THREAT INTELLIGENCE EXECUTIVE OVERVIEW. A Market for Secrets KEY FINDINGS
|
|
- Jared Newton
- 7 years ago
- Views:
Transcription
1 A Market for Secrets As the arms race escalates between attacker and defender, organizations are trying to make more informed risk decisions and prioritize their responses. This means intelligence and not just more data, but better information behind it. The threat-intelligence market has blossomed in the past year, but is still inchoate and confusing to vendors and customers alike. This report provides an overview of the many facets of threat-intelligence products and services, identifies major trends and looks at the market size and M&A implications. KEY FINDINGS Out of 55 vendors we examined, nearly all of them offered at least three of the most common data elements (hash values, IP addresses and domain names); only half of them offered more complex types of intelligence. For this reason, we see signs of a potential bifurcation in the threat-intelligence market between the easily collected and standardized data, and the more sensitive and costly information. In the case of an intelligence-sharing platform, the vendor s challenge is to build a community of members that are incentivized to trust one another. Trust usually happens between individuals, not organizations. As a result, the sales cycle of a collaboration membership can be much longer than that for a one-way data feed, and the intelligence flow can be easily disrupted. With 36% of respondents saying they were using threat intelligence and a further 8% stating that it was in their plans, we see some modest growth (in the previous year, the in-use rate was 31%). Those who do have it are planning to spend somewhat more on it. From 2012 to 2013, the four leaders in mindshare remained the same: Symantec, IBM, Dell and McAfee. FireEye came out of nowhere to take the fifth spot among vendors in use in 2013, passing homegrown. We estimate that the aggregate revenue generated by the 43 stand-alone threat-intelligence vendors we have identified totaled $1.0bn in 2013 and will grow at a CAGR of 34% to reach $3.3bn in FEBRUARY 2014
2 REPORT SNAPSHOT TITLE Threat Intelligence ANALYST Wendy Nather Research Director, Security RELEASE DATE February 2014 LENGTH 32 pages ABOUT THIS REPORT Threat intelligence is one of the oldest new markets around. We believe it is becoming such an open market now because of several factors, including the rising awareness of widespread security breaches, which makes enterprises realize that no one is safe, the development of more techniques in big data and analytics, and the increasing numbers of security researchers and investigative methods for identifying threats. In this report, we examine threat intelligence as a market: how it is generated, processed and sold. We look at the most frequent types of data sold as threat intelligence, the buyer s view of the offerings and the unique factors that can affect vendors. We also propose a set of criteria by which enterprises can evaluate threat intelligence products and services.
3 TABLE OF CONTENTS SECTION 1: EXECUTIVE SUMMARY INTRODUCTION KEY FINDINGS METHODOLOGY AND SCOPE SECTION 2: THE DANGER IN DEFINITIONS WHAT IS? THE DIVIDING LINE SECTION 3: DECONSTRUCTED SOURCES OF COLLECTION OF FORMS OF DELIVERY APPLICATION OF AND THE PYRAMID OF PAIN Figure 1: The Threat Intelligence Pyramid of Pain A (NEARLY) PYRAMID-SHAPED MARKET Figure 2: Number of Vendors Offering Each Type of Threat Intelligence Data SECTION 4: ASPECTS OF THE THREAT-INTELLIGENCE MARKET ADDITIVE SECRETIVE TRANSITIVE ELUSIVE SECTION 5: WHO S USING (OR AT LEAST THINKS THEY ARE) SURVEY SAYS Figure 3: Security Management Technology Roadmap, Figure 4: Technology Roadmap Plans for Threat Intelligence, Time Series.. 21
4 Figure 5: Vendors Named in Threat Intelligence INTERPRETING THE RESULTS MAIN DRIVERS FOR PURCHASING STRENGTHS AND WEAKNESSES OF SECTION 6: MARKET SIZING FOR 26 Figure 6: Market-Sizing Feature Definitions Figure 7: Threat-Intelligence Vendors Pure Play Figure 8: Threat-Intelligence Market Revenue* SECTION 7: THREAT-INTELLIGENCE EVALUATION CRITERIA 29 SECTION 8: SUMMARY AND CONCLUSIONS 32 INDEX OF COMPANIES 33
