¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬GartnerÐû²¼ÊÖÒÕ³ÉÊì¶ÈÇúÏß¡¶Hype Cycle for ICT in China, 2023¡·¡£¡£¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!±¾´ÎÈëÑ¡ÖйúÔÆÇå¾²ºÍSASE´ú±í³§ÉÌ£¬£¬£¬£¬£¬£¬£¬ÆäÁìÏÈÊÖÒÕÓÅÊÆºÍÊг¡ÈÏ¿É¶ÈÆðµ½ÁËÒªº¦×÷Óᣡ£¡£¡£¡£¡£¡£
Ëæ×ÅÊý×Ö»¯×ªÐ͵ÄÖÜÈ«ÉîÈ룬£¬£¬£¬£¬£¬£¬ÆóÒµÉÏÔÆ¡¢ÓÃÔÆµÄËÙÂʼÓËÙ£¬£¬£¬£¬£¬£¬£¬ÔÆÅÌËãºÍÔÆÔÍâÐÐÒÕÒѾ³ÉΪ¹¹½¨ÏÖ´úÍøÂçÓ¦ÓõĻù´¡£¬£¬£¬£¬£¬£¬£¬Óë´Ëͬʱ£¬£¬£¬£¬£¬£¬£¬ÔÆÒ²³ÉÎªÍøÂç¹¥»÷µÄÖ÷ҪĿµÄºÍÈë¿Ú£¬£¬£¬£¬£¬£¬£¬½üÄêÀ´ÔÆÇå¾²ÊÂÎñƵ·¢£¬£¬£¬£¬£¬£¬£¬¾Ü¾øÐ§ÀÍ¡¢´ó¹æÄ£Êý¾Ý×ß©¡¢ÀÕË÷¹¥»÷¡¢ÔÆÄÚ¹¤¾ßÏòÒÆ¶¯¡¢SaaS¹©Ó¦Á´¹¥»÷µÈÔÆÉÏÇå¾²ÊÂÎñÕýÒÔ¿¿½ü40%µÄËÙÂÊÖðÄêÔöÌí¡£¡£¡£¡£¡£¡£¡£

ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Q-SASEÇå¾²»á¼ûЧÀÍÆ½Ì¨ÒÑÔÚ¶à¸ö´óÐÍÑë¹úÆó¡¢Õþ¸®¡¢½ÌÓý¡¢ÄÜÔ´µÈ¶à¸öÖ÷ÒªÐÐÒµÂ䵨ÔËÓª£¬£¬£¬£¬£¬£¬£¬Îª¿Í»§Ìṩ»¥ÁªÍø³ö¿Ú»á¼û¡¢ÄÚÍøÓ¦Óûá¼û¡¢Ô¶³Ì°ì¹«Èý´ó³¡¾°È«·½Î»µÄÇå¾²·À»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬´òÔìÒ»Ì廯Çå¾²ÔËӪϵͳ±ê×¼¡£¡£¡£¡£¡£¡£¡£

Gartner±¨¸æÒÔΪ£º“ÓÐÓÃÇҿɹܿصÄÔÆÇå¾²£¬£¬£¬£¬£¬£¬£¬ÔÚ×ÊÖúÆóÒµÇå¾²¡¢ºÏ¹æµØÊ¹ÓÃÔÆ·½ÃæÊ©Õ¹×ÅÖÁ¹ØÖ÷ÒªµÄ×÷Óᣡ£¡£¡£¡£¡£¡£”ÎÒÃÇÒÔΪ£¬£¬£¬£¬£¬£¬£¬±¾´ÎÈëÑ¡ÖйúÔÆÇå¾²¡¢SASE´ú±í³§ÉÌ£¬£¬£¬£¬£¬£¬£¬±ê¼Ç×ÅÊг¡¼°È¨Íþ»ú¹¹¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÔÆÇå¾²×ÛºÏʵÁ¦µÄ¸ß¶ÈÈϿɣ¬£¬£¬£¬£¬£¬£¬Î´À´£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!½«ÔÚÔÆÇå¾²¼°ÔÆÔÉúÇå¾²ÁìÓòÒ»Á¬·¢Á¦£¬£¬£¬£¬£¬£¬£¬³ÉÎªÊØÎÀÔÆÉÏÇå¾²µÄ¼áʵʵÁ¦¡£¡£¡£¡£¡£¡£¡£
²Î¿¼ÎÄÏ×
¡¡Gartner, Hype Cycle for ICT in China, 2023, Published 13 July 2023
±¸×¢
¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬È«ÇòIT×Éѯ»ú¹¹Gartner?ÕýʽÐû²¼2025Äê¡¶Çå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©Ä§Á¦ÏóÏÞ¡·£¨Magic Quadrant? for Security Information and Event Management£©±¨¸æ£¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!