Data center infrastructure management (DCIM) tools monitor, measure, manage and/or control data center resources and energy consumption of both IT-related equipment (such as servers, storage and network switches) and facilities infrastructure components (such as power distribution units and computer room air conditioners). They are data-center-specific (they are designed for data center use), rather than general building management system tools, and are used to optimize data center power, cooling and physical space. Solutions do not have to be sensor-based, but they do have to be designed to accommodate real-time power and temperature/environmental monitoring. They must also support resource management, which Gartner defines as going beyond typical IT asset management to include the location and interrelationships between assets.
Gartner defines the enterprise wired and wireless LAN infrastructure market as the hardware and software that enables local connectivity for users and devices. The infrastructure components include enterprise-class wired switches and wireless access points, and the management software that secures, manages, tests, optimizes and automates the network. Organizations across vertical markets rely on enterprise wired and wireless network infrastructures to connect and transmit data for both fixed and mobile devices, enabling end users to access applications that are located either on-site, in remote private or public destinations. In addition to end-user connectivity, these infrastructures offer capabilities for diverse market needs, including: 1. Discovery, identification, security, management and segmentation of Internet of Things (IoT) and operational technology (OT) devices. 2. Design and planning for network infrastructure requirements. 3. Implement zero-touch provisioning for deployment and configuration of the network infrastructure devices. 4. Offer support, testing and maintenance for network infrastructure components. 5. Establish a resilient infrastructure to withstand disruptions and provide continuous operations. 6. Implement robust security measures to safeguard the network infrastructure. 7. Scalability and flexibility for efficient management and control plane communication processes. 8. Provides a no-touch or low-touch environment for operations on Day 2
The global industrial IoT platform delivers multiple integrations to industrial OT assets and other asset-intensive enterprises’ industrial data sources to aggregate, curate and deliver contextualized insights that enable intelligent applications and dashboards through an edge-to-cloud architecture. The global industrial Internet of Things (IIoT) platform market exists because of the core capabilities of integrated middleware software that support a multivendor marketplace of intelligent applications to facilitate and automate asset management decision making. IIoT platforms also provide operational visibility and control for plants, infrastructure and equipment. Common use cases are augmentation of industrial automation, remote operations, sustainability and energy management, global scalability, IT/operational technology (OT) convergence, and product servitization of industrial products. The IIoT platform monitors IoT endpoints and event streams, supports and/or translates a variety of manufacturer and industry proprietary protocols, analyzes data in the platform, at the edge and in the cloud, integrates and engages IT and OT systems in data sharing and consumption, enables application development and deployment and can enrich and supplement OT functions for improved asset management life cycle strategies and processes. In some emerging use cases, the IIoT platform may obviate some OT functions.
Gartner defines network access control (NAC) as technologies that enable organizations to implement policies for controlling access to corporate infrastructure by both user-oriented devices and Internet of Things (IoT) devices. Policies may be based on authentication, endpoint configuration (posture) or users' role/identity. NAC can also implement postconnect policies based on integration with other security products. For example, NAC could enforce a policy to contain the endpoint based on an alert from a SIEM. An organization should evaluate the following capabilities: • Device visibility/profiling • Access control • Security posture check • Guest management • Bidirectional integration with other security products.