¾ÅÓÎÀÏ¸ç¿Æ¼¼Ò»Á¬ÈýÄêÈëÑ¡Gartner IPSħÁ¦ÏóÏÞ
2015-01-14
¿ËÈÕ£¬È¨Íþ×Éѯ»ú¹¹GartnerÐû²¼ÁË2014ÄêIPSħÁ¦ÏóÏÞ¡¶Magic Quadrant for Intrusion
Prevention Systems¡·
±¨¸æ£¬2014µÄIPSħÁ¦ÏóÏÞÈëÑ¡³§ÉÌ´ÓÉÏÒ»Äê¶ÈµÄ10¼ÒïÔÌΪ7¼Ò£¬ÔÚ´ËÑÏËàµÄÇéÐÎÏ£¬¾ÅÓÎÀÏ¸ç¿Æ¼¼µÚÈý´ÎÈëÑ¡Gartner IPSħÁ¦ÏóÏÞ¡£
2012Äê֮ǰµÄGartner IPSħÁ¦ÏóÏÞÎÞÒ»ÑÇÌ«³§ÉÌÈëÑ¡£¬¾ÅÓÎÀÏ¸ç¿Æ¼¼ÂÊÏÈÒÔÑÇÌ«³§É̵ÄÉí·Ý½øÈëÁËGartner IPSħÁ¦ÏóÏÞ£¬´Ó2012Äêµ½2014Ä꣬ÒÑÒ»Á¬ÈýÄêÈëÑ¡¡£
¾ÅÓÎÀÏ¸ç¿Æ¼¼ÒÀ¸½¶àÄêÔÚÈëÇÖ·À»¤ÁìÓòµÄÑо¿ºÍ´ó×ÚµÄÑз¢Í¶È룬ÒÔÆäÊÖÒÕʵÁ¦£¬Ç¿Ê¢µÄ¹¥·ÀÑо¿ÄÜÁ¦£¬¼á³ÖÁËIPS²úÆ·º£ÄÚˮƽ²¢»ñµÃÁËÊг¡µÄÈϿɣ¬IDCÊг¡±¨¸æÏÔʾ¾ÅÓÎÀÏ¸ç¿Æ¼¼NIPS´Ó2009Äêµ½2013ÄêÒ»Á¬ÎåÄ꺣ÄÚÊг¡Õ¼ÓÐÂÊ¿¿Ç°¡£
¾ÅÓÎÀϸçÍøÂçÈëÇÖ·À»¤ÏµÍ³£¨¼ò³Æ£¬¾ÅÓÎÀϸçNIPS£©ÊǾÅÓÎÀÏ¸ç¿Æ¼¼ÍƳöµÄÒ»´úÈëÇÖ·À»¤ºÍ¼ì²â²úÆ·£¬ÃæÏò»¥ÁªÍøÊ±´ú¼¤ÔöµÄÍøÂçÇå¾²ÎÊÌ⣬ÌṩWebÇå¾²¡¢ ·þÎñÆ÷Òì³£¡¢¿Í»§¶Ë·À»¤¡¢Íþв·À»¤¡¢Ãô¸ÐÊý¾ÝÍâй×èµ²µÈ·À»¤ÄÜÁ¦£¬Îª½ðÈÚ¡¢ÔËÓªÉÌ¡¢Õþ¸®µÈ¿Í»§ÌṩÖÜÈ«µÄ»ù´¡ÉèÊ©¡¢·þÎñÆ÷¼°¿Í»§¶ËµÄÈëÇÖ·À»¤¡£¾ÅÓÎÀϸç NIPSʹÓÃÏÂÒ»´úÍøÂçÆÊÎöÒýÇæ£¬ÔڹŰåÎó²î¹¥»÷ÊðÃû»ù´¡ÉÏ£¬Ê¹ÓÃÈ«ÇòÐÅÓþ¿â»úÖÆ£¬Ð¡Ê±¼¶µÄÎó²î¿â¸üаü¹ÜÁË·À»¤µÄʵʱÖÜÈ«¡£ÒýÈëÒµ½çµÄÈíÓ²¼þ ¼ì²â¿ò¼Ü£¬ÔÚÁ÷Á¿·åֵʱ£¬ÒÀÈ»Äܰü¹ÜÐÔÄÜÎȹ̡£¾ÅÓÎÀϸçNIPSͨ¹ýÄÚÖø»ºñµÄÃæÏò¿Í»§³¡¾°µÄÕ½ÂÔÄ£°åºÍÉèÖÃÏòµ¼£¬¿ÉʵÏÖÁãÉèÖÃÉÏÏߣ¬Õ½ÂÔÖÎÀí¼«ÆäÇáÓ¯Ò×Óᣠ¾ÅÓÎÀϸçNIPSÓë¾ÅÓÎÀϸçÐÂÒ»´úÍþвÆÊÎö¼ì²â×°±¸£¨TAC£©×é³É¾ÅÓÎÀϸçÐÂÒ»´úÇå¾²Íþв·À»¤½â¾ö¼Æ»®NGTP£¨Next Generation Threat Protection£©£¬Äܹ»¶Ôδ֪ÍþвºÍÒ»Á¬ÐÔÍþвAPT¾ÙÐзÀ»¤£¬Îª¿Í»§ÌṩÁËÒ»Ì×ÖÜÈ«¡¢¾«×¼¡¢¸ßЧÒ×ÓõÄÈëÇÖ·À»¤½â¾ö¼Æ»®¡£
About the Magic Quadrant
Magic Quadrant for Intrusion Prevention Systems Adam Hils Greg Young and Jeremy D'Hoinne 29 December 2014
Gartner does not endorse any vendor product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner¡¯s research organization and should not be construed as statements of fact. Gartner disclaims all warranties expressed or implied with respect to this research including any warranties of merchantability or fitness for a particular purpose.
