Google: Changing the Pricing and Provisioning Paradigm?

Size: px
Start display at page:

Download "Google: Changing the E-Mail Pricing and Provisioning Paradigm?"

Transcription

1 Research Publication Date: 6 March 2007 ID Number: G Google: Changing the Pricing and Provisioning Paradigm? Matthew W. Cain This document analyzes Google s initial foray into the paid enterprise application space. While it will have little immediate impact for most organizations, the move underscores significant changes occurring in the way enterprises buy and run crucial end user productivity tools such as . Key Findings The low price point and ease of provisioning of Google services will push enterprises to consider segmenting users into premium (Exchange and Office, for example) and standard (Google, for example) application bundles as part of an effort to reduce costs. The low price point and ease of provisioning will also enable organizations to contemplate supplying (and other applications) to users lacking that capability, thereby creating business efficiencies and knowledge transfer. Google represents the most significant threat ever to Microsoft hegemony in the and personal productivity application space, which we believe is causing the Redmond giant to alter its current provisioning (on premises versus software as a service [SaaS]) and pricing models. The Google effort comes at a time when end users are increasingly aggressive in using non-it sanctioned services both hardware and software forcing organizations to reconsider the role users will play in selecting and consuming technology services. Recommendations Organizations should evaluate the costs of and personal productivity applications and determine the minimum feature set and service-level agreements needed for different classes of users. Those identified needs should then be compared to SaaS provisioned workplace technologies. Enterprises should examine opportunities for segmenting users by application needs and consider the benefits of providing software to those employees currently outside the realm of IT services. IT groups should identify savvy users with a penchant for new technology to trial and report on Google enterprise services. Likewise, pilot programs should be run for employees without software services today and/or for classes of users where the Google applications are likely to meet immediate needs. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

2 Enterprises must initiate dialogue with legal, security, risk management and human resource groups to determine and address objections to the Google-type model and establish policy around use of these services. Publication Date: 6 March 2007/ID Number: G Page 2 of 7

3 WHAT YOU NEED TO KNOW Given the brand awareness, pricing and ease of acquisition of the Google applications, the appeal to business users will be significant. Therefore, organizations must establish guidelines to determine the applicability and acceptability of Google and similar services. EVENT On 22 February 2007, Google introduced a package of collaboration tools ( , instant messaging and calendar) and personal productivity applications (spreadsheet, word processor and page creator), aimed at enterprise users. Pricing for Google Apps Premier Edition is $50/user/year, which includes 10 GB of storage (across all applications), a 99.9% uptime servicelevel agreement (not including planned downtime), an administrative API interface, and 24/7 phone support for named support staff (one hour response time on the most severe issues). Advertising is off by default. The tools can be custom branded for the organization, including the domain. Access is via an Ajax client with no downloads and data transmission is encrypted with HTTPS. A SAML 2.0 authentication API is available for single sign-on options with enterprise systems and APIs available for directory integration. Message migration from current systems can be done via a Post Office Protocol (POP) interface, which can be used as an alternative client access protocol. Enterprises will be able to rout all mail through on-premises (or other) mail relays for archive, compliance and other filtering needs. Mobile support is provided by browser access and native BlackBerry support. All data is stored in multiple places for redundancy and data centers are mirrored for high availability and disaster recovery. Google is also offering a free advertising-supported 2 GB version of the suite called Google Apps, Standard Edition, with only support and no uptime guarantees. A version is also available for the ".edu" market. Analysis The immediate allure of the fee-based Google applications is the component. At the spreadsheet and word processing level it is unlikely that organizations will replace MS Office applications in the near future for feature, familiarity and compatibility reasons. We do expect to see the lightweight spreadsheet and word processor applications which have some innovative collaboration capabilities such as simultaneous editing used by rogue groups of end users without the consent of the IT group, exploiting the free version for short-term use on ad hoc projects. These users will promote this class of applications virally to users in their department, enterprise, "ecosystem" and industry. Users of increasingly higher rank within the organization will question IT groups about cost chargebacks for Office (and ) services as the Google services grow in sophistication. Autonomous business units circa 2010 will elect to opt out of IT-provided personal productivity services in favor of Google (and other) SaaS services. However, official adoption of the Google spreadsheet, word processor and (eventually) presentation-creation applications as a replacement for Office within corporations of more than 1,000 employees will be slow. By contrast, we believe adoption of enterprise Gmail in corporations with more than 1,000 employees will be quicker, reaching 3% by YE10 and 6% by YE12 (0.7 probablility). In small and midsize companies (SMBs), and the ".edu" and ".org" sectors, those numbers are likely to be 4% and 8% respectively (0.7 probablility). Among other factors driving Google adoption will be unhappiness with Microsoft terms, conditions and complexity, and a desire to break away from what is perceived to be a Microsoft stranglehold on workgroup system software and applications. However, that said, the most likely candidates for enterprise Gmail services are users new to business and those coming from Novell and Publication Date: 6 March 2007/ID Number: G Page 3 of 7

