Верхнее

Gartner Magic Quadrants

См. также подборку: Gartner Hype Cycles

Магические квадраты Гартнера по безопасности (Gartner Magic Quadrants on Security):

  • Каждая картинка ведёт на соответствующее изображение на официальном сайте Гартнера.
  • Указана дата публикации соответствующего отчёта и его уникальный ID.  По клику на ID можно перейти к самому отчёту и, например, купить его или получить по подписке, если она есть.
  • При наличии действующей (и известной мне) неархивированной полной текстовой версии отчёта, лицензированной для распространения, ссылка на неё также приведена. Обычно такие отчёты доступны лишь некоторое время, после чего исчезают. Если ранее отчёт был доступен публично, то стоит соответствующая пометка «Текст в архиве». Сам архив на сайте не выложен.

Magic Quadrant for Access Management

12.08.2019 ID:G00433910
Magic Quadrant for Access Management 2019 (G00433910)SaaS-delivered access management has become the norm, as has advanced user authentication including MFA. AM vendors are maturing their approaches to session management, contextual and adaptive access, and API protection, which will begin to enable CARTA-aligned access management approaches.
Полный текст
18.06.2018 ID:G00335273
Magic Quadrant for Access Management 2018 (G00335273)Access management products and services have matured in single sign-on protocols and user authentication, and technical differentiators include adaptive access capabilities, as well as ease and breadth of target system enablement. Among new purchases, demand for IAM as a service continues to grow.
07.06.2017 ID:G00315479
Magic Quadrant for Access Management 2017 (G00315479)The access management market has evolved beyond supporting traditional web applications to support mobile applications and APIs, as well as adding contextual and adaptive access features. Vendors offering an IDaaS option outnumber those that don’t, and now there are more choices than ever.

Magic Quadrant for Cloud Access Security Brokers

20.10.2018 ID:G00348564
Magic Quadrant for Cloud Access Security Brokers 2018 (G00348564)Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Security and risk management leaders concerned about their organizations’ cloud use should investigate CASBs.
Полный текст
30.11.2017 ID:G00318532
Magic Quadrant for Cloud Access Security Brokers 2017 (G00318532)Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Security and risk management leaders should align CASB vendors to address specific use-case requirements.
Полный текст в архиве*

Magic Quadrant for Endpoint Protection Platforms

20.08.2019 ID:G00352135
Magic Quadrant for Endpoint Protection Platforms 2019 (G00352135)The endpoint protection market is transforming as new approaches challenge the status quo. We evaluated solutions with an emphasis on hardening, detection of advanced and fileless attacks, and response capabilities, favoring cloud-delivered solutions that provide a fusion of products and services.
Полный текст
24.01.2018 ID:G00325704
Magic Quadrant for Endpoint Protection Platforms 2018 (G00325704)Endpoint protection is evolving to address more of Gartner’s adaptive security architecture tasks such as hardening, investigation, incident detection, and incident response. Security and risk management leaders should ensure that their EPP vendor evolves fast enough to keep up with modern threats.
30.01.2017 ID:G00301183
Magic Quadrant for Endpoint Protection Platforms 2017 (G00301183)The endpoint protection platform provides security capabilities to protect workstations, smartphones and tablets. Security and risk management leaders of endpoint protection should investigate malware detection effectiveness, performance impact on the host machines and administrative overhead.
Полный текст
01.02.2016 ID:G00273851
Magic Quadrant for Endpoint Protection Platforms 2016 (G00273851)The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Buyers of endpoint protection should investigate the quality of protection capabilities, the depth and breadth of features, and the ease of administration.

Magic Quadrant for Enterprise Data Loss Prevention

16.02.2017 ID:G00300911
Magic Quadrant for Enterprise Data Loss Prevention 2017 (G00300911)Security and risk management leaders purchase on-premises enterprise DLP to solve for either organizationwide regulatory compliance or to better protect specific types of intellectual property, while monitoring emerging cloud DLP capabilities.
Полный текст в архиве*
28.01.2016 ID:G00277564
Magic Quadrant for Enterprise Data Loss Prevention 2016 (G00277564)Enterprise DLP continues evolving to support both content-aware and context-aware capabilities, as well as support for IT security leaders to cover broader deployment use cases beyond regulatory compliance and intellectual property protection.

