Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business
|
|
|
- Candace Sherman
- 10 years ago
- Views:
Transcription
1 Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity."
2 Complexity, Time to Deliver Disaster Awaits Your RFP Efforts Unless You Plan Ahead Consequences (in complexity and time to deliver when you plan exclusively "backward") Planning direction frequently used Principles Practices Policies Processes People Products Production Proper planning direction
3 Identity and Access Management Defined IAM provides a practical, structured, and coherent approach to the management of users' identities and their access to systems and data in line with business needs. Identity and Access Management IAM ensures that right people get access to the right resources at the right times for the right reasons, enabling the right business outcomes.
4 Cost-justifying IAM Enablement Effectiveness Efficiency
5 The IAM Technology Model Policy Governance Identities Governance and Administration Entitlements Identity Data Audit and Report Intelligence Analytics Workflow Engine (Processes) Identity Data and Log Model Entitlements Data Authentication Access Authorization Activity Data Brokerage via Target System Integration (Connectors) Target Systems
6 Taxonomy of IAM Technologies Administration Intelligence Authentication Authorization Identity administration Password management CM tools PKI AD/Unix bridge tools Microsoft resource access administration Identity governance & administration ERP SOD controls SIEM Web fraud detection Electronic signatures and transaction verification Authentication methods Authentication infrastructures Identity proofing services ESSO SSL VPN Federated authentication WAM Externalized authorization management Contentaware DLP EDRM Encryption Identityaware networking Privileged account management
7 IAM Project Type IAM Project Type and Complexity Business Strategic Limited Scope Single Sign-on Web Access Mgmt. User Authentication ESSO Federation PAM Identity Governance and Administration User Administration/ Provisioning Identity Analytics Externalized Authorization Mgmt. Tactical Password Mgmt. Directory Services IT $ Simple $ $ IAM Project Complexity $ $ $ Complex
8 Factors That Impact the Cost of IAM
9 Strategic Planning Assumption By 2016, alternative methods of IAM delivery will shift 50% of new enterprise IAM proposal requests from a product contract focus to a service one. Supporting the SPA: The pricing model for IAM as a service is growing more compelling as features improve. Maturing internal IT services tend to shift to external delivery as more complex challenges beckon for limited internal IT resources. More customers with limited internal IT capabilities are seeking IAM solutions. Hybrid IAM in-house and cloud-delivered solutions will abound. Alternate position to the SPA: Certain customers will never outsource IAM or address all IAM needs with IAM as a service. Cloud computing as a viable IAM service delivery method will continue to struggle. Privacy and security management concerns for cloud-delivered services will delay adoption. An installed base of in-house IAM solutions won't be soon replaced.
10 IAM Pricing Models Perpetual Subscription Market Growth IDaaS (Public Cloud) Enterprise Tiered, Named, User Based Per Active User, per Month Market Growth
11 An IAM RFP Do you seek to acquire IAM products, services, or both? Are you establishing an IAM program (with technology needs) or addressing a specific IAM requirement? Does this RFP address the planning, building, and/or operational portion of your requirement? Are you addressing requirements for your internal employees, external customers and partners, or both? Do you have an executive business sponsor, or is this an IT initiative?
12 The IAM Product RFP Process Assessment Preparation Submission Response Selection 1 Gather requirements, manage scope, and assess gaps. 2 Prepare/Review RFP, weight criteria, validate the process. 3 Submit RFPs to participants and Q&A period. 4 Collect RFP responses, review, oral presentation, finalists. 5 Conduct POC, analyze finalists, select vendors.
13 What an IAM Product RFP Should Include Introduce Instruct Inform RFP (and IAM program) goals and executive summary Contents of the document What document specifies (and does not) Selection criteria RFP process and schedule Who to contact Format of response and time frame allowed Legal conditions and contractual concerns Service levels and KPIs (program and post-implementation) Company description, mission, IT mission and geography Current technical environment description Definitions and acronyms Priorities Functional specifications Technical specifications
14 What an IAM Product RFP Should Include (Contd.) Inquire (1) Respondent company's general information IAM market position, viability, qualifications, client references IAM product portfolio descriptions Third-party partners for delivery, if any Certifications (e.g., ISO 9000), diversity Inquire (2) Functional requirements specification responses Technical requirements specification responses System integration delivery, migration capabilities Implementation plan, schedule Training and education Test and acceptance Inquire (3) Pricing of product, maintenance and support Program pricing and expenses Payment schedule, milestones and penalties Description of services provided SLA and product guarantees
15 Criteria for Vendor Product Selection in IAM RFPs 1. Price (life cycle) 2. Functionality and technical fit 3. Adaptability 4. Support 5. Compatible with your strategy 6. Viability 7. Availability of alternate means of delivery 8. Support for a hybrid coexistence 9. Migration support 10. Transferable skills
16 Workshop Steps Selection of discussion "leaders" Break into teams Develop individual checklists for: 1. Key requirements 2. Participants in RFP (using RACI matrix) 3. Communications plan 4. Top three selection criteria (for your enterprise) 5. First steps 6. "Do's and don'ts"
17 Recommendations Develop an RFP process for yourself and the vendor as part of an overall IAM program. Use a "4-I" approach to RFP structure: Introduce, instruct, inform, and inquire. Select a use-case approach to the RFP that reflects your business approach to IAM. Apply criteria to selecting a vendor based on real differentiators beyond the technical features.
