The Government Grants Management Domain: A Gartner Market Definition

Size: px
Start display at page:

Download "The Government Grants Management Domain: A Gartner Market Definition"

Transcription

1 Industry Research Publication Date: 8 September 2008 ID Number: G The Government Grants Management Domain: A Gartner Market Definition Massimiliano Claps This research provides a definition of grants and grant-making agencies in government and describes functionalities of grant management applications and roles accessing those functionalities. IT leaders in government and high-tech vendors can use this as a critical functionality requirement document for grants management applications. Key Findings Government grant-making agencies must increase efficiency, improve customer service, reduce complexity of operations, and strengthen their ability to monitor performance and compliance. Grant-making agencies' strategies are supported by domain-specific business capabilities, such as grants preparation and publication, intake of applications, evaluation, negotiation and contracting, and awards' administration. Recommendations Government agencies can use the list of capabilities to identify key software functionalities they need to consider when buying or building applications for domainspecific grants management processes. Software vendors should consider the list of functionalities and roles to develop commercial off-the-shelf (COTS) solutions that satisfy their clients' requirements. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

2 WHAT YOU NEED TO KNOW Grant-making agencies at all levels of government central or federal, state or provincial, regional, and local use IT to provide domain-specific capabilities, such as application intake, evaluation, and grant administration. Government agencies that consider building or buying applications for grants management can use the list of key functional requirements to identify gaps in their architecture, design requests for proposals (RFPs) and compare vendors. ANALYSIS Defining Grants According to the U.S. federal government, a grant is "an award of financial assistance from a federal agency to a recipient to carry out a public purpose of support or stimulation authorized by a law of the United States" (source www. grants.gov). The European Commission defines a grant as "a direct financial contribution, by way of donation, from the European Union budget to third-party recipients (usually non-profit-making legal persons) who are involved in activities of interest to the EU" (source: Eurostat). A standard international definition of grants is more difficult to identify; for example, the United Nations' System of National Accounts 1993 (SNA 1993) defines three categories of government expenses that can encompass grants as defined by the U.S. government: Subsidies: "Subsidies are current unrequited payments that government units make to enterprises on the basis of the levels of their production activities or the quantities or values of the goods or services they produce, sell, export or import. Subsidies may be designed to influence levels of production, the prices at which outputs are sold, or the remuneration of the enterprises." Grants: "Grants are noncompulsory current or capital transfers from one government unit to another government unit or an international organization." Miscellaneous other expenses: These include current and capital transfers to market enterprises and nonprofit institutions, as well as scholarships and other educational benefits. Grants can be divided into formula grants and competitive grants, depending on the award mechanism (source: U.S. Department of Education): Formula grants: These are allocations of money in accordance with a distribution formula prescribed by law or administrative regulation for activities of a continuing nature not confined to a specific project. Competitive (or discretionary) grants: A discretionary grant awards funds on the basis of a competitive process. The department reviews applications, in part through a formal review process, in light of the legislative and regulatory requirements and published selection criteria established for a program. The review process gives the department discretion to determine which applications best address the program requirements and are, therefore, most worthy of funding. Government grants absorb a significant share of public-sector spending, especially in federal/national and transnational public sector institutions (see Note 1). Grant programs span a Publication Date: 8 September 2008/ID Number: G Page 2 of 14

