Magic Quadrant for Application Delivery Controllers
|
|
|
- Felicia Lawson
- 10 years ago
- Views:
Transcription
1 Research Publication Date: 25 July 2008 ID Number: G Magic Quadrant for Application Delivery Controllers Mark Fabbi, Joe Skorupa The market for products to improve the delivery of application software over networks remains dynamic and innovative. Vendors focused on solving enterprises' most-pressing application problems have become the top players. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.
2 WHAT YOU NEED TO KNOW The key criterion in the Magic Quadrant for Application Delivery Controllers focuses on a vendor's capability to resolve important application challenges in the enterprise. Vendors at the forefront of these changes will emerge as more-viable and stronger. MAGIC QUADRANT Figure 1. Magic Quadrant for Application Delivery Controllers Source: Gartner (July 2008) Market Overview The market for network-based solutions to optimize the delivery of applications across the network continues to develop rapidly, and our expectations increase with each revision of the Magic Quadrant. As a result, the Magic Quadrant axis depicts a noticeable shift up and to the right with each revision. Consequently, vendors must progress to maintain their positions in the new Magic Quadrant. New applications of the application delivery controller (ADC) technology continue to emerge, reflecting the significant innovation in the market. These technologies apply across a growing base of enterprise applications that may or may not use the Internet at all, or have little or no roots in Internet and browser-based technologies. Although the market emerged from loadbalancing solutions to improve the availability and reliability of Web sites, the time has long Publication Date: 25 July 2008/ID Number: G Page 2 of 14
3 passed since load balancing and Secure Sockets Layer (SSL) termination for basic HTML traffic were viable by themselves. Browser-based applications often are a major impetus to investing in these technologies; however, many enterprise applications that appear to be browser-based actually employ thick clients that run in the browser, that don't run over HTTP(S) or have the capability to bypass browser capabilities, such as compression. The emergence of Ajax and other rich-client interfaces further complicates the environment. As a result, there's a need for solutions with broader payload parsing, as well as inspection and optimization techniques, including client-resident software. ADCs reside in the data center, typically ahead of frontline Web servers. They're deployed asymmetrically (only at the data center end) and are designed to improve the availability, performance and security of Web-based or IP-based applications. ADCs enhance the performance of Web-based and related applications for end users by providing a suite of services at the network and application layers. These services may include: Layer 4 through Layer 7 redirection and load balancing and failover TCP connection multiplexing Server offload (for example, SSL termination and TCP connection management) Data compression Network-address translation Network-level security functions, distributed denial-of-service protection and server cloaking Compression Caching A more-advanced class of ADCs, advanced platform ADCs (AP ADCs), operate on a pertransaction basis and achieve application fluency. These devices become actively involved in delivering the application and providing sophisticated capabilities, including: Application layer proxy, which is often bidirectional and stateful Content transformation Adaptive compression Selective caching of dynamic content HTML or other application protocol optimizations Web application firewall XML validation and transformation Rules and programmatic interfaces AP ADCs provide simplified deployment and extensibility, and are being deployed between the Web server tier and the application or services tier (for service-oriented architecture [SOA] servers). Publication Date: 25 July 2008/ID Number: G Page 3 of 14
4 Most AP ADCs incorporate rule-based extensibility that enables the customer to customize the behavior of the AP ADC. For example, a rule might enable the AP ADC to examine the response portion of an e-commerce transaction, and strip off all but the last four digits of credit card numbers. In some cases, organizations are using these capabilities as an alternative to modifying Web applications. Many AP ADCs incorporate a programmatic control interface (open application programming interfaces APIs) that enables them to be controlled by external systems, including application servers, data center management and provisioning applications, and network and system management applications. This capability may be used for regular, periodic reconfigurations (such as end-of-month closing) or may be driven by external events (such as taking an instance of an application offline for maintenance). In some cases, the APIs link the AP ADC to server virtualization systems and data center provisioning frameworks to deliver the promise of real-time infrastructure. In the past, application delivery services from vendors such as Akamai and Netli were included in this analysis. However, application delivery services have evolved to the point where they're much more complementary, rather than competitive, to the equipment offerings analyzed herein. We expect that application delivery services will emerge as a separate category. Market Definition/Description ADCs provide a set of functions to optimize enterprise application environments. The market evolved from the load-balancing systems that were specifically developed to ensure the availability and scalability of Web sites. Enterprises use ADCs to optimize reliability, end-user performance, data center resource use and security for