Predicts 2004: Client-Side Windows Adoption

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Predicts 2004: Client-Side Windows Adoption"

Transcription

1 Strategic Planning, M. Silver Research Note 1 December 2003 Predicts 2004: Client-Side Windows Adoption Despite security fixes for NT Workstation v.4, you should focus on migrating to newer platforms and securing your desktops in Insulate yourself from the uncertainties of Microsoft's operating-system delivery timing. Core Topic Hardware Platforms: Client Platforms Key Issue How will desktop and mobile client platforms evolve during the next five years? Strategic Planning Assumptions Microsoft will continue to deliver patches for critical security holes in NT Workstation v.4 through year-end 2004 (0.8 probability). Microsoft will not ship a security release for Windows 2000 Professional until three to nine months after Windows XP Service Pack 2 is delivered (0.7 probability). Microsoft will include upgrade rights with Windows Professional original equipment manufacturer licenses by year-end 2006 (0.6 probability). Microsoft's next version of Office will require Windows Longhorn (0.6 probability), just as Office 95 required Windows 95 to run. On a difficulty scale of one to 10, a migration from Windows 2000 or XP to Longhorn will be at least a seven (0.7 probability). It will be at least 18 months after Longhorn client ships before Type B enterprises (mainstream technology adopters) can deploy it in production (0.7 probability). For enterprises, 2004 will be a critical year in their client operating system (OS) deployment strategies. For many, it will be the year they finally eliminate all the Windows 9x and Windows NT Workstation v.4 (NTW4) from their enterprises. For enterprises that have been deploying Windows 2000, we believe 2004 marks a critical juncture where they should stop deploying Windows 2000 and switch to Windows XP, at least for new PCs coming into the enterprise. For others, it may be the year they seriously evaluate Linux for at least some desktop users. Prediction Because of the importance of NTW4 on the corporate desktop, Microsoft will continue to deliver security patches for NTW4. Although the overall installed base of NTW4 is relatively low, it is sizable in Microsoft's most coveted market large enterprises. All support and bug fix creation was supposed to end on 30 June 2003, right around the time the vulnerability that enabled MS Blaster was found. Microsoft delivered patches for NTW4, even though the vulnerability was announced after support officially ended. Eventually, Microsoft announced that it would continue to ship fixes for severe security holes on NTW4 through 30 June We believe it will continue to do so through at least yearend There are a few reasons for this: 1. Microsoft officially supports NT Server v.4 through year-end Because Microsoft will have to fix any security holes on the server through that date, and because the code bases of the server and workstation products are so similar, it will not be that much extra work to test the fixes on NTW4, too. 2. Microsoft has sold custom support contracts for NTW4 to several enterprises, and these contracts run through at least Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 year-end These customers will demand that Microsoft create fixes for severe security holes. 3. Given Reasons 1 and 2, if Microsoft has written fixes for severe security holes and refuses to give them to the general public, it will be vilified in the press. Microsoft will not risk withholding a remedy for a security hole. However, there are still risks to running NTW4: Even if Microsoft says it will provide security fixes, it is up to Microsoft to decide what is considered a severe security hole. Microsoft could claim that the architecture of NTW4 prevents it from fixing a particular problem. This has already happened in Office 97. Beyond security issues, new applications and device drivers are generally not supported for the older OS, and many independent software vendors have dropped support of the platform as well. Strategic Planning Assumption: Microsoft will continue to deliver patches for critical security holes on NTW4 through year-end 2004 (0.8 probability). Enterprises should continue their migration off old client OSs and target having all users off NTW4 by year-end If all users can't be off by then, enterprises should prioritize users and move the more critical ones off first. Enterprises should not slow down their migrations because Microsoft has continued to deliver security patches. Prediction Microsoft will not plan to ship a security release for Windows 2000 Professional proactively; it will be forced to do so by its customers. The MS Blaster worm proved that many enterprises do not do a good enough job patching their desktops and servers. It also proved that, although patches are being delivered faster, hackers are also creating new exploits faster. We believe that, in the long term, patching is a losing proposition. So does Microsoft. In its recent announcement of security initiatives, it announced service packs for Windows XP and Windows Server 2003 to improve security. Included will be eliminating some communications interfaces that are not generally needed, a new version of the Internet Connection Firewall that will be automatically enabled, and other improvements and changes to settings to make the 1 December