5 ABOUT 451 RESEARCH 451 Research is a leading global analyst and data company focused on the business of enterprise IT innovation. Clients of the company at end-user, service-provider, vendor and investor organizations rely on 451 Research s insight through a range of syndicated research and advisory services to support both strategic and tactical decision-making Research, LLC and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication, in whole or in part, in any form without prior written permission is forbidden. The terms of use regarding distribution, both internally and externally, shall be governed by the terms laid out in your Service Agreement with 451 Research and/or its Affiliates. The information contained herein has been obtained from sources believed to be reliable. 451 Research disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although 451 Research may discuss legal issues related to the information technology business, 451 Research does not provide legal advice or services and their research should not be construed or used as such. 451 Research shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
TOTAL DATA WAREHOUSING: 2013-2018
TOTAL DATA WAREHOUSING: 2013-2018 Analytic Database and Hadoop Market Sizing and Forecasts This report examines the marketplace for Total Data Warehousing including competing players, revenue generation
More informationTOTAL DATA INTEGRATION
The Impact of Big Data on Integration and Governance Big data and Total Data have the potential to change the face of the data integration market. This report outlines the key drivers shaping this sector
More informationCLOUD CLIENTS AND VIRTUAL CLIENTS
CLOUD CLIENTS AND VIRTUAL CLIENTS The Transformation of Virtual Desktops Through Mobility and Cloud Computing Over the past three years, the technology we used to know as virtual desktop infrastructure
More informationBACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments
BACKUP IN A VIRTUAL WORLD Data-Protection Challenges in Virtual Server Environments Data protection for virtual environments became crucial when end users began virtualizing tier-one, mission-critical
More informationTHE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS
EXECUTIVE OVERVIEW THE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS KEY FINDINGS The IaaS market is currently about 20% the size of the managed hosting market; however, it
More informationMOBILE APP LIFECYCLE
MOBILE APP LIFECYCLE Design and Development As enterprises invest in developing or externally sourcing mobile apps, they are finding the need to integrate this process into the overall software development
More informationThe Data Management of Things
The Data Management of Things THE IMPLICATIONS OF IOT FOR DATA ANALYTICS The Internet of Things (IoT) is placing new demands on data storage, networking, processing and analytics. For end users, vendors
More informationE-DISCOVERY AND E-DISCLOSURE 2013 The Ongoing Journey From Reactive E-Discovery to Proactive Information Governance
E-DISCOVERY AND E-DISCLOSURE 2013 The Ongoing Journey From Reactive E-Discovery to Proactive Information Governance Evolving technologies are expanding the need for effective electronic discovery in legal
More informationAre Small Consultancies Best for Big Data Projects?
Are Small Consultancies Best for Big Data Projects? Big data is attracting the attention of all types of buy-side organizations. But because the technologies involved are immature and there is a lack of
More informationMANAGED INFRASTRUCTURE MARKET OVERVIEW 2013
EXECUTIVE OVERVIEW MANAGED INFRASTRUCTURE MARKET OVERVIEW 2013 Global Perspectives KEY FINDINGS Managed hosting as a subset of managed infrastructure remains the overwhelming bulk of the market opportunity
More informationBig Data and Business Analytics
Servers and Virtualization Study: Wave 14 Big Data and Business Analytics This report captures IT professionals adoption plans, projected spending, vendor short-lists and considerations in decision-making
More informationData Platforms and Analytics Market Map 2016
MARKET MAP Data Platforms and Analytics Market Map 2016 APRIL 2016 Matt Aslett, Research Director, Data Management & Analytics Krishna Roy, Senior Analyst, Data Platforms & Analytics James Curtis, Senior
