What Can Desktop Virtualization Do for Your Organization?

Size: px
Start display at page:

Download "What Can Desktop Virtualization Do for Your Organization?"

Transcription

1 G What Can Desktop Virtualization Do for Your Organization? Published: 27 January 2012 Analyst(s): Nathan Hill, Mark A. Margevicius, Philip Dawson A number of desktop virtualization adoption expectations were reviewed and prioritized by attendees at a recent summit workshop. Gartner reviews the ability of these technologies to meet attendee expectations and ranks them for assessment priority. Key Findings Feedback highlighted that there continues to be common misconceptions concerning desktop virtualization technology fit. There is renewed interest in server-based computing (SBC) and application virtualization, as well as in the typically dominant topic of hosted virtual desktop (HVD), which represents a more balanced viewpoint across the desktop virtualization technology space. Consumerization especially the demand for the use of tablets in the enterprise helps maintain a high level of interest in desktop virtualization. The main challenges in adopting HVD continue to be cost and risks associated with transforming the desktop environment. Recommendations Build a program to assess which desktop virtualization technologies can aid the business, both tactically and strategically, especially when the use case and end-user needs are wellunderstood. Ensure your primary drivers for adoption are valid make sure you will get the benefits you expect. Plan how to manage and support implementation, especially organizational ownership and how the technology can integrate with existing operations and monitoring processes. Review and assess your application portfolio to understand (1) whether there are licensing or maintenance restrictions in adopting a new model and (2) if there are potential compatibility or functional issues.

2 Table of Contents Analysis...2 Adoption Expectations Consumerization/Bring Your Own Device (BYOD) Provide More Flexible Application Delivery to End Users Operations Optimization and Centralized Management Segregate User-Owned Data With Type 1 Hypervisors Enabling OS Upgrade Branch Consolidation Trading and Engineering Use Cases Server-Based Computing Upgrade Contractor/Consultant Onboarding Secure the Corporate Boundary Use of Thin Clients to Reduce Power Consumption...10 Analysis A number of potential drivers for desktop virtualization adoption were discussed during a workshop at Gartner's November 2011 Data Center and IT Operations Summit in London (see Note 1). Specific emphasis was placed on determining whether there were valid business drivers to adopt these technologies, and several important considerations were explored, including technology issues and limitations, and how to integrate these technologies with existing infrastructure. The workshop highlighted a number of consistent technology justifications, along with the most prevalent issues related to adoption. Many enterprises in Europe, the Middle East and Africa (EMEA) are taking the opportunity to review how desktop virtualization technologies, such as HVD, can help with their key initiatives, as well as exploring some of the newer capabilities such as work space virtualization. The attendees at the "Virtualizing Your PCs and Client Devices Workshop" were able to share some of their experiences. The insights expressed by this group of business and IT leaders were generally consistent with those experienced by their peers in other regions. Adoption Expectations The workshop highlighted several areas where attendees had expectations of what desktop virtualization adoption would provide them. The topics covered in the workshop are reviewed in the following sections and ordered according to the relative importance placed on them by the participants, from highest to lowest. For each topic, we provide Gartner input on whether these are valid drivers and indicate their relative importance. This input directly reflects the feedback and advice offered during the workshop. Page 2 of 12 Gartner, Inc. G

