Prediction 2003: Security Software Growth Slows
|
|
- Georgia Howard
- 7 years ago
- Views:
Transcription
1 Dataquest Predicts Prediction 2003: Security Software Growth Slows Abstract: The security software market will decline from 10 percent growth in 2001 to only 6.7 percent growth in 2002 as prospects for a surge in IT spending won't occur until mid By Norma Schroder, Fabrizio Biscotti and Colleen Graham Strategic Planning Assumptions By 2006, new license revenue in security software will grow by half (0.7 probability). In 2006, the top 5 security software best-of-breed vendors will collectively lose share to NSM titans, most of which are expanding their footprint in security management software (0.8 probability). By 2006, intrusion detection, firewall and antivirus software markets will cease to exist as independent markets and will converge into one or more of the following a new security software suites market, the existing NSM availability and performance software suites market and the existing networking equipment market (0.7 probability). By 2006, security auditing software products and identity management software products will converge with NSM configuration management and provisioning products, which will perform life cycle configuration of security devices and user access rights, including parameter and user initialization, auditing, tracking, correcting and updating (0.7 probability). Publication Date: November 13, 2002
2 2 Prediction 2003: Security Software Growth Slows Prediction: Market Drivers Strong, but Inhibitors Slow Growth Into 2003 When all the 2002 results for vendors roll in this January, the expectation is for security software growth to slip to 6.7 percent (down from 10 percent in 2001) in terms of new license revenue. The weakening growth performance can be attributed to stagnant business investment. Despite heightened buyer interest in improving security after Sept. 11, little panic buying has occurred in the enterprise segment or even in the government segment. A boomlet did not materialize. A revival of security software spending is not expected until mid In the meantime, during the tight IT budgets of 2002 and into 2003, IT departments are expected to spend on smaller security projects with a fast payback, low implementation overhead and staged pay-as-you-go deployment. In addition, appliances and managed service providers are expected, on the margin, to gain share in security user spending at the expense of security software vendors. These factors will limit the security software market's revenue upside in the short term and perhaps longer. By 2006, new license revenue in security software will grow by half. Impact on 2003 Increased competition will lower average deal size and cause multistage deployments. In the small and midsize business (SMB) space, buyers will find individual modules of software suites from known security specialists attractive. But, in 2003, appliances and managed security service provider (MSSP) substitutes will limit the opportunity for software only SMB solutions. Reacting to 2003 Security software vendors should continue to adjust their costs to prepare for low revenue gains in Vendors can exploit heightened buyer interest in becoming security certified by leading with security audit offerings that identify security holes. Vendors should then follow through with remediation and management products and services. Vendors should plan on selling more small chunks in a multistaged rollout by repackaging and repositioning any monolithic products as multiple modules where feasible. Security vendors should focus on verticals or geographies that are holding up during current economic doldrums. The public, healthcare, housing and consumer goods sectors are counter-cyclical at this time. Most of Asia/Pacific is less affected by the downturn, and efforts to increase sales there could provide returns.