3 wide variety of sectors, such as agriculture, student aid, research and development, community development, and so on (see Note 2). The grants process involves a grant-making institution (also known as grantor) and a grantreceiving institution (also known as grantee). This and upcoming Gartner research will focus primarily on grant-making agencies. Government Grant-Making Agencies' Mission and Strategies Grant-making agencies' primary mission is to act as a catalyst and scrutinizer of public purpose activities and to provide guidance and funding for their implementation. To achieve their mission, government grantors need to act according to strategic guidelines that enable them to address specific pain points: To increase efficiency of operations. Like many other public-sector organizations, grantmaking agencies must increase employee productivity and streamline repetitive processes, such as disbursement of funds and eligibility assessment, to tackle budget and skill shortages. To improve customer service. Grant-making institutions often manage multiple grant programs, thus requiring customers to navigate through the bureaucracy to find and apply for different streams of funds. Grantors' modernization strategy aims to integrate information and processes across silos to make life easier for applicants and grantees. To reduce complexity and redundancies. Sharing information and processes across silos is also expected to increase effectiveness of operations, as it will give civil servants a more consistent customer view, eliminate duplications and help fight frauds. To strengthen reporting to verify compliance with the purposes of the fund allocation, to verify overall performance of the grants program relative to the intended public service outcomes, and to verify what constituencies mostly benefit from grants. For example what share of EU grants is received by each member state? Government Grant-Making Agencies' Business Capabilities To deliver the business outcomes defined by their strategies, grant-making agencies must set up and manage domain-specific business capabilities that combine people, processes and IT systems. Grants programs might differ by level of government, geography, award mechanism, administrative law regulating contracting with grantees, and so on. Nevertheless, six macrophases can be identified as being part of most programs: Preparation: In this pre-award stage, the head of the agency, the program officers and/or boards responsible for specific sectors, and the finance department identify and prioritize public service outcomes, commit the budget and define the award rules. Notification: The grantor announces the availability of grant funds and eligibility and process requirements for the application, by publishing the grant and sending individual reminders to customers that the agency knows about. Intake of applications and relationship management: In this phase the program office captures, through various channels, applicants' forms and other documents, and performs a preliminary validation. Grant advisors provide guidance on the submission of applications and send reminders in case of late submissions, or need to resubmit forms; sometimes applicants are put in contact with existing or past grantees for advice. Publication Date: 8 September 2008/ID Number: G Page 3 of 14

4 Evaluation of applications: The program office verifies that applications meet the formal requirements to receive funds. In case of competitive grants, the evaluation also includes analysis of the proposal's merit, which can be carried out by internal program officers and/or boards and by external experts gathered in a panel or selected ad hoc for each evaluation. For example, in the case of scientific research projects, peer evaluation among academic institutions is the usual practice. Negotiation and contractual arrangements: Once applications have been approved, the grantor's program officers and the grantees' representatives negotiate the contract to define amounts and type (operating or capital, direct or indirect, and so on) of expenses to be covered by the grant, the means and time frame of payments, reporting requirements, and so on, and then proceed with the award. Administration: The post-award phase includes disbursing funds, auditing project performance, authorizing changes in project direction or management, authorizing changes in the grant budget, administering payment requests and advance payments, reporting financial flows, and so on. Operational activities, such as payments and refunds, are carried out by program offices in collaboration with the finance department, while strategic financial and operational performance reviews and major program amendments usually involve the finance department, the agency executives and external committees. Government Grant-Making Agencies' IT Systems Historically, grants management application software was custom-built on mainframe platforms to respond to jurisdiction-specific regulatory requirements. The resulting siloed architecture now needs to be modernized to support the above-mentioned six phases, especially because information technologies hold out the promise of addressing some of the pain points described in the previous paragraphs: To make front-office grants application forms available on multichannel platforms, so that applicants can seamlessly navigate and submit information regardless of the backoffice bureaucracy. Online real-time validation of application forms is also expected to greatly reduce the need for resubmissions. To modernize application architectures through the implementation of service-oriented architecture (SOA) and the acquisition of COTS products. Some grant-making agencies developed a graphical user interface (GUI), to facilitate distributed usage, but often this only added to the complexity of architecture and did not facilitate development of new services and integration of front- and back-end applications. To integrate data and processes. Siloed applications and databases resulted in data discrepancy and incoherent grants planning, award and administration across programs; for example, at times, a grantor did not know if someone was applying for separate programs. Also, inconsistent data did not enable reviewing performance of individual grants and outcomes of whole programs. Capabilities still vary significantly to respond to differences in grants programs, but a set of critical functional requirements for domain-specific grants management applications can be identified (see Table 1). It is also important to notice that there is a series of "roles" that, with different levels of authorization (access window, format, view and so on), a domain-specific grants management application should be able to recognize within its functional requirements (see Table 2). Tables 1 and 2 are not aimed to provide complete lists of functionalities and people roles for grants management application software for every conceivable type of program. The lists will not Publication Date: 8 September 2008/ID Number: G Page 4 of 14