a variety of enterprise applications. Inclusion and Exclusion Criteria Criteria for inclusion in the Magic Quadrant for Application Delivery Controllers include: Added None The vendor has released products for general availability, and has demonstrated its commitment to this market. The vendor is focused on delivering solutions to the enterprise market, and demonstrates relevance to Gartner clients. The vendor must have achieved at least 2% market revenue share in the overall ADC market, or in the AP ADC market, in Dropped Akamai was removed because we believe that its service-based offerings are more complementary with, rather than a replacement approach to, ADC technology. Akamai's Web Application Accelerator and IP Application Accelerator represent interesting approaches to accelerating applications across the Internet, especially to users outside the enterprise's control. Array Networks was removed because it failed to meet our newly introduced revenue/market share requirements. Crescendo Networks was removed because it also failed to meet our newly introduced revenue/market share requirements. Publication Date: 25 July 2008/ID Number: G Page 4 of 14
5 Coyote Point was removed because it missed the revenue requirements, and, for the most part, targets midmarket solutions. However, it remains an attractive vendor for smaller organizations that are looking for a cost-effective, integrated ADC solution. Juniper Networks was dropped because of its announcement that it would discontinue its DX product line. NetContinuum was dropped because it was acquired by Barracuda Networks in 2007, and because its revenue doesn't meet our requirements. Barracuda also targets midmarket opportunities. Evaluation Criteria Ability to Execute We analyze the vendor's capabilities across broad business functions (see below). Vendors that have expanded their products across a wider range of protocols and applications, have improved service and support capabilities, and have focused on improving enterprise applications will be more highly rated in the Magic Quadrant analysis. Product/Service evaluates the capabilities of the products or solutions offered to the market. Key items to be considered for the application delivery market are how well the products address enterprise application needs, the breadth of the products (in terms of different functions), and scale from entry-level products to high-end products. We also look at the level of integration, flexibility and innovation that the vendor demonstrates in its products. We include products that provide load balancing, SSL termination, connection management, compression, protocol manipulation, global redirection, some aspects of security enforcement and other related technologies, including Ajax and other rich-client technologies. A key aspect that demonstrates continued execution in this area is how the vendor expands the types of applications that are optimized. Although we don't expect vendors to have every technology option in their products, we do expect them to offer a comprehensive and flexible solution for enterprises that clearly demonstrates a focus on enhancing enterprise applications. Overall Viability includes an assessment of the organization's financial health, the financial and practical success of the business unit, and the likelihood that the individual business unit will continue to invest in the product, offer the product and advance the state of the art in the organization's portfolio of products. Sales Execution/Pricing looks at the vendor's capability to get the product into the market efficiently. In this market, we look for specialist capabilities that is, a vendor and associated channels that can understand and deliver solutions for optimizing a range of data center applications. Having strong field sales and engineering to supplement specialist channels will help vendors in this area. As product complexity grows, a comprehensive professional service offering has emerged as an important factor. Another factor involves partnerships with leading application providers or system integrators (SIs) that provide bundled solutions to the enterprise. In this emerging market, to date, pricing is a secondary decision criterion, although, as the market matures and expands to include small and midsize businesses, customer pricing will become more important. Market Responsiveness and Track Record focuses on the vendor's capability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the provider's history of responsiveness. Publication Date: 25 July 2008/ID Number: G Page 5 of 14
6 Marketing Execution measures the clarity, quality, creativity and efficacy of programs that are designed to deliver the organization's message to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification of the product/brand and organization in the minds of buyers. This "mind share" can be driven by a combination of publicity, promotional, thought leadership, word-of-mouth and sales activities. Customer Experience looks at a vendor's capability to deal with post-sales issues. Because of the specialized nature of the application delivery market, and the impact of product bugs on an enterprise's capability to conduct critical business functions, vendors are expected to escalate and respond to issues in a timely fashion with dedicated and specialized resources, and to have detailed expertise in many specific application environments. Another consideration is a vendor's capability to deal with increasing global demands. Additional support tools and programs are indications of a maturing approach to the market. Operations looks at the organization's capability to meet its goals and commitments. Factors include the quality of the organizational structure, including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Bottom Line: Ability to Execute reflects