3 The Gartner viewpoint rankings of high, medium and low priority reflect the relative importance of the technology in addressing the topic issue or use case, as well as the maturity of the solution. 1. Consumerization/Bring Your Own Device (BYOD) Most participants were interested in how desktop virtualization could enable BYOD programs and give more flexibility to their end users. The idea of empowering end users via use of their own devices to deliver the highest levels of productivity in the workplace is certainly attractive and one of the hottest topics right now, but in many cases is at odds with defining and securing the corporate boundary. Gartner Viewpoint High Priority Desktop virtualization technologies, including SBC, HVD, application virtualization and client hypervisors, all show promise in providing a way to abstract the access device from corporate content. The most interesting technology places the lowest set of requirements on the end device and maximizes flexibility of access. The smallest footprint is delivered via the use of a remote display protocol to present content that is being executed in a secure and controlled environment. In theory, any device that supports installation of the access software and supports secure authentication techniques is a candidate to enable this solution. It is important to note that non-pc access devices, such as Apple ipad and Google Android-based touch tablets, may not be a good fit to the content that is being accessed. In many cases, the demand for this model is driven by a desire to bring consumer tablets into the workplace, as well as to extend the functionality of smartphones. The form factor of these devices and the user interface may create difficulty in use and inefficiency that offsets benefits (for example, when using an ipad touch interface to manipulate Windows applications running on an HVD that is not touch-tabletaware). This is particularly noticeable when a native resolution is far higher than that of the end-user device display capability. For this reason, Gartner believes that, in many cases, the significant investment in HVDs is not justified for providing tablet access alone. It needs to be part of a wider policy of enabling user device usage and access. Arguably more important than the technical considerations are the policy and process questions that BYOD raises. These are explored in detail in "Gartner's View on 'Bring Your Own' in Client Computing." 2. Provide More Flexible Application Delivery to End Users Second on the list of topics by priority was centralizing application execution using SBC, HVD and application virtualization technologies. These technologies present a number of opportunities to decouple the user's work space from the user's access device, introducing benefits such as more efficient software updates, higher system availability and avoidance of application execution conflicts. The participants saw these capabilities as closely linked to enabling BYOD programs, as well as improvement opportunities in operations and support. Gartner, Inc. G Page 3 of 12

4 Gartner Viewpoint Medium Priority One of the key benefits of desktop virtualization is the flexibility it provides in delivering a work space and the necessary applications. Unfortunately, many independent software vendor (ISV) licensing agreements do not formally acknowledge install or access mechanisms that use nonnative Windows installs. This may lead to limited or zero maintenance support, or a potential breach of the license agreement, with associated cost penalties. Even when vendors do support a given install or access scenario, the complexity of troubleshooting issues may still result in increased incident and problem management costs. Organizations should review and assess their application portfolios to understand whether there are licensing or maintenance restrictions in adopting a new model, as well as more fundamental technical compatibility or functional issues. 3. Operations Optimization and Centralized Management With operations efficiency, the topic swung from enabling the business through evolution of enduser services to meeting business metrics in cost-efficiency of IT service provision. One of the greatest potential benefits from desktop virtualization relates to total cost of ownership (TCO) reduction through more effective and efficient operations and management. It was interesting to note that, although many participants were tasked with cost reduction targets, this was not seen as the highest priority of the discussion. It also highlighted that many participants clearly understood than many desktop virtualization techniques, especially HVDs, were unlikely to reduce costs in the short term, primarily due to the capital expenditure requirement and the complexity of change. Gartner Viewpoint High Priority This is an important driver for the adoption of desktop virtualization technologies. In order to capitalize on these efficiencies, labor optimization needs to be credited to other project-related activities or realized directly through staff reduction. It is also important to understand that the introduction of new tooling will increase complexity in the short term and disrupt operational organization structure and process. Optimizing operations specific to HVD are considered in "Hosted Virtual Desktop Organizational Models." In order to minimize the disruptive negative impacts, it is important to ensure that the consideration for deployment is covered in the planning cycle to address technical staff training and operational changes. Three areas that were called out included: Single-instance OS management for security and patch updates with nonpersistent HVD models Minimized regression and compatibility testing when migrating to a virtual application delivery strategy Page 4 of 12 Gartner, Inc. G

