The Top 10 Risk and Security Audit Findings to Avoid

Size: px
Start display at page:

Download "The Top 10 Risk and Security Audit Findings to Avoid"

Transcription

1 Research Publication Date: 2 October 2007 ID Number: G The Top 10 Risk and Security Audit Findings to Avoid Paul E. Proctor Risk and security audits can waste time and valuable enterprise resources, especially if findings are inappropriate. This best-practices document can help chief information security officers (CISOs) and other key enterprise risk decision makers work proactively to avoid wasted effort while addressing audits and audit findings. Key Findings A risk and security audit frequently represents a time-consuming distraction for the enterprise as a whole and for the IT organization in particular, without offering real-world risk-control advantages. CISOs and other risk professionals should prepare to negotiate with auditors, to ensure that audits and audit findings address areas of genuine concern and value to the enterprise. A collaborative relationship with your auditor is by far the most effective approach to addressing the organization's needs. Addressing common auditor areas of concern proactively can reduce the level of effort required to handle audit findings. Recommendations Proactively develop and implement risk- and security-related controls, instead of waiting for auditors to identify problem areas. Develop, in advance of negotiations with auditors, reasonable and appropriate controls for reasonably anticipated risks. Ensure that all the risk organization s controls and other practices are sound and defensible, so that you can resist unreasonable findings or mandates by auditors. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

2 TABLE OF CONTENTS Analysis Audit Findings: A Clear and Present Danger Understand the Auditing Landscape to Become a Better Negotiator A Proactive Approach to Governance, Risk and Compliance Types of Auditors Prescriptive (Traditional) Collaborative Types of Findings The Top Top-10 Risk and Security Audit Findings to Watch For Audit Finding No. 1: Data Classification Audit Finding No. 2: Change Management Audit Finding No. 3: Administrator Controls and Shared Accounts Audit Finding No. 4: Identity and Access Management Audit Finding No. 5: User Activity Tracking and Log Analysis Audit Finding No. 6: SOD in ERP Systems Audit Finding No. 7: Physical Access Audit Finding No. 8: Business Continuity Management and Disaster Recovery Audit Finding No. 9: Sourcing Controls and Partner Agreements Audit Finding No. 10: Education and Awareness... 9 Publication Date: 2 October 2007/ID Number: G Page 2 of 10

3 ANALYSIS 1.0 Audit Findings: A Clear and Present Danger A risk and security audit is theoretically designed to help CISOs and other security and risk professionals avoid practices and activities that present unacceptable levels of residual risk for the enterprise. In practice, however, audit findings are too often a clear and present danger to effective enterprise governance and the business s bottom line. A risk and security audit can be a time-consuming distraction for the enterprise as whole and for the IT organization in particular, and yet not offer real-world value in terms of addressing reasonably anticipated risk. Audit findings are intended to be valuable "checks and balances" that prevent enterprises from engaging in activities that present unacceptable ("inconsiderate") levels of residual risk. Too often, however, they represent a time-consuming distraction without real-world value in addressing reasonably anticipated risk. One of the key elements in ensuring that audits are effective in reducing risk is to understanding the "auditing landscape": recognizing the different types of auditors, the different types of findings and, particularly, the types of finding that can waste the IT organization's time or the enterprise's resources and should therefore be preempted or avoided through a proactive approach. 1.1 Understand the Auditing Landscape to Become a Better Negotiator Because there are no definitive standards for compliance with regulations and auditing guidelines, auditing is fundamentally a process of negotiation. To pass audits and make the audit process genuinely valuable to the enterprise, CISOs and other key decision makers need to understand the different types of auditors, the different types of audit findings and the most serious audit-related problems. Auditors have different levels of aggressiveness, backgrounds and approaches to arriving at findings. For this reason, the audited enterprise's relationship with the auditor is critical. This view is supported by Gartner research that shows enterprises moving away from the traditional adversarial approach with auditors to one that is fundamentally cooperative and collaborative. Some audit findings are fair; others are not. Some are reasonable; others are not. Some can be argued against successfully, and some are best left uncontested. Types of findings that are not useful typically fail to address a defined control objective, "prove a negative" and are therefore not actionable, or identify a need without prescribing the controls necessary to address it. Understanding the different types of audit findings will enable enterprise security or risk professionals to negotiate where it is appropriate, and to do so successfully. Findings that prove to be appropriate vary widely, according to the specific requirements and risk profiles of the enterprise. Many enterprise stakeholders, including the legal department, will need to be consulted when making decisions that address these findings. 1.2 A Proactive Approach to Governance, Risk and Compliance It is always a mistake to wait for audit findings to improve the enterprise's security situation. Enterprises and internal organizations must take a proactive approach to audit findings by creating a process-oriented program that delivers effective governance, risk management and compliance (GRC) activities. Governance comprises decision-making authority and accountability. This encourages desirable individual and enterprise behaviors, typically enabled by a framework for example, Control Objectives for Information and Related Technology (CobiT), IT Infrastructure Library (ITIL) and Publication Date: 2 October 2007/ID Number: G Page 3 of 10

