Magic Quadrant for Wireless LAN Infrastructure, 2006

Size: px
Start display at page:

Download "Magic Quadrant for Wireless LAN Infrastructure, 2006"

Transcription

1 Research Publication Date: 6 October 2006 ID Number: G Magic Quadrant for Wireless LAN Infrastructure, 2006 Rachna Ahlawat, Ken Dulaney Wireless LAN technologies have matured. Most products now offer similar capabilities, but this is making it difficult to differentiate. Leaders and Challengers offer the least risk, but they lack leading-edge technology. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

2 WHAT YOU NEED TO KNOW Wireless LAN (WLAN) products available in the market today offer very similar capabilities. The basic difference between vendors is in their overall strategy: 1. Incumbent wired networking vendors such as Cisco Systems and HP Procurve have a vision of offering integrated wired and wireless LAN switches. 2. Startups such as Aruba and Meru are primarily focusing on the enterprises that view wireless as an overlay of wired. We strongly advise enterprises to carry out a full competitive review of different vendors' offerings after closely examining the true capabilities of their desired WLAN. Leaders and Challengers in this Magic Quadrant will pose the least risk for client investment, but may not always provide the most leading-edge or current technology. Visionaries could provide this capability, but might present a greater risk. Niche vendors will typically appeal to their existing client base, to low-price buyers or to those looking for a specific set of features. Publication Date: 6 October 2006/ID Number: G Page 2 of 18

3 MAGIC QUADRANT Figure 1. Magic quadrant for Wireless LAN Infrastructure, 2006 Source: Gartner Dataquest (September 2006) Market Overview WLANs are becoming a standard part of enterprise networks. They are no longer confined to meeting rooms or visitors areas; they are now being deployed to cover entire facilities. More and more enterprises are moving toward third-generation WLAN architecture (access points with wireless controllers) in corporate headquarters and large branch offices. Smaller offices continue to deploy fully functional stand-alone access points. The top three reasons for deploying wireless LANs are: 1. To improve productivity through mobility. Publication Date: 6 October 2006/ID Number: G Page 3 of 18

4 2. To provide access to places where wiring is impossible or too expensive to install. 3. To improve efficiency in specific business processes or operations. From a technical perspective, WLANs are now considered secure both through the adoption of Institute of Electronic and Electrical Engineers (IEEE) standards and native improvements to the technology. WLANs have joined LANs as full members of the "behind the firewall" infrastructure. The security solutions offered by all vendors have begun to raise the 802.1X authentication framework as an issue that clients must consider on their technology road maps. However, problems of interoperability are still barriers to easier deployment. As wireless LANs expand from conference rooms to the whole enterprise, concerns about network management are arising. We've gone from thinking of offices as network nodes to considering each employee as a node on a wired network. Now every major physical item the company owns is becoming a node on a wireless network. The enterprise WLAN infrastructure market is comprised of a number of high- and low-risk vendors with varied capabilities. The best vendors will provide the widest array of options to tailor to a client's needs at the optimum price points. They will also offer flexible security and strong management tools. The good news is that the functions offered by the various vendors are narrowing to the core set described here. This is making the choice of vendor easier, but, at the same time, more complex, because it is more difficult to discern highly differentiated features. The top-rated vendors have global sales and service presence through direct or reseller arrangements. Some vendors are stand-alone WLAN vendors that provide their technology as a non-invasive overlay to an existing wired network. Others possess a family of wired products that are highly integrated with the WLAN products. Where the latter exists, the best vendors have provided a single management console to control both network types. Market Definition/Description The enterprise WLAN infrastructure market consists of set of vendors that provide wireless IP networking solutions that conform to IEEE standards through the Wi-Fi Alliance certification process. Vendor products include a minimum of two core components: 1. WLAN access points (APs) that distribute a Wi-Fi radio frequency (RF) signal to a variety of client devices. 2. A set of controllers that sit behind the APs to consolidate functions that are better served through centralized control when the number of installed APs exceeds five in a given area. These components are required to support the full set of worldwide assigned frequencies at 2.4GHz, 4.9GHz and 5.2GHz through 5.8GHz, even though some of the frequencies cannot be legally used in every country. All APs contain a minimum of two radios that can act either as service link radios or as air sensors for security purposes. All radios are typically configurable across any of the bands in the aforementioned frequencies. Each radio supports a minimum of 16 Basic Service Set Identifiers (BSSIDs). More advanced APs support the additional capability to use one of the radios for wireless backhaul and, in the more advanced systems, capability as a mesh networking vendor. (Note: mesh-only vendors are not covered under this market assessment.) APs that can be used outdoors are optionally provided by most full service vendors. Vendors also provide a variety of antennae from those that provide simple diversity, to multiple input, multiple output (MIMO), to higher gain antennae that provide increased coverage. All APs should also be configurable to repeater mode when range improvements are desired over capacity. Publication Date: 6 October 2006/ID Number: G Page 4 of 18

