| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | ||||||||||||||||||||||||||
2 | COMPARISON FRAMEWORK | PRODUCT A | PRODUCT B | PRODUCT C | PRODUCT D | PRODUCT WEIGHT | ||||||||||||||||||||
3 | AREA | DIMENSION | EVALUATION ASPECTS | SCORING COMMENTS | COMMENTS | SCORE | WEIGHTED SCORE | COMMENTS | SCORE | WEIGHTED SCORE | COMMENTS | SCORE | WEIGHTED SCORE | COMMENTS | SCORE | SCORE WEIGHTED | ||||||||||
4 | BACKGROUND INFO AND TRACK-RECORD | Short company description | A brief introduction on the organization behind the solution. | not evaluated | ||||||||||||||||||||||
5 | Key verticals / industries / business types | Is the solution focused on certain verticals or industries? Is the solution a better fit for organizations of a certain size? | ||||||||||||||||||||||||
6 | Key client's who are using the solution? | Examples of key clients or case-study references. | ||||||||||||||||||||||||
7 | Solution components | What key components does the solution consist of? | ||||||||||||||||||||||||
8 | ||||||||||||||||||||||||||
9 | PRODUCT ASSESSMENT | Technical quality | Service availability - what are the key communicated service availability metrics? | 3 - best in class; 2 - good; 1 - weaker than competition; 0 - unsatisfactory | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||
10 | Scalability - how easy is it to expand the service? | 3 - best in class; 2 - good; 1 - weaker than competition; 0 - unsatisfactory | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
11 | Configuration and maintenance - what resources and time allocation is required to configure and maintain the solution? | 3 - best in class; 2 - good; 1 - weaker than competition; 0 - unsatisfactory | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
12 | Product structure and integrity | Are 1) identity management 2) device management 3) network parts addressed by the same solution (or addressed by a combination of product + 3rd party services)? | 3 - single solution; 2 - single solution with minor integrations; 1 - combination of third party solutions; 0 - no original product offered | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
13 | ||||||||||||||||||||||||||
14 | ORGANIZATION-FIT | Organizational use-case | How well does the solution fit our essential organizational use-case? (remote resource and application access; remote work security, etc.) | 3 points - fits really well; 2 - somewhat fits; 1 - does not fit; 0 - is incompatible | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||
15 | Competences and resources | What competences / roles and additional resources does the solution require? | 3 points - does not require additional resources; 2 - requires minor resource additions; 1 - requires substantial additional resources; 0 - requires critical resources | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
16 | Maturity level | Does the solution fit current company's cybersecurity maturity level? | 3 points - fits very well; 2 - somewhat fits; 1 - is not a good fit; 0 - does not fit at all | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
17 | Integrations | How easy is it to integrate the new solution within our existing infrastructure? | 3 points - simple; 2 - somewhat simple; 1 - complicated; 0 - too complicated | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
18 | ||||||||||||||||||||||||||
19 | FUNCTIONALITY OVERVIEW | Cloud gateways | PROXY CONNECTIONS | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||
20 | MULTI-SITE CONNECTIONS | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
21 | SMART REMOTE ACCESS (Cloud LAN) | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
22 | MULTIPROTOCOL SUPPORT | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
23 | other | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||||
24 | other | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||||
25 | other | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||||
26 | Endpoints | Multilayer authentication | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
27 | Support for all platforms | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
28 | Encrypts and moves traffic to the cloud gateways | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
29 | Endpoints for IoT | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
30 | Device security posture | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
31 | DNS filter by categories | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
32 | other | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||||
33 | other | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||||
34 | other | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||||
35 | Network filtering | nDPI | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
36 | CUSTOM DNS | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
37 | THREAT BLOCK | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
38 | other | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||||
39 | other | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||||
40 | Administration | Self-service portal | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
41 | Ability to create teams for network segmentation | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
42 | Assign separate cloud gateways for separate access | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
43 | Reporting module | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
44 | other | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||||
45 | other | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||||
46 | ||||||||||||||||||||||||||
47 | FUNCTION RELATED BENEFITS | Admin panel | low tech skills required for use | 3 - best in class; 2 - good; 1 - weaker than competition; 0 - unsatisfactory | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||
48 | Cloud gateways | easy scalability | 3 - best in class; 2 - good; 1 - weaker than competition; 0 - unsatisfactory | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
49 | Admin panel | easy access policy setup | 3 - best in class; 2 - good; 1 - weaker than competition; 0 - unsatisfactory | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
50 | ||||||||||||||||||||||||||
51 | CREDIBILITY | Standards and compliance | ISO 27001 standard | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||
52 | SOC2 | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
53 | HIPAA | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
54 | GDPR | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
55 | PCI-DSS | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||||
56 | other | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||||
57 | ||||||||||||||||||||||||||
58 | SUPPORT AND SERVICES | Support quality | Is the support responsive and does it provide quality technical level input and guidance? | 3 - best in class; 2 - good; 1 - weaker than competition; 0 - unsatisfactory | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||
59 | Account management | Does the company provide account management services? | 3 - fully implemented; 2 - in development; 1 - planned; 0 - not implemented or planned | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
60 | Product documentation | Is the product documentation sufficient? | 3 - best in class; 2 - good; 1 - weaker than competition; 0 - unsatisfactory | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
61 | ||||||||||||||||||||||||||
62 | PRICING | Pricing model attractiveness | Does the pricing model offered for the corresponding product functionalities meet the organization's needs? | 3 - best in class; 2 - good; 1 - weaker than competition; 0 - unsatisfactory | 0 | 0 | 0 | 0 | 1 | |||||||||||||||||
63 | Additional pricing policies | Are add-on policies fair and attractive? | 3 - best in class; 2 - good; 1 - weaker than competition; 0 - unsatisfactory | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
64 | Pricing flexibility | How easy is it to upgrade or downgrade payment plans? | 3 - best in class; 2 - good; 1 - weaker than competition; 0 - unsatisfactory | 0 | 0 | 0 | 0 | 1 | ||||||||||||||||||
65 | ||||||||||||||||||||||||||
66 | TOTAL SCORE | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||
67 | ||||||||||||||||||||||||||
68 | ||||||||||||||||||||||||||
69 | ||||||||||||||||||||||||||
70 | ||||||||||||||||||||||||||
71 | ||||||||||||||||||||||||||
72 | ||||||||||||||||||||||||||
73 | ||||||||||||||||||||||||||
74 | ||||||||||||||||||||||||||
75 | ||||||||||||||||||||||||||
76 | ||||||||||||||||||||||||||
77 | ||||||||||||||||||||||||||
78 | ||||||||||||||||||||||||||
79 | ||||||||||||||||||||||||||
80 | ||||||||||||||||||||||||||
81 | ||||||||||||||||||||||||||
82 | ||||||||||||||||||||||||||
83 | ||||||||||||||||||||||||||
84 | ||||||||||||||||||||||||||
85 | ||||||||||||||||||||||||||
86 | ||||||||||||||||||||||||||
87 | ||||||||||||||||||||||||||
88 | ||||||||||||||||||||||||||
89 | ||||||||||||||||||||||||||
90 | ||||||||||||||||||||||||||
91 | ||||||||||||||||||||||||||
92 | ||||||||||||||||||||||||||
93 | ||||||||||||||||||||||||||
94 | ||||||||||||||||||||||||||
95 | ||||||||||||||||||||||||||
96 | ||||||||||||||||||||||||||
97 | ||||||||||||||||||||||||||
98 | ||||||||||||||||||||||||||
99 | ||||||||||||||||||||||||||
100 | ||||||||||||||||||||||||||