3 OSs more secure. All this is a good thing and will especially help protect many consumers running XP. However, we believe this initiative is lacking when it comes to the enterprise. More enterprise clients are running Windows 2000 than Windows XP. And many more servers are running Windows 2000 than Windows Server Microsoft has said it will deliver the "role-based security configuration" technology planned for Windows Server 2003 Service Pack 1 to Windows 2000 Server and add inspection of Windows 2000 machines for quarantine, but it has not provided any estimation of delivery dates. Strategic Planning Assumption: Microsoft will not ship a security release for Windows 2000 Professional until at least three to nine months after Windows XP Service Pack 2 is delivered (0.7 probability). Enterprises should understand the changes in the upcoming service packs for Windows XP and Windows Server 2003 and prepare their test environments so they can test and deploy them quickly once they ship. We expect that Service Pack 2 will break some applications, so testing will be very important. So far, Microsoft has positioned the security fixes for Windows XP as a service pack, and similar defects exist in Windows Because Windows 2000 is still fully supported, enterprises should demand that Microsoft provide comparable fixes. If Microsoft does not add the same security shielding technology it will have for Windows XP to Windows 2000, enterprises should demand free upgrades and help with implementation. Prediction Microsoft will include upgrade rights with some versions of Windows. Microsoft continues to find itself in a precarious position with its Windows client OS. It wants enterprises to buy maintenance so that Microsoft has an annuity revenue stream. Microsoft wants to deliver rich, feature-packed versions, but the more features it adds, the more difficult it is for enterprises to adopt the new versions. For consumers, Microsoft needs new products more frequently to invigorate its sales and the sales of PC hardware original equipment manufacturers (OEMs). Enterprises want new versions of Windows to come out less frequently, and to have those versions supported longer so that they can standardize. However, enterprises that pay for Software Assurance or Enterprise Agreements have conflicting desires longer life cycles and value for their money (which usually implies more releases). 1 December

4 Although Linux has very little presence on the enterprise desktop today, the threat of Linux on the desktop and Microsoft's own missteps with licensing during the past few years have created a situation where Microsoft needs to do something fairly radical to improve how customers feel about it. Microsoft should include upgrade rights with the Windows Professional OS. Bundling upgrades with Windows Professional would minimize the Linux cost argument enterprises perceive by reducing the acquisition cost advantage Linux has over Windows. Of course, users would still have to pay for Windows when they buy a new PC, and users often buy a new PC to provide the power necessary to get the most out of new OS features, anyway. Furthermore, if Microsoft only includes upgrade rights for users running the Professional edition, it might convince more consumers to buy Professional instead of Home Edition, making up some of the revenue gap. It should be noted that Microsoft used to charge for downgrade rights to run older OSs, but when Windows XP was released, Microsoft included them at no additional charge. Strategic Planning Assumption: Microsoft will include upgrade rights with Windows Professional OEM licenses by year-end 2006 (0.6 probability). Enterprises should make sure all contracts include remedies if Microsoft offers heavy discounts or free software during the contract period. Prediction Migrations to Longhorn (client) will be the most difficult migration since the one from Windows 3.1 to Windows 95. The next version of Windows (known as Longhorn) will probably not ship until Microsoft promises many new advanced features, and, the more Microsoft talks about new features in Longhorn, the more memories of the Cairo OS that was never delivered are invoked. Longhorn is supposed to include: an overlay to the NTFS file system, known as WinFS, to vastly improve searches of file and stores; a new user interface; support for Next-Generation Secure Computing Base (NGSCB, formerly known as Palladium); and a new application programming interface (API) set, known as WinFX. Enterprises will probably need to upgrade many applications when they upgrade the OS. We also expect Microsoft's next version of Office to require Windows Longhorn (0.6 probability), just as Office 95 required Windows 95 to run. The new user interface may force enterprises to consider a rapid migration to Windows Longhorn, much as they migrated from Windows 3.1 to Windows 95. The differences today from 1995 are a much larger installed 1 December

