Best Practices for Confirming Software Inventories in Software Asset Management
|
|
|
- Buddy Edwards
- 10 years ago
- Views:
Transcription
1 Research Publication Date: 24 August 2009 ID Number: G Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the best practices that software asset managers should apply to maintain accurate and current inventories. This enables organizations to reduce audit risk and gain control over deployed software for more-sustainable asset management. Key Findings Often, software vendors and their customers' inventories differ because neither organization adequately prioritizes IT asset management. It is easier to confirm new purchases on a regular basis than to research purchasing records that are five to 10 years old. The cost of implementing an asset management program to confirm software inventories is usually significantly less than the out-of-compliance and additional license fees due to an inaccurate inventory and vague usage rights in licensing agreements. The best time to verify an organization's inventory is before the due date for annual software maintenance and support, or license fee renewals. Recommendations Software asset managers should: Verify the organization's inventory on an ongoing basis to ensure accuracy and reduce software license compliance issues. Establish process guidelines for maintaining inventory records so that software is consistently recorded in an IT asset management system. Verify that new purchases are reflected in the software vendor's inventory on a regular basis, but at least once a year. Include a clause in new or renewed license agreements that requires the software vendor to supply updated software product names and license conversion information, as well as an annual inventory of all licensed products. Ensure that the vendor's and the client's terms for usage, descriptions and product numbers are consistent Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity" on its website,
2 ANALYSIS Organizations expect software audits to determine whether they are in compliance or out of compliance. Unfortunately, for most clients, many software vendor audits find organizations out of compliance due to poor asset management. Organizations that have not emphasized asset management, and have not verified their inventory with the software vendor for several years, are at the greatest risk of audit exposure. It is, therefore, more important than ever for organizations to proactively verify inventory procurement records with their software vendors. Based on an analysis of client activity during the past 24 months, Gartner believes that every client can expect at least one audit during the next 12 months. At Gartner's Infrastructure and Resource Management Summit in June 2008, we asked the attendees if they had undergone a vendor software audit in the past year. About 38% of the audience had or were undergoing an audit. These figures, previous Gartner research and client inquiries indicate that audit activity is increasing (see "Gartner Predicts Increase in Vendor Software Audits"). Audit activity appears to be increasing during the economic downturn as software vendors audit customers to generate revenue to make up for the drop in the number of licenses they are selling. This exposes organizations to increased audit risk. In fact, the latest polls in Gartner webinars from March 2009 reflect the situation for more than 200 participating organizations and reveal that more than 60% of clients have faced an audit from one of their major vendors. Software asset managers should follow the best practices in this research to mitigate this risk by confirming their software inventories. Verify Asset Records Regularly When organizations do not regularly verify and update their inventory procurement records with their software vendors, they can find it difficult to produce the required documentation later on. Buyers have coded software license purchases as education and training expenses to get them through their systems. When the client organization's and the vendor's inventory records differ, the vendor requires the client to produce documentation that verifies that it has properly licensed the software it is using. It can be time-consuming and difficult to verify information dating back years. Software asset managers can simplify the verification process, if they follow these best practices: Never assume that the software vendor's inventory is accurate. Vendors have the same problems tracking license sales and product name changes that a company has in tracking license purchases. Set up procedures to ensure that an asset management organization verifies all software purchases. Record the assets in the organization's asset management system, and verify the assets that the organization procured with the software vendor at least once a year. Require the software vendor or reseller to list all the assets the client owns annually to help validate the organization's records. Publication Date: 24 August 2009/ID Number: G Page 2 of 7
3 Centralize Procurement When procurement or inventory processes are not centralized, and different groups in a company purchase software licenses, the organization's asset records are likely to be inaccurate, unless the company has put a strong software asset management program in place. Organization names may vary from purchase to purchase. For example, one purchase agreement may reflect a company's full name, while another document may reflect a subsidiary or alternative business name. Some organizations have several different inventory and asset management systems, with "standards" of how to document inventory varying from system to system. For example: One asset management system may say "Software A purchased on 20 January 2009, four copies." Another asset management system may reflect a slightly different name, current version of the software and a packaged price, rather than individual component pricing. Software asset managers can make it easier to compare discrepant records with the software vendor's inventory, if they follow these best practices: Consolidate the inventory weekly or monthly across multiple asset management systems, if the organization plans to continue distributed procurement. Establish standards to maintain a central master asset management system wherever possible. Verify the Inventory Directly Through the Value-Added Resellers When value-added resellers (VARs) handle purchases, they may not always accurately report all the license purchases to the software vendor. The VAR sells incorrect license models to the customer, which leads to discrepant inventories. The vendor's systems no longer list legacy products, even though the client organization continues to pay maintenance fees. The client tries to verify the inventory with the software vendor, but this may result in additional license fees. The customer never specified to the VAR what data it wanted the VAR to capture on invoices. As a result, the client obtains incomplete data. VARs may not capture OEM license purchases (unless the OEM is also the VAR). Software asset managers can confirm the inventory through a VAR, if they follow these best practices: Verify the purchased inventory directly with the software vendor. Publication Date: 24 August 2009/ID Number: G Page 3 of 7
