagement and motivation. Terranova added a course builder into its security awareness management platform (its LMS), enabling targeted, role-based and modular awareness campaigns. Customers can build their programs by integrating different content formats, including courses, modules, micro learning and nanolearning. Cautions ■ Terranova needs to continue its focus on brand awareness and to drive its marketing efforts. In addition, growing its sales force is paramount to meeting its overall ability to grow its brand. ■ Terranova is a well-known brand in the Canadian market, with an impressive footprint in the U.S. It will need to grow its global recognition by continuing to expand its international customer base. Vendors Added and Dropped We review and adjust our inclusion criteria for Magic Quadrants as markets change. As a result of these adjustments, the mix of vendors in a Magic Quadrant may change over time. A vendor’s appearance in a Magic Quadrant one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may reflect a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor. Added https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 19/30 8/1/2019 Gartner Reprint ■ PhishLabs — now meets the criteria ■ MetaCompliance — now meets the criteria Dropped ■ Sophos — no longer meets the criteria Inclusion and Exclusion Criteria Gartner’s view of the market emphasizes transformational technologies or approaches delivering on the future needs of end users. It is not focused only on the market as it is today. Gartner defines “security awareness CBT” as the delivery of a standardized set of interactive security education and/or security behavior management content to a trainee/user via an endpoint computing device (e.g., a laptop, desktop or tablet). Training content focuses on general users of IT, not security or IT professionals. Although customization of this content may be provided as a service, the essential element is a catalog of core-training content. Security education CBT excludes products delivered through vendor personnel on-site (e.g., live training sessions), content delivered to trainees through noncomputing mechanisms (e.g., printed manuals or newsletters), and services that produce novel, unique CBT products for single clients. Inclusion Criteria The inclusion criteria represent the specific attributes necessary for inclusion in this research. To qualify for inclusion in the 2019 “Magic Quadrant for Security Awareness Computer-Based Training,” vendors must: ■ Compete in the market for security education CBT, as defined above. ■ Demonstrate a competitive presence in end-user organizations. ■ Demonstrate ability to provide training content in English and 10 other languages. ■ Provide a diverse set of security content/curriculum. ■ Provide trainee performance assessments against defined learning outcomes. ■ Offer, through a vendor-owned technology or through a partnership, an automated social engineering simulation tool — such as anti-phishing behavior management — for measuring current behavior and promoting behavior change. ■ Demonstrate security education CBT revenue of more than $5 million and a security education CBT customer count of more than 300. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 20/30 8/1/2019 Gartner Reprint ■ Be the original developer of the product. Although we examine strategic partnerships as part of our analysis, we do not include resellers in our research. Other Vendors of Note The CBT market is dynamic. Gartner is continually being briefed by new vendors looking to meet the market demand for high-quality and innovative CBT content, delivery mechanisms or adjacent functionality. Although not included in this year’s Magic Quadrant, the vendors and products listed below are worthy of note and may support one or more use cases well: ■ AwareGO ■ BeOne Development ■ Circadence ■ Cyware ■ Digital Defense ■ ERMProtect ■ Habitu8 ■ Lunarline ■ Mimecast ■ NINJIO ■ Restricted Intelligence ■ Secure Mentem ■ Security Mentor ■ Sophos ■ ThreatAdvice Evaluation Criteria Ability to Execute Product or Service: This criterion includes service and customer satisfaction in deployments of the security education CBT. Execution considers factors involved in the selling, deployment and support https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 21/30 8/1/2019 Gartner Reprint of the education product. Strong execution indicates that a company has clearly demonstrated that its product has been successfully deployed and maintained, and that the company wins a large percentage of engagements in competition with other vendors. Companies that execute strongly generate persistent and pervasive brand awareness and loyalty among Gartner clients, and they are mentioned regularly in inquiries with Gartner analysts. Execution is not strongly correlated with company size or market share, although these factors can influence a company’s ability to execute over time. Although sales success is a factor in the Ability to Execute, continuing innovation and quality of the product portfolio have greater impact. Key features are weighted heavily. These include multiple modules of software, content that covers topics commonly raised by Gartner clients, customization of content, interactive learning experiences, content translations and support for multiple types of endpoints. Support is determined by quality and breadth. Overall Viability: This criterion includes overall financial health, prospects for continuing operations, company history and demonstrated commitment to the security education market. All vendors were asked to disclose comparable market data, such as revenue, quantity of customers, quantity of trainees and competitive wins. Sales Execution/Pricing: Gartner evaluates the company’s pricing, deal size and installed base. This analysis includes the company’s sales and distribution operations and relationships. Pricing is compared in terms of typical deployment models. The robustness of sales channels is a strong factor. Market Responsiveness/Record: Gartner’s analysis focuses on the company’s ability to support changing client requirements for security performance management. Marketing Execution: This criterion includes competitive visibility in client RFPs and competitive visibility with other vendors. The prominence of product innovations in the market is a key factor, as are pricing innovations. Support for multiple endpoint platforms is heavily weighted, as is the depth of support for customization of content and structure of the product. Customer Experience: Given the culture-specific and subjective nature of training effectiveness, this factor is heavily weighted in our analysis. Customer satisfaction throughout the client-vendor relationship is examined. Operations: The experience and track record of company management in training design/development and the security marketplace are critical factors. Effective training products can be developed and marketed by small organizations. As a result, this factor focuses on the quality of staffing, rather than the quantity of the personnel. Table 1: Ability to Execute Evaluation Criteria Evaluation Criteria https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb Weighting 22/30 8/1/2019 Gartner Reprint Evaluation Criteria Weighting Product or Service High Overall Viability Medium Sales Execution/Pricing High Market Responsiveness/Record High Marketing Execution Medium Customer Experience High Operations Low Source: Gartner (July 2019) Completeness of Vision Market Understanding and Marketing Strategy: Gartner assesses these factors via interactions with vendors, feedback from Gartner customers, and direct interactions with vendor products and materials. We evaluate the vendor’s proven ability to anticipate market changes and lead customers to optimal performance. We also examine the company’s understanding of and commitment to the security education market. Sales Strategy: This criterion includes customer relationship management (CRM) before purchase, as well as during and after deployment of the product. Companies need to demonstrate an understanding of the various decision makers and influencers in client organizations for security education products. Channel and third-party ecosystem strategies also apply. Offering (Product) Strategy: This factor focuses on a vendor’s product roadmap, current product features, variety and volume of content types, and product performance. Integration of the CBT product with other systems and capabilities — for example, LMS integration and LMS as a service — is also examined. Strong emphasis is placed on vendor support for reporting mechanisms that provide credible evidence of trainee progress, as well as improvement of security performance in the context of defined learning outcomes. Business Model: This criterion includes R&D spending, as well as the vendor’s approach to developing new capabilities and features. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 23/30 8/1/2019 Gartner Reprint Vertical/Industry Strategy: Although this Magic Quadrant is primarily focused on general end-user security education, training for security and data-handling requirements aligned with specific verticals/industries are considered. Innovation: This factor is heavily weighted and focuses on innovation in the core product and supporting services and products. Geographic Strategy: This Magic Quadrant is global in scope, but many vendors demonstrate the strongest performance in their home geographies — for example, U.S. vendors perform best in North America. As a result, our analysis closely examines vendors’ ability to support geographic markets beyond their home territories. Table 2: Completeness of Vision Evaluation Criteria Evaluation Criteria Weighting Market Understanding High Marketing Strategy Medium Sales Strategy Medium Offering (Product) Strategy High Business Model Low Vertical/Industry Strategy Medium Innovation High Geographic Strategy Medium Source: Gartner (July 2019) Quadrant Descriptions Leaders The security education CBT Leaders quadrant is composed of vendors that: ■ Provide products that are a good match to market requirements ■ Have been the most successful in building a customer base and revenue stream in the CBT market ■ Have relatively high viability (due to CBT revenue) https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 24/30 8/1/2019 Gartner Reprint In addition to providing CBT that is a good match to customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. They typically have relatively high market share and/or strong revenue growth and provide a range of CBT capabilities that target education and behavior management. Leaders have a demonstrable track record of content revision and expansion to meet market requirements. They have demonstrated