Prediction 2003: Security Software Growth Slows

Size: px
Start display at page:

Download "Prediction 2003: Security Software Growth Slows"

Transcription

1 Dataquest Predicts Prediction 2003: Security Software Growth Slows Abstract: The security software market will decline from 10 percent growth in 2001 to only 6.7 percent growth in 2002 as prospects for a surge in IT spending won't occur until mid By Norma Schroder, Fabrizio Biscotti and Colleen Graham Strategic Planning Assumptions By 2006, new license revenue in security software will grow by half (0.7 probability). In 2006, the top 5 security software best-of-breed vendors will collectively lose share to NSM titans, most of which are expanding their footprint in security management software (0.8 probability). By 2006, intrusion detection, firewall and antivirus software markets will cease to exist as independent markets and will converge into one or more of the following a new security software suites market, the existing NSM availability and performance software suites market and the existing networking equipment market (0.7 probability). By 2006, security auditing software products and identity management software products will converge with NSM configuration management and provisioning products, which will perform life cycle configuration of security devices and user access rights, including parameter and user initialization, auditing, tracking, correcting and updating (0.7 probability). Publication Date: November 13, 2002

2 2 Prediction 2003: Security Software Growth Slows Prediction: Market Drivers Strong, but Inhibitors Slow Growth Into 2003 When all the 2002 results for vendors roll in this January, the expectation is for security software growth to slip to 6.7 percent (down from 10 percent in 2001) in terms of new license revenue. The weakening growth performance can be attributed to stagnant business investment. Despite heightened buyer interest in improving security after Sept. 11, little panic buying has occurred in the enterprise segment or even in the government segment. A boomlet did not materialize. A revival of security software spending is not expected until mid In the meantime, during the tight IT budgets of 2002 and into 2003, IT departments are expected to spend on smaller security projects with a fast payback, low implementation overhead and staged pay-as-you-go deployment. In addition, appliances and managed service providers are expected, on the margin, to gain share in security user spending at the expense of security software vendors. These factors will limit the security software market's revenue upside in the short term and perhaps longer. By 2006, new license revenue in security software will grow by half. Impact on 2003 Increased competition will lower average deal size and cause multistage deployments. In the small and midsize business (SMB) space, buyers will find individual modules of software suites from known security specialists attractive. But, in 2003, appliances and managed security service provider (MSSP) substitutes will limit the opportunity for software only SMB solutions. Reacting to 2003 Security software vendors should continue to adjust their costs to prepare for low revenue gains in Vendors can exploit heightened buyer interest in becoming security certified by leading with security audit offerings that identify security holes. Vendors should then follow through with remediation and management products and services. Vendors should plan on selling more small chunks in a multistaged rollout by repackaging and repositioning any monolithic products as multiple modules where feasible. Security vendors should focus on verticals or geographies that are holding up during current economic doldrums. The public, healthcare, housing and consumer goods sectors are counter-cyclical at this time. Most of Asia/Pacific is less affected by the downturn, and efforts to increase sales there could provide returns.

3 Prediction: Dominance of the Top 5 Security Software BOBs to Erode Consolidation will occur in security software. But, not all the largest security best-of-breeds (BOBs) will be doing the consolidating. The expectation is that, in general, network systems management (NSM) titans or dark horses will have that role. In 2006, the top 5 security software BOB vendors (which had the largest revenue in 2001) will collectively lose share to NSM titans, all of which are expanding their footprint in security software. Impact on 2003 Merger, acquisition, divestiture and demise (MADD) activity will significantly intensify. Vendors must anticipate aggressive entry in the security space by NSM and other vendors attracted by the relatively high revenue growth prospects. Larger security vendors are best positioned to sustain themselves by cross-selling from their portfolios of modules to their installed base. New customers are scarce. Reacting to 2003 Large security vendors should continue to spend on research and development (R&D) and integration of any acquisitions to be positioned strategically to compete with NSM titans with an even broader portfolio of offerings. NSM vendors need to invest in marketing themselves to enterprise buyers as an equivalently credible choice for security needs as a BOB. Smaller security BOBs should seek partners to create virtual suites or to increase indirect sales through original equipment manufacturer (OEM) relationships. Prediction: Intrusion Detection, Security Auditing, and Identity Management Are Convergence Markets Ironically, as network infrastructure becomes more intelligent and the "smarts" of security software improves during the next few years, security administrator head count may dwindle in the enterprise because the function may be pulled back to its systems and networking roots. The questions are how fast will it happen and which vendors in the IT infrastructure ecosystem will capture the most revenue from providing security? 3

