Gartner defines cyber-physical systems (CPS) protection platforms as products that discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT. They do so by analyzing or interacting with industrial/industry-specific protocols and operational network traffic. They understand physical process asset behavior and do not interfere with CPS operations. They can be delivered from the cloud, on-premises or in a hybrid form. Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance.
Managed File Transfer (MFT) software is a secure, centralized, and automated solution designed to manage, control, and monitor the movement of data and files across internal systems, business applications, partners, and customers. It ensures end‑to‑end protection through encryption, authentication, and compliance features, while offering automation, scheduling, and real‑time visibility to enhance reliability and reduce manual effort. By standardizing file exchange processes, MFT software minimizes security risks, supports regulatory requirements, and enables seamless, scalable data transfer across the organization. The typical customers include enterprises in sectors such as banking, healthcare, retail, manufacturing, government, and logistics that handle large volumes of sensitive data and require strict security and compliance controls.
Gartner defines network access control (NAC) as technologies that enable organizations to implement policies for controlling access to corporate infrastructure by both user-oriented devices and Internet of Things (IoT) devices. Policies may be based on authentication, endpoint configuration (posture) or users' role/identity. NAC can also implement postconnect policies based on integration with other security products. For example, NAC could enforce a policy to contain the endpoint based on an alert from a SIEM. An organization should evaluate the following capabilities: • Device visibility/profiling • Access control • Security posture check • Guest management • Bidirectional integration with other security products.