Showing posts with label Gartner. Show all posts
Showing posts with label Gartner. Show all posts

Thursday, May 01, 2014

Palo Alto Networks, Check Point top Products in Gartner Magic Quadrant for Enterprise Network Firewalls - 2014


As is probably no big surprise to those in the industry and those purchasing network security products, Palo Alto Networks (PAN) and Check Point had the top rated products in the 2014 Gartner Magic Quadrant for Enterprise Network Firewalls.  The report came out in April.  These are the only two companies in the Leaders Quadrant, with Palo Alto Networks leading on Completeness of Vision and Check Point for Ability to Execute. Fortinet and Cisco were the closest to the in the Challengers quadrant.   The report, ID:G00258296 is available on the PAN web site for those who register. http://connect.paloaltonetworks.com/gartner-mq-2014

Palo Alto Networks pretty much was the originator of the acronym NGFW or Next Generation Firewall, and PAN and Check Point Software Technologies companies compete for many of the same customers. Last year, PAN   introduced their Wildfire infrastructure, enabling the PAN firewall to detect and stop Advanced Persistent Threats (APTs) This is offered to customers via the public cloud or can be deployed as a private cloud.   Gartner also wrote that PAN    was consistently on most NGFW competitive shortlists.  PANS Advanced Persistent Threat Solution   was not among those recently tested by NSS Labs in their April Breach Detection Study.   

Check Point was cited by Gartner as being the market share leader in firewall installed base. They offer an extensive line of security appliances and were also delivered the industry’s first flexible, extensible security architecture, the Check Point Software Blade Architecture.   Check Point’s Anti-Bot Software Blade detects bot-infected machines, prevents bot damages by blocking bot C&C communications. This isn’t a comprehensive Advanced Persistent Threat Solution, but it helps protect the network.

PAN’s product portfolio isn’t quite as extensive Check Point’s,   they do offer a virtualized firewall platform in addition to the more traditional appliance offering, threat subscriptions for URL filtering, and a management platform.  

Fortinet was rated a Challenger by Gartner. They stated Fortinet was “not often beating Leaders in mainstream enterprise selections based on features and vision, nor causing Leaders to react to Fortinet.”

Cisco was rated a Challenger as well.  Gartner didn’t seem them displacing   PAN nor Check Point on the basis of visions or features.  They saw Cisco winning firewall business through channel “execution and “aggressive discounting”.

Juniper Networks completed the trio of companies in the Challenger quadrant.  McAfee was a leader in the Niche quadrant.

Offerings from F5, Arkoon-Netasq, and AhnLab were the furthest down and to the left in the Magic Quadrant.

Check out the complete report.  For an assessment of all sixteen vendors in the report. Some names you’re familiar with may be missing due to consolidation. Gartner also has some brief information on why virtualized firewall penetration is a less than two percent.  “Security-minded enterprises are also rightly skeptical of running firewalls within a hypervisor that is between the threat and the firewall,” according to Gartner. 

 Regarding the Leaders quadrant from the Gartner Magic Quadrant Endpoint report - “A leading vendor isn't a default choice for every buyer, and clients should not assume that they must buy only from vendors in the Leaders quadrant.  Some clients believe that Leaders are spreading their efforts too thinly and aren't pursuing clients' special needs.”

For more details on the Magic Quadrant and how it is created, read “Magic Quadrants and MarketScopes: How Gartner Evaluates Vendors within a Market”.     Sometimes a leader is not the best solution for a particular customer.  Despite that, you will see many   presentations where the vendor uses being in the Leaders quadrant   as a reason to buy from that particular vendor.  Who would have thought that they would do that? www.gartner.com

Some of NSS Labs reports are available at no charge.  www.nsslabs.com

craig kensek

Sunday, March 16, 2014

Just When You Thought the Target Breach Story Was Over. A Tale of Advanced Persistent Threats (APT), FireEye, and Warnings Ignored

In the previous chapter of this adventure, Target CIO Beth Jacob had taken the hit and was going to resign.  Target was going to implement new processes in protecting their network. Prior to this, Target had gone through a number of phases since the attack began in late November – denial, CEO Gregg Steinhafel is  nowhere to be found, “Houston, we’ve got a problem”, “Let’s give customers a ‘we’re sorry’” discount”, CEO is found (finally, some look at a book on crisis management), transparency, free credit watch software for customers, etc.  The Russian hackers involved in this incident were not even very sophisticated with their coding.

