Gartner Wired and WLAN Magic Quadrant (2014)
数据脱敏
![数据脱敏](https://img.taocdn.com/s3/m/16c11536caaedd3383c4d399.png)
. 数据脱敏数据脱敏(Data Masking),又称数据漂白、数据去隐私化或数据变形。
百度百科对数据脱敏的定义为:指对某些敏感信息通过脱敏规则进行数据的变形,实现敏感隐私数据的可靠保护。
这样,就可以在开发、测试和其它非生产环境以及外包环境中安全地使用脱敏后的真实数据集。
可以看到数据脱敏具有几个关键点:敏感数据、脱敏规则、使用环境。
敏感数据,又称隐私数据,常见的敏感数据有: 姓名、身份证号码、地址、电话号码、银行账号、邮箱地址、所属城市、邮编、密码类( 如账户查询密码、取款密码、登录密码等)、组织机构名称、营业执照号码、银行帐号、交易日期、交易金额等。
随着大数据时代的到来,大数据商业价值的挖掘,用户的精准定位,大数据中蕴藏的巨大商业价值被逐步挖掘出来,但是同时也带来了巨大的挑战–个人隐私信息的保护。
个人信息与个人行为(比如位置信息、消费行为、网络访问行为)等,这些都是人的隐私,也是我们所关注的一类敏感信息,在大数据价值挖掘的基础上如何保护人的隐私信息,也将是数据脱敏必须解决的难题。
脱敏规则,一般的脱敏规则分类为可恢复与不可恢复两类。
可恢复类,指脱敏后的数据可以通过一定的方式,可以恢复成原来的敏感数据,此类脱敏规则主要指各类加解密算法规则。
不可恢复类,指脱敏后的数据被脱敏的部分使用任何方式都不能恢复出。
一般可分为替换算法和生成算法两大类。
替换算法即将需要脱敏的部分使用定义好的字符或字符串替换,生成类算法则更复杂一些,要求脱敏后的数据符合逻辑规则,即是“看起来很真实的假数据”。
使用环境,主要指脱敏之后的数据在哪些环境中使用。
普遍按照生产环境和非生产环境(开发、测试、外包、数据分析等)进行划分。
在最近一期的Gartner关于数据脱敏的报告(Magic Quadrant for Data Masking Technology-2014年12月)中根据数据脱敏产品应用场景的将数据脱敏划分为静态数据脱敏(static data masking[SDM])和动态数据脱敏(dynamic data masking[DDM])。
Juniper AI-驱动企业快速启动指南说明书
![Juniper AI-驱动企业快速启动指南说明书](https://img.taocdn.com/s3/m/1beb0b9b29ea81c758f5f61fb7360b4c2e3f2aef.png)
JUNIPER AI-DRIVEN ENTERPRISEQUICK START GUIDEEverything YouNeed to GetStarted SellingJuniper AI-Driven EnterpriseSolution⏹⏹⏹If you need additional information, please reach out toyour local partner account manager or field marketingmanager who will assist you with any queries, or email*************************************.⏹⏹Table of ContentsThe Basics (4)Sales Enablement Resources (5)T echnical Training Resources (6)Marketing Resources (7)Customer Events (8)INTRODUCTION TO THE JUNIPER AI-DRIVEN ENTERPRISEAt Juniper, we are driven to deliver network experiences that transform the way people connect, work, and live.When you sell Juniper Mist solutions, you can deliver a superior user experience for your customers while also simplifying IT operations. Optimizing IT experiences saves time and money and allows your customers to best align with their key business objectives.For the most current information on the Juniper AI-Driven Enterprise solution, check here:The products and services that comprise the Juniper Mist solution include: ⏹E X Series Ethernet Switches are designed for enterprise branch, campus, campus and data center.⏹J uniper Wireless Access Points and Juniper Mist Edge convergeWi-Fi, Bluetooth® LE and Io T, and work in conjunction with Juniper Mist cloud architecture driven by AI.⏹J uniper Cloud Services, driven by Mist AI, deliver amazing wired and wireless experiences for end users, Io T devices, and clients while simplifying and automating operations for IT teams.⏹J uniper Mist Wi-Fi Assurance replaces manual troubleshooting tasks with automated wireless operations.⏹J uniper Mist Wired Assurance enables simpler operations, streamlined troubleshooting, and better visibility into the experiences for connected devices.⏹J uniper Mist WAN Assurance enables simpler operations, and better visibility into user experiences across the WAN.⏹M arvis Virtual Network Assistant simplifies everyday troubleshooting with self-driving actions and network performance analysis.⏹P remium Analytics offers network visibility and business insights to drive customers’ digital transformation journey.⏹U ser Engagement uses Virtual BLE array technology and cloud-based machine learning to drive down deployment costs and improve accuracy of real-time indoor location services.⏹A sset Visibility makes it easy to find key assets and people, with detailed location analytics always at your fingertips.Experience-First Networking eGuide – Discover how to maximize user and IT experiences with secure client-to-cloud automation, insight, and AI-driven actions. Watch our CEO explain “Why Juniper”.The AI-Driven Campus White Paper – Deep dive into the power of AIto deliver better user experiences and simplify IT operations. Read the whitepaper.VISITTHE HUBTHE BASICSReady to be bold with Juniper?Whether you’ve recently signed up or just joined as a Juniper Partner, we’ve assembled some useful links below to initiate your journey.These will give you all the information you need to begin selling Juniper AI-Driven Enterprise solutions.PARTNER PROGRAM BASICSUnderstand the Juniper Partner Advantage Program hereBecome a Juniper partner: If you are not currently a Juniper Mist Partner, apply here.Obtain your Juniper Partner Center login here.Partner Center houses resources to help you manage and build your Juniper partner business such as configuration tools, partner program information and sales enablement resources.Visit the dedicated Juniper Mist section of Partner Center here.For our Japanese-speaking partners, we have a dedicated Japanese Partner Center section here.Juniper’s Latest News and AnnouncementsReceive updates on Juniper news with News On Demand updates.Follow Juniper on social media:Corporate:Fac ebookTwitterYouTubeLinkedInVISITTHE HUB Partner: Fac ebook Twitter YouTube LinkedInVISITTHEHUB TECHNICAL TRAINING RESOURCEST o become an authorized Juniperpartner, you will need training andcertification on the fundamentalsand certain specializations. Weoffer ongoing training for you andyour engineers to build the bestskills to support your professionaldevelopment and practice building.Jumpstart Junos OS – Start learning the Junos ® operating system today with learning webinars. Learn the fundamentals or advance your knowledge. Open to anyone regardless of partner or customer status.Mist AI Learning Path – Plot your path to becoming a Juniper Networks Certified Specialist, Mist AI (JCNIS-Mist AI), or a Juniper Network Certified Associate, Mist AI (JNCIA-Mist AI).Juniper’s AI-Driven Enterprise Demo – Learn how to demo the Juniper AI-Driven Enterprise solution.Mist AI-Driven Access Gold Demo – See how to demo Juniper Mist solutions to your customers.On-Demand Partner Webinars – Get up to speed at your own pace.AI-Driven Enterprise Bootcamp Training – Give your engineers the in-depth knowledge they need to present, quote and demo the AI-driven Enterprise solutions.Juniper Learning Academy – This is the best place to start for training on products and tools, available at no charge for partners. Once you complete the training, you can give live demos to prospects and customers.Get trained on Juniper – View the schedule of Juniper training classes, including Juniper Mist solutions. Get trained on-demand or choose an all-access pass for the best value.MARKETING RESOURCESTake advantage of a selectionof great content you can use to engage customers and help drive success in your business.VISIT THE HUBWe provide partner marketing materials in a portal called the Hub. You’ll find marketing campaigns and materials available to support your Juniper Mist lead generation and nurture efforts, including campaigns in a box, recorded webinars, weekly live demos and more. T o access resources on the Hub, you must have valid Partner Center credentials. If you are having login issues, please contact thehub@.Inspire your customers with the Mist AI anthem video.See how Juniper’s mission is to power connections and empower change.Gartner Names Juniper a Leader in the 2020 Magic Quadrant for Wired and Wireless LAN Access InfrastructureDiscover why Juniper solutions, driven by Mist AI, leads the market. Watch this video to see how you can outsource your toughest networking challenges to Marvis Virtual Network Assistant.Invite your customers to join the weekly Wired and Wireless Wednesday live demonstrations. Juniper authorized partners can request a custom invitation and tracking code and receive an attendee report.Take a self-guided tour of the Hub, your source for Juniper marketing assets and cobrandable campaigns.Stop by the AI-Driven Enterprise portal for content to get you started, including website copy, customer invitations, product images, and more. See the latest partner promotions and programs on Partner Center. Get the latest on MDF eligibility and guidelines.VISIT THE HUBDownload Juniper marketing assets, brand imagery, and cobrandable campaigns on the Hub.https:///VISITTHE HUBVISIT THEHUB CUSTOMER EVENTSInvite your customers and prospectsto events, summits and bootcampsto deepen their understanding ofJuniper solutions. Get the latest global event lineup. Join our weekly live demo: Wired and Wireless Wednesdays Track customers who attend Juniper events. Request your own partnerURL for Juniper Mist Events.Follow Juniper Networks and Juniper Partners on social media for latestupdates and eventsPartner Center Main PageJuniper Mist Resource LibraryJuniper Price ListFind up-to-date Juniper prices all in one place.Configurator T oolStreamline the sale with this product configuration and quote tool.Network Product SelectorEmploy this user-friendly tool to select the optimal technology platformfor your customers network.Demo Lab ProgramAs a Juniper partner or distributor, purchase demo equipment andHELPFUL CONTACTS AND LINKSPartner:Fac ebook Twitter YouTube LinkedInCorporate:Fac ebookTwitterYouTubeLinkedIn。
Imperva 应用安全产品说明说明书
![Imperva 应用安全产品说明说明书](https://img.taocdn.com/s3/m/b5f06f8909a1284ac850ad02de80d4d8d15a0127.png)
Web Application
Firewall
DDoS Protection
Load Balancer
Content Delivery Network
Imperva Application Security covers the full range of web attacks.
