Private Cloud Computing: An Essential Overview
|
|
|
- Austin Melton
- 10 years ago
- Views:
Transcription
1 Research Publication Date: 23 November 2010 ID Number: G Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan to navigate the hype, a dynamic vendor landscape, and difficult organizational and cultural changes. We discuss the forms of private cloud computing, the benefits and challenges, the architecture of the private cloud, the vendor landscape, and how to get started. Key Findings Private cloud computing can come in many different forms, and is not necessarily onpremises, insourced or based on virtual machines. Technology is often the easiest part of private cloud computing culture, politics, process and funding are all much harder. Many enterprises (especially midmarket) will build partial, but "good enough," private cloud solutions based on their requirements. The private cloud market will be very dynamic and notable for acquisitions during the next few years. Recommendations Implement private cloud computing when public cloud services do not meet your requirements for service levels, security, compliance, etc. Start with strong leadership, including CIO commitments an organization's ability to evolve culturally and politically is critical. Develop a portfolio of your services (inventory, SLAs, costs), and build strategies and road maps for each. Redesign applications using platform as a service (PaaS) before planning to leverage infrastructure as a service (IaaS) for every application. Enable hybrid capabilities when developing a private cloud architecture, to avoid lock-in and enable choice in the future Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity" on its website,
2 TABLE OF CONTENTS Strategic Planning Assumption(s)... 3 Analysis... 3 Forms of Private Cloud Computing... 3 Benefits, Challenges and the Path Forward... 4 The Architecture of Private Cloud Computing... 4 Private Cloud Vendors... 5 How to Start... 6 Bottom Line... 7 Recommended Reading... 7 LIST OF FIGURES Figure 1. Private-Cloud-Computing-Enabling Vendors... 5 Publication Date: 23 November 2010/ID Number: G Page 2 of 8
3 STRATEGIC PLANNING ASSUMPTION(S) Through 2014, IT organizations will spend more money on private-cloud-computing investments than on offerings from public cloud providers. By 2015, the majority of private-cloud-computing services will evolve to leverage public cloud services in a hybrid model. Through 2014, fewer than 20% of virtualized deployments will be complete private cloud deployments. By 2015, the majority of virtualized deployments will evolve to support some private-cloudcomputing capabilities, but fewer than 20% will be complete private cloud deployments. ANALYSIS Private cloud computing is gaining interest, especially among larger enterprises (see "Private Cloud Computing Plans From Conference Polls"). Vendors are aggressively targeting the privatecloud-computing opportunity by repositioning existing products (e.g., IBM's CloudBurst), acquiring smaller vendors (e.g., CA Technologies' acquisition of 3Tera and Cassatt), delivering new functionality (e.g., VMware's vcloud Director), and offering on-premises versions of public cloud offerings (e.g., Microsoft's Windows Azure Platform Appliance). Due to concerns with public cloud offerings, the momentum and growing maturity of virtualization deployments in enterprises, the growing number of products that can help enable a private cloud architecture, and enterprise interest in the use of the cloud-computing style, through 2014, IT organizations will spend more money on private-cloud-computing investments than on offerings from public cloud providers (see "Predicts 2010: Cloud Computing Emerges From the Hype, Scope and Issues Demand Clarification" and "Private Cloud Computing Plans From Conference Polls"). Forms of Private Cloud Computing Cloud computing is a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service to customers using Internet technologies. Cloud-computing services can be delivered by an internal IT organization (insourced) or by an external service provider (outsourced). The underlying infrastructure can be hosted within an organization's data center or in an external data center. That underlying infrastructure can be dedicated to a single customer ("private cloud"), shared between a consortium of customers ("community cloud") or shared with a service provider's customer base in general ("public cloud"). Private cloud computing can come in many forms: A private cloud will usually be insourced and run on-premises using equipment owned by the enterprise, but not always. Private cloud computing can be outsourced and externally hosted (this is often called "virtual private cloud," but that term is used to describe a broad spectrum from dedicated equipment to virtual private networks). It can also be outsourced, but internally hosted (managed by a third party). Private cloud services will usually be IaaS, but not always. For example, some PaaS offerings will be available for private cloud services (e.g., Microsoft's Windows Azure Platform Appliance), and likewise with software-as-a-service (SaaS) offerings. Publication Date: 23 November 2010/ID Number: G Page 3 of 8