More informationTHE CHANGING LINUX LANDSCAPE. The cloud, community distributions and devops are dramatically impacting the market
THE CHANGING LINUX LANDSCAPE The cloud, community distributions and devops are dramatically impacting the market Trends such as cloud computing and devops whereby application development and deployment
More informationOF THE CLOUD, FOR THE CLOUD
EXECUTIVE OVERVIEW OF THE CLOUD, FOR THE CLOUD The State of the Art in IT Performance Management IT performance management tools are following application and infrastructure workloads to the cloud, giving
More informationDATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE. Monitoring, Managing and Optimizing the Datacenter
Analyzing the Business of Enterprise IT Innovation DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE Monitoring, Managing and Optimizing the Datacenter As datacenters become bigger, denser and more complex,
More informationCLOUDSCAPE. IT SERVICES Tooling up for ITaaS KEY FINDINGS
IT SERVICES Tooling up for ITaaS IT as a service (ITaaS) is an operational model where the enterprise IT department acts and operates as a distinct business entity, creating services for the other lines
More informationCloud Management Platform Market Map 2016
MARKET MAP Cloud Management Platform Market Map 2016 MAY 2016 William Fellows, Research Vice President A cloud management platform should operate like a cloud Uber app for IT consumption and delivery that
More informationSocial Intranets and the Supply Chain
THOUGHT LEADERSHIP Social Intranets and the Supply Chain EXECUTIVE OVERVIEW SEP 2015 Alan Pelz-Sharpe, Research Director, Business Applications Matt Mullen, Senior Analyst, Business Applications In one
More informationNetwork Management Software Technology Roadmap
Networking Study: Wave 10 Network Management Software Technology Roadmap Capturing networking professionals adoption plans, projected spending and vendor short-lists, the indepth roadmap covers six technologies
More information2016 Trends in Enterprise Mobility
PREVIEW 2016 Trends in Enterprise Mobility OCT 2015 Chris Hazelton, Research Director Brian Partridge, Vice President Raúl Castañón-Martínez, Senior Analyst Rich Karpinski, Principal Analyst Sheryl Kingstone,
More informationTHE CYBER-SECURITY PLAYBOOK
THE CYBER-SECURITY PLAYBOOK Selling Into the Global Defense Market The federal cyber-security space is becoming a hotbed of incubation, acquisition and opportunity, but how to sell into this complicated
More informationMexico EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET
Mexico MULTI-TENANT DATACENTER MARKET This report provides an overview of the competitive dynamics in the Mexico market, a 451 Research Market Map of the competitors in the area, market share of the dominant
More informationCloud Brokers EXECUTIVE OVERVIEW MAKING ITAAS A PRACTICAL REALITY?
Cloud Brokers MAKING ITAAS A PRACTICAL REALITY? This report examines what a cloud broker is, its components and functions, its role(s), its audience and how it supports the delivery of ITaaS by turning
More informationThe State of the European Public Cloud Market
The State of the European Public Cloud Market 2015 UPDATE A year ago, startups, early adopters, and test and development professionals were the key markets for European public cloud service providers.
More informationE-DISCOVERY AND E-DISCLOSURE 5 IMPLICATIONS
Analyzing the Business of Enterprise IT Innovation E-DISCOVERY AND E-DISCLOSURE Bringing It All Back Home Almost four years after all electronic information became legally discoverable in US courts, organizations
More informationENTERPRISE MOBILE APPLICATIONS
ENTERPRISE MOBILE APPLICATIONS Native vs. Browser-Based Mobile applications are driving use of smartphones and tablets in the enterprise, and developers are experimenting with browser-based apps in place
More informationSeattle EXECUTIVE OVERVIEW MULTI-TENANT DATACENTER MARKET
Seattle MULTI-TENANT DATACENTER MARKET This report provides an overview of the competitive dynamics in the Seattle market, a 451 Research Market Map of the competitors in the area, market share of the
More informationData Networking Technology Roadmap