2012Äê֮ǰµÄGartner IPSħÁ¦ÏóÏÞÎÞÒ»ÑÇÌ«³§ÉÌÈëÑ¡£¬¾ÅÓÎÀÏ¸ç¿Æ¼¼ÂÊÏÈÒÔÑÇÌ«³§É̵ÄÉí·Ý½øÈëÁËGartner IPSħÁ¦ÏóÏÞ£¬´Ó2012Äêµ½2014Ä꣬ÒÑÒ»Á¬ÈýÄêÈëÑ¡¡£
¾ÅÓÎÀÏ¸ç¿Æ¼¼ÒÀ¸½¶àÄêÔÚÈëÇÖ·À»¤ÁìÓòµÄÑо¿ºÍ´ó×ÚµÄÑз¢Í¶È룬ÒÔÆäÊÖÒÕʵÁ¦£¬Ç¿Ê¢µÄ¹¥·ÀÑо¿ÄÜÁ¦£¬¼á³ÖÁËIPS²úÆ·º£ÄÚˮƽ²¢»ñµÃÁËÊг¡µÄÈϿɣ¬IDCÊг¡±¨¸æÏÔʾ¾ÅÓÎÀÏ¸ç¿Æ¼¼NIPS´Ó2009Äêµ½2013ÄêÒ»Á¬ÎåÄ꺣ÄÚÊг¡Õ¼ÓÐÂÊ¿¿Ç°¡£
¾ÅÓÎÀϸçÍøÂçÈëÇÖ·À»¤ÏµÍ³£¨¼ò³Æ£¬¾ÅÓÎÀϸçNIPS£©ÊǾÅÓÎÀÏ¸ç¿Æ¼¼ÍƳöµÄÒ»´úÈëÇÖ·À»¤ºÍ¼ì²â²úÆ·£¬ÃæÏò»¥ÁªÍøÊ±´ú¼¤ÔöµÄÍøÂçÇå¾²ÎÊÌ⣬ÌṩWebÇå¾²¡¢ ·þÎñÆ÷Òì³£¡¢¿Í»§¶Ë·À»¤¡¢Íþв·À»¤¡¢Ãô¸ÐÊý¾ÝÍâй×èµ²µÈ·À»¤ÄÜÁ¦£¬Îª½ðÈÚ¡¢ÔËÓªÉÌ¡¢Õþ¸®µÈ¿Í»§ÌṩÖÜÈ«µÄ»ù´¡ÉèÊ©¡¢·þÎñÆ÷¼°¿Í»§¶ËµÄÈëÇÖ·À»¤¡£¾ÅÓÎÀϸç NIPSʹÓÃÏÂÒ»´úÍøÂçÆÊÎöÒýÇæ£¬ÔڹŰåÎó²î¹¥»÷ÊðÃû»ù´¡ÉÏ£¬Ê¹ÓÃÈ«ÇòÐÅÓþ¿â»úÖÆ£¬Ð¡Ê±¼¶µÄÎó²î¿â¸üаü¹ÜÁË·À»¤µÄʵʱÖÜÈ«¡£ÒýÈëÒµ½çµÄÈíÓ²¼þ ¼ì²â¿ò¼Ü£¬ÔÚÁ÷Á¿·åֵʱ£¬ÒÀÈ»Äܰü¹ÜÐÔÄÜÎȹ̡£¾ÅÓÎÀϸçNIPSͨ¹ýÄÚÖø»ºñµÄÃæÏò¿Í»§³¡¾°µÄÕ½ÂÔÄ£°åºÍÉèÖÃÏòµ¼£¬¿ÉʵÏÖÁãÉèÖÃÉÏÏߣ¬Õ½ÂÔÖÎÀí¼«ÆäÇáÓ¯Ò×Óᣠ¾ÅÓÎÀϸçNIPSÓë¾ÅÓÎÀϸçÐÂÒ»´úÍþвÆÊÎö¼ì²â×°±¸£¨TAC£©×é³É¾ÅÓÎÀϸçÐÂÒ»´úÇå¾²Íþв·À»¤½â¾ö¼Æ»®NGTP£¨Next Generation Threat Protection£©£¬Äܹ»¶Ôδ֪ÍþвºÍÒ»Á¬ÐÔÍþвAPT¾ÙÐзÀ»¤£¬Îª¿Í»§ÌṩÁËÒ»Ì×ÖÜÈ«¡¢¾«×¼¡¢¸ßЧÒ×ÓõÄÈëÇÖ·À»¤½â¾ö¼Æ»®¡£
About the Magic Quadrant
Magic Quadrant for Intrusion Prevention Systems Adam Hils Greg Young and Jeremy D'Hoinne 29 December 2014
Gartner does not endorse any vendor product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner¡¯s research organization and should not be construed as statements of fact. Gartner disclaims all warranties expressed or implied with respect to this research including any warranties of merchantability or fitness for a particular purpose.

¾ÅÓÎÀϸçÔÆ