4 A private cloud that is IaaS will usually leverage virtual machines, but not always. Private cloud solutions that leverage rapid provisioning (e.g., IBM's CloudBurst) will be available to support physical and virtual devices. Benefits, Challenges and the Path Forward The primary benefit of private cloud computing is speed. Implementing a service catalog that offers standard services through a self-service interface, and automating the delivery of those offerings, can increase the speed of delivery dramatically. By themselves, standards, automation, and some form of resource pooling or virtualization will also reduce costs but these can be done without building a complete private cloud. Private cloud computing introduces a new way to use IT, and changes the relationship between the customer and the IT organization to a business relationship, based on service delivery and usage metrics. For most organizations, this is a difficult change. Process changes, management changes, funding changes, service standardization, culture and politics consistently come up in polls as more-difficult challenges than technology itself (see "Private Cloud Computing Plans From Conference Polls"). However, navigating these changes for private cloud computing also smoothes the path for the enterprise to consider public-cloud-computing alternatives in the future if and when they begin to meet enterprise requirements for security, service levels, compliance, etc. Private cloud computing is a steppingstone to public cloud computing, and it should be designed to enable future sourcing choices. Hybrid cloud computing refers to a blend of cloud-computing delivery models, most commonly a blend of a public cloud model with a private cloud model. Once an organization has made the leap in terms of leveraging a self-service interface with a service catalog, and automated service delivery behind that, adding an alternative sourcing option (an external service provider) for some services or some instances of services becomes easier. Terms like "overdrafting" and "cloudbursting" are used to describe the potential here, but few end-to-end services will span both public and private clouds. However, the ability to locate new development and test requests with a third party, or to move low-priority workloads during quarterly peaks, is a common request heard from Gartner clients. While hybrid cloud computing is still a challenge, based on today's technologies, it is evolving quickly (e.g., VMware's vcloud Director is designed specifically to enable the hybrid cloud). The majority of private-cloud-computing services will evolve to leverage public cloud services in a hybrid model by For some organizations, the final goal will become a full migration to public cloud services; however, most organizations that build a private cloud architecture will maintain either a private or hybrid architecture in the long term. Most private-cloud-computing architectures should be designed with the future use of hybrid cloud computing in mind, providing more choices and a potential migration path to public cloud services as they mature, in an evolutionary way. The Architecture of Private Cloud Computing A private cloud service has four specific architectural elements: access management, service management, resource management and pooled resources (see "The Architecture of a Private Cloud Service"). A self-service portal may provide access management and an easy interface, but service automation behind that portal is also critical. A virtualized infrastructure (which could have rapid reprovisioning as a virtualization tool) may provide a fluid and flexible resource pool, but unless those service requirements can be entered in a self-service or programmatic way, and unless the allocation of the virtualized resources to meet service requirements is automated, it is not a private cloud architecture. Publication Date: 23 November 2010/ID Number: G Page 4 of 8
5 Almost all large companies, and most small and midmarket enterprises, are virtualizing some portion of their infrastructures, and many of them consider private cloud computing an ultimate goal. However, a full private-cloud-computing architecture will not be worth the investment nor necessary for all organizations. Many smaller organizations will forgo usage metrics and chargeback. Some larger organizations will maintain a human interface between the customer and some of the services (to ensure appropriate service design, etc.), even if the deployment of the service is automated. While these may not be complete private clouds by definition, they are real and provide value, and enterprises should consider which elements of private cloud computing are necessary before deploying them. For many enterprise, implementing 70% of a private cloud architecture is absolutely good enough. By 2015, the majority of virtualized deployments will evolve to support some private-cloud-computing capabilities, but less than 20% will be "complete" private cloud deployments. Private Cloud Vendors Vendors are gravitating to private cloud computing from many areas of expertise (see Figure 1). Private cloud computing is also a hotbed for startups, and more-established vendors are often moving into private cloud computing through acquisitions. A few examples of recent important acquisitions include: 3Tera and Cassatt (by CA Technologies), Surgient (by Quest Software), VMLogix (by Citrix), Cast Iron Systems (by IBM), Neptuny (by BMC Software), and SpringSource (by VMware). Through 2015, the private cloud market will be extremely dynamic, and notable for acquisitions of smaller vendors by larger vendors trying to rapidly fill out their portfolios. Figure 1. Private-Cloud-Computing-Enabling Vendors Source: Gartner (November 2010) Several vendors stand out: Publication Date: 23 November 2010/ID Number: G Page 5 of 8
