Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015

Size: px
Start display at page:

Download "Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015"

Transcription

1 G Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015 Published: 18 June 2014 Analyst(s): Carl Claunch Support for Windows Server 2003 will end in July Production systems should be migrated to a supported operating system before that date, as risk to the enterprise rapidly increases after that date. Impacts IT operations teams will find that systems including business-critical applications could be compromised, enabling data theft and unauthorized transactions as well as hosting attacks against other systems inside the data center. IT operations teams will find erroneous operation of applications and other software products may occur, linked to defects in Windows Server 2003 that no longer can be corrected, thus leading to extended or permanent loss of those application functions. Continuing to employ Windows Server 2003 may cause some organizations to not be able to meet regulatory and compliance requirements. Business leaders may not be aware of the risks they will face if Windows Server 2003 systems are not migrated, leaving IT leaders at fault for the incomplete disclosure if problems later arise. Recommendations IT operations teams should: Build a clear, explicit and complete position paper that outlines the risks of continuing to run Windows Server 2003, impacts, limits on restoration and extended nature of certain outages, targeted at business leaders. Provide the risk document to key business leaders as soon as possible, then negotiate with them to gain support for actions and costs that will be required to complete a Windows Server 2003 migration before July Make the migration effort a suitably high priority to gain approval and funding for the project such that it can be completed before support ends.

2 Analysis Microsoft extended support for Windows Server 2003 and Windows Server 2003 R2 is scheduled to end on 14 July After that date, they will not provide patches to fix security exposures nor corrections to repair any late-discovered defects in the code. Users who continue to use these operating systems (OSs) on servers in their organization face a number of negative impacts. There may not be much debate over the advisability of migrating all servers to a newer, supported OS, but for many IT organizations the priority for this task relative to all potential activities is too low. At this point in time, Windows Server 2012 R2 is the destination to which these older servers will be migrated. A migration of a large pool of servers to a new OS is a long and resource-intensive effort, one that must be started soon if the project is to be completed before July By analyzing the impacts of operating production systems running under Windows Server 2003, it should become clear that completing a migration before mid-2015 needs to be a high priority. Mitigation activities are possible if the migration is not done, but these activities merely lessen the risks and impacts. "Managing the Risks of Running Windows Server 2003 After July 2015" discusses how best to address the situation if migration is not possible, but that is a poor second to the best decision, which is to ensure Windows Server 2003 is not in use after July Except for a few customers who choose to buy a custom support agreement, which is typically a seven-digit expenditure and only buys a finite extension in support of a later completion of an active migration, when the extended support for Windows Server 2003 ends in July 2015, Microsoft offers no commitment to make fixes or other support for this product available. Security exposures that may be identified after that date likely will not be closed by issuance of a security patch, rendering these systems permanently vulnerable to attack. You can't count on receiving repairs for code defects in Windows Server 2003 either, regardless of the severity of outages that may be triggered by that defect. Sellers of other products that may be used on systems running Windows Server 2003 are likely to withdraw their support for defects or security exposures in their own products, since they will have lost the assurance of patches and support from Microsoft if changes to the operating system are needed. Thus, the end of extended support for the OS can lead to the end of support for other products when they are run atop Windows Server 2003, although those other products may continue to be supported if used on newer versions of Windows Server. Clients should engage their independent software vendors to ensure that all relevant facts are at hand. Page 2 of 7 Gartner, Inc. G