5 All incumbent wired LANs have already launched WLAN products on their own or in partnership with startups. More acquisitions of WLAN startups are expected. Based on disclosed information from vendors that wish their supplier relationships to be known, and from customers and other external sources regarding relationships that were not made public, we have determined the following partner relationships. Clients should verify these relationships should they become material to any product acquisition. Each vendor is shown, followed by its OEM partner (shown as not applicable [NA] where relevant). 3Com Trapeze Networks Alcatel Aruba Networks Aruba Networks NA Bluesocket NA Cisco Systems NA (Acquired Airespace in 2005) Colubris NA Enterasys Networks Trapeze Networks Extreme Networks Siemens Extricom NA Foundry Networks Meru Networks HP Procurve Symbol Technologies Meru Networks NA Nortel Networks Trapeze Networks Siemens NA Symbol Technologies NA Trapeze Networks NA Xirrus NA Inclusion and Exclusion Criteria Products that serve this market must provide a minimum of security features, including Wi-Fi Protected Access 2 (WPA2) certification that enables over-the-air transmissions to be fully encrypted using the highest standard form of encryption, Advanced Encryption Standard (AES). Market participants must also provide air-sensing technology that can detect RF anomalies, including rogue APs, either through separate sensor or via a radio that can dynamically switch between service and sensing modes. All vendors must support the 802.1x authentication framework to the minimum tested features within the Wi-Fi Alliance WPA2 test suite. They should have the ability to segment traffic and support guest networking in a secure scheme that does not expose secure internal traffic to outsiders. The more advanced vendors have begun to expand security options to cover wired connections, and even wide-area connections through integrated virtual private networks (VPNs) or other mainstream security methods. Enterprise WLAN infrastructure products are supplied with management consoles that perform a number of tasks, including: assistance at setup and layout of the APs; ongoing assessment of the Publication Date: 6 October 2006/ID Number: G Page 5 of 18

6 RF capability to ensure minimum quality of service (QOS); assistance in managing the security of the network; and management of the infrastructure, including firmware updates. The best products have an intuitive user interface with all capability integrated within a common framework. Vendors usually supply second-generation, stand-alone access points and either thirdgeneration, centralized or fourth-generation, traffic-optimized architecture systems. Thirdgeneration systems offload security and roaming at a minimum to a central controller, which is connected to the APs via either a Layer 2 or Layer 3 connection. Fourth-generation systems supplement this with software that controls access to the network by granting time slots for transmission vs. the client-controlled Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) mechanism of third-generation and earlier systems. Recently, all generations have been upgraded to provide QOS for voice clients by supporting a minimum of Wireless Multimedia Power Save, which prioritizes voice packets. Fourth-generation systems employ more sophisticated network access schemes to further improve voice quality and are most popular when voice is a mainstream application. In this Magic Quadrant, we include the vendors that provide third- and four-generation WLAN systems. Added Since there are a large number of WLAN startups, one of the criteria for inclusion in our Magic Quadrant is that the vendor should have been selling products for at least one full quarter prior to publication. Extricom and Xirrus started shipping products in 2H05 and so were not included in the previous Magic Quadrant, but have been added this year. Dropped The following two vendors are no longer tracked in this report. Proxim, once a leader, is now a wholly owned subsidiary of Terabeam Wireless. For the last two years, Proxim was struggling in the enterprise WLAN space. Under the new management team, it has now decided to primarily focus on broadband wireless networking systems and is therefore not included in this report. Vivato received more than $100 million in venture-capital funding but failed to make a mark in the WLAN market. It ceased operating in November Evaluation Criteria Ability to Execute The criteria used to assess vendors in this Magic Quadrant are described in detail below. Since these criteria have changed from earlier editions, direct comparisons between this edition and previous ones are inappropriate. Gartner analysts evaluate technology providers on the quality and efficacy of the processes, systems, methods or procedures that enable IT provider performance to be competitive, efficient and effective, and to positively impact revenue, retention and reputation. Ultimately, technology providers are judged on their ability and success in capitalizing on their vision. Product/Service: Core goods and services offered by the technology provider that compete in/serve the defined market. This includes current product/service capabilities, quality, feature sets and skills, whether offered natively or through OEM agreements/partnerships as defined in the market definition and detailed in the subcriteria. Publication Date: 6 October 2006/ID Number: G Page 6 of 18

7 Overall Viability (Business Unit, Financial, Strategy, Organization): Financials: Viability includes an assessment of the overall organization s financial health, the financial and practical success of the business unit and the likelihood of the individual business unit to continue to invest in the product, continue offering the product and advancing the state of the art within the organization s portfolio of products. Marketing Responsiveness and Track Record: The clarity, quality, creativity and efficacy of programs designed to deliver the organization s message in order to influence the market, promote the brand and business, increase awareness of the products and establish a positive identification with the product/brand and organization in the minds of buyers. This mind share can be driven by a combination of publicity, promotional, thought leadership, word-of-mouth and sales activities. Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups and service-level agreements. Table 1. Ability to Execute Evaluation Criteria Evaluation Criteria Product/Service Overall Viability (Business Unit, Financial, Strategy, Organization) Sales Execution/Pricing Market Responsiveness and Track Record Marketing Execution Customer Experience Operations Source: Gartner Weighting standard standard no rating high no rating high no rating Completeness of Vision Gartner analysts evaluate technology providers on their ability to convincingly articulate logical statements about current and future market direction, innovation, customer needs, and competitive forces, and how well they map onto the Gartner position. Ultimately, technology providers are rated on their understanding of how market forces can be exploited to create opportunity for the provider. Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the Web site, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling product that uses the appropriate network of direct and indirect sales, marketing, service, and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: A technology provider s approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature set as they map onto current and future requirements. Publication Date: 6 October 2006/ID Number: G Page 7 of 18

8 Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. Table 2. Completeness of Vision Evaluation Criteria Evaluation Criteria Market Understanding Marketing Strategy Sales Strategy Offering (Product) Strategy Business Model Vertical/Industry Strategy Innovation Geographic Strategy Source: Gartner Weighting no rating standard standard high no rating no rating high no rating Leaders A Leader will have demonstrated a sustained ability to meet the changing needs for mainstream WLAN architectures. Leaders should have demonstrated an ability to shape the market, maintain strong relationships with their channels and customers, and have no obvious gaps within the portfolio. Challengers A Challenger will have demonstrated sustained execution in the marketplace, and have clear and long-term viability in the market, but will not have shown the ability to shape and transform the market. Visionaries A Visionary demonstrates an ability to increase features in its offering to provide a unique and differentiated approach to the market. A Visionary will have innovated in one or more of the key areas of WLAN technologies (convergence, security, management or operational efficiency). Niche Players A Niche Player has a complete or near-complete product offering, but does not have strong go-tomarket capabilities or innovation in its product offerings. A Niche Player still has a viable product offering and, in some cases, will be an appropriate choice for large infrastructure deals. Vendor Comments 3Com 3Com has refreshed its WLAN portfolio in the last few months. It has introduced dual radio standalone access points and a 24-port unified wired and wireless switch targeted at small and midsize businesses (SMBs). The unified switch is developed internally by 3Com, but the company still relies on Trapeze for coordinated APs and centralized wireless controllers. 3Com resells Trapeze's controllers to its customer base as a wireless overlay solution. Publication Date: 6 October 2006/ID Number: G Page 8 of 18