5 match the exact business requirements of every agency, because every agency has its practices, regulations and types of grants. The lists are based on Gartner analysis of documents published by and interviews with transnational, national/federal and state government grant-making institutions and software vendors, as well as a review of their published documents. Table 1. Grants Management System's Critical Functional Requirements Grants Program Phase Functional Requirement Brief Description Preparation Identification of goals of the grants program Ability to support workflow of internal discussion and approval of objectives and scope of the program. Notification Intake of applications and relationship management Definition of eligibility and process requirements Preparation of grants program documentation Allocation of budget Announcement/publication of grants program Reminders to potential applicants Design of application forms Online self-service Capture of application Ability to support workflow of internal discussion and approval of applicant eligibility, merit review criteria (in case of competitive grants) and process business rules. Ability to support preparation, revision and approval of program plan documents. Ability to support forecasting and approval of funds to be committed for the grants program. Ability to prepare grants notice document and publish it on multiple media and official journals (such as the Official Journal of the European Union). Ability to prepare and notification to those who should apply. May include grantees whose previous grant is expiring, those who were rejected the previous cycle or other invitees. Ability to define form structure, filing data requirements and so on. Ability to offer individual and organization registration, grants search, preliminary application and final application form submission, revision of status of the application and so on, through the Web. Ability to assign an identity to the application, preassign to appropriate committee and/or program staff, create the application file, and include and count off a related preliminary application if there was one. Publication Date: 8 September 2008/ID Number: G Page 5 of 14

6 Grants Program Phase Functional Requirement Brief Description Management and integration of attachments Conversion of formats Preliminary validation of application Inbound correspondence management Outbound correspondence management Collaborative correspondence management Contact management Release of application information Ability to receive attachments that are allowed to come in, possibly from different sources, and associate them with the original application package. Ability to hold the application until sufficient content is received. Printing or scanning paper (fax, mail, ). Ability to verify in real time if the application is directed to the correct program, identity of applicants, filing requirements and so on. Ability to manage incoming documents, such as preliminary applications, final applications, complaints, and requests for amendments, proposal withdrawals and resubmissions, and so on. Ability to manage courtesy reminders, award notices, declines, withdrawals, reconsiderations and so on. Ability to offer online forums where applicants can get advice. For example, some programs allow an application to be submitted as draft for comments before the actual application is submitted. Coaching should be provided as a service by program staff or may be done by organizations or individuals that have already received the same grants; thus, they can advise on the preparation of application and optimal usage of funds. Ability to automate applicant/grantee registration (individual, organization and consortium) and manage identity credentials (role, updates, authorization to apply for multiple grants and so on). Ability to make available to the public, on request, an application that results in an award except for privileged information or material that is personal, proprietary or otherwise exempt from disclosure under law. Publication Date: 8 September 2008/ID Number: G Page 6 of 14

7 Grants Program Phase Functional Requirement Brief Description Evaluation Finalize eligibility assessment Ability to complete review of formal requirements of the application after real-time validation, such as entitlement of applicant, completeness of data, timeliness of submission, analysis of funds already received via previous or parallel programs and so on. Allocate/assign to staff Allocate/assign to committees/panels Allocate/assign to external reviewers Provide access to review material Review application Score application Collate evaluation score Ability to identify and assign roles to program office staff members. This is necessary for competitive grants. Ability to determine which committee members will act as reviewers, and in what capacity. Includes load balancing, negotiation, identifying conflicts, and possibly self-selection by members. This is necessary for competitive grants. Ability to select internal and external reviewers not included in panels that have to evaluate the merit of the proposal. This is necessary for competitive grants. Ability to make application material available to the internal, committee and external reviewers that need to see it, including access windows, views and so on. This is necessary for competitive grants. Ability to read, research and create notes and comments for the application. This is necessary for competitive grants. Ability to use the defined evaluation criteria to score the application by creating ranking and recommendations. This is necessary for competitive grants. Ability to collect results of feedback on the merit of the proposal from internal and external reviewers. This is necessary for competitive grants. Publication Date: 8 September 2008/ID Number: G Page 7 of 14