4 IBM where the desire to migrate from current systems is strongest. We also expect organizations contemplating upgrades to the new Exchange 2007 mail server to consider Google as an alternative. The reason for the anticipated, swifter uptake of Google enterprise services compared to the other applications is that the value proposition is more immediate. Organizations often view e- mail as a commodity service and have been open at management level at least to moving to a hosted model, but the economics have never made sense. Google has proven that economies of scale do exist by running services for millions of consumers, and is likely to succeed in bringing those economies to business users. Google was a latecomer to the consumer market (April 2004), but has moved quickly to catch up. We estimate that Gmail has tens of millions of users, as opposed to MSN, Yahoo and AOL, which have hundreds of millions of mail users. Google has led the market with numerous innovations such as a feature-rich Ajax client, conversation threading, message tagging (as opposed to "foldering") and large volumes of storage. Gmail, therefore, breathed new life into a staid market, forcing MSN, Yahoo and AOL to update clients, add storage, and generally update their free mail businesses. Google is now turning its attention to the enterprise market, where, with its search appliance, it has already been extremely successful. There are many attractions to the enterprise Gmail (and SaaS in general) model. All system maintenance is done in the background an almost imponderable relief to enterprise technicians who spend enormous amounts of time testing and installing fixes, patches and service packs. Immediate feature upgrades will be appealing to users who see feature upgrades every few years via service packs or version upgrades. Version upgrades themselves present an enormous challenge for enterprises, due to the vast effort and cost associated with a large-scale upgrade. This is a scenario staring every Exchange shop in the face with the introduction of Exchange 2007, which requires new server hardware and operating system and directory upgrades. We believe that ultimately the hosted model will prove more efficient than an onpremises deployment. However, numerous barriers need to be overcome prior to that happening. The barriers to adoption for enterprise Gmail services include the following: Usability. The browser Gmail interface, thought of as innovative when first introduced, is now seen as outdated and cumbersome to use. Outlook style interfaces have clearly won the day, putting pressure on Google to respond. Application Integration. Enterprise applications increasingly use services for notification and transport purposes. Google has to respond to requests to meet enterprise integration requirements. Directory and Identity Integration. While Google offers APIs for integration, the coding process and steady-state operations are likely to be cumbersome and brittle due to the custom nature of the work. Google needs to offer a higher-level, packaged integration story. It has established some third-party partnerships to deliver integration services. Offline Use. Offline use is limited to what the POP can download to a local client; it does not include provisions for offline calendar or contacts use. Compliance and Control. Organizations are increasingly burdened with internal and external compliance requirements for message preservation, encryption and supervision. Message purging and retention for legal reasons are increasing in complexity, with the trend toward less e- mail being preserved a direct contradiction to the Gmail approach. Google will need to make significant investments to meet these needs. It has partnered with Postini to meetsome of these Publication Date: 6 March 2007/ID Number: G Page 4 of 7

