¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬ GartnerÕýʽÐû²¼ÁË2023Äê¡¶Market Guide for Security Orchestration, Automation and Response Solutions¡·±¨¸æ¡£¡£¡£¡£¡£¡£¡£¼Ì2022ÄêÈëÑ¡±¨¸æºó£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Ôٴα»ÁÐΪ¾ßÓдú±íÐԵũӦÉÌ£¨Representative Vendors£©Ö®Ò»¡£¡£¡£¡£¡£¡£¡£
“Çå¾²ÊÖÒÕÊг¡ÆÕ±é´¦ÓÚ³¬ÔØ×´Ì¬£¬£¬£¬£¬£¬£¬£¬Ô¤ËãѹÁ¦¡¢Ô±¹¤ÕÐÆ¸/±£´æÒÔ¼°¹ý¶àµÄµ¥µã½â¾ö¼Æ»®¶¼Êǵ±½ñ×éÖ¯ÃæÁÙµÄÆÕ±éÎÊÌâ¡£¡£¡£¡£¡£¡£¡£Gartner¿Í»§Ò»Ö±·¢Ã÷ÆäÇå¾²ÇéÐÎÖеÄÔËÓªÄÑÌ⣬£¬£¬£¬£¬£¬£¬¹¤¾ßµÄÖØ´óÐÔºÍÖØ¸´ÐÔ½øÒ»²½¼Ó¾çÁ˾¯±¨Æ£ÀÍ¡£¡£¡£¡£¡£¡£¡£”Gartnerдµ½£¬£¬£¬£¬£¬£¬£¬“SOAR½â¾ö¼Æ»®ÓÐÖúÓÚÌá¸ßÇå¾²ÔËӪЧÂÊ£¬£¬£¬£¬£¬£¬£¬Ìá¸ßÇå¾²Á÷³ÌµÄÒ»ÖÂÐÔ£¬£¬£¬£¬£¬£¬£¬Ë¢ÐÂÍþвµÄÔ¤·À¡¢¼ì²âÓëÏìÓ¦£¬£¬£¬£¬£¬£¬£¬Ë¢ÐÂÓÅÏȼ¶Åжϣ¬£¬£¬£¬£¬£¬£¬Â䵨ÍþвÇ鱨¡£¡£¡£¡£¡£¡£¡£Ôڴ󲿷ÖÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬ÕâЩ¶¼ÊÇÔËÓªÇå¾²ÔËÓªÖÐÐĵÄ×îÖÕÓû§×éÖ¯ºÍЧÀÍÌṩÉ̵ÄÒªº¦½»¸¶Ð§¹û¡£¡£¡£¡£¡£¡£¡£”
GartnerÌåÏÖ£¬£¬£¬£¬£¬£¬£¬“SOAR½â¾ö¼Æ»®½«ÊÂÎñÏìÓ¦¡¢±àÅźÍ×Ô¶¯»¯ÒÔ¼°ÍþвÇ鱨 (TI) ÖÎÀí¹¦Ð§¼¯³ÉÔÚÒ»¸öƽ̨ÖС£¡£¡£¡£¡£¡£¡£SOAR ¹¤¾ß»¹ÓÃÓڼͼºÍʵÑéÁ÷³Ì£¨ÓÖÃû¾ç±¾¡¢ÊÂÇéÁ÷³ÌºÍÁ÷³Ì£©£»£»£»£»£»£»Ö§³ÖÇå¾²ÊÂÎñÖÎÀí£»£»£»£»£»£»²¢ÏòÈËÀàÇå¾²ÆÊÎöʦºÍ²Ù×÷Ô±Ó¦ÓûùÓÚ»úеµÄÐÖú¡£¡£¡£¡£¡£¡£¡£SOAR ½â¾ö¼Æ»®±ØÐèÌṩ£º
Gartner½«SOARµÄÊг¡ÐÎòΪ£º“ SOAR ½â¾ö¼Æ»®ÊÇÈýÖÖÀúÊ·Éϲî±ðµÄÊÖÒÕ£¨Çå¾²ÊÂÎñÏìӦƽ̨¡¢Çå¾²±àÅÅÓë×Ô¶¯»¯¡¢ÍþвÇ鱨ƽ̨£©µÄÈںϣ¬£¬£¬£¬£¬£¬£¬ÕâЩÊÖÒÕ¾ßÓÐһЩÅäºÏµÄÊôÐÔºÍһЩʹÓÃËüÃǵij£¼ûÓû§¡£¡£¡£¡£¡£¡£¡£ÕâЩÊÖÒÕÔÚÀúÊ·ÉÏÊÇÆæÒìµÄ£¬£¬£¬£¬£¬£¬£¬²¢ÒÔ²úÆ·µÄÐÎʽΪÇå¾²ÔËÓªÍŶÓÌṩÊÊÓÃÐÔ£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ¼õÇáÐí¶àÇå¾²²Ù×÷¹¦Ð§µÄ´ó×ÚÌåÁ¦ÀͶ¯¡£¡£¡£¡£¡£¡£¡£”
ͬʱ£¬£¬£¬£¬£¬£¬£¬GartnerÔÚÊг¡Ö¸ÄÏÖÐÌáµ½£ºÔÚÑ¡ÔñSOAR½â¾ö¼Æ»®Ê±ÓÐÎå¸ö½¨Òé˼Á¿µÄÒªÇó£º
