The data center and cloud networking vendors covered in this market provide hardware and/or software solutions to deliver connectivity primarily within enterprise data centers. This includes data center core/spine switches, access switches (top of rack [ToR], leaf), virtual switching, Ethernet fabrics, network operating systems (NOSs) and network overlays, and the requisite management, automation and orchestration of those components.
Reviews for 'Enterprise Networking and Communications - Others'
Gartner defines the enterprise wired and wireless LAN infrastructure market as wired and wireless networking hardware and the related network software. Related components of the solution include enterprise switches, access points and the requisite tools to secure, manage, test and optimize the network infrastructure that provides connectivity for users, devices and applications that may reside on the network or on other networks. Enterprises in all vertical markets use enterprise wired and wireless networks to connect and transport data for fixed and end-user devices to applications that may be local or remote to the physical end user. In addition to physical connectivity, these solutions provide the following capabilities in diverse markets, including the ability to: 1. Discover, identify, secure, manage and segment Internet of Things (IoT)/operational technology (OT) devices 2. Support, test and maintain network infrastructure components 3. Provide a resilience infrastructure 4. Secure the network infrastructure 5. Provide scalability and flexibility for management and control plane communication processes 6. Provide no-touch/low-touch Day 2 environment
Indoor location application platforms allow clients to develop business processes and applications that can leverage asset tracking, people tracking, occupancy monitoring and wayfinding. The market consists of vendors that ingest location information from IoT and other devices, process that information, provide analytics of location information, and provide APIs and software development kits (SDKs) to enable business applications to leverage location data.
Gartner defines the indoor location services market as “the hardware, software and service components that provide indoor location coordinates and services.” Indoor location solutions use differing hardware components, data collection methodologies, location data elements, location engine algorithms and architectures to achieve the core functionality of the indoor location market. Solutions look to provide the location of a static/mobile asset or person, as defined by the needs of the specific vertical market.
Reviews for 'Internet of Things - Others'
Gartner defines network access control (NAC) as technologies that enable organizations to implement policies for controlling access to corporate infrastructure by both user-oriented devices and Internet of Things (IoT) devices. Policies may be based on authentication, endpoint configuration (posture) or users' role/identity. NAC can also implement postconnect policies based on integration with other security products. For example, NAC could enforce a policy to contain the endpoint based on an alert from a SIEM. An organization should evaluate the following capabilities: • Device visibility/profiling • Access control • Security posture check • Guest management • Bidirectional integration with other security products.
Network management tools are software applications used to monitor, maintain, and administer computer networks. They help in ensuring the network's efficient operation, detecting and resolving problems, and optimizing performance. Key functions include monitoring network traffic, managing network devices, ensuring security, and troubleshooting issues. Network Administrators, IT Managers, and Security Professionals utilize these tools to monitor and manage network hardware effectively. They track the performance of network devices such as routers and switches, ensuring these devices operate optimally. Additionally, they maintain and update the configuration of these network components to ensure robust security and efficient network functionality.
Gartner defines SD-WAN as functionality primarily used to connect branch locations to other enterprise and cloud locations. SD-WAN products provide dynamic path selection based on business or application policy, routing, centralized orchestration of policy and management of appliances, virtual private network (VPN), and zero-touch configuration. SD-WAN products are WAN transport/carrier-agnostic and create secure paths across physical WAN connections. SD-WAN products replace traditional branch routers and enable connectivity between enterprise branch locations as well as the cloud. They facilitate WAN connectivity’s evolution from Multiprotocol Label Switching (MPLS)-centric to public internet-centric in support of enterprise traffic shifts from private data centers to public cloud and SaaS.
Gartner defines security service edge (SSE) as a solution that secures access to the web, cloud services and private applications regardless of the location of the user or the device they are using or where that application is hosted. SSE protects users from malicious and inappropriate content on the web and provides enhanced security and visibility for the SaaS and private applications accessed by end users. Security service edge provides a primarily cloud-delivered solution to control access from end users and edge devices to applications (private or delivered via SaaS) as well as websites (and to a lesser extent general internet traffic). It enables a hybrid workforce more efficiently than traditional on-premises solutions. Capabilities integrated across multiple traffic types and destinations allow a more seamless experience for both users and admins while maintaining a consistent security stance.
The compliance third-party risk management (TPRM) solutions market consists of vendors offering technologies to CCOs, among other senior leaders responsible for TPRM, to manage the risks associated with due diligence and/or ongoing monitoring of third-party vendors, distributors, agents, partners or other parties. Products in this market are often capable of supporting a range of TPRM workflows across multiple risk terrains. Risks specifically addressed may include anti-bribery and anti-corruption (ABAC), anti-money-laundering, data management and supply chain, and business continuity risks among others.
Gartner defines WAN optimization tools as products that improve the performance of applications running across the WAN as well as reduce WAN service expenses. WAN optimization solutions continue to evolve, and now support four high-level needs: improving the response times for users of business-critical applications over WAN links or mobile connections; assisting in maximizing ROI for WAN bandwidth; optimizing data-center-to-data-center (DC-to-DC) traffic for faster storage replication and synchronization; and assisting in directing traffic across multiple WANS, such as a hybrid WAN or public cloud connectivity.
Gartner defines zero trust network access (ZTNA) as products and services that create an identity and context-based, logical-access boundary that encompasses an enterprise user and an internally hosted application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a collection of named entities, which limits lateral movement within a network.