Hype Cycle for Identity and Access Management Technologies, 2005

Size: px
Start display at page:

Download "Hype Cycle for Identity and Access Management Technologies, 2005"

Transcription

1 Research Publication Date: 21 June 2005 ID Number: G Hype Cycle for Identity and Access Management Technologies, 2005 Roberta J. Witty, Ant Allan, John Enck, Clare Hirst, Barry Runyon, Ray Wagner, Earl L. Perkins, John Pescatore, Vic Wheatman Other than biometrics, most identity and access management technologies are maturing. Investing in an overhyped technology too early can waste funds, while delaying too long could give competitors an edge. Vendor hype concerning IAM technologies needs deflating. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

2 TABLE OF CONTENTS 1.0 The Hype Cycle On the Rise IAM/NAC Integration Contactless Proximity Cards Role Planning, Audit and Compliance At the Peak Biometric Identity Documents Sliding Into the Trough Virtual Directories Biometric User Identification Public Key Operations Climbing the Slope Federated Identity Management Microsoft AD/Kerberos CCOW Standard User Provisioning Meta-Directories Smart Tokens Enterprise Reduced Sign-On Entering the Plateau EAM Password Management Hardware Tokens Off the Hype Cycle User ID and Password Single Sign-On Kerberos Conclusions Appendix A: Hype Cycle Phases, Benefit Ratings and Maturity Levels LIST OF TABLES Table 1. Hype Cycle Phases Table 2. Benefit Ratings Table 3. Maturity Levels LIST OF FIGURES Figure 1. Hype Cycle for Identity and Access Management Technologies, Publication Date: 21 June 2005/ID Number: G Page 2 of 15

3 ANALYSIS 1.0 The Hype Cycle Identity and access management (IAM) refers to those technologies that allow companies to manage and control user accounts and privileges. It is clear that, today, regulatory compliance is the key driver of IAM implementations. Other business drivers are cost containment and business facilitation. In deciding how to implement IAM, however, security managers face a dilemma: Investing in an overhyped technology too early can waste enterprise security funds, while delaying too long runs the risk of giving competitors an edge. Security managers can use the analysis contained in this report to help deflate security provider and security vendor hype about IAM technologies, allowing them to make more intelligent choices. This report describes 17 IAM technologies that are on various stages of the Gartner Hype Cycle, as well as three technologies that we have removed from the previous IAM Hype Cycle. Certain technologies, such as contactless proximity cards, are relatively new and have not been extensively hyped, while a few others, such as biometric identify documents, have reached the Peak of Inflated Expectations. Once a technology has received the maximum amount of hype, it usually begins its descent into the Trough of Disillusionment. No technologies here reside at the absolute bottom of the trough; even technologies such as federated identity management have begun the slow climb out of the trough toward the Plateau of Productivity. Technologies that are far along on the plateau include password management, extranet access management (EAM) and hardware tokens. All these have proved they can provide business value. Publication Date: 21 June 2005/ID Number: G Page 3 of 15

4 Figure 1. Hype Cycle for Identity and Access Management Technologies, 2005 visibility Biometric Identity Documents Role Planning, Audit and Compliance Contactless Proximity Cards Virtual Directories Biometric User Identification EAM Password Enterprise Management Reduced Sign-On IAM/NAC Integration Meta-Directories Smart Tokens User Provisioning CCOW Standard Microsoft AD/Kerberos Federated Identity Management Public Key Operations Hardware Tokens Peak of Technology Trough of Inflated Slope of Enlightenment Trigger Disillusionment Expectations maturity Plateau will be reached in: less than 2 years 2 to 5 years 5 to 10 years more than 10 years As of June 2005 Plateau of Productivity obsolete before plateau Acronym key: AD Active Directory CCOW clinical context object workgroup EAM extranet access management IAM NAC identity and access management network access control Source: Gartner (June 2005) 2.0 On the Rise 2.1 IAM/NAC Integration Definition: Integration of network access control (NAC) functions with IAM infrastructure for userlevel access by connection profile. Justification for Hype Cycle Position/Adoption Speed: NAC technology is just getting to the point at which developers can achieve significant value through integration with the enterprise IAM infrastructure. Remote Authentication Dial-In User Service (RADIUS) and Dynamic Host Configuration Protocol (DHCP) are key NAC authentication services, but while user-provisioning products regularly provision user accounts to RADIUS servers, IAM systems cannot use RADIUS or DHCP authentication for IAM authentication. However, the speed with which companies are deploying modern IAM systems and NAC technology will hasten integration between them to allow application-level identity management policies to support NAC decision processes and minimize the number of authentication steps needed to access a resource. Publication Date: 21 June 2005/ID Number: G Page 4 of 15