3 Prediction: Dominance of the Top 5 Security Software BOBs to Erode Consolidation will occur in security software. But, not all the largest security best-of-breeds (BOBs) will be doing the consolidating. The expectation is that, in general, network systems management (NSM) titans or dark horses will have that role. In 2006, the top 5 security software BOB vendors (which had the largest revenue in 2001) will collectively lose share to NSM titans, all of which are expanding their footprint in security software. Impact on 2003 Merger, acquisition, divestiture and demise (MADD) activity will significantly intensify. Vendors must anticipate aggressive entry in the security space by NSM and other vendors attracted by the relatively high revenue growth prospects. Larger security vendors are best positioned to sustain themselves by cross-selling from their portfolios of modules to their installed base. New customers are scarce. Reacting to 2003 Large security vendors should continue to spend on research and development (R&D) and integration of any acquisitions to be positioned strategically to compete with NSM titans with an even broader portfolio of offerings. NSM vendors need to invest in marketing themselves to enterprise buyers as an equivalently credible choice for security needs as a BOB. Smaller security BOBs should seek partners to create virtual suites or to increase indirect sales through original equipment manufacturer (OEM) relationships. Prediction: Intrusion Detection, Security Auditing, and Identity Management Are Convergence Markets Ironically, as network infrastructure becomes more intelligent and the "smarts" of security software improves during the next few years, security administrator head count may dwindle in the enterprise because the function may be pulled back to its systems and networking roots. The questions are how fast will it happen and which vendors in the IT infrastructure ecosystem will capture the most revenue from providing security? 3
4 4 Prediction 2003: Security Software Growth Slows By 2006, the intrusion detection (IDS), firewall and antivirus software markets will cease to exist as independent markets and will converge into one or more of the following a new security software suites market, the existing NSM availability and performance software suites market or the existing networking equipment market. By 2006, security auditing software products and identity management software products will converge with NSM configuration management and provisioning products, which will perform life cycle configuration of security devices and user access rights, including parameter and user initialization, auditing, tracking, correcting and updating. Impact on 2003 Up to 50 percent of the user spending in 2003 on network IDS-based packet inspection and signature detection IDS will be embedded in network equipment and appliances. Auditing, identity management and provisioning software is expected to go from its current infancy stage (characterized by bleeding-edge technology pure plays) to becoming acquired functionality that is incorporated into offerings from NSM software and systems and network hardware vendors. In 2003, growth of SMB security outsourcing will continue to grow. Within a decade, 90 percent of SMBs will outsource regular auditing, access management, firewall and intrusion detection to their MSSP, which is many cases, will be their Internet service provider (ISP), their Web-site hosting service provider or their PC provider. For more information, please see the Gartner Dataquest Perspective "Security for SMBs: The Outsourcing Option (ITSV-WW-DP-0244). Reacting in 2003 If you are a security software startup or small pure play with less than one year's cash, consider selling out before being bought out. If you have a general release product, and at least some production customers, you have assets that will fetch a better price now than next year. If you are a security software startup or small pure-play with less than one year's cash with an auditing product, sell your product to service companies that need it to provide a service (security audit specialists, desktop migration specialists or server consolidation specialists). It's not just security value-added resellers (VARs) that will want to sell auditing. It would be a good item for a consultant to add to a desktop migration project or file server migration project. If you are a large security software specialist, borrow a page from NSM systems vendors. Broaden your portfolio of offerings with application specific security modules that know about vulnerabilities and misconfigurations in typical practice (for example, Oracle, SQL Server, Siebel, SAP and others). An application-specific solution is highly salable because it focuses on the customer's exact pain point within a specific application or platform.
5 5 Bottom Line In 2003, IT wallets will still be hard to pry open very far for security, except after a breach. Large NSM vendors will enter this market with their policy management know-how as they try to round out their offerings across the entire distributed NSM, storage and security management stack. For a management titan, if you aren't complete, you can't compete. Smaller security management software vendors face an uphill battle in gaining awareness with enterprise buyers. Use telesales, Web downloads, and equipment and applications partners to bundle free samples. For more information, please see the Gartner Dataquest Perspective "Now Is the Time to Market Software" (SOFT-WW-DP- 0082). Smaller BOBs in security systems software should consider offering their products for private branding resale by other systems and application independent software vendors (ISVs). Selling to a small group of ISVs is less costly than trying to market to a disparate market of end-user enterprises. All vendors should refine marketing and sales programs for smaller chunks, staged deployments and lower approval levels. Focus on counter-cyclical verticals and regions, such as healthcare, government, and Asia/Pacific. Longer term, all vendors must position for a future where security software splits into a systems side and a management side. On the systems side, BOBs will sell software, such as encryption, as an OEM specialty product to systems and application ISVs. On the management side, the established management software vendors have the installed base and deep pockets to win most of the mind share of the enterprise security buyer. Key Issues How is the competitive landscape of this market going to change? What are the future growth prospects for this Industry?
