¹ú¼ÊÊг¡Ñо¿Óë×Éѯ»ú¹¹Gartner?½üÆÚÐû²¼ÁË¡¶ÖйúÇéÐΣºÊý¾ÝÇ徲ƽ̨Êг¡Ö¸ÄÏ¡·£¨China Context:¡®Market Guide for Data Security Platforms¡¯£©£¬£¬£¬£¬£¬£¬£¬£¬ÒÔΪ¡°Êý¾ÝÇ徲ƽ̨¿ÉÒÔʵÏÖÊý¾ÝÇå¾²ÖÎÀíµÄ×Ô¶¯»¯£¬£¬£¬£¬£¬£¬£¬£¬²¢Ìá¸ßÕû¸ö×éÖ¯Êý¾Ý´æ´¢¿âµÄºÏ¹æÐÔ¡±£¬£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷ÁËÊý¾ÝÇ徲ƽ̨ÔÚÏÖ´úÆóÒµÖÎÀíÖеÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÀ¸½Êý¾ÝÇå¾²¹Ü¿ØÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬£¬±»È϶¨Îªº£ÄÚ¸ÃÁìÓò´ú±íÐÔ¹©Ó¦ÉÌ(Representative Vendors)¡£¡£¡£¡£¡£
¹ú¼ÊÊг¡Ñо¿Óë×Éѯ»ú¹¹Gartner®½üÆÚÐû²¼ÁË¡¶ÖйúÇéÐΣºÊý¾ÝÇ徲ƽ̨Êг¡Ö¸ÄÏ¡·£¨China Context:‘Market Guide for Data Security Platforms’£©£¬£¬£¬£¬£¬£¬£¬£¬ÒÔΪ“Êý¾ÝÇ徲ƽ̨¿ÉÒÔʵÏÖÊý¾ÝÇå¾²ÖÎÀíµÄ×Ô¶¯»¯£¬£¬£¬£¬£¬£¬£¬£¬²¢Ìá¸ßÕû¸ö×éÖ¯Êý¾Ý´æ´¢¿âµÄºÏ¹æÐÔ”£¬£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷ÁËÊý¾ÝÇ徲ƽ̨ÔÚÏÖ´úÆóÒµÖÎÀíÖеÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÀ¸½Êý¾ÝÇå¾²¹Ü¿ØÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬£¬±»È϶¨Îªº£ÄÚ¸ÃÁìÓò´ú±íÐÔ¹©Ó¦ÉÌ(Representative Vendors)¡£¡£¡£¡£¡£
Ëæ×ÅÖйúÊг¡µÄÒ»Ö±ÔöÌí£¬£¬£¬£¬£¬£¬£¬£¬¹Å°åÊèÉ¢µÄÊý¾ÝÇå¾²²½·¥ÒÑÎÞ·¨Öª×ãÈÕÒæÑÏ¿áµÄºÏ¹æÐèÇ󡣡£¡£¡£¡£¹ØÓÚIT¼Ü¹¹ÊèÉ¢ÇÒ×Ô¶¯»¯ÄÜÁ¦ÓÐÏÞµÄÆóÒµÀ´Ëµ£¬£¬£¬£¬£¬£¬£¬£¬È±·¦±ê×¼»¯APIÊÇÒ»´óÌôÕ½¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬£¬“Äܹ»Ö§³ÖÊý¾ÝÇå¾²ÖÎÀí(DSG)£¬£¬£¬£¬£¬£¬£¬£¬²¢Ìá¸ßÊý¾ÝפÁô¡¢Á÷ͨºÍʹÓõĿɼûÐÔ”µÄÊý¾ÝÇ徲ƽ̨±äµÃÓÈΪÖ÷Òª£¬£¬£¬£¬£¬£¬£¬£¬“ËüÃÇʹÆóÒµÄܹ»¸üÇáËɵØÔÚ²î±ð²úÆ·Ö®¼äʵÑéÒ»ÖµÄÇå¾²Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬£¬²¢¼ò»¯Êý¾ÝΣº¦ºÍºÏ¹æÐÔÆÀ¹ÀÁ÷³Ì¡£¡£¡£¡£¡£”
¾ÝGartnerÐû²¼µÄ2024ÄêÖйúÇå¾²ÊÖÒÕ³ÉÊì¶ÈÇúÏß±¨¸æ£¨¡¶Hype Cycle™ for Security in China, 2024¡·£©ÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÇ徲ƽ̨Õý´¦ÓÚÊÖÒÕÃÈÑ¿ÆÚ£¬£¬£¬£¬£¬£¬£¬£¬¾ßÓи߶ȵÄÐ§ÒæÆÀ¼¶(Benefit Rating)¡£¡£¡£¡£¡£ÎÒÃÇÐÅÍУ¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÊý¾ÝÇ徲ƽ̨µÄÏà¹ØÁ¢ÒìÊÖÒÕÈ¡µÃÁËÍ»ÆÆÐÔÏ£Íû£¬£¬£¬£¬£¬£¬£¬£¬ÆäδÀ´¾ßÓÐÖØ´óµÄÊг¡Ç±Á¦ºÍÁ¢ÒìÐÔ¡£¡£¡£¡£¡£
Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Êý¾ÝÇå¾²¹Ü¿ØÆ½Ì¨ÊÇ»ùÓÚ´óÊý¾ÝÊÖÒÕ¿ò¼ÜºÍ·ÖÁìÓòÃô¸ÐÊý¾Ý±êʶÊÖÒÕÍÆ³öµÄÊý¾ÝÇå¾²ÖÎÀíÓëÔËӪƽ̨¡£¡£¡£¡£¡£ÏµÍ³»ùÓÚ“Ò»Á¬×Ô˳ӦΣº¦ÓëÐÅÍÐÆÀ¹À£¨CARTA£©”µÄÇå¾²ÀíÄ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃͳһµÄÊý¾ÝÇå¾²¹Ü¿ØÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬£¬¹¹½¨ÃæÏòÊý¾ÝÇå¾²µÄËĸö½¹µãÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬£¬¼´·¢Ã÷ÄÜÁ¦¡¢¼ì²âÄÜÁ¦¡¢ÆÊÎöÄÜÁ¦¡¢´¦Öóͷ£ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬£¬ÊµÏÖ¶ÔÊý¾ÝÇå¾²×ÜÌåΣº¦µÄÌ¬ÊÆ¸ÐÖª¡£¡£¡£¡£¡£

È¥ÄêµÚÆß½ìÊý×ÖÖйú½¨Éè·å»áÉÏ£¬£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Ðû²¼ÁËаæ“Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Êý¾ÝÇå¾²¹Ü¿ØÆ½Ì¨”£¬£¬£¬£¬£¬£¬£¬£¬½øÒ»²½½â¾öÁËÊý¾Ý×ʲúÄÑÊáÀí¡¢Êý¾ÝÁ÷¶¯ÄѼà²â¡¢Êý¾ÝΣº¦ÄÑÆÊÎö¡¢Çå¾²ÔËÓªÄÑÂ䵨µÈϵÁÐÎÊÌâ¡£¡£¡£¡£¡£ÔÚ¹¦Ð§ÉÏ£¬£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÇå¾²¹Ü¿ØÆ½Ì¨¾ßÓÐËÄ´óÌØµã£º
l ¿´ÇåÊý¾Ýȫò£¬£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÂþÑÜÃþµÃÇå¡£¡£¡£¡£¡£ÄÜ×ÊÖúÆóÒµÇåÎúµØÏàʶ×ÔÉíÊý¾ÝµÄÂþÑܺÍ״̬£¬£¬£¬£¬£¬£¬£¬£¬ÎªÊý¾ÝµÄÇå¾²ÖÎÀíÌṩÓÐÁ¦Ö§³Ö£»£»£»£»£»£»£»
l ÖÜÈ«¼à²â·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÁ÷¶¯¿´µÃ¼û¡£¡£¡£¡£¡£Í¨¹ýʵʱ¼à²âÊý¾ÝµÄÁ÷¶¯¹ì¼££¬£¬£¬£¬£¬£¬£¬£¬ÆÊÎöÊý¾ÝµÄʹÓÃÇéÐΣ¬£¬£¬£¬£¬£¬£¬£¬×ÊÖúÆóÒµÏàʶÊý¾ÝµÄÉúÃüÖÜÆÚºÍÁ÷Ïò£»£»£»£»£»£»£»
l ¸»ºñÇå¾²Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÒì³£ÄܸÐÖª¡£¡£¡£¡£¡£²»µ«ÄܽµµÍÆóÒµÊý¾Ýй¶µÄΣº¦£¬£¬£¬£¬£¬£¬£¬£¬»¹ÄÜÌá¸ßÆóÒµ¶ÔÇ徲Σº¦µÄÓ¦¶ÔÄÜÁ¦£»£»£»£»£»£»£»
l ¶àÖÖ´¦Öóͷ£ÊֶΣ¬£¬£¬£¬£¬£¬£¬£¬Î£º¦ÊÂÎñ¹ÜµÃס¡£¡£¡£¡£¡£Ò»µ©·¢Ã÷Ç徲Σº¦£¬£¬£¬£¬£¬£¬£¬£¬Äܹ»Ñ¸ËÙ¶¨Î»ÉæÊÂÖ÷Ì壬£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¼¯ÖÐËÝÔ´¼ìË÷ºÍ±Õ»·´¦Öóͷ£¸ú×Ù£¬£¬£¬£¬£¬£¬£¬£¬È·±£Î£º¦ÊÂÎñ»ñµÃʵʱÓÐÓõĴ¦Öóͷ£¡£¡£¡£¡£¡£
