AG¹«Ë¾¿Æ¼¼Ò»Á¬ÈýÄêÈëÑ¡Gartner IPSħÁ¦ÏóÏÞ
2015-01-14
¿ËÈÕ£¬È¨Íþ×Éѯ»ú¹¹GartnerÐû²¼ÁË2014ÄêIPSħÁ¦ÏóÏÞ¡¶Magic Quadrant for Intrusion
Prevention Systems¡·
±¨¸æ£¬2014µÄIPSħÁ¦ÏóÏÞÈëÑ¡³§ÉÌ´ÓÉÏÒ»Äê¶ÈµÄ10¼ÒïÔÌΪ7¼Ò£¬ÔÚ´ËÑÏËàµÄÇéÐÎÏ£¬AG¹«Ë¾¿Æ¼¼µÚÈý´ÎÈëÑ¡Gartner IPSħÁ¦ÏóÏÞ¡£
2012Äê֮ǰµÄGartner IPSħÁ¦ÏóÏÞÎÞÒ»ÑÇÌ«³§ÉÌÈëÑ¡£¬AG¹«Ë¾¿Æ¼¼ÂÊÏÈÒÔÑÇÌ«³§É̵ÄÉí·Ý½øÈëÁËGartner IPSħÁ¦ÏóÏÞ£¬´Ó2012Äêµ½2014Ä꣬ÒÑÒ»Á¬ÈýÄêÈëÑ¡¡£
AG¹«Ë¾¿Æ¼¼ÒÀ¸½¶àÄêÔÚÈëÇÖ·À»¤ÁìÓòµÄÑо¿ºÍ´ó×ÚµÄÑз¢Í¶È룬ÒÔÆäÊÖÒÕʵÁ¦£¬Ç¿Ê¢µÄ¹¥·ÀÑо¿ÄÜÁ¦£¬¼á³ÖÁËIPS²úÆ·º£ÄÚˮƽ²¢»ñµÃÁËÊг¡µÄÈϿɣ¬IDCÊг¡±¨¸æÏÔʾAG¹«Ë¾¿Æ¼¼NIPS´Ó2009Äêµ½2013ÄêÒ»Á¬ÎåÄ꺣ÄÚÊг¡Õ¼ÓÐÂÊ¿¿Ç°¡£
AG¹«Ë¾ÍøÂçÈëÇÖ·À»¤ÏµÍ³£¨¼ò³Æ£¬AG¹«Ë¾NIPS£©ÊÇAG¹«Ë¾¿Æ¼¼ÍƳöµÄÒ»´úÈëÇÖ·À»¤ºÍ¼ì²â²úÆ·£¬ÃæÏò»¥ÁªÍøÊ±´ú¼¤ÔöµÄÍøÂçÇå¾²ÎÊÌ⣬ÌṩWebÇå¾²¡¢ ·þÎñÆ÷Òì³£¡¢¿Í»§¶Ë·À»¤¡¢Íþв·À»¤¡¢Ãô¸ÐÊý¾ÝÍâй×èµ²µÈ·À»¤ÄÜÁ¦£¬Îª½ðÈÚ¡¢ÔËÓªÉÌ¡¢Õþ¸®µÈ¿Í»§ÌṩÖÜÈ«µÄ»ù´¡ÉèÊ©¡¢·þÎñÆ÷¼°¿Í»§¶ËµÄÈëÇÖ·À»¤¡£AG¹«Ë¾ NIPSʹÓÃÏÂÒ»´úÍøÂçÆÊÎöÒýÇæ£¬ÔڹŰåÎó²î¹¥»÷ÊðÃû»ù´¡ÉÏ£¬Ê¹ÓÃÈ«ÇòÐÅÓþ¿â»úÖÆ£¬Ð¡Ê±¼¶µÄÎó²î¿â¸üаü¹ÜÁË·À»¤µÄʵʱÖÜÈ«¡£ÒýÈëÒµ½çµÄÈíÓ²¼þ ¼ì²â¿ò¼Ü£¬ÔÚÁ÷Á¿·åֵʱ£¬ÒÀÈ»Äܰü¹ÜÐÔÄÜÎȹ̡£AG¹«Ë¾NIPSͨ¹ýÄÚÖø»ºñµÄÃæÏò¿Í»§³¡¾°µÄÕ½ÂÔÄ£°åºÍÉèÖÃÏòµ¼£¬¿ÉʵÏÖÁãÉèÖÃÉÏÏߣ¬Õ½ÂÔÖÎÀí¼«ÆäÇáÓ¯Ò×ÓᣠAG¹«Ë¾NIPSÓëAG¹«Ë¾ÐÂÒ»´úÍþвÆÊÎö¼ì²â×°±¸£¨TAC£©×é³ÉAG¹«Ë¾ÐÂÒ»´úÇå¾²Íþв·À»¤½â¾ö¼Æ»®NGTP£¨Next Generation Threat Protection£©£¬Äܹ»¶Ôδ֪ÍþвºÍÒ»Á¬ÐÔÍþвAPT¾ÙÐзÀ»¤£¬Îª¿Í»§ÌṩÁËÒ»Ì×ÖÜÈ«¡¢¾«×¼¡¢¸ßЧÒ×ÓõÄÈëÇÖ·À»¤½â¾ö¼Æ»®¡£
About the Magic Quadrant
Magic Quadrant for Intrusion Prevention Systems Adam Hils Greg Young and Jeremy D'Hoinne 29 December 2014
Gartner does not endorse any vendor product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner¡¯s research organization and should not be construed as statements of fact. Gartner disclaims all warranties expressed or implied with respect to this research including any warranties of merchantability or fitness for a particular purpose.