6 6 Prediction 2003: Security Software Growth Slows This document has been published to the following Marketplace codes: SOFT-WW-DP-0112 For More Information... In North America and Latin America: In Europe, the Middle East and Africa: In Asia/Pacific: In Japan: Worldwide via gartner.com: Entire contents 2002 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice
Business Intelligence Software Market: Europe, 2002 (Executive Summary) Executive Summary
Business Intelligence Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 9 January 2004 Authors Fabrizio Biscotti Colleen Graham This document has been published to the following
More informationEnterprise Resource Planning Software Market: Europe, 2002 (Executive Summary) Executive Summary
Enterprise Resource Planning Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Fabrizio Biscotti Chris Pang Chad Eschinger This document has been published
More informationPrediction 2003: CRM Software Market Faces Tough Times
Dataquest Predicts Prediction 2003: CRM Software Market Faces Tough Times Abstract: The customer relationship management software market falls from its pinnacle, and downward license revenue challenges
More informationOutlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary
Outlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary Publication Date: October 30, 2002 Authors Thomas Topolinski Chad Eschinger Pranav Kumar This document has
More informationSmall and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary
Small and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary Publication Date: 15 January 2004 Author Robert H. Brown This document has been published to the
More informationHow To Make A Call Center More Independent From The Physical Infrastructure
Market Analysis Software Suites Will Dominate Europe's Call Center Market Abstract: By 2006, sales of IP-based call centers in Europe will exceed those of TDM systems, but adoption of independent server-based
More informationHow Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary
How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary Publication Date: 2 January 2004 Author Bruce M. Caldwell This document has been published to the following
More informationMidsize Enterprises Lead in Adoption of Payment Outsourcing
Research Brief Midsize Enterprises Lead in Adoption of Payment Outsourcing Abstract: More than one-third of midsize enterprises plan to use payment outsourcing by 2004. New areas of interest include automated
More information2002-2003 Web Services Development, North America (Executive Summary) Executive Summary
2002-2003 Web Services Development, North America (Executive Summary) Executive Summary Publication Date: 3 July 2003 Authors Nicole S. Latimer Colleen Graham Joanne M. Correia Norma Schroder This document
More informationNorth American Call Centers Market Share and Forecast, 2002 (Executive Summary) Executive Summary
North American Call Centers Market Share and Forecast, 2002 (Executive Summary) Executive Summary Publication Date: July 11, 2002 Authors Drew Kraus Lily Yu This document has been published to the following
More informationIP Centrex and IP Telephony Offer Different Capabilities
Competitive Analysis IP Centrex and IP Telephony Offer Different Capabilities Abstract: As IP Centrex and hosted IP telephony services become more mainstream, organizations must assess which solution is
More informationBusiness Applications and Infrastructure Entwined
Markets, S. Hayward, B. Burton, J. Comport, Y. Genovese, T. Bittman Research Note 9 July 2003 Business and Infrastructure Entwined Oracle's bid for PeopleSoft encompasses more than applications. It illustrates
More informationDecision Framework, DF-19-1071 J. Holincheck. Application Service Provider Traditional Payroll/Benefits Outsourcing Business Process Outsourcing
Decision Framework, J. Holincheck Research Note 28 February 2003 Deciding to Insource or Outsource for Human Resources Enterprises making new technology decisions are often considering various types of
More informationManagement Alert: Microsoft Will Be a Strong Force in the CRM Market
IGG-02052003-01 E. Thompson, J. Outlaw Article 5 February 2003 Management Alert: Microsoft Will Be a Strong Force in the CRM Market Microsoft is poised to have a major impact on the customer relationship
More informationUsers and Vendors Speak Out: Intrusion Detection and Prevention
Market Analysis Users and Vendors Speak Out: Intrusion Detection and Prevention Abstract: With network security concerns multiplying, intrusion protection systems are a hot commodity. But don't count out
More informationPredicts 2004: Supplier Relationship Management
Strategic Planning, D. Hope-Ross Research Note 17 November 2003 Predicts 2004: Supplier Relationship Management Enterprises using technology to improve supplier relationships should pay attention to changes
More informationIT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
More informationEMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02
Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite
More informationEconomic conditions and vendor consolidations
Magic Quadrant for the ERP Manufacturing Midmarket, 2005 Source: Gartner RAS Core Research Note G00127115, Billy Maynard, Yvonne Genovese, 30 June 2005, R1483 07142006. Economic conditions and vendor consolidations
More informationAsia/Pacific VoIP: A Change of Heart
Asia/Pacific VoIP: A Change of Heart Market Analysis Abstract: Voice over IP, which has been struggling to get off the ground for a long time, is beginning to take off in Asia/Pacific, especially in the
More informationNew Sales and Marketing Models Required to Sell Business Process Services
Research Brief New Sales and Marketing Models Required to Sell Business Process Services Abstract: Numerous internal and external catalysts of change are forcing service providers to continuously reassess
More informationIT Services Opportunities in IP Telephony (Executive Summary) Executive Summary
IT Services Opportunities in IP Telephony (Executive Summary) Executive Summary Publication Date: 12 January 2004 Author Eric Goodness This document has been published to the following Marketplace codes:
More informationManagers Begin to Apply Business Activity Monitoring
Research Brief Managers Begin to Apply Business Activity Monitoring Abstract: Managers are not fully using real-time capabilities for decision making; they implement BAM with basic analytic methods instead
More informationNotebook Market Predictions, 2003
Notebook Market Predictions, 2003 Dataquest Predicts Abstract: Microprocessor churn, a disappointing Tablet PC introduction, increasing wireless hot spots and wireless interfaces plus higher memory and
More informationUpheaval in the CRM Services Market
Markets, J. Kirkby Research Note 24 October 2002 Upheaval in the CRM Services Market The customer relationship management services market is in upheaval: Competitive changes will strongly influence trends.
More informationWAGs Must Meet Multichannel Access Gateway Criteria
Markets, W. Clark Research Note 16 December 2003 WAGs Must Meet Multichannel Access Gateway Criteria Most wireless application gateway functionality will be absorbed into other mobile development platforms
More informationBusiness Intelligence: The European Perspective
Markets, F. Buytendijk Research Note 5 November 2002 Business Intelligence: The European Perspective When choosing business intelligence products, European users are not that different from North American
More informationVendors strongly focused on WCM
Markets, M. Gilbert, N. Drakos, L. Latham Research Note 28 August 2001 The Web Content Management Magic Quadrant for 2001 The Gartner Web content management Magic Quadrant for 2001 has three leaders and
More informationMagic Quadrants for EBIS/Reporting and BI Platforms, 2H03
Markets, H. Dresner, B. Hostmann, F. Buytendijk, A. Tiedrich Research Note 25 August 2003 Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 The business intelligence technology markets continue
More informationHome Cable Providers Combine Voice, Video, Data
Research Brief Home Cable Providers Combine Voice, Video, Data Abstract: Cable service providers are looking to the three-way combination of video, voice, and data to increase revenue. Will this new format
More informationDefinition of the Market
Markets, M. Halama Research Note 9 September 2003 Criteria for Pan-European Web Hosting Magic Quadrant, 2H03 Web hosting firms offer greatly differing services to a wide range of customers. Our criteria
More informationFirst North American Magic Quadrant: CRM Suites for SMBs
Markets, J. Outlaw Research Note 6 February 2002 First North American Magic Quadrant: CRM Suites for SMBs Customer relationship management application suites have become the most-popular form of CRM technology
More informationVendor Classification
Markets, L. Geishecker, F. Buytendijk Research Note 2 October 2002 Introducing the CPM Suites Magic Quadrant Vendors are developing a wide range of new functionality for corporate performance management.
More information2003 Desktop Software Distribution Magic Quadrant
Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic
More informationMagic Quadrant for a Fading PKI Market, 2003
Markets, V. Wheatman, R. Wagner Research Note 17 June 2003 Magic Quadrant for a Fading PKI Market, 2003 Pure-play public-key infrastructure vendors are disappearing due to failure or acquisition, or by
More informationHow to Develop an Effective Vulnerability Management Process
Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes
More informationHosting and Colocation Regional Strategies for Growth. April 2015
Hosting and Colocation Regional Strategies for Growth April 2015 Key Findings Location is becoming increasingly important for colocation and hosting providers alike, with a growing need by those providing
More informationCOM-18-7559 J. Holincheck
J. Holincheck Research Note 3 December 2002 Commentary Leveraging HCM Technologies to Control Labor Costs Large human capital management application suite purchases will be few and far between in 2003.