ÔÚÐÐÒµÏÖʵӦÓÃÖУ¬£¬£¬£¬£¬£¬£¬£¬GartnerÊӲ쵽£¬£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÇ徲ƽ̨µÄ“¿É¼ûÐԺͿØÖÆÁ¦Ìá¸ßÁËСÎÒ˽¼ÒºÍ×éÖ¯Ö®¼äÊý¾ÝÁ÷ͨµÄÇå¾²ÐÔ£¬£¬£¬£¬£¬£¬£¬£¬²¢Ôö½øÁËÓëÊý¾Ý¡¢ÆÊÎöºÍAIÍýÏëÏà¹ØµÄÊý¾Ý×ʲúµÄÆÕ±éʹÓÔ¡£¡£¡£¡£¡£ÎÒÃÇÒÔΪ£¬£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇÔÚÖйúµÄ½ðÈÚ¡¢´óÐÍÆóÒµºÍÕþ¸®²¿·Ö£¬£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÇ徲ƽ̨¸üÆðµ½ÁËÆð¾¢µÄÍÆÐж¯Óᣡ£¡£¡£¡£
Gartner, China Context: ‘Market Guide for Data Security Platforms’, 7 January 2025
Gartner, Hype Cycle for Security in China, 2024, 6 August 2024
ÉùÃ÷
GARTNER ºÍHYPE CYCLEÊÇ Gartner£¬£¬£¬£¬£¬£¬£¬£¬Inc.ºÍ/»òÆäÁ¥Êô¹«Ë¾ÔÚÃÀ¹úºÍ¹ú¼ÊÉϵÄ×¢²áÉ̱êºÍЧÀͱê¼Ç£¬£¬£¬£¬£¬£¬£¬£¬¾ÔÊÐíÔÚ´ËʹÓᣡ£¡£¡£¡£±£´æËùÓÐȨÁ¦¡£¡£¡£¡£¡£Gartner ²»ÈÏ¿ÉÆäÑо¿³öÊéÎïÖÐÐÎòµÄÈκι©Ó¦ÉÌ¡¢²úÆ·»òЧÀÍ£¬£¬£¬£¬£¬£¬£¬£¬Ò²²»½¨ÒéÊÖÒÕÓû§½öÑ¡Ôñ¾ßÓÐ×î¸ßÆÀ¼¶»òÆäËû³ÆºôµÄ¹©Ó¦ÉÌ¡£¡£¡£¡£¡£Gartner Ñо¿³öÊéÎï°üÀ¨ Gartner Ñо¿»ú¹¹µÄÒâ¼û£¬£¬£¬£¬£¬£¬£¬£¬²»Ó¦±»Ú¹ÊÍΪÊÂʵ³ÂÊö¡£¡£¡£¡£¡£Gartner ²»¼ç¸ºÓë±¾Ñо¿ÓйصÄËùÓÐÕÑʾ»òÌåÏֵİü¹Ü£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¶ÔÊÊÏúÐÔ»òÌØ¶¨ÓÃ;ÊÊÓÃÐÔµÄÈκΰü¹Ü¡£¡£¡£¡£¡£
¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬£¬È«ÇòIT×Éѯ»ú¹¹Gartner?ÕýʽÐû²¼2025Äê¡¶Çå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©Ä§Á¦ÏóÏÞ¡·£¨Magic Quadrant? for Security Information and Event Management£©±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Ò»Á¬µÚ¶þÄêÈëÑ¡¸ÃħÁ¦ÏóÏÞ¡£¡£¡£¡£¡£ÎÒÃÇÐÅÍУ¬£¬£¬£¬£¬£¬£¬£¬Õâ´ú±í×ÅÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÔÚSIEMÁìÓòµÄÊÖÒÕÁ¢Òì¡¢²úÆ·³ÉÊì¶ÈÓëÊг¡¾ºÕùÁ¦£¬£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇNGSOC£¨Ì¬ÊƸÐÖªÓëÇå¾²ÔËӪƽ̨£©ÔÚÖÇÄÜ»¯ÔËÓª·½Ãæ»ñµÃÁËÍ»ÆÆ£¬£¬£¬£¬£¬£¬£¬£¬ÕâһЧ¹û²»µ«±ê¼Ç×ÅÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÇå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀíÄÜÁ¦»ñµÃÈ«Çò¶¥¼â»ú¹¹µÄÒ»Á¬ÈϿɣ¬£¬£¬£¬£¬£¬£¬£¬¸üΪº£ÄÚÇå¾²³§É̼ÓÈë¹ú¼Ê¾ºÕùÊ÷Á¢Á˱ê¸Ë¡£¡£¡£¡£¡£
