In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

Size: px
Start display at page:

Download "In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand"

Transcription

1 Research Publication Date: 18 August 2011 ID Number: G In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable with e-signature capabilities delivered by software as a service (SaaS), and these services are alluring to IT and line-ofbusiness owners who foresee rapid implementation and ease of use, particularly for single lines of business. We expose this trend and increased demands for mobile platforms for signing, highlight SaaS functional capabilities, put to bed the legal issue of using these services, identify the vendors, and provide a framework for deciding to use SaaS or on-premises e-signature software. Key Findings Gartner's client buying patterns show a clear trend toward the use of SaaS based e- signature services instead of on-premises software. On-premises offerings still have their place for organizations that need to support multiple business processes and have complex workflow and integration requirements. On-premises solutions are also favored by organizations that do not want a third party involved with sensitive document signing. Customer mobility requirements are pushing SaaS vendors to deliver new features for phones and tablets to maintain a compelling case for SaaS e-signature adoption. Recommendations Take inventory of potential e-signature needs across systems and business processes, and size transaction volumes across business units to help plan for and reduce e- signature service costs through appropriate volume purchases. Create a software abstraction layer when interfacing on-premises systems with SaaS e- signature services to minimize changes needed to applications when changing vendors. Consider smaller vendors, particularly for ad hoc, simple contract or agreement signing to save costs Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity" on its website,

2 STRATEGIC PLANNING ASSUMPTION SaaS-based offerings will be used for 80% of all new North American e-signature purchases by 2013, compared with 15% in ANALYSIS During 2011, Gartner has seen increased and sustained client interest from multiple industries on the topic of e-signature. We have noted the following trends: More than 80% of the inquiries have been from North American clients. The cross-industry client interest is due in large part to the horizontal need that organizations have for signing contracts and other types of agreements. There is increasing need for mobile endpoint device support. SaaS is now the preferred delivery model. In 2009 and 2010, Gartner noticed increasing use of SaaS relative to on-premises software solutions; however, SaaS adoption remained in the minority during those years. This has changed in 2011, with SaaS adoption being the delivery model of choice for most customers. The main drivers for adopting e-signature are the same as they were when we published "North American and European Electronic Signature Suite and Service Market." Customers are looking for e-signature offerings that are secure, provide auditable evidence that appropriate processes have been followed, can be easily used by individuals for ad hoc signing and can be integrated with automated business processes. The goals are to enable more-rapid business process execution and to reduce costs. We attribute increased client interest in e-signature, particularly the interest in using SaaS based e-signature services, to commensurate increases in online business and organizational comfort with e-signature adoption. The Legal Issue, One More Time A significant minority of clients still express some concern about whether e-signing is legal or whether it will be legally acceptable to use e-signatures for their business processes. Gartner does not provide legal advice. However, we have seen enough court case summaries and have talked with enough organizations that have adopted e-signature-based processes and that have had these processes tested in court to reconfirm that e-signatures are legal and accepted in North American courts. The most recent and direct evidence can be found in the Arkansas Supreme Court's decision in Barwick v. Government Employee Insurance Co., Inc. Case No (AR S.Ct., Mar. 31, 2011). We reiterate the importance of following good process when delivering e-signed transactions. See the process diagram and descriptions in "North American and European Electronic Signature Suite and Service Market." Enterprises considering SaaS e-signature services should understand vendors' functional offerings and pricing models. Potential customers should also structure deals and architect systems to mitigate the risk of vendor lock-in. Base Functions of E-Signature Services E-signature services are used by multiple customers and hosted on common infrastructures and software (SaaS model), or they are offered as dedicated hosted instances for individual customers. These services provide all or most of the functionality of a Web-based on-premises software suite. Established on-premises solutions will generally have the ability to orchestrate Publication Date: 18 August 2011/ID Number: G Page 2 of 6