8 Grants Program Phase Functional Requirement Brief Description Meet and discuss evaluation Ability to support adjudication meetings to evaluate each application. Typically involves comments by readers, discussion, voting for new scores, assigning factors that will be taken into consideration when adjustments are made to competitionwide criteria. Organize logistics of site visits when this are used as part of a multipart adjudication. This is necessary for competitive grants. Evaluation results approval Prepare evaluation report Decision Announce grants awards Appeal management Ability for program officers to approve all collected feedback to support award or decline decision and create a ranking of individual and competitive grants. Ability to create an evaluation report summarizing results and suggesting changes for the next cycles of evaluation Ability to record the final decision to award or decline of grants funding. Ability to notify grantees of award or decline decision and to publish results on the media when necessary. Ability to support resubmission and reconsideration of the case if the applicant disagrees with a decline. Negotiation and contracting Grants agreement negotiation Ability to support workflow of discussion of amount and nature of expenses to be reimbursed under the grants (direct and indirect, capital and operating), timeline of disbursements and reporting, inclusion of subgrantees and so on. Negotiation results approval Preparation of contract Acceptance and signature of contract Ability for program officers to approve grants agreement and commit funds to individual grantees. Ability to prepare grants agreement documents. Ability to collect signature of grants agreement documents from program officers and grantees. Publication Date: 8 September 2008/ID Number: G Page 8 of 14

9 Grants Program Phase Functional Requirement Brief Description Administration Individual grants amendments Ability to change management, time frame, budget of grants awarded to a single grantee or full withdrawal. Program amendments Periodic report intake Periodic report assessment Feed report into agency reporting Submission of reports to external committees Validation of payments Withdrawal of funds Payment profiling Initiate payment/refund Authorize payment/refund Make payment/intake refund Final report Final reconciliation of funds Closure of fund release Ability to change management, time frame, budget of a grants program or full withdrawal. Ability to intake quarterly or annual financial and operating reports about individual grants. Ability to analyze individual grants reports to evaluate compliance with program goals, budget, schedules and so on. Ability to input individual grants reports into the program and overall grant-making organization reporting. Ability to send periodic report to external committees that oversee the grantor operations. Ability to confirm disbursement after assessment of reports. Ability to withdraw funds in case reports show lack of compliance. Ability to break down disbursements between operating and capital expenditure, direct and indirect costs, or other categories relevant for the program. Ability to request payment or reimbursement of funds, prepare paperwork, and confirm mechanism and date Ability to issue payment order and transfer of funds to appropriate account. Ability for the treasurer to execute authorized payment/refund order. Ability to assess financial and operating report once the grants cycle has run its course. Ability to calculate and account for unobligated funds, final payment or paybacks. Ability to close the mechanism according to which payments and refunds were being done. Publication Date: 8 September 2008/ID Number: G Page 9 of 14