4 4 Prediction 2003: Security Software Growth Slows By 2006, the intrusion detection (IDS), firewall and antivirus software markets will cease to exist as independent markets and will converge into one or more of the following a new security software suites market, the existing NSM availability and performance software suites market or the existing networking equipment market. By 2006, security auditing software products and identity management software products will converge with NSM configuration management and provisioning products, which will perform life cycle configuration of security devices and user access rights, including parameter and user initialization, auditing, tracking, correcting and updating. Impact on 2003 Up to 50 percent of the user spending in 2003 on network IDS-based packet inspection and signature detection IDS will be embedded in network equipment and appliances. Auditing, identity management and provisioning software is expected to go from its current infancy stage (characterized by bleeding-edge technology pure plays) to becoming acquired functionality that is incorporated into offerings from NSM software and systems and network hardware vendors. In 2003, growth of SMB security outsourcing will continue to grow. Within a decade, 90 percent of SMBs will outsource regular auditing, access management, firewall and intrusion detection to their MSSP, which is many cases, will be their Internet service provider (ISP), their Web-site hosting service provider or their PC provider. For more information, please see the Gartner Dataquest Perspective "Security for SMBs: The Outsourcing Option (ITSV-WW-DP-0244). Reacting in 2003 If you are a security software startup or small pure play with less than one year's cash, consider selling out before being bought out. If you have a general release product, and at least some production customers, you have assets that will fetch a better price now than next year. If you are a security software startup or small pure-play with less than one year's cash with an auditing product, sell your product to service companies that need it to provide a service (security audit specialists, desktop migration specialists or server consolidation specialists). It's not just security value-added resellers (VARs) that will want to sell auditing. It would be a good item for a consultant to add to a desktop migration project or file server migration project. If you are a large security software specialist, borrow a page from NSM systems vendors. Broaden your portfolio of offerings with application specific security modules that know about vulnerabilities and misconfigurations in typical practice (for example, Oracle, SQL Server, Siebel, SAP and others). An application-specific solution is highly salable because it focuses on the customer's exact pain point within a specific application or platform.

5 5 Bottom Line In 2003, IT wallets will still be hard to pry open very far for security, except after a breach. Large NSM vendors will enter this market with their policy management know-how as they try to round out their offerings across the entire distributed NSM, storage and security management stack. For a management titan, if you aren't complete, you can't compete. Smaller security management software vendors face an uphill battle in gaining awareness with enterprise buyers. Use telesales, Web downloads, and equipment and applications partners to bundle free samples. For more information, please see the Gartner Dataquest Perspective "Now Is the Time to Market Software" (SOFT-WW-DP- 0082). Smaller BOBs in security systems software should consider offering their products for private branding resale by other systems and application independent software vendors (ISVs). Selling to a small group of ISVs is less costly than trying to market to a disparate market of end-user enterprises. All vendors should refine marketing and sales programs for smaller chunks, staged deployments and lower approval levels. Focus on counter-cyclical verticals and regions, such as healthcare, government, and Asia/Pacific. Longer term, all vendors must position for a future where security software splits into a systems side and a management side. On the systems side, BOBs will sell software, such as encryption, as an OEM specialty product to systems and application ISVs. On the management side, the established management software vendors have the installed base and deep pockets to win most of the mind share of the enterprise security buyer. Key Issues How is the competitive landscape of this market going to change? What are the future growth prospects for this Industry?

