ÈÕǰ£¬£¬£¬£¬£¬£¬Gartner?Ðû²¼2024Äê¡¶Market Guide for Security Threat Intelligence Products and Services¡·£¨¡¶Çå¾²ÍþвÇ鱨ЧÀͺͲúÆ·Êг¡Ö¸ÄÏ¡·£¬£¬£¬£¬£¬£¬ÒÔϳơ¶±¨¸æ¡·£©£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÀ¸½ÍþвÇ鱨ƽ̨£¨TIP£©¡¢Ôƶ˲úƷЧÀÍ¡¢Îó²îÇ鱨ЧÀÍ¡¢APT×éÖ¯µµ°¸¿âµÈÓÅÊÆÄÜÁ¦ÒÑÒ»Á¬Èý´ÎÈëÑ¡¸ÃÏ¸æ¡£¡£¡£¡£¡£ÎÒÃÇÐÅÍÐÕâ²»µ«Åú×¢Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!×÷ΪÉÙÉÙÊýÖйúȪԴ³§ÉÌÒÑÎÈÔúÈ«ÇòÇå¾²ÍþвÇ鱨ÁìÓòÖ÷Á÷ÕóÓª£¬£¬£¬£¬£¬£¬¸üÕÃÏÔÁËÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÔÚº£ÄÚµÄÊг¡Ïòµ¼Á¦¡¢Á¢Òì»îÁ¦ÒÔ¼°¼áʵµÄÊÖÒÕ¾ºÕùÁ¦¡£¡£¡£¡£¡£
ÈÕǰ£¬£¬£¬£¬£¬£¬Gartner®Ðû²¼2024Äê¡¶Market Guide for Security Threat Intelligence Products and Services¡·£¨¡¶Çå¾²ÍþвÇ鱨ЧÀͺͲúÆ·Êг¡Ö¸ÄÏ¡·£¬£¬£¬£¬£¬£¬ÒÔϳơ¶±¨¸æ¡·£©£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÀ¸½ÍþвÇ鱨ƽ̨£¨TIP£©¡¢Ôƶ˲úƷЧÀÍ¡¢Îó²îÇ鱨ЧÀÍ¡¢APT×éÖ¯µµ°¸¿âµÈÓÅÊÆÄÜÁ¦ÒÑÒ»Á¬Èý´ÎÈëÑ¡¸ÃÏ¸æ¡£¡£¡£¡£¡£ÎÒÃÇÐÅÍÐÕâ²»µ«Åú×¢Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!×÷ΪÉÙÉÙÊýÖйúȪԴ³§ÉÌÒÑÎÈÔúÈ«ÇòÇå¾²ÍþвÇ鱨ÁìÓòÖ÷Á÷ÕóÓª£¬£¬£¬£¬£¬£¬¸üÕÃÏÔÁËÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÔÚº£ÄÚµÄÊг¡Ïòµ¼Á¦¡¢Á¢Òì»îÁ¦ÒÔ¼°¼áʵµÄÊÖÒÕ¾ºÕùÁ¦¡£¡£¡£¡£¡£
Gartner®ÒÔΪ£¬£¬£¬£¬£¬£¬“²î±ð¹æÄ£ºÍÐÐÒµµÄÆóÒµ¹ØÓÚÍþвÇ鱨£¨TI£©²úÆ·ºÍЧÀ͵ÄÐèÇóÒ»Á¬ÔöÌí£¬£¬£¬£¬£¬£¬µÍ¹ÀÍþвÇ鱨µÄ¼ÛÖµ»òδÄÜ׼ȷӦÓÃÍþвÇ鱨£¬£¬£¬£¬£¬£¬½«ÄÑÒÔ·ÀÓùÆÈÔÚü½ÞµÄÍþвÒÔ¼°Ç±ÔÚÍþв”¡£¡£¡£¡£¡£Æ¾Ö¤Gartner®Õ¹Íû£¬£¬£¬£¬£¬£¬2024ÄêÈ«ÇòTIÖ§³öÔ¤¼ÆµÖ´ï21.7%µÄÄêÔöÌíÂÊ£¬£¬£¬£¬£¬£¬µ½2028ÄêÔ¤¼ÆÖ§³ö½«µÖ´ï46ÒÚÃÀÔª¡£¡£¡£¡£¡£
Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÍþвÇ鱨ÖÐÐÄÊÇÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÆìϵÄÖ÷Á¦¸ß¼¶ÍþвÆÊÎöÍŶӣ¬£¬£¬£¬£¬£¬Í¨¹ýʹÓôóÊý¾Ý·¢Ã÷¡¢¸ú×Ù¡¢Ñо¿ÖÖÖָ߼¶Çå¾²Íþв¡£¡£¡£¡£¡£»£»£»£»£»£»£»£»ùÓÚÔÆµØÐͬµÄÇ鱨Êý¾ÝÉú²úÔËÓªÁ÷³Ì£¬£¬£¬£¬£¬£¬½ÓÄÉÏȽø½¹µãÊÖÒÕ£¬£¬£¬£¬£¬£¬ÍøÂç¡¢Åжϡ¢ÍØÕ¹¡¢Êä³öÖÖÖָ߾«×¼ÍþвÇ鱨£¬£¬£¬£¬£¬£¬Îª×éÖ¯ÌṩÇ鱨¸³ÄÜ¡¢¼ì²âÔ¤¾¯¡¢APT×·×Ù·¢Ã÷¡¢Ó¦¼±ÏìÓ¦µÈÇå¾²ÔËÓªÄÜÁ¦£¬£¬£¬£¬£¬£¬ÒÔ¼°ÖÖÖָ߼¶ÍþвÆÊÎöЧÀÍ¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÍþвÇ鱨ÖÐÐÄ»ñµÃµÄרÀûÊýÄ¿´ïÁ½°ÙÓàÏî¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Ò²ÖÂÁ¦ÓÚΪ¹ú¼ÒÍøÂçÇå¾²ºÍÆóÒµÍøÂçÇå¾²ÁìÓòÌṩÁ¢Òì¡¢ÁìÏȵÄÍþвÇ鱨ÄÜÁ¦£¬£¬£¬£¬£¬£¬ÒÔ¼°ÍêÉÆµÄÇå¾²ÔËӪϵͳ£¬£¬£¬£¬£¬£¬Æìϵĺ£ÄÚÊ×¼ÒÉÌÓÃÍþвÇ鱨ÖÐÐÄ£¬£¬£¬£¬£¬£¬Ò²Ôø¶à´ÎÔÚº£Äں͹ú¼ÊµÄȨÍþÑо¿±¨¸æÖб»Ìá¼°»òÅÅÃûǰÏߣ¬£¬£¬£¬£¬£¬ÔÚº£ÄÚÍâ¾ùÏíÓнϸߵÄ×ÅÃû¶ÈºÍÓ°ÏìÁ¦¡£¡£¡£¡£¡£
Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÍþвÇ鱨ÖÐÐľ߱¸Òµ½çÁìÏȵÄÁù´ó½¹µãÓÅÊÆ£º
Ä¿½ñ£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÍþвÇ鱨²úÆ·¼°Ð§ÀÍÒÑЧÀÍ5000+Óû§£¬£¬£¬£¬£¬£¬Ç鱨Êý¾Ý¸³ÄܲúÆ·ÁýÕÖ¿Í»§³¬10000¼Ò£¬£¬£¬£¬£¬£¬Ö§³ÖÕþ¸®¡¢ÍøÂçÐÅÏ¢¡¢¹«°²¡¢½ðÈÚ¡¢»¥ÁªÍø¡¢ÔËÓªÉÌ¡¢ÄÜÔ´µÈÖÚ¶àÖØµãÐÐÒµ¡£¡£¡£¡£¡£
Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÍþвÇ鱨ƽ̨£¨TIP£©ÊÇÒ»¿î×ÛºÏÐÔÍþвÇ鱨ÖÎÀíÆÊÎö¼°¹²ÏíÆ½Ì¨£¬£¬£¬£¬£¬£¬¿É×ÊÖú¹ú¼Ò¼¶»òÆóÒµ¼¶Óû§ÊµÊ±·¢Ã÷Òªº¦Íþв£¬£¬£¬£¬£¬£¬¶ÔÒÑÓб¨¾¯¾ÙÐÐÎó±¨É¸³ý»ò·Ö¼¶£¬£¬£¬£¬£¬£¬ÎªÊÂÎñÏìÓ¦Ìṩ¾öÒéÐèÒªµÄÉÏÏÂÎÄ£¬£¬£¬£¬£¬£¬ÌṩÇå¾²Ô¤¾¯¼°×ÔÓÐÇ鱨ÔËÓªÄÜÁ¦µÈ¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬ÎªÓû§½¨Éè˽ÓÐÇå¾²ÔËÓªÖÐÐÄÌṩƽ̨֧³Ö£¬£¬£¬£¬£¬£¬×ÊÖúÓû§ÔÚÇå¾²ÔËÓªÖÐʹÓÃÍþвÇ鱨¿ìËÙ¼ì²â¡¢ÏìÓ¦¡¢ÆÊÎöºÍÔ¤·ÀÖÖÖÖÍøÂç¹¥»÷Íþв£¬£¬£¬£¬£¬£¬²¢ÆÊÎö±¬·¢ÐÐÒµÍþвÇ鱨¡£¡£¡£¡£¡£