Networking Study: Wave 10 Data Networking Technology Roadmap Capturing networking professionals adoption plans, projected spending and vendor short-lists, the indepth roadmap covers 17 technologies including:
More informationDATACENTER BRAZIL MTDC MARKET ASSESSMENT EXECUTIVE OVERVIEW. Supply and Providers MARCH 2013
BRAZIL MTDC MARKET ASSESSMENT Supply and Providers DATACENTER MARCH 2013 REPORT SNAPSHOT TITLE Brazil MTDC Market Assessment Supply and Providers ANALYST RELEASE DATE March 2013 LENGTH Jeff Paschke, Research
More informationTelco Multi-Play and Content Strategies
THOUGHT LEADERSHIP Telco Multi-Play and Content Strategies APR 2016 Declan Lonergan, VP, Research As telecom operators extend their convergence strategies and launch multi-play landline/mobile/tv services,
More informationWeb and Application Hosting 2015
MARKET FORECAST Web and Application Hosting 2015 SEP 2015 Liam Eagle, Senior Analyst, Service Providers Web and application hosting, a mature IT market, is facing changes to the variety of services on
More informationSoftware and Data Are Reshaping the Advertising Market
THOUGHT LEADERSHIP Software and Data Are Reshaping the Advertising Market APR 2016 Scott Denne, Analyst Matt Mullen, Senior Analyst, Social Business The growth of digital media and mobile connectivity
More informationDATACENTER MULTI-TENANT DATACENTER NORTH AMERICAN PROVIDERS 2013 EXECUTIVE OVERVIEW KEY FINDINGS
MULTI-TENANT DATACENTER NORTH AMERICAN PROVIDERS 2013 DATACENTER KEY FINDINGS MTDCs remained a strong sector in North America during 2012 and this strong growth has continued during the first three quarters
More information2016 Trends in Cloud and IT Services Markets
PREVIEW 2016 Trends in Cloud and IT Services Markets DEC 2015 William Fellows, Research Vice President Owen Rogers, Research Director Agatha Poon, Research Manager Katy Ring, Research Director Cloud transformation
More informationWEB AND APPLICATION HOSTING
WEB AND APPLICATION HOSTING Summer 2013 KEY FINDINGS Although the Internet infrastructure services business continues to grow in every segment, that growth is slowing in some of the traditional infrastructure
More information2016 Trends in Datacenter Technologies
PREVIEW 2016 Trends in Datacenter Technologies OCT 2015 Rhonda Ascierto, Research Director Andy Lawrence, Research Vice President Andrew Donoghue, European Research Manager Daniel Bizo, Senior Analyst
More informationDATACENTER CANADA MTDC MARKET ASSESSMENT REPORT EXCERPT SUPPLY AND PROVIDERS MICHAEL LEVY WRITTEN BY DECEMBER 2012
CANADA MTDC MARKET ASSESSMENT SUPPLY AND PROVIDERS DATACENTER WRITTEN BY MICHAEL LEVY DECEMBER 2012 451 RESEARCH: DATACENTER COGECO DATA SERVICES COGECO DATA SERVICES Headquarters: Toronto, ON President:
More information2016 Trends in Service Providers
PREVIEW 2016 Trends in Service Providers NOV 2015 Al Sadowski, Research Director Liam Eagle, Senior Analyst Carl Brooks, Analyst Jim Davis, Senior Analyst Selling generic technology resources is no way
More informationLondon Multi-Tenant Datacenter and Hosting Market
London Multi-Tenant Datacenter and Hosting Market The largest city in Western Europe, London is also the most diverse in terms of IT service providers. It offers an ideal base to provide colocation, hosting
More informationManagement Update: The Eight Building Blocks of CRM
IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful
More informationNorth American Call Centers Market Share and Forecast, 2002 (Executive Summary) Executive Summary
North American Call Centers Market Share and Forecast, 2002 (Executive Summary) Executive Summary Publication Date: July 11, 2002 Authors Drew Kraus Lily Yu This document has been published to the following
More information2016 Trends in Information Security
PREVIEW 2016 Trends in Information Security DEC 2015 Scott Crawford, Research Director Garrett Bekker, Senior Security Analyst Eric Ogren, Senior Security Analyst Adrian Sanabria, Senior Security Analyst
More informationVirtualization Drives New Approaches to Backup. PRESENTATION TITLE GOES HERE Nikolay Yamakawa 451 Research
Virtualization Drives New Approaches to Backup PRESENTATION TITLE GOES HERE Nikolay Yamakawa 451 Research Nikolay Yamakawa Analyst Nikolay is an analyst for 451 Research's TheInfoPro service, where he