6 6 Prediction 2003: Security Software Growth Slows This document has been published to the following Marketplace codes: SOFT-WW-DP-0112 For More Information... In North America and Latin America: In Europe, the Middle East and Africa: In Asia/Pacific: In Japan: Worldwide via gartner.com: Entire contents 2002 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice

Business Intelligence Software Market: Europe, 2002 (Executive Summary) Executive Summary

Business Intelligence Software Market: Europe, 2002 (Executive Summary) Executive Summary Business Intelligence Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 9 January 2004 Authors Fabrizio Biscotti Colleen Graham This document has been published to the following

More information

Enterprise Resource Planning Software Market: Europe, 2002 (Executive Summary) Executive Summary

Enterprise Resource Planning Software Market: Europe, 2002 (Executive Summary) Executive Summary Enterprise Resource Planning Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Fabrizio Biscotti Chris Pang Chad Eschinger This document has been published

More information

Prediction 2003: CRM Software Market Faces Tough Times

Prediction 2003: CRM Software Market Faces Tough Times Dataquest Predicts Prediction 2003: CRM Software Market Faces Tough Times Abstract: The customer relationship management software market falls from its pinnacle, and downward license revenue challenges

More information

Outlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary

Outlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary Outlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary Publication Date: October 30, 2002 Authors Thomas Topolinski Chad Eschinger Pranav Kumar This document has

More information

Small and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary

Small and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary Small and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary Publication Date: 15 January 2004 Author Robert H. Brown This document has been published to the

More information

How To Make A Call Center More Independent From The Physical Infrastructure

How To Make A Call Center More Independent From The Physical Infrastructure Market Analysis Software Suites Will Dominate Europe's Call Center Market Abstract: By 2006, sales of IP-based call centers in Europe will exceed those of TDM systems, but adoption of independent server-based

More information

How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary

How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary Publication Date: 2 January 2004 Author Bruce M. Caldwell This document has been published to the following

More information

Midsize Enterprises Lead in Adoption of Payment Outsourcing

Midsize Enterprises Lead in Adoption of Payment Outsourcing Research Brief Midsize Enterprises Lead in Adoption of Payment Outsourcing Abstract: More than one-third of midsize enterprises plan to use payment outsourcing by 2004. New areas of interest include automated

More information

2002-2003 Web Services Development, North America (Executive Summary) Executive Summary

2002-2003 Web Services Development, North America (Executive Summary) Executive Summary 2002-2003 Web Services Development, North America (Executive Summary) Executive Summary Publication Date: 3 July 2003 Authors Nicole S. Latimer Colleen Graham Joanne M. Correia Norma Schroder This document

More information

North American Call Centers Market Share and Forecast, 2002 (Executive Summary) Executive Summary

North American Call Centers Market Share and Forecast, 2002 (Executive Summary) Executive Summary North American Call Centers Market Share and Forecast, 2002 (Executive Summary) Executive Summary Publication Date: July 11, 2002 Authors Drew Kraus Lily Yu This document has been published to the following

More information

IP Centrex and IP Telephony Offer Different Capabilities

IP Centrex and IP Telephony Offer Different Capabilities Competitive Analysis IP Centrex and IP Telephony Offer Different Capabilities Abstract: As IP Centrex and hosted IP telephony services become more mainstream, organizations must assess which solution is

More information

Business Applications and Infrastructure Entwined

Business Applications and Infrastructure Entwined Markets, S. Hayward, B. Burton, J. Comport, Y. Genovese, T. Bittman Research Note 9 July 2003 Business and Infrastructure Entwined Oracle's bid for PeopleSoft encompasses more than applications. It illustrates

More information

Decision Framework, DF-19-1071 J. Holincheck. Application Service Provider Traditional Payroll/Benefits Outsourcing Business Process Outsourcing

Decision Framework, DF-19-1071 J. Holincheck. Application Service Provider Traditional Payroll/Benefits Outsourcing Business Process Outsourcing Decision Framework, J. Holincheck Research Note 28 February 2003 Deciding to Insource or Outsource for Human Resources Enterprises making new technology decisions are often considering various types of