Magic Quadrant for Enterprise Mobility Management Suites

06.06.2017 ID:G00311193
Magic Quadrant for Enterprise Mobility Management Suites 2017 (G00311193)Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. I&O leaders responsible for mobile and endpoint strategies, must maintain focus on near- and long-term goals in this rapidly changing market.
Полный текст в архиве*
08.06.2016 ID:G00279887
Magic Quadrant for Enterprise Mobility Management Suites 2016 (G00279887)Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives.
08.06.2015 ID:G00265477
Magic Quadrant for Enterprise Mobility Management Suites 2015 (G00265477)Enterprise mobility management suites are the glue that connects mobile devices to their enterprise workflow. End-user computing leaders must consider short-term and long-term objectives amid rapid market changes.
Полный текст в архиве*

Magic Quadrant for (Enterprise) Network Firewalls

17.09.2019 ID:G00375686
Magic Quadrant for Network Firewalls 2019 (G00375686)With firewall providers embedding multiple security features in firewalls and enabling integration and automation capabilities with other security products, firewalls are evolving into network security platforms.
Полный текст
04.10.2018 ID:G00337968
Magic Quadrant for Enterprise Network Firewalls 2018 (G00337968)In this mature market, vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and risk tolerance.
Полный текст в архиве*
10.07.2017 ID:G00310171
Magic Quadrant for Enterprise Network Firewalls 2017 (G00310171)«Next generation» capabilities have been achieved by all products in the enterprise network firewall market, and vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and cost.
Полный текст в архиве*
25.05.2016 ID:G00277994
Magic Quadrant for Enterprise Network Firewalls 2016 (G00277994)«Next generation» capability has been achieved by the products in the network firewall market, and vendors differentiate on feature strengths. Buyers must consider the trade-offs between best-of-breed function and costs.
Полный текст в архиве*
22.04.2015 ID:G00263955
Magic Quadrant for Enterprise Network Firewalls 2015 (G00263955)«Next-generation» capability has been achieved by the leading products in the network firewall market, and competitors are working to keep the gap from widening. Buyers must consider their operational realities, the burden of switching, and the trade-offs between «best-of-breed» function and costs.
Полный текст в архиве*

Magic Quadrant for Identity Governance and Administration

09.10.2019 ID:G00354412
Magic Quadrant for Identity Governance and Administration 2019 (G00354412)IGA is a mature market that faces increasing client demand for cloud-delivered solutions and is splitting between solutions focused on either basic or mature IGA requirements. Security and risk management leaders should scrutinize vendors for compelling roadmaps and a track record of innovation.
Полный текст
21.02.2018 ID:G00326925
Magic Quadrant for Identity Governance and Administration 2018 (G00326925)While the market for IGA tools delivered as on-premises software is mature, intense vendor activity renders many new choices for IGA delivered as a service. Security and risk management leaders responsible for IAM should emphasize future requirements when planning to purchase an IGA solution.
Полный текст
22.02.2017 ID:G00302686
Magic Quadrant for Identity Governance and Administration 2017 (G00302686)Several vendors are accelerating efforts to offer cloud-delivered IGA, improve analytics and align with PAM products. Security and risk management leaders responsible for IAM should be aware of functional differences and trade-offs between on-premises and cloud-delivered IGA and plan accordingly.
29.02.2016 ID:G00274258
Magic Quadrant for Identity Governance and Administration 2016 (G00274258)The IGA market is maturing into an early mainstream phase. IAM and security leaders should take note of emerging requirements around more risk-aware identity approaches and cloud adoption that are causing innovative vendors to integrate analytics with adjacent IT and data security technologies.
Полный текст в архиве*
12.01.2015 ID:G00261633
Magic Quadrant for Identity Governance and Administration 2015 (G00261633)The IGA market is transforming legacy, on-premises IAM products. IGA vendors are investing heavily to meet client needs in ease of use, mobility, business agility, and lower total cost of ownership. User provisioning and access governance functions continue to consolidate.