Ò»Á¬µÚ¶þÄêÈëÑ¡¸ÃħÁ¦ÏóÏÞ¡£¡£¡£¡£¡£¡£¡£ÎÒÃÇÐÅÍУ¬£¬£¬£¬£¬£¬£¬Õâ´ú±í×ÅÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÔÚSIEMÁìÓòµÄÊÖÒÕÁ¢Òì¡¢²úÆ·³ÉÊì¶ÈÓëÊг¡¾ºÕùÁ¦£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇNGSOC£¨Ì¬ÊƸÐÖªÓëÇå¾²ÔËӪƽ̨£©ÔÚÖÇÄÜ»¯ÔËÓª·½Ãæ»ñµÃÁËÍ»ÆÆ£¬£¬£¬£¬£¬£¬£¬ÕâһЧ¹û²»µ«±ê¼Ç×ÅÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÇå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀíÄÜÁ¦»ñµÃÈ«Çò¶¥¼â»ú¹¹µÄÒ»Á¬ÈϿɣ¬£¬£¬£¬£¬£¬£¬¸üΪº£ÄÚÇå¾²³§É̼ÓÈë¹ú¼Ê¾ºÕùÊ÷Á¢Á˱ê¸Ë¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇé
ÈÕǰ£¬£¬£¬£¬£¬£¬£¬Gartner?Ðû²¼¡¶2025ÄêÖйúÍøÂçÇå¾²ÊÖÒÕ³ÉÊì¶ÈÇúÏß¡·£¨Hype Cycle? for Cybersecurity in China, 2025£©¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤±¨¸æ£º ¡°Ê×ϯÐÅÏ¢¹ÙºÍÏà¹ØÈÏÕæÈË¿ÉÒÔʹÓñ¾ÊÖÒÕ³ÉÊì¶ÈÇúÏßÀ´È·¶¨ÊÊÓõġ¢¸ß¼ÛÖµµÄÊÖÒÕºÍʵ¼ù£¬£¬£¬£¬£¬£¬£¬ÒÔ¼á³Ö×éÖ¯µÄÇå¾²ÐÔºÍÎÞаÐÔ¡£¡£¡£¡£¡£¡£¡£¡±±¾´ÎÐû²¼µÄ³ÉÊì¶ÈÇúÏßÖУ¬£¬£¬£¬£¬£¬£¬Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!±»ÁÐΪ10¸öÒªº¦ÁìÓòµÄ´ú±í¹©Ó¦ÉÌ£¨Sample Vendors£©¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇé
Gartner?Ðû²¼µÄ¡¶ÖйúÌØÈ¨»á¼ûÖÎÀíÊг¡Ö¸ÄÏ¡·£¨¡¶Market Guide for Privileged Access Management in China¡·£©±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÖÜÈ«ÏÈÈÝÁËÌØÈ¨»á¼ûÖÎÀí£¨PAM£©¹¤¾ßµÄ¹¦Ð§Ìص㡢½¹µãÓÅÊÆ¼°Ö÷ÒªÓ¦Óó¡¾°¡£¡£¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÔÌØÈ¨Õ˺ÅÖÎÀíϵͳ£¨PAM£©¼°ÔËάÇå¾²ÖÎÀíϵͳ£¨±¤ÀÝ»ú£©ÀÖ³ÉÈëÑ¡£¬£¬£¬£¬£¬£¬£¬³ÉΪº£ÄÚÌØÈ¨»á¼ûÖÎÀí´ú±íÐÔ¹©Ó¦ÉÌ£¨Representative Providers£©¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇé
¹ú¼ÊÊг¡Ñо¿Óë×Éѯ»ú¹¹Gartner?½üÆÚÐû²¼ÁË¡¶ÖйúÇéÐΣºÊý¾ÝÇ徲ƽ̨Êг¡Ö¸ÄÏ¡·£¨China Context:¡®Market Guide for Data Security Platforms¡¯£©£¬£¬£¬£¬£¬£¬£¬ÒÔΪ¡°Êý¾ÝÇ徲ƽ̨¿ÉÒÔʵÏÖÊý¾ÝÇå¾²ÖÎÀíµÄ×Ô¶¯»¯£¬£¬£¬£¬£¬£¬£¬²¢Ìá¸ßÕû¸ö×éÖ¯Êý¾Ý´æ´¢¿âµÄºÏ¹æÐÔ¡±£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷ÁËÊý¾ÝÇ徲ƽ̨ÔÚÏÖ´úÆóÒµÖÎÀíÖеÄÖ÷ÒªÐÔ¡£¡£¡£¡£¡£¡£¡£Òâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!ÒÀ¸½Êý¾ÝÇå¾²¹Ü¿ØÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬±»È϶¨Îªº£ÄÚ¸ÃÁìÓò´ú±íÐÔ¹©Ó¦ÉÌ(Representative Vendors)¡£¡£¡£¡£¡£¡£¡£
Éó²éÏêÇéÄú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ¿ÉÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ
½«Äú¶ÔÒâ°ºÌåÓý-¿Æ¼¼¸³Äܳ¡¾°,ÈÃÓéÀÖ¸üÓÐȤ!µÄÈκÎÒÉÎÊ
ÓÃÒÔÏ·½·¨¸æËßÎÒÃÇ