More information

Management Alert: Microsoft Will Be a Strong Force in the CRM Market

Management Alert: Microsoft Will Be a Strong Force in the CRM Market IGG-02052003-01 E. Thompson, J. Outlaw Article 5 February 2003 Management Alert: Microsoft Will Be a Strong Force in the CRM Market Microsoft is poised to have a major impact on the customer relationship

More information

Users and Vendors Speak Out: Intrusion Detection and Prevention

Users and Vendors Speak Out: Intrusion Detection and Prevention Market Analysis Users and Vendors Speak Out: Intrusion Detection and Prevention Abstract: With network security concerns multiplying, intrusion protection systems are a hot commodity. But don't count out

More information

Predicts 2004: Supplier Relationship Management

Predicts 2004: Supplier Relationship Management Strategic Planning, D. Hope-Ross Research Note 17 November 2003 Predicts 2004: Supplier Relationship Management Enterprises using technology to improve supplier relationships should pay attention to changes

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02

EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite

More information

Economic conditions and vendor consolidations

Economic conditions and vendor consolidations Magic Quadrant for the ERP Manufacturing Midmarket, 2005 Source: Gartner RAS Core Research Note G00127115, Billy Maynard, Yvonne Genovese, 30 June 2005, R1483 07142006. Economic conditions and vendor consolidations

More information

Asia/Pacific VoIP: A Change of Heart

Asia/Pacific VoIP: A Change of Heart Asia/Pacific VoIP: A Change of Heart Market Analysis Abstract: Voice over IP, which has been struggling to get off the ground for a long time, is beginning to take off in Asia/Pacific, especially in the

More information

New Sales and Marketing Models Required to Sell Business Process Services

New Sales and Marketing Models Required to Sell Business Process Services Research Brief New Sales and Marketing Models Required to Sell Business Process Services Abstract: Numerous internal and external catalysts of change are forcing service providers to continuously reassess

More information

IT Services Opportunities in IP Telephony (Executive Summary) Executive Summary

IT Services Opportunities in IP Telephony (Executive Summary) Executive Summary IT Services Opportunities in IP Telephony (Executive Summary) Executive Summary Publication Date: 12 January 2004 Author Eric Goodness This document has been published to the following Marketplace codes:

More information

Managers Begin to Apply Business Activity Monitoring

Managers Begin to Apply Business Activity Monitoring Research Brief Managers Begin to Apply Business Activity Monitoring Abstract: Managers are not fully using real-time capabilities for decision making; they implement BAM with basic analytic methods instead

More information

Notebook Market Predictions, 2003

Notebook Market Predictions, 2003 Notebook Market Predictions, 2003 Dataquest Predicts Abstract: Microprocessor churn, a disappointing Tablet PC introduction, increasing wireless hot spots and wireless interfaces plus higher memory and

More information

Upheaval in the CRM Services Market

Upheaval in the CRM Services Market Markets, J. Kirkby Research Note 24 October 2002 Upheaval in the CRM Services Market The customer relationship management services market is in upheaval: Competitive changes will strongly influence trends.

More information

WAGs Must Meet Multichannel Access Gateway Criteria

WAGs Must Meet Multichannel Access Gateway Criteria Markets, W. Clark Research Note 16 December 2003 WAGs Must Meet Multichannel Access Gateway Criteria Most wireless application gateway functionality will be absorbed into other mobile development platforms

More information

Business Intelligence: The European Perspective

Business Intelligence: The European Perspective Markets, F. Buytendijk Research Note 5 November 2002 Business Intelligence: The European Perspective When choosing business intelligence products, European users are not that different from North American

More information

Vendors strongly focused on WCM

Vendors strongly focused on WCM Markets, M. Gilbert, N. Drakos, L. Latham Research Note 28 August 2001 The Web Content Management Magic Quadrant for 2001 The Gartner Web content management Magic Quadrant for 2001 has three leaders and

More information

Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03

Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 Markets, H. Dresner, B. Hostmann, F. Buytendijk, A. Tiedrich Research Note 25 August 2003 Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 The business intelligence technology markets continue