More informationMagic Quadrant for Application Platform Suites, 2Q03
Markets, Y. Natis, M. Pezzini, G. Phifer, C. Haight, M. Driver Research Note 5 May 2003 Magic Quadrant for Application Platform Suites, 2Q03 Application platform suites are incrementally assembled or bought
More informationThe IFX Standard Opens the ATM and POS Channels
Strategic Planning, M. Knox, S. Cohen, B. Adrian Research Note 27 August 2003 The IFX Standard Opens the ATM and POS Channels Interactive Financial exchange v.1.4 introduced significant new messaging standards
More informationManagement Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002
IGG-10232002-03 J. Holincheck Article 23 October 2002 Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 The market for large-enterprise human resources management system (HRMS)
More informationBACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments
BACKUP IN A VIRTUAL WORLD Data-Protection Challenges in Virtual Server Environments Data protection for virtual environments became crucial when end users began virtualizing tier-one, mission-critical
More informationVendors of specialized applications protect the keystones of fusion
Strategic Planning, M. Raskino, A. Kyte, W. Andrews, C. Abrams Research Note 19 January 2004 SOBA Offers New Hope for Niche Vendors of Business Software Niche vendors often fall prey to larger rivals that
More informationMidsize Enterprise Summit Business Continuity Questions
Select Q&A, D. Scott, F. DeSalvo Research Note 6 February 2003 Midsize Enterprise Summit Business Continuity Questions Current events have created a new awareness of the importance of business continuity
More informationPartner Relationship Management: 2003 Magic Quadrant
Markets, R. DeSisto, C. Marcus Research Note 11 February 2003 Partner Relationship Management: 2003 Magic Quadrant In the latest Gartner PRM Magic Quadrant, Siebel remains the sole PRM leader. Allegis,
More informationCIO Update: The Gartner Firewall Magic Quadrant for 2H02
IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market
More informationMagic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore
Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear
More informationCIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader
IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven
More informationWhat Are Network Security Platforms?
Markets, J. Pescatore, M. Easley, R. Stiennon Research Note 7 November 2002 Network Security Platforms Will Transform Security Markets An integrated network security platform approach will increase network
More informationVertical Data Warehouse Solutions for Financial Services
Decision Framework, M. Knox Research Note 24 July 2003 Vertical Data Warehouse Solutions for Financial Services Packaged DW financial services solutions differ in degree of and approach to verticalization,
More informationUse These Guidelines for Making Better CRM Consulting Provider Selections
Research Publication Date: 7 July 2006 ID Number: G00141062 Use These Guidelines for Making Better CRM Consulting Provider Selections Matthew Goldman, Ed Thompson, Lorrie Scardino Gartner sees many inconsistencies
More informationBSM Definition, Drivers and Inhibitors
Events, D. Curtis, M. Govekar Research Note 11 August 2003 BMC Positions Itself for Business Service Management BMC Software's announcement of its business service management strategy is solidified by
More informationHierarchy of Needs for Content Networking
Technology, M. Fabbi Research Note 28 October 2002 Hierarchy of Needs for Content Networking Enterprises should understand the hierarchy of needs for content networking, which is illustrated by examining
More informationIron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
More informationGlobal Mobile Identity and Access Management Market
Global Mobile Identity and Access Management Market 2009-2013 Table of Contents 1. Introduction...3 2. Market Size and Forecast...4 3. Geographic Segmentation...5 3.1.Market Size in Americas...6 3.2.Market
More informationCOM-19-8811 M. Silver
M. Silver Research Note 19 June 2003 Commentary Linux Desktop TCO: An Overview With Linux, the client operating system only constitutes a small part of the total cost of ownership. From a TCO perspective,
More informationManagement Update: The Eight Building Blocks of CRM
IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful
More informationEMC 2 (EMC) Analyst: Saheb Saini Fall 2013. Recommendation: SELL Target Price until (06/30/2015): $24.51