5 Business Impact Areas: Remote, wireless, virtual private network (IPsec, also known as Internet Protocol security, and Secure Sockets Layer), and internal network access. Market Penetration: Less than 1 percent of target audience. Maturity: Emerging. Example Vendors: Checkpoint, Cisco Systems, InfoExpress, Juniper Networks, Microsoft and Sygate. Analysis by Ray Wagner and John Pescatore 2.2 Contactless Proximity Cards Definition: Integrated circuit-based cards for information systems access that transmit and receive data via radio frequency technology. Based on the International Organization for Standardization/International Electrotechnical Commission standard, types A or B, with a range of up to 10 centimeters. Building access can be incorporated on the card, which can also hold digital credentials for security processes, such as encryption or digital signing. Justification for Hype Cycle Position/Adoption Speed: Contactless cards are convenient a contact reader is not needed. PC standards that support contactless cards (PC/SC Specification version 2) were finalized in There has been heightened interest within the corporate sector in combining logical and physical access. Business Impact Areas: Contactless cards provide a platform for multiple security functions. They become a symbol of company trust in the employee. Market Penetration: One percent to 5 percent of target audience. Maturity: Early mainstream. Example Vendors: Axalto and HID. Analysis by Clare Hirst 2.3 Role Planning, Audit and Compliance Definition: Designing, delivering and managing access to IT resources by allowing the creation of roles or rules to govern the authorization of that access across multiple systems or applications. Allows a company to manage access in a manner that corresponds to the multiple operating views that reflect how day-to-day business is conducted. Justification for Hype Cycle Position/Adoption Speed: Improved deployments for enterprise resource planning implementations and some enterprise Web access systems; nascent stages of cross-platform realization. Business Impact Areas: Allows the reuse of IT application infrastructure and better application of compliance-related requirements. Pure-play role matrix management vendors are partnering with user-provisioning vendors to deliver these functions. Some user-provisioning vendors are offering this functionality as part of their core product. Publication Date: 21 June 2005/ID Number: G Page 5 of 15

6 Market Penetration: Less than 1 percent of target audience. Maturity: Emerging. Example Vendors: Approva, Beta Systems Software, bhold, Bridgestream, Courion, Eurekify, Securent, Sun Microsystems and Virsa Systems. Recommended Reading: Use This Eight-Step Process for Identity and Access Management Audit and Compliance Analysis by Roberta Witty and Earl Perkins 3.0 At the Peak 3.1 Biometric Identity Documents Definition: Uses one or more unique physical characteristics (such as a fingerprint, face or iris identification) or, less frequently, behavioral traits as part of a government-issued identification document (such as a passport or national ID card). Justification for Hype Cycle Position/Adoption Speed: Some see biometrics as the "killer app" for international and national identity documents. However, thus far poor accuracy, poor interoperability, and privacy and civil liberties concerns have been barriers. Business Impact Areas: Biometrics potentially make identity documents harder to forge and more reliable, but that makes bogus identity documents much more valuable to criminals. Commercial organizations may be able to capitalize on robust identity documents within "know your customer" processes. Market Penetration: Five percent to 20 percent of target audience. Maturity: Emerging. Example Vendors: SuperCom and Unisys. Recommended Reading: Hype Cycle for the Uses of Biometric Technologies, 2005 Analysis by Anthony Allan 4.0 Sliding Into the Trough 4.1 Virtual Directories Definition: Software products that create a logical (virtual) view of a Lightweight Directory Access Protocol directory by combining data from multiple repositories or by combining multiple repositories into a single view. Justification for Hype Cycle Position/Adoption Speed: Virtual directory use is increasing to create a single access point to the multiple-user repository model most organizations must use. Publication Date: 21 June 2005/ID Number: G Page 6 of 15