More information

Home Cable Providers Combine Voice, Video, Data

Home Cable Providers Combine Voice, Video, Data Research Brief Home Cable Providers Combine Voice, Video, Data Abstract: Cable service providers are looking to the three-way combination of video, voice, and data to increase revenue. Will this new format

More information

Definition of the Market

Definition of the Market Markets, M. Halama Research Note 9 September 2003 Criteria for Pan-European Web Hosting Magic Quadrant, 2H03 Web hosting firms offer greatly differing services to a wide range of customers. Our criteria

More information

First North American Magic Quadrant: CRM Suites for SMBs

First North American Magic Quadrant: CRM Suites for SMBs Markets, J. Outlaw Research Note 6 February 2002 First North American Magic Quadrant: CRM Suites for SMBs Customer relationship management application suites have become the most-popular form of CRM technology

More information

Vendor Classification

Vendor Classification Markets, L. Geishecker, F. Buytendijk Research Note 2 October 2002 Introducing the CPM Suites Magic Quadrant Vendors are developing a wide range of new functionality for corporate performance management.

More information

2003 Desktop Software Distribution Magic Quadrant

2003 Desktop Software Distribution Magic Quadrant Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic

More information

Magic Quadrant for a Fading PKI Market, 2003

Magic Quadrant for a Fading PKI Market, 2003 Markets, V. Wheatman, R. Wagner Research Note 17 June 2003 Magic Quadrant for a Fading PKI Market, 2003 Pure-play public-key infrastructure vendors are disappearing due to failure or acquisition, or by

More information

How to Develop an Effective Vulnerability Management Process

How to Develop an Effective Vulnerability Management Process Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes

More information

Hosting and Colocation Regional Strategies for Growth. April 2015

Hosting and Colocation Regional Strategies for Growth. April 2015 Hosting and Colocation Regional Strategies for Growth April 2015 Key Findings Location is becoming increasingly important for colocation and hosting providers alike, with a growing need by those providing

More information

COM-18-7559 J. Holincheck

COM-18-7559 J. Holincheck J. Holincheck Research Note 3 December 2002 Commentary Leveraging HCM Technologies to Control Labor Costs Large human capital management application suite purchases will be few and far between in 2003.

More information

Magic Quadrant for Application Platform Suites, 2Q03

Magic Quadrant for Application Platform Suites, 2Q03 Markets, Y. Natis, M. Pezzini, G. Phifer, C. Haight, M. Driver Research Note 5 May 2003 Magic Quadrant for Application Platform Suites, 2Q03 Application platform suites are incrementally assembled or bought

More information

The IFX Standard Opens the ATM and POS Channels

The IFX Standard Opens the ATM and POS Channels Strategic Planning, M. Knox, S. Cohen, B. Adrian Research Note 27 August 2003 The IFX Standard Opens the ATM and POS Channels Interactive Financial exchange v.1.4 introduced significant new messaging standards

More information

Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002

Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 IGG-10232002-03 J. Holincheck Article 23 October 2002 Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 The market for large-enterprise human resources management system (HRMS)

More information

BACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments

BACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments BACKUP IN A VIRTUAL WORLD Data-Protection Challenges in Virtual Server Environments Data protection for virtual environments became crucial when end users began virtualizing tier-one, mission-critical

More information

Vendors of specialized applications protect the keystones of fusion

Vendors of specialized applications protect the keystones of fusion Strategic Planning, M. Raskino, A. Kyte, W. Andrews, C. Abrams Research Note 19 January 2004 SOBA Offers New Hope for Niche Vendors of Business Software Niche vendors often fall prey to larger rivals that

More information

Midsize Enterprise Summit Business Continuity Questions

Midsize Enterprise Summit Business Continuity Questions Select Q&A, D. Scott, F. DeSalvo Research Note 6 February 2003 Midsize Enterprise Summit Business Continuity Questions Current events have created a new awareness of the importance of business continuity

More information

Partner Relationship Management: 2003 Magic Quadrant

Partner Relationship Management: 2003 Magic Quadrant Markets, R. DeSisto, C. Marcus Research Note 11 February 2003 Partner Relationship Management: 2003 Magic Quadrant In the latest Gartner PRM Magic Quadrant, Siebel remains the sole PRM leader. Allegis,

More information

CIO Update: The Gartner Firewall Magic Quadrant for 2H02

CIO Update: The Gartner Firewall Magic Quadrant for 2H02 IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market

More information

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear

More information

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven

More information

What Are Network Security Platforms?