Techtarget’s definition of Advanced Persistent Threat – “An advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.  The intention of an APT attack is to steal data rather than to cause damage to the network or organization.  APT attacks target organizations in sectors with high-value information, such as national defense, manufacturing, and the financial industry.”

In the Bloomberg story “Missed Alarms and 40 Million Credit Card Numbers.  How Target Blew It”, the author writes about how Target HAD Advanced Persistent Threat appliances from FireEye (an APT company that went public several months ago for a gazillion dollars (Side note – FEYE’s  market cap was $10 B as of February 14, though their stock has dropped a bit less than 20% from its high).

The malware had completed most of the phases of the hacker’s objective. Credit card numbers were being stored on a Target server as they were swiped on store terminals. All that was left was for the numbers to be transmitted the cyber criminals for subsequent sale to other cybercriminals.  In November and early December, the hackers went about installing the SW that would send the customer info out to staging points, (probably a botnet), and then to Russia.  Busted!  Well. Sort of. FireEye appliances sent an alert to Bangalore. They alerted the people in Minnesota and…  Minnesota did nothing!  Then, the transmittal of ultimately 40 million records began (a nagging question – was there a DLP (Data Loss Prevention), installed on the network?  It wasn’t until mid-December when the Department of Justice got involved, that Target really began investigating.

By the way, the option for the FireEye appliance to  automatically delete malware as soon as it was  detected was turned off.  What’s even more ludicrous is that Symantec’s Endpoint Protection software, also identified the malware.  $61 million spent by Target so far. Lawsuits, Abysmal Q4 profit (down almost 50%).

Read the Bloomberg/Business Week article. It’s quite interesting.  http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data

McAfee this week wrote  that this particular attack  was "Far from 'advanced,' The BlackPOS malware family is an 'off-the-shelf' exploit kit for sale that can easily be modified and redistributed with little programming skill or knowledge of malware functionality.”  If this was the case, this is even more embarrassing for Target and their IT team.  http://www.mercurynews.com/business/ci_25322189/mcafee-report-says-target-cyber-attackers-used-common

Takeaways from this - If your network does not have them.  Look at investing in an APT solution.  Look at investing in a DLP solution. Don’t ignore your security solutions when you get flagged. NSS Labs, Ellen Messmer at Network World, and Lawrence Pingree at Gartner.  www.nsslabs.com , www.networkworld.com , www.gartner.com  have all written about Advanced Persistent Threat vendors. Type “advanced persistent threat” into a Google search and a slew of vendors will show up on the RHS.  

Craig Kensek  - Twitter - ckensek



Thursday, February 20, 2014

Gartner Magic Quadrant for Endpoint Protection Platforms- 2013

 Gartner  has  released  their 2013 Magic Quadrant for Endpoint Protection Platforms,   ID:G00247705.  Five performers are in the Leaders Quadrant.  Their approximate order in the report: McAfee, Symantec, Kaspersky, Trend Micro, and Sophos.  This is a little bit of a switch from 2012 when the order was Symantec, McAfee, Sophos, Kaspersky, and Trend Micro Microsoft, like in the 2012 report, was the only company in the Challenger portion of the grid.   Analysts for the report - Peter Firstbrook, John Girard, and Neil MacDonald.  Congrats to all in this portion of the quadrant.

Probably not so pleased with the report are Threatrack Security, Beyond Trust, and Check Point Software Technologies.  These were    the bottom three in the Niche Players portion of the quadrant.  Beyond Trust was the overall lowest in the quadrant with respect to ability to execute.  Check Point Software  slipped from the Visionary portion of the grid to this quadrant.  Not good.

McAfee continues its assimilation into Intel, who purchased them a couple of years ago.  The McAfee name will disappear and become   Intel Security.  Kaspersky continues their assault on Trend Micro. Sophos is aggressively expanding their business offerings, has revamped their channel program, http://channelnomics.com/2014/02/18/sophos-revamps-simplifies-partner-program/  remaining (and probably will remain)  a business focused security vendor.

The   Gartner Magic Quadrant for Endpoint Protection Platforms report is available for purchase on their website.  Some vendors such as Symantec have it available on their website for those who register.

