Managing the Risks of Running Windows Server 2003 After July 2015

Size: px
Start display at page:

Download "Managing the Risks of Running Windows Server 2003 After July 2015"

Transcription

1 G Managing the Risks of Running Windows Server 2003 After July 2015 Published: 1 April 2014 Analyst(s): Carl Claunch Windows Server 2003 and Windows Server 2003 R2 reach the end of their extended support by Microsoft in mid-2015; using these products after that time has consequences and risks. This research outlines the best practices for organizations that will be in this situation. Key Challenges For many clients, there is not enough time left to migrate all the systems that are running Windows Server 2003 and Windows Server 2003 R2 to a newer version before support ends in July Third-party products may become unsupported as well, triggered by the operating system dates. Operating servers with unsupported operating systems leaves the data center open to future risks due to unfixed security exposures or malfunctioning software. Choosing among the many possible tools and approaches to mitigate the risk is difficult and highly dependent on the individual system and the IT environment. No single solution will address all scenarios; the best practice is to establish a combination of approaches based on a risk management analysis. Recommendations Adopt strategies appropriate for the low probability but high impact of future events, consistent with the sometimes high costs and other challenges of complete mitigation. Leverage the impact analysis of extended outages done as part of a recent disaster recovery planning effort. Build scenarios to handle events, but defer action until (and unless) an event occurs, when fast reaction is possible or the impact of sudden elimination of the system is modest.

2 Create a written plan to prioritize, define responses by type of event, and script the high-level actions to take if given types of events occur. Table of Contents Introduction...2 Analysis...3 Properly Assess the Risks and Consequences of Running Systems Under Windows Server 2003 After Support Ends in Mid Apply Risk Management Principles to Assess and Prioritize Impacted Systems...4 Adopt Proven Practices and Alternatives Appropriate to Each Unsupported System... 4 Gartner Recommended Reading... 5 Introduction In recent months, Gartner saw an increasing volume of inquiries on continuing to use systems whose Windows Server 2003 operating system 1 will be unsupported after 14 July For quite a few clients, it is becoming apparent that these systems will not be migrated in time to new supported versions of the operating system. In these calls, the clients are looking for advice, new ideas and best practices for how similar organizations are addressing this issue. First, we generally talk through the consequences and risks they will face after the extended support period expires next year. With that as a basis for assessing the situation using business risk management principles, we use the remainder of the call to talk through a variety of techniques, tools, strategies and actions that have worked for others. A surprising number of client organizations will be operating those unsupported systems next year and beyond; they range from medium-scale up to the largest enterprise IT organizations. Both technically adept and less sophisticated shops find themselves without sufficient time and budget to completely migrate all workloads. The best practice is migration or conversion, ensuring that no instances of Windows Server 2003 will be in production use after the end of support in July The majority of client organizations are planning to accomplish this, are in the midst of that activity or have already replaced all Windows Server 2003 systems. That is our primary recommendation for current users of this operating system. For a variety of reasons, however, not every client will be able to accomplish this. This document is for those clients that cannot apply the primary best practice of completing a migration before support ends. Page 2 of 7 Gartner, Inc. G

