Gartner Blog Network

Different Security Horses for Different Security Courses

by John Pescatore  |  October 27, 2010  |  Submit a Comment

Last year I took advantage of the Cash for Clunkers program in the US and traded my 1997 pickup truck in for a new station wagon. I looked at Ford, Subaru, Toyota and many other major car manufacturers. I did not look at Bayliner, Boston Whaler, Grady White, Wellcraft or any other major boat manufacturers.

This year I bought a boat – and guess what? I only looked at boat manufacturers, didn’t look at any car manufacturers. Now, I may be narrow-minded – after all, boats and cars are just slightly different forms of transportation… But in general, I’ve found that car makers produce lousy boats and boat companies aren’t all that hot at making cars.

So, I’m always amazed when network infrastructure vendors like Cisco and Juniper build security solutions that try to get us to put their software on our endpoints, and when software vendors like IBM Tivoli or CA acquire and try to sell network security products. These strategies always end badly – it is why the McLobster sandwich and the Nobu Whopper never did well either…

To take this analogy a bit too far, I could have  bought a boat-car instead and saved a boat-load (or car-load)  of money. Of course, that would have given me the worst of both worlds – which is often what happens when infrastructure vendors acquire security companies.


John Pescatore
VP Distinguished Analyst
11 years at Gartner
32 years IT industry

John Pescatore is a vice president and research fellow in Gartner Research. Mr. Pescatore has 32 years of experience in computer, network and information security. Prior to joining Gartner, Mr. Pescatore was senior consultant for Entrust Technologies and Trusted Information Systems… Read Full Bio

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.