CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02
|
|
|
- Jeremy Thomas
- 10 years ago
- Views:
Transcription
1 IGG J. Pescatore, R. Wagner Article 15 January 2003 CIO Update: Gartner's Extranet Access Management Magic Quadrant for 2H02 CIOs and many other executives are interested in insights on how to improve the data integrity and security of their enterprises. Inside-the-firewall (intraenterprise) integration to reduce costs dominated the extranet access management market in Enterprises and vendors will focus on Active Directory in Extranet Access Management Overview What Is an Extranet? An intranet is an internal network based on Web technology, most often used by enterprises for informational purposes, such as distribution of internal information, notification of vacancies, or displaying internal directories and organizational charts. An intranet will usually have links to the Internet and must therefore be protected from unauthorized access. A group of interconnected intranets for instance, between a company and its suppliers is commonly referred to as an extranet. Extranet Access Management Gartner defines extranet access management products as solutions that provide a unified mechanism to manage the authentication of users and implement business rules determining user access to applications and data. The business rules may be authorizations in a security sense, entitlements in a legal/contractual sense or personalization in a marketing sense. As the use of enterprise portal products increases, integration between user access management and portal personalization features grow in importance. Larger enterprises with multiple Internet domain names, as well as distributor or hub-and-spoke business-to-business extranets, require multidomain single sign-on and distributed user management capabilities. Performance, scalability and availability become critical as extranet access management solutions are relied upon for production applications both inside and outside the firewall. Market Trends in 2002 and 2003 Economic Impact on Extranet Access Management Uncertain economic conditions and a vastly reduced number of extranet and e-business rollouts dominated the extranet access management market in Most extranet access management Gartner Entire contents 2003 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 activity was related to IS organizations attempting to reduce their operational costs of managing user access to externally exposed applications (primarily business-to-business) and Intranet-based applications and portals. That focus has changed product demands to more integration with Active Directory and employee-oriented applications, such as PeopleSoft and Siebel Systems, and has increased demand for provisioning integration and channel strategies. Funding for extranet access management deployment comes from flat IT budgets, and pricing pressure has been intense. Standards Activity There was much noise, but less action, on the standards front in The Liberty Alliance released its Liberty 1.0 specification, which extended the Security Assertions Markup Language (SAML). The Organization for the Advancement of Structured Information Systems (OASIS) approved the SAML specification. Major extranet access management vendors, and several other product vendors, announced SAML support in their products. Microsoft publicly stated that it would support several forms of identity tokens, including SAML and Kerberos, in the Web Services Security (WS-Security) extensions to the Simple Object Access Protocol that Microsoft and IBM had developed and turned over to OASIS as a royalty-free standard. The Liberty Alliance announced that it would support WS-Security in Liberty 2.0. However, Microsoft has not detailed plans for direct support of SAML in Windows authentication and access control mechanisms, such as Passport. Liberty and Passport Outlook Gartner research shows that financial services companies, which are the most-likely early adopters of federated identity services such as Liberty and Passport, had no near-term ( ) plans to adopt either service. Gartner believes that the initial wave of Liberty/Passport deployment will be in the 1H04 time frame and will be driven by business-to-business services. That forecast, combined with increased market attention on reducing the cost of managing internally focused applications, places Active Directory-centric solutions in a strong position for the future because enterprise identities are tightly bound to Windows PC and network logins. Unless economic conditions make a strong turnaround and invigorated e-business rollouts are driven more by business units than IS organizations, Gartner expects that the focus on Active Directory will dominate the market through Extranet Access Management Factors Most enterprise demand for extranet access management involved internal applications as IS organizations attempted to support a wide range of applications that were developed during the past several years. In 2002, most extranet access management product advancements involved integration with provisioning capabilities to provide workflow functions for automating user