5 base, longer lists of applications that must be tested and upgraded, and more complexity on each individual desktop. The reasons this migration will not be quite as hard as the migration to Windows 95 are that WinFX should be fundamentally more compatible with Win32 than Win32 was with Win16, and IS processes and migration tools, perhaps including the ability to use Microsoft's Virtual PC technology, may be somewhat more mature. Users are also generally somewhat more experienced because of increased PC proliferation into the home. But no matter when Longhorn actually ships, we believe that most enterprises that consider themselves mainstream technology adopters will require at least 18 months before they can start deploying it in production in large numbers. In the past, Gartner would suggest that enterprises wait until Microsoft shipped the first service pack to address initial stability problems before deploying a new OS. Microsoft, of course, would argue that the OS (whichever new OS was being discussed) was stable enough in fact, the most stable ever. But there is much more to the process of bringing in a new OS than stability. Although Microsoft is likely to claim that Windows Longhorn is the most stable and secure ever, enterprises will have to wait until their application vendors agree to support their applications on the new platform. For critical applications, vendor support is usually "a must." With Windows 2000, it took more than 12 months for most enterprises to have a sufficient portion of their applications supported by vendors. Some were still waiting for support three years after Windows 2000 shipped. Strategic Planning Assumptions: On a difficulty scale of one to 10, a migration from Windows 2000 or XP to Longhorn will be at least a seven (0.7 probability). It will be at least 18 months after Longhorn client ships before Type B enterprises (mainstream technology adopters) can deploy it in production (0.7 probability). Acronym Key API NGSCB NTW4 OEM OS application programming interface Next-Generation Secure Computing Base Windows NT Workstation v.4 original equipment manufacturer operating system Enterprises should insulate themselves from the uncertainties of Microsoft's product delivery cycles by adopting a strategy of managed diversity bring in the latest client OS possible on new PC hardware purchases and don't plan to upgrade client OSs on existing PCs. Begin moving from Windows 2000 Professional to Windows XP through hardware attrition. Bottom Line: Enterprises should not be distracted by Microsoft's promises to provide security patches for Windows NT Workstation v.4, or the early glimpses of Windows Longhorn it has provided. The goal for 2004 should be the gradual elimination of older technology like Windows 9x and NTW4. Support is long gone for these versions, and new applications will 1 December

6 not support them. For most, Windows XP should be the replacement operating system. Windows XP should be favored on new PCs coming into the enterprise, and the Windows 2000 Professional installed base should start being reduced through hardware attrition. Microsoft's schedule for delivering new versions of Windows is volatile, and embracing Windows XP, at least on new PCs being purchased, will help insulate the enterprise from this volatility. 1 December

Best Practices for Planning Windows 7 Deployment

Best Practices for Planning Windows 7 Deployment Research Publication Date: 4 March 2010 ID Number: G00174371 Best Practices for Planning Windows 7 Deployment Michael A. Silver Successful migrations to Windows 7 will meet user expectations, are done

More information

COM-19-8811 M. Silver

COM-19-8811 M. Silver M. Silver Research Note 19 June 2003 Commentary Linux Desktop TCO: An Overview With Linux, the client operating system only constitutes a small part of the total cost of ownership. From a TCO perspective,

More information

Patch management point solution. Platform. Patch Management Point Solution

Patch management point solution. Platform. Patch Management Point Solution Markets, R. Colville, M. Nicolett Research Note 18 March 2003 Patch Management: Identifying the Vendor Landscape As the importance of patch management increases, it is important to understand the limitations

More information

Commentary. Blade and Virtual Servers Can Maximize Efficiencies

Commentary. Blade and Virtual Servers Can Maximize Efficiencies J. Enck Research Note 14 May 2003 Commentary Blade and Virtual Servers Can Maximize Efficiencies At first glance, blade servers and virtual servers appear as different as hardware and software, but both

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

COM-19-8868 M. Margevicius

COM-19-8868 M. Margevicius M. Margevicius Research Note 11 September 2003 Commentary TCO Comparison of s vs. Notebooks Differences in technology, price, life cycles and usage patterns dictate that notebook total cost of ownership

More information

2003 Desktop Software Distribution Magic Quadrant

2003 Desktop Software Distribution Magic Quadrant Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic

More information

Microsoft SQL Server Licensing: Per Processor vs. Per Seat

Microsoft SQL Server Licensing: Per Processor vs. Per Seat Decision Framework, A. Park Research Note 18 September 2002 Microsoft SQL Server Licensing: Per Processor vs. Per Seat Many Gartner clients request assistance in determining which method of licensing SQL

More information

Don't Pay to Support CRM 'Shelfware'

Don't Pay to Support CRM 'Shelfware' Tactical Guidelines, J. Disbrow Research Note 3 May 2003 Don't Pay to Support CRM 'Shelfware' Enterprises license customer relationship management solutions that are often never totally deployed. Software

More information

Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03

Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 Markets, H. Dresner, B. Hostmann, F. Buytendijk, A. Tiedrich Research Note 25 August 2003 Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 The business intelligence technology markets continue

More information

Payer Business Process Outsourcing Trends for 2004

Payer Business Process Outsourcing Trends for 2004 Markets, J. Young Research Note 15 January 2004 Payer Business Process Outsourcing Trends for 2004 An assessment of business drivers, user adoption and BPO criteria for the healthcare payer industry corroborates

More information

A White Paper By: Dr. Gaurav Banga SVP, Engineering & CTO, Phoenix Technologies. Bridging BIOS to UEFI