Éó²éÏêÇé
ÈÕǰ£¬£¬£¬£¬£¬£¬£¬£¬Gartner?Ðû²¼¡¶2025ÄêÖйúÍøÂçÇå¾²ÊÖÒÕ³ÉÊì¶ÈÇúÏß¡·£¨Hype Cycle? for Cybersecurity in China, 2025£©¡£¡£¡£¡£¡£Æ¾Ö¤±¨¸æ£º ¡°Ê×ϯÐÅÏ¢¹ÙºÍÏà¹ØÈÏÕæÈË¿ÉÒÔʹÓñ¾ÊÖÒÕ³ÉÊì¶ÈÇúÏßÀ´È·¶¨ÊÊÓõġ¢¸ß¼ÛÖµµÄÊÖÒÕºÍʵ¼ù£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼á³Ö×éÖ¯µÄÇå¾²ÐÔºÍÎÞаÐÔ¡£¡£¡£¡£¡£¡±±¾´ÎÐû²¼µÄ³ÉÊì¶ÈÇúÏßÖУ¬£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!±»ÁÐΪ10¸öÒªº¦ÁìÓòµÄ´ú±í¹©Ó¦ÉÌ£¨Sample Vendors£©¡£¡£¡£¡£¡£
Éó²éÏêÇé
Gartner?Ðû²¼µÄ¡¶ÖйúÌØÈ¨»á¼ûÖÎÀíÊг¡Ö¸ÄÏ¡·£¨¡¶Market Guide for Privileged Access Management in China¡·£©±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬ÖÜÈ«ÏÈÈÝÁËÌØÈ¨»á¼ûÖÎÀí£¨PAM£©¹¤¾ßµÄ¹¦Ð§Ìص㡢½¹µãÓÅÊÆ¼°Ö÷ÒªÓ¦Óó¡¾°¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÔÌØÈ¨Õ˺ÅÖÎÀíϵͳ£¨PAM£©¼°ÔËάÇå¾²ÖÎÀíϵͳ£¨±¤ÀÝ»ú£©ÀÖ³ÉÈëÑ¡£¬£¬£¬£¬£¬£¬£¬£¬³ÉΪº£ÄÚÌØÈ¨»á¼ûÖÎÀí´ú±íÐÔ¹©Ó¦ÉÌ£¨Representative Providers£©¡£¡£¡£¡£¡£
Éó²éÏêÇé
¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¹ú¼ÊÊг¡Ñо¿Óë×Éѯ»ú¹¹Gartner?Ðû²¼ÁË¡¶ÖйúÌØÈ¨»á¼ûÖÎÀíÁ¢Òì¶´²ì¡·£¨¡¶Innovation Insight for Privileged Access Management in China¡·£¬£¬£¬£¬£¬£¬£¬£¬ÏÂÎļò³Æ¡°±¨¸æ¡±£©£¬£¬£¬£¬£¬£¬£¬£¬ÆÊÎöÁËÌØÈ¨»á¼ûÖÎÀí¹¤¾ßµÄÒªº¦×÷Óá¢ÊÖÒÕÑݽø²¢¸ø³öÁËʵ¼ù½¨Òé¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÀ¸½ÌØÈ¨Õ˺ÅÖÎÀíϵͳ£¨PAM£©¼°ÅäÌ×½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬£¬£¬±»ÆÀΪº£ÄÚÌØÈ¨»á¼ûÖÎÀíÁìÓòµÄ´ú±íÐÔ¹©Ó¦ÉÌ(Representative Providers)¡£¡£¡£¡£¡£
Éó²éÏêÇéÄú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ¿ÉÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ
½«Äú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ
ÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ
¿ì½Ý´°¿Ú
ÆìÏÂÍøÕ¾
¹ØÓÚÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!
95015ЧÀÍÈÈÏß
΢ÐŹ«ÖÚºÅ
Á¬Ã¦²¦´ò