3 Figure 1. Impacts and Top Recommendations for Migration From Windows Server 2003 Impacts Systems could be compromised, enabling data theft and unauthorized transactions as well as hosting attacks against other systems inside the data center. Erroneous operation of applications and other software products may occur, linked to defects in Windows Server 2003, thus leading to extended or permanent loss of those application functions. Continuing to employ Windows Server 2003 may cause some organizations to not be able to meet regulatory and compliance requirements. Business leaders may not be aware of the risks they will face if Windows Server 2003 systems are not migrated, leaving IT leaders at fault for the incomplete disclosure if problems later arise. Top Recommendations Make the migration effort a suitably high priority to gain approval and funding for the project such that it can be completed before support ends. Provide business leaders with an outline of the risks of continuing to run Windows Server 2003, impacts, limits on restoration and extended nature of certain outages. Provide the outline to key business leaders as soon as possible, then negotiate to gain support for actions and costs required to complete a Windows Server 2003 migration before July Make the migration effort a suitably high priority to gain approval and funding for the project such that it can be completed before support ends. Source: Gartner (June 2014) Impacts and Recommendations IT operations teams will find that systems including business-critical applications could be compromised, enabling data theft and unauthorized transactions as well as hosting attacks against other systems inside the data center Security vulnerabilities could arise for which no protection is possible. Attackers who exploit these openings could gain control of systems based on Windows Server They can use the compromised system to launch attacks from within the data center against other, newer systems to capture and relay data from the network to the attacker outside and introduce false transactions or tamper with legitimate business activities. If such an attack were to take place, it may be impossible or impractical to stop it from succeeding and from being repeated, since the code vulnerability inside the OS will not be patched. Business functions dependent upon the system running under Windows Server 2003 may be unexpectedly subject to complete loss of access to the functionality of the system if it has to be shut down due to compromise. Alternatively, lack of viable alternatives for the business function may dictate that the Gartner, Inc. G Page 3 of 7

4 system remain in operation despite compromises, thus endangering other systems that are not based on Windows Server Recommendation: Make the migration effort a suitably high priority to gain approval and funding for the project such that it can be completed before support ends. IT operations teams will find erroneous operation of applications and other software products may occur, linked to defects in Windows Server 2003 that no longer can be corrected, thus leading to extended or permanent loss of those application functions Applications may have worked correctly for many years, yet be vulnerable to defects that remained latent. Minor changes in external conditions can trigger defects and cause a malfunction. This might be related to other activities on the server, growing workload volumes or combinations of input data, such as business transactions, that had not previously occurred. If the defect requires a change to the Windows Server 2003 code to stop the malfunction of the application, lack of support implies that this malfunction may be permanent. Depending on the scope of the malfunction, the business organization may be able to overcome the loss of function through minor changes in their processes, but there is an equal chance that a malfunction could leave the organization unable to address a significant portion of their business activities. If alternative software were easy to adopt, it is likely that these systems would have been successfully migrated away from Windows Server 2003 before the support deadline. Therefore, the loss of application function might exist for many months while an unplanned emergency migration is attempted. Recommendations: Build a clear, explicit and complete position paper that outlines the risks of continuing to run Windows Server 2003, impacts, limits on restoration and extended nature of certain outages, targeted at business leaders. Provide the risk document to key business leaders as soon as possible, then negotiate with them to gain support for actions and costs that will be required to complete a Windows Server 2003 migration before July Continuing to employ Windows Server 2003 may cause some organizations to not be able to meet regulatory and compliance requirements Those organizations that are subject to key system requirements and must run on supported products cannot meet those requirements if they operate servers under Windows Server 2003 after 14 July Overt obligations are easily identified; however, the organization may discover more subtle burdens that they will not meet if migration is not completed. Page 4 of 7 Gartner, Inc. G