ÆäÒ»£¬£¬£¬£¬£¬£¬£¬Ö§³Ö¶à¸öÏÖÓе¥µã½â¾ö¼Æ»®Êг¡µÄÖÖÖÖÇå¾²²úÆ·£¨ÀýÈçÖն˱£»£»£»£»£»£»¤Æ½Ì¨¡¢·À»ðǽ¡¢IDPS¡¢SIEM¡¢Çå¾²µç×ÓÓʼþÍø¹Ø¡¢SSE ºÍÎó²îÆÀ¹ÀÊÖÒÕ£©¡£¡£¡£¡£¡£¡£¡£
Æä¶þ£¬£¬£¬£¬£¬£¬£¬Ö§³Ö¾ÙÐÐÊÂÎñ¹ØÁªºÍ¾ÛºÏµÄÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬ÒÔË¢ÐÂÇå¾²ÔËÓªÁ÷³Ì²¢Í¨¹ý¸üºÃµÄÊÂÎñ¸»ºñÀ´·¢³ö¾¯±¨¡£¡£¡£¡£¡£¡£¡£ÊµÏÖÕâһĿµÄµÄÒ»¸öÒªº¦ÒªÁìÊÇͨ¹ýʵÑéµÍ´úÂ둾籾’£¬£¬£¬£¬£¬£¬£¬ËüÔÊÐí¶ÔÁ÷³Ì¾ÙÐбàÂ룬£¬£¬£¬£¬£¬£¬ÔÚÆäÖÐÓ¦ÓÃ×Ô¶¯»¯À´Ìá¸ßÒ»ÖÂÐÔ²¢½ÚԼʱ¼ä¡£¡£¡£¡£¡£¡£¡£
ÆäÈý£¬£¬£¬£¬£¬£¬£¬Äܹ»ÔÚÍâµØ°²ÅÅ»ò×÷ÎªÔÆ½â¾ö¼Æ»®£¨Èç SaaS£©°²ÅÅ¡£¡£¡£¡£¡£¡£¡£
ÆäËÄ£¬£¬£¬£¬£¬£¬£¬Ö§³Ö´ÓµÚÈý·½ÈªÔ´ÉãÈ¡ÖÖÖÖȪԴºÍÃûÌÃµÄ TI£¬£¬£¬£¬£¬£¬£¬Ö§³Ö¿ªÔ´¡¢ÐÐÒµºÍÕþ¸®ºÍÉÌÒµÌṩÉÌ¡£¡£¡£¡£¡£¡£¡£
ÆäÎ壬£¬£¬£¬£¬£¬£¬Óë IT ÔËÓª½â¾ö¼Æ»®£¨ÀýÈçÓÃÓÚ°¸ÀýÖÎÀíµÄ¹¤µ¥ÏµÍ³£©ºÍÐ×÷¹¤¾ß£¨ÀýÈçÓÃÓÚ¸üºÃµÄʵʱͨѶµÄÐÂÎÅÓ¦ÓóÌÐò£©µÄË«Ïò¼¯³É¡£¡£¡£¡£¡£¡£¡£
±¾´Î±¨¸æÖУ¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Ôٴα»GartnerÆÀΪSOAR´ú±í¹©Ó¦ÉÌÖ®Ò»¡£¡£¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!SOAR¾ß±¸Çø±ðÓÚÆäËüͬÀà²úÆ·µÄ5´ó¸Åº¦ÄÜÁ¦——Çå¾²ÄÜÁ¦±àÅÅ»¯¡¢Çå¾²Á÷³Ì×Ô¶¯»¯¡¢¸æ¾¯ÏìÓ¦ÖÇÄÜ»¯¡¢°¸ÀýÖÎÀíÐ×÷»¯¡¢ÏµÍ³¼Ü¹¹¿ª·Å»¯¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬SOARµÄÐͬ×÷Õ½ÊÒ¹¦Ð§£¬£¬£¬£¬£¬£¬£¬»¹ÄÜÈÃÇå¾²¹¤³ÌʦʵʱÏàͬ¡¢²¢ÄÚÖôó×Ú×Ô¶¯»¯¾ç±¾ºÍÏÂÁ£¬£¬£¬£¬£¬£¬½øÒ»²½ÌáÉýÈË»úÐͬ×÷սЧÂÊ¡£¡£¡£¡£¡£¡£¡£

Õë¶ÔGartnerÔÚ±¨¸æÖÐÐÎòµÄÄ¿½ñÇå¾²ÔËÓªÃæÁÙµÄÌôÕ½£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!SOAR¿ÉÒÔ×ÊÖúÆóÒµºÍ×éÖ¯½«ÖØ´óµÄÇå¾²ÏìÓ¦Á÷³ÌÕûÀí³ÉÐж¯¼Æ»®ºÍ¾ç±¾£¬£¬£¬£¬£¬£¬£¬½«ÀëÉ¢µÄÇå¾²¹¤¾ßºÍ¹¦Ð§×ª»»Îª¿É±à³ÌµÄÓ¦ÓúÍÐж¯£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓñàÅźÍ×Ô¶¯»¯ÊÖÒÕе÷ÍŶӡ¢¹¤¾ßºÍÁ÷³Ì£¬£¬£¬£¬£¬£¬£¬ÓÐÓýâ¾öÁËÆóÒµºÍ×éÖ¯Çå¾²ÔËÓªÏìӦְԱȱ·¦¡¢Çå¾²ÊÂÎñÏìÓ¦²»ÊµÊ±¡¢ÔËӪά»¤ÊÂÇéÖØ¸´¡¢Çå¾²×°±¸Ö®¼äȱ·¦ÐͬÇÒÁª¶¯ÐÔ²îµÈÎÊÌâ¡£¡£¡£¡£¡£¡£¡£