• Secures websites against attack—on-prem and in the cloud
Load balancer Imperva offers a cloud-based load balancer which supports local and global server load balancing across on-premises and public cloud data centers. It supports automatic failover to standby servers to enable high-availability and disaster recovery without any TTL-related (Time to Live) delays.
IFS 公司产品简介
![IFS 公司产品简介](https://img.taocdn.com/s3/m/841528ef7f1922791688e840.png)
网上商店
销售&市场
IFS 销售&服务
资产数据管理
PDM 配置
IFS 工程
重复制造 车间订单
成本 车间报告
IFS 制造
客户订单 供应分析 设备计量 设备监控 设备
IFS 维护
个人门户
移动& 无线服务
事件管理
系统集成 & WEB服务
IFS 业务协同
业务绩效
会计规则
业务报告
IFS全球介绍
IFS 的历史
创建于 1983年,总部位于 Linköping, 瑞典 1990年: IFS 应用系统™做为完整的商业应用系统正式发布 1992年:IFS在挪威、芬兰和波兰设立办事处,开始向全球
发展 1994年:IFS成为最早采用面向对象技术和基于组件架构的
应用系统 1995年:IFS进入北美市场 1997年:IFS进入德国、法国、比利时和土耳其 1999年:IFS在斯德哥尔摩证券交易所上市 (OMXS: IFS) 1999年;IFS进入中国市场 2001年:IFS成立大中国区,并且进入俄罗斯 2006年:第七代IFS应用系统产品正式发布 2007年:IFS发布最新的项目型企业和零售业解决方案
项目管理
项目报告
文档管理
IFS Foundation1—技术和体系结构
质量管理
事务管理
业务建模
从1997开始采用组件技术
仅从企业最需要的开始
随企业发展增加组件
IFS 生命周期支持
从企业最需要的开始—仅实施需要的 确保企业敏捷灵活—随时增加和改变 持续改进—与最新发展同步 低的总体拥有成本
IFS Headquarters
Trustwave 网络安全服务介绍说明书
![Trustwave 网络安全服务介绍说明书](https://img.taocdn.com/s3/m/92433b50a66e58fafab069dc5022aaea988f4158.png)
We are a cybersecurity and managed security services leader.Trustwave has more than 20 years of experience in cybersecurity. We offer managed security services, security testing, consulting, technologies and cybersecurity education.Industry analysts recognize Trustwave as a global and regional leader in managed security services.Gartner placed T rustwave in the Leaders quadrant in the 2018 Gartner “Magic Quadrant for Managed Security Services, Worldwide,”1 a global report that assessed 17 of the industry’s top managed security service providers.IDC named Trustwave a leader in managed security services in the IDC MarketScape: Asia/Pacific Managed Security Services 2018,2 as well as the IDC MarketScape: Canadian Security Services Providers, 2018 Vendor Assessment.3You Get Follow-the-Threat™ Security Operations.We deliver our services through a global network of 10 Advanced Security Operations Centers -- your mission control for cybersecurity. But instead of landing space shuttles, these global centers are staffed around the clock to monitor and immediately respond to security incidents that may be impacting your organization.Trustwave SpiderLabs ®, our elite security team, is on your side.Our security breach investigations, threat hunters, malware reverse-engineering projects, millions of scans, thousands of penetration tests, leadership of open-source security projects and contributions to the security community have established Trustwave SpiderLabs as world-renowned experts on the past, present and future of security.Our Trustwave SpiderLabs Fusion Center is a true industry game changer.Our cybersecurity command center employs pioneering actionable threat intelligence to track threat actors, detect them with their clients, and instantly kill those threats inside an organization down to individual endpoints, a feat unprecedented in the managed security services industry.We go way beyond the basics of cybersecurity.Our Threat Detection & Response managed security and professional services help short-circuit an attacker’s activities by detectingcybersecurity threats much earlier and then shutting them down before real damage is done.Through our cyber range in Singapore, a hybrid between an advanced cyber range and an educational center, the Cyber Security Institute is a first-of–its-kind facility to test and train companies in dealing with sophisticated cyber threats.We offer and manage the best of the best, industry-leading security technologies.In addition to Trustwave technologies, we partner with otherleaders in cybersecurity and provide security services to manage solutions from vendors such as Palo Alto Networks, Fortinet, Carbon Black, Splunk and many more. Our technology agnostic approach helps you get the best ROI from your technology investments.Our channel partner program has a 5-Star rating in CRN’s 2018 Partner Program Guide.The 5-Star Partner Program Guide rating recognizes an elitesubset of companies that offer solution providers the best partnering elements and training in their channel programs.Customers in 96 countries rely on Trustwave for their cybersecurity needs.Whether you’re a bank, hotel chain, law firm or government agency, you’re in good company with Trustwave. We tailor our services and your experience based on industry and needs.More than 2,000 security-minded professionals back you up.Our team is deployed across the globe to offer worldwide coverage with regional expertise.1. Source: Gartner, “Magic Quadrant for Managed Security Services, Worldwide” by Toby Bussa, Kelly M. Kavanagh, Pete Shoard, Sid Deshpande, February 27, 2018.2. Source: IDC MarketScape: Asia/Pacific Managed Security Services 2018, (IDC# AP42609818, June 2018)3. Source: IDC MarketScape: Canadian Security Services Providers, 2018 Vendor Assessment (IDC# CA3005218, March 2018)16789102345For more information: Copyright © 2018 Trustwave Holdings, Inc.T o p 10_0818。
IBM跨域认证简单解决方案
![IBM跨域认证简单解决方案](https://img.taocdn.com/s3/m/587c9821aaea998fcc220ea6.png)
跨域认证简单解决方案-使用第三方Cookie概述跨域认证,意味着用户在一个入口登录后可以无障碍的漫游到其它信任域。
也就是所谓的单点登录(SSO)。
对于大型的服务提供着,常用的方法有:使用安全断言标记语言(SAML)、基于公开密钥技术(PKI-Pubic Key Infrastructure)的Kerberos网络认证协议或者使用Windows采用的认证方案LanManager认证(称为LM协议-对于NT 安装Service Pack4以后采用NTLM v2版本)。
这些认证方式需要单独的认证服务器,对于普通的使用者来说,既难已实现,也不太可能搭建单独的服务器。
有没有一种简单又安全的认证方式呢?本文的目标使用Cookie和SHA1结合实现简单又安全的认证,如用户在中登录后,无需再次登录就可以直接使用中提供的服务。
Cookie是什么Cookie 是由Web 站点创建的小文本文件,存储在您的计算机上。
这样,当您下一次访问该站点时,它可以自动获取有关您的信息,例如浏览喜好,或您的姓名、地址及电话号码。
关键词SSO(Single Sign-On)-单点登录SAML(Security Assertions Markup Language)-安全断言标记语言Cross-Realm Authentication -跨域认证PKI(Pubic Key Infrastructure)-公开密钥技术SHA1(Secure Hash Algorithm 1)-安全哈希算法1P3P(The Platform for Privacy Preferences)隐私参数选择平台单一认证模型1、用户使用a_logon.aspx登录服务器2、在a_logon.aspx中自动嵌入iframe其src指向的b_auth.php3、认证成功后在客户端写入Cookie,通过iframe调用b_auth.php 传递认证参数(经过SHA1后)4、b_auth.php认证成功后在客户端写入认证Cookie5、完成和的统一认证问题:上面提到的过程如果使用FireFox浏览器b_auth.php能够成功写入Cookie,如果使用IE6.0及以上版本b_auth.php写入Cookie失败。
Gartner 2023 年十大战略技术趋势解析
![Gartner 2023 年十大战略技术趋势解析](https://img.taocdn.com/s3/m/17323069f6ec4afe04a1b0717fd5360cbb1a8d4d.png)
Gartner 2023 年十大战略技术趋势解析Gartner 2023 年十大战略技术趋势解析 (1)1.元宇宙与AI 依然备受瞩目 (2)2.十大技术战略,能否应对全球经济衰退? (3)3.开拓 (4)3.1元宇宙(Metaverse) (4)3.2超级应用(Superapps) (5)3.3自适应AI(Adaptive AI) (5)4.优化 (6)4.1数字免疫系统(Digital Immune System) (6)4.2应用可观测性(Applied Observability ) (6)4.3AI信任、风险和安全管理(Trust, Risk and SecurityManagement) (7)5.扩展 (8)5.1行业云平台(Industry Cloud Platforms) (8)5.2平台工程(Platform Engineering) (9)5.3无线价值实现(Wireless Value Realization) (9)临近年末,许多人已经开始扛起了下一年度的目标KPI ,及时了解不断变化的技术格局以应对随时可能面临的机遇和挑战,对大家来说尤为重要。
全球极具权威的IT研究与顾问咨询公司Gartner 每年都会发布下一年的十大战略技术趋势,今年也不例外,Gartner 2023 年十大战略技术趋势近日新鲜出炉。
新的一年,元宇宙及AI关注度依然超高,其面临的技术挑战与发展前景备受关注。
在全球经济形势放缓的背景下,“可持续性”这一关键词贯穿了2023 年的所有战略技术趋势。
下面是Gartner 高级研究总监高挺(Arnold Gao)对2023 年十大技术趋势的详细解读。
1.元宇宙与AI 依然备受瞩目今年发布的十大技术趋势,最受关注的依然是AI 与元宇宙方向。
关于“元宇宙”在应用层面的可能迎来突破的领域,高挺表示“数字人、工业元宇宙”是离我们更近、更有商业价值的案例。
一些更远的方向如NF T,泡沫比较大,且不太适合我国的监管环境。
NetApp软硬件产品介绍
![NetApp软硬件产品介绍](https://img.taocdn.com/s3/m/2746a12043323968011c92c4.png)
可以在价格、性能和最能满足您需求的功 能之间达到完美平衡。
FAS 2040
便利的扩展能力,以可承受的代价轻松满 足不断增长的存储要求。
客户可以使用容易获取、部署和管理的存 储系统,为负担沉重的 IT 员工解除负担。 适用于远程或分支办事处、大企业的部门 以及中型企业。
15
FAS 2240
Shanghai Pukka Network Technology CO., Ltd
27
Shanghai Pukka Network Technology CO., Ltd
28
Shanghai Pukka Network Technology CO., Ltd
29
Shanghai Pukka Network Technology CO., Ltd
30
FAS6200系列
FAS6200 系列可扩展性、可用性和灵活性满足要求最 苛刻的应用需求,依赖它适应日新月异的 虚拟化 和 云环境 。
FAS2000 系统定位
目标应用程序和客户
个人目录、OA系统等存 储整合 Windows应用存储整合 适合于大型企业的部门 和ቤተ መጻሕፍቲ ባይዱ中型企业及远程办公 室等客户
FAS2040
更好的性能和容量要求
FAS2240
适合中型企业和分布式 企业应用
Shanghai Pukka Network Technology CO., Ltd
Dual-Enclosure HA
6U
6U
Dual-Enclosure HA
FAS3210 & FAS3240 & FAS3270
3U
Single-Enclosure HA
一半的空间占用,更高的性能;相同的空间占用,更高的性能和更好的扩展能力
思科网络安全产品方案
![思科网络安全产品方案](https://img.taocdn.com/s3/m/f913e5d9daef5ef7bb0d3c2f.png)
ASA 5525-X/ ASA 5545-X/ ASA 5555-X
Firepower 2110/2120
Firepower 2130/2140
ASA 5585-X
Firepower
Firepower 9300
4110/4120/4140/4150 (SM24/SM36/SM44)
NGFWs 定位SMBs 和分布式企业,集 中安全威胁防御,低TCO, 通过FDM简
1M
FPR 2120
3 Gbps 3 Gbps
1.2 M
FPR 2130
4.75 Gbps 4.75 Gbps
2M
FPR 2140
8.5 Gbps 8.5 Gbps
3.5 M
Maximum new connections per second, with AVC
1. 思科全球最大市场份额的安全公司
3. 世界最大的威胁情报公司
我们有哪些安全产品
下一代防火墙
入侵检测防御
内网威胁防御
邮件/Web 安全
准入控制和安全管理
ASA 5505/
分支/远程站点 5506/5508
ASA下一代防火墙 ASA 5512-X / 5515-X
下一代入侵防御 恶意代码检测 沙盒分析系统 Sourcefire AMP(网络和终端) AMP ThreatGrid
电源 – 缺省/可选
4-Core 16GB
6-Core 16GB
6-Core 8 GB
8-Core 8 GB
1 x 100GB Default 2nd Optional SSD for MSP 800GB
1x 250W 固定 AC 1x 250W 固定 AC
08-终端防护平台-2013年1月-Magic quadrant for endpoint protection platforms
![08-终端防护平台-2013年1月-Magic quadrant for endpoint protection platforms](https://img.taocdn.com/s3/m/a3927589ec3a87c24028c4ae.png)