5 Impacts and losses caused to other organizations or customers due to issues that arise from unsupported operation, such as an extended inability to meet contractual commitments due to inoperable applications, may appear negligent even if not explicitly demanded for compliance reasons. Recommendations: Build a clear, explicit and complete position paper that outlines the risks of continuing to run Windows Server 2003, impacts, limits on restoration and extended nature of certain outages, targeted at business leaders. Provide the risk document to key business leaders as soon as possible, then negotiate with them to gain support for actions and costs that will be required to complete a Windows Server 2003 migration before July Business leaders may not be aware of the risks they will face if Windows Server 2003 systems are not migrated, leaving IT leaders at fault for the incomplete disclosure if problems later arise In many situations where the priority and timing of a Windows Server migration is being debated within a company, business groups may be resisting the migration due to downtime incurred as part of the migration project, imposed charges the users will face to cover the costs, and other implications of change such as end user training requirements. Often, the business leaders who are familiar with the costs of a migration project are not as aware of the scenarios that may occur after support ends. IT leaders need to make the risks clear to business leaders in an extraordinarily explicit way, ensuring they realize that continuing to rely on IT systems running under Windows Server 2003 could expose them, without advance warning, to withdrawal of access. Further, the IT organization will not have the means to restore access in all cases, leading to the possibility that lack of access could endure for months or more until a replacement application can be introduced. Without an unusually direct and complete description of the potential outages, business leaders may wrongly conclude that IT leaders will have the means to deal with any security or functionality problems when they arise. Therefore, lack of support is simply an inconvenience to the IT group but does not compromise the ability to restore normal operations with "a little additional effort." Facing business leaders who are dealing with a prolonged inability to conduct normal business operations, IT leaders may be held to high standards for a proactive disclosure of the risks the entire company undertook as it depended upon Windows Server-2003 based systems postsupport. At best, such a situation would be a black eye on the image of the IT group and its leaders, with more dire alternatives possible. Recommendation: Make the migration effort a suitably high priority to gain approval and funding for the project such that it can be completed before support ends. Gartner, Inc. G Page 5 of 7

6 Gartner Recommended Reading Some documents may not be available as part of your current Gartner subscription. "Managing the Risks of Running Windows Server 2003 After July 2015" Evidence 1 The support termination date pertains to all members of the Windows Server 2003 family, including Windows Server 2003 R2 and Windows Small Business Server Page 6 of 7 Gartner, Inc. G

7 GARTNER HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT USA Regional Headquarters AUSTRALIA BRAZIL JAPAN UNITED KINGDOM For a complete list of worldwide locations, visit Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity. Gartner, Inc. G Page 7 of 7

Managing the Risks of Running Windows Server 2003 After July 2015

Managing the Risks of Running Windows Server 2003 After July 2015 G00263054 Managing the Risks of Running Windows Server 2003 After July 2015 Published: 1 April 2014 Analyst(s): Carl Claunch Windows Server 2003 and Windows Server 2003 R2 reach the end of their extended

More information

Agenda Overview for Emerging Marketing Technology and Trends, 2015

Agenda Overview for Emerging Marketing Technology and Trends, 2015 G00270688 Agenda Overview for Emerging Marketing Technology and Trends, 2015 Published: 18 December 2014 Analyst(s): Andrew Frank The best digital marketers exploit emerging trends and technologies to

More information

Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023

Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023 G00261104 Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023 Published: 24 January 2014 Analyst(s): Nigel Rayner This Gartner Research Circle survey conducted in September 2013 shows that some organizations

More information

Realize That Big Security Data Is Not Big Security Nor Big Intelligence

Realize That Big Security Data Is Not Big Security Nor Big Intelligence G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is

More information

X.509 Certificate Management: Avoiding Downtime and Brand Damage

X.509 Certificate Management: Avoiding Downtime and Brand Damage G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Agenda Overview for Social Marketing, 2015

Agenda Overview for Social Marketing, 2015 G00270737 Agenda Overview for Social Marketing, 2015 Published: 19 December 2014 Analyst(s): Julie Hopkins Social marketing programs are maturing; executives increasingly expect ROI to follow social marketing

More information

The Outlook for IT. 2014 to 2017. Michael Smith VP Distinguished Analyst January 31, 2014

The Outlook for IT. 2014 to 2017. Michael Smith VP Distinguished Analyst January 31, 2014 The Outlook for IT Michael Smith VP Distinguished Analyst January 31, 2014 2014 to 2017 Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed

More information

Selecting a Mobile App Development Vendor

Selecting a Mobile App Development Vendor G00246304 Selecting a Mobile App Development Vendor Published: 27 December 2012 Analyst(s): Ken Parmelee Ensuring that mobile app development vendors meet requirements and are viable requires an understanding

More information

Future of Money: Digital Payment Advisors Will Transform the Payment Landscape

Future of Money: Digital Payment Advisors Will Transform the Payment Landscape G00248422 Future of Money: Digital Payment Advisors Will Transform the Payment Landscape Published: 11 April 2013 Analyst(s): Alistair Newton DPAs are applications on a customer's mobile device that recommend