Magic Quadrant for Intrusion Detection and Prevention Systems

10.01.2018 ID:G00324914
Magic Quadrant for Intrusion Detection and Prevention Systems 2018 (G00324914)IDPS continues to be absorbed by firewall placements at the perimeter, yet still offers the best detection efficacy and a central prevention, detection, and response solution on a network. Security and risk management leaders should seek innovation in advanced analytics and public cloud support.
16.01.2017 ID:G00295470
Magic Quadrant for Intrusion Detection and Prevention Systems 2017 (G00295470)Security and risk management leaders should know that while IDPSs are being absorbed by firewall placements at the perimeter, they give the best protection. They’re also responding to pressure from uptake of other threat defense solutions, and providing credible internal and cloud placement options.
16.11.2015 ID:G00271823
Magic Quadrant for Intrusion Prevention Systems 2015 (G00271823)The network IPS market continues being absorbed by next-generation firewall placements at the perimeter. Next-generation IPSs offer the best protection and are responding to pressure coming from the uptake of advanced threat defense solutions and the requirement to provide cloud placements.
Полный текст в архиве*

Magic Quadrant for Integrated Risk Management Solutions

15.07.2019 ID:G00369371
Magic Quadrant for Integrated Risk Management Solutions 2019 (G00369371)An IRM strategy reduces siloed risk domains and supports dynamic business decision making via risk-data correlations and shared risk processes. Security and risk management leaders should use this Magic Quadrant to identify technology solutions that support this strategy.
Полный текст

Magic Quadrant for IT Risk Management

03.07.2019 ID:G00383242
Magic Quadrant for IT Risk Management 2019 (G00383242)Demand for ITRM solutions continues to increase as digital ecosystems evolve. Security and risk management leaders managing cybersecurity initiatives, board risk oversight and digital compliance should use this research to evaluate the opportunities and challenges in automating IT risk workflows.
Полный текст

Magic Quadrant for Privileged Access Management

03.12.2018 ID:G00356017
Magic Quadrant for Privileged Access Management 2018 (G00356017)Privileged access management is one of the most critical security controls, particularly in today’s increasingly complex IT environment. Security and risk management leaders must use PAM tools in a long-term strategy for comprehensive risk mitigation.
Полный текст

Magic Quadrant for Secure Email Gateways

29.06.2015 ID:G00268427
Magic Quadrant for Secure Email Gateways 2015 (G00268427)The secure email gateway market is experiencing renewed interest due largely to an increase in targeted phishing attacks. Vendors are responding with URL link protection and attachment sandboxing, but have not addressed social engineering attacks with no payload.
Полный текст в архиве*

Magic Quadrant for Secure Web Gateways

26.11.2018 ID:G00335718
Magic Quadrant for Secure Web Gateways 2018 (G00335718)The secure web gateway marketplace continues to be dominated by appliances; however, the rapid growth of cloud services is becoming a disruptive force in the marketplace. Many vendors have added cloud access security broker functionality through partnerships or technology acquisitions.
Полный текст
12.06.2017 ID:G00328904
Magic Quadrant for Secure Web Gateways 2017 (G00328904)On-premises appliances continue to rule the SWG market, with a 71% market share (as measured by revenue). However, cloud-based SWG services are growing more rapidly, with a five-year historical compound annual growth rate of 32%, versus only 5% for appliances.
28.05.2015 ID:G00267241
Magic Quadrant for Secure Web Gateways 2015 (G00267241)The market for SWG solutions is still dominated by traditional on-premises appliances. But, the use of cloud-based services is growing rapidly, and advanced threat protection functionality remains an important differentiator.

Magic Quadrant for Security Awareness Computer-Based Training

18.07.2019 ID:G00378818
Magic Quadrant for Security Awareness Computer-Based Training 2019 (G00378818)People influence security more than technology or policy, and cybercriminals know how to exploit human behaviors. Security and risk management leaders should invest in tools that increase awareness and influence behavior that supports security business objectives through computer-based training.
Полный текст
13.11.2018 ID:G00345889
Magic Quadrant for Security Awareness Computer-Based Training 2018 (G00345889)People influence security more than technology or policy, and cybercriminals know how to exploit human behaviors. Security and risk management leaders must invest in tools that increase awareness and influence behavior that supports security business objectives through computer-based training.
Полный текст в архиве*

