Market Trends in 2002 and 2003
|
|
- Roger Ball
- 8 years ago
- Views:
Transcription
1 Markets, J. Pescatore, R. Wagner Research Note 8 January 2003 Extranet Access Management 2H02 Magic Quadrant Inside-the-firewall (intraenterprise) integration to reduce costs dominated the extranet access management market in Enterprises and vendors will focus on Active Directory in Core Topic Security and Privacy: Security Tools, Technologies and Tactics Key Issues Which product approaches and practices will help enterprises achieve higher levels of data integrity? How will network-based applications become safe for mission-critical businesses during the next five years? Strategic Planning Assumption Through 2H04, 70 percent of extranet access management deployments will be tied to reducing operational costs, which will place a premium on pre-integrated solutions, short payback periods and lower per-seat costs (0.7 probability). Market Trends in 2002 and 2003 Uncertain economic conditions and a vastly reduced number of extranet and e-business rollouts dominated the extranet access management market in Most extranet access management activity was related to IS organizations attempting to reduce their operational costs of managing user access to externally exposed applications (primarily business-to-business) and Intranet-based applications and portals. This focus has changed product demands to more integration with Active Directory and employee-oriented applications, such as PeopleSoft and Siebel Systems, and has increased demand for provisioning integration and channel strategies. Funding for extranet access management deployment comes from flat IT budgets, and pricing pressure has been intense. There was much noise, but less action, on the standards front in The Liberty Alliance released its Liberty 1.0 specification, which extended the Security Assertions Markup Language (SAML). The Organization for the Advancement of Structured Information Systems (OASIS) approved the SAML specification. Major extranet access management vendors, and several other product vendors, announced SAML support in their products. Microsoft publicly stated that it would support several forms of identity tokens, including SAML and "Kerberos," in the Web Services Security (WS-Security) extensions to the Simple Object Access Protocol that Microsoft and IBM had developed and turned over to OASIS as a royalty-free standard. The Liberty Alliance announced that it would support WS-Security in Liberty 2.0. However, Microsoft has not detailed plans for direct support of SAML in Windows authentication and access control mechanisms, such as Passport. Gartner Entire contents 2003 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 Gartner research (see "Banks Largely Disinterested in Passport and Liberty") shows that financial services companies, which are the most-likely early adopters of federated identity services such as Liberty and Passport, had no near-term ( ) plans to adopt either service. Gartner believes that the initial wave of Liberty/Passport deployment will be in the 1H04 time frame and will be driven by business-to-business services. This forecast, combined with increased market attention on reducing the cost of managing internally focused applications, places Active Directory-centric solutions in a strong position for the future because enterprise identities are tightly bound to Windows PC and network logins. Unless economic conditions make a strong turnaround and invigorated e-business rollouts are driven more by business units than IS organizations, Gartner expects that the focus on Active Directory will dominate the market through Most enterprise demand for extranet access management involved internal applications as IS organizations attempted to support a wide range of applications that were developed during the past several years. In 2002, most extranet access management product advancements involved integration with provisioning capabilities to provide workflow functions for automating user management actions across applications. Integration can lead to fewer administrators required to support a given user population across large numbers of applications, but it often is yet another per-user fee that sometimes exceeds the cost of the user access management product. Consolidation among provisioning, extranet access management and platform vendors will drive the per-seat costs down as long as the flat economy continues in These factors caused some changes in vendor positioning in Gartner's extranet access management 2H02 Magic Quadrant (see Figure 1). 8 January
3 Figure 1 Extranet Access Management 2H02 Magic Quadrant Challengers Leaders IBM Ability to Execute Novell Netegrity Oblix RSA Security Entrust Secure Computing Wipro Entegrity Baltimore Technologies OpenNetwork Technologies As of January 2003 Niche Players Visionaries Source: Gartner Research Completeness of Vision Leaders Netegrity abandoned its attempt to move beyond being a pureplay extranet access management vendor and announced that it would no longer offer the DataChannel portal product. Netegrity's large installed base, wide channel support and strong customer service capabilities provided advantages as IT spending slumped. However, the DataChannel acquisition forced Netegrity to compete with a wide array of portal and application server vendors, in addition to competing with other extranet access management providers. In late 2002, Netegrity announced a Web services transaction management product, TransactionMinder, as well as a core identity management product that will compete with Oblix CoreID. However, Netegrity's long-delayed migration to the provisioning space has yet to bear fruit. IBM has continued to execute its strategy of embedding Tivoli Access Manager (formerly Policy Director) into IBM's dominant products, such as WebSphere and MQSeries. WebSphere's strong position in the application server and portal market gives Tivoli Access Manager a strong advantage in the enterprise space. IBM's acquisition of Access360 (see "IBM Buys Access360 to Improve Tivoli Identity Manager") enables it to accelerate the deployment of integrated provisioning capabilities 8 January