5 Assess dedicated fabric platforms for hosting HVD content, including the Cisco Unified Computing System (USC) and HP Converged Infrastructure (CI) architectures 4. Segregate User-Owned Data With Type 1 Hypervisors Following the theme of BYOD leveraging HVD, this topic covered the use of client hypervisors to securely separate user data from corporate data on the same asset. Workshop participants were especially interested in the capability to wipe corporate information without impacting a user image or associated data. This led to a wider discussion on production readiness of the Type 1, bare metal hypervisor models of work space virtualization with vendors such as Citrix, MokaFive and Virtual Computer. Gartner Viewpoint Low Priority Gartner believes this area requires more development, a maturing of life cycle toolsets and increased availability of optimized endpoint platforms before it is ready for mainstream production adoption. It is an interesting model that has the potential to minimize asset requirements, but, at the same time, it is in conflict with the increase of devices per user in the consumerization trend. The main difference here is that both personal and corporate work space is designed primarily for content creation using a notepad form factor using specific compliant device models. As such, it really does not function as BYOD. This approach is extremely attractive in areas where multiple levels of network security are implemented, especially in defense. Several issues exist with client hypervisor models, most notably the ability to deploy, synchronize and scale, along with the limited number of device models that provide a compatible hardware platform. Rather than reducing endpoint capital expenditure, this model is likely to increase spending in order to gain the flexibility of consolidating work spaces on a single device. Considering the investment in this area and its rapidly maturing capabilities, it is likely that we will award it with a higher priority in the near future. 5. Enabling OS Upgrade With all of the attendees looking to complete their migration to Windows 7 prior to Windows XP support end-of-life in April 2014, it was expected that a reference would be made to how desktop virtualization technologies relate to OS migration and upgrade. It was also clear that participants believed that these technologies would significantly aid migration, as a number of vendor marketing campaigns tie desktop virtualization business benefits to Windows 7 migration. Gartner Viewpoint Medium Priority Upgrading to ensure vendor maintenance for an OS and the overlying applications presents an opportunity to implement desktop virtualization as part of an overarching program of change. Despite a number of vendor claims that HVD as well as other forms of desktop virtualization can help OS migration, it is more a complementary approach than enablement. HVD could be used to ring-fence applications that don't remediate on the legacy platform while rapidly deploying the new Gartner, Inc. G Page 5 of 12

6 OS. However, this is a high-cost approach if the HVD is not intended as a strategic OS replacement for specific users. SBC provides a solution for ring-fencing a small number of problematic applications, but even this is an inferior, although potentially far quicker approach to sourcing and packaging new platformcertified applications from each software vendor. These technologies can directly provide benefit via work space virtualization and persistent personalization. Here, technology solutions that provide advanced profile migration along with application virtualization and layering capabilities can directly support OS migration for example, by handling the conversion of the Windows profile structure from XP to 7, rather than provide a completely different architecture for consuming the Windows 7 platform. Once a user is migrated to an HVD delivery model, it should be significantly easier and quicker to provision a new OS for that user. Thus, technologies such as HVD show the potential to drastically reduce the time frames involved in migration and evolve the process from a significant project undertaking to a service desk request. The complexity of managing personalization, user data and applications means that a significant effort will be required for the foreseeable future. Taking into account the immediacy of maintenance end-of-life, the priority is to ensure a successful migration to Windows 7. If the addition of desktop virtualization deployment to the scope places that goal at risk, it makes sense to separate these projects and run them as separate entities. OS migration is not a driver for desktop virtualization adoption per se, but certainly an opportunity to review the appropriate opportunities for implementation of these technologies to create business advantage. The relationship between Windows 7 OS migration and HVDs is reviewed in "Q&A: The Relationship Between Windows 7 and Hosted Virtual Desktop Technology." 6. Branch Consolidation Among the technologies discussed, participants saw that HVD was particularly attractive as a means to consolidate resources to provide end-user services centrally, thus simplifying the maintenance of an environment and reducing reliance on field service support staff servicing branch offices where IT resources are scarce compared with headquarters or large campus locations. One participant specifically called this out as a "Phase 2" of his centralization and consolidation strategy; with progress being mature on the server side, it was now time to start with desktops. Gartner Viewpoint Medium Priority HVD can help remove end-user-related infrastructure from branch offices in a geographically distributed organization. It is especially attractive if undertaken in conjunction with a data center centralization and consolidation plan, often driven via server virtualization technologies. This may be a good design ideal, but in many cases it cannot be fully realized. End users will be totally dependent on the network connection to the data center to gain access to any of their systems. This places increased pressure on network resilience and necessitates robust contingency Page 6 of 12 Gartner, Inc. G

