BaaS vendors deliver data protection as a service by hosting the backup software and the primary backup repository in privately operated or public cloud data centers. The backup infrastructure, including backup software and backup servers and storage, is managed by the BaaS vendor. Customers are still responsible for implementing backup policies and performing recovery tasks, but are not responsible for the day-to-day maintenance and operation of the backup system.
Gartner defines enterprise backup and recovery software solutions as technology that captures a point-in-time copy (backup) of enterprise data in on-premises, hybrid, multicloud and software as a service (SaaS) environments. These solutions write this data to one or more secondary storage targets for the primary purpose of recovering it in case of loss. Protecting and recovering business application data, irrespective of the underlying infrastructure type and its location, is more important than ever. As enterprises move toward more complex environments that include large and expansive amounts of business-critical data, enterprise backup and recovery software solutions protect these workloads, whether they reside in on-premises, hybrid, multicloud or software as a service (SaaS) environments. These solutions are vital to organizations’ ability to recover data following events that cause it to become inaccessible. Whether such an event is accidental, malicious or environmental, organizations use these solutions to recover and restore access to the affected data accurately and efficiently. Solutions must offer effective capabilities to simplify the management of data protection across complex enterprise environments. They must also ensure reliable recovery not just from accidental or operational errors but also from data loss arising from constantly changing threats, and expedite and orchestrate data recovery responses to traditional disaster and ransomware events.
Enterprise information archiving (EIA) solutions are designed for archiving data sources to a centralized platform to satisfy information governance requirements, including regulatory and/or corporate governance and privacy; improve data accessibility; surface new data insights; and gain operational efficiencies. There are several core capabilities of this market. They include archiving digital communication content, such as email, workstream collaboration, instant messaging (IM) and SMS; classifying data and enabling retention management of archive content; creating a searchable index of content; and providing basic tools for e-discovery and supervision.
Gartner defines file and object storage platforms as software and/or hardware platforms that offer object and distributed file system technologies for storing and managing unstructured data over NFS, SMB and Amazon S3 access protocols. File and object storage platforms store, secure, protect and scale an organization’s unstructured data with access over the network using protocols such as NFS, SMB and Amazon S3. Use cases include analytics, workload consolidation, backup and archiving, hybrid cloud, object-native applications, cloud IT operations, and high-performance files.
The network intrusion detection and prevention system (IDPS) appliance market is composed of stand-alone physical and virtual appliances that inspect defined network traffic either on-premises or in the cloud. They are often located in the network to inspect traffic that has passed through perimeter security devices, such as firewalls, secure Web gateways and secure email gateways. IDPS devices are deployed in-line and perform full-stream reassembly of network traffic. They provide detection via several methods — for example, signatures, protocol anomaly detection, behavioral monitoring or heuristics, advanced threat defense (ATD) integration, and threat intelligence (TI). When deployed in-line, IDPSs can also use various techniques to detect and block attacks that are identified with high confidence; this is one of the primary benefits of this technology. Next-generation IDPSs have evolved in response to advanced targeted threats that can evade first-generation IDPSs.