positive customer feedback for effective CBT and related services, as well as focusing intently on anticipating market needs and evolving accordingly. Challengers The Challengers quadrant includes vendors that have a sustainable customer base and revenue, proven market relevance and adaptability, and products that meet most market requirements. Vendors in this quadrant typically have strong execution capabilities, as evidenced by financial resources, significant sales, customer counts and brand presence garnered from the company as a whole or from other factors. However, Challengers have not demonstrated as rich a capability or track record for CBT offerings as vendors in the Leaders quadrant. Visionaries The Visionaries quadrant is composed of vendors providing CBT products that are good functional matches to general security education market requirements; however, these vendors have a lower Ability to Execute score than the Leaders. This is typically due to a smaller presence in the market than the Leaders, as measured by installed base, revenue size or growth, a smaller overall company size, or general viability. Visionaries may also be vendors that have specifically chosen to focus with excellence on an innovative subset of market needs. Niche Players The Niche Players quadrant is composed primarily of smaller vendors providing security education CBT that matches specific security education use cases, which are a subset of CBT market requirements. Niche Players focus on a particular segment of the client base, or a more limited product set. An ability to outperform or innovate may be affected by this narrow focus. Vendors in this quadrant may have a small installed base, or they may be limited, according to Gartner’s criteria, by a number of factors. These factors may include limited investments or capabilities, a geographically limited footprint, or other inhibitors to providing a broader set of capabilities to enterprises now and during the 12-month planning horizon. Inclusion in this quadrant does not reflect negatively on the vendor’s value in the more narrowly focused service spectrum. Context The security education CBT market continues to be a rapidly growing market focused on delivery of content for end-user security awareness. The market is evolving as it looks to provide demonstrable benefit to organizations, rather than just being a regulatory compliance “check box.” Innovations currently focus on: https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 25/30 8/1/2019 Gartner Reprint ■ Artificial intelligence (AI) offering individualized and personalized learning experiences that mirror learning styles, increasing consumption and retention of critical information ■ Behavioral intervention (which began with anti-phishing behavior management toolsets and is evolving into other integrations with more-traditional security controls) ■ Wide, diverse content sets, styles and materials to support multiple learner contexts ■ Robust LMS platforms that enable content assignment, as well as metrics reporting ■ Support for large sets of languages to enable global delivery of content ■ Intersection with threat intelligence, EDR and incident response to enable tailored, context relevant training/testing content, as well as the ability to quickly analyze reported/suspected phishing emails and determine their risk The structure and content of products remain dynamic in response to changing threats and employee behaviors. Continual changes in the devices that workers use and the locations where work is conducted are forcing organizations to influence employees’ security behavior and improve their security performance in workplaces. This ongoing change in the digital workplace erodes the efficacy of static education programs, driving enterprises to seek regular updates and improvements to the structure and focus of security education. Demand for innovative products that drive validated improvement in security performance is increasing, as is the demand for robust training performance metrics and reporting. Market Overview Market growth in security education continues to be driven by threats to the enterprise, such as hackers aiming to exploit employees through phishing attempts, leading to installed malware or stolen credentials. There is increasing recognition that relying solely on technology to secure an organization’s critical assets is not enough; therefore, educating employees on the various techniques used by bad actors can improve the overall security posture and reduce risks. Continuous, drastic changes with respect to privacy regulations have end-user organizations requiring further education for employees as to why policies and procedures must be followed and what the risks are to the organization. Employees must recognize the potential for reputational and, more seriously, financial damage, should a breach occur. The combination of increased risks and a lack of internal expertise pushes many CISOs to seek products in the market that are capable of producing measurable improvements in employee security behavior. To support security objectives, employees need skills, knowledge and motivation. Security education focuses on developing secure employees who, in turn, enable security performance, follow internal policies and procedures, and adhere to regulatory compliance. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 26/30 8/1/2019 Gartner Reprint This Magic Quadrant focuses on the portion of the overall security education market that is most often discussed by Gartner clients: security education delivered to employees via digital endpoints. Within that context, market growth is extremely robust. Evidence The analysis in this document is based on information from a number of sources: ■ Gartner customer inquiries and information sharing related to security awareness CBTs ■ Gartner customer inquiries and information sharing related to security awareness program development and trends ■ Analyst interactions with Gartner customers via inquiries and meetings ■ Survey of security awareness CBT vendors ■ Survey of security awareness CBT reference customers Note 1 Anti-Phishing Behavioral Conditioning A number of vendors provide products that focus on reducing the frequency with which employees click on URLs in phishing emails. Although each vendor provides a unique product, the basic approach is the same: ■ Phishing emails are sent to employees. ■ Employees who click on the URLs therein are immediately pushed into a CBT session. ■ Click rates and refusals to click on URLs are recorded for longitudinal trend analysis. This approach has proved to be effective at diminishing the success of phishing attacks. By tightly coupling the clicking on URLs with participating in CBT, these products are able to provide valid evidence of a causal correlation between CBT participation and behavior change. In turn, this provides support for claims of positive ROI from such products. Note 2 Calculating Market Size for Security Awareness CBT The revenue projections for vendors rated in this Magic Quadrant account for approximately $451 million for 2019. The $660 million anticipated revenue for 2019 is calculated by looking at the combined revenue for the vendors tracked as part of the Magic Quadrant process. We then added an https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 27/30 8/1/2019 Gartner Reprint additional 30% to account for other vendors that are not tracked/rated as part of this process, which are small/regional vendors, or are unknown to us. Evaluation Criteria Definitions Ability to Execute Product/Service: Core goods and services offered by the vendor for the defined market. This includes current product/service capabilities, quality, feature sets, skills and so on, whether offered natively or through OEM agreements/partnerships as defined in the market definition and detailed in the subcriteria. Overall Viability: Viability includes an assessment of the overall organization's financial health, the financial and practical success of the business unit, and the likelihood that the individual business unit will continue investing in the product, will continue offering the product and will advance the state of the art within the organization's portfolio of products. Sales Execution/Pricing: The vendor's capabilities in all presales activities and the structure that supports them. This includes deal management, pricing and negotiation, presales support, and the overall effectiveness of the sales channel. Market Responsiveness/Record: Ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the vendor's history of responsiveness. Marketing Execution: The clarity, quality, creativity and efficacy of programs designed to deliver the organization's message to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This "mind share" can be driven by a combination of publicity, promotional initiatives, thought leadership, word of mouth and sales activities. Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups, service-level agreements and so on. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure, including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Completeness of Vision Market Understanding: Ability of the vendor to understand buyers' wants and needs and to translate those into products and services. Vendors that show the highest degree of vision listen to and understand buyers' wants and needs, and can shape or enhance those with their added vision. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 28/30 8/1/2019 Gartner Reprint Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the website, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling products that uses the appropriate network of direct and indirect sales, marketing, service, and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: The vendor's approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature sets as they map to current and future requirements. Business Model: The soundness and logic of the vendor's underlying business proposition. Vertical/Industry Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including vertical markets. Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. Geographic Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market. © 2019Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. It consists of the opinions of Gartner's research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see "Guiding Principles on Independence and Objectivity." About Careers Newsroom Policies Site Index https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb IT Glossary Gartner Blog Network Contact Send Feedback 29/30 8/1/2019 Gartner Reprint © 2018 Gartner, Inc. and/or its Affiliates. All Rights Reserved. https://www.gartner.com/doc/reprints?id=1-1OC8XZ64&ct=190731&st=sb 30/30