More information

Cloud IaaS: Service-Level Agreements

Cloud IaaS: Service-Level Agreements G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of

More information

Use a TCO Model to Estimate the Costs of Your Data Center

Use a TCO Model to Estimate the Costs of Your Data Center G00233221 Use a TCO Model to Estimate the Costs of Your Data Center Published: 26 June 2012 Analyst(s): David J. Cappuccio The cost to own and run a data center is significantly higher than many IT managers

More information

Understanding Vulnerability Management Life Cycle Functions

Understanding Vulnerability Management Life Cycle Functions Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability

More information

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows

More information

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

Agenda Overview for Multichannel Marketing, 2015

Agenda Overview for Multichannel Marketing, 2015 G00271717 Agenda Overview for Multichannel Marketing, 2015 Published: 19 December 2014 Analyst(s): Adam Sarner, Jennifer S. Beck Multichannel marketing is where content and context meet and where brand

More information

How to Reduce Network Equipment Maintenance Costs

How to Reduce Network Equipment Maintenance Costs G00264020 How to Reduce Network Equipment Maintenance Costs Published: 13 May 2014 Analyst(s): Andrew Lerner, Mark Fabbi Each year, maintenance costs swallow 15% to 25% of total enterprise IT budgets,

More information

Agenda Overview for Customer Experience, 2015

Agenda Overview for Customer Experience, 2015 G00270544 Agenda Overview for Customer Experience, 2015 Published: 22 December 2014 Analyst(s): Jake Sorofman Customer experience has emerged as a top priority for marketers. This overview summarizes how

More information

Agenda Overview for Multichannel Marketing, 2013

Agenda Overview for Multichannel Marketing, 2013 G00245870 Agenda Overview for Multichannel Marketing, 2013 Published: 3 January 2013 Analyst(s): Jennifer S. Beck, Adam Sarner Consumers are in the driver's seat, with high expectations for multichannel

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

Highlights of the 2015 CEO Survey: Business Leaders Are Betting on Tech

Highlights of the 2015 CEO Survey: Business Leaders Are Betting on Tech G00274032 Highlights of the 2015 CEO Survey: Business Leaders Are Betting on Tech Published: 10 April 2015 Analyst(s): Mark Raskino Gartner's annual survey reveals CEOs' heightened interest in tech-related

More information

What's a Digital Marketing Platform? What Isn't?

What's a Digital Marketing Platform? What Isn't? G00252512 What's a Digital Marketing Platform? What Isn't? Published: 26 June 2013 Analyst(s): Jake Sorofman, Andrew Frank, Bill Gassman, Adam Sarner, Mike McGuire The rise of digital marketing has amplified

More information

Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models

Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models G00237716 Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models Published: 6 February 2013 Analyst(s): David W. Cearley, Donna Scott, Joe Skorupa, Thomas J. Bittman Cloud

More information

Agenda Overview for Marketing Management, 2015

Agenda Overview for Marketing Management, 2015 G00270720 Agenda Overview for Marketing Management, 2015 Published: 18 December 2014 Analyst(s): Richard Fouts Increased participation in strategic business decisions and an evolving organization put new

More information

Beware the Effect of the Operating Lease's Demise on Finance and Real Estate

Beware the Effect of the Operating Lease's Demise on Finance and Real Estate G00249343 Beware the Effect of the Operating Lease's Demise on Finance and Real Estate Published: 30 August 2013 Analyst(s): Rob Schafer The recently revised Exposure Draft of the FASB-IASB's lease accounting

More information

Agenda Overview for Digital Commerce, 2015

Agenda Overview for Digital Commerce, 2015 G00270685 Agenda Overview for Digital Commerce, 2015 Published: 18 December 2014 Analyst(s): Jennifer Polk Marketing is making a greater impact on, and taking more responsibility for, digital commerce.

