# Gartner Gartner is a go-to research organization which catalogs its reviews and analysis. Over the years, the community has widely adopted the use of a its Gartner Magic Quadrants to understand refer to products in the market. ## Cyber City Map x Gartner Categories and Magic Quadrants This section provides a map for how to find the Cybersecurity related Gartner Magic Quadrants that map to a Cyber City Map capability. | Gartner Category | Magic Quadrant | Capability Scope | | --------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------ | | [Access Management](https://www.gartner.com/reviews/market/access-management) | [Access Management Quadrant](https://www.gartner.com/en/documents/4936631?ref=null) | [[Identity and Access Management]] | | [API Protection](https://www.gartner.com/reviews/market/api-protection) | | [[Application Management]]<br>[[Allow Listing]]<br>[[Deny Listing]] | | [Application Security Testing](https://www.gartner.com/reviews/market/application-security-testing) | [Application Security Testing Quadrant](https://www.gartner.com/en/documents/4366399?ref=null) | [[Code Management]] | | [Cloud-Native Application Protection Platforms](https://www.gartner.com/reviews/market/cloud-native-application-protection-platforms) | | [[Allow Listing]]<br>[[Deny Listing]] | | [Cloud Security Posture Management](https://www.gartner.com/reviews/market/cloud-security-posture-management-tools) | | [[Attack Surface Enumeration]] | | [Data Security Platforms](https://www.gartner.com/reviews/market/data-security-platforms) | | [[Data Management]] | | Data Security Posture Management | | [[Identity and Access Management]]<br>[[Data Management]]<br>[[Attack Surface Enumeration]] | | [Email Security](https://www.gartner.com/reviews/market/email-security) | | [[Allow Listing]]<br>[[Deny Listing]] | | [Endpoint Protection Platforms](https://www.gartner.com/reviews/market/endpoint-protection-platforms) | [Endpoint Protection Quadrant](https://www.gartner.com/doc/5088031) | [[Device Management]]<br>[[Allow Listing]]<br>[[Deny Listing]]<br>[[Alert Correlation]]<br>[[Case Management]]<br>[[Incident Management]]<br>[[Asset Restoration]] | | [Enterprise Network Firewalls](https://www.gartner.com/reviews/market/network-firewalls) | [Enterprise Network Firewalls](https://www.gartner.com/doc/4022346) | [[Allow Listing]]<br>[[Deny Listing]] | | [Identity Governance and Administration](https://www.gartner.com/reviews/market/identity-governance-administration) | | [[Identity and Access Management]]<br>[[Compliance]]<br>[[Adversary Research]] | | [Intrusion Detection and Prevention Systems](https://www.gartner.com/reviews/market/intrusion-prevention-systems) | | [[Allow Listing]] <br>[[Deny Listing]]<br>[[Alert Correlation]] | | [IT Vendor Risk Management Solutions](https://www.gartner.com/reviews/market/it-vendor-risk-management-solutions) | | [[Allow Listing]] <br>[[Deny Listing]] | | Managed Security Services | | | | [Medical Device Security Solutions](https://www.gartner.com/reviews/market/medical-device-security-solutions) | | | | [Mobile Threat Defense](https://www.gartner.com/reviews/market/mobile-threat-defense) | | | | [Network Automation Platforms](https://www.gartner.com/reviews/market/network-automation-platforms) | | [[Policy Automation]] | | [Password Management Tools](https://www.gartner.com/reviews/market/password-management-tools) | | [[Identity and Access Management]] | | [Penetration Testing Tools](https://www.gartner.com/reviews/market/penetration-testing-tools) | | [[Attack Surface Enumeration]]<br>[[Resilience Testing]] | | [Privileged Access Management]() | | [[Allow Listing]]<br>[[Deny Listing]] | | [SD-WAN](https://www.gartner.com/reviews/market/sd-wan) | | [[Allow Listing]]<br>[[Deny Listing]] | | [Secure Access Service Edge](https://www.gartner.com/reviews/market/single-vendor-sase) | | [[Allow Listing]]<br>[[Deny Listing]] | | [Security Awareness and Computer Based Training](https://www.gartner.com/reviews/market/security-awareness-computer-based-training) | | [[Adversary Intelligence]] | | [Security Incident and Event Management](https://www.gartner.com/reviews/market/service-integration-and-management-services) | | [[Alert Correlation]] | | [Security Orchestration, Automation, and Response](https://www.gartner.com/reviews/market/security-orchestration-automation-and-response-solutions) | | [[Policy Automation]]<br>[[Asset Restoration]] | | [Security Service Edge](https://www.gartner.com/reviews/market/security-service-edge) | [Security Service Edge Quadrant](https://www.gartner.com/en/documents/5352963?ref=null) | [[Allow Listing]]<br>[[Deny Listing]] | | [Security Threat Intelligence Products and Services](https://www.gartner.com/reviews/market/security-threat-intelligence-services) | | [[Adversary Research]]<br>[[Alert Correlation]] | ## Inspiration & Resources + ## [Cyber City Map](https://cybercitymap.com/) © 2023-2024 by [ThirdScore, Inc.](https://thirdscore.com/) All Rights Reserved.