7 Business Impact Areas: Identity access and management vendors are partnering with virtual directory vendors to deliver combined products. User-provisioning products in particular are being joined with virtual directory technology. Market Penetration: Five percent to 20 percent of target audience. Maturity: Adolescent. Example Vendors: MaXware, OctetString and Radiant Logic. Recommended Reading: Virtual Directories Enhance Identity and Access Management Solutions Analysis by John Enck 4.2 Biometric User Identification Definition: Use of unique physical features (such as fingerprints, face, and iris recognition) or, less often, behavioral traits (such as voice, typing rhythm, and signature dynamics) as a form of user authentication. Justification for Hype Cycle Position/Adoption Speed: Although "good enough" solutions are available for small or specialized implementations, barriers to broad-based use remain in particular, poor accuracy, poor scalability, integration issues in large and technologically diverse organizations, and high cost. Business Impact Areas: Potentially simplifies identification and authentication without the need for passwords or hardware tokens. Market Penetration: One percent to 5 percent of target audience. Maturity: Emerging. Example Vendors: A4Vision (face), BioPassword (typing rhythm), CIC (signature), DigitalPersona (fingerprint), Identix (fingerprint), Iridian Technologies (iris) and Vocent (voice). Recommended Reading: Hype Cycle for the Uses of Biometric Technologies, 2005 Analysis by Anthony Allan 4.3 Public Key Operations Definition: A system for generating and managing digital certificates that identify the holder (person, system or device) of assigned public and private key pairs useful for identification, authentication, encryption and digital signing. Justification for Hype Cycle Position/Adoption Speed: The original public-key infrastructure (PKI) vision is changing, moving key management functions away from attempts to centralize them to be close to applications that use the keys and to apply PKI technology to Web services security. Publication Date: 21 June 2005/ID Number: G Page 7 of 15

8 Business Impact Areas: Supports trust of code, applets, devices and people over open networks. Enables message and content integrity and encryption of sensitive information. Market Penetration: Five percent to 20 percent of target audience. Maturity: Adolescent. Example Vendors: Betrusted, Entrust, GeoTrust, Microsoft, RSA Security and VeriSign. Analysis by Vic Wheatman 5.0 Climbing the Slope 5.1 Federated Identity Management Definition: Allows sharing of identification credentials among several entities. Trust is transferred from one identifying and authenticating entity to another. Justification for Hype Cycle Position/Adoption Speed: Liberty Alliance Security Assertion Markup Language-based solutions remain underutilized, yet interest is growing. The technology has some applications in the enterprise, but it has little use in business-to-consumer communication. The telecommunications industry has shown significant interest. Business Impact Areas: Positioned to provide consumer and business identification, and eventually authentication services supporting e-business and other applications. Market Penetration: One percent to 5 percent of target audience. Maturity: Emerging. Example Vendors: Liberty Alliance, Microsoft, Novell, Oblix, Ping Identity, RSA Security and Trustgenix. Analysis by Ray Wagner 5.2 Microsoft AD/Kerberos Definition: Microsoft's Active Directory (AD) supports Kerberos as a means of exchanging authorization credentials with other platforms. Justification for Hype Cycle Position/Adoption Speed: The dominant usage of AD Kerberos is Windows-centric; however, companies are beginning to deploy products that use AD Kerberos into non-windows environments. Business Impact Areas: Simplifies user administration by focusing access on a single set of credentials maintained in AD and reduces sign-off in heterogeneous environments. Market Penetration: Five percent to 20 percent of target audience. Maturity: Early mainstream. Example Vendors: Centrify, Microsoft and Vintela/Quest Software. Publication Date: 21 June 2005/ID Number: G Page 8 of 15