4 International Standards Organization (ISO) The specific framework used is less important than having a process in place that provides prescriptive guidance with control objectives. Many Gartner clients have effectively implemented hybrids, made of multiple published frameworks and "homegrown" requirements. Risk management is a formal process for identifying and measuring reasonably anticipated risks, so that the enterprise can be protected against risks that are truly relevant. This issue becomes critical in many negotiations and disputes concerning audit findings. Compliance is the process of building a defensible case that the enterprise or an organization in the enterprise has taken the right steps, at the right time, given the circumstances. Too many enterprises focus on reactively addressing findings, rather than on understanding and addressing appropriate risks with appropriate controls. 1.3 Types of Auditors Auditors fall into two broad but recognizable categories Prescriptive (Traditional) Auditors have traditionally tended to take a prescriptive approach telling the enterprise or organization what problems they have identified and how they expect them to be addressed (sometimes even specifying the technologies to be used in addressing them). In the most extreme and least helpful cases, auditors have no real connection to the businesses they audit and no real interest in engaging in dialogue. Prescriptive auditors can, however, have good working relationships with the audited entities and effective segregation of duties, and still address the shared goal of reducing risk to acceptable levels Collaborative Gartner has identified a strong trend toward the use of auditors who are willing to work with enterprises and their personnel, and with whom it is possible to develop an effective working relationship. This is unquestionably the best approach, because it leads to more-effective communication and better risk control throughout the enterprise. 1.4 Types of Findings Audit findings also vary widely, in terms of their reasonableness, their effectiveness, and their bottom-line business impact. Findings that are valuable typically identify needs without being excessively prescriptive about the controls necessary to address those needs. They also can typically be implemented in a series of phases aligned with the enterprise's strategic and tactical requirements. Such findings can usually be addressed effectively through negotiation and collaboration with the auditors. Examples of unreasonable findings include the following: Findings that do not address the control objective for example, a finding that requires firewall monitoring (a security monitoring control primarily concerned with confidentiality) to address Bill 198, which is a requirement by the Canadian province of Ontario to address controls for the integrity of financial reporting. Findings that prove a negative for example, a finding that requires a control to prove that no unauthorized changes have been made to a production system (highly problematic, because it's difficult to prove that something did not happen). Publication Date: 2 October 2007/ID Number: G Page 4 of 10