4 via Tivoli Identity Manager across its product line. IBM's major weakness is a limited set of integration partners. Oblix made considerable progress in market strength and the completeness of its extranet access management offering in Oblix has been the primary beneficiary of the channel conflicts that Gartner forecast that Netegrity would experience after its acquisition of DataChannel (see "Netegrity/DataChannel Deal Fuses Access Management, Portals"). Oblix gained strong integration and business alliances with BMC, Plumtree and other vendors. Oblix's NetPoint product has been deployed successfully by large enterprises, with high marks by its customers for performance and after-sales support. Challengers Novell made limited progress in advancing its ichain product in It mainly focused on rationalizing the Novell line of security products with a marketing and branding campaign. Novell's ichain 2.2 release should make it a more-competitive offering, but Novell will bring features to market more than a year after most of its competitors. ichain continues to be a cost-effective choice for enterprises that make extensive use of Novell's other products. However, it has limited channel support outside of Novell's existing base. Visionaries RSA Security has completed the stabilization of Securant extranet access management software and the integration of Clear Trust into its product line. Because of its strength in the remote access token space, RSA Security has a strong worldwide channel and support structure. However, that strength has limited RSA Security's effectiveness in signing integration partners in the portal and application server space, where SecurID tokens are not a major factor. Entrust has moved away from enterprise infrastructure-based public-key infrastructure toward applications that integrate strong security (secure messaging and Web services). It has positioned GetAccess as a key product offering. Entrust has less visibility than RSA Security in the extranet access management market, mainly because of limited channel support. However, Entrust can build on a reputation for high-quality software and solid support. OpenNetwork Technologies made some important alliance deals with Microsoft's consulting services and Waveset in the provisioning space in Microsoft will push OpenNetwork's DirectorySmart product to bridge Unix environments with Active Directory deployments. Although this will increase 8 January
5 OpenNetwork's visibility and deal flow, this type of relationship is a two-edged sword, as CyberSafe found out several years ago becoming associated with Windows-only deployments can cause a small vendor to be excluded from consideration by large enterprises. Niche Players Baltimore Technologies and Entegrity dropped in their ability to execute because their financial status, partnering and visibility were reduced. They remain strong technology choices for niche environments. Secure Computing has developed PremierAccess to support its hardware token product. PremierAccess provides base rulesand-roles functionality, uniform resource locator protection and integration hooks. Although this offering does not compete with more-mature products in functionality, the tight integration with Secure Computing's token products makes it a solid choice for Secure Computing token customers. Therefore, we've added Secure Computing to the Magic Quadrant. Wipro gained some enterprise wins and is a viable option, especially for enterprises that use Wipro's integration services. Not on the Map We have removed or omitted these vendors from the Magic Quadrant: Vasco's financial challenges will require it to focus on fewer product offerings. It has shown no evidence that it intends to advance its Vacman product. Microsoft has no product offering in this space, although it announced that its TrustBridge technology should be available when.net Server ships in 1H03. Gartner believes that Microsoft will position TrustBridge as.net Server features that, along with Commerce Server.NET, can be used to build an extranet access management solution for environments that use Active Directory or all-windows servers. However, this will not occur until Computer Associates released a 1.0 product for extranet access management in 4Q02, which is too new to market to be evaluated for the Magic Quadrant. Its etrust Web Access Control product is based on the Security for Open Systems technology that Computer Associates previously acquired from Memco Software. Sun Microsystems' Directory Server Access Management Edition never really became a product. It has been re- 8 January