A White Paper By: Dr. Gaurav Banga SVP, Engineering & CTO, Phoenix Technologies. Bridging BIOS to UEFI A White Paper By: Dr. Gaurav Banga SVP, Engineering & CTO, Phoenix Technologies Bridging BIOS to UEFI Copyright Copyright 2007 by Phoenix Technologies Ltd. All rights reserved. No part of this publication

More information

How to Develop an Effective Vulnerability Management Process

How to Develop an Effective Vulnerability Management Process Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes

More information

Total Cost of Ownership Comparison of PCs With Hosted Virtual Desktops, 2011 Update

Total Cost of Ownership Comparison of PCs With Hosted Virtual Desktops, 2011 Update Total Cost of Ownership Comparison of PCs With Hosted Virtual Desktops, 2011 Update Gartner RAS Core Research Note G00209403, Federica Troni, Mark A. Margevicius, Michael A. Silver, 14 December 2010, RA12

More information

BSM Definition, Drivers and Inhibitors

BSM Definition, Drivers and Inhibitors Events, D. Curtis, M. Govekar Research Note 11 August 2003 BMC Positions Itself for Business Service Management BMC Software's announcement of its business service management strategy is solidified by

More information

CLOUD CLIENTS AND VIRTUAL CLIENTS

CLOUD CLIENTS AND VIRTUAL CLIENTS CLOUD CLIENTS AND VIRTUAL CLIENTS The Transformation of Virtual Desktops Through Mobility and Cloud Computing Over the past three years, the technology we used to know as virtual desktop infrastructure

More information

IT Security Management Market Trends

IT Security Management Market Trends Markets, M. Nicolett Research Note 24 March 2003 The IT Security Management Magic Quadrant Lacks Leaders Vendors in the Gartner 1H03 IT Security Management Magic Quadrant are being driven by the need for

More information

Business Applications and Infrastructure Entwined

Business Applications and Infrastructure Entwined Markets, S. Hayward, B. Burton, J. Comport, Y. Genovese, T. Bittman Research Note 9 July 2003 Business and Infrastructure Entwined Oracle's bid for PeopleSoft encompasses more than applications. It illustrates

More information

CIO Update: The Future of the IBM Mainframe Looks Surprisingly Good

CIO Update: The Future of the IBM Mainframe Looks Surprisingly Good IGG-03052003-02 J. Phelps Article 5 March 2003 CIO Update: The Future of the IBM Mainframe Looks Surprisingly Good Some pundits predict the imminent death of the mainframe, but growing indicators from

More information

What CIOs Want to Know About Microsoft Active Directory

What CIOs Want to Know About Microsoft Active Directory IGG-01222003-01 J. Enck Article 22 January 2003 What CIOs Want to Know About Microsoft Active Directory Active Directory deployments are increasing and so are questions about the technology. Gartner addresses

More information

IP Contact Centers Approach Maturity

IP Contact Centers Approach Maturity Decision Framework, S. Blood, T. Wright Research Note 11 December 2002 IP Contact Centers Approach Maturity Enterprises should evaluate IP-based contact-center applications and next-generation architecture

More information

Key Findings. Recommendations

Key Findings. Recommendations Total Cost of Ownership Comparison of PCs With Server-Based Computing Gartner RAS Core Research Note G00159622, Federica Troni, Mark A. Margevicius, Michael A. Silver, 4 August 2008, R1 04032009 Server-based

More information

Data Center Conference Survey Results: Server Consolidation

Data Center Conference Survey Results: Server Consolidation Events, J. Phelps Research Note 31 March 2004 Data Center Conference Survey Results: Server Consolidation At the December 2003 Data Center Conference, attendees were asked questions for each presentation.

More information

Users and Vendors Speak Out: Intrusion Detection and Prevention

Users and Vendors Speak Out: Intrusion Detection and Prevention Market Analysis Users and Vendors Speak Out: Intrusion Detection and Prevention Abstract: With network security concerns multiplying, intrusion protection systems are a hot commodity. But don't count out

More information

QuickSpecs. What's New. Models. ProLiant Essentials Server Migration Pack - Physical to ProLiant Edition. Overview

QuickSpecs. What's New. Models. ProLiant Essentials Server Migration Pack - Physical to ProLiant Edition. Overview Overview Upgrading or replacing your existing server? Migration is now an option! Replicate the server you are replacing using the software, the only product of its kind from a server vendor that provides

More information

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear

More information

Windows Server 2003 Active Directory: Perspective

Windows Server 2003 Active Directory: Perspective Mary I. Hubley, MaryAnn Richardson Technology Overview 25 September 2003 Windows Server 2003 Active Directory: Perspective Summary The Windows Server 2003 Active Directory lies at the core of the Windows

More information

Configuration Management in the Data Center

Configuration Management in the Data Center Configuration Management in the Data Center Using Microsoft System Center Published: May 2008 For the latest information, please see http://www.microsoft.com/systemcenter Contents Executive Summary...1

More information

Windows Embedded Security and Surveillance Solutions

Windows Embedded Security and Surveillance Solutions Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

MOBILE TABLETS A Post-PC Era in the Enterprise?