3 No simple, single solution exists to fully manage the risks; rather, the best practice in this area is the application of choices from among a large pool of options. The particular approach selected for each system is dependent on characteristics of that application and of the risk. Analysis Properly Assess the Risks and Consequences of Running Systems Under Windows Server 2003 After Support Ends in Mid-2015 Microsoft's support program for both Windows Server 2003 and Windows Server 2003 R2 is currently in the extended support phase, which is scheduled to cease on 14 July After that date, if a new security vulnerability is discovered in the code, there is no commitment that a fix will be produced and released by Microsoft, nor will Microsoft address nonsecurity defects or assist customers that encounter problems in operation. Further, it is not just the operating system that should concern clients. Third parties that sell and support software including business applications may tie the support of their code to the status of the underlying operating system; running the third-party software on Windows Server 2003 will constitute an unsupported environment. If a security exposure is discovered and exploited by outsiders, clients could have the operation of applications disrupted, data could be stolen or tampered with, and the compromised system may be the launching pad for eavesdropping and active attacks against other systems within the data center. In addition to security risks, it is possible that an IT system running on Windows Server 2003 may cease to operate correctly because of some latent defect that has been triggered by changes in the client's use. There is no assurance that a correction will be possible, rendering that IT system suddenly unable to fulfill its purpose, in part or totally. Even if the problem encountered does not require code changes to solve, it may need expert assistance from Microsoft in order to diagnose the root cause, but those resources may no longer be available. Regulatory and compliance obligations may pertain as well, requiring all production systems to have support available from the product providers. Thus, continuing to use software running on Windows Server 2003 after support ends could violate the compliance or regulatory obligations of your organization. Microsoft is open to negotiating a custom support agreement to provide fixes for security vulnerabilities for Windows Server 2003 after it reaches the end of the extended support phase next year. However, this is not a full solution even if the relatively high cost is acceptable. These agreements are not open-ended; they are signed in the context of a plan with a fixed end date for migration of the remaining systems to a supported version of Windows Server. They do nothing to address any third-party software running on those servers if the maker of that application defines Gartner, Inc. G Page 3 of 7

4 Windows Server 2003 as an unsupported environment for its product, your custom support agreement with Microsoft doesn't help. Among all possible security and operational risks, some may be solvable by one or more tools. Other risks require different tools or complex custom development of solutions, or they may not be amenable to a fix at all. For example, a tool that manages database access may be the resolution if a security vulnerability is discovered in SQL calls, but not so helpful if the issue affects Internet Information Services (IIS) or the business application itself. A firewall and intrusion monitoring tools may be sufficient to address possible compromise of some of the systems, while other exposures may involve the business rules themselves, demanding a change to the core logic of the application. Apply Risk Management Principles to Assess and Prioritize Impacted Systems Although a risk is identified, it may never occur. Further, the impacts are not the same, and the means of mitigating or resolving different risks may vary significantly. It may be imprudent to spend large amounts of time and money to offset a very low-probability event when the corresponding impact is light. On the other hand, some regulated industries may not be permitted to run certain applications if the system is unsupported. The systems running under Windows Server 2003 may have been in successful operation for almost a decade; what is the risk that a new problem will arise that impairs the system's operation? Security exposures in this operating system version have been frequently detected and patched; how often have the systems been the target of attacks? For some IT systems being assessed, the business has alternative means at hand if the application were to be unavailable for an extended period. This may already have been studied as part of an impact assessment for disaster recovery planning; take advantage of that work to speed the analysis of the future risks. If a means exists to survive without the software, even if it is more cumbersome or expensive for the business users, the impact is controlled. The client may continue to operate the system, while watching for the occurrence of the risk scenarios, at which point the impaired system can be rapidly shut down. The best practice involves setting up a means to watch for the risk events and the creation of a process to follow in that scenario. Risk management is a discipline that seeks the appropriate balance between risks and mitigation activities. Some risks are worth taking, with an impact that is less than the costs of eliminating the risk. Some actions can be deferred, given the low odds that a given event will occur in the coming years; if the action can be applied quickly to cap the impact of a possible event, this may be a better decision than to launch an immediate high-resource effort to migrate or replace the system. Adopt Proven Practices and Alternatives Appropriate to Each Unsupported System Since a client need not eliminate every risk, particularly if the mitigation can be readily applied in the future if the risk materializes, the best practice is to have developed broad classes of potential issues and to have identified the appropriate response for each. Clients prioritize and begin Page 4 of 7 Gartner, Inc. G