5 Findings that prescriptively require an inappropriate control for example, a finding that requires encryption on a back-end system with few users, taking resources away from controls needed to protect more-important front-end systems with greater business impact and risk. Findings of this type should be negotiated aggressively. Gartner's risk and security analysts have identified 10 common risk and security audit findings that most enterprises, and most organizations in those enterprises, should avoid, if possible. We also offer best practices for each the minimum remediation required for all enterprises, Gartner's recommendations, and sets of advanced measures that may be taken to meet enterprise-specific requirements. 2.0 The Top Top-10 Risk and Security Audit Findings to Watch For 2.1 Audit Finding No. 1: Data Classification Typical Finding: The auditor is unable to produce an inventory of assets and associated classifications. What It Means: The enterprise doesn't know what it has, so the organization doesn't know how to protect it. How to Avoid the Problem: Classification is almost always a problem for enterprises, because traditional classification mechanisms and controls have failed, wasting critical resources. It is reasonable for an auditor to recognize that an enterprise has no idea where its sensitive data is held or how it is protected, but it not reasonable to expect an enterprisewide classification and labeling scheme which experience shows will almost certainly fail to be implemented. Minimum Remediation Required: Create an ad hoc list of critical systems and publish a reasonable classification policy. Gartner's Recommendation: Conduct an inventory and classification project. (Manual classification will always be dangerously incomplete, so automation of this process is strongly recommended.) Advanced Measures: Implement formal asset management, creating automated mechanisms to identify sensitive data and use mandatory controls and content-aware mechanisms to prevent data leakage. 2.2 Audit Finding No. 2: Change Management Typical Finding: The auditor cannot find evidence of change management on material systems. What It Means: No one in the enterprise is tasked with controlling mission-critical changes, so it is impossible to know what problems might result from changes. How to Avoid the Problem: It is widely recognized that unauthorized changes by privileged users represent a far greater risk than external threats, such as malicious-code attacks. For this reason, auditors are focusing more intensely on change management to reduce risk, particularly in response to the requirements of the U.S. Sarbanes-Oxley Act. However, audit findings of this type are usually not useful or actionable for IT and other risk-related organizations, which have little or no control over the enterprise's change management practices. Publication Date: 2 October 2007/ID Number: G Page 5 of 10

6 Minimum Remediation Required: Maintain separate development, testing and production environments, and implement a change request process. Gartner's Recommendation: Implement enterprisewide change management processes and best practices. Advanced Measures: Implement a full change management database (CMDB) with configuration auditing and automated change recognition. 2.3 Audit Finding No. 3: Administrator Controls and Shared Accounts Typical Finding: Too many administrator ("root") accounts are not tied to specific individuals. What It Means: Accounts are not tied to particular identities, so access controls and monitoring tools are ineffective. How to Avoid the Problem: Administrator accounts have privileges to access any data and execute any application or transaction, typically with little or no tracking or control. These accounts which in some enterprises number in the hundreds are frequently not tied to specific individuals, so the accounts can be used to do virtually anything, with little or no possibility of detection. Moreover, an enterprise may have hundreds of administrators, each of whom has uncontrolled access to all systems. This proliferation of account privileges is, understandably, an issue of considerable concern for auditors. Minimum Remediation Required: Avoid the sharing of accounts of any type by users, and tie each identity and each privileged account to a specific individual. Gartner's Recommendation: Reduce the number of privileged accounts by limit privileges to those that administrators specifically need. Advanced Measures: Auditors may require tracking all administrator activity which is manageable if the number of administrators is reduced. However, IT organizations will want to push back on this requirement to address only critical, in-scope systems. 2.4 Audit Finding No. 4: Identity and Access Management Typical Finding: The auditor cannot determine each user's privileges, or determine that each user has appropriate, and appropriately approved, privileges. What It Means: The enterprise does not know who has access to what systems or data, or whether that access is appropriate or approved. How to Avoid the Problem: The need for effective monitoring and enforcement of the identity and access management (IAM) process which can be defined as controlling who has access to what is a longstanding concern for enterprises, especially those in highly regulated industries. These include financial service providers governed by regulations from the U.S. Office of the Comptroller of the Currency, the U.S. Securities and Exchange Commission (SEC), the Securities Industries Association, the U.S. Gramm-Leach-Bliley (GLB) Act and the Basel II Accords. The recent focus on IAM audit and compliance has been driven primarily by Sarbanes- Oxley separation-of-duties requirements and the U.S. Health Insurance Portability and Accountability Act (HIPAA). A sound IAM process addresses problems such as excessively long wait times for new-user privileges, authorizations that are not removed when people change roles and accounts that remain open when people leave the enterprise all legitimate concerns for auditors. Minimum Remediation Required: Develop and implement processes for creating (provisioning) and removing (deprovisioning) users. Publication Date: 2 October 2007/ID Number: G Page 6 of 10