5 inbound-outbound compliance needs, but the alliance does not address mail kept inside the organization. Unified Communications. Enterprises are increasingly tying voice, instant messaging and e- mail services together, which is far easier when all components are in one place. Google will have to develop services to allow, for example, Nortel or Cisco phone services to interface with the system. Avaya announced that it would pursue this path with Google on launch day. Security. Fears of unauthorized access to messages rapidly escalate as mail services move outside the perimeter, as do fears over security breaches resulting from co-location of multiple customers on the same infrastructure. Google will need to address these issues with services like in-situ encryption and dedicated infrastructure. Migration. Internet Message Access Protocol (IMAP) migration services only address standard messages and not proprietary extensions or calendar, task or contact data. Google needs to have custom migration utilities for each major system, as well as operational controls for creating migration efficiencies. Operational Support. $50/user/year is the starting place for the total cost of ownership (TCO) model for Gmail, not the end point. Companies will still have to dedicate resources for mail administration, monitoring and troubleshooting, as well as overseeing single sign-on and directory integration duties. Google needs to take steps to minimize the operational burden. Training. While Google has the advantage of slip-streaming feature upgrades on a regular basis, training users on how to use the functions will still be required. Google must establish a training regime to ensure continuous use of the service at optimal levels. Google has already taken steps to create a third-party community around enterprise Gmail to supplement its core offering. Hosted hygiene vendor Postini has been signed up to provide corporate-grade control services and Avaya has been enlisted. But clearly many things need to be done before large enterprises feel comfortable using Gmail as a replacement for the corporate mail service. Commercial Gmail services threaten the Microsoft Exchange franchise the most, as this holds 62% of the enterprise market. Over the past five years, Microsoft has been winning market share from IBM and Novell, and in the absence of Google would likely continue to aggregate market control. We estimate that organizations spend about $120/user/year for on-premises services (based on a three-year ownership model), so commercial Gmail is immediately attractive from an economic perspective. This factor alone, we believe, will spark significant interest in the service. Microsoft has not shown indifference to the events at Google. The Exchange business unit bought Frontbridge a provider of hosted hygiene and control services in 2006 and includes that service as part of the enterprise client access license (CAL) for Exchange Office Live offers hosted (Hotmail heritage) mail services to the SMB community and a similar hosted service for universities as part of Windows Live. Hosted Exchange services from third parties have been available for years, but penetration has been limited to small vendors. We estimate that less than 3% of the Exchange base uses a hosted model. Uptake is limited, due largely to the cost of hosted services, which are typically more than on-premises costs. We expect Microsoft to become aggressive with its own Exchange hosted services this year, including a mid-year offering targeted at organizations with fewer than 1000 users and a program for no-fee Exchange services for university students by the end of the year. To remain competitive with Google from an operational and cost perspective, Microsoft will have to adapt this hosted model paradigm for deployment inside organizations, where the IT group acts as an internal host. Publication Date: 6 March 2007/ID Number: G Page 5 of 7

6 We believe the February 22 announcement will kick off a long-term paradigm shift in provisioning. Besides Microsoft s own (current and anticipated) effort in the hosted space, Webex recently introduced its own SMB-focused service built on a SendMail back-end at $60/user/year. We expect Yahoo, which has intermittently played in the fee-based market, to make a concerted effort at market penetration within the next year. The next logical step is for a vendor to offer an advertising-based revenue cost-sharing model, effectively making a profit center. The benefits of a hosted model are too great to ignore the only issue is that when stability occurs, security and functionality should match and then exceed corporate-provisioned services. Given the criticality of to the health of an organization, we believe that risk abatement is the primary concern for investments. Therefore, organizations should be extremely cautious in approaching commercial Gmail services. For mainstream knowledge workers, we believe it prudent to wait two or three years to actively consider migrating to Gmail (or similar services) to determine overall maturity, stability and efficacy of the system. There is, however, more immediate applicability to boundary workers without access to and other user types where rich services are less of a priority. Done properly, is an appropriate application for the SaaS model, and that model is clearly going to be the primary destabilizing force to the current status quo. By YE10, we expect 8% of corporate users to be using hosted services, growing to 17% by YE12 (0.7 probability). Publication Date: 6 March 2007/ID Number: G Page 6 of 7

7 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 6 March 2007/ID Number: G Page 7 of 7

Google and Microsoft Battle for the.edu E-Mail Market

Google and Microsoft Battle for the.edu E-Mail Market Research Publication Date: 16 August 2007 ID Number: G00150690 Google and Microsoft Battle for the.edu E-Mail Market Matthew W. Cain, Marti Harris This document compares the current no-fee e-mail programs