4 Ask the VAR to verify the organization's inventory after every purchase, if possible. Determine a Complete Inventory During a Merger, Acquisition or Divestiture When a client organization or a vendor undergoes a merger, acquisition or divestiture, the companies involved often do not combine multiple inventories during or after the deal closes. Multiple discrepancies can occur that are more difficult to reconcile years later. For example, if both companies hold licenses from an ERP vendor, such as SAP, then the definitions of limited professional users may differ. When the audit occurs, the vendor will only accept one definition for determining potential true-ups. Here, it is required to reconcile user definitions during the merger, thereby avoiding ambiguities about the entitlements and proper use of that limited professional user category. There may be missing copies of the original software license agreements. If the software vendor has been acquired, then the acquiring company will generally rename, rebundle or perhaps incorporate the software into its standard portfolio of products. When software vendors undergo multiple mergers and acquisitions, it is often difficult to track the history of name changes, rebundling and functionality. When customers undergo multiple mergers and acquisitions, it can become difficult to track the history of software entitlements. Software asset managers can determine a complete inventory of software that they should transfer from one company to another, if they follow these best practices: Obtain copies of all original contracts and documentation. File a complete inventory after reconciliation with the software vendor. Check the contract for any required transfer processes. Track the history of product names. Verify the inventory on a monthly or quarterly basis. Understand that it may not be a good idea to transfer software. If the client organization only requires a few additional licenses, and the software vendor makes it difficult to remove partial licenses from support, then it may be better to purchase additional licenses than transfer significant "shelfware." Improve Tools to Refine Software Licensing Tracking When organizations do not maintain pace with new technologies, such as service-oriented architecture (SOA) and virtualization, they often have poor inventory tracking. They need the right tools to improve inventory and asset tracking, but face several challenges to select and implement appropriate tools. Publication Date: 24 August 2009/ID Number: G Page 4 of 7
5 Most organizations lack visibility into asset records and make decisions based on inaccurate information. The tools used lack end-to-end software inventory visibility, compared with comprehensive software asset management tools that are available in the market. Companies use several inventory tools, so the data is scattered in many places. Software licensing and technologies change so rapidly that companies have difficulty selecting vendors that will innovate fast enough to easily discover and adapt to developments in licensing models, such as dual-core and multicore licenses, and technology, such as logical partitions, containers and virtualization on Unix. Software asset managers can address areas of deficiencies if they follow these best practices: Centralize IT asset procurement and the view of inventory data to understand where the devices are and who is using them. This data does not necessarily have to expand to monitors, printers, networking devices or handhelds; however, most organizations find value in knowing about all the assets associated with a user or a specific project. Deploy dedicated personnel and use multiple IT asset management tools to track and maintain accurate inventories. Select an IT asset management tool vendor that has shown it can innovate fast enough to easily discover changes to licensing models. View inventory tools as disposable solutions until vendors begin innovating and adding new capabilities that address specific problems. Update the local software library as the company installs new software by regularly revising process design. Do not disclose improvements in the organization's tools to the vendor. Rather, use this improved functionality internally to discover discrepancies in the vendor's inventory statements. Include Critical Rights in Software Licensing Agreements When the organization asks the software vendor to verify that the customer and the vendor are reflecting the same inventory of purchases, the software vendor might decide to conduct a de facto audit. If software licensing agreement negotiators have not included critical rights in the agreement or defined usage rights, then the organization risks higher noncompliance invoices and audit costs. Common problems may include: Inventory count discrepancies are uncovered that require the company to pay for additional licenses. The vendor requires additional negotiations on functionality that the client is using versus properly licensed functionality. Software asset managers can benefit from initial contract or renewal negotiations if they follow these best practices and include the following in the software license agreement: Include a clause that requires the vendor to provide inventory verification in writing at least once a year. Publication Date: 24 August 2009/ID Number: G Page 5 of 7