the market conditions and, to a large degree, it is our analysis and interpretation of what we hear from the market. Our focus is assessing how a vendor participates in the day-to-day activities of the market. Table 1. Ability to Execute Evaluation Criteria Evaluation Criteria Product/Service Overall Viability (Business Unit, Financial, Strategy, Organization) Sales Execution/Pricing Market Responsiveness and Track Record Marketing Execution Customer Experience Operations Source: Gartner (July 2008) Weighting high low Completeness of Vision These criteria have been fine-tuned to reflect the expanding use of these technologies in the enterprise. Market Understanding looks at the technology provider's capability to understand buyers' needs and to translate those needs into products and services. Vendors that show the highest degree of vision listen to and understand buyers' wants and needs, and can shape or enhance those wants and needs with their added vision. As an example of the expectations in this category, we look at how vendors have enhanced their portfolios to address new application environments. Marketing Strategy examines the messages and methods that the vendor uses to disseminate these messages. Are the messages clear and differentiated? Are they consistently communicated throughout the organization, and externally through the Web site, advertising, customer programs and positioning statements? Publication Date: 25 July 2008/ID Number: G Page 6 of 14
7 Product Strategy looks at a vendor's product road map and architecture, which we map against our view of enterprise requirements. We expect product direction to focus on optimizing enterprise application performance and security. Specific technologies may include connection management, security enforcement, application enhancements, and emerging solutions for enterprise WAN deployment and related technologies. The timely incorporation of new application architectures (such as SOA, Web services, Ajax and SIP) also contributes to this score. Business Model assesses a vendor's approach to the market. Does the vendor have an approach that enables it to scale the elements of its business (for example, development, sales/distribution and manufacturing) cost-effectively, from startup to maturity? Does the vendor understand how to leverage key assets to grow profitably? Can it gain additional revenue by charging separately for optional, high-value features? Other key attributes in this market would be reflected in how the vendor uses partnerships to increase sales. The capability to build strong partnerships with a broad range of application vendors and associated SIs would demonstrate leadership. Innovation measures a vendor's capability to move the market into new solution areas, and to define and deliver new technologies. In the application delivery market, innovation is key to meet rapidly expanding requirements, and to keep ahead of new (and often more-agile) competition. Bottom Line: Completeness of Vision distills a vendor's view of the future, the direction of the market and the vendor's role in shaping that market. We expect the vendor's vision to be compatible with our view of the market's evolution. A vendor's vision of the evolution of the data center and the expanding role of ADCs in an SOA are important criteria. In contrast to how we measure Ability to Execute criteria, more of the rating for vision is based on direct vendor interactions, and on our analysis of the vendor's view of the future. Table 2. Completeness of Vision Evaluation Criteria Evaluation Criteria Market Understanding Marketing Strategy Sales Strategy Offering (Product) Strategy Business Model Vertical/Industry Strategy Innovation Geographic Strategy Source: Gartner (July 2008) Weighting low no rating no rating no rating Leaders A leader has exhibited the ability to shape the market by introducing additional capabilities in its product offerings, and by raising awareness of the importance of these features. Key capabilities for a leader revolve around the AP ADC capabilities that focus on enterprise application capabilities. We expect a leader to have strong or growing market share, especially in the AP ADCs, and to have solutions that resonate with an increasing number of enterprises. Expertise in complex data center application deployment also is a necessity to be a leader in the Magic Quadrant for Application Delivery Controllers. Publication Date: 25 July 2008/ID Number: G Page 7 of 14
8 Challengers A challenger in this market would be a follower from a product or innovation perspective, but it has also demonstrated the capability to take its products into the market and show their relevance to a wide audience. Visionaries Visionaries are vendors that have provided key elements of innovation, and can be illustrative of the future of the market. However, they lack the capability to influence a large portion of the market; they haven't expanded their sales and support capabilities on a global basis; or they don't have the funding to execute with the same capabilities as a vendor in the Leaders quadrant. Examples of innovation would be the capability to deal with XML traffic, or an early developer of client capabilities. Niche Players Niche players provide a more-limited set of capabilities, and haven't demonstrated enough vision or focused execution to warrant a stronger position in our analysis. Vendor Strengths and Cautions Cisco Strengths Installed base of Content Services Switch/Content Switching Module (CSS/CSM). Broad product portfolio related to the ADC market. Cisco's overall market presence and brand. Cisco has demonstrated and staked out a vision for virtualized ADC capabilities before the rest of the ADC market. These features will be especially useful in shared environments, particularly service providers and hosted