6 The Big Four traditional management vendors (BMC Software, CA Technologies, HP and IBM) have rich service and data center management tools to bring to the market. All four were latecomers to the server virtualization market, from which private cloud computing is emerging, but all four have a rich set of assets (and consulting services) to be major players. Where there are gaps, these four vendors have traditionally filled them with acquisitions, and will continue to do so. VMware and Citrix are starting from the opposite end of the market growing from a rich base of virtualization and virtualization management capability. While VMware has the larger installed base, it still has a long way to go up the stack in terms of service automation and manageability. Citrix has made its own acquisitions (such as VMLogix), and it has an interesting portfolio that includes NetScaler, but it is also incomplete. Cisco is focusing on expanding its infrastructure influence, and is filling its gaps through alliances with VMware, BMC Software, NetApp and EMC. Microsoft was late to virtualization, but is closing the capability gap quickly. It has also traditionally been slow to focus on management, but the priority of System Center has been rising and Microsoft has become more acquisitive to fill gaps in System Center. Eucalyptus Systems is an interesting small player. It is focused on a complete privatecloud-computing infrastructure with partners rpath and newscale, with a focus on interoperability with Amazon, VMware and others. Through acquisitions and the need for complete solutions, private-cloud-computing enablement will become centered on a relatively small number of vendors or vendor partnerships that supply complete solutions. How to Start The challenges with private cloud computing are primarily about culture, politics, services, processes, business relationship and funding technology is not the right place to start (see "Getting Started With Private Cloud: Services First"). Leadership. Because private cloud computing affects the relationship between IT and the business, and it affects the day-to-day jobs of people inside the IT organization, a private-cloudcomputing direction requires strong leadership and executive buy-in first, foremost and throughout. A periodically updated strategic plan with a road map and metrics is critical. Service. Service is the key to cloud computing (see "Getting Started With Private Cloud: Services First"). A self-service interface requires a thorough understanding of the services that IT offers. Which ones do we deliver today? Which ones can be fully standardized? Are SLAs in place today? What service levels do we achieve today? What are the customer requirements for this service? What options should be offered? What is our cost to deliver this service at these service levels today? Once all of that is understood, each service at least the critical ones requires its own road map. Which services make sense for the cloud-computing style, and which ones do not? When will public cloud services meet our needs, if ever? What should we do between now and then? Business Case. Private cloud services should be built with return on investment in mind not just cost, but value (in terms of speed for the IT organization's customers, or as an initial investment toward a cloud computing migration). In some cases, it might be better to wait for a public cloud service to evolve to fill your needs. In other cases, it will make good business sense to build a private cloud service. Publication Date: 23 November 2010/ID Number: G Page 6 of 8
7 Benchmark. An enterprise that has built a private-cloud-computing service should constantly benchmark public offerings, to consider leveraging them in a hybrid model, or to perhaps migrate completely to a public cloud service in the future. Once service requirements and internal service delivery costs are fully understood, public cloud offerings can be an objectively compared alternative choice. Bottom Line In many ways, the core of private cloud computing is the intersection of a maturing virtualization trend and the rapidly growing cloud-computing trend. Some organizations see private cloud computing as a way to defend the organization against cloud computing. However, the private cloud is all about changing the status quo, in terms of service orientation, culture, process and funding. Done well, private cloud computing will help an IT organization deliver services much faster to its customers, and will open up an easier path to leverage public-cloud-computing solutions, if and when they mature. The market is young, and vendors are rapidly trying to fill out their portfolios to address the opportunities. In the near term, it will be important to create your own strategy, and be careful not to be led down a path that is determined by the technologies and business models that vendors offer today, because those will change rapidly. Instead, start on the inside, with strong leadership and a service focus. RECOMMENDED READING "The Architecture of a Private Cloud Service" "Getting Started With Private Cloud: Services First" "Private Cloud Computing Plans From Conference Polls" "From Secure Virtualization to Secure Private Clouds" "Q&A: The Many Aspects of Private Cloud Computing" "Cloud Infrastructure as a Service: An Essential Overview" This research is part of a set of related research pieces. See "Private Cloud Computing: Clearing the Air" for an overview. Publication Date: 23 November 2010/ID Number: G Page 7 of 8