6 Have the right to withhold payment until the vendor provides the client organization with written verification if the client requested verification at least 60 days before the maintenance and support fees are due. Add a statement that the licensor is responsible when shipping unlicensed software, such as, "Licensor shall not ship any software to licensee that licensee is not authorized to use." Identify what constitutes verification of inventory purchase orders for example, a signed order form and canceled checks. Include language that requires the software vendor to annually provide documentation of name or rebundling changes for the organization's software licenses. Include a requirement to maintain copies of the following software vendor documentation: Original documentation on functionality, which can give the client additional negotiating advantage when trying to update to newer software versions that the vendor has renamed or rebundled Other documentation, such as RFP responses or PowerPoint presentations, which discuss functionality RECOMMENDED READING "Gartner Predicts Increase in Vendor Software Audits" "Q&A on Dealing with a Software Audit" "Responding to an Internal Software Audit" "Negotiators Must Remind Users of Software Compliance Issues" "Gartner 2007 Survey Shows Continued Software Audits" Publication Date: 24 August 2009/ID Number: G Page 6 of 7
7 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 24 August 2009/ID Number: G Page 7 of 7
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
IT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
Key Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
Eight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
Q&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
The Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
Cloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
Deliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009
Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly
When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
X.509 Certificate Management: Avoiding Downtime and Brand Damage
G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity
2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase
Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
Risk Intelligence: Applying KM to Information Risk Management
Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance
IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
The Six Triggers for Using Data Center Infrastructure Management Tools
G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using
Consider Identity and Access Management as a Process, Not a Technology
Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
IT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
The Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
The What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand
Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable
Gartner Clarifies the Definition of the Term 'Enterprise Architecture'
Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,
Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons
Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented
Agenda for Supply Chain Strategy and Enablers, 2012
G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling
Toolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
Understanding Vulnerability Management Life Cycle Functions
Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability
ERP, SCM and CRM: Suites Define the Packaged Application Market
Research Publication Date: 25 July 2008 ID Number: G00158827 ERP, SCM and CRM: Suites Define the Packaged Application Market Yvonne Genovese, Jeff Woods, James Holincheck, Nigel Rayner, Michael Maoz Users
The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives
Eight Criteria for Evaluating Software License Metrics
G00213489 Eight Criteria for Evaluating Software License Metrics Published: 1 June 2011 Analyst(s): Alexa Bona, Jane B. Disbrow, Peter Wesche Procurement executives and software asset managers are struggling
Gartner's View on 'Bring Your Own' in Client Computing
G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting
How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
Governance Is an Essential Building Block for Enterprise Information Management
Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways
Roundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
Overcoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success
Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical
Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing
Research Publication Date: 19 July 2011 ID Number: G00214537 Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Benoit J. Lheureux Paper manufacturer Mohawk Fine Papers needed
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
Document the IT Service Portfolio Before Creating the IT Service Catalog
Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service
Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game
Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost
G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures
Real-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
The IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
The Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
Recognize the Importance of Digital Marketing
Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated
What to Consider When Designing Next-Generation Data Centers
Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,
Singapore Empowers Land Transport Planners With Data Warehouse
G00219502 Singapore Empowers Land Transport Planners With Data Warehouse Published: 18 October 2011 Analyst(s): Eric Thoo The Land Transport Authority (LTA) of Singapore wanted to improve planning and
Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset
G00217757 Case Study: Lexmark Uses MDM to Turn Information Into a Business Asset Published: 22 December 2011 Analyst(s): Bill O'Kane Lexmark International undertook a master data management (MDM) program
Critical Privacy Questions to Ask an HCM/CRM SaaS Provider
Research Publication Date: 31 July 2009 ID Number: G00168488 Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Carsten Casper, Thomas Otter, Arabella Hallawell The vast majority (probably greater
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
How BPM Can Enhance the Eight Building Blocks of CRM
Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's
Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey.
Research Publication Date: 5 December 2008 ID Number: G00160425 Gartner Introduces the EIM Maturity Model David Newman, Debra Logan Organizations cannot implement enterprise information management (EIM)
Repurposing Old PCs as Thin Clients as a Way to Save Money
Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers
Gartner Defines Enterprise Information Architecture
Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit
Mainframe Modernization: When Migration Is the Answer
Research Publication Date: 8 January 2010 ID Number: G00171622 Mainframe Modernization: When Migration Is the Answer Dale Vecchio Mainframe migrations can be executed in a number of ways. Which choice