10 Grants Program Phase Functional Requirement Brief Description Closure of grants agreement Ability to terminate contract between grantor and grantee. Common services across phases Case management Ability to create, manage and track case activities or claims relating to individual applicants and grantees. This includes cross-program information and the ability to link case events to process workflow. Source: Gartner (September 2008) Workflow Document and records management Data services Data warehouse Analytics and reporting Text search Security Integration services Ability to define business rules and roles along the life cycle of the grants program. Ability to capture and store data from multiple sources and in multiple formats; to associate information with a particular case; to comply with retention policies; and to audit record usage. Ability to display currency, dates, times. Ability to provide enterprise relationship diagrams showing layout of tables, fields and data entity relationships. Ability to provide XML interface to seamlessly update and exchange data and provide the capability of populating and producing reports. Ability to extract, transform and load large amounts of data. Ability to create disbursement reports (such as U.S. Federal Cash Transaction Reports), budget and outcome analyses, and so on. Ability to search against database values and documents attached to grants application forms. Ability to protect and encrypt data and manage grantees and grantmaking agencies' employees' authentication and levels of authorization. Ability to integrate with financial management systems to ensure reconciliation of payments and accounts. Integration with countryspecific systems, such as the U.S. Federal Government Grants.gov and the Research Councils U.K. Joint Electronic Submission (Je-S) platforms. Publication Date: 8 September 2008/ID Number: G Page 10 of 14

11 Table 2. Key Roles That Access Grant Management Applications Role Advisor Customer Co-customer Department/agency head Department/agency director Program officer/assistant/approver Financial department Reviewer Source: Gartner (September 2008) Brief Description Anyone who does not hold a decision-making role but has access to the complete application files to provide recommendations that support the application validation, evaluation and appeal. One who applies for funding. The customer goes through two stages, applicant (before funding is granted) and then grantee or award recipient (from funding to closure of grant). The customer might be an individual or an organization. In the second case, a representative will act and take responsibility on behalf of the enterprise, nongovernmental organization, academic institution and so on. A collaborator of the customer. He or she in turn goes through two stages: co-applicant (before funding is granted) and then subgrantee (from funding to closure of grants). The director of the grant-making agency, who participates only to some strategic stages of a grants program, such as budgeting and final performance review. A manager within the grant-making agency responsible for administration and management at a higher level than a grants program. He participates to strategic activities, such as budgeting and performance review, and oversees major program changes. A grant-making agency staff member who is deeply involved in the grant program. He or she is responsible for validating applications, organizing reviewers and committees, coordinating the adjudication process, officiating over decisions, handling appeals and requests for change, overseeing award administration, monitoring progress, and so on. A service group within the grant-making agency that provides support services to program staff across many programs, for specific phases of the award cycle, such as budgeting, financial performance review, and payments. Anyone who evaluates a proposal submitted as part of a competitive grant application with the purpose of commenting and/or scoring it. Reviewers can be internal staff of the agency, or external experts, typically from academic and research institutions. Often, external experts are grouped into committees/panels that collectively perform evaluation of merit of a competitive grant application and assign scoring for the adjudication of funds. Committees can include individuals from a variety of organizations, such as other government agencies or academic institutions. What to Do Grant-making government agencies that aim to upgrade or replace existing applications, or to automate paper-based processes, can use these lists to: Identify gaps in their current grants management systems relative to business requirements. Prepare requests for information and RFPs. Compare critical capabilities offered by commercial off-the-shelf product vendors. Publication Date: 8 September 2008/ID Number: G Page 11 of 14

12 Capabilities that enterprise architects, application managers and sourcing managers should have at the top of their list of requirements, either when building or buying grants management software, include: Online self-service that makes it easier for applicants to search for grant opportunities and complete forms Real-time data validation for example, by linking the application forms' underlying XML schemas with the back-office engine to streamline eligibility assessment processes by ensuring that electronically submitted applications comply with a set of minimum requirements Comprehensive workflow capabilities that enable the ability to flexibly adjust business rules for eligibility assessment, allocation to reviewers, time frame for reporting, and so on Integration with the overall agencies' financial management systems to enhance payment reconciliation and reporting processes Note 1 Examples of Share of Grant on Total Government Expenditure The EU's Common Agricultural Policy (CAP) aims to ensure reasonable prices for Europe's consumers and fair incomes for farmers, particularly through the common organization of agricultural markets and by ensuring compliance with the principles adopted at the Stresa Conference in 1958, namely single prices, financial solidarity and community preference. During the first years of the EU's existence, CAP payments/support to the agriculture sector represented a significant proportion of budget expenditure, over two-thirds on occasions. Nowadays, the CAP costs about 5 billion euros per year, or 40% of the total EU budget, but this share continues declining. In fiscal year 2006, the U.S. federal government spent almost $490 billion in grants, more than the total value of contracts for goods and services with external contractors (sources: EC and ). Note 2 Examples of U.S. Federal Government Grant Programs Grant programs span a wide variety of sectors, such as agriculture, student aid, research and development, community development, and so on (see Table 3). Table 3. U.S. Federal Government Grant Programs Grants Category Grants Program Agency Agriculture Technical assistance for specialty Unified Export Strategy crops Arts Native American library services enhancements Institute of Museum and Library Services Business and commerce Micro- and small-enterprise trade-led growth Peru USAID-Lima Community development State veterans home construction Construction of State Home Facilities Disaster prevention and relief Not available Publication Date: 8 September 2008/ID Number: G Page 12 of 14