6 branded as the Sun ONE Identity Server 5.1, but it has experienced limited deployment. Calendra, based in France, offers Directory Manager for developing Lightweight Directory Access Protocol-centric applications. However, it doesn't provide much out-of-the-box functionality for integration with the typical applications that enterprises have developed. Secure Sockets Layer-based remote access vendors, such as Neoteris, SafeWeb, Netilla Networks and others, also offer some form of access control to Web-based applications. However, they don't support the variety of applications, Web servers and management capabilities that are required for effective extranet access management products. PassGo Technologies was re-established as a separate company in a management buyout from Symantec. PassGo acquired all of Symantec's authentication and access management products, including the WebThority extranet access management product. PassGo will need to demonstrate significant investment in advancing WebThority product capabilities and channel support for it to be a viable enterprise choice. Related Research "Extranet Access Management 2H01 Magic Quadrant" "1H01 Extranet Access Management Magic Quadrant" Bottom Line: The extranet access management market has broadened beyond extranets; Gartner will consider this expansion in future research. Enterprises should continue to emphasize ease of integration when investing in extranet access management solutions. 8 January
CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02
IGG-01152003-02 J. Pescatore, R. Wagner Article 15 January 2003 CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 CIOs and many other executives are interested in insights on how
More information2003 Desktop Software Distribution Magic Quadrant
Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic
More informationMagic Quadrant for a Fading PKI Market, 2003
Markets, V. Wheatman, R. Wagner Research Note 17 June 2003 Magic Quadrant for a Fading PKI Market, 2003 Pure-play public-key infrastructure vendors are disappearing due to failure or acquisition, or by
More informationSSL VPN 1H03 Magic Quadrant
Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant The emerging Secure Sockets Layer virtual private network market is standards-based, with good short-term return on investment
More informationAPS/SES combination. Traditional package
Markets, G. Phifer, R. Valdes, D. Gootzit Research Note 26 March 2003 The Horizontal Portal Product 2003 Magic Quadrant The portal product market is undergoing significant segmentation. Gartner presents
More informationMagic Quadrant for Application Platform Suites, 2Q03
Markets, Y. Natis, M. Pezzini, G. Phifer, C. Haight, M. Driver Research Note 5 May 2003 Magic Quadrant for Application Platform Suites, 2Q03 Application platform suites are incrementally assembled or bought
More informationCIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader
IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven
More informationEMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02
Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite
More informationJob Scheduling Magic Quadrant Reflects New Challenges
Markets, M. Govekar Research Note 23 January 2003 Job Scheduling Magic Quadrant Reflects New Challenges In 2003, job scheduling systems should be starting to address new platforms and environments. Some
More informationSAN Management Software Magic Quadrant
Markets, C. DiCenzo, R. Paquet, N. Allen, R. Passmore Research Note 22 April 2003 SAN Management Software Magic Quadrant In the storage area network management software market, expect increased competition
More informationThe Four "A's" of Information Security
Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also
More informationResearch. Identity and Access Management Defined
Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from
More information2003 Enterprise Backup/Restore Magic Quadrant
Markets, C DiCenzo, R Paquet Research Note 9 May 2003 2003 Enterprise Backup/Restore Magic Quadrant The backup/restore software market is maturing, with a limited number of vendors competing for the bulk
More informationMagic Quadrant for Integrated Document Management, 2003
Magic Quadrant for Integrated Document Management, 2003 Document management has moved to the forefront of many enterprises' purchasing lists. Our 2003 Magic Quadrant explains the complexities of the integrated
More informationSSL VPN 1H03 Magic Quadrant Evaluation Criteria
Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and
More informationBusiness Applications and Infrastructure Entwined
Markets, S. Hayward, B. Burton, J. Comport, Y. Genovese, T. Bittman Research Note 9 July 2003 Business and Infrastructure Entwined Oracle's bid for PeopleSoft encompasses more than applications. It illustrates
More informationSun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost
Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Timothy Siu SE Manager, JES Nov/10/2003 sun.com/solutions/
More informationFirst North American Magic Quadrant: CRM Suites for SMBs
Markets, J. Outlaw Research Note 6 February 2002 First North American Magic Quadrant: CRM Suites for SMBs Customer relationship management application suites have become the most-popular form of CRM technology
More informationManagement Update: CRM Suites Magic Quadrant for North American Midsize Businesses
Article 16 April 2003 Management Update: CRM Suites Magic Quadrant for North American Midsize Businesses In the Gartner CRM Suites Magic Quadrant for North American Midsize Businesses, Onyx Software, Pivotal
More informationVendor Classification
Markets, L. Geishecker, F. Buytendijk Research Note 2 October 2002 Introducing the CPM Suites Magic Quadrant Vendors are developing a wide range of new functionality for corporate performance management.