9 Analysis by John Enck 5.3 CCOW Standard Definition: A standard certified by the American National Standards Institute for single sign-on and context management that complements Health Level 7's emphasis on data interchange and workflow. It focuses on facilitating application integration at the point of use. Single sign-on allows the user access to multiple systems through a single, secure login. Context management (the synchronization of applications so that they are mutually aware of a set of real-world things, such as patients and encounters) allows users to interact with a number of systems through their native user interfaces as if they were one. Justification for Hype Cycle Position/Adoption Speed: In 2005, healthcare organizations will continue to focus on doing a better job on IAM in light of the Health Insurance Portability and Accountability Act (HIPAA) security deadline. Opportunities for context management will emerge as a result of IAM efforts and clinical context object workgroup (CCOW), and implementations will increase. Increased deployment of clinical workstations and physician portals, as well as the visual integration of disparate clinical systems to form the virtual electronic medical record, will also drive adoption. Business Impact Areas: A more streamlined clinical workflow, increased interoperability, ease of use, increased use of available information and enhanced patient safety. CCOW support for secure context management provides a healthcare standards basis for addressing HIPAA requirements. Benefit Rating: High. Market Penetration: Five percent to 20 percent of target audience. Maturity: Early mainstream. Example Vendors: BNX Systems, Carefx, Orion and Sentillion. Analysis by Barry Runyon 5.4 User Provisioning Definition: Managing user accounts and user profiles that are linked to each person across the IT environment via a combination of user roles and business rules. User provisioning also encompasses the capability to abstract and automatically correlate data from HR, customer relationship management, systems, other "identity stores" and managed systems. Fulfillment is handled by self-service requests, a line-management request or an HR system change. Justification for Hype Cycle Position/Adoption Speed: Implementations manage internal and external users. Limitations have been on managing the entire business process of accessrequest processing, as well as IT infrastructure additions and maintenance, not just the hire/fire process. Provisioning limits on scale and platform support also a concern. Business Impact Areas: When integrated with multiple applications (including access control), privileges and provisioning can offer significant return on investment over manual methods. Regulatory compliance is driving a number of user-provisioning implementations. Addressing compliance concerns is key. Market Penetration: Five percent to 20 percent of target audience. Publication Date: 21 June 2005/ID Number: G Page 9 of 15

10 Maturity: Early mainstream. Example Vendors: Abridean, Avatier, Beta Systems Software, bhold, BMC Software, Computer Associates, Courion, Evidian, Fischer International, HP, IBM, Microsoft, M-Tech, Novell, Open Systems Management, Oracle, Sentillion, Siemens, Sun Microsystems and Thor Technologies. Analysis by Roberta Witty 5.5 Meta-Directories Definition: Software products that synchronize and, optionally, aggregate identity data stored in multiple repositories. Justification for Hype Cycle Position/Adoption Speed: Meta-directories provide a proven and relatively quick-and-easy way to reduce user administration by synchronizing identity data among multiple repositories. Business Impact Areas: Can be used to automate security policies and implement user selfservice capabilities; however, most often used as a tool to reduce user administration overhead. Benefit Rating: High. Market Penetration: Twenty percent to 50 percent of target audience. Maturity: Mature mainstream. Example Vendors: IBM, Microsoft, Novell and Sun Microsystems. Analysis by John Enck 5.6 Smart Tokens Definition: Use of integrated-circuit-based cards for information systems access, and for holding digital credentials for security processes, such as encryption or digital signing. Justification for Hype Cycle Position/Adoption Speed: Smart cards are appealing to companies considering more than one application, such as physical security or cashless vending. However, alternative authentication methods, including multifunctional Universal Serial Bus tokens and cellular phone Short Message Service-enabled versions of one-time password systems, create less-expensive and simpler strong authentication because they do not require a reader. Business Impact Areas: Provide a convenient platform for multiple security functions. Symbolizes company trust in the employee. Market Penetration: One percent to 5 percent of target audience. Maturity: Early mainstream. Example Vendors: ActivCard, Axalto, Gemplus and RSA Security. Analysis by Clare Hirst 5.7 Enterprise Reduced Sign-On Definition: Consolidates the multiple sign-ons required by individual applications to reduce employees' password and user ID combinations. Publication Date: 21 June 2005/ID Number: G Page 10 of 15