18 Action Plan for IAM Leaders Monday Morning: - Choose what kind of RFP for IAM is really needed. Next 90 Days: - Assess the current state of IAM in the enterprise from an organization, process, and technology perspective to have a starting point. - Use the assessment to develop an RFP process as part of an IAM program where practical. Next 12 Months: - Develop an RFP based on the principles outlined here. - Deliver to selected respondents. - Review responses, and choose a vendor.
19 Recommended Gartner Research Hype Cycle for Identity and Access Management Technologies, 2013 Gregg Kreizman (G ) ITScore for Identity and Access Management Ant Allan, Earl Perkins (G ) Toolkit: Gartner Authentication Method Evaluation Scorecards Ant Allan (G ) Magic Quadrant for Identity and Access Governance Earl Perkins (G ) For more information, stop by Gartner Research Zone.
Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson
Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization
How to Get to Single Sign-On
How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
The Outlook for IT. 2014 to 2017. Michael Smith VP Distinguished Analyst January 31, 2014
The Outlook for IT Michael Smith VP Distinguished Analyst January 31, 2014 2014 to 2017 Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed
What's a Digital Marketing Platform? What Isn't?
G00252512 What's a Digital Marketing Platform? What Isn't? Published: 26 June 2013 Analyst(s): Jake Sorofman, Andrew Frank, Bill Gassman, Adam Sarner, Mike McGuire The rise of digital marketing has amplified
SIEM and IAM Technology Integration
SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security
Public/Private/Hybrid Cloud choosing horses for courses. NetEvents APAC Cloud Summit
Public/Private/Hybrid Cloud choosing horses for courses NetEvents APAC Cloud Summit David Coyle Managing Vice President Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication
C21 Introduction to User Access
C21 Introduction to User Access Management Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What
Agenda Overview for Social Marketing, 2015
G00270737 Agenda Overview for Social Marketing, 2015 Published: 19 December 2014 Analyst(s): Julie Hopkins Social marketing programs are maturing; executives increasingly expect ROI to follow social marketing
Selecting a Mobile App Development Vendor
G00246304 Selecting a Mobile App Development Vendor Published: 27 December 2012 Analyst(s): Ken Parmelee Ensuring that mobile app development vendors meet requirements and are viable requires an understanding
Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023
G00261104 Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023 Published: 24 January 2014 Analyst(s): Nigel Rayner This Gartner Research Circle survey conducted in September 2013 shows that some organizations
IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
Cloud Trends 2015 and beyond
Cloud Trends 2015 and beyond Thierry Kuperman Le Bihan @tkuperman Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form
Product Innovation Platforms: Enabling Product Design and PLM in the Digital Business Era
Product Innovation Platforms: Enabling Product Design and PLM in the Digital Business Era Marc Halpern @mrhalpern4353 Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication
Security and Identity Management Auditing Converge
Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,
KSÖ-SICHERHEITSKONGRESS 2015
KSÖ-SICHERHEITSKONGRESS 2015 Wachstum durch digitale Standortsicherung. Chancen und Herausforderungen auf dem Weg zu einem cyber-sicheren Österreich. Adapting IT Security to Digital Business Jeremy D'Hoinne
The Cloud Management Scenario
The Cloud Management Scenario Donna Scott Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior
Use This Eight-Step Process for Identity and Access Management Audit and Compliance
Research Publication Date: 28 March 2005 ID Number: G00126592 Use This Eight-Step Process for Identity and Access Management Audit and Compliance Roberta J. Witty, Ant Allan, Jay Heiser Authentication,
What Makes A Good Hosting
What Makes A Good Hosting Provider? Tiny Haynes Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's
Mobilizing the Enterprise: Trends, Strategies and Techniques
Mobilizing the Enterprise: Trends, Strategies and Techniques Richard M Marshall PhD Twitter: @rmmarshall Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be
Establishing a Strategy for Database Security Is No Longer Optional
Establishing a Strategy for Database Security Is No Longer Optional Published: 29 November 2011 G00226793 Analyst(s): Jeffrey Wheatman The options for securing increasingly valuable databases are very