More informationMagic Quadrants for EBIS/Reporting and BI Platforms, 2H03
Markets, H. Dresner, B. Hostmann, F. Buytendijk, A. Tiedrich Research Note 25 August 2003 Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 The business intelligence technology markets continue
More informationPartner Relationship Management: 2003 Magic Quadrant
Markets, R. DeSisto, C. Marcus Research Note 11 February 2003 Partner Relationship Management: 2003 Magic Quadrant In the latest Gartner PRM Magic Quadrant, Siebel remains the sole PRM leader. Allegis,
More informationManagement Alert: Microsoft Will Be a Strong Force in the CRM Market
IGG-02052003-01 E. Thompson, J. Outlaw Article 5 February 2003 Management Alert: Microsoft Will Be a Strong Force in the CRM Market Microsoft is poised to have a major impact on the customer relationship
More informationMagic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore
Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear
More informationThe Identity and Access Management Market Landscape
Research Publication Date: 7 November 2003 ID Number: COM-21-4534 The Identity and Access Management Market Landscape Roberta J Witty Integrating identity and access management components into an overall
More informationMagic Quadrant for the IT Service Desk, 2003
Markets, K. Brittain Research Note 14 May 2003 Magic Quadrant for the IT Service Desk, 2003 Vendors in the IT service desk market Magic Quadrant have suffered through a depressed economy, vendor financial
More informationCIO Update: The Gartner Firewall Magic Quadrant for 2H02
IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market
More informationMagic Quadrant for Corporate Telephony in EMEA, 2003
Markets, S. Blood, C. Lock Research Note 2 September 2003 Magic Quadrant for Corporate Telephony in EMEA, 2003 Cisco and Alcatel continue to offer the market's most comprehensive corporate propositions.
More informationThe Magic Quadrant Framework
Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship
More informationManagement Update: Gartner s 2003 Learning Management System Magic Quadrant
IGG-02262003-01 J. Lundy Article 26 February 2003 Management Update: Gartner s 2003 Learning Management System Magic Quadrant Demand for learning management systems increased in 2002, and so did the number
More informationIBM Tivoli Identity Manager
Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces
More informationVendors strongly focused on WCM
Markets, M. Gilbert, N. Drakos, L. Latham Research Note 28 August 2001 The Web Content Management Magic Quadrant for 2001 The Gartner Web content management Magic Quadrant for 2001 has three leaders and
More informationBSM Definition, Drivers and Inhibitors
Events, D. Curtis, M. Govekar Research Note 11 August 2003 BMC Positions Itself for Business Service Management BMC Software's announcement of its business service management strategy is solidified by
More informationG00123440 A. Allan. Directory authentication providing a common ID and password across multiple systems
. llan Research Note 21 October 2004 Commentary Enterprise Single Sign-On Tools re Comprehensive but Costly Managing multiple user identities and passwords is difficult for companies and users. ESSO can
More informationWhat Are Network Security Platforms?
Markets, J. Pescatore, M. Easley, R. Stiennon Research Note 7 November 2002 Network Security Platforms Will Transform Security Markets An integrated network security platform approach will increase network
More informationEnterprise Resource Planning Software Market: Europe, 2002 (Executive Summary) Executive Summary
Enterprise Resource Planning Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Fabrizio Biscotti Chris Pang Chad Eschinger This document has been published
More informationManagement Update: CRM Success Lies in Strategy and Implementation, Not Software
IGG-03122003-01 D. Hagemeyer, S. Nelson Article 12 March 2003 Management Update: CRM Success Lies in Strategy and Implementation, Not Software A customer relationship management (CRM) package doesn t ensure
More informationPatch management point solution. Platform. Patch Management Point Solution
Markets, R. Colville, M. Nicolett Research Note 18 March 2003 Patch Management: Identifying the Vendor Landscape As the importance of patch management increases, it is important to understand the limitations
More informationDefinition of the Market
Markets, M. Halama Research Note 9 September 2003 Criteria for Pan-European Web Hosting Magic Quadrant, 2H03 Web hosting firms offer greatly differing services to a wide range of customers. Our criteria
More informationSecurity solutions Executive brief. Understand the varieties and business value of single sign-on.
Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies
More informationStrategic Sourcing Magic Quadrant Criteria: An Explanation
Markets, D. Hope-Ross, J. Woods Research Note 14 March 2003 Strategic Sourcing Magic Quadrant Criteria: An Explanation A new Gartner Magic Quadrant for strategic sourcing applications is being introduced.
More informationBy 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability).
Page 1 of 5 Magic Quadrant for Unified Communications, 2005 14 February 2005 Bern Elliot Steve Blood Drew Kraus Source: Gartner Note Number: G00125707 Unified communications technology and applications
More informationThe Business Rule Engine 2003 Magic Quadrant
Markets, J. Sinur Research Note 7 April 2003 The Business Rule Engine 2003 Magic Quadrant Business rule engines are moving toward maturity. In 2003, they will support business agility when called on to
More informationVendor Ratings, VDR-18-1757 Nikos Drakos
Vendor Ratings, Nikos Drakos Research Note 5 November 2002 Vendor Rating: Tridion Web Content Management Tridion hopes that a prudent business strategy and a flexible product line will be enough to put
More informationWhite paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
More informationStrategic Sourcing Applications Magic Quadrant, 1Q03
Markets, D. Hope-Ross, C. Eschinger, A. Kyte Research Note 17 March 2003 Strategic Sourcing Applications Magic Quadrant, 1Q03 Strategic sourcing applications are emerging, despite market immaturity. Applications
More informationVendor Ratings, VDR-18-7561 Theresa Lanowitz, Bill Gassman
Vendor Ratings, Theresa Lanowitz, Bill Gassman Research Note 11 December 2002 Vendor Rating: Mercury Interactive Mercury Interactive, a profitable $360 million automated testing company, has launched a
More informationManagement Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002
IGG-10232002-03 J. Holincheck Article 23 October 2002 Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 The market for large-enterprise human resources management system (HRMS)
More informationWAGs Must Meet Multichannel Access Gateway Criteria
Markets, W. Clark Research Note 16 December 2003 WAGs Must Meet Multichannel Access Gateway Criteria Most wireless application gateway functionality will be absorbed into other mobile development platforms
More informationCIO Update: Microsoft's Business Intelligence Strategy Is a Work in Progress
IGG-05282003-04 B. Hostmann, K. Strange Article 28 May 2003 CIO Update: Microsoft's Business Intelligence Strategy Is a Work in Progress Microsoft s SQL Server and related business intelligence (BI) products
More informationBusiness Intelligence: The European Perspective
Markets, F. Buytendijk Research Note 5 November 2002 Business Intelligence: The European Perspective When choosing business intelligence products, European users are not that different from North American
More informationFederated Identity in the Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember
More informationManaged Remote-Access 1H03 Leaders, Challengers
Markets, J. Girard, E. Paulak Research Note 19 March 2003 Managed Remote-Access 1H03 Leaders, Challengers Owning networks no longer drives remote-access market leadership. Vendors that aggregate other
More informationTroux Configuration Management Software
Sharon Fisher Product Report 5 December 2003 Troux Configuration Management Software Summary With the Troux Blueprinting System, Troux hopes to help create a new market with software to map an information
More informationNational Student Clearinghouse's Web Services Network
Case Studies, B. Lheureux Research Note 3 January 2003 National Student Clearinghouse's Web Services Network NSC provides access to U.S.-based college and university student records via electronic data
More informationSIEM and IAM Technology Integration
SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security
More informationServer Vendors' High-Availability Services: Magic Quadrant
Markets, A. Mac Neela, B. Igou, E. Rocco Research Note 30 September 2002 Server Vendors' High-Availability Services: Magic Quadrant User demand for high availability of critical systems is driving the
More informationEMEA CRM Analytics Suite Magic Quadrant 3Q02
Markets, J. Radcliffe, G. Herschel Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant 3Q02 SAS Institute leverages its strength in analytics to take the lead in the immature CRM analytics
More informationMagic Quadrant for Data Center Outsourcing, 4Q03
Markets, R. Matlus, W. Maurer, L. Scardino, B. Caldwell Research Note 12 November 2003 Magic Quadrant for Data Center Outsourcing, 4Q03 Gartner's positioning of the 14 external service providers in the
More informationDefining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant.