3 more complex process workflows, and will have integration code for more endpoint signing devices, such as signature pads and integration with enterprise systems such as enterprise resource planning (ERP) or customer relationship management (CRM) systems. There are two primary use cases supported by e-signature services user-initiated and system-initiated and there are variants of the two: User-initiated Users upload a document for signature via a Web browser interface or through a desktop application menu or print driver. The document may be templated locally or may be recognized by the service as being a document that matches a template the user previously stored in the service library. The sender identifies signatories. System-initiated Enterprise applications or other SaaS applications call the service and send documents for signing via a Web service. Signatory lists are predefined or included as part of the delivery stream to the service. Integration with other SaaS applications such as salesforce.com has become increasingly requested. In both use cases, the service notifies the signatories, usually via that contains a link back to the service. Signatories may be further authenticated, have a chance to review and, in some cases, mark up the document using a mouse or stylus, and then sign the document. "Click-tosign" is the most common type of electronic signature used with SaaS offerings. Although vendors may offer voice signature and biometric handwritten signatures that use a stylus or some other pointing method. The service may convert the document to a common format, usually a PDF if not already in that format. The service provider may simply apply a cryptographic hash to the file or digitally sign the file using the SaaS vendor's X.509 credential as an integrity mechanism. Contextual information, such as date, time, IP address of the signing device, and its geolocation may be stored within the document or noted in an audit record. This contextual information and authentication and the integrity properties are usable for evidence if needed. The documents and an associated audit summary may be stored at the service provider, sent back to the calling application for storage or both, depending on customer requirements. Most customers obtain and retain the documents and have those documents purged from the e-signature service providers services, while the service retains a hash of the document and the audit data. Clients should request that providers digitally sign final form PDFs with a key linked to a publicly rooted certificate recognized and "trusted" by current and recent versions of Acrobat Reader particularly if this function is offered at no extra charge. This prevents the document's viewer from getting error messages pertaining to the signature or certificate not being recognized or trusted. This should not be a major issue due to the other evidence collected by the service, but having the signature show up as valid and trusted means one less thing to explain in court should documents be viewed there. E-signature vendors offer different forms of authentication to the service, with password authentication being the most common, but the vendor may also partner with third-party identity proofing or authentication services to support customers who have higher assurance needs. Most customers do not feel they need these additional controls. More SaaS providers include the ability for signatories to print a document, sign it manually and fax it back to the service. There is usually a bar code or some other code to link the faxed record with the document in the system. Publication Date: 18 August 2011/ID Number: G Page 3 of 6

4 Mobility More Gartner clients have inquired about e-signature providers' abilities to enable signing on smartphones and tablets. The requirements are for customers, and, more frequently, for employees who work with their customers on-site, such as insurance agents and sales representatives. Smartphones are often poor candidates for document review and signing due to small screen size; however, they may be sufficient for simple and short documents. The phone may be used for countersigning by parties already familiar with document content who simply want to execute an agreement. All SaaS e-signature vendors can support Web-browser-based click-to-sign on mobile platforms. We have seen some interest in using stylus or finger-based handwritten signature on tablets, and vendors are just beginning to support that capability. Disconnected signing that is, the ability to sign locally on a tablet without being online with the service and subsequently connecting and uploading to the service is nascent, but availability should grow within the next two years. This requirement is important for those who travel regularly and must work with signatories in places that have poor connectivity. Which Are the Vendors and What Are the Major Market Changes Since 2010? The following vendors have SaaS offerings: Adobe, AlphaTrust, AssureSign, DocuSign, RightSignature, Sertifi and Silanis (see "North American and European Electronic Signature Suite and Service Market" for more information about these vendors). DocuSign has been in the business of delivering document signature as SaaS the longest and has the largest market share. Adobe purchased EchoSign in July 2011, when EchoSign was second in market share. The rest of these vendors follow DocuSign and Adobe with relatively low market share. RightSignature is the newest vendor on the market, and its entry is more evidence of the rise in interest for SaaS-based offerings. We do not yet have customer reference data points for this vendor. Silanis has been providing on-premises electronic signature software and implementation services for more than a decade. In the past 18 months, it has offered a dedicated hosted version of its software, a SaaS product that is based on the IBM LotusLive platform, and a stand-alone SaaS offering. Signix offers a hosted service that is dedicated and can be customized for each client. Unlike the other services, Signix completely uses digital signatures for its signing processes. Signix manages the key pairs used for signing so that customers don't have to deal with issues of key management on endpoint devices. All vendors have the fundamental processes for uploading, routing, and signing documents well in hand. There is little differentiation for basic workflows. Vendors add features often, and differentiation is usually established through integration with other SaaS platforms (e.g., salesforce.com, workflow support for industry specific-processes such as loans, or real estate transactions), and there is near-term differentiation in supporting disparate mobile endpoints. Although this will likely cease to be a differentiating feature set within two years. Enterprises may pay a price premium for using market leaders' services, and may be paying for unneeded features. Organizations with simple, ad hoc signature requirements who can tolerate vendor viability risks will likely find less expensive offerings from the vendors with lower market share. Changing providers for user initiated ad hoc processes is relatively easy and comes with little risk. Publication Date: 18 August 2011/ID Number: G Page 4 of 6