11 Justification for Hype Cycle Position/Adoption Speed: Consolidated password routines and user self-service systems are available; however, "single" sign-on remains elusive, hence the term "reduced." Business Impact Areas: Simplifies the user experience and makes it more convenient, but arguably weakens security unless strong authentication methods are used for the initial sign-on. Market Penetration: Five percent to 20 percent of target audience. Maturity: Early mainstream. Example Vendors: ActivCard, BNX Systems, Citrix Systems, Computer Associates, Evidian, Imprivata, i-sprint, Novell, Passlogix, Protocom Development Systems, RSA Security, Sentillion and Version3. Analysis by Roberta Witty 6.0 Entering the Plateau 6.1 EAM Definition: Systems providing centralized authentication and authorization to Web-based applications. Justification for Hype Cycle Position/Adoption Speed: Extranet access management (EAM) systems have become a mature technology widely used by enterprises that deal with large numbers of Web applications, either internally or externally. Business Impact Areas: Extranet and intranet Web application portals. Market Penetration: More than 50 percent of target audience. Maturity: Mature mainstream. Example Vendors: Computer Associates, Entrust, IBM, Novell, Oracle, RSA Security and Sun Microsystems. Analysis by Ray Wagner 6.2 Password Management Definition: The automation of password resets via self-service and the synchronization of passwords across all integrated platforms and applications. Justification for Hype Cycle Position/Adoption Speed: Automating self-service password management is a typical first phase of an identity management implementation. Automation procedures are often integrated with the help desk toolset. Business Impact Areas: Enterprises can reduce their help desk call volume by more than 80 percent. Market Penetration: Twenty percent to 50 percent of target audience. Publication Date: 21 June 2005/ID Number: G Page 11 of 15

12 Maturity: Mature mainstream. Example Vendors: Avatier, Courion, M-Tech, Proginet and all user provisioning vendors. Analysis by Roberta Witty 6.3 Hardware Tokens Definition: Access authentication mechanisms that use a smart card or a device that displays a one-time password. Justification for Hype Cycle Position/Adoption Speed: One-time password functionality, formerly on proprietary tokens, is moving into multiple areas, such as Windows log-in, cell phone Short Message Service, PDAs and other devices. Universal Serial Bus hardware tokens are poised for growth. One-time password tokens and order-to-cash authentication have received increased attention in the banking sector. Business Impact Areas: Supports strong authentication. Market Penetration: Twenty percent to 50 percent of target audience. Maturity: Mature mainstream. Example Vendors: Aladdin Knowledge Systems, RSA Security, SafeNet and VeriSign. Analysis by Clare Hirst 7.0 Off the Hype Cycle 7.1 User ID and Password Definition: A combination of a known unique identifier (the ID) and a secret identifier (the password) that form the basic user authentication methodology and that is manually entered by a person to gain access to an electronic system. Justification for Omission: User IDs and passwords are now the standard, ubiquitous authentication methodology. They are not a choice but are required for every operating system, database and application. Analysis by Roberta Witty 7.2 Single Sign-On Definition: Consolidates the multiple sign-ons required by individual applications to reduce employees' password and user ID combinations to one sign-on to gain access to all electronic systems within the company. Justification for Omission: Single sign-on is a misnomer no one can achieve it without a homogeneous IT infrastructure. Therefore, Gartner now uses the term "enterprise reduced signon." Analysis by Roberta Witty Publication Date: 21 June 2005/ID Number: G Page 12 of 15

13 7.3 Kerberos Definition: A cryptographic-based technology for user authentication made standard by the Massachusetts Institute of Technology (MIT). Justification for Omission: MIT Kerberos is a complicated technology that requires expert-level Unix knowledge to implement. It has little cost justification because the application code must be modified to integrate with the central Kerberos single sign-on solution. Microsoft's integration of Kerberos with Active Directory is taking the lead in enterprise Kerberos use. Analysis by Roberta Witty 8.0 Conclusions Certain IAM technologies, such as password management, extranet access management and hardware tokens, have reached the Plateau of Productivity on Gartner's IAM Hype Cycle. Biometrics is at the Peak of Inflated Expectations, and although it seems likely certain forms of biometrics will eventually reach the Plateau of Productivity, it is still unclear what forms of biometrics will become truly mainstream. 9.0 Appendix A: Hype Cycle Phases, Benefit Ratings and Maturity Levels Table 1. Hype Cycle Phases Phase Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Time to Plateau (Adoption Speed) Source: Gartner (June 2005) Definition A breakthrough, public demonstration, product launch or other event generates significant press and industry interest. During this phase of overenthusiasm and unrealistic projections, a flurry of wellpublicized activity by technology leaders results in some successes, but more failures, as the technology is pushed to its limits. The only enterprises making money are conference organizers and magazine publishers. Because the technology does not live up to its overinflated expectations, it rapidly becomes unfashionable. Media interest wanes, except for a few cautionary tales. Focused experimentation and solid hard work by an increasingly diverse range of organizations lead to a true understanding of the technology's applicability, risks and benefits. Commercial, off-the-shelf methodologies and tools ease the development process. The real-world benefits of the technology are demonstrated and accepted. Tools and methodologies are increasingly stable as they enter their second and third generations. The final height of the plateau varies according to whether the technology is broadly applicable or benefits only a niche market. Approximately 30 percent of the technology's target audience has adopted or is adopting the technology as it enters the Plateau. The time required for the technology to reach the Plateau of Productivity. Table 2. Benefit Ratings Benefit Rating Transformational Definition Enables new ways of doing business across industries that will result in major shifts in industry dynamics Publication Date: 21 June 2005/ID Number: G Page 13 of 15