7 Gartner's Recommendation: Automate the user provisioning/deprovisioning and identity auditing processes. Advanced Measures: Implement role management, privilege attestation or enterprise segregation of duties (SOD) detection and remediation. 2.5 Audit Finding No. 5: User Activity Tracking and Log Analysis Typical Finding: No evidence of activity log collection and analysis can be produced. What It Means: The enterprise is unable to track user activity and produce a record of which employees have accessed which systems or data, or when. How to Avoid the Problem: The need to track user behavior not just user access rights and privileges has become a "hot button" issue for auditors. Activity tracking and analysis has tremendous value as a deterrent to inappropriate behavior and as a form of remediation. However, massive investment in a comprehensive enterprise-monitoring infrastructure is unnecessary. Enterprises and IT and other affected organizations should focus their activity tracking and analysis efforts on implementing controls that address areas of real risk. Minimum Remediation Required: Manually review logs for mission-critical systems. Gartner's Recommendation: Implement basic automation for centralization and report generation. Advanced Measures: Implement a full security information and event management (SIEM) application (likely most appropriate for enterprises with large numbers of critical data sources and complex correlation and analysis requirements). Be wary, however, of SIEM implementations that require the storage of enormous amounts of data that will never be accessed, because this is an expensive and essentially worthless exercise. 2.6 Audit Finding No. 6: SOD in ERP Systems Typical Finding: The enterprise is unable to control SOD issues in ERP systems that affect the integrity of financial reporting. What It Means: The integrity of financial reporting could be compromised by the use of conflicting permissions. How to Avoid the Problem: SOD conflicts and the controls necessary to prevent them will remain an issue of serious concern for auditors for the near future. SOD violations sometimes indicate deliberate fraud, and always represent an unnecessary vulnerability that can lead to undesirable financial activity. Minimum Remediation Required: Manually review all ERP users' permissions to identify conflicts. Gartner's Recommendation: Automate the detection and remediation processes, and "instrument" the provisioning workflow to prevent future conflicts. Advanced Measures: Monitor ERP transactions continuously for risky use of conflicting permissions. 2.7 Audit Finding No. 7: Physical Access Typical Finding: Physical access to the enterprise data center is uncontrolled. Publication Date: 2 October 2007/ID Number: G Page 7 of 10

8 What It Means: The enterprise's critical systems, applications and information assets are at risk of damage, misuse or alteration by persons gaining unauthorized access to facilities. How to Avoid the Problem: Physical access control for systems and assets containing sensitive data is an issue of legitimate concern for auditors and for business managers and must be addressed appropriately. The measures taken will vary, but, because there are common elements, our recommendation in this area is identical to the minimum required. Gartner's Recommendation (Minimum Remediation Required): Develop and implement access policies and minimal controls (for example, door locks and sign-in sheets) to enforce those policies and deny developers access to sensitive areas. Advanced Measures: Implement appropriate security technologies, such as proximity cards, complex multifactor authentication, access control tracking integrated with log-in records or video surveillance. When considering technologies, recognize that not all enterprises and types of sensitive data require the highest levels of control. These should be residual-risk decisions driven by business issues, not auditors' concerns. 2.8 Audit Finding No. 8: Business Continuity Management and Disaster Recovery Typical Finding: The auditor cannot locate current, environmentally relevant business continuity plans or evidence of internal controls requiring the periodic updating and review of such plans. What It Means: The enterprise's critical systems and business processes could be crippled by a natural disaster or other emergency. How to Avoid the Problem: A series of high-profile events including the terrorist attacks of Sept. 11 and the devastation of Hurricane Katrina in the U.S. have refocused attention on business continuity and disaster recovery. Every enterprise should have a minimal plan in place to protect business operations in the event of reasonably anticipated threats (for example, floods, for facilities located on flood plains; earthquakes, in seismic-activity zones; and fires, for virtually all enterprises). The enterprise's requirements in these areas should be determined by business managers, working with the IT organization and other affected internal organizations. However, if they fail to do this, auditors are likely to step in. CISOs and other risk professionals should be prepared to resist unreasonable auditor demands in this area, working with line-of-business managers and other key decision makers to define appropriate risks. Minimum Remediation Required: Write and distribute a minimal business continuity and disaster recovery plan. Gartner's Recommendation: Write a formal plan using established best practices, then test that plan annually. Advanced Measures: Maintain a "hot site," with automated failover and failback capabilities, and conduct annual full failover testing. 2.9 Audit Finding No. 9: Sourcing Controls and Partner Agreements Typical Finding: The enterprise's agreements with business partners and third-party service providers do not specifically address data protection requirements. What It Means: Sensitive data may fall into the hands of unauthorized parties due to inadequate partner/service provider security measures. Publication Date: 2 October 2007/ID Number: G Page 8 of 10