9 While 3Com has expanded its WLAN portfolio, its offerings are primarily targeted at SMBs. It is a big market for wireless, but consumer-grade wireless vendors such as D-Link, Netgear and Linksys have also moved up the chain and serve the small enterprise market. One feature that helps 3Com differentiate from consumer-grade WLAN vendors is its network admission control functionality, using TippingPoint's IPS server for wireless devices. But 3Com needs to further expand its WLAN offering to compete more effectively with startups that are offering a technically superior product for large deployments. Today, 3Com mainly sells its WLAN products to existing customers. Consider purchasing WLAN infrastructure from 3Com if you have deployed its wired networking products. Alcatel Under a reseller partnership agreement with Aruba, Alcatel rebrands Aruba's APs and WLAN controllers under the Omniswitch product line. Unlike some of the other wired networking vendors, Alcatel has no plans to integrate wireless features into its wired switching platform. However, it does provide an option of managing wired and wireless LANs through the same console using its network management suite, OmniVista. Alcatel could have a bigger profile in enterprise WLAN networking if it were not for its very limited presence in enterprise networking, particularly in North America. Alcatel's LAN products offer a well-thought-out, robust architecture at attractive prices, but the company continues to suffer from lack of resources that would enable it to sell more aggressively. Consider purchasing WLAN infrastructure from Alcatel if you have deployed its wired networking products. Aruba Networks Aruba Networks is becoming a "one-stop shop" for all wireless LAN needs. It has progressed well in the last few years and is providing infrastructure for some of the largest WLAN deployments worldwide. It has a broad range of product offerings for centralized WLAN deployment, for campuses, branch offices and corporate small office/home offices (SOHOs). Aruba's initial offering consisted of a core WLAN controller with coordinated access-point architecture. It has introduced scaled-down versions of its core controller technology for branch-office and smaller-scale WLAN deployments. Since 802.1x is gaining momentum, because of WLAN security issues, Aruba's vision of unified wired and wireless access security (such as the Web-based 802.1x authentication for wired clients that do not support 802.1x natively) is a good one. With the exception of its partnership with Alcatel, Aruba has not pursued an OEM partnership strategy very aggressively. This may hurt the company in the long term, especially since more and more enterprises are looking to buy wired and wireless from the same vendor. Aruba had planned to take advantage of closer ties with Alcatel and integrate Alcatel's voice over WLAN (VoWLAN) and security components into its lineup, but we have not seen the company execute in this direction with its partners. Companies considering Aruba must be wary of the inherent risks of doing business with a startup. But we believe the company is doing a good job of distinguishing itself from other WLAN startups, and its product strategy, along with its "direct touch" sales strategy, has helped it win some major opportunities worldwide. Consider Aruba when wireless LAN is being considered as an overlay of wired LAN. Bluesocket Bluesocket's original positioning was based on its WLAN overlay security and management appliances for enterprises that had deployed APs from different vendors. Bluesocket marketed its Publication Date: 6 October 2006/ID Number: G Page 9 of 18

10 security offerings as an improvement over Wired Equivalent Privacy (WEP), but following the ratification of i, and as enterprises started moving toward third-generation WLAN products, the market for third-party security and management gateways started shrinking. As a result, Bluesocket introduced third-generation WLAN switch architecture in 2005 and joined the ranks of the wireless switch vendors. The company has a solid offering (it was the first enterprise vendor to launch MIMO APs), but is difficult to differentiate. Bluesocket's brand presence should help it win business from existing accounts, but overall it has limited coverage. It is challenged by its sales and distribution channels. The company is too small to support a large stable of direct sales representatives, and it has no partnerships in place with incumbent wired networking vendors. Bluesocket's existing customers (which bought its authentication gateway products to manage security of various vendors APs) consider its third-generation centralized controller and coordinated APs when upgrading or expanding their WLAN. But we have doubts about its capability to expand beyond this customer base or to defend it completely. In our end-user survey, we found that Bluesocket customers were particularly happy with user-based policy control features, such as per-user bandwidth control, filtering, logging and detailed reports by roles. Consider Bluesocket if you have deployed APs from different vendors and would like to expand the network by deploying a third-generation WLAN solution. Cisco Systems Cisco Systems continues to be the leader in the market, and its position has been strengthened following the introduction of the centralized WLAN products. Cisco is able to meet much of the mainstream market requirements. Its WLAN product portfolio consists of stand-alone APs, WLAN overlays consisting of coordinated APs and centralized controllers, and WLAN service blades for its Ethernet switches. The company is in a good position to continue to garner share, since most of the enterprises are looking toward their incumbent wired networking vendor to provide WLAN products as well. Two reasons that make Cisco customers look elsewhere are wireless network management and the cost of the solution. For wireless networks that consist of multiple generations of products, enterprises use two different products for network management a WLAN service engine (WLSE) for stand-alone APs and a wireless control system (WCS) for centralized controllers and coordinated APs. But these two products are not very well integrated and capabilities are quite different. In such cases, enterprise either have to look at some third-party vendors for WLAN management or else develop custom applications. Product features are similar to many other vendors included in this report, but the price of the solution is much higher. Meeting the challenges will take time, but Cisco's other strong attributes in the areas of sales, marketing and customer support should keep it in a Leaders position for some time. Given the breadth of product line and overall market influence, Cisco should be on a shortlist of vendors for all mainstream requirements. However, this shortlist must include other alternative suppliers to ensure a solution that meets the specific needs of the enterprise. Colubris Colubris's WLAN solution has more intelligence at the edge than most other vendors in this report and its controller is mainly tasked with WLAN infrastructure management (not RF management). Its WLAN offering consists of stand-alone APs and a central controller/server-based management system. Its access points enforce user authentication, QOS and radio frequency management. Publication Date: 6 October 2006/ID Number: G Page 10 of 18