facilities. Cautions Cisco has developed several application reference implementations with software vendors (for example, Data Center Assurance Program for applications); however, according to Gartner clients, this hasn't resulted in the necessary field expertise in complex data center application deployments. This severely limits Cisco's capability to advise and support its customer base in this market. A poor track record in all aspects of application networking (see "Cisco Application Networking Services: Enterprises Must Demand Continued Execution"), coupled with a lack of feature consistency across disparate products. Cisco only recently introduced a single model for AP ADC (Application Control Engine [ACE] 4710), lagging the market by more than three years. Cisco's market share in AP ADCs is 5%, and in the past year, it has ranged between 4% and 5.7%. The ACE module is only a basic server load balancer, and it took Cisco the better part of a year to get it enterprise-ready. AP capabilities are limited to the ACE Cisco has few references for this new product, thereby indicating that it isn't mature. Publication Date: 25 July 2008/ID Number: G Page 8 of 14
9 Citrix Current virtualization capabilities are incomplete on the ACE 4710 because they don't provide protection and isolation of advanced features among virtualized environments, thereby limiting the appliance's usefulness in enterprise deployments. Strengths Solid AP ADC with excellent performance, combined with leading client code. Broad product line, including highly scalable multisystem clusters. Easy-to-use rule engine (AppExpert) makes complex tasks achievable without extensive programming. Global presence (channel partners and direct partners) for sales and support. Aggressive marketing, highly regarded support and strong reference accounts, including large public Internet sites, as well as large corporate intranet applications. Excellent understanding of the market and its needs, today and from now on. Cautions F5 Citrix must demonstrate that its channel can sell an application networking product with the complexity of NetScaler. Three years after the acquisition of NetScaler, Citrix hasn't demonstrated any significant leverage with its core channels. Citrix must continue to demonstrate that NetScaler's software and merchant siliconfocused design can keep up with competitors that add custom silicon to boost performance, particularly for deep packet examination. Citrix must continue to invest in the broad capabilities of the NetScaler platform, and ensure that it isn't only perceived as a Citrix XenApp/XenDesktop optimization engine. Strengths Offers the most feature-rich AP ADC, combined with excellent performance and programmability via irules and a broad product line. Strong focus on applications, including long-term relationships with major application vendors, including Microsoft, Oracle and SAP. Strong balance sheet and cohesive management team with a solid track record for delivering the right products at the right time. Strong underlying platform that makes it easy to deploy basic services, and enables extensibility to add features. Supports an increasingly loyal and large group of active developers that tune their application environments specifically with F5's infrastructure. Publication Date: 25 July 2008/ID Number: G Page 9 of 14
10 Cautions The Big-IP Product Family is so feature-rich that it can be intimidating to some customers, and F5's highly extensible platform requires a highly skilled staff to get the most out of the product. F5 must improve its marketing to differentiate itself from the competition, and to drive greater use of its advanced features among its installed base. F5's advanced features are attractive, but licensing options create an expensive solution. F5 must deliver a competitive response to rivals that offer a "pay as you grow" strategy for entry-level systems. Foundry Networks Strengths Reliable, high-performance, low-cost ADC platform. We often see Foundry front-ending software infrastructure components, and in hosting environments where a set of reliable, low-cost features is a key requirement. Foundry has added a basic set of application performance optimization features, and has increased its attention and focus on the application delivery market. Good technical support of product and network-level integration. Cautions Nortel Little extensibility in the platform limits deployment to deployment models. Predominant focus is on load balancing, rather than on application optimization features. Limited expertise regarding the nuances of complex enterprise application environments. A somewhat confusing array of product offerings in this market. Strengths The Application Accelerator product offers a competitive set of optimization features, including adaptive compression, delta encoding and client cache features. Still has a reasonable installed base of Alteon gear to sell into, and to upgrade. Cautions Little expertise in data center application environments. Nortel has lost any remaining focus and market awareness; consequently, it continues to lose market share. In most cases, the requirement to couple the Application Accelerator with an Application Switch creates a complex, two-box solution. Publication Date: 25 July 2008/ID Number: G Page 10 of 14