14 Benefit Rating High Moderate Definition Enables new ways of performing horizontal or vertical applications that will result in significantly increased revenue or cost savings for an enterprise Provides incremental, but significant, improvements to established processes that will result in increased revenue or cost savings for an enterprise Low Slightly improves processes (for example, improved user experience) that will be difficult to translate into increased revenue or cost savings Source: Gartner (June 2005) Table 3. Maturity Levels Maturity Level Status Products/Vendors Embryonic In labs None Emerging Adolescent Early mainstream Mature mainstream Legacy Commercialization by vendors Pilots and deployments by industry leaders Maturing technology capabilities and process understanding Uptake beyond early adopters Proven technology Vendors, technology and adoption rapidly evolving Robust technology Not much evolution in vendors or technology Not appropriate for new developments Cost of migration constrains replacement First generation High price Much customization Second generation Less customization Third generation More out of box Methodologies Several dominant vendors Maintenance revenue focus Obsolete Rarely used Used/resale market only Source: Gartner (June 2005) RECOMMENDED READING "Understanding Gartner's Hype Cycles, 2005" Acronym Key and Glossary Terms AD CCOW DHCP EAM HIPAA IAM MIT Active Directory clinical context object workgroup Dynamic Host Configuration Protocol extranet access management Health Insurance Portability and Accountability Act identity and access management Massachusetts Institute of Technology Publication Date: 21 June 2005/ID Number: G Page 14 of 15

15 NAC PKI RADIUS network access control public-key infrastructure Remote Authentication Dial-In User Service This research is part of a set of related research pieces. See "Gartner's Hype Cycle Special Report for 2005" for an overview. REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Level 7, 40 Miller Street North Sydney New South Wales 2060 AUSTRALIA Latin America Headquarters Av. das Nações Unidas andar WTC São Paulo SP BRAZIL Publication Date: 21 June 2005/ID Number: G Page 15 of 15

Research. Identity and Access Management Defined

Research. Identity and Access Management Defined Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from

More information

Security and Identity Management Auditing Converge

Security and Identity Management Auditing Converge Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,

More information

The Identity and Access Management Market Landscape

The Identity and Access Management Market Landscape Research Publication Date: 7 November 2003 ID Number: COM-21-4534 The Identity and Access Management Market Landscape Roberta J Witty Integrating identity and access management components into an overall

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

Five Business Drivers of Identity and Access Management

Five Business Drivers of Identity and Access Management Research Publication Date: 31 October 2003 ID Number: SPA-21-3673 Five Business Drivers of Identity and Access Management Roberta J. Witty The primary reasons to implement IAM solutions are business facilitation,

More information

Use This Eight-Step Process for Identity and Access Management Audit and Compliance

Use This Eight-Step Process for Identity and Access Management Audit and Compliance Research Publication Date: 28 March 2005 ID Number: G00126592 Use This Eight-Step Process for Identity and Access Management Audit and Compliance Roberta J. Witty, Ant Allan, Jay Heiser Authentication,

More information

The Four "A's" of Information Security

The Four A's of Information Security Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also

More information

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions. Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information

More information

Hype Cycle for Customer Relationship Management, 2003

Hype Cycle for Customer Relationship Management, 2003 S. Nelson Strategic Analysis Report 6 June 2003 Hype Cycle for Customer Relationship Management, 2003 Customer relationship management is maturing as a business strategy, but many aspects of CRM are more