What Are Network Security Platforms? Markets, J. Pescatore, M. Easley, R. Stiennon Research Note 7 November 2002 Network Security Platforms Will Transform Security Markets An integrated network security platform approach will increase network

More information

Vertical Data Warehouse Solutions for Financial Services

Vertical Data Warehouse Solutions for Financial Services Decision Framework, M. Knox Research Note 24 July 2003 Vertical Data Warehouse Solutions for Financial Services Packaged DW financial services solutions differ in degree of and approach to verticalization,

More information

Use These Guidelines for Making Better CRM Consulting Provider Selections

Use These Guidelines for Making Better CRM Consulting Provider Selections Research Publication Date: 7 July 2006 ID Number: G00141062 Use These Guidelines for Making Better CRM Consulting Provider Selections Matthew Goldman, Ed Thompson, Lorrie Scardino Gartner sees many inconsistencies

More information

BSM Definition, Drivers and Inhibitors

BSM Definition, Drivers and Inhibitors Events, D. Curtis, M. Govekar Research Note 11 August 2003 BMC Positions Itself for Business Service Management BMC Software's announcement of its business service management strategy is solidified by

More information

Hierarchy of Needs for Content Networking

Hierarchy of Needs for Content Networking Technology, M. Fabbi Research Note 28 October 2002 Hierarchy of Needs for Content Networking Enterprises should understand the hierarchy of needs for content networking, which is illustrated by examining

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

Global Mobile Identity and Access Management Market

Global Mobile Identity and Access Management Market Global Mobile Identity and Access Management Market 2009-2013 Table of Contents 1. Introduction...3 2. Market Size and Forecast...4 3. Geographic Segmentation...5 3.1.Market Size in Americas...6 3.2.Market

More information

COM-19-8811 M. Silver

COM-19-8811 M. Silver M. Silver Research Note 19 June 2003 Commentary Linux Desktop TCO: An Overview With Linux, the client operating system only constitutes a small part of the total cost of ownership. From a TCO perspective,

More information

Management Update: The Eight Building Blocks of CRM

Management Update: The Eight Building Blocks of CRM IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful

More information

EMC 2 (EMC) Analyst: Saheb Saini Fall 2013. Recommendation: SELL Target Price until (06/30/2015): $24.51

EMC 2 (EMC) Analyst: Saheb Saini Fall 2013. Recommendation: SELL Target Price until (06/30/2015): $24.51 Recommendation: SELL Target Price until (06/30/2015): $24.51 1. Reason for Recommendation: Over the past three years, EMC has recorded higher revenue growth each year, and this will likely continue in

More information

2016 Trends in Enterprise Mobility

2016 Trends in Enterprise Mobility PREVIEW 2016 Trends in Enterprise Mobility OCT 2015 Chris Hazelton, Research Director Brian Partridge, Vice President Raúl Castañón-Martínez, Senior Analyst Rich Karpinski, Principal Analyst Sheryl Kingstone,

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

SSL VPN 1H03 Magic Quadrant

SSL VPN 1H03 Magic Quadrant Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant The emerging Secure Sockets Layer virtual private network market is standards-based, with good short-term return on investment

More information

Management Update: The Importance of Developing a CRM Strategy

Management Update: The Importance of Developing a CRM Strategy IGG-10302002-03 J. Kirkby Article 30 October 2002 Management Update: The Importance of Developing a CRM A customer relationship management (CRM) strategy states how to turn a customer base into an intangible

More information

Patch Management Is a Fast Growing Market

Patch Management Is a Fast Growing Market Market Analysis Patch Management Is a Fast Growing Market Abstract: The market for enterprise patch management tools is being pioneered by seven small vendors. Larger players are expected to validate and