More information2016 Trends in Storage
PREVIEW 2016 Trends in Storage DEC 2015 Henry Baltazar, Research Director Though storage is far from dead, change is coming in the shape of new form factors such as hyperconverged infrastructures and disruptive
More informationDATACENTRE ENTERPRISE DATACENTRE SELECTION EUROPE 2011 JEFF PASCHKE & MARK ACTON REPORT BY SEPTEMBER 2011
ENTERPRISE DATACENTRE SELECTION EUROPE 2011 DATACENTRE REPORT BY JEFF PASCHKE & MARK ACTON SEPTEMBER 2011 2011 TIER1 RESEARCH & THE 451 GROUP DATACENTRE Tier1Research Better perspective from the top in
More informationDATACENTER MULTI-TENANT DATACENTER PROVIDERS EVOLVE WITH CLOUD OFFERINGS EXECUTIVE OVERVIEW MAY 2013
MULTI-TENANT DATACENTER PROVIDERS EVOLVE WITH CLOUD OFFERINGS DATACENTER MAY 2013 REPORT SNAPSHOT TITLE Multi-Tenant Datacenter Providers Evolve with Cloud Offerings ANALYST Glenn Ford, Senior Analyst
More informationThe Lack of a CRM Strategy Will Hinder Health Insurer Growth
Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey
More informationDATACENTER NORTH AMERICAN MULTI-TENANT DATACENTER SUPPLY EXECUTIVE OVERVIEW. Emerging Major Markets 2013 DECEMBER 2013
NORTH AMERICAN MULTI-TENANT DATACENTER SUPPLY Emerging Major Markets 2013 DATACENTER DECEMBER 2013 REPORT SNAPSHOT TITLE ANALYSTS North American Multi-Tenant Datacenter Supply: Emerging Major Markets 2013
More informationManagers Begin to Apply Business Activity Monitoring
Research Brief Managers Begin to Apply Business Activity Monitoring Abstract: Managers are not fully using real-time capabilities for decision making; they implement BAM with basic analytic methods instead
More informationEnterprise Resource Planning Software Market: Europe, 2002 (Executive Summary) Executive Summary
Enterprise Resource Planning Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Fabrizio Biscotti Chris Pang Chad Eschinger This document has been published
More informationUpheaval in the CRM Services Market
Markets, J. Kirkby Research Note 24 October 2002 Upheaval in the CRM Services Market The customer relationship management services market is in upheaval: Competitive changes will strongly influence trends.
More informationHosting and Colocation Regional Strategies for Growth. April 2015
Hosting and Colocation Regional Strategies for Growth April 2015 Key Findings Location is becoming increasingly important for colocation and hosting providers alike, with a growing need by those providing
More informationBusiness Intelligence: The European Perspective
Markets, F. Buytendijk Research Note 5 November 2002 Business Intelligence: The European Perspective When choosing business intelligence products, European users are not that different from North American
More informationManaging Vulnerabilities For PCI Compliance
Managing Vulnerabilities For PCI Compliance Christopher S. Harper Vice President of Technical Services, Secure Enterprise Computing, Inc. June 2012 NOTE CONCERNING INTELLECTUAL PROPERTY AND SOLUTIONS OF
More informationOutlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary
Outlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary Publication Date: October 30, 2002 Authors Thomas Topolinski Chad Eschinger Pranav Kumar This document has
More informationThis white paper was written by Csilla Zsigri, The 451 Group, based on the work done by the SmartLM Consortium in business modeling.
THE BUSINESS SIDE OF SOFTWARE LICENSING Although licensing models have evolved with technology innovations, they do not fully satisfy the business issues faced by today s enterprises. The focus of successful
More informationAgenda Overview for Emerging Marketing Technology and Trends, 2015
G00270688 Agenda Overview for Emerging Marketing Technology and Trends, 2015 Published: 18 December 2014 Analyst(s): Andrew Frank The best digital marketers exploit emerging trends and technologies to
More informationBusiness Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
More informationManagement Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant
IGG-02192003-03 R. Matlus Article 19 February 2003 Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant The North American help desk outsourcing market is growing despite a down economy.