7 measures. It also generates significantly more data load when transferring discrete files to the user's endpoint, or spooling print jobs on top of keyboard, video and mouse redirection traffic. More importantly, it moves the majority, if not all of the user-created data, to the data center, where the cost of storage and backup is orders of magnitude greater. In many cases, it will be more costeffective to retain branch print servers or local network-attached storage appliance devices, despite the maintenance impact at the branch. One way to balance centralization with local site availability requirements is to review remote branches in a planning phase and designate a threshold based on end-user population and/or network demands. Below the given user threshold, all infrastructure is centralized; above the threshold, local infrastructure is justified on the basis of performance and availability. In many cases, this equation will be determined by the quality and capacity of the network infrastructure, and in most cases will be a compromise. This process enables the consolidation of multiple sites sharing infrastructure in a simple single hub-and-spoke network model or a slightly more complex model, which consolidates infrastructure at larger branch offices that serve satellite offices that are below the end-user threshold. One benefit of infrastructure consolidation is that an organization has better granular control over facilities change management. This is an important consideration when balancing the increased costs related to centrally hosted content against the increased security than can be realized. 7. Trading and Engineering Use Cases Although trading and engineering use of HVD was covered as a single topic area, the two practices generated separate debates about their relative merits. Attendees from the financial services industry were familiar with challenges of minimizing disruption and maximizing availability to members of their workforce that generate a significant proportion of their revenue. An HVD solution combined with the light form factor of a thin client; reduction in noise, heat and power in the workplace; as well as minimized interruption from technical field services appeared to be one of the few scenarios where solution cost was far outweighed by the value of enabling the business and avoiding expensive downtime. With engineering, the centralization of large datasets, the allocation of high-performance systems to low-density hosts and the potential to increase design collaboration across engineers seemed compelling on the surface, but concerns were raised about how responsive these detailed technical environments would be under all but optimum network conditions. Gartner Viewpoint High Priority for Trading, Low Priority for Engineering The trading scenario is very compelling and often cited as a primary use case in the financial services industry. This is an example where high comparative direct cost of deployment is more than offset by a solution where there are extremely high-value users, and no downtime or performance degradation is acceptable. Unlike many scenarios, it is likely to result in a significantly lower TCO through revenue loss avoidance, as well as management optimization. Gartner, Inc. G Page 7 of 12

8 Both the trading and the engineering use case can function well on a high-capacity, well-managed local-area network. When used remotely over varying quality wide-area networks that are more relevant to the engineering use case, the user experience in dealing with detailed, graphically intense rendering is likely to be significantly impaired. That is why, in most cases, companies are still using high-performance workstations for execution of engineering and computer-aided design/ computer-aided manufacturing (CAD/CAM) packages. Despite multimedia enhancements in remote display protocols and associated codices, including Microsoft RemoteFX, Citrix HDX and VMware View with PCoIP, Gartner feedback from clients is that the user experience is often far from satisfactory. 8. Server-Based Computing Upgrade Perhaps the simplest topic reviewed was the need to maintain existing desktop virtualization technologies for vendor support and maintain application and platform compatibility. For legacy SBC solutions, such as Citrix Presentation Server 4.5, the questions were not only should the participants upgrade to the latest product version, but whether they should migrate to an HVD as the natural replacement. Gartner Viewpoint Low Priority HVD is often quoted as an upgrade to SBC. However, the technologies are complementary and not mutually exclusive. HVD gives better granular control of an individual user-dedicated OS and avoids many of the application compatibility issues experienced on an SBC platform, such as Citrix XenApp or Microsoft Remote Desktop Services. It also can accommodate application personalization, while SBC limits you to a fixed set of apps. However, HVD has its own constraints in the form of Microsoft licensing restrictions, requiring per device Virtual Desktop Access (VDA) licenses or Software Assurance (SA) for full Windows OS access devices. It also requires a much higher capital cost entry point due to the high-performance storage and lower densities achieved on server hosting platforms. In addition, the use case of delivering a full desktop environment versus strategic delivery of specific applications differentiates the use case of the technologies, despite many service providers looking to SBC shared desktops as a potential HVD replacement. If an organization is looking to expand and evolve its SBC environment to address use cases more suited to HVD, then this is a valid upgrade path. However, in most cases, it will make more sense to upgrade to the latest vendor-supported version of the product and look to embrace HVD for a set of separate or complementary use cases. "Using Gartner's Segmentation Model for Mobile and Client Computing" provides guidance on the type of scenarios that fit the different technologies. 9. Contractor/Consultant Onboarding Contractor and third-party access provisioning was the third use case mentioned after the BYOD and trader/engineering use cases. This use case was raised by a single participant, but all members of the workshop agreed that this appeared to be a very compelling reason for adoption, and understandably a commonly cited vendor example of technology value. Provisioning a full corporate PC for a temporary employee is not only expensive but often carries a long lead time that overlaps Page 8 of 12 Gartner, Inc. G