11 The controller automates AP deployment and configuration and also coordinates roaming handoffs between the APs. Colubris's WLAN products are sold both to the enterprises and service providers, but most of the company's revenue comes from selling WLAN equipment through service providers into public venues. In the last year, it has shown a desire to expand its presence in the enterprise networking market and is planning to selectively target certain vertical markets. Its offering is especially attractive to enterprises that have a distributed office environment (with a large number of small branch offices). Colubris has the infrastructure in place to perform WLAN billing to business units. Consider this product if you have a large number of distributed branch offices where you want to provide local authentication, but want to manage configuration and infrastructure from a central location. Enterasys Networks Enterasys Network's WLAN offering consists of a stand-alone, fully-functional AP 4102 product, which allows its customers to deploy a granular policy-based wireless security approach to the specific user level at the network edge, without the need for a central controller or virtual LAN. Enterasys also resells a centralized WLAN solution through an OEM partnership with Trapeze. While it promotes its own stand-alone APs more aggressively, it does provide a software upgrade for stand-alone APs, allowing them to work as coordinated APs in a switch controller-based centralized architecture. Enterasys is in a transition from being a publicly traded company to becoming part of a private equity arrangement. The new management team is showing some early signs of getting Enterasys back on track from an execution perspective. Enterasys added some new customers in the last few months, but the biggest challenge it faces is winning back the confidence of its customer base, which has been nervous about carrying out any further upgrades using Enterays's wired and wireless LAN products. Extreme Networks Extreme Networks launched a new WLAN offering in partnership with Siemens. Extreme is still catching up with the market its revenue in the WLAN category is lagging behind the market growth rates. Along with the partnership with Siemens for WLAN, it also announced a partnership with AirTight for wireless intrusion prevention system (IPS) products. Through OEM partnerships, it now has various components required to craft out a decent WLAN solution, but not much work has been done to integrate all the pieces to make it easier for customers to deploy and manage their WLAN. Extreme's WLAN offering primarily appeals to its existing customer base of Ethernet switches. Consider Extreme's WLAN products if your company has deployed its wired networking switches. Extricom Extricom is a late entrant to the WLAN market, having stumbled on the marketing front for some time to get its technology to markets where WLAN sales have been active. We classify Extricom as a fourth-generation WLAN vendor, where all APs are deployed on the same channel, creating a blanket of coverage. By applying centralized per-packet control of all transmissions, co-channel interference is avoided, eliminating the need for cell planning and delivering a predictable data rate to each client. The blanket topology enables seamless mobility by eliminating the delays of AP-to-AP handoffs, which benefits real-time, latency-sensitive Publication Date: 6 October 2006/ID Number: G Page 11 of 18

12 applications such as VoWLAN. Extricom s approach is also able to create multiple overlapping channel blankets, from the same switch and set of APs, to deliver better QOS through the assignment of separate physical channels to different applications or user types (such as voice/data or b/g/a) While this architecture addresses interference problems, it does limit the scalability of the solution. Extricom controllers require APs to be directly connected (it operates at Layer 2 only) and its biggest controller supports 24 access points. In larger deployments, where multiple 24- port controllers are to be deployed, roaming between APs of different controllers may not be seamless. Consider Extricom where WLAN is being deployed to support multiple applications that require predictable bandwidth and RF coverage. Foundry Networks Foundry Networks had been unable to break out of its stagnant position in the WLAN market with its original offering. So, in May 2006, it announced a new WLAN offering in OEM partnership with Meru to make up for the lost ground. This product will not ship in volume till 4Q06. Note that feedback we received from reference customers for this report was based on Foundry's older offering. Foundry continues to target specific, technology-oriented customers interested in high performance and port density for its wired networking products, and its new offering now allows it to sell a latest-generation WLAN platform with all the features that will appeal to its high-end customer segment of wireless networking products. Foundry has the technical foundation to integrate WLAN solutions into its wired offering, but there is little evidence that it is inclined to offer integrated wired and wireless switches based on Meru's platform. Consider purchasing WLAN infrastructure from Foundry if you have deployed its wired networking products. Meru Networks Meru Networks is a fourth-generation network, meaning that network access is controlled by the APs as opposed to the normal CSMA method where client devices control access to the wireless medium. As a result, one of Meru's key strengths continues to be its technical innovation. For example, Meru launched a clever way of intrusion detection without having to deploy dedicated sensors or having to time-slice between sensing and traffic delivery. The capacity advantages that Meru's fourth-generation architecture brings have helped it with initial sales, especially where concerns about voice capacity were important. Japan was a key early market and Meru was able to gain marketing leverage from a large-scale, all-wireless office (voice, PCs and notebooks) at Osaka Gas. Meru expanded its wireless VoIP message to the All Wireless Enterprise theme in North America and elsewhere. Yet marketing and awareness remain challenges, as well as its need to prove that the processing burden placed on its controllers by its technology can scale to the largest systems. Its biggest controller supports 150 APs. Meru is offering QOS on an application basis, going beyond the e standard, which only specifies QOS per device. In our survey of end-user organizations, we found that two of Meru's features resonate particularly well in the market: 1. RF coordination (no co-channel interference, roaming capabilities and capability to handle b and g clients without forcing the g clients down to b). Publication Date: 6 October 2006/ID Number: G Page 12 of 18