More information2002-2003 Web Services Development, North America (Executive Summary) Executive Summary
2002-2003 Web Services Development, North America (Executive Summary) Executive Summary Publication Date: 3 July 2003 Authors Nicole S. Latimer Colleen Graham Joanne M. Correia Norma Schroder This document
More informationLead architect. Business architect. Technical architect. Lead Architect
Tactical Guidelines, G. James Research Note 20 September 2002 Best Practices for Selecting Enterprise Architects A good enterprise architect needs not only excellent technical skills, but business and
More informationNew Sales and Marketing Models Required to Sell Business Process Services
Research Brief New Sales and Marketing Models Required to Sell Business Process Services Abstract: Numerous internal and external catalysts of change are forcing service providers to continuously reassess
More informationThe Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
More informationManagement Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor
IGG-10232002-02 P. Phelan Article 23 October 2002 Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor Service partner relationships will grow to enable more holistic
More informationUse These Guidelines for Making Better CRM Consulting Provider Selections
Research Publication Date: 7 July 2006 ID Number: G00141062 Use These Guidelines for Making Better CRM Consulting Provider Selections Matthew Goldman, Ed Thompson, Lorrie Scardino Gartner sees many inconsistencies
More informationManagement Update: CRM Success Lies in Strategy and Implementation, Not Software
IGG-03122003-01 D. Hagemeyer, S. Nelson Article 12 March 2003 Management Update: CRM Success Lies in Strategy and Implementation, Not Software A customer relationship management (CRM) package doesn t ensure
More informationCIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader
IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven
More informationBusiness Intelligence Software Market: Europe, 2002 (Executive Summary) Executive Summary
Business Intelligence Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 9 January 2004 Authors Fabrizio Biscotti Colleen Graham This document has been published to the following
More informationGlobal Mobile Identity and Access Management Market
Global Mobile Identity and Access Management Market 2009-2013 Table of Contents 1. Introduction...3 2. Market Size and Forecast...4 3. Geographic Segmentation...5 3.1.Market Size in Americas...6 3.2.Market
More informationRTEs Must Anticipate New Network Demands
Strategic Planning, W. Clark Research Note 13 March 2003 RTEs Must Anticipate New Network Demands Real-time enterprise requirements will change key characteristics of network traffic as usage patterns
More informationEMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02
Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite
More information1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform
More informationBusiness Analytics and the Nexus of Information
Business Analytics and the Nexus of Information 2 The Impact of the Nexus of Forces 4 From the Gartner Files: Information and the Nexus of Forces: Delivering and Analyzing Data 6 About IBM Business Analytics
More informationVendor Classification
Markets, L. Geishecker, F. Buytendijk Research Note 2 October 2002 Introducing the CPM Suites Magic Quadrant Vendors are developing a wide range of new functionality for corporate performance management.
More informationBSM Definition, Drivers and Inhibitors
Events, D. Curtis, M. Govekar Research Note 11 August 2003 BMC Positions Itself for Business Service Management BMC Software's announcement of its business service management strategy is solidified by
More informationSIEM and IAM Technology Integration
SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security
More informationThe Outlook for IT. 2014 to 2017. Michael Smith VP Distinguished Analyst January 31, 2014
The Outlook for IT Michael Smith VP Distinguished Analyst January 31, 2014 2014 to 2017 Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed
More informationThis document has been provided by the International Center for Not-for-Profit Law (ICNL).
This document has been provided by the International Center for Not-for-Profit Law (ICNL). ICNL is the leading source for information on the legal environment for civil society and public participation.
More informationRBC Insurance Fetes Online Auto/Home Insurance Growth
Case Studies, K. Harris Research Note 29 October 2002 RBC Insurance Fetes Online Auto/Home Insurance Growth RBC Insurance's e-business successes are generating greater than $3 million in premiums per month.
