# Gartner
Gartner is a go-to research organization which catalogs its reviews and analysis. Over the years, the community has widely adopted the use of a its Gartner Magic Quadrants to understand refer to products in the market.
## Cyber City Map x Gartner Categories and Magic Quadrants
This section provides a map for how to find the Cybersecurity related Gartner Magic Quadrants that map to a Cyber City Map capability.
| Gartner Category | Magic Quadrant | Capability Scope |
| --------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| [Access Management](https://www.gartner.com/reviews/market/access-management) | [Access Management Quadrant](https://www.gartner.com/en/documents/4936631?ref=null) | [[Identity and Access Management]] |
| [API Protection](https://www.gartner.com/reviews/market/api-protection) | | [[Application Management]]<br>[[Allow Listing]]<br>[[Deny Listing]] |
| [Application Security Testing](https://www.gartner.com/reviews/market/application-security-testing) | [Application Security Testing Quadrant](https://www.gartner.com/en/documents/4366399?ref=null) | [[Code Management]] |
| [Cloud-Native Application Protection Platforms](https://www.gartner.com/reviews/market/cloud-native-application-protection-platforms) | | [[Allow Listing]]<br>[[Deny Listing]] |
| [Cloud Security Posture Management](https://www.gartner.com/reviews/market/cloud-security-posture-management-tools) | | [[Attack Surface Enumeration]] |
| [Data Security Platforms](https://www.gartner.com/reviews/market/data-security-platforms) | | [[Data Management]] |
| Data Security Posture Management | | [[Identity and Access Management]]<br>[[Data Management]]<br>[[Attack Surface Enumeration]] |
| [Email Security](https://www.gartner.com/reviews/market/email-security) | | [[Allow Listing]]<br>[[Deny Listing]] |
| [Endpoint Protection Platforms](https://www.gartner.com/reviews/market/endpoint-protection-platforms) | [Endpoint Protection Quadrant](https://www.gartner.com/doc/5088031) | [[Device Management]]<br>[[Allow Listing]]<br>[[Deny Listing]]<br>[[Alert Correlation]]<br>[[Case Management]]<br>[[Incident Management]]<br>[[Asset Restoration]] |
| [Enterprise Network Firewalls](https://www.gartner.com/reviews/market/network-firewalls) | [Enterprise Network Firewalls](https://www.gartner.com/doc/4022346) | [[Allow Listing]]<br>[[Deny Listing]] |
| [Identity Governance and Administration](https://www.gartner.com/reviews/market/identity-governance-administration) | | [[Identity and Access Management]]<br>[[Compliance]]<br>[[Adversary Research]] |
| [Intrusion Detection and Prevention Systems](https://www.gartner.com/reviews/market/intrusion-prevention-systems) | | [[Allow Listing]] <br>[[Deny Listing]]<br>[[Alert Correlation]] |
| [IT Vendor Risk Management Solutions](https://www.gartner.com/reviews/market/it-vendor-risk-management-solutions) | | [[Allow Listing]] <br>[[Deny Listing]] |
| Managed Security Services | | |
| [Medical Device Security Solutions](https://www.gartner.com/reviews/market/medical-device-security-solutions) | | |
| [Mobile Threat Defense](https://www.gartner.com/reviews/market/mobile-threat-defense) | | |
| [Network Automation Platforms](https://www.gartner.com/reviews/market/network-automation-platforms) | | [[Policy Automation]] |
| [Password Management Tools](https://www.gartner.com/reviews/market/password-management-tools) | | [[Identity and Access Management]] |
| [Penetration Testing Tools](https://www.gartner.com/reviews/market/penetration-testing-tools) | | [[Attack Surface Enumeration]]<br>[[Resilience Testing]] |
| [Privileged Access Management]() | | [[Allow Listing]]<br>[[Deny Listing]] |
| [SD-WAN](https://www.gartner.com/reviews/market/sd-wan) | | [[Allow Listing]]<br>[[Deny Listing]] |
| [Secure Access Service Edge](https://www.gartner.com/reviews/market/single-vendor-sase) | | [[Allow Listing]]<br>[[Deny Listing]] |
| [Security Awareness and Computer Based Training](https://www.gartner.com/reviews/market/security-awareness-computer-based-training) | | [[Adversary Intelligence]] |
| [Security Incident and Event Management](https://www.gartner.com/reviews/market/service-integration-and-management-services) | | [[Alert Correlation]] |
| [Security Orchestration, Automation, and Response](https://www.gartner.com/reviews/market/security-orchestration-automation-and-response-solutions) | | [[Policy Automation]]<br>[[Asset Restoration]] |
| [Security Service Edge](https://www.gartner.com/reviews/market/security-service-edge) | [Security Service Edge Quadrant](https://www.gartner.com/en/documents/5352963?ref=null) | [[Allow Listing]]<br>[[Deny Listing]] |
| [Security Threat Intelligence Products and Services](https://www.gartner.com/reviews/market/security-threat-intelligence-services) | | [[Adversary Research]]<br>[[Alert Correlation]] |
## Inspiration & Resources
+
##
[Cyber City Map](https://cybercitymap.com/) © 2023-2024 by [ThirdScore, Inc.](https://thirdscore.com/) All Rights Reserved.