Regarding the Leaders quadrant from the Gartner Magic Quadrant Endpoint report - “However, a leading vendor isn't a default choice for every buyer, and clients should not assume that they must buy only from vendors in the Leaders quadrant.  Some clients believe that Leaders are spreading their efforts too thinly and aren't pursuing clients' special needs.”

For more details on the Magic Quadrant and how it is created, read “Magic Quadrants and MarketScopes: How Gartner Evaluates Vendors within a Market”.     Sometimes a leader is not the best solution for a particular customer.  Despite that, you will see many   presentations where the vendor uses being in the Leaders quadrant   as a reason to buy from that particular vendor.  www.gartner.com

To see a blog on last year’s results - http://kensek.blogspot.com/2013/01/gartner-magic-quadrant-for-endpoint.html

ckensek on Twitter.
  

Tuesday, February 18, 2014

RSA Conference USA 2014 – Where the World Talks Security - March addendum at the end

Original Post

It’s that time of the year again.  Not the coming of spring, but RSA Conference USA 2014, where the world talks security.  Over 350 security vendors seeking mindshare and wallet share.  RSA San Francisco is running February 24 through 28 at Moscone Center in San Francisco.  For those who haven’t used their free pass code, too late.  http://www.rsaconference.com/events/us14

Before going, place a bet with your colleagues as to what you think the main theme will be.  Breaches and Advanced Persistent Threats may come back for a second year in a row. You may not be visiting Target as much this year. Though there is one on the same street as RSA!

This is Part 1 of Probably 3 about RSA Conference San Francisco 2014.  Don’t look for depth.  I’ll be looking more at things such as who has the best-looking booths, which booths someone on a budget can go to for   coffee, cookies.  In addition, and most importantly for some of you, what are the best tchotchkes being handed out?  

I’m not going to make it totally easy for people.  It’ll be a coin flip as to whether I just mention the tchotchke, or if I share the vendor name and booth location.

The usual suspects will be giving keynotes, it appears (sponsorship $$).  The final keynote by Stephen Colbert should be interesting.  http://www.rsaconference.com/events/us14/agenda/keynotes

For those who actual want to create a filtered list of whom to visit, the following link should be useful

One would think that vendors would take advantage of this, and possibly put in their competitors names.  I entered “Advanced Persistent Threat” and only five companies came up.  The companies - Lastline, LOGbinder, NPCore, Viewfinity, and Websense.  Sorry, companies that Gartner or Ellen Messmer  lists as being in this space that aren't showing up, you’re not going to be mentioned here.  That may put a fire in your eye, but I’m not going to do it.

For all attendees -   if you’re bringing your laptop, smartphone, or tablet to the event.  Leave them turned off as much as possible.  Install security SW before getting to the event.  If you log onto the RSA net, make sure it is the RSA network.  

It’s show time for some of the less desireables attending RSA.  Reporters at Sochi were finding their devices being attacked literally, as soon as they turned on their devices.  Remember to pack your “mdse”.

For Newbies at RSA Conference USA 2014

The attractive women (and men) working in the booth, don’t work for the company.  Any mobile numbers you received will be fake.

Wearing an “I worked with Edward Snowden” tee may get you some attention.

How many free pens and stress balls do you really need?

Are you ever going to reference or read the book that you stood in line for 20 minutes to get an autographed copy?  What’s your time value of money?

Are you really ever going to wear a tee shirt from a vendor that’s excessively big for you?

Unless you’re collecting them for other people, don’t’ bother.  Trade show vendor tee shirts will not make you a magnet.  If you must collect them (and they do fit!), promise yourself, that you’ll donate two of the ones you have at home to charity that you collected from last year’s RSA conference.

If the collateral is online, why collect it at the event?

Turning your badge backwards to collect competitive intel screams, “I work for a competitor.”  You should have gotten a free exhibitor pass and registered with that.  Did that already?  Are you wearing your booth shirt?  Busted!

If bored during a presentation, count the number of typos that appear on screen during a presentation. An alternative, sneeze or cough, every time an overused phrase or word appears.  Suggestions – leading edge, next generation, intuitive interface   plug and play, and ROI.  Has there ever been a company promoting a non-intuitive interface?  Make your own list using one of the many pens you’ve collected.

Watch one of the booth presentations where they have better tchotchkes, but require that you answer a question or be part of a group on stage.  Don’t register.  Come back later and play.  They’ll often be asking the same questions.