Magic Quadrant for Security Information and Event Management

03.12.2018 ID:G00348811
Magic Quadrant for Security Information and Event Management 2018 (G00348811)Security and risk management leaders increasingly seek SIEM solutions with capabilities that support early targeted attack detection and response. Users must balance advanced SIEM capabilities with the resources needed to run and tune the solution.
Полный текст
04.12.2017 ID:G00315428
Magic Quadrant for Security Information and Event Management 2017 (G00315428)Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
10.08.2016 ID:G00290113
Magic Quadrant for Security Information and Event Management 2016 (G00290113)The need for early targeted attack detection and response is driving the expansion of new and existing SIEM deployments. Advanced users seek SIEM with advanced profiling, analytics and response features.
Полный текст в архиве*
20.07.2015 ID:G00267505
Magic Quadrant for Security Information and Event Management 2015 (G00267505)The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
Полный текст в архиве*

Magic Quadrant for Unified Endpoint Management Tools

06.08.2019 ID:G00369801
Magic Quadrant for Unified Endpoint Management Tools 2019 (G00369801)UEM tools continue to mature as buyers migrate PCs away from legacy client management tools. I&O leaders responsible for mobile and endpoint strategy must evaluate these capabilities along with UEM tools’ ability to perform modern management of PCs and management of mobile devices.
Полный текст

Magic Quadrant for Unified Threat Management

20.09.2018 ID:G00336625
Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) 2018 (G00336625)SMB multifunctional firewalls, or UTM, provide multiple security features in a single appliance to SMB and distributed enterprises. Security and risk management leaders should use this research to select the right vendor based on their requirements and geography.
Полный текст в архиве*
20.06.2017 ID:G00316047
Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) 2017 (G00316047)SMB multifunction firewalls, or UTM, provide SMBs and distributed enterprises with multiple security functions in a single appliance. Network security leaders should use this research to evaluate performance, security, ease of use, local support and technology’s ability to handle new SMB practices.
Полный текст в архиве*
27.08.2015 ID:G00269677
Magic Quadrant for Unified Threat Management 2015 (G00269677)Unified threat management devices provide small and midsize businesses with multiple network security functions in a single appliance. SMB buyers should carefully evaluate UTMs’ performance when numerous security functions are enabled, and UTMs’ ability to handle new SMB practices.
Полный текст

Magic Quadrant for Web Application Firewalls

17.09.2019 ID:G00373533
Magic Quadrant for Web Application Firewalls 2019 (G00373533)Driven by the adoption of cloud web application and API protection services, the web application firewall market is growing. Network and application security leaders need to evaluate how WAFs can provide improved security that’s easy to consume and manage, while respecting data privacy requirements.
Полный текст
29.08.2018 ID:G00340592
Magic Quadrant for Web Application Firewalls 2018 (G00340592)The WAF market is growing, driven by the adoption of cloud WAF services. Enterprise security teams should use this research as part of their evaluations of how WAFs can provide improved security that’s easy to consume and manage, while respecting data privacy requirements.
Полный текст в архиве*
07.08.2017 ID:G00314552
Magic Quadrant for Web Application Firewalls 2017 (G00314552)The WAF market is growing, driven by the adoption of cloud-based WAF service. Enterprise security teams should use this research as part of their evaluation on how WAFs can provide improved security that is also easy to consume and manage, while respecting data privacy requirements.
19.07.2016 ID:G00290000
Magic Quadrant for Web Application Firewalls 2016 (G00290000)The WAF market is growing, with new use cases and security requirements ranging from «good enough» security for compliance to protection against targeted attacks. Enterprise security teams should evaluate how WAFs can provide high security that is also easy to consume and manage.
Полный текст в архиве*
15.07.2015 ID:G00271692
Magic Quadrant for Web Application Firewalls 2015 (G00271692)The WAF market is growing quickly, with a range of deployments from «good enough» to more complex WAF deployments aiming at high security. Enterprise security teams should evaluate how WAFs can provide improved security, require tolerable staff involvement and integrate in their security ecosystem.
Полный текст в архиве*

Начать обсуждение: rucybersecurity.ru