13 2. Capacity (number of clients per AP). These features are especially attractive where the number of users per AP cannot be ascertained and different types of applications are being run on a WLAN. Meru will appeal to those organizations that have a clear preference for voice capabilities. Its architecture is also suitable for denser deployments where network connection requirements are difficult to predict. Nortel Networks Nortel Networks began 2004 as Airespace's primary sales channel and quickly positioned itself as one of Cisco's closest competitors in capturing enterprise business. It was the only vendor that seemed to garner share away from competitors. But Cisco's acquisition of Airespace left Nortel scrambling to explain to its clients what had happened and trying to find a replacement for Airespace. Nortel then entered an agreement with Trapeze to resell its WLAN products, but it did not start selling the new offering till 4Q05. Although Nortel is in a better position than most other wired networking vendors to sell more WLANs (given that a large number of enterprises like to purchase wired and wireless LAN products from the same vendor), it sales force is not selling WLAN aggressively. To attract business from its own client base, it is important for Nortel to make WLAN a more strategic imperative within the company. As wireless voice over IP (VoIP) becomes a compelling proposition in the enterprise space, it could gain some market notoriety through its presence in the IP-private branch exchange (IP-PBX) market. Consider Nortel for WLAN if you have deployed wired networking switches from Nortel. Enterprises that like Trapeze's offering but would like to buy from a more established player can also look toward Nortel. HP Procurve Hewlett-Packard's (HP) Procurve has launched a new WLAN offering based on Symbol's technology. Its original OEM partner for WLAN controller technology, Vernier, has refocused toward network access control (NAC), and for HP to compete more effectively with its competitors, it needed a more committed partner. Symbol was a good match, as it doesn't have wired networking products, while HP needed a controller-based centralized WLAN offering. HP is further ahead of its competitors in terms of integrating wired and wireless management into one console. However, HP's 5300 switch line has a wireless blade, and not one of the latest 5400 series switches that the company is marketing more aggressively. HP Procurve's edge networking switches have proven themselves a strong alternative to Cisco's, with the company's most significant successes coming in the midsize market. Its Layer 2 centralized WLAN offering, derived from a partnership with Symbol, is integrated with its wired offering, including support from HP's management and security components. HP's management products are its hallmark, enabling it to coordinate protection of the network by controlling wired defensive actions based on wireless events and vice versa. However, its management products could provide more depth and improvement to the user interface. HP Procurve also sometimes suffers from poor awareness within the context of its larger parent. HP's recent announcement regarding WLAN design services for Cisco's WLAN products proves that the parent company has little faith in HP Procurve's offering. This leads to the conclusion that the group will be spun off from HP at some point. However, due to new management and the solid profitability of the group, we believe this action will be deferred and need not be a concern for buyers. HP Procurve's centralized WLAN offering will only appeal to its existing customers that have deployed 5300 series switches, although HP Procurve has plans to launch a similar WLAN blade for the 5400 series. Also, organizations looking toward Symbol handhelds and who desire a Publication Date: 6 October 2006/ID Number: G Page 13 of 18

14 single vendor footprint across the carpeted and non-carpeted areas (manufacturing floors and so on) can consider HP Procurve. Siemens Siemens has now fully absorbed Chantry following the recent acquisition. However, this has not significantly improved Siemens stand-alone WLAN sales, thanks to a variety of other events that stand to confuse buyers. Siemens is a reseller for many data-networking vendors, including Cisco, Nortel, Extreme, Foundry and Huawei. Recently, Siemens also announced a global strategic alliance and master reseller agreement with 3Com to integrate and sell 3Com's data networking and enterprise security products and services (via Siemens direct sales organization and indirect channels). As one of the integration initiatives, the Siemens HiPath Wireless portfolio will be integrated with 3Com's TippingPoint IPS, and 3Com will certify the interoperability of Siemens' HiPath WLAN and its network management platform. 3Com also has an OEM partnership with Trapeze for WLAN. After the recent merger of the Siemens network infrastructure business with Nokia, many called into question the future of Siemens' enterprise networking business. The prognosis for this business is still uncertain, and it will hurt business opportunities until Siemens can make it clear to buyers what direction this venture will take. Siemens' product marketing has been lukewarm, with little visibility in the deals we have reviewed. Siemens' WLAN products have been deployed in some large networks. However, most of the sales were in Western Europe and have been generated from "pull through" sales of existing and new HiPath PBX sales. Our customer survey indicates that Siemens customers like centralized management features, such as detailed reporting capabilities on AP status and users that are connected to the network. However, some work is required on the display of this data. Customers are also happy with the ease of configuration of WLAN networks using Siemens products. Siemens will find many applications where WLAN technology will be integrated into its core products, including healthcare and building monitoring. WLAN technology may be sold in a manner similar to the way Symbol sells its WLAN, as part of a vertically oriented system. This latter approach is most relevant for prospective buyers. Symbol Technologies Symbol Technologies has maintained its presence in the WLAN market largely thanks to years of experience in wireless, especially in vertical market systems in combination with its handhelds sales. It is currently the No. 2 player in this space. Symbol has tried to expand beyond its traditional markets, but its lack of wired equipment and poor brand recognition in the networking market have hindered those efforts. Symbol did well to scale back those efforts and instead construct a partnership with HP, where it now has an outlet to address organization-wide deployments of WLAN. It has also worked with IBM to supply a controller blade for the eserver product to address the needs of retail companies. Symbol plans to add a Layer 3 mobility service in 4Q06, which will broaden its offering. It also plans to integrate other network types such as Zigbee, cellular and WiMAX through its Wireless Next Generation (Wi-NG) architecture to give organizations a more cost-effective means to roam across a variety of networks. This direction of integrating multiple wireless technologies fits with a key theme of Motorola's (Motorola recently made an announcement to acquire Symbol, see "Motorola/Symbol Deal Will be Challenging, Though Promising"). Symbol's centralized WLAN offering with thin AP architecture delivers a low cost per square foot, and Wi-NG will continue this effort. Publication Date: 6 October 2006/ID Number: G Page 14 of 18