5 Organizations that integrate their on-premises systems with SaaS e-signature offerings should create a software abstraction layer between their systems and calls to the vendors' application programming interface (API) or Web service. This layer would allow enterprise systems to call "transmit document," "add recipient" or "receive signed document" functions, and the layer would broker these calls to the incumbent vendors' API to invoke the vendor's services. Changing to a different e-signature vendor would require code changes to the vendor API side of the abstraction layer, but this should be able to be minimized on the calling applications side. Changes to applications should be limited to different features of the new vendor's system relative to the old vendor's system. This will also limit changes needed to applications should the enterprise decide to adopt an on-premises solution. Pricing. Pricing for SaaS e-signature services is most commonly based on the transaction. A document or set of documents sent to the service and routed for signature constitutes a transaction. Price reductions come with higher usage. Subscription "per user/per month" models are also used. Adobe (EchoSign) favors this model. Enterprises should be armed with known or best estimates of transaction volumes needed to support business processes when negotiating with vendors using transaction pricing models. Factors to consider when evaluating SaaS versus on-premises solutions. SaaS e-signature services are not for every enterprise. Enterprises with the following requirements should strongly consider on-premises solutions: Internal development staff is established with experience in taking on new integration platforms, and the enterprise has a build-over-buy preference. There are multiple signature-based processes across multiple lines of business, and the calling application platforms and storage management architectures are heterogeneous. Integration with specialized signing devices, such as signature pads, is needed. Signature workflows are complex, with multiple signatures required with a mixture of parallel and serial signing workflows. Transaction volumes are high or unknown, but believed to be high. Enterprises are signing sensitive documents and do not want a third party involved. With the exception of the last point, enterprises may still find the use of SaaS e-signature services compelling if the needed feature sets are available from a SaaS provider, and an appropriate deal can be structured to keep costs below that for an on-premises software deal. RECOMMENDED READING Some documents may not be available as part of your current Gartner subscription. "North American and European Electronic Signature Suite and Service Market" "North American Life and P&C Insurance E-Signature Trends and Vendor Selection" "Hype Cycle for Identity and Access Management Technologies, 2011" Evidence Market research and Gartner client interactions. Publication Date: 18 August 2011/ID Number: G Page 5 of 6

6 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 18 August 2011/ID Number: G Page 6 of 6

The Electronic Signature Market Is Poised to Take Off

The Electronic Signature Market Is Poised to Take Off G00234939 The Electronic Signature Market Is Poised to Take Off Published: 21 May 2012 Analyst(s): Gregg Kreizman Growth in the e-signature market is becoming viral, and there are significant benefits

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

Emerging PC Life Cycle Configuration Management Vendors

Emerging PC Life Cycle Configuration Management Vendors Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

IT Architecture Is Not Enterprise Architecture

IT Architecture Is Not Enterprise Architecture Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

Gartner's View on 'Bring Your Own' in Client Computing

Gartner's View on 'Bring Your Own' in Client Computing G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Cloud E-Mail Decision-Making Criteria for Educational Organizations

Cloud E-Mail Decision-Making Criteria for Educational Organizations Research Publication Date: 10 June 2011 ID Number: G00213675 Cloud E-Mail Decision-Making Criteria for Educational Organizations Matthew W. Cain Educational organizations sometimes struggle to choose between