9 into the paid engagement. It is also harder to recover a physical PC than a virtual desktop hosted in the data center. Delivering an HVD and allowing third parties to use their own devices are regarded as a far more efficient approach to meet access requirements, and can reduce lead time between commission and productive work, which in many cases means reduced cost or more effective and efficient use of contracted resources. Gartner Viewpoint Medium Priority This is a prevalent and high-profile use case example for adoption of HVD; however, it should be noted that appropriate access controls are still required for the necessary corporate resources. Application and data provisioning to the HVDs will be required, just as in the traditional PC scenario. The real benefit is having a provisioning lead time of minutes rather than days, provided the infrastructure is in place to accelerate the process compared with provisioning traditional PCs. Industries that see a high degree of seasonal variation in employee volumes, significant number of contracting engagements or the need to grant secure systems access to third parties warrant an agile provisioning solution. These organizations should view this as a high priority, rather than the medium rating that will apply to most companies. 10. Secure the Corporate Boundary There are significant concerns around security, especially data security in conjunction with traditional distributed PC access, and that has been evidenced through a number of high-profile data loss incidents in the public and commercial sectors. Security is often cited as the No. 1 native benefit for the centralized options within the desktop virtualization family. Secure Sockets Layer (SSL) encryption and secure multifactor authentication (MFA) are common features of remote connection protocols, securing remote access while the execution environment is secured within the data center environment. It may appear surprising to see this topic rated so low. Attendees found it very difficult to develop a compelling TCO or return on investment for adoption specifically, the adoption of desktop virtualization technologies to help solve these issues. Although this perspective may vary among different attendees and likely among various verticals (for example, we would expect significant interest in defense, finance and healthcare), it is an important reminder that security is a high-priority attribute of any solution, but not necessarily the primary driver. Risk mitigation and avoidance technologies, such as those connected with business-continuity-based solutions, suffer from the same type of business case challenges. Experience of direct, tangible business impact such as increased volume of interest in HVD as a continuity solution following the March 2011 earthquake and tsunami in Japan can overcome this barrier. Gartner Viewpoint High Priority This is an extremely valid driver for adoption of desktop virtualization technology, as evidenced in "Case Study: Security and Flexibility Are Key Levers of Hosted Virtual Desktops." This can only be successful as part of a holistic approach to increased security and compliance management. Gartner, Inc. G Page 9 of 12