15 Symbol can support a variety of client devices, but it is in combination with its handhelds that clients will reap the greatest benefit from their Wi-Fi products. Symbol's Mobile Services Platform (MSP) provides customers with a strong management tool that combines both handheld and WLAN infrastructure management under one offering. Symbol has also done some work in the voice integration segment, and has more practical experience than many of its competitors, though this lead may not last for long. Symbol's WLAN offering appeals to vertical markets such as manufacturing, retail and healthcare, where it sells its handhelds. Trapeze Networks Trapeze Networks has improved its position most, primarily thanks to a rearchitecting of its distribution strategy. Trapeze's products are sold through one of its two major channels consisting of OEMs and resellers. Its OEMs 3Com, Enterasys and Nortel are expected to be joined by at least one other partner by the end of These vendors "private label" the product and market the WLAN offerings' integration with one or more of their core offerings, such as their wired infrastructure, management tools and/or voice systems. Trapeze also sells its own brand through its resellers. Channel management is accomplished naturally through the various players' differentiated services and complimentary capabilities against the OEM offerings. Yet Trapeze, by its own admission, would like to increase its reseller sales, an effort that in our opinion will require differentiating the offering from what is supplied to the OEMs. How it manages this effort will determine whether it can rise to the top tier among the startup vendors. A new Trapeze marketing organization is expected to tackle this issue, along with raising overall brand awareness. Trapeze has long been known for its management product, RingMaster, yet our user surveys showed that it lost sales due to perceived weakness in this area. We believe this was due to a poor organization of the features in the product, a problem that has since been rectified. Trapeze has shored up its wireless intrusion detection system (IDS)/IPS through a partnership with AirDefense, enabling roll-up of AirDefense alarms directly in the RingMaster console, as well as on-the-fly conversion of APs to sensors (since both companies use the same AP hardware supplier). Trapeze also promotes a distributed forwarding architecture where APs decrypt the frame and tunnel the decrypted frame to a central controller where forwarding decisions take place. But it has done so by claiming centralized encryption approaches are less effective from a networking perspective. We expect Trapeze to become less prescriptive in its sales approach and move instead to emphasize the fact that it offers a great range of choices that should appeal to buyers. Furthermore, any one approach taken by a buyer at the outset can be transformed once the product is installed. This flexibility should help the company grow in the coming year but, as mentioned earlier, it will be a marketing challenge to craft these messages to become more broadly understood. Xirrus Xirrus is one of the late entrants to the WLAN market. It has developed a WLAN array, which has multiple directional radios. Its design combines an onboard WLAN switch and up to 16 Integrated APs with a high-gain, multi-sector antenna system. With this architecture, the number of devices to be deployed will be reduced, especially when deploying for higher capacity (such as in a lecture hall). Xirrus's management suite can control up to 500 arrays and is primarily for infrastructure management (configuration, firmware upgrades and reporting); not specifically for RF management. Each array is responsible for managing the RF environment and roaming of clients between APs and between APs on different arrays. Consider this solution when pulling cable to individual AP locations may not be feasible, but one array with multiple APs can meet the requirements. Publication Date: 6 October 2006/ID Number: G Page 15 of 18

16 RECOMMENDED READING "Magic Quadrants and MarketScopes: How Gartner Evaluates Vendors Within a Market" Acronym Key and Glossary Terms AES AP BSSID CA CSMA IDS IEEE IP-PBX IPS MIMO MSP NAC QOS RF SOHO SMB VoIP VoWLAN VPN WCS WEP WLAN Advanced Encryption Standard access point Basic Service Set Identifier Collision Avoidance Carrier Sense Multiple Access intrusion detection system Institute of Electronic and Electrical Engineers IP-private branch exchange intrusion prevention system multiple input, multiple output Mobile Services Platform network access control quality of service radio frequency small office/home office small and midsize business voice over IP voice over WLAN virtual private network wireless control system Wired Equivalent Privacy wireless LAN WPA2 Wi-Fi Protected Access 2 Evaluation Criteria Definitions Ability to Execute Product/Service: Core goods and services offered by the vendor that compete in/serve the defined market. This includes current product/service capabilities, quality, feature sets and skills, Publication Date: 6 October 2006/ID Number: G Page 16 of 18

17 whether offered natively or through OEM agreements/partnerships as defined in the market definition and detailed in the subcriteria. Overall Viability (Business Unit, Financial, Strategy, Organization): Viability includes an assessment of the overall organization's financial health, the financial and practical success of the business unit, and the likelihood of the individual business unit to continue investing in the product, to continue offering the product and to advance the state of the art within the organization's portfolio of products. Sales Execution/Pricing: The vendor s capabilities in all pre-sales activities and the structure that supports them. This includes deal management, pricing and negotiation, pre-sales support and the overall effectiveness of the sales channel. Market Responsiveness and Track Record: Ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the vendor's history of responsiveness. Marketing Execution: The clarity, quality, creativity and efficacy of programs designed to deliver the organization's message in order to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This "mind share" can be driven by a combination of publicity, promotional, thought leadership, word-of-mouth and sales activities. Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups and service-level agreements. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Completeness of Vision Market Understanding: Ability of the vendor to understand buyers' wants and needs and to translate those into products and services. Vendors that show the highest degree of vision listen and understand buyers' wants and needs, and can shape or enhance those with their added vision. Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the Web site, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling product that uses the appropriate network of direct and indirect sales, marketing, service and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: The vendor's approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature set as they map to current and future requirements. Business Model: The soundness and logic of the vendor's underlying business proposition. Vertical/Industry Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including verticals. Publication Date: 6 October 2006/ID Number: G Page 17 of 18