More information

Establishing a Strategy for Database Security Is No Longer Optional

Establishing a Strategy for Database Security Is No Longer Optional Establishing a Strategy for Database Security Is No Longer Optional Published: 29 November 2011 G00226793 Analyst(s): Jeffrey Wheatman The options for securing increasingly valuable databases are very

More information

What to Consider When Designing Next-Generation Data Centers

What to Consider When Designing Next-Generation Data Centers Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,

More information

Data Center Consolidation Projects: Benefits and Pitfalls

Data Center Consolidation Projects: Benefits and Pitfalls Research Publication Date: 2 May 2011 ID Number: G00212148 Data Center Consolidation Projects: Benefits and Pitfalls David J. Cappuccio This research outlines the primary success factors in consolidation

More information

The Six Triggers for Using Data Center Infrastructure Management Tools

The Six Triggers for Using Data Center Infrastructure Management Tools G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using

More information

Agenda Overview for Mobile Marketing, 2015

Agenda Overview for Mobile Marketing, 2015 G00270723 Agenda Overview for Mobile Marketing, 2015 Published: 18 December 2014 Analyst(s): Mike McGuire Mobile technologies enable digital marketers to engage customers at every stage of the purchase

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

Eight Criteria for Evaluating Software License Metrics

Eight Criteria for Evaluating Software License Metrics G00213489 Eight Criteria for Evaluating Software License Metrics Published: 1 June 2011 Analyst(s): Alexa Bona, Jane B. Disbrow, Peter Wesche Procurement executives and software asset managers are struggling

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

When IT Leaders Should Select Private Over Public Cloud Services

When IT Leaders Should Select Private Over Public Cloud Services G00273092 When IT Leaders Should Select Private Over Public Cloud Services Published: 17 September 2015 Analyst(s): Donna Scott Many enterprises are taking a cloud-first strategy, opting for the speed

More information

How to Develop an Effective Vulnerability Management Process

How to Develop an Effective Vulnerability Management Process Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

Singapore Empowers Land Transport Planners With Data Warehouse

Singapore Empowers Land Transport Planners With Data Warehouse G00219502 Singapore Empowers Land Transport Planners With Data Warehouse Published: 18 October 2011 Analyst(s): Eric Thoo The Land Transport Authority (LTA) of Singapore wanted to improve planning and

More information

Why CEOs Want A Digital Strategy This Year

Why CEOs Want A Digital Strategy This Year G00247313 CEO and Senior Executive Survey 2013: Why CEOs Will Want a Digital Strategy This Year Published: 25 March 2013 Analyst(s): Ken McGee Gartner's CEO and senior business executive survey indicates

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

Digital Marketing Budgets Increase, Reflecting Focus on Customer Experience

Digital Marketing Budgets Increase, Reflecting Focus on Customer Experience G00255396 Digital Marketing Budgets Increase, Reflecting Focus on Customer Experience Published: 9 January 2014 Analyst(s): Laura McLellan Gartner's Digital Marketing Spending Survey shows that digital

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

Agenda Overview for Mobile Marketing, 2013

Agenda Overview for Mobile Marketing, 2013 G00245888 Agenda Overview for Mobile Marketing, 2013 Published: 9 January 2013 Analyst(s): Mike McGuire Mobile computing will revolutionize digital marketing by exploiting rich information about where

More information

This research note is restricted to the personal use of christine_tolman@byu.edu

This research note is restricted to the personal use of christine_tolman@byu.edu Burton IT1 Research G00234483 Identity Management Published: 9 July 2012 Analyst(s): Ian Glazer, Bob Blakley Identity management (IdM) has become a distinct aggregation of functions for the maintenance

More information

IT Operational Considerations for Cloud Computing

IT Operational Considerations for Cloud Computing Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.

More information

eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success

eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success : Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success FAST FACTS Over 10 Million Windows Server 2003 Devices Still In Use Less Than 250 Days To Windows Server

More information

Prepare for the Inevitable With an Effective Security Incident Response Plan

Prepare for the Inevitable With an Effective Security Incident Response Plan G00236455 Prepare for the Inevitable With an Effective Security Incident Response Plan Published: 19 July 2012 Analyst(s): Rob McMillan A serious security incident is a question of "when," not "if," for

More information

Agenda for Supply Chain Strategy and Enablers, 2012

Agenda for Supply Chain Strategy and Enablers, 2012 G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