Magic Quadrant for Endpoint Protection Platforms2 January 2013 ID:G0*******Analyst(s): Peter Firstbrook, John Girard, Neil MacDonaldVIEW SUMMARYThe endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.Market Definition/DescriptionThis document was revised on 27 March 2013. The document you are viewing is the corrected version. For more information, see the Corrections page on .The enterprise endpoint protection platform (EPP) market is a composite market primarily made up of collections of products. These include:∙Anti-malware∙Anti-spyware∙Personal firewalls∙Host-based intrusion prevention∙Port and device control∙Full-disk and file encryption, also known as mobile data protection∙Endpoint data loss prevention (DLP)∙Vulnerability assessment∙Application control (see Note 1)∙Mobile device management (MDM)These products and features are typically centrally managed and ideally integrated by shared policies.DLP, MDM and vulnerability assessment are also evaluated in their own Magic Quadrant or MarketScope analyses. Longer term, portions of these markets will get subsumed by the EPP market, as the personal firewall, host intrusion prevention, device control and anti-spyware markets have in the past. EPP suites are a logical place for convergence of these functions. Indeed, 53% of organizations in a recent Gartner survey1 already use a single vendor for several of these functions, or are actively consolidating products. In particular, mobile dataprotection is the leading complement to EPP and purchasing decisions regarding the two products are increasingly made together. For most organizations, selecting a mobile data protection system from their incumbent EPP vendors will meet their requirements.In 2012, the large enterprise EPP market is still dominated by Symantec, McAfee and Trend Micro, which together represent approximately 68% of the total revenue of Magic Quadrant participants. Sophos and Kaspersky Lab are the two other global leaders that are competitive across multiple functions and geographies, and push the combined Leaders quadrant market share to 85%. Despite the introduction of new players, the displacement of incumbents is still a significant challenge in the large enterprise market. The biggest impact of the Magic Quadrant Challengers and Visionaries is to push the dominant market players to invest in new features and functionality (sometimes via acquisitions) to stay ahead, and to keep pricing rational. In the less demanding small and midsize market, competition is more intense. A number of Niche Player solutions are dominant in specific regions.The total EPP revenue of the Magic Quadrant participants at year-end 2011 was roughly $2.8 billion, up 4% from 2010. We attribute this growth primarily to increased buying ofmore-expensive suites, offset by lower prices for low-end malware-only solutions. Consequently, EPP revenue growth is more a result of an inflow of revenue from other markets. We anticipate that growth will continue to be in the low single digits in 2013.Microsoft is the best vendor in a position to challenge the incumbent Leaders, primarily due to attractive pricing in its enterprise agreements. Approximately one-third of enterprise buyers1 indicate they are actively considering Microsoft or plan to do so during their next renewal periods. However, Microsoft's slow development, the lack of a single unified security management interface and mediocre test results will temper its adoption. Longer term, we believe that increased displacement of Windows endpoints with application-controlled OSs (such as Microsoft WinRT and Apple's iOS and OS X Mountain Lion) is the biggest market threat. These solutions shift the value proposition of EPP solutions from traditional anti-malware to MDM and data protection capabilities.Return to TopMagic QuadrantFigure 1. Magic Quadrant for Endpoint Protection PlatformsSource: Gartner (January 2013)Return to TopVendor Strengths and CautionsArkoon Network SecurityArkoon Network Security's StormShield EPP solution (formerly offered by SkyRecon Systems) is designed as a seamless integrated EPP with a focus on behavioral protection. Arkoon's Ability to Execute score is hampered by its relatively small market share and limited geographic presence, as well as its still-maturing management capabilities. StormShield EPP is a reasonable shortlist solution for organizations that are in supported geographies seeking abehavior-based approach to malware detection, and for those that are willing to invest extra effort to administer the advanced capabilities of the offering.Strengths∙The vendor's flagship product, StormShield Security Suite, is designed to address system and data protection via an extensible EPP capability that integrates multiplelayers of security. These include a host-based intrusion prevention system (HIPS), a personal firewall, device control, encryption, and an optional, fully integratedsignature-based, anti-malware engine licensed from Avira. The suite boasts a singlelightweight agent (15MB, including anti-malware protection) that is extensible tosupport multiple functions and runs at the kernel level.∙We particularly like Arkoon's focus on advanced behavioral-based HIPS techniques, such as memory overflow protection, anti-keylogging, application control, rootkitdetection, honey pots, privilege escalation, reboot protection and driver management.Remediation and status assessment are enabled with administrator-generated scripts.∙StormShield effectively uses policy-based restrictions to minimize the attack surface with object-oriented policies and configurations that are easy to set up. Policy-based application blacklisting/whitelisting is improved by a challenge response mechanism, which allows users to add software if they type in the justification for the installation ina pop-up window.∙Full-disk encryption and encryption for files and folders on fixed hard drives and removable devices is available. Recent improvements include support for fullyencrypted logical containers in addition to per-file encryption.∙Arkoon has created a bundled mobile data protection product that includes Security Box and StormShield, but without any technical integration.Cautions∙Although it continues to grow rapidly, StormShield has a very small market share in this Magic Quadrant. Neither SkyRecon nor its parent company Arkoon has significant brand recognition or a significant enterprise client base outside of Europe.∙StormShield does not participate in any of the prominent endpoint protection malware tests, so it is difficult to compare its malware detection performance against othersolutions in the market.∙StormShield supports Windows only, and provides no Mac, Linux, Unix, mobile or email server support. Although it works in a virtual machine (VM) environment, there are no features specific to virtualization.∙The full-disk encryption product is immature, compared with those offered by the Leaders in this Magic Quadrant.∙Application control is suitable for allowing or blocking specific applications, or completely locking clients down, but it does not have workflow features or anapplication database that would allow a flexible application control environment.∙The only option for signature-based anti-malware protection is from Avira. Arkoon hasa very small malware research team and is dependent on Avira for signature-basedprotections.∙The management interface is comprehensive, but not recommended for nontechnical users. The console lacks dashboards and context-sensitive help. Much of the advanced capability is achieved by administrators creating their own scripts.∙Ad hoc reporting is not supported. Reports can be filtered, but not changed, and it is not possible to drill down into details.∙There is no out-of-the-box security state assessment beyond the EPP agent status, and no significant integration with operations tools, such as vulnerability.∙The vendor does not yet offer a client DLP solution.Return to TopBeyondTrustBeyondTrust acquired eEye Digital Security in May 2012, and plans to combine eEye's vulnerability analysis and endpoint protection with its privileged management solutions. Current Beyond Trust and eEye Retina customers and enterprises that value integrated vulnerability analysis should consider BeyondTrust's eEye Blink.Strengths∙The management console of eEye Retina and eEye Blink is a Flash-based user interface that manages the various eEye offerings. It provides role-based reporting anddashboards, dynamic associations of target machines via Active Directory and Smart Groups, and additional reporting modules for compliance, configuration and patching.It also provides integration into Microsoft System Center.∙BeyondTrust enables the removal of Windows administrator rights while still selectively escalating privileges for legacy applications. It also provides tools for databasemonitoring and endpoint DLP.∙In addition to licensed anti-malware signature libraries from Norman, BeyondTrust now has a small, but very skilled, team of malware experts that provides excellenttechnical support and malware information.∙The anti-malware techniques include process execution rules, registry protection and file integrity monitoring.∙BeyondTrust is one of the few providers in this Magic Quadrant analysis to offer a service-level agreement (within 48 hours) on new critical exploits, meaning that it will protect against these exploits within 48 hours, even if the system is unpatched.∙BeyondTrust PowerBroker Mobile offers cloud-managed MDM, and Retina can providea mobile vulnerability scan.Cautions∙Prior to the acquisition, eEye was growing quite rapidly, however it had a very small market share in the EPP market, and did not come up in calls with Gartner clients often.eEye was one of the smallest vendors in this market. Its total staff size, including the research and engineering groups, was small compared, with the EPP industry average.Most of its installed base is in North America.∙The vendor's solution has the capability to blacklist applications, but it is a manual process with no trusted sources of change, not a full application control solution.∙BeyondTrust PowerBroker Mobile is in a separate, cloud-based management interface.∙Although the Blink team develops its own signature spyware database and cleanup routines, the solution relies on Norman for anti-malware signatures; therefore,business disruptions at Norman could impact Blink customers. Although the Norman anti-malware engine is tested regularly, Blink does not participate in any industry tests (other than the Virus Bulletin's VB100 test) to demonstrate the effectiveness of itscollection of technologies. Automated malware damage cleanup capabilities arelimited.∙Blink has limited device control capabilities and no encryption capabilities. It lacks the ability to enforce encryption on data that is written to external storage devices, but it does have a number of policies to limit access and writing to external devices.∙Blink supports only Windows OS desktop and server platforms (including Microsoft Internet Information Services [IIS]).∙The anti-malware agent works on a virtualized Windows host. However, it is not optimized for a virtualized environment.Return to TopCheck Point Software TechnologiesCheck Point Software Technologies is a well-known, long-term network security company. It will appeal to organizations that value strong integration between remote access solutions, full-disk and media encryption, and the EPP suite.Strengths∙Check Point offers selective activation of capabilities packaged as "software blades."Blades include a personal firewall, anti-malware (licensed from Kaspersky Lab),full-disk encryption, network access control (NAC) and an integrated VPN.