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

Discovering the Value of Unified Communications

Discovering the Value of Unified Communications Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions

More information

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Research Publication Date: 24 March 2008 ID Number: G00156216 Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Tom Austin Both Google and Microsoft come up short in terms of delivering

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New

More information

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

E-Mail Is a Commodity and Other Fairy Tales

E-Mail Is a Commodity and Other Fairy Tales G00210585 E-Mail Is a Commodity and Other Fairy Tales Published: 9 February 2011 Analyst(s): Matthew W. Cain A deep understanding of the operational, architectural, policy and feature requirements of an

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

Q&A: Hosted Exchange Services for the Education Market

Q&A: Hosted Exchange Services for the Education Market Research Publication Date: 16 May 2008 ID Number: G00156645 Q&A: Hosted Exchange Services for the Education Market Matthew W. Cain To help combat Google's inroads into the.edu e-mail market, Microsoft

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Cloud, SaaS, Hosting and Other Off-Premises Computing Models Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,

More information

IT Operational Considerations for Cloud Computing

IT Operational Considerations for Cloud Computing Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

NGFWs will be most effective when working in conjunction with other layers of security controls.

NGFWs will be most effective when working in conjunction with other layers of security controls. Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

Emerging PC Life Cycle Configuration Management Vendors

Emerging PC Life Cycle Configuration Management Vendors Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market

More information

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references

More information

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are

More information

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions. Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Research Publication Date: 23 April 2008 ID Number: G00156910 XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Nigel Rayner, Neil Chandler Extensible Business Reporting Language

More information

Use These Guidelines for Making Better CRM Consulting Provider Selections

Use These Guidelines for Making Better CRM Consulting Provider Selections Research Publication Date: 7 July 2006 ID Number: G00141062 Use These Guidelines for Making Better CRM Consulting Provider Selections Matthew Goldman, Ed Thompson, Lorrie Scardino Gartner sees many inconsistencies

More information

Repurposing Old PCs as Thin Clients as a Way to Save Money

Repurposing Old PCs as Thin Clients as a Way to Save Money Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers

More information

Real-Time Decisions Need Corporate Performance Management

Real-Time Decisions Need Corporate Performance Management Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends

More information

X.509 Certificate Management: Avoiding Downtime and Brand Damage

X.509 Certificate Management: Avoiding Downtime and Brand Damage G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable

More information

Overcoming the Gap Between Business Intelligence and Decision Support

Overcoming the Gap Between Business Intelligence and Decision Support Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision

More information

Risk Intelligence: Applying KM to Information Risk Management

Risk Intelligence: Applying KM to Information Risk Management Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Research Publication Date: 31 July 2009 ID Number: G00168488 Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Carsten Casper, Thomas Otter, Arabella Hallawell The vast majority (probably greater

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

The Seven Building Blocks of MDM: A Framework for Success

The Seven Building Blocks of MDM: A Framework for Success Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)

More information

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical

More information

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary. Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important

More information

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Research Publication Date: 12 February 2008 ID Number: G00154811 Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Steve Blood Companies spend too much on IP-PBXs

More information

Governance Is an Essential Building Block for Enterprise Information Management

Governance Is an Essential Building Block for Enterprise Information Management Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways

More information

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial

More information

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud G00214958 Use Heterogeneous Storage Virtualization as a Bridge to the Cloud Published: 12 August 2011 Analyst(s): Gene Ruth Data center operators who are interested in private cloud storage technologies

More information

Data Center Consolidation in Western Europe Faces Limitations

Data Center Consolidation in Western Europe Faces Limitations Research Publication Date: 19 September 2006 ID Number: G00143179 Data Center Consolidation in Western Europe Faces Limitations Rakesh Kumar Organizations embarking on pan-european data center site consolidation

More information

2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise

2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise Research Publication Date: 23 July 2009 ID Number: G00169733 2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise John E. Van Decker Extensible Business Reporting Language (XBRL) will be a requirement

More information

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve Research Publication Date: 6 December 2007 ID Number: G00152575 Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve John Enck, Philip Dawson, George J. Weiss, Rakesh Kumar,

More information

Document the IT Service Portfolio Before Creating the IT Service Catalog

Document the IT Service Portfolio Before Creating the IT Service Catalog Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Industry Research Publication Date: 11 February 2009 ID Number: G00164764 Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Jeff Vining Government CIOs are under increasing

More information

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives

More information

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey.