5 activities only for the systems with very high impacts or facing situations with a high likelihood of happening. There are many ways in which these risks can be addressed, far more than can be detailed in a document like this. A few examples will help to illustrate the best practices applied or scenario responses developed by different clients. Most clients will have a range of such approaches identified that pertain to their environment and the specific systems they will continue operating later next year. Additional software products could be installed and used to block security exposures or overcome operational problems, in the event these arise in the future. For the most part, these are specific solutions to narrow classes of problems. One tool may allow rules to be imposed on the database queries and updates, by interposing itself between the vulnerable database and all software or users accessing that system. If a risk arises that is related to the database and its exploitation can be blocked by institution of some clear rules, then a tool like this would be an effective mitigation. The concept of a demilitarized zone (DMZ) has been frequently used to isolate systems that are accessible by outsiders, to minimize what they could do to the rest of the data center if they become compromised. Further, much tighter control can be placed on which other systems they are permitted to contact and the types of access allowed. This may reduce the usability of a system, but it may be better than the alternative of losing all use if a new vulnerability becomes known. The nature of the vulnerability and the usefulness of the system in that case will help decide whether a DMZ may be sufficient to address risks. When alternative software or manual processes exist that could take the place of an infected or impaired system, these may be the most appropriate actions to take if an event does occur in the future. Script at a high level the way this will be handled, and institute the right measures to detect and trigger the action if the event takes place. There are cases in which migration or replacement of the system is the best practice, rather than unsupported operation under Windows Server In these cases, some means must be found to make this happen in the next year. There are a few good ideas that clients can use to drive the funding when this approach is needed. If you are expecting to have Windows Server 2003 in operation from mid-2015 onward, apply the approaches from this document, determine if some of the best practices described will be useful for your situation, and build your plan of action. In an inquiry call, we can help you tailor your approach and can offer additional best practices, not listed in this overview, that are potential solutions to situations you may face. Gartner Recommended Reading Some documents may not be available as part of your current Gartner subscription. "Time to Adjust Your Windows Server Migration Plans" Gartner, Inc. G Page 5 of 7

6 Evidence For more detail on the Microsoft support policy, see "Microsoft Support Lifecycle Policy FAQ." 1 The operating system products whose support will end in 2015 include Windows Server 2003, Windows Server 2003 R2, and Windows Server 2003 Small Business Server. Our advice is applicable to all of those products. Page 6 of 7 Gartner, Inc. G

7 GARTNER HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT USA Regional Headquarters AUSTRALIA BRAZIL JAPAN UNITED KINGDOM For a complete list of worldwide locations, visit Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity. Gartner, Inc. G Page 7 of 7

Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015

Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015 G00263819 Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015 Published: 18 June 2014 Analyst(s): Carl Claunch Support for Windows Server 2003 will end in July 2015. Production

More information

Realize That Big Security Data Is Not Big Security Nor Big Intelligence

Realize That Big Security Data Is Not Big Security Nor Big Intelligence G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is

More information

Understanding Vulnerability Management Life Cycle Functions

Understanding Vulnerability Management Life Cycle Functions Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability

More information

The Outlook for IT. 2014 to 2017. Michael Smith VP Distinguished Analyst January 31, 2014

The Outlook for IT. 2014 to 2017. Michael Smith VP Distinguished Analyst January 31, 2014 The Outlook for IT Michael Smith VP Distinguished Analyst January 31, 2014 2014 to 2017 Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed

More information

Agenda Overview for Emerging Marketing Technology and Trends, 2015

Agenda Overview for Emerging Marketing Technology and Trends, 2015 G00270688 Agenda Overview for Emerging Marketing Technology and Trends, 2015 Published: 18 December 2014 Analyst(s): Andrew Frank The best digital marketers exploit emerging trends and technologies to

More information

Agenda Overview for Multichannel Marketing, 2015

Agenda Overview for Multichannel Marketing, 2015 G00271717 Agenda Overview for Multichannel Marketing, 2015 Published: 19 December 2014 Analyst(s): Adam Sarner, Jennifer S. Beck Multichannel marketing is where content and context meet and where brand

More information

Agenda Overview for Marketing Management, 2015

Agenda Overview for Marketing Management, 2015 G00270720 Agenda Overview for Marketing Management, 2015 Published: 18 December 2014 Analyst(s): Richard Fouts Increased participation in strategic business decisions and an evolving organization put new

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

X.509 Certificate Management: Avoiding Downtime and Brand Damage

X.509 Certificate Management: Avoiding Downtime and Brand Damage G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models

Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models G00237716 Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models Published: 6 February 2013 Analyst(s): David W. Cearley, Donna Scott, Joe Skorupa, Thomas J. Bittman Cloud

More information

Agenda Overview for Digital Commerce, 2015

Agenda Overview for Digital Commerce, 2015 G00270685 Agenda Overview for Digital Commerce, 2015 Published: 18 December 2014 Analyst(s): Jennifer Polk Marketing is making a greater impact on, and taking more responsibility for, digital commerce.

