2023Äê9ÔÂ25ÈÕ<br /> 2023Äê9ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬GartnerÐû²¼¡¶Market Guide for Zero Trust Network Access, China¡·±¨¸æ£¨¡¶ÖйúÁãÐÅÍÐÍøÂç»á¼ûÊг¡Ö¸ÄÏ¡·£¬£¬£¬£¬£¬£¬£¬£¬ºó¼ò³Æ¡°¡¶±¨¸æ¡·¡±, 2023Äê9Ô£©£¬£¬£¬£¬£¬£¬£¬£¬ÏêϸÆÊÎöÁËÖйúÁãÐÅÍÐÍøÂç»á¼û£¨ZTNA£©Êг¡Éú³¤Ç÷ÊÆ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ¶ÔÆÚÍû°²ÅÅZTNAµÄº£ÄÚÕþÆó×éÖ¯Çå¾²ÈÏÕæÈËÌá³öÏà¹Ø½¨Òé¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!±»ÁÐΪ¾ßÓдú±íÐԵũӦÉÌ£¨Representative Vendors£©Ö®Ò»¡£¡£¡£¡£¡£¡£¡£
GartnerÔÚ¡¶±¨¸æ¡·ÖÐÌá³öÁËÑ¡Ôñ°²ÅÅZTNAʱµÄËĸö½¨Ò飺

Ææ°²ÌìÐÅͨ¹ý“¿ÉÐÅ»á¼û¡¢ÊÂÇé¿Õ¼ä¡¢ÓªÒµ±£»£»£»£»£»¤¡¢¶¯Ì¬Õ½ÂÔ”ËÄ´ó½¹µãÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬£¬½«ÁãÐÅÍÐÈÚÈëÊý×Ö»¯ÊÂÇ鳡¾°Ö®ÖУ¬£¬£¬£¬£¬£¬£¬£¬¿ªÆô“È«³¡¾°È«ÖÕ¶Ë¿ÉÐŽÓÈë¡¢ÊÂÇéÇéÐοªÏä¼´Óá¢ÊÂÇéÓªÒµÒ»¼ü¿É´ï”µÄÊý×Ö»¯ÊÂÇéÌåÑ飬£¬£¬£¬£¬£¬£¬£¬ÎªÊýÖÇʱ´ú¿í´óÆóÒµ´òÔìһվʽÇå¾²ÊÂÇéÈë¿Ú¡£¡£¡£¡£¡£¡£¡£
ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÔÚÁãÐÅÍÐÁìÓòЧ¹û·á¸»£¬£¬£¬£¬£¬£¬£¬£¬¹ãÊÜÒµÄÚÈϿɣ¬£¬£¬£¬£¬£¬£¬£¬»ñµÃÖî¶à½±Ï£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÔÚÕþ¸®¡¢½ðÈÚ¡¢Í¨Ñ¶¡¢ÄÜÔ´¡¢Ãñº½µÈÖÚ¶àÐÐÒµÖÜÈ«Â䵨£¬£¬£¬£¬£¬£¬£¬£¬Ð§ÀͿͻ§Êýǧ¼Ò£¬£¬£¬£¬£¬£¬£¬£¬Íê³ÉÁËÖÚ¶à±ê¸ËÏîÄ¿£¬£¬£¬£¬£¬£¬£¬£¬Ò»Á¬ÊµÏÖ¸ßËÙÔöÌí¡£¡£¡£¡£¡£¡£¡£
ÉùÃ÷
GARTNER ÊÇ Gartner£¬£¬£¬£¬£¬£¬£¬£¬ Inc. ºÍ/»òÆäÁ¥Êô¹«Ë¾ÔÚÃÀ¹úºÍ¹ú¼ÊÉϵÄ×¢²áÉ̱êºÍЧÀͱê¼Ç£¬£¬£¬£¬£¬£¬£¬£¬¾ÔÊÐíÔÚ´ËʹÓᣡ£¡£¡£¡£¡£¡£±£´æËùÓÐȨÁ¦¡£¡£¡£¡£¡£¡£¡£Gartner ²»ÈÏ¿ÉÆäÑо¿³öÊéÎïÖÐÐÎòµÄÈκι©Ó¦ÉÌ¡¢²úÆ·»òЧÀÍ£¬£¬£¬£¬£¬£¬£¬£¬Ò²²»½¨ÒéÊÖÒÕÓû§½öÑ¡Ôñ¾ßÓÐ×î¸ßÆÀ¼¶»òÆäËû³ÆºôµÄ¹©Ó¦ÉÌ¡£¡£¡£¡£¡£¡£¡£Gartner Ñо¿³öÊéÎï°üÀ¨ Gartner Ñо¿»ú¹¹µÄÒâ¼û£¬£¬£¬£¬£¬£¬£¬£¬²»Ó¦±»Ú¹ÊÍΪÊÂʵ³ÂÊö¡£¡£¡£¡£¡£¡£¡£Gartner ²»¼ç¸ºÓë±¾Ñо¿ÓйصÄËùÓÐÕÑʾ»òÌåÏֵİü¹Ü£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨¶ÔÊÊÏúÐÔ»òÌØ¶¨ÓÃ;ÊÊÓÃÐÔµÄÈκΰü¹Ü¡£¡£¡£¡£¡£¡£¡£
¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬£¬È«ÇòIT×Éѯ»ú¹¹Gartner?ÕýʽÐû²¼2025Äê¡¶Çå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©Ä§Á¦ÏóÏÞ¡·£¨Magic Quadrant? for Security Information and Event