Measuring the Business Value of Data Quality

Measuring the Business Value of Data Quality G00218962 Measuring the Business Value of Data Quality Published: 10 October 2011 Analyst(s): Ted Friedman, Michael Smith Research shows that 40% of the anticipated value of all business initiatives is

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage

Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Research Publication Date: 10 August 2011 ID Number: G00213049 Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Jay E. Pultz The National Renewable Energy Laboratory's (NREL's) data center

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device

More information

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented

More information

Mobile Marketing Primer for 2016

Mobile Marketing Primer for 2016 Gartner for Marketers Mobile Marketing Primer for 2016 Adam Sarner Research Vice President Mike McGuire Research Vice President Charles S. Golvin Research Director G00293091 Mobile Marketing Primer for

More information

WHITE PAPER. Running. Windows Server 2003. in a Post-Support World. By Nick Cavalancia

WHITE PAPER. Running. Windows Server 2003. in a Post-Support World. By Nick Cavalancia Running Windows Server 2003 in a Post-Support World By Nick Cavalancia TABLE OF CONTENTS Introduction 1 The Challenge of Staying on Windows Server 2003 2 Building a Vulnerability Mitigation Strategy 4

More information

The Edge Manifesto: Digital Business, Rich Media, Latency Sensitivity and the Use of Distributed Data Centers

The Edge Manifesto: Digital Business, Rich Media, Latency Sensitivity and the Use of Distributed Data Centers G00290109 The Edge Manifesto: Digital Business, Rich Media, Latency Sensitivity and the Use of Distributed Data Centers Published: 31 July 2015 Analyst(s): Bob Gill The edge manifesto calls for the placement

More information

2015 CIO Agenda: An Africa Perspective

2015 CIO Agenda: An Africa Perspective G00272423 2015 CIO Agenda: An Africa Perspective Published: 30 January 2015 Analyst(s): Mbula Schoen, Wm. L. Hahn Gartner's 2015 CIO survey results clearly show that digital technologies are creating a

More information

Data Center Consolidation: Top 10 Best Practices for Project Success

Data Center Consolidation: Top 10 Best Practices for Project Success Research Publication Date: 2 May 2011 ID Number: G00212551 Data Center Consolidation: Top 10 Best Practices for Project Success David J. Cappuccio Many data center consolidation projects fail to meet overall

More information

Public/Private/Hybrid Cloud choosing horses for courses. NetEvents APAC Cloud Summit

Public/Private/Hybrid Cloud choosing horses for courses. NetEvents APAC Cloud Summit Public/Private/Hybrid Cloud choosing horses for courses NetEvents APAC Cloud Summit David Coyle Managing Vice President Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

Cloud Trends 2015 and beyond

Cloud Trends 2015 and beyond Cloud Trends 2015 and beyond Thierry Kuperman Le Bihan @tkuperman Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Microsoft Windows XP Vulnerabilities and Prevention

Microsoft Windows XP Vulnerabilities and Prevention Managing Your Legacy Systems: What Will Life Be Like After Windows Server 2003? After Microsoft ended support for Windows XP last April 8, 2014, users and organizations alike that continued to use the

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

Emerging PC Life Cycle Configuration Management Vendors

Emerging PC Life Cycle Configuration Management Vendors Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market

More information

Gartner's View on 'Bring Your Own' in Client Computing

Gartner's View on 'Bring Your Own' in Client Computing G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

How To Calculate Hd Costs

How To Calculate Hd Costs Total Cost of Ownership Comparison of PCs With Hosted Virtual Desktops, 2011 Update Gartner RAS Core Research Note G00209403, Federica Troni, Mark A. Margevicius, Michael A. Silver, 14 December 2010, RA12

More information

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

OFFICIAL RULES FOR 2016 LAS VEGAS BIKINI TEAM MODEL SEARCH

OFFICIAL RULES FOR 2016 LAS VEGAS BIKINI TEAM MODEL SEARCH OFFICIAL RULES FOR 2016 LAS VEGAS BIKINI TEAM MODEL SEARCH NO PURCHASE REQUIRED. A PURCHASE OR PAYMENT OF ANY KIND WILL NOT INCREASE YOUR CHANCES OF WINNING. COMPETITION ENTITY: LAS VEGAS BRANDS INC. ("Las