More information

Selecting a Mobile App Development Vendor

Selecting a Mobile App Development Vendor G00246304 Selecting a Mobile App Development Vendor Published: 27 December 2012 Analyst(s): Ken Parmelee Ensuring that mobile app development vendors meet requirements and are viable requires an understanding

More information

Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023

Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023 G00261104 Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023 Published: 24 January 2014 Analyst(s): Nigel Rayner This Gartner Research Circle survey conducted in September 2013 shows that some organizations

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

2015 CIO Agenda: An Africa Perspective

2015 CIO Agenda: An Africa Perspective G00272423 2015 CIO Agenda: An Africa Perspective Published: 30 January 2015 Analyst(s): Mbula Schoen, Wm. L. Hahn Gartner's 2015 CIO survey results clearly show that digital technologies are creating a

More information

Agenda Overview for Multichannel Marketing, 2013

Agenda Overview for Multichannel Marketing, 2013 G00245870 Agenda Overview for Multichannel Marketing, 2013 Published: 3 January 2013 Analyst(s): Jennifer S. Beck, Adam Sarner Consumers are in the driver's seat, with high expectations for multichannel

More information

What's a Digital Marketing Platform? What Isn't?

What's a Digital Marketing Platform? What Isn't? G00252512 What's a Digital Marketing Platform? What Isn't? Published: 26 June 2013 Analyst(s): Jake Sorofman, Andrew Frank, Bill Gassman, Adam Sarner, Mike McGuire The rise of digital marketing has amplified

More information

How to Reduce Network Equipment Maintenance Costs

How to Reduce Network Equipment Maintenance Costs G00264020 How to Reduce Network Equipment Maintenance Costs Published: 13 May 2014 Analyst(s): Andrew Lerner, Mark Fabbi Each year, maintenance costs swallow 15% to 25% of total enterprise IT budgets,

More information

Highlights of the 2015 CEO Survey: Business Leaders Are Betting on Tech

Highlights of the 2015 CEO Survey: Business Leaders Are Betting on Tech G00274032 Highlights of the 2015 CEO Survey: Business Leaders Are Betting on Tech Published: 10 April 2015 Analyst(s): Mark Raskino Gartner's annual survey reveals CEOs' heightened interest in tech-related

More information

Public/Private/Hybrid Cloud choosing horses for courses. NetEvents APAC Cloud Summit

Public/Private/Hybrid Cloud choosing horses for courses. NetEvents APAC Cloud Summit Public/Private/Hybrid Cloud choosing horses for courses NetEvents APAC Cloud Summit David Coyle Managing Vice President Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

Agenda Overview for Social Marketing, 2015

Agenda Overview for Social Marketing, 2015 G00270737 Agenda Overview for Social Marketing, 2015 Published: 19 December 2014 Analyst(s): Julie Hopkins Social marketing programs are maturing; executives increasingly expect ROI to follow social marketing

More information

Data Center Consolidation Projects: Benefits and Pitfalls

Data Center Consolidation Projects: Benefits and Pitfalls Research Publication Date: 2 May 2011 ID Number: G00212148 Data Center Consolidation Projects: Benefits and Pitfalls David J. Cappuccio This research outlines the primary success factors in consolidation

More information

Use a TCO Model to Estimate the Costs of Your Data Center

Use a TCO Model to Estimate the Costs of Your Data Center G00233221 Use a TCO Model to Estimate the Costs of Your Data Center Published: 26 June 2012 Analyst(s): David J. Cappuccio The cost to own and run a data center is significantly higher than many IT managers