10 Centralizing data, applications and execution environment provides the potential for improved management and control. However, if, for example, client drive mapping to an access device is not controlled, or if virtual desktop browsers are given unrestricted access to the Internet, this native security benefit is lost. 11. Use of Thin Clients to Reduce Power Consumption Almost serving as a wild-card discussion topic, thin clients' low power consumption and resulting carbon footprint were put forward as potential compelling reasons for adoption. The relatively low power consumption in thin devices especially in the newer vendor offerings of zero client is often positioned as key feature and benefit for adoption. Gartner Viewpoint Low Priority Power reduction via the use of thin devices to access a centralized desktop virtualization solution is unlikely to function as a primary driver. It will become increasingly important as utility prices increase and compliance penalties are introduced through local government initiatives. Power utilization certainly should be part of assessment criteria, but focusing only on thin devices limits the scope of assessment, ignoring the data center build-out and undermining the arguably more compelling opportunity to reduce endpoint management and maintenance costs. The following points should be noted: Thin clients have varying power consumption ratings. Several vendors have significant numbers of models with varying power requirements and power states. The latest PCs have optimized power management as part of the operating system for most major components, including power stepping built into the central processing unit (CPU). The power reduction at the edge will be partially if not fully offset by the new growth within the data center. This build-out constitutes the servers, storage and network infrastructure required to host centralized desktops and/or applications. There are very few use cases where a dedicated thin device can replace a rich desktop as a stand-alone unit, except when used in "kiosk" mode. The migration of power requirements to the data center increases the centralized power requirement and associated cost increase to the business. This is especially true if end users are using their own assets or working from a location where they own utility costs. The reduction of power at the edge and, in turn, the reduction of local heat output will affect the local office/user environment ambient temperature, which in turn will impact the heating/air conditioning costs positively and negatively, according to geography and season. Although this effect may be minor, it should not be ignored. Note 1 "Virtualizing Your PCs and Client Devices" Workshop At Gartner's EMEA Data Center and IT Operations Summit, held in London from 28 to 29 November 2011, a desktop virtualization workshop, "Virtualizing Your PCs and Client Devices," reviewed the Page 10 of 12 Gartner, Inc. G

11 drivers and opportunities for deploying these technologies to address a number of business challenges. Questions, observations and experiences were shared by 20 delegates representing private and public enterprises. The participants represented a variety of industries and both IT and businessside roles. Gartner, Inc. G Page 11 of 12

12 Regional Headquarters Corporate Headquarters 56 Top Gallant Road Stamford, CT USA European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Japan Headquarters Gartner Japan Ltd. Atago Green Hills MORI Tower 5F Atago, Minato-ku Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity on its website, ombudsman/omb_guide2.jsp. Page 12 of 12 Gartner, Inc. G

Gartner's View on 'Bring Your Own' in Client Computing

Gartner's View on 'Bring Your Own' in Client Computing G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting

More information

Agenda for Supply Chain Strategy and Enablers, 2012

Agenda for Supply Chain Strategy and Enablers, 2012 G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling

More information

Repurposing Old PCs as Thin Clients as a Way to Save Money

Repurposing Old PCs as Thin Clients as a Way to Save Money Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers

More information

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures

More information

NAC Strategies for Supporting BYOD Environments

NAC Strategies for Supporting BYOD Environments G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

How to Choose Providers for Mobile Consumer Application Platforms

How to Choose Providers for Mobile Consumer Application Platforms How to Choose Providers for Mobile Consumer Application Platforms Michael McGuire Lead Author Michael McGuire,, Mike McGuire guides digital marketers on best practices for developing strategies. He specializes

More information

Emerging PC Life Cycle Configuration Management Vendors

Emerging PC Life Cycle Configuration Management Vendors Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market

More information

The Six Triggers for Using Data Center Infrastructure Management Tools

The Six Triggers for Using Data Center Infrastructure Management Tools G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using

More information

Recognize the Importance of Digital Marketing

Recognize the Importance of Digital Marketing Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

Gartner Clarifies the Definition of the Term 'Enterprise Architecture'

Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

X.509 Certificate Management: Avoiding Downtime and Brand Damage

X.509 Certificate Management: Avoiding Downtime and Brand Damage G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

Choosing a Replacement for Incumbent One-Time Password Tokens

Choosing a Replacement for Incumbent One-Time Password Tokens Research Publication Date: 21 April 2011 ID Number: G00212244 Choosing a Replacement for Incumbent One-Time Password Tokens Ant Allan This research outlines the options for enterprises seeking replacements

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

IT Architecture Is Not Enterprise Architecture

IT Architecture Is Not Enterprise Architecture Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use