Agenda Overview for Emerging Marketing Technology and Trends, 2015
G00270688 Agenda Overview for Emerging Marketing Technology and Trends, 2015 Published: 18 December 2014 Analyst(s): Andrew Frank The best digital marketers exploit emerging trends and technologies to
In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand
Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable
Cloud, SDN and the Evolution of
Cloud, SDN and the Evolution of Enterprise Networks Neil Rickard Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
A Manufacturing Solution or
Master Data Management: A Manufacturing Solution or Sinkhole? It Depends on Your Planning! Marc Halpern Twitter: @mrhalpern4353 Gartner is a registered trademark of Gartner, Inc. or its affiliates. This
Agile IT Vendor Management in a Digital World
Agile IT Management in a Digital World Mid-Atlantic CIO Forum Christopher Ambrose January 21, 2016 Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced
Sun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
Business-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
Realize That Big Security Data Is Not Big Security Nor Big Intelligence
G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is
Cloud IaaS: Security Considerations
G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the
Agenda Overview for Digital Commerce, 2015
G00270685 Agenda Overview for Digital Commerce, 2015 Published: 18 December 2014 Analyst(s): Jennifer Polk Marketing is making a greater impact on, and taking more responsibility for, digital commerce.
Agenda Overview for Marketing Management, 2015
G00270720 Agenda Overview for Marketing Management, 2015 Published: 18 December 2014 Analyst(s): Richard Fouts Increased participation in strategic business decisions and an evolving organization put new
Mobility in the Enterprise: Trends
Mobility in the Enterprise: Trends and Directions with an IoT Focus Leif-Olof Wallin Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed
Top 10 Strategic Technology Trends for Smart Government
Top 10 Strategic Technology Trends for Smart Government Rick Howard Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form
How To Use Data To Drive Digital Marketing
G00270683 Agenda Overview for Data-Driven Marketing, 2015 Published: 29 December 2014 Analyst(s): Martin Kihn Gartner's 2015 research will help you seize the growth opportunities that data-driven marketing
The State of Hybrid Cloud
The State of Hybrid Cloud To learn more about this full research or to inquire about membership, contact us: +1-866-913-8101 IT.Support@ executiveboard.com www.cebglobal.com/it CEB Infrastructure Leadership
Tips for Evaluators: Better Business Intelligence RFPs
Research Publication Date: 11 May 2009 ID Number: G00167840 Tips for Evaluators: Better Business Intelligence RFPs James Richardson Many of the business intelligence (BI) RFP data-collection exercises
Delivering value to the business with IAM
Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements
Five Business Drivers of Identity and Access Management
Research Publication Date: 31 October 2003 ID Number: SPA-21-3673 Five Business Drivers of Identity and Access Management Roberta J. Witty The primary reasons to implement IAM solutions are business facilitation,
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
This research note is restricted to the personal use of [email protected]
Burton IT1 Research G00234483 Identity Management Published: 9 July 2012 Analyst(s): Ian Glazer, Bob Blakley Identity management (IdM) has become a distinct aggregation of functions for the maintenance
Identity and Access Management. Key Initiative Overview
Ray Wagner Research Managing Vice President This overview provides a high-level description of the Identity and Access Management Key Initiative. IT leaders can use this guide to understand what they need
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Neil MacDonald VP and Gartner Fellow Gartner Information Security, Privacy and Risk Research Twitter @nmacdona
Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day.
Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day. The Digital Commerce Challenge "By 2017, due to Internet-enabled price visibility, the
Open Source: The New Data Center Standard
Open Source: The New Data Center Standard 1 From the Gartner Files: The State of Open-Source RDBMSs, 2015 10 ABN AMRO Clearing: Financial Systems on Postgres Plus Contact Us! [email protected] www.enterprisedb.com
The Future of IT Sourcing
The Future of IT Sourcing Finanstilsynet Seminar Ali Hamadi Senior Managing Partner, FSI Nordics [email protected] 22. May 2014 Gartner is a registered trademark of Gartner, Inc. or its affiliates.