13 Grants Category Grants Program Agency Education James Madison graduate fellowships James Madison Memorial Fellowship Foundation Employment, labor and training Senior scientist research and mentorship award National Institutes of Health Energy Hydrate production system research National Energy Technology Laboratory Environmental quality Coral reef ecosystem studies National Oceanic and Atmospheric Administration Food and nutrition Team nutrition training Food and Nutrition Service Health Elder care initiative long-term care Indian Health Service Housing Rural housing preservation Housing and Community Facilities Programs Humanities Digitizing historical records National Archives and Records Administration Information and statistics Law, justice and legal services Natural resources Regional development Science and technology Social services and income security State court processing statistics redesign U.S.-China collaboration on rule of law Cooperative endangered species conservation fund Learn and Serve America 2008 Higher Education College Student Social Media Initiative Chemical biological defense initiative fund Senior legal services Transportation National bicycle and pedestrian clearinghouse Source: (September 2008) Bureau of Justice Statistics Thailand USAID-Bangkok U.S. Fish and Wildlife Service Corporation for National and Community Service Defense Threat Reduction Agency Administration on Aging Department of Transportation, Federal Highway Administration Publication Date: 8 September 2008/ID Number: G Page 13 of 14

14 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 8 September 2008/ID Number: G Page 14 of 14

OmniStar Exceptional GMS Functionality. Comparison with Industry Best Practice Functionality

OmniStar Exceptional GMS Functionality. Comparison with Industry Best Practice Functionality Exceptional Functionality Comparison with Industry Best Practice Functionality Grants Management System Out of the Box Functionality Comparison with Industry Specified Functionality Preparation Identification

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Research Publication Date: 23 April 2008 ID Number: G00156910 XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Nigel Rayner, Neil Chandler Extensible Business Reporting Language

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

Discovering the Value of Unified Communications

Discovering the Value of Unified Communications Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Research Publication Date: 31 July 2009 ID Number: G00168488 Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Carsten Casper, Thomas Otter, Arabella Hallawell The vast majority (probably greater

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

Q&A: The Impact of XBRL on Corporate Performance Management

Q&A: The Impact of XBRL on Corporate Performance Management Research Publication Date: 27 May 2008 ID Number: G00158184 Q&A: The Impact of XBRL on Corporate Performance Management Nigel Rayner Extensible Business Reporting Language is an XML-based standard that

More information

Real-Time Decisions Need Corporate Performance Management

Real-Time Decisions Need Corporate Performance Management Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Gartner Defines Enterprise Information Architecture

Gartner Defines Enterprise Information Architecture Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school

More information

Research. Mastering Master Data Management

Research. Mastering Master Data Management Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

Risk Intelligence: Applying KM to Information Risk Management

Risk Intelligence: Applying KM to Information Risk Management Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance

More information

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes. Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for

More information

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives

More information

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial

More information

Overcoming the Gap Between Business Intelligence and Decision Support

Overcoming the Gap Between Business Intelligence and Decision Support Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision

More information

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical

More information

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references

More information

Enterprise Asset Management Migration Requires Detailed Planning

Enterprise Asset Management Migration Requires Detailed Planning Research Publication Date: 2 September 2005 ID Number: G00130205 Enterprise Asset Management Migration Requires Detailed Planning Kristian Steenstrup Neglecting to address key areas when migrating to packaged

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Gartner Clarifies the Definition of the Term 'Enterprise Architecture'

Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,

More information

Successful EA Change Management Requires Five Key Elements

Successful EA Change Management Requires Five Key Elements Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the

More information

Bankinter Differentiates Itself by Focusing on Innovation and CRM

Bankinter Differentiates Itself by Focusing on Innovation and CRM Research Publication Date: 4 October 2005 ID Number: G00127276 Bankinter Differentiates Itself by Focusing on Innovation and CRM John Radcliffe Bankinter successfully competes in the Spanish banking market

More information

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New

More information

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions. Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information

More information

Data Center Consolidation in Western Europe Faces Limitations

Data Center Consolidation in Western Europe Faces Limitations Research Publication Date: 19 September 2006 ID Number: G00143179 Data Center Consolidation in Western Europe Faces Limitations Rakesh Kumar Organizations embarking on pan-european data center site consolidation

More information

Governance Is an Essential Building Block for Enterprise Information Management

Governance Is an Essential Building Block for Enterprise Information Management Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways

More information

2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise

2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise Research Publication Date: 23 July 2009 ID Number: G00169733 2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise John E. Van Decker Extensible Business Reporting Language (XBRL) will be a requirement

More information

IT Operational Considerations for Cloud Computing

IT Operational Considerations for Cloud Computing Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.

More information

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Research Publication Date: 24 March 2008 ID Number: G00156216 Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Tom Austin Both Google and Microsoft come up short in terms of delivering

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

Recognize the Importance of Digital Marketing

Recognize the Importance of Digital Marketing Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated

More information

Use These Guidelines for Making Better CRM Consulting Provider Selections

Use These Guidelines for Making Better CRM Consulting Provider Selections Research Publication Date: 7 July 2006 ID Number: G00141062 Use These Guidelines for Making Better CRM Consulting Provider Selections Matthew Goldman, Ed Thompson, Lorrie Scardino Gartner sees many inconsistencies

More information

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey.

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey. Research Publication Date: 5 December 2008 ID Number: G00160425 Gartner Introduces the EIM Maturity Model David Newman, Debra Logan Organizations cannot implement enterprise information management (EIM)

More information

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

Case Study: Denmark's Achievements With Healthcare Information Exchange

Case Study: Denmark's Achievements With Healthcare Information Exchange Industry Research Publication Date: 30 May 2006 ID Number: G00139713 Case Study: Denmark's Achievements With Healthcare Information Exchange Jonathan Edwards Through careful use of IT, the Danish health

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

Consider Identity and Access Management as a Process, Not a Technology

Consider Identity and Access Management as a Process, Not a Technology Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable

More information

ERP, SCM and CRM: Suites Define the Packaged Application Market

ERP, SCM and CRM: Suites Define the Packaged Application Market Research Publication Date: 25 July 2008 ID Number: G00158827 ERP, SCM and CRM: Suites Define the Packaged Application Market Yvonne Genovese, Jeff Woods, James Holincheck, Nigel Rayner, Michael Maoz Users

More information

Global Talent Management Isn't Just Global

Global Talent Management Isn't Just Global Research Publication Date: 22 July 2008 ID Number: G00159366 Global Talent Management Isn't Just Global Thomas Otter Global talent management projects must take into account local compliance issues or

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

EHR Advantages and Disadvantages

EHR Advantages and Disadvantages Industry Research Publication Date: 3 February 2010 ID Number: G00174011 The Limits of Certification and Guarantees in Buying Electronic Health Records in the U.S. Wes Rishel It is important not to rely

More information

Research. Identity and Access Management Defined

Research. Identity and Access Management Defined Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from

More information

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented

More information

The Next Generation of Functionality for Marketing Resource Management

The Next Generation of Functionality for Marketing Resource Management G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management

More information

What Is the Role of Quality Assurance in a SaaS Environment?