∙Check Point's endpoint management console offers a clean interface with easy navigation and quick access to summary data. The dashboard can be customized for each administrator. Administrators may develop and view user-specific policies across multiple devices.∙In April 2012, Check Point launched ThreatCloud, which compiles a database of known Internet Protocol (IP) addresses that distribute malware, plus URLs and signatures of malicious applications.∙Check Point's Mobile VPN supports iPhone, iPad and Android mobile devices, and manages Exchange email synchronization.Cautions∙Despite its significant enterprise network presence, brand and channel, the vendor has failed to significantly improve its market share or mind share in the EPP market,beyond its installed base of VPN, host firewall and encryption customers. Gartnerclients rarely inquire about Check Point's EPP solutions, nor does Check Point appear in competitive reviews from other sources.∙Check Point's dependence on Kaspersky Lab's engine and signature updates continues to challenge enterprise buyers to differentiate it from Kaspersky Lab, which is rapidly adding other competitive features.∙Check Point views MDM as a network manager's tool; consequently, MDM capabilities are in the SmartDefense dashboard, not the EPP dashboard.∙Check Point protection is oriented to Windows endpoint PCs. Not all software blades are available for OS X, and it doesn't offer protection for specialized servers, such asMicrosoft Exchange, SharePoint or Lotus Notes.∙Although its agent will run in VMs, Check Point has no specific optimization for virtualized environments.∙Check Point's application control capabilities (which it calls "program control"), augmented with its Program Advisor service, are suitable for blocking or allowing aspecific set of applications, but do not provide a manageable default deny application execution environment.∙Check Point does not currently offer integrated network and endpoint DLP, but is pursuing a 2013 road map in response to customer interest.Return to TopEsetEset has built a substantial installed base in EMEA, particularly in Eastern Europe, and it has a rapidly growing small or midsize business (SMB) presence in North America. Its Completeness of Vision score benefits from good malware effectiveness in a lightweight client, but it still suffers from weak enterprise management capabilities and lack of investment inmarket-leading features, such as data protection or more holistic security state assessments. Eset is a good shortlist option for organizations seeking an effective, lightweight anti-malware solution.Strengths∙The flagship enterprise product, Eset Endpoint Security, includes integrated anti-malware, anti-spam, HIPS, device control, Web content filtering and a personalfirewall in a single-agent footprint. Installation can be tailored to specific needs byselecting only the modules that are desired.∙The low performance impact of the Eset product has been noted by many customers.∙Its anti-malware engine is a consistently solid performer in test results. The Eset engine has a strong reliance on heuristics and generic signatures, and includesclient-based malicious URL filtering and sandbox heuristics, which run all executablefiles in a virtual emulator. The vendor recently introduced Eset Live Grid, a cloud-based reputation service.∙The vendor supports a broad range of Windows clients and servers, including Exchange, Lotus Notes/Domino, Linux, and Novell NetWare and Dell storage servers; mobiledevices (Windows Mobile, Android and Symbian); and Apple OS X and Linux desktop platforms. In December 2012, the vendor launched Eset Endpoint Security for Android phones and tablets.∙Eset offers a limited MDM solution with the launch in 2011 of Eset Mobile Security Business Edition for Windows Mobile and Symbian. Eset recently launched EndpointSecurity for Android.Cautions∙The management interface is adequate, but it is still a Win32 application. Eset has a great point-in-time system inspector function, Eset SysInspector, but it cannot storehistoric asset information, nor does it provide any vulnerability or configurationinformation that would aid in security state assessments that go beyond AV status. A separate Web-based dashboard provides a flexible customizable reporting interface,but it does not allow for direct drill-down into the management console.∙Eset is reluctant to advance to data protection with encryption or DLP solutions.∙Removable media/port protection is a good addition, but policy is complicated by drop-down menus making it awkward, and a lack of encryption means policy cannotinclude the option to encrypt data on removable media.∙Clients can be distributed by the management console; however, deinstallation of competitive solutions is an additional service cost that isn't included in the solution.∙Heuristics can add a performance impact, especially on older PCs, although it is not turned on by default.∙Eset doesn't yet offer application control.∙Although Eset Endpoint Security operates in a virtual environment and has a low system impact, it has not been optimized for these environments.Return to TopF-SecureF-Secure, a veteran of the anti-malware industry for more than 20 years, has a very good track record for malware testing results. The vendor is focused on endpoint protection and is less interested in other aspects of the EPP market, such as data protection. F-Secure is a good choice for organizations in supported geographies that prefer dedicated malware protection solutions.Strengths∙F-Secure has consistently good malware test results and performance tests. It provides cloud-based look-ups and a file reputation feature, which considers filemetadata (such as prevalence, source and age) before allowing files to execute. Weparticularly like the sandbox environment for behavior testing on Windows clients,which tests unknown applications in a virtual sandbox for malicious behavior.∙The vendor offers one of the better rootkit detection and removal tools, called BlackLight.∙F-Secure client agents are lightweight, with minimal performance impact.∙Basic device control functionality was recently introduced.∙F-Secure has mobile clients for Android, Research In Motion, Symbian and Windows Mobile, and a cloud-based MDM capability primarily aimed at SMBs. It also offersprotection for a broad range of Linux variants and Mac platforms.Cautions∙F-Secure has very little presence or brand recognition in markets outside of Northern Europe. It has a minimal market share, despite its long-term presence in the market, and it is growing much slower than the overall market.∙Although F-Secure develops some its own signatures and behavioral detection techniques for advanced threats, its solution relies heavily on Bitdefender for themajority of anti-malware signatures; business disruptions at Bitdefender could impact F-Secure customers.∙F-Secure's client/server-based (Windows or Linux) management interface is very limited and is lacking numerous enterprise features. It only has two roles (full orread-only). It does not offer any security state or asset information beyondanti-malware status, and does not provide any significant customizable dashboardcapability or any drill-down into remediation capability. Autodiscovery of newunmanaged agents and Active Directory synching is partly a manual process and can't be scheduled, although automation exists for importing new agents and removinginactive agents. The reporting capability is very basic and does not allow for ad hocreporting.∙F-Secure does not offer encryption or DLP capability. Device control is basic. It does not offer any application control capability.∙MDM capability is not integrated into the endpoint management console. Mac clients are not managed in the same console as Windows clients.∙F-Secure does not provide any protection for SharePoint servers (this is due in 1H13).∙Virtualization support is limited to optimization of the AV clients with randomization of scheduled tasks.Return to TopGFI SoftwareGFI Software has a portfolio of security offerings targeted at SMBs. It has expanded its Vipre Business offering during the past year, integrating patch management and MDM capabilities.GFI is squarely aimed at the SMB market, where ease of use and "set and forget" functionality are sought-after attributes. The vendor should be considered by SMBs looking for straightforward and easily managed anti-malware protection with a low performance impact.Strengths∙The GFI Vipre console is straightforward and easy to use, and provides consistent management across Windows and Mac clients, as well as email anti-malware scanning.∙The latest version of Vipre Business Premium includes integrated PC application patch management capabilities from the GFI LanGuard offering, which will appeal toorganizations that have no other solution for patch management.∙The latest versions of Vipre Business Premium and Vipre Antivirus Business include MDM capabilities for Android and iOS, also using the same integrated console.∙GFI offers a free, Web-hosted malware analysis engine that provides immediate forensic feedback on submitted application files.∙Signature-based anti-malware scanning is augmented with GFI's MX-Virtualization sandboxing technology, which analyzes malware in real time within a partitionedenvironment on the PC.Cautions∙Network discovery of machines without agents uses NetBIOS or Active Directory, which limits discovery of devices to Windows-only devices.∙GFI's patch management capabilities are limited to Windows and Windows applications.Mac OS is on its road map.∙ A device control solution is available separately for an additional cost; however, it usesa different management console, and GFI offers no option for full-drive encryption.∙Other than Exchange email filtering, GFI offers no DLP capabilities.