Data center infrastructure management (DCIM) tools monitor, measure, manage and/or control data center resources and energy consumption of both IT-related equipment (such as servers, storage and network switches) and facilities infrastructure components (such as power distribution units and computer room air conditioners). They are data-center-specific (they are designed for data center use), rather than general building management system tools, and are used to optimize data center power, cooling and physical space. Solutions do not have to be sensor-based, but they do have to be designed to accommodate real-time power and temperature/environmental monitoring. They must also support resource management, which Gartner defines as going beyond typical IT asset management to include the location and interrelationships between assets.
Gartner defines the enterprise wired and wireless LAN infrastructure market as wired and wireless networking hardware and the related network software. Related components of the solution include enterprise switches, access points and the requisite tools to secure, manage, test and optimize the network infrastructure that provides connectivity for users, devices and applications that may reside on the network or on other networks. Enterprises in all vertical markets use enterprise wired and wireless networks to connect and transport data for fixed and end-user devices to applications that may be local or remote to the physical end user. In addition to physical connectivity, these solutions provide the following capabilities in diverse markets, including the ability to: 1. Discover, identify, secure, manage and segment Internet of Things (IoT)/operational technology (OT) devices 2. Support, test and maintain network infrastructure components 3. Provide a resilience infrastructure 4. Secure the network infrastructure 5. Provide scalability and flexibility for management and control plane communication processes 6. Provide no-touch/low-touch Day 2 environment
Gartner defines network access control (NAC) as technologies that enable organizations to implement policies for controlling access to corporate infrastructure by both user-oriented devices and Internet of Things (IoT) devices. Policies may be based on authentication, endpoint configuration (posture) or users' role/identity. NAC can also implement postconnect policies based on integration with other security products. For example, NAC could enforce a policy to contain the endpoint based on an alert from a SIEM. An organization should evaluate the following capabilities: • Device visibility/profiling • Access control • Security posture check • Guest management • Bidirectional integration with other security products.