¾ÅÓÎÀϸç

¾ÅÓÎÀϸç

¾ÅÓÎÀÏ¸ç¿Æ¼¼

  • »ù´¡ÉèÊ©Çå¾²

    »ù´¡ÉèÊ©Çå¾²
  • Êý¾ÝÇå¾²

    Êý¾ÝÇå¾²
  • ÔÆÅÌËãÇå¾²

    ÔÆÅÌËãÇå¾²
  • ¹¤Òµ»¥ÁªÍøÇå¾²

    ¹¤Òµ»¥ÁªÍøÇå¾²
  • ÎïÁªÍøÇå¾²

    ÎïÁªÍøÇå¾²
  • ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì

    ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì
  • ËùÓвúÆ·

    ËùÓвúÆ·
  • ËùÓнâ¾ö¼Æ»®

    ËùÓнâ¾ö¼Æ»®

»ù´¡ÉèÊ©Çå¾²


  • Õþ¸®

    Õþ¸®
  • ÔËÓªÉÌ

    ÔËÓªÉÌ
  • ½ðÈÚ

    ½ðÈÚ
  • ÄÜÔ´

    ÄÜÔ´
  • ½»Í¨

    ½»Í¨
  • ÆóÒµ

    ÆóÒµ
  • ¿Æ½ÌÎÄÎÀ

    ¿Æ½ÌÎÄÎÀ

  • ¾ÅÓÎÀϸçÔÆ ¾ÅÓÎÀϸçÔÆ
  • ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÏàÖúͬ°éÉó²é¸ü¶à >

ÏàÖúͬ°é¶¯Ì¬

³ÉΪÏàÖúͬ°é

  • ¾ÅÓÎÀϸçÔÆ ¾ÅÓÎÀϸçÔÆ
  • ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÊÖÒÕÖ§³ÖÉó²é¸ü¶à >

²úÆ·Ö§³Ö

  • ¾ÅÓÎÀϸçÔÆ ¾ÅÓÎÀϸçÔÆ
  • ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

·µ»ØÁбí

¾ÅÓÎÀÏ¸ç¿Æ¼¼Ò»Á¬ÈýÄêÈëÑ¡Gartner IPSħÁ¦ÏóÏÞ

2015-01-14

      ¿ËÈÕ £¬È¨Íþ×Éѯ»ú¹¹GartnerÐû²¼ÁË2014ÄêIPSħÁ¦ÏóÏÞ¡¶Magic Quadrant for Intrusion Prevention Systems¡· ±¨¸æ £¬2014µÄIPSħÁ¦ÏóÏÞÈëÑ¡³§ÉÌ´ÓÉÏÒ»Äê¶ÈµÄ10¼ÒïÔ̭Ϊ7¼Ò £¬ÔÚ´ËÑÏËàµÄÇéÐÎÏ £¬¾ÅÓÎÀÏ¸ç¿Æ¼¼µÚÈý´ÎÈëÑ¡Gartner IPSħÁ¦ÏóÏÞ¡£

    2012Äê֮ǰµÄGartner IPSħÁ¦ÏóÏÞÎÞÒ»ÑÇÌ«³§ÉÌÈëÑ¡ £¬¾ÅÓÎÀÏ¸ç¿Æ¼¼ÂÊÏÈÒÔÑÇÌ«³§É̵ÄÉí·Ý½øÈëÁËGartner IPSħÁ¦ÏóÏÞ £¬´Ó2012Äêµ½2014Äê £¬ÒÑÒ»Á¬ÈýÄêÈëÑ¡¡£

    ¾ÅÓÎÀÏ¸ç¿Æ¼¼ÒÀ¸½¶àÄêÔÚÈëÇÖ·À»¤ÁìÓòµÄÑо¿ºÍ´ó×ÚµÄÑз¢Í¶Èë £¬ÒÔÆäÊÖÒÕʵÁ¦ £¬Ç¿Ê¢µÄ¹¥·ÀÑо¿ÄÜÁ¦ £¬¼á³ÖÁËIPS²úÆ·º£ÄÚˮƽ²¢»ñµÃÁËÊг¡µÄÈÏ¿É £¬IDCÊг¡±¨¸æÏÔʾ¾ÅÓÎÀÏ¸ç¿Æ¼¼NIPS´Ó2009Äêµ½2013ÄêÒ»Á¬ÎåÄ꺣ÄÚÊг¡Õ¼ÓÐÂÊ¿¿Ç°¡£