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Choosing a Replacement for Incumbent One-Time Password Tokens

Choosing a Replacement for Incumbent One-Time Password Tokens Research Publication Date: 21 April 2011 ID Number: G00212244 Choosing a Replacement for Incumbent One-Time Password Tokens Ant Allan This research outlines the options for enterprises seeking replacements

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

IT Operational Considerations for Cloud Computing

IT Operational Considerations for Cloud Computing Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

X.509 Certificate Management: Avoiding Downtime and Brand Damage

X.509 Certificate Management: Avoiding Downtime and Brand Damage G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

Cloud IaaS: Service-Level Agreements

Cloud IaaS: Service-Level Agreements G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of

More information

Overcoming the Gap Between Business Intelligence and Decision Support

Overcoming the Gap Between Business Intelligence and Decision Support Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision

More information

The Six Triggers for Using Data Center Infrastructure Management Tools

The Six Triggers for Using Data Center Infrastructure Management Tools G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

Agenda for Supply Chain Strategy and Enablers, 2012

Agenda for Supply Chain Strategy and Enablers, 2012 G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing

Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Research Publication Date: 19 July 2011 ID Number: G00214537 Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Benoit J. Lheureux Paper manufacturer Mohawk Fine Papers needed

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

Recognize the Importance of Digital Marketing

Recognize the Importance of Digital Marketing Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Cloud, SaaS, Hosting and Other Off-Premises Computing Models Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New

More information

Research. Mastering Master Data Management

Research. Mastering Master Data Management Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has

More information

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

Key Issues for Consumer Goods Manufacturers, 2011

Key Issues for Consumer Goods Manufacturers, 2011 Industry Research Publication Date: 1 March 2011 ID Number: G00210698 Key Issues for Consumer Goods Manufacturers, 2011 Don Scheibenreif, Dale Hagemeyer Gartner's 2011 consumer goods manufacturing research

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

The Next Generation of Functionality for Marketing Resource Management

The Next Generation of Functionality for Marketing Resource Management G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management

More information

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Research Publication Date: 12 February 2008 ID Number: G00154811 Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control Steve Blood Companies spend too much on IP-PBXs

More information

Governance Is an Essential Building Block for Enterprise Information Management

Governance Is an Essential Building Block for Enterprise Information Management Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways

More information

How to Choose Providers for Mobile Consumer Application Platforms

How to Choose Providers for Mobile Consumer Application Platforms How to Choose Providers for Mobile Consumer Application Platforms Michael McGuire Lead Author Michael McGuire,, Mike McGuire guides digital marketers on best practices for developing strategies. He specializes

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

How To Create A Cloud Computing System

How To Create A Cloud Computing System G00230221 Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

Salesforce.com's Chatter: Facebook-Like Feel for CRM Applications

Salesforce.com's Chatter: Facebook-Like Feel for CRM Applications Research Publication Date: 24 February 2011 ID Number: G00210748 Salesforce.com's Chatter: Facebook-Like Feel for CRM Applications Robert P. Desisto, Michael Maoz Salesforce.com attempts to use principles

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

EHR Advantages and Disadvantages

EHR Advantages and Disadvantages Industry Research Publication Date: 3 February 2010 ID Number: G00174011 The Limits of Certification and Guarantees in Buying Electronic Health Records in the U.S. Wes Rishel It is important not to rely

More information

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Research Publication Date: 19 August 2010 ID Number: G00205618 Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy Johan Jacobs Customers are insisting on multiple methods to

More information

Establishing a Strategy for Database Security Is No Longer Optional

Establishing a Strategy for Database Security Is No Longer Optional Establishing a Strategy for Database Security Is No Longer Optional Published: 29 November 2011 G00226793 Analyst(s): Jeffrey Wheatman The options for securing increasingly valuable databases are very

More information

Understanding Vulnerability Management Life Cycle Functions

Understanding Vulnerability Management Life Cycle Functions Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability

More information

Real-Time Decisions Need Corporate Performance Management

Real-Time Decisions Need Corporate Performance Management Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends

More information

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical

More information

Use These Guidelines for Making Better CRM Consulting Provider Selections

Use These Guidelines for Making Better CRM Consulting Provider Selections Research Publication Date: 7 July 2006 ID Number: G00141062 Use These Guidelines for Making Better CRM Consulting Provider Selections Matthew Goldman, Ed Thompson, Lorrie Scardino Gartner sees many inconsistencies

More information

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.

Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary. Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important

More information

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s

More information

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.

Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes. Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for

More information

Data Center Consolidation Projects: Benefits and Pitfalls

Data Center Consolidation Projects: Benefits and Pitfalls Research Publication Date: 2 May 2011 ID Number: G00212148 Data Center Consolidation Projects: Benefits and Pitfalls David J. Cappuccio This research outlines the primary success factors in consolidation

More information

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions. Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information

More information

Containers and Modules: Is This the Future of the Data Center?

Containers and Modules: Is This the Future of the Data Center? Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet

More information

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers

More information

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud G00214958 Use Heterogeneous Storage Virtualization as a Bridge to the Cloud Published: 12 August 2011 Analyst(s): Gene Ruth Data center operators who are interested in private cloud storage technologies

More information

Discovering the Value of Unified Communications

Discovering the Value of Unified Communications Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions

More information

Cloud IaaS: Security Considerations

Cloud IaaS: Security Considerations G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the

More information

Case Study: Social Initiative Dramatically Improves a Company's Customer Support and Profitability

Case Study: Social Initiative Dramatically Improves a Company's Customer Support and Profitability G00227813 Case Study: Social Initiative Dramatically Improves a Company's Customer Support and Profitability Published: 31 January 2012 Analyst(s): Michael Maoz By focusing on building a social support

More information

Tips for Evaluators: Better Business Intelligence RFPs

Tips for Evaluators: Better Business Intelligence RFPs Research Publication Date: 11 May 2009 ID Number: G00167840 Tips for Evaluators: Better Business Intelligence RFPs James Richardson Many of the business intelligence (BI) RFP data-collection exercises

More information

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are

More information

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Industry Research Publication Date: 31 December 2007 ID Number: G00154138 Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools Bill Rust The Miami-Dade County Public Schools a school

More information

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons

Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented

More information

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve Research Publication Date: 6 December 2007 ID Number: G00152575 Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve John Enck, Philip Dawson, George J. Weiss, Rakesh Kumar,

More information

What Is the Role of Quality Assurance in a SaaS Environment?

What Is the Role of Quality Assurance in a SaaS Environment? Research Publication Date: 15 September 2009 ID Number: G00170552 What Is the Role of Quality Assurance in a SaaS Environment? Thomas E. Murphy, Daniel Sholler, Christian Hestermann Software as a service

More information

Enterprise Asset Management Migration Requires Detailed Planning

Enterprise Asset Management Migration Requires Detailed Planning Research Publication Date: 2 September 2005 ID Number: G00130205 Enterprise Asset Management Migration Requires Detailed Planning Kristian Steenstrup Neglecting to address key areas when migrating to packaged

More information

Gartner Defines Enterprise Information Architecture

Gartner Defines Enterprise Information Architecture Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit

More information

Document the IT Service Portfolio Before Creating the IT Service Catalog

Document the IT Service Portfolio Before Creating the IT Service Catalog Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service

More information

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey.

Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey. Research Publication Date: 5 December 2008 ID Number: G00160425 Gartner Introduces the EIM Maturity Model David Newman, Debra Logan Organizations cannot implement enterprise information management (EIM)

More information

Consider Identity and Access Management as a Process, Not a Technology

Consider Identity and Access Management as a Process, Not a Technology Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research

More information

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial

More information

Gartner Updates Its Definition of IT Infrastructure Utility

Gartner Updates Its Definition of IT Infrastructure Utility Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement. Research Publication Date: 29 April 2008 ID Number: G00154802 Key Metrics for IT Service and Support David M. Coyle, Kris Brittain To evaluate IT service and support performance, senior management must

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

The Seven Building Blocks of MDM: A Framework for Success

The Seven Building Blocks of MDM: A Framework for Success Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)

More information