More information

Cloud IaaS: Service-Level Agreements

Cloud IaaS: Service-Level Agreements G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

How To Create A Cloud Computing System

How To Create A Cloud Computing System G00230221 Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

How To Calculate Hd Costs

How To Calculate Hd Costs Total Cost of Ownership Comparison of PCs With Hosted Virtual Desktops, 2011 Update Gartner RAS Core Research Note G00209403, Federica Troni, Mark A. Margevicius, Michael A. Silver, 14 December 2010, RA12

More information

Discovering the Value of Unified Communications

Discovering the Value of Unified Communications Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions

More information

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve Research Publication Date: 6 December 2007 ID Number: G00152575 Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve John Enck, Philip Dawson, George J. Weiss, Rakesh Kumar,

More information

Research. Mastering Master Data Management

Research. Mastering Master Data Management Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Solution Path: Threats and Vulnerabilities

Solution Path: Threats and Vulnerabilities Solution Path: Threats and Vulnerabilities Published: 24 January 2012 Burton IT1 Research G00226331 Analyst(s): Dan Blum This solution path helps Gartner clients develop a strategy and program for managing

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

IT Cost Savings With Information Governance

IT Cost Savings With Information Governance G00232238 IT Cost Savings With Information Governance Published: 17 April 2012 Analyst(s): Debra Logan By systematically eliminating redundant information, Cisco has retired multiple legacy systems, eliminated

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New

More information

The Seven Building Blocks of MDM: A Framework for Success

The Seven Building Blocks of MDM: A Framework for Success Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

E-Mail Is a Commodity and Other Fairy Tales

E-Mail Is a Commodity and Other Fairy Tales G00210585 E-Mail Is a Commodity and Other Fairy Tales Published: 9 February 2011 Analyst(s): Matthew W. Cain A deep understanding of the operational, architectural, policy and feature requirements of an

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

Energy savings from well-managed data centers can reduce operating expenses by as much as 20%.

Energy savings from well-managed data centers can reduce operating expenses by as much as 20%. Research Publication Date: 29 March 2010 ID Number: G00174769 DCIM: Going Beyond IT David J. Cappuccio Infrastructure and operations (I&O) leaders must now go beyond performance management of IT equipment

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage

Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Research Publication Date: 10 August 2011 ID Number: G00213049 Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Jay E. Pultz The National Renewable Energy Laboratory's (NREL's) data center

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

What to Consider When Designing Next-Generation Data Centers

What to Consider When Designing Next-Generation Data Centers Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,

More information

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with

More information

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented

More information

Containers and Modules: Is This the Future of the Data Center?

Containers and Modules: Is This the Future of the Data Center? Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

Key Issues for Consumer Goods Manufacturers, 2011

Key Issues for Consumer Goods Manufacturers, 2011 Industry Research Publication Date: 1 March 2011 ID Number: G00210698 Key Issues for Consumer Goods Manufacturers, 2011 Don Scheibenreif, Dale Hagemeyer Gartner's 2011 consumer goods manufacturing research

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

Understanding Vulnerability Management Life Cycle Functions

Understanding Vulnerability Management Life Cycle Functions Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability

More information

Singapore Empowers Land Transport Planners With Data Warehouse

Singapore Empowers Land Transport Planners With Data Warehouse G00219502 Singapore Empowers Land Transport Planners With Data Warehouse Published: 18 October 2011 Analyst(s): Eric Thoo The Land Transport Authority (LTA) of Singapore wanted to improve planning and

More information

Strategic Road Map for Network Access Control

Strategic Road Map for Network Access Control G00219087 Strategic Road Map for Network Access Control Published: 11 October 2011 Analyst(s): Lawrence Orans, John Pescatore Long derided as an overhyped concept, network access control (NAC) has emerged

More information

Real-Time Decisions Need Corporate Performance Management

Real-Time Decisions Need Corporate Performance Management Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends

More information

The Four New Ps of Marketing That CMOs and CIOs Should Consider

The Four New Ps of Marketing That CMOs and CIOs Should Consider G00227185 The Four New Ps of Marketing That CMOs and CIOs Should Consider Published: 18 May 2012 Analyst(s): Kimberly Collins Four new Ps of marketing align people and processes across the marketing ecosystem,