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey. Research Publication Date: 5 December 2008 ID Number: G00160425 Gartner Introduces the EIM Maturity Model David Newman, Debra Logan Organizations cannot implement enterprise information management (EIM)

More information

Gartner Updates Its Definition of IT Infrastructure Utility

Gartner Updates Its Definition of IT Infrastructure Utility Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some

More information

Choosing a Replacement for Incumbent One-Time Password Tokens

Choosing a Replacement for Incumbent One-Time Password Tokens Research Publication Date: 21 April 2011 ID Number: G00212244 Choosing a Replacement for Incumbent One-Time Password Tokens Ant Allan This research outlines the options for enterprises seeking replacements

More information

The Role of Enterprise Architecture in Technology Research

The Role of Enterprise Architecture in Technology Research Research Publication Date: 26 December 2007 ID Number: G00153117 The Role of Enterprise Architecture in Technology Research Brian Burke Enterprise architects are often tasked with identifying disruptive

More information

Recognize the Importance of Digital Marketing

Recognize the Importance of Digital Marketing Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated

More information

Data Center Consolidation Projects: Benefits and Pitfalls

Data Center Consolidation Projects: Benefits and Pitfalls Research Publication Date: 2 May 2011 ID Number: G00212148 Data Center Consolidation Projects: Benefits and Pitfalls David J. Cappuccio This research outlines the primary success factors in consolidation

More information

Research. Mastering Master Data Management

Research. Mastering Master Data Management Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has

More information

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s

More information

What Is the Role of Quality Assurance in a SaaS Environment?

What Is the Role of Quality Assurance in a SaaS Environment? Research Publication Date: 15 September 2009 ID Number: G00170552 What Is the Role of Quality Assurance in a SaaS Environment? Thomas E. Murphy, Daniel Sholler, Christian Hestermann Software as a service

More information

Cloud IaaS: Service-Level Agreements

Cloud IaaS: Service-Level Agreements G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of

More information

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with

More information

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes. Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for

More information

Case Study: Social Networking Tool Becomes Essential Workplace Infrastructure at Deloitte

Case Study: Social Networking Tool Becomes Essential Workplace Infrastructure at Deloitte Research Publication Date: 3 April 2009 ID Number: G00166424 Case Study: Social Networking Tool Becomes Essential Workplace Infrastructure at Deloitte Nikos Drakos We look at the motivation, justification

More information

Key Issues for Consumer Goods Manufacturers, 2011

Key Issues for Consumer Goods Manufacturers, 2011 Industry Research Publication Date: 1 March 2011 ID Number: G00210698 Key Issues for Consumer Goods Manufacturers, 2011 Don Scheibenreif, Dale Hagemeyer Gartner's 2011 consumer goods manufacturing research

More information

Containers and Modules: Is This the Future of the Data Center?

Containers and Modules: Is This the Future of the Data Center? Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet

More information

Gartner Defines Enterprise Information Architecture

Gartner Defines Enterprise Information Architecture Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit

More information

Evaluating Microsoft, Oracle and SAP CRM Application Strategy

Evaluating Microsoft, Oracle and SAP CRM Application Strategy Research Publication Date: 8 October 2009 ID Number: G00170698 Evaluating Microsoft, Oracle and SAP CRM Application Strategy Michael Maoz, Kimberly Collins, Robert P. Desisto The quality of the customer

More information

IT Cost Savings With Information Governance

IT Cost Savings With Information Governance G00232238 IT Cost Savings With Information Governance Published: 17 April 2012 Analyst(s): Debra Logan By systematically eliminating redundant information, Cisco has retired multiple legacy systems, eliminated

More information

Cloud IaaS: Security Considerations

Cloud IaaS: Security Considerations G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

Global Talent Management Isn't Just Global

Global Talent Management Isn't Just Global Research Publication Date: 22 July 2008 ID Number: G00159366 Global Talent Management Isn't Just Global Thomas Otter Global talent management projects must take into account local compliance issues or

More information