MOBILE TABLETS A Post-PC Era in the Enterprise? Analyzing the Business of Enterprise IT Innovation MOBILE TABLETS A Post-PC Era in the Enterprise? The mobile tablet will bring significant change in enterprise computing. Early investment in supporting

More information

The IFX Standard Opens the ATM and POS Channels

The IFX Standard Opens the ATM and POS Channels Strategic Planning, M. Knox, S. Cohen, B. Adrian Research Note 27 August 2003 The IFX Standard Opens the ATM and POS Channels Interactive Financial exchange v.1.4 introduced significant new messaging standards

More information

What Are Network Security Platforms?

What Are Network Security Platforms? Markets, J. Pescatore, M. Easley, R. Stiennon Research Note 7 November 2002 Network Security Platforms Will Transform Security Markets An integrated network security platform approach will increase network

More information

Three Ways to Secure Virtual Applications

Three Ways to Secure Virtual Applications WHITE PAPER Detect, Scan, Prioritize, and Remediate Vulnerabilities Table of Contents Subtitle 1 Headline 3 Headline 3 Sub-Headline 3 ConcIusion 3 About BeyondTrust 4 2 2013. BeyondTrust Software, Inc.

More information

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation

More information

Business Intelligence: The European Perspective

Business Intelligence: The European Perspective Markets, F. Buytendijk Research Note 5 November 2002 Business Intelligence: The European Perspective When choosing business intelligence products, European users are not that different from North American

More information

Virtual Patching: a Proven Cost Savings Strategy

Virtual Patching: a Proven Cost Savings Strategy Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes

More information

Job Scheduling Magic Quadrant Reflects New Challenges

Job Scheduling Magic Quadrant Reflects New Challenges Markets, M. Govekar Research Note 23 January 2003 Job Scheduling Magic Quadrant Reflects New Challenges In 2003, job scheduling systems should be starting to address new platforms and environments. Some

More information

THE CHANGING LINUX LANDSCAPE. The cloud, community distributions and devops are dramatically impacting the market

THE CHANGING LINUX LANDSCAPE. The cloud, community distributions and devops are dramatically impacting the market THE CHANGING LINUX LANDSCAPE The cloud, community distributions and devops are dramatically impacting the market Trends such as cloud computing and devops whereby application development and deployment

More information

7 Steps to Windows 7 Migration Best Practices. Anthony Wainman - Presales Technical Consultant Jay Lakhani Sales Director Codework Inc.

7 Steps to Windows 7 Migration Best Practices. Anthony Wainman - Presales Technical Consultant Jay Lakhani Sales Director Codework Inc. 7 Steps to Windows 7 Migration Best Practices Anthony Wainman - Presales Technical Consultant Jay Lakhani Sales Director Codework Inc. 613-368-4300 Agenda Why Use Symantec for Migration? Ease of Use Other

More information

Magic Quadrant for Corporate Telephony in EMEA, 2003

Magic Quadrant for Corporate Telephony in EMEA, 2003 Markets, S. Blood, C. Lock Research Note 2 September 2003 Magic Quadrant for Corporate Telephony in EMEA, 2003 Cisco and Alcatel continue to offer the market's most comprehensive corporate propositions.

More information

SECURITY IN OPERATING SYSTEM VIRTUALISATION

SECURITY IN OPERATING SYSTEM VIRTUALISATION SECURITY IN OPERATING SYSTEM VIRTUALISATION February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in

More information

management Patch ControlNow TM Whitepaper Fixing vulnerabilities before they are exploited.

management Patch ControlNow TM Whitepaper Fixing vulnerabilities before they are exploited. management Patch ControlNow TM Whitepaper Fixing vulnerabilities before they are exploited. Table of Contents Introduction 3 Importance of patch management 4 Balancing security with reliability 6 Why cloud-based

More information

SAN Management Software Magic Quadrant

SAN Management Software Magic Quadrant Markets, C. DiCenzo, R. Paquet, N. Allen, R. Passmore Research Note 22 April 2003 SAN Management Software Magic Quadrant In the storage area network management software market, expect increased competition

More information

Clinical Decision Support: Core Capability of Evolving CPR

Clinical Decision Support: Core Capability of Evolving CPR Tutorials, B. Hieb, M.D. Research Note 6 November 2003 Clinical Decision Support: Core Capability of Evolving CPR More-sophisticated computer-based patient record systems can offer increasing value to