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

Data Center Consolidation Projects: Benefits and Pitfalls

Data Center Consolidation Projects: Benefits and Pitfalls Research Publication Date: 2 May 2011 ID Number: G00212148 Data Center Consolidation Projects: Benefits and Pitfalls David J. Cappuccio This research outlines the primary success factors in consolidation

More information

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

Additional Tools for a World-Class ERP Infrastructure

Additional Tools for a World-Class ERP Infrastructure G00219770 Additional Tools for a World-Class ERP Infrastructure Published: 28 October 2011 Analyst(s): Pat Phelan, Derek Prior This research provides a guide to the infrastructure elements that are needed

More information

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references

More information

NGFWs will be most effective when working in conjunction with other layers of security controls.

NGFWs will be most effective when working in conjunction with other layers of security controls. Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such

More information

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers

More information

Security and Identity Management Auditing Converge

Security and Identity Management Auditing Converge Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,

More information

User Survey Analysis: Ten Things You Need to Know If You Sell Into the Data Center

User Survey Analysis: Ten Things You Need to Know If You Sell Into the Data Center Dataquest Publication Date: 27 October 2010 ID Number: G00208341 User Survey Analysis: Ten Things You Need to Know If You Sell Into the Data Center Naveen Mishra, April Adams Gartner's 2010 Data Center

More information

Ensure Emerging Trends and Technologies Advance Your Marketing Strategy

Ensure Emerging Trends and Technologies Advance Your Marketing Strategy Ensure Emerging Trends and Technologies Advance Your Marketing Strategy Richard Fouts, Jackie Fenn and Gartner Fellow Lead Author Richard Fouts, Richard Fouts guides digital marketers on best practices

More information

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Research Publication Date: 12 February 2008 ID Number: G00154811 Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Steve Blood Companies spend too much on IP-PBXs

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

Establishing a Strategy for Database Security Is No Longer Optional

Establishing a Strategy for Database Security Is No Longer Optional Establishing a Strategy for Database Security Is No Longer Optional Published: 29 November 2011 G00226793 Analyst(s): Jeffrey Wheatman The options for securing increasingly valuable databases are very

More information

Successful EA Change Management Requires Five Key Elements

Successful EA Change Management Requires Five Key Elements Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the

More information

How BPM Can Enhance the Eight Building Blocks of CRM

How BPM Can Enhance the Eight Building Blocks of CRM Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

Roundup of Business Intelligence and Information Management Research, 1Q08

Roundup of Business Intelligence and Information Management Research, 1Q08 Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our

More information

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud G00214958 Use Heterogeneous Storage Virtualization as a Bridge to the Cloud Published: 12 August 2011 Analyst(s): Gene Ruth Data center operators who are interested in private cloud storage technologies

More information

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Industry Research Publication Date: 11 February 2009 ID Number: G00164764 Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Jeff Vining Government CIOs are under increasing

More information

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Research Publication Date: 24 March 2008 ID Number: G00156216 Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Tom Austin Both Google and Microsoft come up short in terms of delivering

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Selection Requirements for Business Activity Monitoring Tools

Selection Requirements for Business Activity Monitoring Tools Research Publication Date: 13 May 2005 ID Number: G00126563 Selection Requirements for Business Activity Monitoring Tools Bill Gassman When evaluating business activity monitoring product alternatives,

More information

Overcoming the Gap Between Business Intelligence and Decision Support

Overcoming the Gap Between Business Intelligence and Decision Support Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision

More information

Prepare for the Inevitable With an Effective Security Incident Response Plan

Prepare for the Inevitable With an Effective Security Incident Response Plan G00236455 Prepare for the Inevitable With an Effective Security Incident Response Plan Published: 19 July 2012 Analyst(s): Rob McMillan A serious security incident is a question of "when," not "if," for

More information

Gartner Defines Enterprise Information Architecture

Gartner Defines Enterprise Information Architecture Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit

More information