     ¾ÅÓÎÀϸçÍøÂçÈëÇÖ·À»¤ÏµÍ³£¨¼ò³Æ £¬¾ÅÓÎÀϸçNIPS£©ÊǾÅÓÎÀÏ¸ç¿Æ¼¼ÍƳöµÄÒ»´úÈëÇÖ·À»¤ºÍ¼ì²â²úÆ· £¬ÃæÏò»¥ÁªÍøÊ±´ú¼¤ÔöµÄÍøÂçÇå¾²ÎÊÌâ £¬ÌṩWebÇå¾²¡¢ ·þÎñÆ÷Òì³£¡¢¿Í»§¶Ë·À»¤¡¢Íþв·À»¤¡¢Ãô¸ÐÊý¾ÝÍâй×èµ²µÈ·À»¤ÄÜÁ¦ £¬Îª½ðÈÚ¡¢ÔËÓªÉÌ¡¢Õþ¸®µÈ¿Í»§ÌṩÖÜÈ«µÄ»ù´¡ÉèÊ©¡¢·þÎñÆ÷¼°¿Í»§¶ËµÄÈëÇÖ·À»¤¡£¾ÅÓÎÀϸç NIPSʹÓÃÏÂÒ»´úÍøÂçÆÊÎöÒýÇæ £¬ÔڹŰåÎó²î¹¥»÷ÊðÃû»ù´¡ÉÏ £¬Ê¹ÓÃÈ«ÇòÐÅÓþ¿â»úÖÆ £¬Ð¡Ê±¼¶µÄÎó²î¿â¸üаü¹ÜÁË·À»¤µÄʵʱÖÜÈ«¡£ÒýÈëÒµ½çµÄÈíÓ²¼þ ¼ì²â¿ò¼Ü £¬ÔÚÁ÷Á¿·åֵʱ £¬ÒÀÈ»Äܰü¹ÜÐÔÄÜÎȹÌ¡£¾ÅÓÎÀϸçNIPSͨ¹ýÄÚÖø»ºñµÄÃæÏò¿Í»§³¡¾°µÄÕ½ÂÔÄ£°åºÍÉèÖÃÏòµ¼ £¬¿ÉʵÏÖÁãÉèÖÃÉÏÏß £¬Õ½ÂÔÖÎÀí¼«ÆäÇáÓ¯Ò×Óᣠ¾ÅÓÎÀϸçNIPSÓë¾ÅÓÎÀϸçÐÂÒ»´úÍþвÆÊÎö¼ì²â×°±¸£¨TAC£©×é³É¾ÅÓÎÀϸçÐÂÒ»´úÇå¾²Íþв·À»¤½â¾ö¼Æ»®NGTP£¨Next Generation Threat Protection£© £¬Äܹ»¶Ôδ֪ÍþвºÍÒ»Á¬ÐÔÍþвAPT¾ÙÐзÀ»¤ £¬Îª¿Í»§ÌṩÁËÒ»Ì×ÖÜÈ«¡¢¾«×¼¡¢¸ßЧÒ×ÓõÄÈëÇÖ·À»¤½â¾ö¼Æ»®¡£


About the Magic Quadrant
    Magic Quadrant for Intrusion Prevention Systems Adam Hils Greg Young and Jeremy D'Hoinne 29 December 2014

    Gartner does not endorse any vendor product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner¡¯s research organization and should not be construed as statements of fact. Gartner disclaims all warranties expressed or implied with respect to this research including any warranties of merchantability or fitness for a particular purpose.
?

ÄúµÄÁªÏµ·½·¨

*ÐÕÃû
*µ¥Î»Ãû³Æ
*ÁªÏµ·½·¨
*ÑéÖ¤Âë ¾ÅÓÎÀϸ硤(Öйú)¾ãÀÖ²¿¹Ù·½ÍøÕ¾
Ìá½»µ½ÓÊÏä

¹ºÖÃÈÈÏß

  • ¹ºÖÃ×Éѯ:

    400-818-6868-1

Ìá½»ÏîÄ¿ÐèÇó

½Ó´ý¼ÓÈë¾ÅÓÎÀÏ¸ç¿Æ¼¼ £¬³ÉΪÎÒÃǵÄÏàÖúͬ°é£¡
  • *ÇëÐÎòÄúµÄÐèÇó
  • *×îÖÕ¿Í»§Ãû³Æ
  • *ÏîÄ¿Ãû³Æ
  • Äú¸ÐÐËȤµÄ²úÆ·
  • ÏîĿԤËã
ÄúµÄÁªÏµ·½·¨
  • *ÐÕÃû
  • *ÁªÏµµç»°
  • *ÓÊÏä
  • *Ö°Îñ
  • *¹«Ë¾
  • *¶¼»á
  • *ÐÐÒµ
  • *ÑéÖ¤Âë ¾ÅÓÎÀϸ硤(Öйú)¾ãÀÖ²¿¹Ù·½ÍøÕ¾
  • Ìá½»µ½ÓÊÏä
¾ÅÓÎÀϸ硤(Öйú)¾ãÀÖ²¿¹Ù·½ÍøÕ¾
¾ÅÓÎÀϸ硤(Öйú)¾ãÀÖ²¿¹Ù·½ÍøÕ¾

·þÎñÖ§³Ö

ÖÇÄܿͷþ
ÖÇÄܿͷþ
¹ºÖÃ/ÊÛºóÊÖÒÕÎÊÌâ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
ÔÚÏßÌáµ¥|ÖÇÄÜÎÊ´ð|֪ʶ¿â
Ö§³ÖÈÈÏß
Ö§³ÖÈÈÏß
400-818-6868
¾ÅÓÎÀÏ¸ç¿Æ¼¼ÉçÇø
¾ÅÓÎÀÏ¸ç¿Æ¼¼ÉçÇø
×ÊÁÏÏÂÔØ|ÔÚÏßÎÊ´ð|ÊÖÒÕ½»Á÷

? 2025 NSFOCUS ¾ÅÓÎÀÏ¸ç¿Æ¼¼ www.nsfocus.com All Rights Reserved . ¾©¹«Íø°²±¸ 11010802021605ºÅ ¾©ICP±¸14004349ºÅ ¾©ICPÖ¤110355ºÅ

ÍøÕ¾µØÍ¼