More information

The Four "A's" of Information Security

The Four A's of Information Security Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also

More information

Accelerating Microsoft Windows 7 migrations with Citrix XenApp

Accelerating Microsoft Windows 7 migrations with Citrix XenApp Citrix XenApp and Microsoft Windows 7 White Paper Accelerating Microsoft Windows 7 migrations with Citrix XenApp XenApp will accelerate your Windows 7 migration, save money and resources, minimize disruption

More information

HIPAA Compliance Hindered by Lagging Vendors

HIPAA Compliance Hindered by Lagging Vendors Markets, M-21-473 W. Rishel Research Note November 3 HIPAA Compliance Hindered by Lagging Vendors Independent software vendors are significant contributors to the delays on HIPAA transactions. Their customers

More information

Management Update: CRM Success Lies in Strategy and Implementation, Not Software

Management Update: CRM Success Lies in Strategy and Implementation, Not Software IGG-03122003-01 D. Hagemeyer, S. Nelson Article 12 March 2003 Management Update: CRM Success Lies in Strategy and Implementation, Not Software A customer relationship management (CRM) package doesn t ensure

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

SSL VPN 1H03 Magic Quadrant

SSL VPN 1H03 Magic Quadrant Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant The emerging Secure Sockets Layer virtual private network market is standards-based, with good short-term return on investment

More information

Hierarchy of Needs for Content Networking

Hierarchy of Needs for Content Networking Technology, M. Fabbi Research Note 28 October 2002 Hierarchy of Needs for Content Networking Enterprises should understand the hierarchy of needs for content networking, which is illustrated by examining

More information

Patch Management Policy

Patch Management Policy Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:

More information

Microsoft Windows NT Server 4.0, Terminal Server Edition: Bringing Microsoft Windows to Desktops That Can t Run Windows Today

Microsoft Windows NT Server 4.0, Terminal Server Edition: Bringing Microsoft Windows to Desktops That Can t Run Windows Today Windows NT Server Operating System Server Microsoft Windows NT Server 4.0, Terminal Server Edition: Bringing Microsoft Windows to Desktops That Can t Run Windows Today White Paper Abstract Microsoft Windows

More information

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release) Product comparison GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release) GFI LanGuard 2014 Windows Intune General features Scheduled scans Agent-less r Agent-based Integration with Active

More information

Configuring Windows 8.1

Configuring Windows 8.1 Course 20687D: Configuring Windows 8.1 Course Details Course Outline Module 1: Windows 8.1 in an Enterprise Environment Windows client operating systems are essential to the functionality of almost every

More information

Dell and Red Hat Collaborate to Deliver OpenStack for Enterprise

Dell and Red Hat Collaborate to Deliver OpenStack for Enterprise Dell and Red Hat Collaborate to Deliver OpenStack for Enterprise Dell pragmatically invests in partners to fill-in most cloud strategy gaps. Highlights of the Dell Red Hat Joint Announcement on 12/12/2013

More information

SCO Virtualization Presentation to Customers

SCO Virtualization Presentation to Customers SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization

More information

QUICK START GUIDE READ THIS FIRST

QUICK START GUIDE READ THIS FIRST QUICK START GUIDE READ THIS FIRST PURCHASE A SUPPORT PLAN TODAY! To order call 404.691.0405 or buy online at shop.lathem.com LATHEM S ANNUAL SUPPORT PLAN INCLUDES... Toll-free telephone support If you

More information

CIO Alert: How You Should Prepare for Sarbanes-Oxley

CIO Alert: How You Should Prepare for Sarbanes-Oxley IGG-10012003-03 R. Mogull, D. Logan, L. Leskela Article 1 October 2003 CIO Alert: How You Should Prepare for Sarbanes-Oxley Sarbanes-Oxley is the most sweeping legislation to affect publicly traded companies

More information

WHY UPGRADE SAGE ERP ACCPAC

WHY UPGRADE SAGE ERP ACCPAC WHY UPGRADE SAGE ERP ACCPAC Enabling NSW Suite 2 273 Alfred Street North Sydney NSW 2060 T +61 2 9925 0383 F+ 61 2 9925 3926 www.enabling.net WHY UPGRADE SAGE ERP ACCPAC 1 P A G E PROPRIETARY INFORMATION

More information

Windows CE Positioning Paper

Windows CE Positioning Paper Windows CE Positioning Paper Produced by the ATM Industry Association Contributor: Eric de Putter, Payment Redesign Copyright Information Copyright 2016 ATMIA, All Rights Reserved. For ATMIA members only.