∙GFI has no application control capabilities.∙GFI offers no specific integration with VMware's vShield APIs, although scanning can be randomized to reduce loading.∙The agent would benefit from better tamper protection.∙MDM capability is limited.Return to TopIBMIBM's EPP offering is built on the foundation of its strong client management tool platform, the Tivoli Endpoint Manager (TEM; formerly BigFix). The core malware engine (now called TEM for Core Protection) is provided by Trend Micro, and advanced HIPS capability is provided by Proventia (formerly ISS). These tools are augmented with IBM's X-Force research labs. Large organizations that are considering IBM for client management tools or those looking at Trend Micro should include IBM on their shortlists.Strengths∙TEM provides a converged endpoint management and security operations console that supports large enterprise needs across multiple endpoint types, including mobiledevices.∙TEM for Security and Compliance offers fully integrated patch, configuration and vulnerability management, as well as the ability to monitor other EPP agents, such as McAfee, Symantec and Microsoft.∙TEM for Mobile Devices enables unified MDM of iOS, Android, Windows Phone, Windows Mobile and Symbian devices with the same management infrastructure. Servicesinclude inventory profile management, remote locate and wipe, and app deployment.IBM is rated a Visionary in the MDM software Magic Quadrant.∙Add-on components include TEM for Data Protection, which provides port/device control and DLP. Application control is offered via Bit9 integration with the TEMplatform.∙The security and compliance analytics Web interface can establish and monitor built-in and admin-created key performance metrics and show compliance over time.∙The IBM Global Services group offers a mature managed security services.∙IBM server protection products boast very broad server support for Windows, Linux, HP-UX, Solaris and AIX, including 64-bit support for Windows and Linux, and new AIX6.1 support.Cautions∙IBM is starting to show some traction in this market; however, mind share for this solution, as represented by Gartner client inquiries, is still very low, despite IBM'sobvious size and channel advantages.∙IBM appeals mostly to very large enterprise customers that value the integration of operations and security. The Win32 console is complicated and is not designed fornontechnical users.∙The vendor has a large and somewhat confusing product portfolio in this market, and prospective customers must carefully match desired features with specific productofferings. The complete suite is expensive.∙The TEM console is very powerful, and has more reporting and management capabilities than most EPP security solutions; however, it is still not fully optimized for the security role.∙TEM for Core Protection does not provide AV for Exchange, SharePoint, Lotus Notes and other specialized servers.∙Although IBM has its X-Force security analysis team, it is dependent on Trend Micro for its broad signature database. Disruptions at this critical partner could have an impact on IBM's customers. Integration of the latest Trend Micro engine into the TEM client can take a few months.Return to TopKaspersky LabKaspersky Lab continues to be one of the fastest-growing large vendors in this Magic Quadrant, and its brand awareness is growing outside its large European installed base, improving its ability to execute. The vendor continues to broaden its offering with internally developed features that are tightly integrated into the client and management console, allowing for cross-feature policies. At the same time, Kaspersky Lab continues to perform very well in malware effectiveness testing. Organizations looking for an alternative vendor to the traditional market leaders should evaluate this vendor.Strengths∙The MMC management console is comprehensive and offers granular control and policy.The dashboards can be customized with predefined graphs and are task-oriented. We particularly like the security status dashboard, which rolls up warnings of vulnerability, AV client status, infection information, network events and OS error reports.∙Kaspersky is building out an impressive array of traditional client management tools, including vulnerability analysis, patch management, application inventory, application control and MDM.∙Kaspersky Mobile Security provides MDM capability and security agents for mobile clients. Advanced functionality includes Web threat protection, application control and jailbreak detection.∙Application control capabilities provide a fully categorized application database and trusted sources of change, as well as offering client-level Web filtering for managingwebsites and Web applications.∙Kaspersky Lab is introducing centrally managed file-level and full-disk encryption with preboot authentication for hard drives and removable devices, integrated withendpoint security policies and application and device controls.∙Device control capabilities are very detailed. The solution was recently improved with the addition of integrated files, removable media and a full-disk encryption solution.Encryption is integrated into device control policy to optionally force encryption onremovable media.∙The malware research team has a well-earned reputation for rapid and accurate malware detection. The vendor offers advanced HIPS features, including an isolatedvirtual environment for behavior detection, application and Windows registry integrity control, real-time inspection of code at launch, and integrated malicious URL filtering.On PCs, the endpoint agent (Kaspersky System Watcher) can perform a systemrollback.∙The agent has a small disk and memory footprint for an integrated solution, and signature updates are small and frequent.∙Kaspersky Lab offers broad endpoint platform support, including an agentless VMware vShield solution with an intrusion prevention system/intrusion detection system(IPS/IDS) using VMware Network Extensibility (NetX) technology, all managed byKaspersky Security Center.。
Check Point安全
![Check Point安全](https://img.taocdn.com/s3/m/3923f1dd910ef12d2af9e7c0.png)
©2016 Check Point Software Technologies Ltd.
Highly Restricted document
19
300例最佳实践的范例
防火墙策略
清理规则 隐身规则 任何Any Drop插件 未命名规则 未使用规则
GAiA 设置
远程登录 默认路由 系统时钟 登录 DNS 服务器配置
©2016 Check Point Software Technologies Ltd.
[Protected] Distribution or modification is subject to approval
14
大数据策略库匹配机制
基于列的匹配
• 策略表匹配处理 (示例, 邮件服务器 IP 地址: 192.168.170.10)
• 在第一轮匹配之后,6个规则中只有3个保留了继续匹配
This is an animated slide. Click once, then wait until this element is blinking. ©2016 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval 16
防火墙设置
TCP 会话超时 反欺骗 防火墙日志 NAT / PAT 点击次数
©2016 Check Point Software Technologies Ltd. 【受保护的】非机密内容
IPS 设置
保护更新 禁止和检测 政策保护 IPS 检测 临界保护
20
全面的设备监控
标准监控示图
星环大数据产品和技术介绍
![星环大数据产品和技术介绍](https://img.taocdn.com/s3/m/899ef914312b3169a451a491.png)
ODBC 3.5
SHELL
Cypher Compiler
Inceptor Execution Engine
Graph Search Engine
Source HDFS Text, ORC, ORC Transaction
图分析 Schema
节点1 个人/公司/… 个人/公司/…
节点2 个人/公司/… 个人/公司/…
ODBC 3.5
Connector中间件管理单元
Batch & Interactive SQL Engine
SQL 2003 Compiler 语法解析器
SQL Parser 优化器
RBO & CBO 代码生成
CODE GENERATOR
PL/SQL Compiler 存储过程解析器
Procedure Parser 控制流优化器
Inceptor
Hyperbase
Stream
File Interface HDFS
数据层
2020/5/4
10
数据挖掘产品 Discover & Midas
• Discover R语言开发 => 算法工程师,数据科学家 • Midas交互式挖掘 => 业务分析师,数据科学家
数据预览
预处理
特征工程
模型训练
Stargate
分布式内存/SSD列式存储
Holodesk
属性… 边属性 边属性
属性… 边属性 边属性
Source Hyperbase
…… … …
2020/5/4
Graph Searching
➢ SQL-like syntax ➢ Complex searching patterns ➢ Multiple data sources ➢ Real-time response
恩柏科软件公司介绍
![恩柏科软件公司介绍](https://img.taocdn.com/s3/m/7c897c7d01f69e314332949e.png)
Role Based Security Smart Documents Mobile Devices External Systems Internet Users Agile Processes
Adaptable Epicor True SOA™ Backbone
大型企业
员工1000-2499, 销售收入 $250-999M
大中型企业
员工 500-999, 销售收入 $100-249M
中小型企业
员工 100-499, 销售收入 $50-99M
小型企业
员工 20-99, 销售收入 $25-49M
超小型企业
员工 1-19, 销售收入小于 $25M
© 2012 Epicor Software Corporation
来源:Gartner公司,“产品核心型中端市场企业的Single-Instance ERP(企业资源规划)魔力象限 (MQ)”2012年6月27日( Christian Hestermann, Chris Pang, Nigel Montgomery )
© 2013 Epicor Software Corporation
公司概览
Name
Title Title
v
关于Epicor
© 2012 Epicor Software Corporation
Epicor概览
• 全球领先的ERP提供商
– 全球中端市场 – 全球1000大型企业旗下的业务部门或分支机构
遍布超过50个国家,拥有4300名员工 和400名合伙伙伴
• 成立于1972年
Singapore
Sydney, AU
Gartner公司定义2012十大战略技术
![Gartner公司定义2012十大战略技术](https://img.taocdn.com/s3/m/eabb178471fe910ef12df8df.png)
Gartner公司日前定义在2012年排名前十的战略技术及其发展趋势。
Gratner公司将此定位为将在未来三年对企业产生巨大影响的战略技术。
这些技术有可能是已经在广泛使用的已有技术,也可能是在未来五年有潜力影响市场的新技术。
这些技术的特点有:1)符合多数组织的战略需求。
2)对组织的计划,方案,举措有长期的影响。
2012的十大战略性技术包括:1.平板电脑的媒介及其延伸(Media Tablets and Beyond)企业期望获得可以管理多个智能用户的多样化环境。
2.以移动为中心的应用和接口(Mobile-Centric Applications and Interfaces)应用程序本身有可能转向更集中和简单的应用程序,可以组装成更复杂的解决方案。
这些变化将推动需要新的用户界面设计技巧,以移动为中心,强调触摸,手势,搜索,语音和视频。
同时,移动企业平台工具正在兴起,HTML5可以长期解决跨平台问题。
3.上下文感知及大众用户体验(Contextual and Social User Experience)上下文感知计算利用从终端用户处获得的环境、活动、偏好等方面信息,以提高与用户或者对象在交互方面的质量。
预计到2013年,上下文感知的应用程序会出现4.物联网( IOT)IOT的主要技术包括:图像识别,嵌入式传感器,近距离无线通讯技术。
这些技术的发展现在已到达临界点,物联网将在未来几年带来经济的引爆点。
5.应用程序商店和市场(App Stores and Marketplaces)Gartner预测,到2014年,全球用户将有超过70亿美元用于在应用程序市场下载手机应用。
企业应该在应用程序市场反面作出努力,并以风险和价值来分割应用程序。
6.下一代的分析方法(Next-Generation Analytics)分析方法在沿着三个关键方面发展:1)从传统的离线分析发展为在线嵌入式分析;2)从分析历史数据解释发生了什么转为分析历史数据和实时数据,在多个系统中进行模拟来预测未来;3)从结构化简单的数据分析转为分析许多类型的复杂信息。
超融合 三方论证报告
![超融合 三方论证报告](https://img.taocdn.com/s3/m/d20d2c2bf08583d049649b6648d7c1c708a10b24.png)
超融合三方论证报告超融合三方论证报告一、背景介绍•超融合是指将计算、存储、网络等基础设施整合在一起,构建高度集成化的虚拟化环境。
•超融合技术在当前的数据中心领域得到广泛应用。
二、超融合的优势1.简化部署和管理:–架构整合了计算、存储和网络功能,降低了配置和部署的复杂性。
–提供集中化的管理界面,便于管理员进行统一管理和监控。
2.提升性能和扩展性:–高度优化的硬件和软件协同工作,提供更高的性能和更低的延迟。
–支持线性扩展,可以根据需求轻松增加计算和存储资源。
3.节约成本:–硬件资源共享,避免了低效的资源利用。
–能够通过软件定义存储和网络,减少了对专用硬件的需求。
三、三方论证1. 学术界观点•许多学术研究指出,超融合架构可以提供更高效的资源利用和更简化的管理方式。
•学术界普遍认为超融合技术是数据中心未来发展的趋势。
2. 业界观点•众多科技公司已经将超融合技术应用于自身的数据中心,取得了显著的成果。
•业界普遍认可超融合技术对于解决传统数据中心面临的挑战具有重要意义。
3. 用户观点•一些企业用户表示,超融合技术让他们的IT部门更加灵活和高效。
•用户们强调超融合架构在降低成本和提升性能方面的显著优势。
四、结论•超融合架构的简化部署和管理、提升性能和扩展性、节约成本等优势已经得到了学术界、业界和用户的三方论证。
•超融合技术有望成为未来数据中心的主流架构,值得进一步推广和应用。
以上是关于超融合的三方论证报告,该报告通过列点的方式呈现了超融合技术的优势,并进行了学术界、业界和用户三个方面的论证。
通过分析不同观点,得出了超融合技术有望成为未来数据中心主流架构的结论。