3 management actions across applications. Integration can lead to fewer administrators required to support a given user population across large numbers of applications, but it often is yet another peruser fee that sometimes exceeds the cost of the user access management product. Consolidation among provisioning, extranet access management and platform vendors will drive the per-seat costs down as long as the flat economy continues in These factors caused some changes in vendor positioning in Gartner s Extranet Access Management 2H02 Magic Quadrant (see Figure 4). Figure 4 Extranet Access Management 2H02 Magic Quadrant Challengers Leaders IBM Ability to Execute Novell Netegrity Oblix RSA Security Entrust Secure Computing Entegrity Open Network Technologies A Wipro Baltimore Technologies As of January 2003 Niche Players Visionaries Source: Gartner Research Completeness of Vision Leaders Netegrity Netegrity abandoned its attempt to move beyond being a pure-play extranet access management vendor and announced that it would no longer offer the DataChannel portal product. Netegrity s large installed base, wide channel support and strong customer service capabilities provided advantages as IT spending slumped. However, the DataChannel acquisition forced Netegrity to compete with a wide array of portal and application server vendors, in addition to competing with other extranet access management providers. In late 2002, Netegrity announced a Web services transaction management product, TransactionMinder, as well as a core identity management product that will
4 compete with Oblix CoreID. However, Netegrity s long-delayed migration to the provisioning space has yet to bear fruit. IBM IBM has continued to execute its strategy of embedding Tivoli Access Manager (formerly Policy Director) into IBM s dominant products, such as WebSphere and MQSeries. WebSphere s strong position in the application server and portal market gives Tivoli Access Manager a strong advantage in the enterprise space. IBM s acquisition of Access360 enables it to accelerate the deployment of integrated provisioning capabilities via Tivoli Identity Manager across its product line. IBM s major weakness is a limited set of integration partners. Oblix Oblix made considerable progress in market strength and the completeness of its extranet access management offering in Oblix has been the primary beneficiary of the channel conflicts that Gartner forecast that Netegrity would experience after its acquisition of DataChannel. Oblix gained strong integration and business alliances with BMC Software, Plumtree Software and other vendors. Oblix s NetPoint product has been deployed successfully by large enterprises, with high marks by its customers for performance and after-sales support. Challengers Novell Novell made limited progress in advancing its ichain product in It mainly focused on rationalizing the Novell line of security products with a marketing and branding campaign. Novell s ichain 2.2 release should make it a more-competitive offering, but Novell will bring features to market more than a year after most of its competitors. ichain continues to be a cost-effective choice for enterprises that make extensive use of Novell s other products. However, it has limited channel support outside of Novell s base. Visionaries RSA Security RSA Security has completed the stabilization of Securant extranet access management software and the integration of Clear Trust into its product line. Because of its strength in the remote access token space, RSA Security has a strong worldwide channel and support structure. However, that strength has limited RSA Security s effectiveness in signing integration partners in the portal and application server space, where SecurID tokens are not a major factor. Entrust Entrust has moved away from enterprise infrastructure-based public-key infrastructure toward applications that integrate strong security (secure messaging and Web services). It has positioned GetAccess as a key product offering. Entrust has less visibility than RSA Security in the extranet access management market, mainly because of limited channel support. However, Entrust can build on a reputation for high-quality software and solid support.
5 Open Network Technologies Open Network Technologies made some important alliance deals with Microsoft s consulting services and Waveset in the provisioning space in Microsoft will push Open Network s DirectorySmart product to bridge Unix environments with Active Directory deployments. Although this will increase Open Network s visibility and deal flow, this type of relationship is a two-edged sword, as CyberSafe found out several years ago becoming associated with Windows-only deployments can cause a small vendor to be excluded from consideration by large enterprises. Niche Players Baltimore Technologies and Entegrity Baltimore Technologies and Entegrity dropped in their ability to execute because their financial status, partnering and visibility were reduced. They remain strong technology choices for niche environments. Secure Computing Secure Computing has developed PremierAccess to support its hardware token product. PremierAccess provides base rules-and-roles functionality, uniform resource locator protection and integration hooks. Although this offering does not compete with more-mature products in functionality, the tight integration with Secure Computing s token products makes it a solid choice for Secure Computing token customers. Therefore, we ve added Secure Computing to the Magic Quadrant. Wipro Wipro gained some enterprise wins and is a viable option, especially for enterprises that use Wipro s integration services. Not on the Map Gartner has removed or omitted the following vendors from the Magic Quadrant: Vasco Data Security s financial challenges will require it to focus on fewer product offerings. It has shown no evidence that it intends to advance its Vacman product. Microsoft has no product offering in this space, although it announced that its TrustBridge technology should be available when.net Server ships in 1H03. Gartner believes that Microsoft will position TrustBridge as.net Server features that, along with Commerce Server.NET, can be used to build an extranet access management solution for environments that use Active Directory or all- Windows servers. However, this will not occur until Computer Associates International released a 1.0 product for extranet access management in 4Q02, which is too new to market to be evaluated for the Magic Quadrant. Its etrust Web Access Control product is based on the Security for Open Systems technology that Computer Associates previously acquired from Memco Software.