More information

HMI & Virtualization in Process Automation

HMI & Virtualization in Process Automation HMI & Virtualization in Process Automation Virtualization TDOCT-B0W5_ENG Virtualization is a technology that stems from the information technology (IT) industry and has become more and more popular in

More information

COM-19-1316 A. White, K. Peterson, B. Lheureux

COM-19-1316 A. White, K. Peterson, B. Lheureux A. White, K. Peterson, B. Lheureux Research Note 1 February 2003 Commentary New P2P Solutions Will Redefine the B2B Supply Chain As multienterprise business processes evolve on a large scale, application

More information

Unifying IT How Dell Is Using BMC

Unifying IT How Dell Is Using BMC Unifying IT Management: How Dell Is Using BMC Software to Implement ITIL ABSTRACT Companies are looking for ways to maximize the efficiency with which they plan, deliver, and manage technology services.

More information

Accounting firm optimizes PC environment with Windows 7 Enterprise and Microsoft Desktop Optimization Pack (MDOP)

Accounting firm optimizes PC environment with Windows 7 Enterprise and Microsoft Desktop Optimization Pack (MDOP) Microsoft Customer Solution Customer Solution Case Study Accounting firm optimizes PC environment with Windows 7 Enterprise and Microsoft Desktop Optimization Pack (MDOP) Overview Country or Region: Canada

More information

Business Intelligence Software Market: Europe, 2002 (Executive Summary) Executive Summary

Business Intelligence Software Market: Europe, 2002 (Executive Summary) Executive Summary Business Intelligence Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 9 January 2004 Authors Fabrizio Biscotti Colleen Graham This document has been published to the following

More information

Table of Contents. Introduction. Audience. At Course Completion. Prerequisites

Table of Contents. Introduction. Audience. At Course Completion. Prerequisites Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides

More information

Midsize Enterprise Summit Business Continuity Questions

Midsize Enterprise Summit Business Continuity Questions Select Q&A, D. Scott, F. DeSalvo Research Note 6 February 2003 Midsize Enterprise Summit Business Continuity Questions Current events have created a new awareness of the importance of business continuity

More information

ENTERPRISE MOBILE APPLICATIONS

ENTERPRISE MOBILE APPLICATIONS ENTERPRISE MOBILE APPLICATIONS Native vs. Browser-Based Mobile applications are driving use of smartphones and tablets in the enterprise, and developers are experimenting with browser-based apps in place

More information

Vendor Classification

Vendor Classification Markets, L. Geishecker, F. Buytendijk Research Note 2 October 2002 Introducing the CPM Suites Magic Quadrant Vendors are developing a wide range of new functionality for corporate performance management.

More information

SharePoint 2013 Infrastructure Planning

SharePoint 2013 Infrastructure Planning SharePoint 2013 Infrastructure Planning SharePoint Configuration March 3, 2014 SharePoint 2013 Infrastructure Planning Confidential and Proprietary Information Entire contents Scholantis Learning Software

More information

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006 How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management White Paper Sept. 2006 Introduction It happens, five, ten, twenty times a month: A hardware or software vendor

More information

NetIQ Chariot and Application Scanner for Application Performance Management

NetIQ Chariot and Application Scanner for Application Performance Management John Inverso Product Report 29 September 2003 NetIQ Chariot and Application Scanner for Application Performance Management Summary NetIQ Chariot tests network equipment by generating application-layer

More information

Effects of the British Standard for IT Service Management

Effects of the British Standard for IT Service Management Strategic Planning, S. Mingay, M. Govekar Research Note 4 March 2002 Effects of the British Standard for IT Service Management The release of the British Standard for IT Service Management (BS15000) marks

More information

Management Update: Powerhouse Vendors Implement Document Management

Management Update: Powerhouse Vendors Implement Document Management IGG-10302002-04 G. Landers, K. Shegda, D. Logan Article 30 October 2002 Management Update: Powerhouse Vendors Implement Document Management Interest within enterprises is growing in the management of unstructured

More information

Research. Identity and Access Management Defined

Research. Identity and Access Management Defined Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from

More information

Selecting a Mobile App Development Vendor

Selecting a Mobile App Development Vendor G00246304 Selecting a Mobile App Development Vendor Published: 27 December 2012 Analyst(s): Ken Parmelee Ensuring that mobile app development vendors meet requirements and are viable requires an understanding

More information

SSL VPN 1H03 Magic Quadrant Evaluation Criteria

SSL VPN 1H03 Magic Quadrant Evaluation Criteria Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and

More information

WIN XP Don t Get Left Behind

WIN XP Don t Get Left Behind WIN XP Don t Get Left Behind By Eric Reichert Product Marketing Specialist Industrial PCs and HMIs Phoenix Contact USA Abstract When Chaucer said that all good things must come to an end, he undoubtedly