Markets, M. Halpern Research Note 18 March 2003 Defining the PLM Magic Quadrant by Criteria and Use We provide the methodology used in developing our product life cycle management Magic Quadrant. Core
More informationManagement Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant
IGG-02192003-03 R. Matlus Article 19 February 2003 Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant The North American help desk outsourcing market is growing despite a down economy.
More informationMagic Quadrant for Global Enterprise Desktops and Notebooks
Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main
More informationWhat CIOs Want to Know About Microsoft Active Directory
IGG-01222003-01 J. Enck Article 22 January 2003 What CIOs Want to Know About Microsoft Active Directory Active Directory deployments are increasing and so are questions about the technology. Gartner addresses
More informationMarketScope for IT Governance, Risk and Compliance Management, 2008
MarketScope for IT Governance, Risk and Compliance Management, 2008 Gartner RAS Core Research Note G00154941, Paul E. Proctor, Mark Nicolett, French Caldwell, 11 February 2008, RA7 03032009 The IT GRCM
More informationManagement Update: Powerhouse Vendors Implement Document Management
IGG-10302002-04 G. Landers, K. Shegda, D. Logan Article 30 October 2002 Management Update: Powerhouse Vendors Implement Document Management Interest within enterprises is growing in the management of unstructured
More informationNew Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
More informationCRM Excellence Award Winner: BCAA
Case Studies, A. Sarner Research Note 5 December 2002 CRM Excellence Award Winner: BCAA A project to capture and consolidate member data grew into a winning customer relationship management initiative
More informationHow To Make A Call Center More Independent From The Physical Infrastructure
Market Analysis Software Suites Will Dominate Europe's Call Center Market Abstract: By 2006, sales of IP-based call centers in Europe will exceed those of TDM systems, but adoption of independent server-based
More informationPLM Eclipses CPC as a Software Market
Markets, M. Halpern, K. Brant Research Note 20 March 2003 PLM Eclipses CPC as a Software Market Gartner is retiring the Collaborative Product Commerce Magic Quadrant and introducing the Product Life Cycle
More informationBusiness Intelligence Software Market: Europe, 2002 (Executive Summary) Executive Summary
Business Intelligence Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 9 January 2004 Authors Fabrizio Biscotti Colleen Graham This document has been published to the following
More informationSAML:The Cross-Domain SSO Use Case
SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 ekaminski@oblix.com Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397
More informationRBC Insurance Fetes Online Auto/Home Insurance Growth
Case Studies, K. Harris Research Note 29 October 2002 RBC Insurance Fetes Online Auto/Home Insurance Growth RBC Insurance's e-business successes are generating greater than $3 million in premiums per month.
More informationPredicts 2004: Supplier Relationship Management
Strategic Planning, D. Hope-Ross Research Note 17 November 2003 Predicts 2004: Supplier Relationship Management Enterprises using technology to improve supplier relationships should pay attention to changes
More informationManagement Update: The Outlook for the PKI Market
IGG-07092003-04 V. Wheatman, R. Wagner Article 9 July 2003 Management Update: The Outlook for the PKI Market With less market emphasis on cryptographic key management, and more on rule-based identity and
More informationOutlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary
Outlook for the CRM Software Market: Trends and Forecast (Executive Summary) Executive Summary Publication Date: October 30, 2002 Authors Thomas Topolinski Chad Eschinger Pranav Kumar This document has
More informationSAML: The Secret to Centralized Identity Management
1 of 7 1/10/2007 9:05 AM December 2004 http://www.intelligententerprise.com/showarticle.jhtml?articleid=54200324 SAML: The Secret to Centralized Identity Management Complicated by too many systems, too
More informationWhite Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
More informationIntegrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
More informationThe PC life cycle configuration management Market Overview
Magic Quadrant for PC Life Cycle Configuration Management, 2005 Gartner RAS Core Research Note G00131185, 17 October 2005, Ronni J. Colville, Michael A. Silver, R1580 05052006. The PC life cycle configuration
More informationEXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report
KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing
More informationMidsize Enterprises Lead in Adoption of Payment Outsourcing
Research Brief Midsize Enterprises Lead in Adoption of Payment Outsourcing Abstract: More than one-third of midsize enterprises plan to use payment outsourcing by 2004. New areas of interest include automated
More informationUnlike the general notebook market, in which
Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook
More information2002-2003 Web Services Development, North America (Executive Summary) Executive Summary
2002-2003 Web Services Development, North America (Executive Summary) Executive Summary Publication Date: 3 July 2003 Authors Nicole S. Latimer Colleen Graham Joanne M. Correia Norma Schroder This document
More informationSecurity and Identity Management Auditing Converge
Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,
More informationSelecting a Mobile App Development Vendor
G00246304 Selecting a Mobile App Development Vendor Published: 27 December 2012 Analyst(s): Ken Parmelee Ensuring that mobile app development vendors meet requirements and are viable requires an understanding
More informationRecognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership
Recognition of Websense Leadership Industry Analysts Validate Websense Market and Technological Leadership Analysts Recognize Websense 2011 Secure Web Gateway MQ: Leaders Quadrant 2011 Content-Aware Data
More informationDon't Pay to Support CRM 'Shelfware'
Tactical Guidelines, J. Disbrow Research Note 3 May 2003 Don't Pay to Support CRM 'Shelfware' Enterprises license customer relationship management solutions that are often never totally deployed. Software
More informationThe 2H05 Magic Quadrant for managed
Magic Quadrant for MSSPs, North America, 2H05 Gartner RAS Core Research Note G00137165, Kelly M. Kavanagh, John Pescatore, 30 December 2005, R1601 01052007. The 2H05 Magic Quadrant for managed security
More informationVendor Ratings, VDR-19-8225 Thomas Bittman
Vendor Ratings, Thomas Bittman Research Note 14 April 2003 Vendor Rating: IBM Rates Positive for Strategy, Portfolio IBM has a broad product portfolio with successful products in key areas. On demand is
More informationEvaluating A Service-Oriented Application
Technology, B. Wood, J. Comport Research Note 9 April 2003 Packaged Applications Meet Service-Oriented Architectures Evaluating a packaged application must start with an assessment of how well it can work
More informationMarketScope: CRM Software for Midsize Enterprises, 1H04
Markets, W. Close Research Note 19 December 2003 MarketScope: CRM Software for Midsize Enterprises, 1H04 MSEs needing customer relationship management software but with less than $3,500 per user to deploy
More informationKey Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM
1 of 5 10/11/2010 9:44 AM 27 April 2010 Mark Fabbi Gartner RAS Core Research Note G00200313 With the completion of the 3Com acquisition, HP will become a formidable competitor across the entire enterprise
More informationCIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow
IGG-03192003-03 D. Vecchio Article 19 March 2003 CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow The conversion of aging applications to more modern architectures
More informationMidsize Enterprise Summit Business Continuity Questions
Select Q&A, D. Scott, F. DeSalvo Research Note 6 February 2003 Midsize Enterprise Summit Business Continuity Questions Current events have created a new awareness of the importance of business continuity
More informationFirewall Market Trends
Markets, R. Stiennon Research Note 19 June 2003 Magic Quadrant for Enterprise Firewalls, 1H03 Deep packet inspection technology is driving the firewall market to an inflection point that is characterized
More informationHype Cycle for Open-Source Technologies, 2003
N. Drakos Strategic Analysis Report 30 May 2003 Hype Cycle for Open-Source Technologies, 2003 Open-source development principles are expanding into new areas. Gartner assesses the maturity of 17 open-source
More informationGlobalization and Regulation Slow ERP II Process Vendors
Markets, Y. Genovese Research Note 14 March 2003 Globalization and Regulation Slow ERP II Process Vendors In 1Q03, vendors in our Enterprise Resource Planning II Process-Manufacturing Magic Quadrant face
More informationTECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for
More informationSpiritSoft (SpiritWave)
Decision Framework, R. Schulte Research Note 9 December 2002 Predicts 2003: Enterprise Service Buses Emerge The enterprise service bus, a new variation of software infrastructure, has added to the range
More informationIAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
More information