五、建议•鉴于超融合技术的优势和前景,建议企业在数据中心的规划和更新中,积极考虑采用超融合架构。
•在选择超融合解决方案时,应根据实际需求和预算制定明确的选型标准,选择适合自身业务的产品和厂商。
•引入超融合技术后,应充分利用其集中管理和监控的功能,优化资源配置,提高运维效率。
aruba无线网络介绍
![aruba无线网络介绍](https://img.taocdn.com/s3/m/950ece2b0912a2161479297a.png)
Mobile Security
安全接入
Authentication, Encryption, Intrusion Prevention
Wireless LAN 覆盖
RF Management, Rogue AP Detection
CONFIDENTIAL © Copyright 2007. Aruba Networks, Inc. All rights reserved
CONFIDENTIAL © Copyright 2011. Aruba Networks, Inc. All rights reserved
802.11a/n
802.11b/g
X
12
RFProtect射频分析和保护
• 消除射频安全漏洞,防范射频攻击威胁
– 对非授权射频设备进行识别和压制
• 直观显示射频频谱信息
$199.3
2011年Q2新增 超过1000家新 客户
$200
$178.3
净收入超过$16M
现金超过$187M+ 零负债
$150 $127.5
$100 $72.5 $50 $12.0
$1.1 $0
FY 2004FY 2005FY 2006FY 2007FY 2008FY 2009FY 2010
2
CONFIDENTIAL © Copyright 2011. Aruba Networks, Inc. All rights reserved
医疗
电力
交通
酒店
企业
高科技
7
CONFIDENTIAL © Copyright 2011. Aruba Networks, Inc. All rights reserved
安全评估类企业排名
![安全评估类企业排名](https://img.taocdn.com/s3/m/3347b0e76e1aff00bed5b9f3f90f76c661374cc0.png)
安全评估类企业排名
根据不同的评估标准和方法,以下是一些安全评估类企业的排名列表,供参考:
1.世界大型保险企业协会(Insurance Information Institute,III)
2.斯坦福生物安全和细菌感染项目(Stanford Biosecurity and Biotech Infection Rankings)
3.全球反恐怖主义指数(Global Terrorism Index)
4.世界经济论坛全球竞争力指数(World Economic Forum Global Competitiveness Index)
5.美国国家公共调查办公室数据(National Public Survey Office Ranking)
6.Gartner魔力象限(Gartner Magic Quadrant)
7.美国消费者信用活动监管局(Consumer Financial Protection Bureau)
8.货币政策和全球金融稳定与发展网络指数(Network for Greening the Financial System)
9.美国国家环境信息系统(National Environmental Information System)
10.美国联邦贸易委员会(Federal Trade Commission)
请注意,这些排名列表可能在不同的时间和评估标准下有所变化,建议根据自己的具体需求和背景进行详细调查和比较,以选出最适合的安全评估类企业。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
G0******* Magic Quadrant for the Wired and WirelessLAN Access InfrastructurePublished: 26 June 2014Analyst(s): Tim Zimmerman, Andrew Lerner, Bill MenezesWe evaluate a variety of LAN vendors providing converged access layer connectivity. Vendors are increasingly able to provide integrated hardware and network application solutions. Enterprises are expanding how users connect to the infrastructure, and vendors are providing new ways to differentiate.Market Definition/DescriptionThe access layer market consists of vendors that supply wired and wireless LAN (WLAN) hardware and software components that provide the first connectivity to the infrastructure access layer, from the edge of the enterprise network to the end users or connected devices. The market consists of three types of access layer vendors:■Those that provide their own wired and wireless infrastructure connectivity, network service applications, and services (such as Cisco, HP Networking, Avaya, Adtran, D-Link, ExtremeNetworks and Huawei).■Those that mainly focus on a specific connectivity option, often offering solutions for one or more vertical markets or deployment solutions that address a unique set of marketrequirements (such as Motorola Solutions, Aruba Networks and Aerohive).■Those that use a strategic partner to provide a portion of the access solution. It is important that these vendors provide differentiating functionality that shows why the vendors collectivelyprovide a better offer to enterprises, rather than being considered separately (such as Dell,Juniper and Alcatel-Lucent Enterprise).Today, the access layer market continues to evolve from two separate decisions, one being wired and the other being wireless, to a single unified access layer decision. Organizations continue to express a desire for a unified wired/WLAN access infrastructure in which the access is user-centric and incorporates location, time/date and duration of the connection, as well as what application the user or device is accessing to determine whether or not it will be allowed. During inquiries, enterprise clients continue to say that they do not want to have to make trade-offs between the security, policy enforcement and management of their wired and wireless access networks. With limited growth in IT resources, administrators require one network management application, one access security solution, one guest access application or one policy enforcement solution with theflexibility to be deployed in a public cloud, private cloud or on-premises. This integration reducesthe costs associated with the upfront capital expense of multiple network service applications —each dedicated to either the wired infrastructure or the wireless or cloud components. This savingsis also extended to the ongoing software maintenance costs of all access layer management,security and policy enforcement components, whether a single vendor implements the entiresolution or the client has a multivendor environment. A single network service application for theaccess layer not only reduces operational overhead, but also eliminates the potential for conflictingpolicies as users access the network with an increasing number of diverse devices in diverseenterprise locations.What's Changed?During the past 12 months, the access layer market has continued to evolve — including hardware, software and applications that are needed for an end-to-end solution. From a wireless standpoint in the industry, we saw the ratification of the 802.11ac standard and the introduction of 802.11acWave 1 products by vendors in the enterprise (see "Enterprises Should Optimize the Timing of802.11ac Adoption"). Additionally, several vendors introduced hardware and software to improveapplication performance (for example, to adjust the network for latency-sensitive applications while maintaining their aging WLAN controller architectures).While there has been less overall change on the wired side, vendors made both hardware andsoftware innovations to improve management and provisioning of wired campus infrastructure,including support for switch extenders and software-defined networking (and related) technologies.As vendors increasingly focused on the midmarket and small or midsize businesses (SMBs) forwireless deployments, we saw them shift from large, one-size-fits-all network service applicationsuites to line-item applications that provided specific business value, such as guest access, policymanagement, onboarding and network management (see "Network Access for Guests orContractors Requires More than an Open Network, Coffee Shop Strategy").Several vendors also made acquisitions around WLAN as well as location-aware functionality, aslocation of the user continues to be important to the retail and healthcare vertical markets, but nowalso to the hospitality market. In additional to location, we saw the introduction of analyticsapplications that looked at not only network data, but also collected and correlated user data asthey attached to the network. In the past year, these applications were deployed to clients not onlyas an on-premises application, but also in the cloud, private or public, in single tenant andmultitenant environments.As a result, we are seeing fewer RFPs from client inquiries focusing on the speeds and feeds ofaccess layer connectivity as hardware prices continue to decline (see "Forecast: Enterprise Network Equipment by Market Segment, Worldwide, 2011-2018, 1Q14"). Clients often site networkapplications and unified access layer management not only as market drivers, but also as keydifferentiators when evaluating vendor proposals.Page 2 of 27Gartner, Inc. | G0*******What's Required in the Wired and Wireless Access Layer?During the past couple of years, we have seen the increase in total access layer bandwidth that isthe result of the rampant introduction of bring your own device (BYOD) strategies (based onGartner's 2013 Data Center Summit survey, as well as 2013 and 2014 wired and WLAN accessinfrastructure customer reference surveys). While the amount of bandwidth needed has notchanged per user, the sheer number of devices is causing enterprises to rethink their overallbandwidth needs, as well as how all these devices will be used and managed.This trend has exposed two important vendor requirements. First, vendors must provideconnectivity solutions for not only 802.11n, but also 802.11ac Wave 1, as well as a migration pathand road map for 802.11ac Wave 2. Second, BYOD has exposed the suboptimal network serviceapplications that vendors have been using to meet business requirements, such as guest accessand policy enforcement. There is a growing need to increase the granularity of managing thesedevices with primitives that include not only device and user, but also location, duration and time/date. Additionally, management applications must extend beyond configuration and provisioning to device profiling that can be used to create access layer policies that tune the network. We alsoexpect the introduction of new primitives and management functionality as the access layer market continues to move toward guaranteed uptime and SLAs, which will spur adoption of completemanaged services offerings at the edge of the network.Network administrators are looking for network service applications that address wired and wireless clients, including access layer services such as:■Policy enforcement that provides access to applications and parts of the network based on credentials, as well as context-aware variables, such as location and device profiling. This isparticularly useful in BYOD scenarios.■Integrated network management that is aware of wired components and is WLAN-vendor-independent for configuration and provisioning.■Onboarding services, including device authentication and user authorization services for BYOD programs that support many operating systems and device postures.■Analytics applications that look not only at the network, but also at the end-user data.■Network forensics tools to determine what is happening across the entire access layer in addition to security functionality.■Support for voice and video applications by adding features such as reduced jitter, awareness and monitoring of voice and video quality, and fixed mobile convergence capabilities.■Location-based services, context-oriented services and asset management.