More informationIT Services Opportunities in IP Telephony (Executive Summary) Executive Summary
IT Services Opportunities in IP Telephony (Executive Summary) Executive Summary Publication Date: 12 January 2004 Author Eric Goodness This document has been published to the following Marketplace codes:
More informationDecision Framework, DF-19-1071 J. Holincheck. Application Service Provider Traditional Payroll/Benefits Outsourcing Business Process Outsourcing
Decision Framework, J. Holincheck Research Note 28 February 2003 Deciding to Insource or Outsource for Human Resources Enterprises making new technology decisions are often considering various types of
More informationWith Cloud Defender, Alert Logic combines products to deliver outcome-based security
With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,
More informationSurvey Confirms There Are Many Effective Disaster Recovery Strategies
Page 1 of 5 ID Number: G00126421 Survey Confirms There Are Many Effective Disaster Recovery Strategies Browse Topics Advanced Search Contact Gartner 21 April 2005 Donna Scott We conducted a poll at Gartner's
More informationzapnote Analyst: David S. Linthicum
zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-1221 Released December 3, 2007 BOOMI ONDEMAND INTEGRATION AT THE SPEED OF THE INTERNET Analyst: David S. Linthicum Abstract Integration engines don t always
More informationUnified Communications MQ Selection Criteria for 2003
Decision Framework, B. Elliot Research Note 22 January 2003 Unified Communications MQ Selection Criteria for 2003 Unified communications enable enterprises to control their communication options, leveraging
More informationAchieving Enterprise Software Success
Achieving Enterprise Software Success A study of buyer and seller perspectives on the drivers of enterprise software success 2008 Table of Contents Executive Summary... 2 What is Success?... 3 A New Study
More informationGlobal Case Studies in Highly Efficient Datacenters 2014
Global Case Studies in Highly Efficient Datacenters 2014 For datacenters, efficiency and operational excellence are achievable in any location, despite regional differences in datacenter markets across
More informationDon't Pay to Support CRM 'Shelfware'
Tactical Guidelines, J. Disbrow Research Note 3 May 2003 Don't Pay to Support CRM 'Shelfware' Enterprises license customer relationship management solutions that are often never totally deployed. Software
More informationDrivers for the Growing Adoption of Cloud-Based Disaster Recovery PREPARED FOR VMWARE BY 451 RESEARCH
Drivers for the Growing Adoption of Cloud-Based Disaster Recovery PREPARED FOR VMWARE BY 451 RESEARCH JAN 2015 i 451 RESEARCH ADVISORY SERVICES ABOUT 451 RESEARCH 451 Research is a preeminent information
More information2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
More informationReal-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
More informationG00123440 A. Allan. Directory authentication providing a common ID and password across multiple systems
. llan Research Note 21 October 2004 Commentary Enterprise Single Sign-On Tools re Comprehensive but Costly Managing multiple user identities and passwords is difficult for companies and users. ESSO can
More informationMagic Quadrant for Data Center Outsourcing, 4Q03
Markets, R. Matlus, W. Maurer, L. Scardino, B. Caldwell Research Note 12 November 2003 Magic Quadrant for Data Center Outsourcing, 4Q03 Gartner's positioning of the 14 external service providers in the
More informationData Protection In The Cloud - A Case Study
DATA PROTECTION IN THE CLOUD SMBs Embrace Affordable Online Backup and Disaster Recovery End users have a wide variety of options for data protection today all of which are relatively low-cost. This enables
More informationDefinition of the Market
Markets, M. Halama Research Note 9 September 2003 Criteria for Pan-European Web Hosting Magic Quadrant, 2H03 Web hosting firms offer greatly differing services to a wide range of customers. Our criteria
More informationSelect CRM Applications Carefully to Get Maximum Benefits
Strategic Planning, B. Eisenfeld Research Note 19 February 2003 Select CRM Applications Carefully to Get Maximum Benefits Enterprises pursuing the advantages of a customer relationship management strategy
More informationRealize That Big Security Data Is Not Big Security Nor Big Intelligence
G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is
More informationThe Magic Quadrant Framework
Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship
More informationData center management lacks unified tools and strategy for infrastructure monitoring
RESEARCH NOTE Publication Date: September December 8, 17, 2008 Data center management lacks unified tools and strategy for infrastructure monitoring Survey reveals that many data centers are unable to
More informationContact Center Workforce Management Market Report Reprint
Contact Center Workforce Management Market Report Reprint 2012 Reprinted for: Table of Contents 1. WFM Market Activity Analysis... 1 1.2 Market Share Analysis... 3 2. Workforce Management Vendor Satisfaction
More information