9 How to Avoid the Problem: In the normal course of doing business, enterprises increasingly share sensitive data with partners and other external parties, such as service providers. Controls should be in place for the transfer of the data and its protection while in the control of the external party. These issues increasingly affect bottom-line business results, particularly when enterprises find they cannot trust their partners' data practices, or their partners find they cannot trust theirs. This is especially important in completely outsourced IT environments. These environments require that the enterprise understand the service-level agreements (SLAs) in their contracts with service providers and monitor those SLAs carefully. Minimum Remediation Required: Review the risk and security requirements of all agreements and contracts with business partners and third-party service providers. Gartner's Recommendation: Require all external parties to present evidence of security controls, conducting annual reviews of those controls, and add risk and security requirements to all contracts and other agreements with external parties. Advanced Measures: Require Statement on Auditing Standards (SAS) 70 Type 2 audits, or equivalent external review and attestation, of all controls Audit Finding No. 10: Education and Awareness Typical Finding: The auditors cannot find formal evidence that employees know and understand their data protection responsibilities. What It Means: The security of enterprise systems and information assets are placed at risk by well-intentioned, but uninformed employees. How to Avoid the Problem: Risk is frequently brought on by individual behaviors that are easily controlled, and risk can often be mitigated simply by telling people not to engage in certain activities. For this reason, education and awareness programs typically offer the greatest return on investment of any security measure the enterprise can implement. Minimum Remediation Required: Create and distribute a security practices manual for all employees and other stakeholders (for example, partners and independent contractors). Gartner's Recommendation: Formalize your training program with specific, target instruction and professionally produced instruction materials. Advanced Measures: Require computer-based training, tracking and reporting on completion, and set specific (metric) compliance goals. Acronym Key and Glossary Terms CISO CMDB CobiT ERP GLB GRC HIPAA IAM chief information security officer configuration management database Control Objectives for Information and Related Technology enterprise resource planning Gramm-Leach-Bliley Act (U.S.) governance, risk management and compliance Health Insurance and Portability Act (U.S.) identity and access management Publication Date: 2 October 2007/ID Number: G Page 9 of 10

10 ISO SAS SIEM SLA SOD International Standards Organization Statement on Auditing Standards security incident and event monitoring service-level agreement segregation of duties REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 2 October 2007/ID Number: G Page 10 of 10

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are

More information

Understanding Vulnerability Management Life Cycle Functions

Understanding Vulnerability Management Life Cycle Functions Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

Use This Eight-Step Process for Identity and Access Management Audit and Compliance

Use This Eight-Step Process for Identity and Access Management Audit and Compliance Research Publication Date: 28 March 2005 ID Number: G00126592 Use This Eight-Step Process for Identity and Access Management Audit and Compliance Roberta J. Witty, Ant Allan, Jay Heiser Authentication,

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

Cloud IaaS: Service-Level Agreements

Cloud IaaS: Service-Level Agreements G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of

More information

IT Operational Considerations for Cloud Computing

IT Operational Considerations for Cloud Computing Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.