Gartner, Market Guide for Security Threat Intelligence Products and Services, 12 August 2024
ÉùÃ÷
GARTNER ºÍHYPE CYCLEÊÇ Gartner£¬£¬£¬£¬£¬£¬Inc.ºÍ/»òÆäÁ¥Êô¹«Ë¾ÔÚÃÀ¹úºÍ¹ú¼ÊÉϵÄ×¢²áÉ̱êºÍЧÀͱê¼Ç£¬£¬£¬£¬£¬£¬¾ÔÊÐíÔÚ´ËʹÓᣡ£¡£¡£¡£±£´æËùÓÐȨÁ¦¡£¡£¡£¡£¡£Gartner ²»ÈÏ¿ÉÆäÑо¿³öÊéÎïÖÐÐÎòµÄÈκι©Ó¦ÉÌ¡¢²úÆ·»òЧÀÍ£¬£¬£¬£¬£¬£¬Ò²²»½¨ÒéÊÖÒÕÓû§½öÑ¡Ôñ¾ßÓÐ×î¸ßÆÀ¼¶»òÆäËû³ÆºôµÄ¹©Ó¦ÉÌ¡£¡£¡£¡£¡£Gartner Ñо¿³öÊéÎï°üÀ¨ Gartner Ñо¿»ú¹¹µÄÒâ¼û£¬£¬£¬£¬£¬£¬²»Ó¦±»Ú¹ÊÍΪÊÂʵ³ÂÊö¡£¡£¡£¡£¡£Gartner ²»¼ç¸ºÓë±¾Ñо¿ÓйصÄËùÓÐÕÑʾ»òÌåÏֵİü¹Ü£¬£¬£¬£¬£¬£¬°üÀ¨¶ÔÊÊÏúÐÔ»òÌØ¶¨ÓÃ;ÊÊÓÃÐÔµÄÈκΰü¹Ü¡£¡£¡£¡£¡£
¿ËÈÕ£¬£¬£¬£¬£¬£¬È«ÇòIT×Éѯ»ú¹¹Gartner?ÕýʽÐû²¼2025Äê¡¶Çå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©Ä§Á¦ÏóÏÞ¡·£¨Magic Quadrant? for Security Information and Event Management£©±¨¸æ£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Ò»Á¬µÚ¶þÄêÈëÑ¡¸ÃħÁ¦ÏóÏÞ¡£¡£¡£¡£¡£ÎÒÃÇÐÅÍУ¬£¬£¬£¬£¬£¬Õâ´ú±í×ÅÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÔÚSIEMÁìÓòµÄÊÖÒÕÁ¢Òì¡¢²úÆ·³ÉÊì¶ÈÓëÊг¡¾ºÕùÁ¦£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇNGSOC£¨Ì¬ÊƸÐÖªÓëÇå¾²ÔËӪƽ̨£©ÔÚÖÇÄÜ»¯ÔËÓª·½Ãæ»ñµÃÁËÍ»ÆÆ£¬£¬£¬£¬£¬£¬ÕâһЧ¹û²»µ«±ê¼Ç×ÅÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÇå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀíÄÜÁ¦»ñµÃÈ«Çò¶¥¼â»ú¹¹µÄÒ»Á¬ÈϿɣ¬£¬£¬£¬£¬£¬¸üΪº£ÄÚÇå¾²³§É̼ÓÈë¹ú¼Ê¾ºÕùÊ÷Á¢Á˱ê¸Ë¡£¡£¡£¡£¡£
Éó²éÏêÇé