11 Radware Strengths Clear vision of the market and the evolution of its product offering. The combination of the AppDirector and AppXcel products provides a strong feature set covering availability, performance and security. New hardware platform, OnDemand Switch, provides significant flexibility in adapting to growing customer requirements for more performance and features. Radware's business smart networks provide some unique transaction and businesslevel features for enterprises attempting to integrate more business-centric decision capabilities into the ADC. A renewed focus on software quality and support has enabled Radware to leave prior operational issues behind. Cautions Although improving, Radware's North American presence is still a weakness. Deployment is complicated due to a lack of integration of the AppDirector and AppXcel software offerings (and underlying hardware platforms). Radware must enable its customers and channels to exploit open APIs to increase the extensibility of its offerings to compete more-effectively in this market. Zeus Technology Strengths Highly scalable clustering via software and off-the-shelf hardware. Broadening technology base and vision, including programmability via Java extensions. Early relationship with VMware gave Zeus a good understanding of dynamic data centers' challenges and opportunities. A strong management team of industry veterans, added during the past 12 months, lends credibility. OEM relationship with Sun Microsystems shows that Zeus understands that it needs strong partners to succeed. Cautions Very limited visibility and distribution in the enterprise market. Limited partnerships and channels mean that Zeus is a riskier choice than many larger and more-established vendors. RECOMMENDED READING "Magic Quadrants and MarketScopes: How Gartner Evaluates Vendors Within a Market" "Cisco Application Networking Services: Enterprises Must Demand Continued Execution" Publication Date: 25 July 2008/ID Number: G Page 11 of 14
12 Vendors Added or Dropped We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor appearing in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. This may be a reflection of a change in the market and, therefore, changed evaluation criteria, or a change of focus by a vendor. Evaluation Criteria Definitions Ability to Execute Product/Service: Core goods and services offered by the vendor that compete in/serve the defined market. This includes current product/service capabilities, quality, feature sets, skills, etc., whether offered natively or through OEM agreements/partnerships as defined in the market definition and detailed in the subcriteria. Overall Viability (Business Unit, Financial, Strategy, Organization): Viability includes an assessment of the overall organization's financial health, the financial and practical success of the business unit, and the likelihood of the individual business unit to continue investing in the product, to continue offering the product and to advance the state of the art within the organization's portfolio of products. Sales Execution/Pricing: The vendor s capabilities in all pre-sales activities and the structure that supports them. This includes deal management, pricing and negotiation, pre-sales support and the overall effectiveness of the sales channel. Market Responsiveness and Track Record: Ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the vendor's history of responsiveness. Marketing Execution: The clarity, quality, creativity and efficacy of programs designed to deliver the organization's message to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This "mind share" can be driven by a combination of publicity, promotional, thought leadership, word-of-mouth and sales activities. Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups, service-level agreements, etc. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Completeness of Vision Market Understanding: Ability of the vendor to understand buyers' wants and needs and to translate those into products and services. Vendors that show the highest degree of vision listen Publication Date: 25 July 2008/ID Number: G Page 12 of 14
13 and understand buyers' wants and needs, and can shape or enhance those with their added vision. Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the Web site, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling product that uses the appropriate network of direct and indirect sales, marketing, service and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: The vendor's approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature set as they map to current and future requirements. Business Model: The soundness and logic of the vendor's underlying business proposition. Vertical/Industry Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including verticals. Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. Geographic Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market. Publication Date: 25 July 2008/ID Number: G Page 13 of 14
14 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 25 July 2008/ID Number: G Page 14 of 14
Magic Quadrant for Higher Education Administrative Suites, 2005
Industry Research Publication Date: 21 November 2005 ID Number: G00131715 Magic Quadrant for Higher Education Administrative Suites, 2005 Marti Harris, Michael Zastrocky With Oracle's acquisition of PeopleSoft,
Magic Quadrant for Global Enterprise Desktops and Notebooks
Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main
Ability to Execute. What You Need to Know
1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact
Magic Quadrant for Application Delivery Controllers
Magic Quadrant for Application Delivery Controllers 18 November 2010 Mark Fabbi, Joe Skorupa Gartner RAS Core Research Note G00207297 The market for ADCs is consolidating. However, innovation continues,
Q&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
How To Choose A Data Center Provider
Magic Quadrant for Application Delivery Controllers Gartner RAS Core Research Note G00207297, Mark Fabbi, Joe Skorupa, 18 November 2010, RAV7A1 10142011 The market for ADCs is consolidating. However, innovation
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
Key Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
MarketScope for IT Governance, Risk and Compliance Management, 2008