More information

Overcoming the Gap Between Business Intelligence and Decision Support

Overcoming the Gap Between Business Intelligence and Decision Support Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

Establishing a Strategy for Database Security Is No Longer Optional

Establishing a Strategy for Database Security Is No Longer Optional Establishing a Strategy for Database Security Is No Longer Optional Published: 29 November 2011 G00226793 Analyst(s): Jeffrey Wheatman The options for securing increasingly valuable databases are very

More information

Security and Identity Management Auditing Converge

Security and Identity Management Auditing Converge Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

Consider Identity and Access Management as a Process, Not a Technology

Consider Identity and Access Management as a Process, Not a Technology Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

Cloud IaaS: Security Considerations

Cloud IaaS: Security Considerations G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

Governance Is an Essential Building Block for Enterprise Information Management

Governance Is an Essential Building Block for Enterprise Information Management Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

Successful EA Change Management Requires Five Key Elements

Successful EA Change Management Requires Five Key Elements Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the

More information

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions. Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

Assessing the Security Risks of Cloud Computing

Assessing the Security Risks of Cloud Computing Research Publication Date: 3 June 2008 ID Number: G00157782 Assessing the Security Risks of Cloud Computing Jay Heiser, Mark Nicolett Organizations considering cloud-based services must understand the

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration

Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Research Publication Date: 24 March 2008 ID Number: G00156216 Microsoft and Google Jostle Over Cloud-Based E-Mail and Collaboration Tom Austin Both Google and Microsoft come up short in terms of delivering

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

Solution Path: Threats and Vulnerabilities

Solution Path: Threats and Vulnerabilities Solution Path: Threats and Vulnerabilities Published: 24 January 2012 Burton IT1 Research G00226331 Analyst(s): Dan Blum This solution path helps Gartner clients develop a strategy and program for managing

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Industry Research Publication Date: 11 February 2009 ID Number: G00164764 Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Jeff Vining Government CIOs are under increasing

More information

The Next Generation of Functionality for Marketing Resource Management

The Next Generation of Functionality for Marketing Resource Management G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management

More information

Research. Mastering Master Data Management

Research. Mastering Master Data Management Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has

More information

How to Develop an Effective Vulnerability Management Process

How to Develop an Effective Vulnerability Management Process Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes

More information

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives

More information

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Research Publication Date: 31 July 2009 ID Number: G00168488 Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Carsten Casper, Thomas Otter, Arabella Hallawell The vast majority (probably greater

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey.

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey. Research Publication Date: 5 December 2008 ID Number: G00160425 Gartner Introduces the EIM Maturity Model David Newman, Debra Logan Organizations cannot implement enterprise information management (EIM)

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

Real-Time Decisions Need Corporate Performance Management

Real-Time Decisions Need Corporate Performance Management Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes. Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

Five Business Drivers of Identity and Access Management

Five Business Drivers of Identity and Access Management Research Publication Date: 31 October 2003 ID Number: SPA-21-3673 Five Business Drivers of Identity and Access Management Roberta J. Witty The primary reasons to implement IAM solutions are business facilitation,

More information

Gartner Clarifies the Definition of the Term 'Enterprise Architecture'

Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,

More information

The Six Triggers for Using Data Center Infrastructure Management Tools

The Six Triggers for Using Data Center Infrastructure Management Tools G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

Discovering the Value of Unified Communications

Discovering the Value of Unified Communications Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions

More information

Risk Intelligence: Applying KM to Information Risk Management

Risk Intelligence: Applying KM to Information Risk Management Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance

More information

What Is the Role of Quality Assurance in a SaaS Environment?