■The ability to provide managed services when additional IT resources are needed.As vendors continue to expand functionality, they will provide additional information about usageand traffic to administrators, enabling enterprises to maximize the productivity and ROI of all access layer connectivity.Gartner, Inc. | G0*******Page 3 of 27Magic QuadrantFigure 1. Magic Quadrant for the Wired and Wireless LAN Access InfrastructureSource: Gartner (June 2014)Vendor Strengths and CautionsAdtranAdtran has a strong presence in the service provider market and sells its enterprise offering through distribution partners, with an extensive reseller channel that deploys access layer solutions to aPage 4 of 27Gartner, Inc. | G0*******distributed enterprise market. The vendor has a complete end-to-end access layer solutionrepresented by its virtual WLAN (vWLAN) and NetVanta products in its Internetworking portfolio.Adtran continues to leverage a strong VMware relationship, and has recently made a strong push to provide a complete and flexible cloud offering. Target markets include state and local governments, education, healthcare, and the VMware installed base, independent of vertical market.Adtran should be considered for state and local government, education, and healthcare accesslayer opportunities, and also for solutions for distributed enterprises and managed service offerings.Strengths■Adtran has a strong, flexible deployment solution and presence in enterprises that have multiple-location branch or remote offices that can be managed centrally with on-premisesmanagement, in a private cloud or through its hosted ProCloud Wi-Fi managed service offering.■The vendor uniquely offers an a la carte professional services suite to deliver site surveys, installation, maintenance and end-user help desk services from a single vendor.■Adtran's broad range of NetVanta Ethernet switches addresses a wide range of applications. Its ActivChassis solution satisfies high-density, geographically diverse deployments. Legacyvertical-market-specific requirements (such as Power Over Ethernet [PoE] over Category 3[Cat3] cables or even voice-grade copper) are satisfied with its unique ActivReach solution.Cautions■The vendor has an extensive North American direct and channel organization, where 71% of its products are sold. Organizations should request references for implementation and service ofapplicable Adtran solutions outside of North America.■Adtran continues to execute well on the core functionality needed in its key enterprise vertical markets, but does not currently provide capabilities in areas of emerging requirements, such aslocation awareness and application visibility.AerohiveAerohive continues to grow faster than the overall industry in terms of revenue, with estimatedgrowth of 47% year over year (see "Market Share: Enterprise Network Equipment by MarketSegment, Worldwide, 4Q13 and 2013"). The vendor, which raised its profile with an initial publicstock offering in 1Q14, remains focused on WLAN which accounts for more than 87% of itsbusiness and wired switching platforms as well as small branch router/VPN devices for a completeaccess layer solution.Aerohive's key differentiator continues to be its distributed intelligence, controllerless architectureand unified HiveManager network service applications, supporting a cloud- or on-premises-basedsingle control point for onboarding, monitoring, and managing both the WLAN and wired switchesas a unified network. The vendor's predominant markets continue to be North America and EMEA,accounting for 89% of revenue, which it serves through a 100% indirect sales force. Enterprises Gartner, Inc. | G0*******Page 5 of 27should consider Aerohive for all overlay WLAN deployments, especially in the education, retail andhealthcare sectors.Strengths■Aerohive's cooperative control architecture can provide a more competitive total cost of ownership versus legacy controller-based systems, since it eliminates the primary controllerplatform as well as the often-required high-availability backup controller.■Aerohive's HiveManager Online and Mobility Suite provide cloud-based options for enterprise-scale network management, guest management, client onboarding and device management.Clients report that the context-based visibility, policy enforcement and analytics capabilitieshave good user interfaces and ease of use.■Aerohive customers gave high marks for its experience, including sales, support and performance of the solution. The vendor's solutions are typically the most cost-effective, basedon the bids that Gartner reviews.Cautions■Currently, HiveManager manages only Aerohive products, although, when integrated with the Client Management mobile device management (MDM) solution, it can manage multivendorclient status. Multivendor monitoring requires an enterprise to use the Mobility Suite, whichincludes Client Management and the ID Manager guest management system.■Enterprises need to be aware that some applications, such as ID Manager, are currently available only in the cloud, which can limit the deployment options of this functionality.■Although it is now a public company, Aerohive is still one of the smaller access layer vendors with respect to geographical footprint. Clients outside of North America and Europe shouldmake sure that their sales and support requirements can be adequately addressed.Alcatel-Lucent EnterpriseOn 6 February 2014, Alcatel-Lucent announced its intent to sell an estimated 85% interest in itsenterprise business to China Huaxin, which has indicated that it plans increased investments in theenterprise portfolio. These investments potentially include greater development of solutions specific to the education, hospitality, healthcare and other vertical markets, and greater emphasis on thegeographic regions it identifies as high growth. However, like any large corporate transaction, thedeal raises the risk of potential disruption to customers as the newly separated enterprise businessattempts to maintain seamless relationships with other Alcatel-Lucent divisions with which it cross-sells technology into large vertical markets, such as service providers, government, utilities andtransportation. The agreement between China Huaxin and Alcatel-Lucent, which includes 15%retention of Alcatel-Lucent Enterprise, may mitigate this risk.Alcatel-Lucent Enterprise continues to target its flagship Converged Campus Network solutionpredominantly at midsize and large enterprises, generating just over half of its revenue in EMEA.Enterprise customers, as well as global service providers and transportation, utilities, energy andPage 6 of 27Gartner, Inc. | G0*******other public-sector organizations, should consider the vendor for wireless and wired accessinfrastructure.Strengths■Alcatel-Lucent Enterprise continues to enhance its application-fluent network strategy with unified wired and wireless network access capabilities and network analytics technology viadeep packet inspection and enforcement of application policies at the edge of the network.■The vendor uses Aruba's ClearPass access management technology to provide a consistent set of BYOD services across both its own and third-party WLAN and wired LAN equipment,including device provisioning; guest management; device fingerprinting and policy enforcement.■Alcatel-Lucent offers a mature unified communications/Internet Protocol telephony solution that integrates with its WLAN and wired LAN access products, and its unified management platform.Cautions■Customers should vet local support and investment by China Huaxin as more details become available of its specific plans for the Alcatel-Lucent Enterprise business.■Compared with leading competitive offerings in this research, Alcatel-Lucent has a limited ability to provide management services available as SaaS or a cloud-based product until itenhances its OmniVista platform for those capabilities in 3Q14.■Alcatel-Lucent Enterprise's dependence on Aruba's WLAN technology for its access layer solution limits the vendor's ability to structure its offering based on the requirements of marketsthat may be a priority for China Huaxin, but not necessarily for Aruba.ArubaAruba focuses primarily on mainstream enterprise wireless, which accounts for more than 85% ofits revenue. Aruba has grown to be the No. 2 WLAN vendor in terms of revenue, and offers a well-thought-out architecture that supports both pay-as-you-grow pricing and mixing/matching ofcomponents across product lines. Aruba networking gear can be run in either controller orcontrollerless mode (branded as Aruba Instant), and can be provisioned via Aruba's new SaaS-based management offering, Aruba Central, or the vendor's traditional AirWave networkmanagement software. Network service applications are delivered via Aruba's ClearPass software,which provides guest access, device profiling, posture assessment, onboarding, etc. In addition tolaunching Aruba Central's cloud provisioning capability, Aruba has released new 802.11ac accesspoints, and has added several software features to improve WLAN performance, authentication,analytics, and security during the past 12 months. Aruba's strong WLAN solution is in a "meet in the channel" model relationship with Juniper Networks and Brocade, and it is also rebranded byAlcatel-Lucent and Dell. Enterprises should consider Aruba for all WLAN deployments globally, and specifically with their strategic partners as part of an integrated access layer solution.Gartner, Inc. | G0*******Page 7 of 27Strengths■Gartner clients report a high degree of satisfaction with Aruba's ClearPass for onboarding and guest access, which also includes a REST API and integration with leading MDM vendors, suchas Citrix, AirWatch and MobileIron.■Aruba has a simplified product architecture that allows enterprises flexibility in terms of how they manage, deploy and scale their environments.■Aruba's ClientMatch technology addresses "sticky client" issues that occur as mobile roaming clients move from one access point to another.■Aruba has increased its focus on network security, including an intrusion prevention system (IPS), an embedded mobility firewall and established partnerships with leading security vendors,like Palo Alto Networks.