What Is the Role of Quality Assurance in a SaaS Environment? Research Publication Date: 15 September 2009 ID Number: G00170552 What Is the Role of Quality Assurance in a SaaS Environment? Thomas E. Murphy, Daniel Sholler, Christian Hestermann Software as a service

More information

Case Study: Social Networking Tool Becomes Essential Workplace Infrastructure at Deloitte

Case Study: Social Networking Tool Becomes Essential Workplace Infrastructure at Deloitte Research Publication Date: 3 April 2009 ID Number: G00166424 Case Study: Social Networking Tool Becomes Essential Workplace Infrastructure at Deloitte Nikos Drakos We look at the motivation, justification

More information

Critical Capabilities for Grantor Management Software

Critical Capabilities for Grantor Management Software Industry Research Publication Date: 17 July 2009 ID Number: G00168050 Critical Capabilities for Grantor Management Software Massimiliano Claps The supply of commercial off-the-shelf (COTS) software for

More information

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Industry Research Publication Date: 11 February 2009 ID Number: G00164764 Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Jeff Vining Government CIOs are under increasing

More information

Evaluating Microsoft, Oracle and SAP CRM Application Strategy

Evaluating Microsoft, Oracle and SAP CRM Application Strategy Research Publication Date: 8 October 2009 ID Number: G00170698 Evaluating Microsoft, Oracle and SAP CRM Application Strategy Michael Maoz, Kimberly Collins, Robert P. Desisto The quality of the customer

More information

Security and Identity Management Auditing Converge

Security and Identity Management Auditing Converge Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,

More information

How to Develop an Effective Vulnerability Management Process

How to Develop an Effective Vulnerability Management Process Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes

More information

Tips for Evaluators: Better Business Intelligence RFPs

Tips for Evaluators: Better Business Intelligence RFPs Research Publication Date: 11 May 2009 ID Number: G00167840 Tips for Evaluators: Better Business Intelligence RFPs James Richardson Many of the business intelligence (BI) RFP data-collection exercises

More information

The Seven Building Blocks of MDM: A Framework for Success

The Seven Building Blocks of MDM: A Framework for Success Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

Selection Requirements for Business Activity Monitoring Tools

Selection Requirements for Business Activity Monitoring Tools Research Publication Date: 13 May 2005 ID Number: G00126563 Selection Requirements for Business Activity Monitoring Tools Bill Gassman When evaluating business activity monitoring product alternatives,

More information

Case Study: Australian Bank's IT-Business Alignment Leads to New Product and System Development Process

Case Study: Australian Bank's IT-Business Alignment Leads to New Product and System Development Process Industry Research Publication Date: 30 June 2008 ID Number: G00158005 Case Study: Australian Bank's IT-Business Alignment Leads to New Product and System Development Process David Schehr Redundant and

More information

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Research Publication Date: 12 February 2008 ID Number: G00154811 Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Steve Blood Companies spend too much on IP-PBXs

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Five Business Drivers of Identity and Access Management

Five Business Drivers of Identity and Access Management Research Publication Date: 31 October 2003 ID Number: SPA-21-3673 Five Business Drivers of Identity and Access Management Roberta J. Witty The primary reasons to implement IAM solutions are business facilitation,

More information

Gartner Updates Its Definition of IT Infrastructure Utility

Gartner Updates Its Definition of IT Infrastructure Utility Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some

More information

Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset

Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset G00217757 Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset Published: 22 December 2011 Analyst(s): Bill O'Kane Lexmark International undertook a master data management (MDM) program

More information

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary. Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important

More information

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s

More information

The Four New Ps of Marketing That CMOs and CIOs Should Consider

The Four New Ps of Marketing That CMOs and CIOs Should Consider G00227185 The Four New Ps of Marketing That CMOs and CIOs Should Consider Published: 18 May 2012 Analyst(s): Kimberly Collins Four new Ps of marketing align people and processes across the marketing ecosystem,

More information