More information

Hosting and Colocation Regional Strategies for Growth. April 2015

Hosting and Colocation Regional Strategies for Growth. April 2015 Hosting and Colocation Regional Strategies for Growth April 2015 Key Findings Location is becoming increasingly important for colocation and hosting providers alike, with a growing need by those providing

More information

Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales

Using SUSE Linux Enterprise to Focus In on Retail Optical Sales Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales Patrick Mullin Scott Steele Senior Technical Specialist SUSE Consulting pmullin@suse.com Point of Sale Manager National Vision, Inc. scott.steele@nationalvision.com

More information

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e B e s t P r a c t i c e s G u i d e It s a fact of business today: because of the economy, most organizations are asking everyone, including the IT staff, to do more with less. But tight budgets and the

More information

Moving The Desktop Into The Data Centre

Moving The Desktop Into The Data Centre Moving The Desktop Into The Data Centre Examining Business Deployments Of Virtual Desktop Infrastructure IDC Enterprise Data Centre Conference 2009 London, UK Copyright 2009 IDC. Reproduction is forbidden

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

Magic Quadrant for Application Platform Suites, 2Q03

Magic Quadrant for Application Platform Suites, 2Q03 Markets, Y. Natis, M. Pezzini, G. Phifer, C. Haight, M. Driver Research Note 5 May 2003 Magic Quadrant for Application Platform Suites, 2Q03 Application platform suites are incrementally assembled or bought

More information

Windows 7: Tips and Best Practices for Simplified Migration By Nelson Ruest and Danielle Ruest

Windows 7: Tips and Best Practices for Simplified Migration By Nelson Ruest and Danielle Ruest Windows 7: Tips and Best Practices for Simplified Migration By Nelson Ruest and Danielle Ruest Table of Contents Abstract... 3 1.0 Windows 7 Deployment and Operating Improvements... 4 2.0 Potential Deployment

More information

IT Vendors Offer Technology- Enhanced Remote Support Services (Executive Summary) Executive Summary

IT Vendors Offer Technology- Enhanced Remote Support Services (Executive Summary) Executive Summary IT Vendors Offer Technology- Enhanced Remote Support Services (Executive Summary) Executive Summary Publication Date: 3 January 2003 Authors Tony Adams Bob Igou Ron Silliman This document has been published

More information

Management Update: The Eight Building Blocks of CRM

Management Update: The Eight Building Blocks of CRM IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful

More information

Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015

Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015 G00263819 Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015 Published: 18 June 2014 Analyst(s): Carl Claunch Support for Windows Server 2003 will end in July 2015. Production

More information

Comparing Free Virtualization Products

Comparing Free Virtualization Products A S P E I T Tr a i n i n g Comparing Free Virtualization Products A WHITE PAPER PREPARED FOR ASPE BY TONY UNGRUHE www.aspe-it.com toll-free: 877-800-5221 Comparing Free Virtualization Products In this

More information

Implementing Security Update Management

Implementing Security Update Management Implementing Security Update Management Wayne Harris MCSE Senior Consultant Certified Security Solutions Business Case for Update Management When determining the potential financial impact of poor update

More information

THE BEST EXECUTION VENUE

THE BEST EXECUTION VENUE Positioning for the Next Wave of Change in Enterprise IT Infrastructure As automation and consumerization become the dominant paradigms for designing and deploying IT infrastructure, these trends will

More information

Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor

Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor IGG-10232002-02 P. Phelan Article 23 October 2002 Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor Service partner relationships will grow to enable more holistic

More information

Social Intranets and the Supply Chain

Social Intranets and the Supply Chain THOUGHT LEADERSHIP Social Intranets and the Supply Chain EXECUTIVE OVERVIEW SEP 2015 Alan Pelz-Sharpe, Research Director, Business Applications Matt Mullen, Senior Analyst, Business Applications In one

More information

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation

More information

Navigating the Enterprise Database Selection Process: A Comparison of RDMS Acquisition Costs Abstract

Navigating the Enterprise Database Selection Process: A Comparison of RDMS Acquisition Costs Abstract Navigating the Enterprise Database Selection Process: A Comparison of RDMS Acquisition Costs Abstract Companies considering a new enterprise-level database system must navigate a number of variables which

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:

SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM: SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM: 12 Key Questions to Ask Executive Summary Host Intrusion Prevention Systems (HIPS) complement perimeter defenses, and play a vital role in protecting

More information

BACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments

BACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments BACKUP IN A VIRTUAL WORLD Data-Protection Challenges in Virtual Server Environments Data protection for virtual environments became crucial when end users began virtualizing tier-one, mission-critical

More information