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

Hype Cycle for Open-Source Technologies, 2003

Hype Cycle for Open-Source Technologies, 2003 N. Drakos Strategic Analysis Report 30 May 2003 Hype Cycle for Open-Source Technologies, 2003 Open-source development principles are expanding into new areas. Gartner assesses the maturity of 17 open-source

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Gartner Updates Its Definition of IT Infrastructure Utility

Gartner Updates Its Definition of IT Infrastructure Utility Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

Choosing a Replacement for Incumbent One-Time Password Tokens

Choosing a Replacement for Incumbent One-Time Password Tokens Research Publication Date: 21 April 2011 ID Number: G00212244 Choosing a Replacement for Incumbent One-Time Password Tokens Ant Allan This research outlines the options for enterprises seeking replacements

More information

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

How to Develop an Effective Vulnerability Management Process

How to Develop an Effective Vulnerability Management Process Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

Consider Identity and Access Management as a Process, Not a Technology

Consider Identity and Access Management as a Process, Not a Technology Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research

More information

Discovering the Value of Unified Communications

Discovering the Value of Unified Communications Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions

More information

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are

More information

Market Trends in 2002 and 2003

Market Trends in 2002 and 2003 Markets, J. Pescatore, R. Wagner Research Note 8 January 2003 Extranet Access Management 2H02 Magic Quadrant Inside-the-firewall (intraenterprise) integration to reduce costs dominated the extranet access

More information

Selection Requirements for Business Activity Monitoring Tools

Selection Requirements for Business Activity Monitoring Tools Research Publication Date: 13 May 2005 ID Number: G00126563 Selection Requirements for Business Activity Monitoring Tools Bill Gassman When evaluating business activity monitoring product alternatives,

More information

CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02

CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 IGG-01152003-02 J. Pescatore, R. Wagner Article 15 January 2003 CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 CIOs and many other executives are interested in insights on how

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

G00123440 A. Allan. Directory authentication providing a common ID and password across multiple systems

G00123440 A. Allan. Directory authentication providing a common ID and password across multiple systems . llan Research Note 21 October 2004 Commentary Enterprise Single Sign-On Tools re Comprehensive but Costly Managing multiple user identities and passwords is difficult for companies and users. ESSO can

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

Strategic Road Map for Network Access Control

Strategic Road Map for Network Access Control G00219087 Strategic Road Map for Network Access Control Published: 11 October 2011 Analyst(s): Lawrence Orans, John Pescatore Long derided as an overhyped concept, network access control (NAC) has emerged

More information

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve Research Publication Date: 6 December 2007 ID Number: G00152575 Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve John Enck, Philip Dawson, George J. Weiss, Rakesh Kumar,

More information

Overcoming the Gap Between Business Intelligence and Decision Support

Overcoming the Gap Between Business Intelligence and Decision Support Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision

More information

X.509 Certificate Management: Avoiding Downtime and Brand Damage

X.509 Certificate Management: Avoiding Downtime and Brand Damage G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity

More information

Document Management: Assessing Costs and Benefits

Document Management: Assessing Costs and Benefits Research Publication Date: 27 September 2000 ID Number: SPA-11-9200 Document Management: Assessing Costs and Benefits Debra Logan Investment in DM will typically pay for itself within two or three years.

More information

Repurposing Old PCs as Thin Clients as a Way to Save Money

Repurposing Old PCs as Thin Clients as a Way to Save Money Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Cloud, SaaS, Hosting and Other Off-Premises Computing Models Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable

More information

Management Update: The Outlook for the PKI Market

Management Update: The Outlook for the PKI Market IGG-07092003-04 V. Wheatman, R. Wagner Article 9 July 2003 Management Update: The Outlook for the PKI Market With less market emphasis on cryptographic key management, and more on rule-based identity and

More information

Identity and Access Management Technologies. Developed By: Janice Moyer Presented By: Adam James NebraskaCERT - 8/14/2007

Identity and Access Management Technologies. Developed By: Janice Moyer Presented By: Adam James NebraskaCERT - 8/14/2007 Identity and Access Management Technologies Developed By: Janice Moyer Presented By: Adam James NebraskaCERT - 8/14/ Access Control Process Identification Ensuring the subject is who he claims to be Authentication

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

1.0 Introduction and Report Overview

1.0 Introduction and Report Overview 1.0 Introduction and Report Overview A revolution is taking place in application infrastructure and integration. New technologies and concepts such as Web services, service-oriented architecture (SOA)

More information

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with

More information

The Six Triggers for Using Data Center Infrastructure Management Tools

The Six Triggers for Using Data Center Infrastructure Management Tools G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using

More information

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

Research. Mastering Master Data Management

Research. Mastering Master Data Management Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has

More information

Energy savings from well-managed data centers can reduce operating expenses by as much as 20%.