ÈÕǰ£¬£¬£¬£¬£¬£¬Gartner?Ðû²¼¡¶2025ÄêÖйúÍøÂçÇå¾²ÊÖÒÕ³ÉÊì¶ÈÇúÏß¡·£¨Hype Cycle? for Cybersecurity in China, 2025£©¡£¡£¡£¡£¡£Æ¾Ö¤±¨¸æ£º ¡°Ê×ϯÐÅÏ¢¹ÙºÍÏà¹ØÈÏÕæÈË¿ÉÒÔʹÓñ¾ÊÖÒÕ³ÉÊì¶ÈÇúÏßÀ´È·¶¨ÊÊÓõġ¢¸ß¼ÛÖµµÄÊÖÒÕºÍʵ¼ù£¬£¬£¬£¬£¬£¬ÒÔ¼á³Ö×éÖ¯µÄÇå¾²ÐÔºÍÎÞаÐÔ¡£¡£¡£¡£¡£¡±±¾´ÎÐû²¼µÄ³ÉÊì¶ÈÇúÏßÖУ¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!±»ÁÐΪ10¸öÒªº¦ÁìÓòµÄ´ú±í¹©Ó¦ÉÌ£¨Sample Vendors£©¡£¡£¡£¡£¡£
Éó²éÏêÇé
Gartner?Ðû²¼µÄ¡¶ÖйúÌØÈ¨»á¼ûÖÎÀíÊг¡Ö¸ÄÏ¡·£¨¡¶Market Guide for Privileged Access Management in China¡·£©±¨¸æ£¬£¬£¬£¬£¬£¬ÖÜÈ«ÏÈÈÝÁËÌØÈ¨»á¼ûÖÎÀí£¨PAM£©¹¤¾ßµÄ¹¦Ð§Ìص㡢½¹µãÓÅÊÆ¼°Ö÷ÒªÓ¦Óó¡¾°¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÔÌØÈ¨Õ˺ÅÖÎÀíϵͳ£¨PAM£©¼°ÔËάÇå¾²ÖÎÀíϵͳ£¨±¤ÀÝ»ú£©ÀÖ³ÉÈëÑ¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬³ÉΪº£ÄÚÌØÈ¨»á¼ûÖÎÀí´ú±íÐÔ¹©Ó¦ÉÌ£¨Representative Providers£©¡£¡£¡£¡£¡£
Éó²éÏêÇé
¹ú¼ÊÊг¡Ñо¿Óë×Éѯ»ú¹¹Gartner?½üÆÚÐû²¼ÁË¡¶ÖйúÇéÐΣºÊý¾ÝÇ徲ƽ̨Êг¡Ö¸ÄÏ¡·£¨China Context:¡®Market Guide for Data Security Platforms¡¯£©£¬£¬£¬£¬£¬£¬ÒÔΪ¡°Êý¾ÝÇ徲ƽ̨¿ÉÒÔʵÏÖÊý¾ÝÇå¾²ÖÎÀíµÄ×Ô¶¯»¯£¬£¬£¬£¬£¬£¬²¢Ìá¸ßÕû¸ö×éÖ¯Êý¾Ý´æ´¢¿âµÄºÏ¹æÐÔ¡±£¬£¬£¬£¬£¬£¬Ç¿µ÷ÁËÊý¾ÝÇ徲ƽ̨ÔÚÏÖ´úÆóÒµÖÎÀíÖеÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÀ¸½Êý¾ÝÇå¾²¹Ü¿ØÆ½Ì¨£¬£¬£¬£¬£¬£¬±»È϶¨Îªº£ÄÚ¸ÃÁìÓò´ú±íÐÔ¹©Ó¦ÉÌ(Representative Vendors)¡£¡£¡£¡£¡£
Éó²éÏêÇéÄú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ¿ÉÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ
½«Äú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ
ÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ
¿ì½Ý´°¿Ú
ÆìÏÂÍøÕ¾
¹ØÓÚÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!
95015ЧÀÍÈÈÏß
΢ÐŹ«ÖÚºÅ
Á¬Ã¦²¦´ò