More information

Prepare for the Inevitable With an Effective Security Incident Response Plan

Prepare for the Inevitable With an Effective Security Incident Response Plan G00236455 Prepare for the Inevitable With an Effective Security Incident Response Plan Published: 19 July 2012 Analyst(s): Rob McMillan A serious security incident is a question of "when," not "if," for

More information

Agenda Overview for Mobile Marketing, 2013

Agenda Overview for Mobile Marketing, 2013 G00245888 Agenda Overview for Mobile Marketing, 2013 Published: 9 January 2013 Analyst(s): Mike McGuire Mobile computing will revolutionize digital marketing by exploiting rich information about where

More information

Future of Money: Digital Payment Advisors Will Transform the Payment Landscape

Future of Money: Digital Payment Advisors Will Transform the Payment Landscape G00248422 Future of Money: Digital Payment Advisors Will Transform the Payment Landscape Published: 11 April 2013 Analyst(s): Alistair Newton DPAs are applications on a customer's mobile device that recommend

More information

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented

More information

The Edge Manifesto: Digital Business, Rich Media, Latency Sensitivity and the Use of Distributed Data Centers

The Edge Manifesto: Digital Business, Rich Media, Latency Sensitivity and the Use of Distributed Data Centers G00290109 The Edge Manifesto: Digital Business, Rich Media, Latency Sensitivity and the Use of Distributed Data Centers Published: 31 July 2015 Analyst(s): Bob Gill The edge manifesto calls for the placement

More information

Why CEOs Want A Digital Strategy This Year

Why CEOs Want A Digital Strategy This Year G00247313 CEO and Senior Executive Survey 2013: Why CEOs Will Want a Digital Strategy This Year Published: 25 March 2013 Analyst(s): Ken McGee Gartner's CEO and senior business executive survey indicates

More information

This research note is restricted to the personal use of christine_tolman@byu.edu

This research note is restricted to the personal use of christine_tolman@byu.edu Burton IT1 Research G00234483 Identity Management Published: 9 July 2012 Analyst(s): Ian Glazer, Bob Blakley Identity management (IdM) has become a distinct aggregation of functions for the maintenance

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Cloud IaaS: Service-Level Agreements

Cloud IaaS: Service-Level Agreements G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

Solution Path: Threats and Vulnerabilities

Solution Path: Threats and Vulnerabilities Solution Path: Threats and Vulnerabilities Published: 24 January 2012 Burton IT1 Research G00226331 Analyst(s): Dan Blum This solution path helps Gartner clients develop a strategy and program for managing

More information

How to Develop an Effective Vulnerability Management Process

How to Develop an Effective Vulnerability Management Process Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes

More information

Gartner's View on 'Bring Your Own' in Client Computing

Gartner's View on 'Bring Your Own' in Client Computing G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

Agenda for Supply Chain Strategy and Enablers, 2012

Agenda for Supply Chain Strategy and Enablers, 2012 G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures

More information

IT Cost Savings With Information Governance

IT Cost Savings With Information Governance G00232238 IT Cost Savings With Information Governance Published: 17 April 2012 Analyst(s): Debra Logan By systematically eliminating redundant information, Cisco has retired multiple legacy systems, eliminated

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

Digital Marketing Budgets Increase, Reflecting Focus on Customer Experience

Digital Marketing Budgets Increase, Reflecting Focus on Customer Experience G00255396 Digital Marketing Budgets Increase, Reflecting Focus on Customer Experience Published: 9 January 2014 Analyst(s): Laura McLellan Gartner's Digital Marketing Spending Survey shows that digital

More information

Agenda Overview for Mobile Marketing, 2015

Agenda Overview for Mobile Marketing, 2015 G00270723 Agenda Overview for Mobile Marketing, 2015 Published: 18 December 2014 Analyst(s): Mike McGuire Mobile technologies enable digital marketers to engage customers at every stage of the purchase

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

What to Consider When Designing Next-Generation Data Centers

What to Consider When Designing Next-Generation Data Centers Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,

More information

Agenda Overview for Customer Experience, 2015

Agenda Overview for Customer Experience, 2015 G00270544 Agenda Overview for Customer Experience, 2015 Published: 22 December 2014 Analyst(s): Jake Sorofman Customer experience has emerged as a top priority for marketers. This overview summarizes how