What Is the Role of Quality Assurance in a SaaS Environment? Research Publication Date: 15 September 2009 ID Number: G00170552 What Is the Role of Quality Assurance in a SaaS Environment? Thomas E. Murphy, Daniel Sholler, Christian Hestermann Software as a service

More information

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management

XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Research Publication Date: 23 April 2008 ID Number: G00156910 XBRL Will Enhance Corporate Disclosure and Corporate Performance Management Nigel Rayner, Neil Chandler Extensible Business Reporting Language

More information

IT Architecture Is Not Enterprise Architecture

IT Architecture Is Not Enterprise Architecture Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use

More information

Document the IT Service Portfolio Before Creating the IT Service Catalog

Document the IT Service Portfolio Before Creating the IT Service Catalog Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service

More information

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New

More information

Document Management: Assessing Costs and Benefits

Document Management: Assessing Costs and Benefits Research Publication Date: 27 September 2000 ID Number: SPA-11-9200 Document Management: Assessing Costs and Benefits Debra Logan Investment in DM will typically pay for itself within two or three years.

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

EHR Advantages and Disadvantages

EHR Advantages and Disadvantages Industry Research Publication Date: 3 February 2010 ID Number: G00174011 The Limits of Certification and Guarantees in Buying Electronic Health Records in the U.S. Wes Rishel It is important not to rely

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures

More information

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references

More information

Use These Guidelines for Making Better CRM Consulting Provider Selections

Use These Guidelines for Making Better CRM Consulting Provider Selections Research Publication Date: 7 July 2006 ID Number: G00141062 Use These Guidelines for Making Better CRM Consulting Provider Selections Matthew Goldman, Ed Thompson, Lorrie Scardino Gartner sees many inconsistencies

More information

MarketScope for IT Governance, Risk and Compliance Management, 2008

MarketScope for IT Governance, Risk and Compliance Management, 2008 Research Publication Date: 11 February 2008 ID Number: G00154941 MarketScope for IT Governance, Risk and Compliance Management, 2008 Paul E. Proctor, Mark Nicolett, French Caldwell The IT GRCM market was

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

X.509 Certificate Management: Avoiding Downtime and Brand Damage

X.509 Certificate Management: Avoiding Downtime and Brand Damage G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity

More information

Research. Identity and Access Management Defined

Research. Identity and Access Management Defined Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from

More information

GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS. Executive Summary

GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS. Executive Summary GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS Executive Summary Gartner EXP is an exclusive, membership-based organization of more than 3,000 CIOs and senior IT leaders worldwide. Members benefits from the

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

Enterprise Asset Management Migration Requires Detailed Planning

Enterprise Asset Management Migration Requires Detailed Planning Research Publication Date: 2 September 2005 ID Number: G00130205 Enterprise Asset Management Migration Requires Detailed Planning Kristian Steenstrup Neglecting to address key areas when migrating to packaged

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Cloud, SaaS, Hosting and Other Off-Premises Computing Models Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,

More information

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical

More information

Gartner's View on 'Bring Your Own' in Client Computing

Gartner's View on 'Bring Your Own' in Client Computing G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting

More information

Q&A: The Impact of XBRL on Corporate Performance Management

Q&A: The Impact of XBRL on Corporate Performance Management Research Publication Date: 27 May 2008 ID Number: G00158184 Q&A: The Impact of XBRL on Corporate Performance Management Nigel Rayner Extensible Business Reporting Language is an XML-based standard that

More information

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable

More information

Prepare for the Inevitable With an Effective Security Incident Response Plan

Prepare for the Inevitable With an Effective Security Incident Response Plan G00236455 Prepare for the Inevitable With an Effective Security Incident Response Plan Published: 19 July 2012 Analyst(s): Rob McMillan A serious security incident is a question of "when," not "if," for

More information

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented

More information

What to Consider When Designing Next-Generation Data Centers

What to Consider When Designing Next-Generation Data Centers Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,

More information

Roundup of Business Intelligence and Information Management Research, 1Q08

Roundup of Business Intelligence and Information Management Research, 1Q08 Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our

More information

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers

More information