Management£©±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Ò»Á¬µÚ¶þÄêÈëÑ¡¸ÃħÁ¦ÏóÏÞ¡£¡£¡£¡£¡£¡£¡£ÎÒÃÇÐÅÍУ¬£¬£¬£¬£¬£¬£¬£¬Õâ´ú±í×ÅÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÔÚSIEMÁìÓòµÄÊÖÒÕÁ¢Òì¡¢²úÆ·³ÉÊì¶ÈÓëÊг¡¾ºÕùÁ¦£¬£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇNGSOC£¨Ì¬ÊƸÐÖªÓëÇå¾²ÔËӪƽ̨£©ÔÚÖÇÄÜ»¯ÔËÓª·½Ãæ»ñµÃÁËÍ»ÆÆ£¬£¬£¬£¬£¬£¬£¬£¬ÕâһЧ¹û²»µ«±ê¼Ç×ÅÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÇå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀíÄÜÁ¦»ñµÃÈ«Çò¶¥¼â»ú¹¹µÄÒ»Á¬ÈϿɣ¬£¬£¬£¬£¬£¬£¬£¬¸üΪº£ÄÚÇå¾²³§É̼ÓÈë¹ú¼Ê¾ºÕùÊ÷Á¢Á˱ê¸Ë¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇé
ÈÕǰ£¬£¬£¬£¬£¬£¬£¬£¬Gartner?Ðû²¼¡¶2025ÄêÖйúÍøÂçÇå¾²ÊÖÒÕ³ÉÊì¶ÈÇúÏß¡·£¨Hype Cycle? for Cybersecurity in China, 2025£©¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤±¨¸æ£º ¡°Ê×ϯÐÅÏ¢¹ÙºÍÏà¹ØÈÏÕæÈË¿ÉÒÔʹÓñ¾ÊÖÒÕ³ÉÊì¶ÈÇúÏßÀ´È·¶¨ÊÊÓõġ¢¸ß¼ÛÖµµÄÊÖÒÕºÍʵ¼ù£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼á³Ö×éÖ¯µÄÇå¾²ÐÔºÍÎÞаÐÔ¡£¡£¡£¡£¡£¡£¡£¡±±¾´ÎÐû²¼µÄ³ÉÊì¶ÈÇúÏßÖУ¬£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!±»ÁÐΪ10¸öÒªº¦ÁìÓòµÄ´ú±í¹©Ó¦ÉÌ£¨Sample Vendors£©¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇé
Gartner?Ðû²¼µÄ¡¶ÖйúÌØÈ¨»á¼ûÖÎÀíÊг¡Ö¸ÄÏ¡·£¨¡¶Market Guide for Privileged Access Management in China¡·£©±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬ÖÜÈ«ÏÈÈÝÁËÌØÈ¨»á¼ûÖÎÀí£¨PAM£©¹¤¾ßµÄ¹¦Ð§Ìص㡢½¹µãÓÅÊÆ¼°Ö÷ÒªÓ¦Óó¡¾°¡£¡£¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÔÌØÈ¨Õ˺ÅÖÎÀíϵͳ£¨PAM£©¼°ÔËάÇå¾²ÖÎÀíϵͳ£¨±¤ÀÝ»ú£©ÀÖ³ÉÈëÑ¡£¬£¬£¬£¬£¬£¬£¬£¬³ÉΪº£ÄÚÌØÈ¨»á¼ûÖÎÀí´ú±íÐÔ¹©Ó¦ÉÌ£¨Representative Providers£©¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇé
¹ú¼ÊÊг¡Ñо¿Óë×Éѯ»ú¹¹Gartner?½üÆÚÐû²¼ÁË¡¶ÖйúÇéÐΣºÊý¾ÝÇ徲ƽ̨Êг¡Ö¸ÄÏ¡·£¨China Context:¡®Market Guide for Data Security Platforms¡¯£©£¬£¬£¬£¬£¬£¬£¬£¬ÒÔΪ¡°Êý¾ÝÇ徲ƽ̨¿ÉÒÔʵÏÖÊý¾ÝÇå¾²ÖÎÀíµÄ×Ô¶¯»¯£¬£¬£¬£¬£¬£¬£¬£¬²¢Ìá¸ßÕû¸ö×éÖ¯Êý¾Ý´æ´¢¿âµÄºÏ¹æÐÔ¡±£¬£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷ÁËÊý¾ÝÇ徲ƽ̨ÔÚÏÖ´úÆóÒµÖÎÀíÖеÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÀ¸½Êý¾ÝÇå¾²¹Ü¿ØÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬£¬±»È϶¨Îªº£ÄÚ¸ÃÁìÓò´ú±íÐÔ¹©Ó¦ÉÌ(Representative Vendors)¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇéÄú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ¿ÉÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ
½«Äú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ
ÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