³ýÁ˳£Ì¬»¯µÄÇå¾²ÔËÓªÊÂÇéÍ⣬£¬£¬£¬£¬£¬£¬ÔÚÖØ´óÔ˶¯ÍøÂçÇå¾²°ü¹Üʱ´ú£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!SOAR»¹¿ÉÒÔ×ÊÖú¿Í»§ÔÚÊÂÇ°ÖÆ¶©Ô¤°¸ÒÔÒÝ´ýÀÍ¡¢ÊÂÖÐ×Ô¶¯ÏìÓ¦¿ìËÙ´¦Öóͷ£¡¢Êºó¸´ÅÌ×ܽá»ýÀÛÂÄÀú£¬£¬£¬£¬£¬£¬£¬È«·½Î»ÌáÉýʵս»¯¡¢ÏµÍ³»¯¡¢³£Ì¬»¯Çå¾²ÔËӪˮƽ¡£¡£¡£¡£¡£¡£¡£
GartnerÌåÏÖ£¬£¬£¬£¬£¬£¬£¬“ÉÌÒµSOAR¹©Ó¦ÉÌ¿ÉÒÔ·ÖΪÁ½Àà——Éú̬ϵͳÓÅÏȽâ¾ö¼Æ»®ºÍ¿ª·Å¼æÈÝÐÔ½â¾ö¼Æ»®¡£¡£¡£¡£¡£¡£¡£”
¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬È«ÇòIT×Éѯ»ú¹¹Gartner?ÕýʽÐû²¼2025Äê¡¶Çå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©Ä§Á¦ÏóÏÞ¡·£¨Magic Quadrant? for Security Information and Event Management£©±¨¸æ£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Ò»Á¬µÚ¶þÄêÈëÑ¡¸ÃħÁ¦ÏóÏÞ¡£¡£¡£¡£¡£¡£¡£ÎÒÃÇÐÅÍУ¬£¬£¬£¬£¬£¬£¬Õâ´ú±í×ÅÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÔÚSIEMÁìÓòµÄÊÖÒÕÁ¢Òì¡¢²úÆ·³ÉÊì¶ÈÓëÊг¡¾ºÕùÁ¦£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇNGSOC£¨Ì¬ÊƸÐÖªÓëÇå¾²ÔËӪƽ̨£©ÔÚÖÇÄÜ»¯ÔËÓª·½Ãæ»ñµÃÁËÍ»ÆÆ£¬£¬£¬£¬£¬£¬£¬ÕâһЧ¹û²»µ«±ê¼Ç×ÅÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÇå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀíÄÜÁ¦»ñµÃÈ«Çò¶¥¼â»ú¹¹µÄÒ»Á¬ÈϿɣ¬£¬£¬£¬£¬£¬£¬¸üΪº£ÄÚÇå¾²³§É̼ÓÈë¹ú¼Ê¾ºÕùÊ÷Á¢Á˱ê¸Ë¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇé
ÈÕǰ£¬£¬£¬£¬£¬£¬£¬Gartner?Ðû²¼¡¶2025ÄêÖйúÍøÂçÇå¾²ÊÖÒÕ³ÉÊì¶ÈÇúÏß¡·£¨Hype Cycle? for Cybersecurity in China, 2025£©¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤±¨¸æ£º ¡°Ê×ϯÐÅÏ¢¹ÙºÍÏà¹ØÈÏÕæÈË¿ÉÒÔʹÓñ¾ÊÖÒÕ³ÉÊì¶ÈÇúÏßÀ´È·¶¨ÊÊÓõġ¢¸ß¼ÛÖµµÄÊÖÒÕºÍʵ¼ù£¬£¬£¬£¬£¬£¬£¬ÒÔ¼á³Ö×éÖ¯µÄÇå¾²ÐÔºÍÎÞаÐÔ¡£¡£¡£¡£¡£¡£¡£¡±±¾´ÎÐû²¼µÄ³ÉÊì¶ÈÇúÏßÖУ¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!±»ÁÐΪ10¸öÒªº¦ÁìÓòµÄ´ú±í¹©Ó¦ÉÌ£¨Sample Vendors£©¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇé
Gartner?Ðû²¼µÄ¡¶ÖйúÌØÈ¨»á¼ûÖÎÀíÊг¡Ö¸ÄÏ¡·£¨¡¶Market Guide for Privileged Access Management in China¡·£©±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÖÜÈ«ÏÈÈÝÁËÌØÈ¨»á¼ûÖÎÀí£¨PAM£©¹¤¾ßµÄ¹¦Ð§Ìص㡢½¹µãÓÅÊÆ¼°Ö÷ÒªÓ¦Óó¡¾°¡£¡£¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÔÌØÈ¨Õ˺ÅÖÎÀíϵͳ£¨PAM£©¼°ÔËάÇå¾²ÖÎÀíϵͳ£¨±¤ÀÝ»ú£©ÀÖ³ÉÈëÑ¡£¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬³ÉΪº£ÄÚÌØÈ¨»á¼ûÖÎÀí´ú±íÐÔ¹©Ó¦ÉÌ£¨Representative Providers£©¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇé
¹ú¼ÊÊг¡Ñо¿Óë×Éѯ»ú¹¹Gartner?½üÆÚÐû²¼ÁË¡¶ÖйúÇéÐΣºÊý¾ÝÇ徲ƽ̨Êг¡Ö¸ÄÏ¡·£¨China Context:¡®Market Guide for Data Security Platforms¡¯£©£¬£¬£¬£¬£¬£¬£¬ÒÔΪ¡°Êý¾ÝÇ徲ƽ̨¿ÉÒÔʵÏÖÊý¾ÝÇå¾²ÖÎÀíµÄ×Ô¶¯»¯£¬£¬£¬£¬£¬£¬£¬²¢Ìá¸ßÕû¸ö×éÖ¯Êý¾Ý´æ´¢¿âµÄºÏ¹æÐÔ¡±£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷ÁËÊý¾ÝÇ徲ƽ̨ÔÚÏÖ´úÆóÒµÖÎÀíÖеÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÀ¸½Êý¾ÝÇå¾²¹Ü¿ØÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬±»È϶¨Îªº£ÄÚ¸ÃÁìÓò´ú±íÐÔ¹©Ó¦ÉÌ(Representative Vendors)¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇéÄú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ¿ÉÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ
½«Äú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ
ÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