18 Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. Geographic Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market. REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 6 October 2006/ID Number: G Page 18 of 18

Magic Quadrant for Global Enterprise Desktops and Notebooks

Magic Quadrant for Global Enterprise Desktops and Notebooks Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main

More information

Ability to Execute. What You Need to Know

Ability to Execute. What You Need to Know 1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Unlike the general notebook market, in which

Unlike the general notebook market, in which Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook

More information

Magic Quadrant for Higher Education Administrative Suites, 2005

Magic Quadrant for Higher Education Administrative Suites, 2005 Industry Research Publication Date: 21 November 2005 ID Number: G00131715 Magic Quadrant for Higher Education Administrative Suites, 2005 Marti Harris, Michael Zastrocky With Oracle's acquisition of PeopleSoft,

More information

MarketScope for Wireless LAN Intrusion Prevention Systems, 1H06

MarketScope for Wireless LAN Intrusion Prevention Systems, 1H06 Research Publication Date: 24 May 2006 ID Number: G00138790 MarketScope for Wireless LAN Intrusion Prevention Systems, 1H06 Rachna Ahlawat This market will double in size in 2006 as more organizations

More information

Magic Quadrant for Wireless LAN Infrastructure, 2007

Magic Quadrant for Wireless LAN Infrastructure, 2007 Magic Quadrant for Wireless LAN Infrastructure, 2007 Gartner RAS Core Research Note G00153883, Michael J. King, Ken Dulaney, 20 December 2007 R2588 3282008 Wireless LAN technologies have earned a place

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

Magic Quadrant for Enterprise LAN (Global)

Magic Quadrant for Enterprise LAN (Global) Research Publication Date: 30 April 2009 ID Number: G00166799 Magic Quadrant for Enterprise LAN (Global) Mark Fabbi, Tim Zimmerman Cisco remains the leader in the enterprise LAN Magic Quadrant, but a stratification

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

Magic Quadrant for Wireless LAN, 2H03. Evaluation Criteria

Magic Quadrant for Wireless LAN, 2H03. Evaluation Criteria Markets, K. Dulaney, R. Ahlawat, K. Hiller Research Note 13 August 2003 Magic Quadrant for Wireless LAN, 2H03 The market for wireless LAN products is entering a new phase in which it is no longer viewed

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

Emerging PC Life Cycle Configuration Management Vendors

Emerging PC Life Cycle Configuration Management Vendors Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

Case Study & POC & Demos Information

Case Study & POC & Demos Information Case Study & POC & Demos Information Type: Case Study Name: Multichannel Campaign Management (MCCM) Description: The IBM Company seeks, as vendor, through the multichannel campaign management (MCCM) services,

More information

MarketScope for IT Governance, Risk and Compliance Management, 2008

MarketScope for IT Governance, Risk and Compliance Management, 2008 Research Publication Date: 11 February 2008 ID Number: G00154941 MarketScope for IT Governance, Risk and Compliance Management, 2008 Paul E. Proctor, Mark Nicolett, French Caldwell The IT GRCM market was

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

Discovering the Value of Unified Communications

Discovering the Value of Unified Communications Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

Magic Quadrant for Enterprise LAN (Global)

Magic Quadrant for Enterprise LAN (Global) Research Publication Date: 8 August 2011 ID Number: G00213980 Magic Quadrant for Enterprise LAN (Global) Mark Fabbi, Tim Zimmerman Cisco still leads in global enterprise LAN, but all vendors continue to

More information

Toolkit: Checklist: Choosing Wireless Broadband Technologies for the Enterprise Campus

Toolkit: Checklist: Choosing Wireless Broadband Technologies for the Enterprise Campus Gartner for IT Leaders Publication Date: 22 September 2006 ID Number: G00143395 Toolkit: Checklist: Choosing Wireless Broadband Technologies for the Enterprise Campus Robin Simpson Wi-Fi mesh solutions

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

So, Why Meru? Some key points are: Our customers. Technology leadership.

So, Why Meru? Some key points are: Our customers. Technology leadership. Thank you for enquiring about becoming a Meru EMEA Partner. So, Why Meru? Some key points are: Serving our customers is why we exist. We have technology that is unique in the wireless market. We only sell

More information

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Research Publication Date: 12 February 2008 ID Number: G00154811 Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Steve Blood Companies spend too much on IP-PBXs

More information

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical

More information

GARTNER FOR TECHNOLOGY INVESTORS

GARTNER FOR TECHNOLOGY INVESTORS GARTNER FOR TECHNOLOGY INVESTORS INVESTORS NEED TO KNOW MORE New globalization trends are impacting the strategies of investment professionals, rearranging priorities and posing new things to consider.

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Key Issues for Consumer Goods Manufacturers, 2011

Key Issues for Consumer Goods Manufacturers, 2011 Industry Research Publication Date: 1 March 2011 ID Number: G00210698 Key Issues for Consumer Goods Manufacturers, 2011 Don Scheibenreif, Dale Hagemeyer Gartner's 2011 consumer goods manufacturing research

More information

The Seven Building Blocks of MDM: A Framework for Success

The Seven Building Blocks of MDM: A Framework for Success Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)

More information

Magic Quadrant for Corporate Telephony in EMEA, 2003

Magic Quadrant for Corporate Telephony in EMEA, 2003 Markets, S. Blood, C. Lock Research Note 2 September 2003 Magic Quadrant for Corporate Telephony in EMEA, 2003 Cisco and Alcatel continue to offer the market's most comprehensive corporate propositions.

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references

More information

NGFWs will be most effective when working in conjunction with other layers of security controls.