■ClearPass and AirWave support non-Aruba devices, which simplifies orchestration within multivendor environments.Cautions■Aruba's wired portfolio can meet many enterprise use cases, but lacks the brand awareness and hardware/software depth and breadth of its leading competitors. The vendor has less thana 0.5% share of total 1G port shipments, and derives only 3% to 5% of revenue from wiredswitching. As a result, Aruba is not considered a trusted wired switching vendor by mostGartner clients.■Since 97% of Aruba's sales are generated by indirect channels, enterprises must verify that resellers/distributors have the ability to support the entire Aruba access layer solution throughverified resources.■Aruba access points running in Instant mode lack some capabilities of controller-based architectures, and Gartner clients have reported confusion over which mode to run the accesspoints in.AvayaAvaya provides its unified access solution across a global footprint. It has a particular strength inthe U.S. and EMEA regions, with an emphasis on education, healthcare, hospitality and local/stategovernment verticals. The vendor continues to provide a strong offering across wireless and wiredaccess technologies, with a marketing perspective that the WLAN is now the primary networkaccess mechanism in the enterprise. The global Avaya Connect channel program accounts forabout 80% of annual networking sales.Avaya's Identity Engines application portfolio is the identity and network access control solution,providing unified multivendor wireless and wired network management. Tools include the GuestManager, Access Portal and Client Access to the Secure Enterprise (CASE) Wizard solutions,enabling fast, self-service guest access. The vendor's updated IP Office Release 9.0 adds singlesign-on based on the SAML protocol for Web-based applications, to unify network and accessPage 8 of 27Gartner, Inc. | G0*******management control. Avaya also differentiates itself with its Diagnostic Server, also called SLAMon, which allows network managers to simulate different traffic types to detect potential problemsbefore application performance is degraded. The vendor's comprehensive portfolio warrantsconsideration in any access layer opportunities in its target markets.Strengths■Avaya's extensive unified communications presence provides a strong installed customer base complementary to its unified access business.■The vendor's new WLAN 9100 802.11n access points are software upgradable to 802.11ac, avoiding the need to change out the radio, as required by other vendors, once the enterprisemigrates to 802.11ac Wave 1.■Avaya's unified access platform provides application control capabilities supporting guest access and BYOD, by enabling IT managers to enforce application quality of service (QoS) byprioritizing business apps at the wireless access point, as well as policy controls likepermission, prioritization, throttling and blocking policies specific to more than 1,300 differentapps.Cautions■Avaya's managed service portfolio covers overall IT infrastructure, including unified communications, contact center and video, but there is no separate access layer solution forcustomers that may not need the additional services.■Combined Asia/Pacific and Latin America access layer sales remain less than 15% of total revenue, indicating that awareness of Avaya's networking solutions may remain low amongcustomers in those regions.■While the vendor continues to invest in its networking portfolio, we see a decline in its enterprise data/access layer sales relative to the market, which it must address in order forenterprises to consider the solution for long-term strategic investments.CiscoCisco continues to be the largest vendor and market share leader, with a broad product portfolio inthe enterprise wired and wireless infrastructure market. A strong channel, combined with a globalpresence, means that the vendor continues to be on the shortlist for all access layer opportunities.Cisco has a complete line of access layer solutions, including core network service applicationfunctionality in network management, security and policy enforcement for both wired and wirelessenterprise connectivity. The vendor has taken a leadership position with its location-based services as part of its Connected Mobile Experiences (CMX), which enables new applications based onnetwork analytics to create business relevance in targeted vertical markets. Cisco's ability toaddress and deploy in in-store retail, as well as in manufacturing/logistics environments, gives it alarge solution footprint that can be deployed globally. Cisco focuses on the public sector,Gartner, Inc. | G0*******Page 9 of 27healthcare, education, hospitality and retail markets. Cisco should be considered for any largeenterprise or midmarket opportunity.Strengths■Cisco's "One Policy, One Management, One Network" is a strong marketing message that leverages its Identity Services Engine (ISE) and Prime Network management applications acrosswired and wireless access layer components. For many enterprise environments, theseapplications, combined with Cisco's wired switching and wireless access points, provide strongfunctionality to address enterprise requirements.■Cisco developments in location services are moving the market and meeting the enterprise need for submeter accuracy for Wi-Fi, without the requirement of supplemental beaconing or aseparate overlay for the location-aware solution.■Cisco Meraki is a strong solution for midmarket customers seeking cloud-managed solutions.■Cisco access layer innovation simplifies network operations and management via the Catalyst 6800ia, which connects to Cisco 6500 and 6800 series core switches for management as asingle switch domain. The vendor additionally provides application visibility, investmentprotection through access point modularity, and device and network analytics, as well asEnergyWise and TrustSec.Cautions■Enterprises need to be aware that Cisco currently has at least four separate access layer connectivity architectures that are developed by separate development teams, and does nothave a consistent user interface between solutions that often have different functionality forsecurity, guest, network management and policy enforcement. Whether it is ISE, controller-based, Meraki cloud-based or the SMB solution, enterprises need to verify the infrastructurefunctionality being proposed against their requirements, and whether multiple applications mayrequire multiple training sessions.■Cisco ISE, which may be deployed in the enterprise, has a limited ability to deploy and enforce policy to the Meraki cloud-based solution, which may be proposed for branch or remote offices.The same issue applies in that Cisco Prime is limited in regard to managing Meraki assets.■Cisco 3602 and 3702 access points with High Density Experience (HDX) technology (such as ClientLink and CleanAir Technology) cannot be used with the Cisco Meraki solution. Similarly,the Meraki access points cannot be used with other Cisco access layer solutions.■The vendor tends to present the highest-cost solution, based on list price. It is important that enterprises compare vendor prices for equivalent functionality in order to ensure that the priceis competitive.DellDell is the No. 4 wired switching vendor and is growing significantly faster than market rates, asmeasured via revenue. The vendor's wireless portfolio is derived via an OEM relationship withPage 10 of 27Gartner, Inc. | G0*******Aruba, which it rebrands as W-Series. The majority of Dell's sales are direct, and the vendor focuses heavily on midmarket enterprise, higher education and public institutions. During the past 12 months, Dell has completely refreshed its wired switching portfolio, including the release of its N-Series fixed-form factor and C-Series modular switches. Dell should be considered for all access layer opportunities, particularly in the midmarket.Strengths■Dell recently overhauled its campus switching portfolio with N-Series fixed-form factor and C-Series modular switches, which meet the full breadth of enterprise wired use cases and are energy efficient versus leading competitors.■Dell has a history of strong support, and its managed service offering allows enterprises to deploy access layer technology without requiring dedicated IT resources.■The Dell architecture is largely based on open standards and includes the ability to operate in multivendor environments, which can simplify management in heterogeneous networks. Cautions■The vendor's weak WLAN growth, as well as its reliance on Aruba for its wireless portfolio, means Dell lacks direction and control over its WLAN portfolio. This could result in an inability to respond quickly to changing market demands.■Currently, Dell adds limited differentiating value on top of Aruba's product offering. This reduces the value proposition of acquiring W-Series wireless products from Dell versus Aruba.■Many organizations in Dell's target market look for turnkey SaaS-based cloud management, but Dell's cloud management capability (Dell Cloud Dedicated) is infrastructure as a service (IaaS)-based, not SaaS-based, which requires additional operating expenditure.D-LinkD-Link has a broad portfolio of low-cost wired/WLAN networking hardware. The vendor focuses on the education and SMB markets, and is the leader in both stand-alone access point shipments (46% share) and 100 Mbps wired port shipments (28% share), with a majority of its business derived outside the U.S. and Europe. D-Link provides on-premises management via the D-View platform, which includes guest access to support BYOD. During the past 12 months, D-Link has added 802.11ac-capable access points, enhanced the capacity of its WLAN controllers, and added integration capability between surveillance cameras and their access network products. SMBs with basic wired/WLAN networking requirements should consider D-Link.Strengths■D-Link offers a broad hardware portfolio of wired and WLAN components, which range from 5-port unmanaged Layer 2 Gigabit switch to 8-slot L3 chassis-based switch, as well as 802.11ac access points.。