More information

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are

More information

Magic Quadrant for the IT Service Desk, 2003

Magic Quadrant for the IT Service Desk, 2003 Markets, K. Brittain Research Note 14 May 2003 Magic Quadrant for the IT Service Desk, 2003 Vendors in the IT service desk market Magic Quadrant have suffered through a depressed economy, vendor financial

More information

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM

Key Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM 1 of 5 10/11/2010 9:44 AM 27 April 2010 Mark Fabbi Gartner RAS Core Research Note G00200313 With the completion of the 3Com acquisition, HP will become a formidable competitor across the entire enterprise

More information

Overview and Frequently Asked Questions

Overview and Frequently Asked Questions Overview and Frequently Asked Questions OVERVIEW Oracle is pleased to announce that we have completed our acquisition of Siebel Systems and we are now operating as one. As the leader in customer relationship

More information

Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor

Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor IGG-10232002-02 P. Phelan Article 23 October 2002 Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor Service partner relationships will grow to enable more holistic

More information

SPECIAL REPORT ENTERPRISE-CLASS SPAM SOLUTIONS A Q&A SESSION WITH GARTNER

SPECIAL REPORT ENTERPRISE-CLASS SPAM SOLUTIONS A Q&A SESSION WITH GARTNER SPECIAL REPORT ENTERPRISE-CLASS SPAM SOLUTIONS A Q&A SESSION WITH GARTNER Exclusive Gartner Analyst Interview with Arabella Hallawell As e-mail volume continues to increase, enterprises are faced with

More information

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with

More information

The ITO and BPO Offering Continuum

The ITO and BPO Offering Continuum Markets, K. Harris Research Note 9 May 2003 Outsourcers in India Set Their Sights on Insurance BPO Vendors in India are targeting the insurance business process outsourcing market. Evaluation of vendor

More information

Telco Multi-Play and Content Strategies

Telco Multi-Play and Content Strategies THOUGHT LEADERSHIP Telco Multi-Play and Content Strategies APR 2016 Declan Lonergan, VP, Research As telecom operators extend their convergence strategies and launch multi-play landline/mobile/tv services,

More information

Management Update: Gartner s 2003 Learning Management System Magic Quadrant

Management Update: Gartner s 2003 Learning Management System Magic Quadrant IGG-02262003-01 J. Lundy Article 26 February 2003 Management Update: Gartner s 2003 Learning Management System Magic Quadrant Demand for learning management systems increased in 2002, and so did the number

More information

RTEs Must Anticipate New Network Demands

RTEs Must Anticipate New Network Demands Strategic Planning, W. Clark Research Note 13 March 2003 RTEs Must Anticipate New Network Demands Real-time enterprise requirements will change key characteristics of network traffic as usage patterns

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

Incentive Compensation Management for Insurance

Incentive Compensation Management for Insurance Markets, J. Galvin, K. Harris Research Note 10 September 2002 Incentive Compensation Management for Insurance Packaged ICM applications provide alternatives for insurance companies struggling to transform

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

The 2H05 Magic Quadrant for managed

The 2H05 Magic Quadrant for managed Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security

More information

SSL VPN 1H03 Magic Quadrant Evaluation Criteria

SSL VPN 1H03 Magic Quadrant Evaluation Criteria Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and

More information

U.S. Wholesale VoIP Models: Domestic vs. International

U.S. Wholesale VoIP Models: Domestic vs. International Market Analysis U.S. Wholesale VoIP Models: Domestic vs. International Abstract: Besides the better-defined international wholesale VoIP model that cuts rates on highcost routes, some U.S. NextGen carriers

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

Server Vendors' High-Availability Services: Magic Quadrant

Server Vendors' High-Availability Services: Magic Quadrant Markets, A. Mac Neela, B. Igou, E. Rocco Research Note 30 September 2002 Server Vendors' High-Availability Services: Magic Quadrant User demand for high availability of critical systems is driving the

More information

The Ten How Factors That Can Affect ERP TCO

The Ten How Factors That Can Affect ERP TCO The Ten How Factors That Can Affect ERP TCO Gartner RAS Core Research Note G00172356, Denise Ganly, 1 February 2010, V1RA9 04082011 Organizations tend to focus on the what that is, the vendor or the product