Research Publication Date: 11 February 2008 ID Number: G00154941 MarketScope for IT Governance, Risk and Compliance Management, 2008 Paul E. Proctor, Mark Nicolett, French Caldwell The IT GRCM market was
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
Best Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
Deliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
Unlike the general notebook market, in which
Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
Case Study & POC & Demos Information
Case Study & POC & Demos Information Type: Case Study Name: Multichannel Campaign Management (MCCM) Description: The IBM Company seeks, as vendor, through the multichannel campaign management (MCCM) services,
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
Magic Quadrant for Higher Education Administrative Suites, 2006
Industry Research Publication Date: 26 September 2006 ID Number: G00143221 Magic Quadrant for Higher Education Administrative Suites, 2006 Marti Harris, Michael Zastrocky, Jan-Martin Lowendahl Higher education
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
NGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives
For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
The IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
1 of 18 28/05/2013 09:19
1 of 18 28/05/2013 09:19 30 October 2012 ID:G00223419 Analyst(s): Joe Skorupa, Neil Rickard, Bjarne Munch VIEW SUMMARY The application delivery controller has evolved into a key component of the data center
Cloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success
Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
Toolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
The Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
Successful EA Change Management Requires Five Key Elements
Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the
How BPM Can Enhance the Eight Building Blocks of CRM
Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's
The Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
Magic Quadrant for Storage Professional and Support Services
Magic Quadrant for Storage Professional and Support Services Gartner RAS Core Research Note G00157182, Adam W. Couture, Robert E. Passmore, 30 July 2008 Gartner evaluates storage service providers and
Roundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms
Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms Gartner RAS Core Research Note G00158295, French Caldwell, Tom Eid, 30 June 2008, R2799 07092009 The market for enterprise governance,
When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
Real-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
Magic Quadrant for WAN Optimization Controllers, 2007
Research Publication Date: 14 December 2007 ID Number: G00153256 Magic Quadrant for WAN Optimization Controllers, 2007 Andy Rolfe, Joe Skorupa The WOC market is maturing rapidly, but remains dynamic with
Eight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
Gartner Defines Enterprise Information Architecture
Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality
Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers
The 2H05 Magic Quadrant for managed
Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
Evaluating Microsoft, Oracle and SAP CRM Application Strategy
Research Publication Date: 8 October 2009 ID Number: G00170698 Evaluating Microsoft, Oracle and SAP CRM Application Strategy Michael Maoz, Kimberly Collins, Robert P. Desisto The quality of the customer
Magic Quadrant for Enterprise LAN (Global)
Research Publication Date: 30 April 2009 ID Number: G00166799 Magic Quadrant for Enterprise LAN (Global) Mark Fabbi, Tim Zimmerman Cisco remains the leader in the enterprise LAN Magic Quadrant, but a stratification
The Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
Cloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
Repurposing Old PCs as Thin Clients as a Way to Save Money
Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers
Document the IT Service Portfolio Before Creating the IT Service Catalog
Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service
IT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.
Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for
Mainframe Modernization: When Migration Is the Answer
Research Publication Date: 8 January 2010 ID Number: G00171622 Mainframe Modernization: When Migration Is the Answer Dale Vecchio Mainframe migrations can be executed in a number of ways. Which choice
Overcoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
Magic Quadrant for Sales Force Automation
Research Publication Date: 15 July 2008 ID Number: G00159067 Magic Quadrant for Sales Force Automation Robert P. Desisto Salesforce.com and Siebel remain leaders in the SFA market, while SAP moves to the
ERP, SCM and CRM: Suites Define the Packaged Application Market
Research Publication Date: 25 July 2008 ID Number: G00158827 ERP, SCM and CRM: Suites Define the Packaged Application Market Yvonne Genovese, Jeff Woods, James Holincheck, Nigel Rayner, Michael Maoz Users
How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
IT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
Governance Is an Essential Building Block for Enterprise Information Management
Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways
2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise
Research Publication Date: 23 July 2009 ID Number: G00169733 2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise John E. Van Decker Extensible Business Reporting Language (XBRL) will be a requirement
Tips for Evaluators: Better Business Intelligence RFPs
Research Publication Date: 11 May 2009 ID Number: G00167840 Tips for Evaluators: Better Business Intelligence RFPs James Richardson Many of the business intelligence (BI) RFP data-collection exercises
How To Create A Cloud Computing System
G00230221 Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus
