• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
elisity
5.0
9 Reviews (All time)
Review weighting


Browse Elisity Reviews

Elisity is present in 2 markets with 2 products. Elisity has 9 reviews with an overall average rating of 5.

Network Access Control (Transitioning to Security Service Edge)

Gartner defines network access control (NAC) as technologies that enable organizations to implement policies for controlling access to corporate infrastructure by both user-oriented devices and Internet of Things (IoT) devices. Policies may be based on authentication, endpoint configuration (posture) or users' role/identity. NAC can also implement postconnect policies based on integration with other security products. For example, NAC could enforce a policy to contain the endpoint based on an alert from a SIEM. An organization should evaluate the following capabilities: • Device visibility/profiling • Access control • Security posture check • Guest management • Bidirectional integration with other security products.

Elisity has 1 product in Network Access Control (Transitioning to Security Service Edge) market
  • Elisity Identity-based Microsegmentation
    5.0
    2 Reviews

Network Security Microsegmentation

Gartner defines network security microsegmentation — also referred to as zero-trust network segmentation — as an effort that can create more granular and dynamic access policies than traditional network segmentation (often north-south traffic segmentation). It allows the insertion of a security policy between any two workloads in the same broadcast domain — with microsegmentation technologies narrowing fine-grained network zones down to individual assets and applications. Microsegmentation tools support the implementation of finer-grained zoning across public, private and hybrid cloud infrastructures. Cybersecurity leaders must understand the key features, use cases, and role of microsegmentation in their environment, as well as determine which model is the best fit for their needs.

Elisity has 1 product in Network Security Microsegmentation market
  • Elisity Identity-based Microsegmentation
    5.0
    7 Reviews
Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.
  • Community Guidelines
  • Listing Guidelines
  • Browse Vendors
  • Rules of Engagement
  • FAQ
  • Privacy
  • Terms of Service
©
 
©