Recommendation: SELL Target Price until (06/30/2015): $24.51 1. Reason for Recommendation: Over the past three years, EMC has recorded higher revenue growth each year, and this will likely continue in
More information2016 Trends in Enterprise Mobility
PREVIEW 2016 Trends in Enterprise Mobility OCT 2015 Chris Hazelton, Research Director Brian Partridge, Vice President Raúl Castañón-Martínez, Senior Analyst Rich Karpinski, Principal Analyst Sheryl Kingstone,
More informationBest Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
More informationSSL VPN 1H03 Magic Quadrant
Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant The emerging Secure Sockets Layer virtual private network market is standards-based, with good short-term return on investment
More informationManagement Update: The Importance of Developing a CRM Strategy
IGG-10302002-03 J. Kirkby Article 30 October 2002 Management Update: The Importance of Developing a CRM A customer relationship management (CRM) strategy states how to turn a customer base into an intangible
More informationPatch Management Is a Fast Growing Market
Market Analysis Patch Management Is a Fast Growing Market Abstract: The market for enterprise patch management tools is being pioneered by seven small vendors. Larger players are expected to validate and
More informationCDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
More informationMagic Quadrant for the IT Service Desk, 2003
Markets, K. Brittain Research Note 14 May 2003 Magic Quadrant for the IT Service Desk, 2003 Vendors in the IT service desk market Magic Quadrant have suffered through a depressed economy, vendor financial
More informationKey Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM
1 of 5 10/11/2010 9:44 AM 27 April 2010 Mark Fabbi Gartner RAS Core Research Note G00200313 With the completion of the 3Com acquisition, HP will become a formidable competitor across the entire enterprise
More informationOverview and Frequently Asked Questions
Overview and Frequently Asked Questions OVERVIEW Oracle is pleased to announce that we have completed our acquisition of Siebel Systems and we are now operating as one. As the leader in customer relationship
More informationManagement Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor
IGG-10232002-02 P. Phelan Article 23 October 2002 Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor Service partner relationships will grow to enable more holistic
More informationSPECIAL REPORT ENTERPRISE-CLASS SPAM SOLUTIONS A Q&A SESSION WITH GARTNER
SPECIAL REPORT ENTERPRISE-CLASS SPAM SOLUTIONS A Q&A SESSION WITH GARTNER Exclusive Gartner Analyst Interview with Arabella Hallawell As e-mail volume continues to increase, enterprises are faced with
More informationHow Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
More informationThe ITO and BPO Offering Continuum
Markets, K. Harris Research Note 9 May 2003 Outsourcers in India Set Their Sights on Insurance BPO Vendors in India are targeting the insurance business process outsourcing market. Evaluation of vendor
More informationTelco Multi-Play and Content Strategies
THOUGHT LEADERSHIP Telco Multi-Play and Content Strategies APR 2016 Declan Lonergan, VP, Research As telecom operators extend their convergence strategies and launch multi-play landline/mobile/tv services,
More informationManagement Update: Gartner s 2003 Learning Management System Magic Quadrant
IGG-02262003-01 J. Lundy Article 26 February 2003 Management Update: Gartner s 2003 Learning Management System Magic Quadrant Demand for learning management systems increased in 2002, and so did the number
More informationRTEs Must Anticipate New Network Demands
Strategic Planning, W. Clark Research Note 13 March 2003 RTEs Must Anticipate New Network Demands Real-time enterprise requirements will change key characteristics of network traffic as usage patterns
More informationNow Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
More informationCost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
More informationIncentive Compensation Management for Insurance
Markets, J. Galvin, K. Harris Research Note 10 September 2002 Incentive Compensation Management for Insurance Packaged ICM applications provide alternatives for insurance companies struggling to transform
More informationVendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
More informationThe 2H05 Magic Quadrant for managed
Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security
More informationSSL VPN 1H03 Magic Quadrant Evaluation Criteria
Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and
More informationU.S. Wholesale VoIP Models: Domestic vs. International
Market Analysis U.S. Wholesale VoIP Models: Domestic vs. International Abstract: Besides the better-defined international wholesale VoIP model that cuts rates on highcost routes, some U.S. NextGen carriers
More informationResponsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
More informationServer Vendors' High-Availability Services: Magic Quadrant
Markets, A. Mac Neela, B. Igou, E. Rocco Research Note 30 September 2002 Server Vendors' High-Availability Services: Magic Quadrant User demand for high availability of critical systems is driving the
More informationThe Ten How Factors That Can Affect ERP TCO
The Ten How Factors That Can Affect ERP TCO Gartner RAS Core Research Note G00172356, Denise Ganly, 1 February 2010, V1RA9 04082011 Organizations tend to focus on the what that is, the vendor or the product
More informationOrganizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
More informationMagic Quadrant for Integrated Document Management, 2003
Magic Quadrant for Integrated Document Management, 2003 Document management has moved to the forefront of many enterprises' purchasing lists. Our 2003 Magic Quadrant explains the complexities of the integrated
More informationCLOUD CLIENTS AND VIRTUAL CLIENTS
CLOUD CLIENTS AND VIRTUAL CLIENTS The Transformation of Virtual Desktops Through Mobility and Cloud Computing Over the past three years, the technology we used to know as virtual desktop infrastructure
More informationThe Objectives of a CRM Strategy
Tutorials, J. Kirkby Research Note 23 October 2002 What Is a Customer Relationship Management Strategy? A CRM strategy states how to turn a customer base into an intangible asset for market valuations.
More informationGartner Updates Its Definition of IT Infrastructure Utility
Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some
More information2016 Trends in Storage
PREVIEW 2016 Trends in Storage DEC 2015 Henry Baltazar, Research Director Though storage is far from dead, change is coming in the shape of new form factors such as hyperconverged infrastructures and disruptive
More informationStrategic Sourcing Magic Quadrant Criteria: An Explanation
Markets, D. Hope-Ross, J. Woods Research Note 14 March 2003 Strategic Sourcing Magic Quadrant Criteria: An Explanation A new Gartner Magic Quadrant for strategic sourcing applications is being introduced.
More informationHIPAA Compliance Hindered by Lagging Vendors
Markets, M-21-473 W. Rishel Research Note November 3 HIPAA Compliance Hindered by Lagging Vendors Independent software vendors are significant contributors to the delays on HIPAA transactions. Their customers
More informationDon't Pay to Support CRM 'Shelfware'
Tactical Guidelines, J. Disbrow Research Note 3 May 2003 Don't Pay to Support CRM 'Shelfware' Enterprises license customer relationship management solutions that are often never totally deployed. Software
More informationRoundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
More informationUnlike the general notebook market, in which
Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook
More informationTHE CYBER-SECURITY PLAYBOOK
THE CYBER-SECURITY PLAYBOOK Selling Into the Global Defense Market The federal cyber-security space is becoming a hotbed of incubation, acquisition and opportunity, but how to sell into this complicated
More informationVendor Ratings, VDR-19-8225 Thomas Bittman
Vendor Ratings, Thomas Bittman Research Note 14 April 2003 Vendor Rating: IBM Rates Positive for Strategy, Portfolio IBM has a broad product portfolio with successful products in key areas. On demand is
More informationAragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World
Aragon Research Author: Mike Anderson Mobile Security in a BYOD World Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile
More informationBrochure More information from http://www.researchandmarkets.com/reports/3493957/
Brochure More information from http://www.researchandmarkets.com/reports/3493957/ Warranty Management System Market by Types (Claim & Transaction Management, Warranty Analytics, Billing & Administration
More informationCompaq s Strategy for Small and Medium Businesses
1998 Worldwide Industry Analyst Conference Compaq s Strategy for Small and Medium Businesses Kenny Kurtzman Vice President and General Manager Small and Medium Business Division Objectives Small and Medium
More information