Go up to someone in the booth who doesn’t look like a salesperson, and ask them, “what are the top 3 or 5 things that make you better than (fill in one of their competitor’s names)?"  Go to that competitor’s booth.  Do the same thing.  Bonus points if you then return to booths and say, “Here’s what I’m being told by (fill in the blank).”  You may be given some better intel (or another pen).

On the last day of the show, do an exhibition hall sprint and collect the tchotchkes that you really want.  You probably may not even need to be scanned.


Have a good time!     Remember, you do have to justify the expense when you return to the office.  Pack those mds.

Addendum   

No parts 2 and 3.  Rain tempered the crowds a bit this year. The FireEye robot was nowhere to be seen.  People were lined up for a few of the keynotes.  Some helicopters were given away in drawings at booths.  The usual iPads at others.  The high tech equivalent of a fashionable women's LBD (little black dress) was given out a a number of booths, the LBT (little (actually, usually large or extra large) little black tee.   One give out read, "Life's a Breach", another read "We take the a** out of passwords.

Products in booths seemed to be more evolutionary rather than revolutionary  in nature.

A suggestion  to the RSA people and the presentation theatres in the exhibition halls.  A 42" monitor doesn't cut it when there are over 10 rows of people seating.  In a living room setting, 42" is ideal for sitting about 5 to 7 feet from the screen. Not good for reading multi line, multi font size presentations!  Open the top floor of the South Exhibition hall (not where the exhibits are) on the first day of the keynotes at the same time as the keynotes are given . Some people want to work rather than attend  the first two keynotes. And.....it was raining.  

Tuesday, February 12, 2013

Riverbed Leaves Others in its Wake for Gartner Magic Quadrant for WAN Optimization Controllers



Gartner has released  their Magic Quadrant for Wan Optimization Controllers ID:G00219270.  Only three companies made it into the Leaders portion of the magic quadrant, Riverbed, Blue Coat Systems, and Silver Peak.  Gartner.  Riverbed led the other two companies by a great deal from the perspective of Completeness of Visionand Ability to Execute.  Silver Peak and Blue Coat were practically on top of one another with Citrix close by in the Visionary area of the Magic Quadrant.  and Ability To Execute.

Cautions for Blue Coat included stagnant revenue, being late with features, and management churn.  This makes it sounds as if their acquisition by Thoma Bravo for $1.3 billion in mid February 2012 has yet to payoff.  Cautions for Silver Peak Systems included lacking application specific optimization and lacking in some capabilities for mobile and home office workers.

Gartner praised riverbed for having the “broadest set of capabilities in the industry” and being one of the most innovative companies in the market.

Riverbed is currently trading at around $16.  Far off its high of around $30 in March 2012.  It bottomed out around $13.30 in July. Riverbed's financial report published in early February was mixed.  Total GAAP revenue for Q4’12 was $237 million, up 9% compared to the third quarter of fiscal year 2012 (Q3’12)   for the full year 2012, GAAP revenue was $837 million, up 15% compared to 2011 GAAP net income for Q4’12 was $5 million.  This compares with $20 million, in Q4, 2011.   

However, Riverbed  captured more than 52% share of the worldwide Advanced Platform WAN optimization market share based on vendor revenue for the third quarter of 2012 per Gartner’s according to Gartner’s  report titled “Market Share: Application Acceleration Equipment, Worldwide 3Q12” December 2012.

So the revenue trends are in the right direction.  Now about that reduction in net income?

Overall, with respect to their main competitors in the Magic Quadrant.  Their position is golden compared to Silver Peak.  Their growth in 2012 probably has Blue Coat singing the blues.  Riverbed is well positioned for 2013. 


How Do You Use A Gartner Magic Quadrant?

The below is from a Research Methodologies piece on utilizing Magic Quadrants.  Too often, a pic of the quadrant will make its way onto a slide deck with no explanation.

Clients use Magic Quadrants as a first step to understanding the technology providers they might consider for a specific investment opportunity.  Keep in mind that focusing on the leaders' quadrant isn't always the best course of action.  There are good reasons to consider market challengers.  And a niche player may support your needs better than a market leader.  It all depends on how the provider aligns with your business goals.
 The five other companies in the WAN Optimization Controllers Magic Quadrant are probably pleased about the above.