NGFWs will be most effective when working in conjunction with other layers of security controls. Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

Use These Guidelines for Making Better CRM Consulting Provider Selections

Use These Guidelines for Making Better CRM Consulting Provider Selections Research Publication Date: 7 July 2006 ID Number: G00141062 Use These Guidelines for Making Better CRM Consulting Provider Selections Matthew Goldman, Ed Thompson, Lorrie Scardino Gartner sees many inconsistencies

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM 1 of 5 10/11/2010 9:44 AM 27 April 2010 Mark Fabbi Gartner RAS Core Research Note G00200313 With the completion of the 3Com acquisition, HP will become a formidable competitor across the entire enterprise

More information

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and

More information

Toolkit: Tutorial: Comparing Wireless Broadband Technologies for the Enterprise Campus

Toolkit: Tutorial: Comparing Wireless Broadband Technologies for the Enterprise Campus Gartner for IT Leaders Publication Date: 22 September 2006 ID Number: G00143195 Toolkit: Tutorial: Comparing Wireless Broadband Technologies for the Enterprise Campus Robin Simpson Since early 2005, colleges

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New

More information

EHR Advantages and Disadvantages

EHR Advantages and Disadvantages Industry Research Publication Date: 3 February 2010 ID Number: G00174011 The Limits of Certification and Guarantees in Buying Electronic Health Records in the U.S. Wes Rishel It is important not to rely

More information

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

Overcoming the Gap Between Business Intelligence and Decision Support

Overcoming the Gap Between Business Intelligence and Decision Support Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision

More information

Magic Quadrant for Higher Education Administrative Suites, 2006

Magic Quadrant for Higher Education Administrative Suites, 2006 Industry Research Publication Date: 26 September 2006 ID Number: G00143221 Magic Quadrant for Higher Education Administrative Suites, 2006 Marti Harris, Michael Zastrocky, Jan-Martin Lowendahl Higher education

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

Successful EA Change Management Requires Five Key Elements

Successful EA Change Management Requires Five Key Elements Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Cloud, SaaS, Hosting and Other Off-Premises Computing Models Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

Real-Time Decisions Need Corporate Performance Management

Real-Time Decisions Need Corporate Performance Management Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends

More information

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with

More information

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions. Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information

More information

The 2H05 Magic Quadrant for managed

The 2H05 Magic Quadrant for managed Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Research Publication Date: 24 March 2008 ID Number: G00156216 Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Tom Austin Both Google and Microsoft come up short in terms of delivering

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms

Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Gartner RAS Core Research Note G00158295, French Caldwell, Tom Eid, 30 June 2008, R2799 07092009 The market for enterprise governance,

More information

Research. Mastering Master Data Management

Research. Mastering Master Data Management Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

NAC Strategies for Supporting BYOD Environments

NAC Strategies for Supporting BYOD Environments G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach

More information

Magic Quadrant for Application Delivery Controllers

Magic Quadrant for Application Delivery Controllers Research Publication Date: 25 July 2008 ID Number: G00158570 Magic Quadrant for Application Delivery Controllers Mark Fabbi, Joe Skorupa The market for products to improve the delivery of application software

More information

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Industry Research Publication Date: 11 February 2009 ID Number: G00164764 Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Jeff Vining Government CIOs are under increasing

More information

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Research Publication Date: 31 July 2009 ID Number: G00168488 Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Carsten Casper, Thomas Otter, Arabella Hallawell The vast majority (probably greater

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

Magic Quadrant for Wireless LAN Infrastructure (Global)

Magic Quadrant for Wireless LAN Infrastructure (Global) Magic Quadrant for Wireless LAN Infrastructure (Global) Gartner RAS Core Research Note G00172502, Tim Zimmerman, Michael J. King, 12 February 2010, R3288 02192011 The ratification of the 802.11n standard

More information

Gartner Clarifies the Definition of the Term 'Enterprise Architecture'

Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,

More information

Understanding Vulnerability Management Life Cycle Functions

Understanding Vulnerability Management Life Cycle Functions Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability

More information

How BPM Can Enhance the Eight Building Blocks of CRM

How BPM Can Enhance the Eight Building Blocks of CRM Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's

More information

Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network

Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network Solution Overivew Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network EXECUTIVE SUMMARY Today s businesses are turning to wireless networking to give employees immediate

More information

How to Choose Providers for Mobile Consumer Application Platforms

How to Choose Providers for Mobile Consumer Application Platforms How to Choose Providers for Mobile Consumer Application Platforms Michael McGuire Lead Author Michael McGuire,, Mike McGuire guides digital marketers on best practices for developing strategies. He specializes

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s

More information

Magic Quadrant for North American Corporate Telephony, 2005

Magic Quadrant for North American Corporate Telephony, 2005 Research Publication Date: 12 August 2005 ID Number: G00129308 Magic Quadrant for North American Corporate Telephony, 2005 Jay Lassman, Rich Costello, Jeff Snyder 2005 represents a turning point for enterprise

More information

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Research Publication Date: 23 April 2008 ID Number: G00156910 XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Nigel Rayner, Neil Chandler Extensible Business Reporting Language

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

MarketScope for IT Governance, Risk and Compliance Management, 2008

MarketScope for IT Governance, Risk and Compliance Management, 2008 MarketScope for IT Governance, Risk and Compliance Management, 2008 Gartner RAS Core Research Note G00154941, Paul E. Proctor, Mark Nicolett, French Caldwell, 11 February 2008, RA7 03032009 The IT GRCM

More information

Gartner Updates Its Definition of IT Infrastructure Utility

Gartner Updates Its Definition of IT Infrastructure Utility Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some

More information

2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise

2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise Research Publication Date: 23 July 2009 ID Number: G00169733 2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise John E. Van Decker Extensible Business Reporting Language (XBRL) will be a requirement

More information

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you

More information