2012Äê֮ǰµÄGartner IPSħÁ¦ÏóÏÞÎÞÒ»ÑÇÌ«³§ÉÌÈëÑ¡£¬AG¹«Ë¾¿Æ¼¼ÂÊÏÈÒÔÑÇÌ«³§É̵ÄÉí·Ý½øÈëÁËGartner IPSħÁ¦ÏóÏÞ£¬´Ó2012Äêµ½2014Ä꣬ÒÑÒ»Á¬ÈýÄêÈëÑ¡¡£
AG¹«Ë¾¿Æ¼¼ÒÀ¸½¶àÄêÔÚÈëÇÖ·À»¤ÁìÓòµÄÑо¿ºÍ´ó×ÚµÄÑз¢Í¶È룬ÒÔÆäÊÖÒÕʵÁ¦£¬Ç¿Ê¢µÄ¹¥·ÀÑо¿ÄÜÁ¦£¬¼á³ÖÁËIPS²úÆ·º£ÄÚˮƽ²¢»ñµÃÁËÊг¡µÄÈϿɣ¬IDCÊг¡±¨¸æÏÔʾAG¹«Ë¾¿Æ¼¼NIPS´Ó2009Äêµ½2013ÄêÒ»Á¬ÎåÄ꺣ÄÚÊг¡Õ¼ÓÐÂÊ¿¿Ç°¡£
AG¹«Ë¾ÍøÂçÈëÇÖ·À»¤ÏµÍ³£¨¼ò³Æ£¬AG¹«Ë¾NIPS£©ÊÇAG¹«Ë¾¿Æ¼¼ÍƳöµÄÒ»´úÈëÇÖ·À»¤ºÍ¼ì²â²úÆ·£¬ÃæÏò»¥ÁªÍøÊ±´ú¼¤ÔöµÄÍøÂçÇå¾²ÎÊÌ⣬ÌṩWebÇå¾²¡¢ ·þÎñÆ÷Òì³£¡¢¿Í»§¶Ë·À»¤¡¢Íþв·À»¤¡¢Ãô¸ÐÊý¾ÝÍâй×èµ²µÈ·À»¤ÄÜÁ¦£¬Îª½ðÈÚ¡¢ÔËÓªÉÌ¡¢Õþ¸®µÈ¿Í»§ÌṩÖÜÈ«µÄ»ù´¡ÉèÊ©¡¢·þÎñÆ÷¼°¿Í»§¶ËµÄÈëÇÖ·À»¤¡£AG¹«Ë¾ NIPSʹÓÃÏÂÒ»´úÍøÂçÆÊÎöÒýÇæ£¬ÔڹŰåÎó²î¹¥»÷ÊðÃû»ù´¡ÉÏ£¬Ê¹ÓÃÈ«ÇòÐÅÓþ¿â»úÖÆ£¬Ð¡Ê±¼¶µÄÎó²î¿â¸üаü¹ÜÁË·À»¤µÄʵʱÖÜÈ«¡£ÒýÈëÒµ½çµÄÈíÓ²¼þ ¼ì²â¿ò¼Ü£¬ÔÚÁ÷Á¿·åֵʱ£¬ÒÀÈ»Äܰü¹ÜÐÔÄÜÎȹ̡£AG¹«Ë¾NIPSͨ¹ýÄÚÖø»ºñµÄÃæÏò¿Í»§³¡¾°µÄÕ½ÂÔÄ£°åºÍÉèÖÃÏòµ¼£¬¿ÉʵÏÖÁãÉèÖÃÉÏÏߣ¬Õ½ÂÔÖÎÀí¼«ÆäÇáÓ¯Ò×ÓᣠAG¹«Ë¾NIPSÓëAG¹«Ë¾ÐÂÒ»´úÍþвÆÊÎö¼ì²â×°±¸£¨TAC£©×é³ÉAG¹«Ë¾ÐÂÒ»´úÇå¾²Íþв·À»¤½â¾ö¼Æ»®NGTP£¨Next Generation Threat Protection£©£¬Äܹ»¶Ôδ֪ÍþвºÍÒ»Á¬ÐÔÍþвAPT¾ÙÐзÀ»¤£¬Îª¿Í»§ÌṩÁËÒ»Ì×ÖÜÈ«¡¢¾«×¼¡¢¸ßЧÒ×ÓõÄÈëÇÖ·À»¤½â¾ö¼Æ»®¡£
About the Magic Quadrant
Magic Quadrant for Intrusion Prevention Systems Adam Hils Greg Young and Jeremy D'Hoinne 29 December 2014
Gartner does not endorse any vendor product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner¡¯s research organization and should not be construed as statements of fact. Gartner disclaims all warranties expressed or implied with respect to this research including any warranties of merchantability or fitness for a particular purpose.

AG¹«Ë¾ÔÆ