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

Magic Quadrant for Integrated Document Management, 2003

Magic Quadrant for Integrated Document Management, 2003 Magic Quadrant for Integrated Document Management, 2003 Document management has moved to the forefront of many enterprises' purchasing lists. Our 2003 Magic Quadrant explains the complexities of the integrated

More information

CLOUD CLIENTS AND VIRTUAL CLIENTS

CLOUD CLIENTS AND VIRTUAL CLIENTS CLOUD CLIENTS AND VIRTUAL CLIENTS The Transformation of Virtual Desktops Through Mobility and Cloud Computing Over the past three years, the technology we used to know as virtual desktop infrastructure

More information

The Objectives of a CRM Strategy

The Objectives of a CRM Strategy Tutorials, J. Kirkby Research Note 23 October 2002 What Is a Customer Relationship Management Strategy? A CRM strategy states how to turn a customer base into an intangible asset for market valuations.

More information

Gartner Updates Its Definition of IT Infrastructure Utility

Gartner Updates Its Definition of IT Infrastructure Utility Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some

More information

2016 Trends in Storage

2016 Trends in Storage PREVIEW 2016 Trends in Storage DEC 2015 Henry Baltazar, Research Director Though storage is far from dead, change is coming in the shape of new form factors such as hyperconverged infrastructures and disruptive

More information

Strategic Sourcing Magic Quadrant Criteria: An Explanation

Strategic Sourcing Magic Quadrant Criteria: An Explanation Markets, D. Hope-Ross, J. Woods Research Note 14 March 2003 Strategic Sourcing Magic Quadrant Criteria: An Explanation A new Gartner Magic Quadrant for strategic sourcing applications is being introduced.

More information

HIPAA Compliance Hindered by Lagging Vendors

HIPAA Compliance Hindered by Lagging Vendors Markets, M-21-473 W. Rishel Research Note November 3 HIPAA Compliance Hindered by Lagging Vendors Independent software vendors are significant contributors to the delays on HIPAA transactions. Their customers

More information

Don't Pay to Support CRM 'Shelfware'

Don't Pay to Support CRM 'Shelfware' Tactical Guidelines, J. Disbrow Research Note 3 May 2003 Don't Pay to Support CRM 'Shelfware' Enterprises license customer relationship management solutions that are often never totally deployed. Software

More information

Roundup of Business Intelligence and Information Management Research, 1Q08

Roundup of Business Intelligence and Information Management Research, 1Q08 Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our

More information

Unlike the general notebook market, in which

Unlike the general notebook market, in which Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook

More information

THE CYBER-SECURITY PLAYBOOK

THE CYBER-SECURITY PLAYBOOK THE CYBER-SECURITY PLAYBOOK Selling Into the Global Defense Market The federal cyber-security space is becoming a hotbed of incubation, acquisition and opportunity, but how to sell into this complicated

More information

Vendor Ratings, VDR-19-8225 Thomas Bittman

Vendor Ratings, VDR-19-8225 Thomas Bittman Vendor Ratings, Thomas Bittman Research Note 14 April 2003 Vendor Rating: IBM Rates Positive for Strategy, Portfolio IBM has a broad product portfolio with successful products in key areas. On demand is

More information

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World Aragon Research Author: Mike Anderson Mobile Security in a BYOD World Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile

More information

Brochure More information from http://www.researchandmarkets.com/reports/3493957/

Brochure More information from http://www.researchandmarkets.com/reports/3493957/ Brochure More information from http://www.researchandmarkets.com/reports/3493957/ Warranty Management System Market by Types (Claim & Transaction Management, Warranty Analytics, Billing & Administration

More information

Compaq s Strategy for Small and Medium Businesses

Compaq s Strategy for Small and Medium Businesses 1998 Worldwide Industry Analyst Conference Compaq s Strategy for Small and Medium Businesses Kenny Kurtzman Vice President and General Manager Small and Medium Business Division Objectives Small and Medium

More information