Friday, January 11, 2013

Gartner Magic Quadrant for Endpoint Security - 2012


Addendum - Information about the 2013 report is at http://kensek.blogspot.com/2014/02/gartner-magic-quadrant-for-endpoint.html

Gartner has released their 2012 Gartner Magic Quadrant for Endpoint Security, ID:G00239869.  Five performers are in the leaders quadrant.  Their approximate order in the 2012 report:  Symantec, McAfee, Sophos, Kaspersky, and Trend Micro.  Microsoft, who has built up a large endpoint market share in the last couple of years with their free consumer endpoint product, was the only company in the Challenger portion of the grid for the 2012 Magic Quadrant for Endpoint Protection.  Congrats to these five companies.  Analysts for the report - Peter Firstbrook, John Girard, and Neil MacDonald.

Always interesting goings on with firms in the world of security, even those in the leaders portion of the magic quadrant. Symantec replaced CEO Enrique Salem with Tom Bennett in July.

Companies in  the 2011 leaders portion of the quadrant were  Symantec, McAfee, Sophos, Trend Micro, and Kaspersky. http://kensek.blogspot.com/2012/02/gartner-magic-quadrant-for-endpoint.html

Always interesting goings on with firms in the world of security.  Palo Alto Networks "finally" went public  in 2012 and had a nice first few days pop in their stock price. More traditional firewall companies started releasing Next Generation Firewalls (NGFW's).  Trend Micro was named a leader in the email content security arena by Forrester. Symantec replaced CEO Enrique Salem with Tom Bennett in July. Kaspersky and Trend switched spots as Kaspersky continues their mission to surpass Trend Micro in everything end point.   Symantec, you may want to appear in those AV-comparatives.org security tests, now ;). Once Kaspersky passes Trend Micro.....

Beyond Trust was the overall lowest in the quadrant with respect to ability to execute.  They purchased eEye in the first half of 2012.  One of the cautions raised by Gartner about Check Point (in the visionary portion of the quadrant) was Check Point's dependence on Kaspersky Lab's engine and signature updates continues to challenge enterprise buyers to differentiate it from Kaspersky Lab (note, ck – not a technological weakness, just a differentiator weakness).

There is a combination of seventeen companies in this report.  The minimum functionality   to appear:
  • Detection and cleaning of malware (for example, viruses, spyware, rootkits, Trojans, worms), a personal firewall, and HIPS for servers and PCs
  • Centralized management, configuration and reporting capabilities for all products evaluated in this research, sufficient to support companies of at least 5,000 geographically dispersed endpoints
  • Global service and support organizations to support products

A good read for people is “Magic Quadrants and MarketScopes: How Gartner Evaluates Vendors Within a Market” http://www.gartner.com/DisplayDocument?doc_cd=154752   Sometimes a  leader isn’t the best solution for a particular customer.  Despite that, there are many presentations where the vendor uses being in the leaders portion   as a reason to buy from that particular vendor. 

The   Magic Quadrant for Endpoint Security 2012 is available from Gartner.  Some of the vendors license rights to provide it to customers, as well.

Tuesday, November 27, 2012

Slowing Revenues and Declining Income at Trend Micro Helping Kaspersky in Efforts to Reach Number Three



In the paid desktop antivirus and internet security world, Symantec and McAfee have generally been recognized as the 800-pound gorillas with Trend Micro trailing at number three.  Kaspersky founder Eugene Kaspersky has expressed a strong  desire to catch up to Trend Micro.  In fact, Moscow based Kaspersky was listed   as one of only 5 global security companies in the “Leaders” portion of the Gartner 2012 Magic Quadrant for Endpoint Protection Platforms.

Disappointing  Q3 Results for Trend

Trend Micro did not have a great Q3.  First, the good news.  On the non-financial front - The company was issued over a dozen patents in Q3.  They announced   new mobile solutions.  They rolled out their 2013 Internet Security product line.  They     announced their latest iteration of their cloud-based security infrastructure, the Smart Protection Network,

Now for the bad - Year over year sales were down 2%  (Q3) , and net income, down 25%. The  drop in net sales was due to declines in both North America and Europe. Not good signs when given that the economies have been improving in these markets.   Japan had 3% growth.

On a revenue basis, (Pre GAAP before adjusting for deferred revenue) – North America  revenue declined 10% and Europe 8%.  Japan grew by 10%. (Q3 year over year)

Unlike the other major vendors, Trend Micro is heavily dependent on Japan for their revenue.  This grew to 51% in Q3 2012.  North America and Europe had 20% and 16% shares, respectively.  Sales were down in both the enterprise and consumer segments. 