Market Guide for Data-Centric Audit and Protection
G00263059 Market Guide for Data-Centric Audit and Protection Published: 21 November 2014 Analyst(s): Brian Lowans, Earl Perkins Organizations that have not developed data-centric security policies to coordinate
Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost
G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures
Research. Identity and Access Management Defined
Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014
IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security
An Oracle White Paper January 2010. Access Certification: Addressing & Building on a Critical Security Control
An Oracle White Paper January 2010 Access Certification: Addressing & Building on a Critical Security Control Disclaimer The following is intended to outline our general product direction. It is intended
EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02
Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite
EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski March 2015 is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported
Using Big Data Analytics to
Using Big Data Analytics to Improve Government Performance Arun Chandrasekaran Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed
Identity & Access Management new complex so don t start?
IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach
Consider Identity and Access Management as a Process, Not a Technology
Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research
Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons
Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented
Agenda Overview for Multichannel Marketing, 2015
G00271717 Agenda Overview for Multichannel Marketing, 2015 Published: 19 December 2014 Analyst(s): Adam Sarner, Jennifer S. Beck Multichannel marketing is where content and context meet and where brand
WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com
WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities
The. Tenets of IAM. Putting Identity Management at the Center of Security. Darran Rolls, Chief Technology Officer
The 7 Tenets of IAM Putting Identity Management at the Center of Security Darran Rolls, Chief Technology Officer About SailPoint Magic Quadrant Leader, Gartner 2016 550+ Customers and Growing 95% Customer
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
Technology Update & Trends In Government
Technology Update & Trends In Government Rob Cohan Sr. Managing Partner State & Local Government Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced
Agenda 3/7/2011. 2011 ERM Symposium March 14 16, 2011. Continuous Controls Monitoring. I. Changes In Corporate Environment
2011 ERM Symposium March 14 16, 2011 Continuous Controls Monitoring Futuristic Approach to Enterprise Risk Management Swissotel, Chicago, Chicago IL. Speakers: Syed M. Ali Alan Ash Sr. Audit Manager, Director
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
Vendor Classification
Markets, L. Geishecker, F. Buytendijk Research Note 2 October 2002 Introducing the CPM Suites Magic Quadrant Vendors are developing a wide range of new functionality for corporate performance management.
The Four "A's" of Information Security
Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also
Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day.
Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day. 2008 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered
SSL VPN 1H03 Magic Quadrant Evaluation Criteria
Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and
Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
Vertical Data Warehouse Solutions for Financial Services
Decision Framework, M. Knox Research Note 24 July 2003 Vertical Data Warehouse Solutions for Financial Services Packaged DW financial services solutions differ in degree of and approach to verticalization,
Magic Quadrant for Data Center Outsourcing, 4Q03
Markets, R. Matlus, W. Maurer, L. Scardino, B. Caldwell Research Note 12 November 2003 Magic Quadrant for Data Center Outsourcing, 4Q03 Gartner's positioning of the 14 external service providers in the
Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models
G00237716 Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models Published: 6 February 2013 Analyst(s): David W. Cearley, Donna Scott, Joe Skorupa, Thomas J. Bittman Cloud
Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015
G00263819 Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015 Published: 18 June 2014 Analyst(s): Carl Claunch Support for Windows Server 2003 will end in July 2015. Production
Strategic Sourcing Magic Quadrant Criteria: An Explanation
Markets, D. Hope-Ross, J. Woods Research Note 14 March 2003 Strategic Sourcing Magic Quadrant Criteria: An Explanation A new Gartner Magic Quadrant for strategic sourcing applications is being introduced.
Connecting Users with Identity as a Service
Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service
How To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
The Magic Quadrant Framework
Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship
The Business-Centric CIO
The Business-Centric CIO Issue 2 1 The Business-Centric CIO 2 From the Gartner Files: Using IT Financial Management to Improve Business Outcomes 6 About VMware Today s successful CIOs are not only technology
ATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
The Electronic Signature Market Is Poised to Take Off
G00234939 The Electronic Signature Market Is Poised to Take Off Published: 21 May 2012 Analyst(s): Gregg Kreizman Growth in the e-signature market is becoming viral, and there are significant benefits
The Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
Magic Quadrant for Global Enterprise Desktops and Notebooks
Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main
GARTNER REPORT: SIP TRUNKING
GARTNER REPORT: SIP TRUNKING SIP Trunking Slashes U.S. Telecom Expenses by Up to 50%. SUMMARY Network architects and procurement managers can leverage SIP trunking services to slash enterprise telecom
U.S. Department of State, Selects Syclo SMART Mobile Suite For Maximo
U.S. Department of State, Selects Syclo SMART Mobile Suite For Maximo Presented by: Charles Kalajian Syclo, Federal Account Executive Steve Hamilton Syclo, Vice President of Sales John Bainbridge U.S.
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
On and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