8 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 23 November 2010/ID Number: G Page 8 of 8
Q&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
Best Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
The What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
Cloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
IT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
Deliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
The Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
IT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality
Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
Key Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
Agenda for Supply Chain Strategy and Enablers, 2012
G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling
How To Create A Cloud Computing System
G00230221 Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus
Roundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
The Six Triggers for Using Data Center Infrastructure Management Tools
G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
Cloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
The IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase
Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial
The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives
Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing
Research Publication Date: 19 July 2011 ID Number: G00214537 Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Benoit J. Lheureux Paper manufacturer Mohawk Fine Papers needed
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost
G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures
Eight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
Real-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
Containers and Modules: Is This the Future of the Data Center?
Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet
Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
From Secure Virtualization to Secure Private Clouds
Research Publication Date: 13 October 2010 ID Number: G00208057 From Secure Virtualization to Secure Private Clouds Neil MacDonald, Thomas J. Bittman As enterprises move beyond virtualizing their data
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
Toolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
Overcoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
What to Consider When Designing Next-Generation Data Centers
Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,
The Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
X.509 Certificate Management: Avoiding Downtime and Brand Damage
G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity
Gartner Clarifies the Definition of the Term 'Enterprise Architecture'
Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
Document the IT Service Portfolio Before Creating the IT Service Catalog
Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons
Industry Research G00232987 Dutch University's Successful Enterprise System Implementation Yields Valuable Lessons Published: 28 March 2012 Analyst(s): Ron Bonig When Vrije Universiteit in Amsterdam implemented
Mainframe Modernization: When Migration Is the Answer
Research Publication Date: 8 January 2010 ID Number: G00171622 Mainframe Modernization: When Migration Is the Answer Dale Vecchio Mainframe migrations can be executed in a number of ways. Which choice
IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.
Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important
Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.
Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
The Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand
Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable
User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009
Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly
A Guide to Adapting IT Tools for Smart Grid OT Management Challenges
Industry Research Publication Date: 12 September 2011 ID Number: G00216907 A Guide to Adapting IT Tools for Smart Grid OT Management Challenges Randy Rhodes Smart grid technologies span all of the domains
2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise
Research Publication Date: 23 July 2009 ID Number: G00169733 2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise John E. Van Decker Extensible Business Reporting Language (XBRL) will be a requirement
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success
Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical
Case Study for Supply Chain Leaders: Dell's Transformative Journey Through Supply Chain Segmentation
Research Publication Date: 12 November 2010 ID Number: G00208603 Case Study for Supply Chain Leaders: Dell's Transformative Journey Through Supply Chain Segmentation Matthew Davis Faced with ever-changing
Repurposing Old PCs as Thin Clients as a Way to Save Money
Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers
Choosing a Replacement for Incumbent One-Time Password Tokens
Research Publication Date: 21 April 2011 ID Number: G00212244 Choosing a Replacement for Incumbent One-Time Password Tokens Ant Allan This research outlines the options for enterprises seeking replacements
Successful EA Change Management Requires Five Key Elements
Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the
Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
Cloud IaaS: Security Considerations
G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