Q4 is unlikely to help Trend.  Net sales are projected to be flat and net income down 41%.

This isn’t a pretty trend for Trend.  Since Kaspersky  has decided to remain a private company, there aren’t many publically available financial numbers for them, but they have to be pleased. If these trends continue, Kaspersky may be able to reach number three in 2013.

Despite their financial miscues, Trend Micro continues to be innovating. There are the patents mentioned above.   This week, Trend Micro announced their  free   Online Security Assessment Tools for Cloud, Cyber & Mobile Security.  These tools are designed to   provide customers with an assessment of their current business' security posture with respect to cloud adoption, consumerization, and targeted cyber attacks.  

Trend Micro hasn’t participated in Virus Bulletin (www.virusbtn.com ) testing since 2008.  They finished second in the AV-comparatives (www.av-comparatives.com ) "September 2012 Antivirus File Detection Test of Malicious software", however.

About Virus Bulletin   www.virusbtn.com

UK based Virus Bulletin started in 1989.  They provide PC users with a regular source of intelligence about computer viruses, their prevention, detection, and removal, and how to recover programs and data following an attack.  The Virus Bulletin website is at www.virusbtn.com

About AV-comparatives     www.av-comparatives.org

AV-Comparatives is an Austrian Non-Profit-Organization, which is providing independent Antivirus software tests free to the public.  Go to their website to view all the great comparative reports and surveys they publish.  A great number of their reports are free.

Tuesday, October 30, 2012

Hewlett Packard to Expand Razor Product Line

Whoops, I meant their printer product line.  This expansion could  generate a fair amount of ink cartridge revenue for Hewlett Packard, as well.  "We haven't had a new product lineup in seven years," said HP CEO Meg Whitman in talking about Hewlett Packard’s plan to announce a new line of printers.  "It was very obvious that we had a product gap here."


Hewlett Packard will be introducing multi-function machines that combine printers with scanners and software to manage electronic documents.  The software will come from their Autonomy group.  The rumored price point, around $2500 to $3000, and targeted at small businesses and groups within larger companies.

In IDC's  “MarketScape: U.S. Shared, Networked Multifunction Peripherals for the Distributed Office 2012 Vendor Analysis” (Doc # 235820).  Companies in the Leaders quadrant include Xerox, Rico, HP, and Canon.  Konica/Minolta are close behind as Major Players.  IDC’s quadrant displays a company’s market share graphed against Capabilities and Strategies.  The Capabilities score measures vendor product, go-to-market and business execution in the short-term.  The Strategy score measures alignment of vendor strategies with customer requirements in a three to five year timeframe. Whitman's announcement will help keep HP in this section of the quadrant.

This announcement may portend good things for Todd Bradley,  head of HP’s printer and personal-computer businesses.  The printing unit has brought in over $25 billion in revenues to HP. Under the Hurd regime, R&D  suffered, dropping from  $3.7 billion to $3 billion between 2003 and 2010.  More will be spent under the Whitman regime.

Whitman also telegraphed some of her other strategies for the next couple of years  while speaking at the Gartner US Symposium/Txpo, held in Orlando.  She stated that HP would probably not release a smartphone until 2014.  She also expects HP to be a major contender in the tablet and mobile PC markets.

“There will be ups and downs in this business," Whitman said.  "PCs may be declining.  Tablets may be growing.  The business definition here is 'personal systems.’  It's not PCs.  It's personal systems.  And we think we can win.”  Whitman didn’t comment on which OS the smartphones will use.

Hewlett Packard’s stock decline has been steeper than the double diamond ski  runs at Squaw Valley in Lake Tahoe, California.  On October 26, the stock hit another 52-week low of $13.94.  This represents a 52-week decline of around 50%.  Competitor Dell has had a slide of almost 45% over the same period and also had another 52-week low of $9.19.

Whitman and Hewlett Packard need to make some bold moves.  She  said when she became CEO   that turning Hewlett Packard around would be a multi-year effort.  She’s now just into her second year at the helm.  There may not be a third if things don’t start improving.

“Hewlett Packard and Meg Whitman – The First Year. Turbulence and Turmoil in the Valley” at