Energy savings from well-managed data centers can reduce operating expenses by as much as 20%. Research Publication Date: 29 March 2010 ID Number: G00174769 DCIM: Going Beyond IT David J. Cappuccio Infrastructure and operations (I&O) leaders must now go beyond performance management of IT equipment

More information

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers

More information

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Timothy Siu SE Manager, JES Nov/10/2003 sun.com/solutions/

More information

Case Study: Social Networking Tool Becomes Essential Workplace Infrastructure at Deloitte

Case Study: Social Networking Tool Becomes Essential Workplace Infrastructure at Deloitte Research Publication Date: 3 April 2009 ID Number: G00166424 Case Study: Social Networking Tool Becomes Essential Workplace Infrastructure at Deloitte Nikos Drakos We look at the motivation, justification

More information

Authentication: Password Madness

Authentication: Password Madness Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the

More information

Gartner Defines Enterprise Information Architecture

Gartner Defines Enterprise Information Architecture Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes. Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

Real-Time Decisions Need Corporate Performance Management

Real-Time Decisions Need Corporate Performance Management Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends

More information

Magic Quadrant for a Fading PKI Market, 2003

Magic Quadrant for a Fading PKI Market, 2003 Markets, V. Wheatman, R. Wagner Research Note 17 June 2003 Magic Quadrant for a Fading PKI Market, 2003 Pure-play public-key infrastructure vendors are disappearing due to failure or acquisition, or by

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

Case Study: Denmark's Achievements With Healthcare Information Exchange

Case Study: Denmark's Achievements With Healthcare Information Exchange Industry Research Publication Date: 30 May 2006 ID Number: G00139713 Case Study: Denmark's Achievements With Healthcare Information Exchange Jonathan Edwards Through careful use of IT, the Danish health

More information

Emerging PC Life Cycle Configuration Management Vendors

Emerging PC Life Cycle Configuration Management Vendors Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud G00214958 Use Heterogeneous Storage Virtualization as a Bridge to the Cloud Published: 12 August 2011 Analyst(s): Gene Ruth Data center operators who are interested in private cloud storage technologies

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

Governance Is an Essential Building Block for Enterprise Information Management

Governance Is an Essential Building Block for Enterprise Information Management Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways

More information

NAC Strategies for Supporting BYOD Environments

NAC Strategies for Supporting BYOD Environments G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach

More information

SIEM and IAM Technology Integration

SIEM and IAM Technology Integration SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security

More information

1.0 Introduction and Report Overview

1.0 Introduction and Report Overview 1.0 Introduction and Report Overview As computers and networking become ubiquitous, information security is no longer a backroom issue in the enterprise. It s everyone s concern. Information security depends

More information

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

Cloud IaaS: Security Considerations

Cloud IaaS: Security Considerations G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the

More information

Google and Microsoft Battle for the.edu E-Mail Market

Google and Microsoft Battle for the.edu E-Mail Market Research Publication Date: 16 August 2007 ID Number: G00150690 Google and Microsoft Battle for the.edu E-Mail Market Matthew W. Cain, Marti Harris This document compares the current no-fee e-mail programs

More information

SSO-Report 2007 Key-Player, Status, Trends. Martin Kuppinger, KCP mk@kuppingercole.de

SSO-Report 2007 Key-Player, Status, Trends. Martin Kuppinger, KCP mk@kuppingercole.de SSO-Report 2007 Key-Player, Status, Trends Martin Kuppinger, KCP mk@kuppingercole.de What will I talk about? SSO Single Sign-On defined: User perspective: The ability to use multiple applications with

More information

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Research Publication Date: 24 March 2008 ID Number: G00156216 Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Tom Austin Both Google and Microsoft come up short in terms of delivering

More information