More information

Ensure Emerging Trends and Technologies Advance Your Marketing Strategy

Ensure Emerging Trends and Technologies Advance Your Marketing Strategy Ensure Emerging Trends and Technologies Advance Your Marketing Strategy Richard Fouts, Jackie Fenn and Gartner Fellow Lead Author Richard Fouts, Richard Fouts guides digital marketers on best practices

More information

Organizations Struggle with Data Center Capacity Management

Organizations Struggle with Data Center Capacity Management R E S E A R C H N O T E Publication Date: November 23, 2006 Organizations Struggle with Data Center Capacity Management Survey shows data center processes and tools lagging Businesses today are increasingly

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

INSIDE. Management Process. Symantec Corporation TM. Best Practices Roles & Responsibilities. Vulnerabilities versus Exposures.

INSIDE. Management Process. Symantec Corporation TM. Best Practices Roles & Responsibilities. Vulnerabilities versus Exposures. Symantec Corporation TM Symantec Product Vulnerability Management Process Best Practices Roles & Responsibilities INSIDE Vulnerabilities versus Exposures Roles Contact and Process Information Threat Evaluation

More information

NAC Strategies for Supporting BYOD Environments

NAC Strategies for Supporting BYOD Environments G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach

More information

Recognize the Importance of Digital Marketing

Recognize the Importance of Digital Marketing Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated

More information

IT Architecture Is Not Enterprise Architecture

IT Architecture Is Not Enterprise Architecture Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

How to Choose Providers for Mobile Consumer Application Platforms

How to Choose Providers for Mobile Consumer Application Platforms How to Choose Providers for Mobile Consumer Application Platforms Michael McGuire Lead Author Michael McGuire,, Mike McGuire guides digital marketers on best practices for developing strategies. He specializes

More information

Containers and Modules: Is This the Future of the Data Center?

Containers and Modules: Is This the Future of the Data Center? Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

How To Use Data To Drive Digital Marketing

How To Use Data To Drive Digital Marketing G00270683 Agenda Overview for Data-Driven Marketing, 2015 Published: 29 December 2014 Analyst(s): Martin Kihn Gartner's 2015 research will help you seize the growth opportunities that data-driven marketing

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

Mitigating Risks and Monitoring Activity for Database Security

Mitigating Risks and Monitoring Activity for Database Security The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring

More information

Gartner Defines Enterprise Information Architecture

Gartner Defines Enterprise Information Architecture Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit

More information

YarcData's urika Shows Big Data Is More Than Hadoop and Data Warehouses

YarcData's urika Shows Big Data Is More Than Hadoop and Data Warehouses G00232737 YarcData's urika Shows Big Data Is More Than Hadoop and Data Warehouses Published: 11 September 2012 Analyst(s): Carl Claunch The hype about big data is mostly on Hadoop or data warehouses, but

More information

End of Support Should Not End Your Business. Challenge of Legacy Systems

End of Support Should Not End Your Business. Challenge of Legacy Systems End of Support Should Not End Your Business When software vendors announce a product end-of-life (EOL), customers typically have 24 to 30 months to plan and execute their migration strategies. This period

More information

Key Issues for Consumer Goods Manufacturers, 2011

Key Issues for Consumer Goods Manufacturers, 2011 Industry Research Publication Date: 1 March 2011 ID Number: G00210698 Key Issues for Consumer Goods Manufacturers, 2011 Don Scheibenreif, Dale Hagemeyer Gartner's 2011 consumer goods manufacturing research

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset

Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset G00217757 Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset Published: 22 December 2011 Analyst(s): Bill O'Kane Lexmark International undertook a master data management (MDM) program

More information

Enterprise Asset Management Migration Requires Detailed Planning

Enterprise Asset Management Migration Requires Detailed Planning Research Publication Date: 2 September 2005 ID Number: G00130205 Enterprise Asset Management Migration Requires Detailed Planning Kristian Steenstrup Neglecting to address key areas when migrating to packaged

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information