More information

Establishing a Strategy for Database Security Is No Longer Optional

Establishing a Strategy for Database Security Is No Longer Optional Establishing a Strategy for Database Security Is No Longer Optional Published: 29 November 2011 G00226793 Analyst(s): Jeffrey Wheatman The options for securing increasingly valuable databases are very

More information

The Six Triggers for Using Data Center Infrastructure Management Tools

The Six Triggers for Using Data Center Infrastructure Management Tools G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using

More information

Key Issues for Consumer Goods Manufacturers, 2011

Key Issues for Consumer Goods Manufacturers, 2011 Industry Research Publication Date: 1 March 2011 ID Number: G00210698 Key Issues for Consumer Goods Manufacturers, 2011 Don Scheibenreif, Dale Hagemeyer Gartner's 2011 consumer goods manufacturing research

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

The Next Generation of Functionality for Marketing Resource Management

The Next Generation of Functionality for Marketing Resource Management G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

IT Architecture Is Not Enterprise Architecture

IT Architecture Is Not Enterprise Architecture Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use

More information

Singapore Empowers Land Transport Planners With Data Warehouse

Singapore Empowers Land Transport Planners With Data Warehouse G00219502 Singapore Empowers Land Transport Planners With Data Warehouse Published: 18 October 2011 Analyst(s): Eric Thoo The Land Transport Authority (LTA) of Singapore wanted to improve planning and

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud G00214958 Use Heterogeneous Storage Virtualization as a Bridge to the Cloud Published: 12 August 2011 Analyst(s): Gene Ruth Data center operators who are interested in private cloud storage technologies

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

How To Use Data To Drive Digital Marketing

How To Use Data To Drive Digital Marketing G00270683 Agenda Overview for Data-Driven Marketing, 2015 Published: 29 December 2014 Analyst(s): Martin Kihn Gartner's 2015 research will help you seize the growth opportunities that data-driven marketing

More information

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

Mobile Marketing Primer for 2016

Mobile Marketing Primer for 2016 Gartner for Marketers Mobile Marketing Primer for 2016 Adam Sarner Research Vice President Mike McGuire Research Vice President Charles S. Golvin Research Director G00293091 Mobile Marketing Primer for

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

Emerging PC Life Cycle Configuration Management Vendors

Emerging PC Life Cycle Configuration Management Vendors Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market

More information

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Industry Research Publication Date: 11 February 2009 ID Number: G00164764 Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Jeff Vining Government CIOs are under increasing

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

Applaud Solutions Technical Support Policies

Applaud Solutions Technical Support Policies Applaud Solutions Technical Support Policies Effective Date: 06-May-2011 Overview Unless otherwise stated, these Technical Support Policies apply to technical support for all Applaud Solutions products.

More information

YarcData's urika Shows Big Data Is More Than Hadoop and Data Warehouses

YarcData's urika Shows Big Data Is More Than Hadoop and Data Warehouses G00232737 YarcData's urika Shows Big Data Is More Than Hadoop and Data Warehouses Published: 11 September 2012 Analyst(s): Carl Claunch The hype about big data is mostly on Hadoop or data warehouses, but

More information

Cloud Trends 2015 and beyond

Cloud Trends 2015 and beyond Cloud Trends 2015 and beyond Thierry Kuperman Le Bihan @tkuperman Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form

More information

NAC Strategies for Supporting BYOD Environments

NAC Strategies for Supporting BYOD Environments G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

Beware the Effect of the Operating Lease's Demise on Finance and Real Estate

Beware the Effect of the Operating Lease's Demise on Finance and Real Estate G00249343 Beware the Effect of the Operating Lease's Demise on Finance and Real Estate Published: 30 August 2013 Analyst(s): Rob Schafer The recently revised Exposure Draft of the FASB-IASB's lease accounting

More information

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device

More information

Brochure. Update your Windows. HP Technology Services for Microsoft Windows 2003 End of Support (EOS) and Microsoft Migrations

Brochure. Update your Windows. HP Technology Services for Microsoft Windows 2003 End of Support (EOS) and Microsoft Migrations Brochure Update your Windows HP Technology Services for Microsoft End of Support (EOS) and Microsoft Migrations Stabilize and secure your infrastructure Microsoft will end support for Windows Server 2003/R2

More information

Governance Is an Essential Building Block for Enterprise Information Management

Governance Is an Essential Building Block for Enterprise Information Management Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways

More information

Top U.S. Supply Chain Undergraduate University Programs, 2014

Top U.S. Supply Chain Undergraduate University Programs, 2014 G00264026 Top U.S. Supply Chain Undergraduate University Programs, 2014 Published: 5 August 2014 Analyst(s): Dana Stiffler, Ken Chadwick, Karen Carter Forty institutions participated in the third edition

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

Reduce Risk and Increase Speed Using Gartner's Guide for Salesforce.com Implementation Partners

Reduce Risk and Increase Speed Using Gartner's Guide for Salesforce.com Implementation Partners G00255286 Reduce Risk and Increase Speed Using Gartner's Guide for Salesforce.com Implementation Partners Published: 21 August 2013 Analyst(s): Frances Karamouzis, Patrick J. Sullivan The adoption of salesforce.com

More information

HP Security Solutions for Microsoft

HP Security Solutions for Microsoft HP Security Solutions for the Microsoft Environment Achieving a secure adaptive enterprise How secure is your Microsoft environment? Enterprise boundaries are expanding, creating the need for faster, easier

More information

Eight Criteria for Evaluating Software License Metrics

Eight Criteria for Evaluating Software License Metrics G00213489 Eight Criteria for Evaluating Software License Metrics Published: 1 June 2011 Analyst(s): Alexa Bona, Jane B. Disbrow, Peter Wesche Procurement executives and software asset managers are struggling

More information

Simplify Your Windows Server Migration

Simplify Your Windows Server Migration SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest

More information

End of Support Should Not End Your Business. Challenge of Legacy Systems

End of Support Should Not End Your Business. Challenge of Legacy Systems End of Support Should Not End Your Business When software vendors announce a product end-of-life (EOL), customers typically have 24 to 30 months to plan and execute their migration strategies. This period

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK KEY FEATURES LIFECYCLE MANAGEMENT OF VIRTUALIZATION TECHNOLOGIES MADE SIMPLE Automation of lifecycle management reduces costs and errors while improving

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage

Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Research Publication Date: 10 August 2011 ID Number: G00213049 Data Center Redesign Yields an 80%-Plus Reduction in Energy Usage Jay E. Pultz The National Renewable Energy Laboratory's (NREL's) data center

More information

Market Guide for Data-Centric Audit and Protection

Market Guide for Data-Centric Audit and Protection G00263059 Market Guide for Data-Centric Audit and Protection Published: 21 November 2014 Analyst(s): Brian Lowans, Earl Perkins Organizations that have not developed data-centric security policies to coordinate

More information

White paper Reaping Business Value from a Hybrid Cloud Strategy

White paper Reaping Business Value from a Hybrid Cloud Strategy White paper Fujitsu Hybrid Cloud Services White paper Reaping Business Value from a Hybrid Cloud Strategy How to embrace a hybrid cloud model to maximize the benefits of public and private cloud services

More information

How to Choose Providers for Mobile Consumer Application Platforms

How to Choose Providers for Mobile Consumer Application Platforms How to Choose Providers for Mobile Consumer Application Platforms Michael McGuire Lead Author Michael McGuire,, Mike McGuire guides digital marketers on best practices for developing strategies. He specializes

More information

CUSTOMER GUIDE. Support Services

CUSTOMER GUIDE. Support Services CUSTOMER GUIDE Support Services Table of Contents Nexenta Support Overview... 4 Support Contract Levels... 4 Support terminology... 5 Support Services Provided... 6 Technical Account Manager (TAM)... 6

More information

How To Create A Help Desk For A System Center System Manager

How To Create A Help Desk For A System Center System Manager System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and

More information