6 Sun Microsystems Directory Server Access Management Edition never really became a product. It has been re-branded as the Sun ONE Identity Server 5.1, but it has experienced limited deployment. Calendra, based in France, offers Directory Manager for developing Lightweight Directory Access Protocol-centric applications. However, it doesn t provide much out-of-the-box functionality for integration with the typical applications that enterprises have developed. Secure Sockets Layer-based remote access vendors, such as Neoteris, SafeWeb, Netilla Networks and others, also offer some form of access control to Web-based applications. However, they don t support the variety of applications, Web servers and management capabilities that are required for effective extranet access management products. PassGo Technologies was re-established as a separate company in a management buyout from Symantec. PassGo acquired all of Symantec s authentication and access management products, including the WebThority extranet access management product. PassGo will need to demonstrate significant investment in advancing WebThority product capabilities and channel support for it to be a viable enterprise choice. Bottom Line The extranet access management market has broadened beyond extranets, and Gartner will consider this expansion in future research. Enterprises should continue to emphasize ease of integration when investing in extranet access management solutions. Written by Edward Younker,Research Products Analytical sources: John Pescatore and Ray Wagner, Gartner Research For related Inside Gartner articles, see: CIO Update: Answer Six Key Questions, Improve Internet Security, 6 November 2002
2003 Desktop Software Distribution Magic Quadrant
Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic
CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader
IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven
Magic Quadrant for a Fading PKI Market, 2003
Markets, V. Wheatman, R. Wagner Research Note 17 June 2003 Magic Quadrant for a Fading PKI Market, 2003 Pure-play public-key infrastructure vendors are disappearing due to failure or acquisition, or by
SSL VPN 1H03 Magic Quadrant
Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant The emerging Secure Sockets Layer virtual private network market is standards-based, with good short-term return on investment
Job Scheduling Magic Quadrant Reflects New Challenges
Markets, M. Govekar Research Note 23 January 2003 Job Scheduling Magic Quadrant Reflects New Challenges In 2003, job scheduling systems should be starting to address new platforms and environments. Some
Magic Quadrant for Application Platform Suites, 2Q03
Markets, Y. Natis, M. Pezzini, G. Phifer, C. Haight, M. Driver Research Note 5 May 2003 Magic Quadrant for Application Platform Suites, 2Q03 Application platform suites are incrementally assembled or bought
EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02
Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite
Management Update: CRM Suites Magic Quadrant for North American Midsize Businesses
Article 16 April 2003 Management Update: CRM Suites Magic Quadrant for North American Midsize Businesses In the Gartner CRM Suites Magic Quadrant for North American Midsize Businesses, Onyx Software, Pivotal
Research. Identity and Access Management Defined
Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from
Vendor Classification
Markets, L. Geishecker, F. Buytendijk Research Note 2 October 2002 Introducing the CPM Suites Magic Quadrant Vendors are developing a wide range of new functionality for corporate performance management.
CIO Update: The Gartner Firewall Magic Quadrant for 2H02
IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market
SAN Management Software Magic Quadrant
Markets, C. DiCenzo, R. Paquet, N. Allen, R. Passmore Research Note 22 April 2003 SAN Management Software Magic Quadrant In the storage area network management software market, expect increased competition
Magic Quadrant for Integrated Document Management, 2003
Magic Quadrant for Integrated Document Management, 2003 Document management has moved to the forefront of many enterprises' purchasing lists. Our 2003 Magic Quadrant explains the complexities of the integrated
The Four "A's" of Information Security
Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
SSL VPN 1H03 Magic Quadrant Evaluation Criteria
Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant Evaluation Criteria Secure Sockets Layer virtual private networks are simple, portable and convenient alternatives to IPsec, and
Management Update: CRM Success Lies in Strategy and Implementation, Not Software
IGG-03122003-01 D. Hagemeyer, S. Nelson Article 12 March 2003 Management Update: CRM Success Lies in Strategy and Implementation, Not Software A customer relationship management (CRM) package doesn t ensure
IBM Tivoli Identity Manager
Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces
Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002
IGG-10232002-03 J. Holincheck Article 23 October 2002 Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 The market for large-enterprise human resources management system (HRMS)
Management Update: Gartner s 2003 Learning Management System Magic Quadrant
IGG-02262003-01 J. Lundy Article 26 February 2003 Management Update: Gartner s 2003 Learning Management System Magic Quadrant Demand for learning management systems increased in 2002, and so did the number
Magic Quadrant for Corporate Telephony in EMEA, 2003
Markets, S. Blood, C. Lock Research Note 2 September 2003 Magic Quadrant for Corporate Telephony in EMEA, 2003 Cisco and Alcatel continue to offer the market's most comprehensive corporate propositions.
The Magic Quadrant Framework
Markets, B. Eisenfeld, F. Karamouzis Research Note 14 November 2002 Americas CRM ESPs: 2003 Magic Quadrant Criteria Gartner has developed high-level evaluation criteria for the 2003 Americas customer relationship
Partner Relationship Management: 2003 Magic Quadrant
Markets, R. DeSisto, C. Marcus Research Note 11 February 2003 Partner Relationship Management: 2003 Magic Quadrant In the latest Gartner PRM Magic Quadrant, Siebel remains the sole PRM leader. Allegis,
2003 Enterprise Backup/Restore Magic Quadrant
Markets, C DiCenzo, R Paquet Research Note 9 May 2003 2003 Enterprise Backup/Restore Magic Quadrant The backup/restore software market is maturing, with a limited number of vendors competing for the bulk
Business Applications and Infrastructure Entwined
Markets, S. Hayward, B. Burton, J. Comport, Y. Genovese, T. Bittman Research Note 9 July 2003 Business and Infrastructure Entwined Oracle's bid for PeopleSoft encompasses more than applications. It illustrates
Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore
Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore Source: Gartner Note Number: G00127958 Leading storage service providers in North America are executing on clear
Security solutions Executive brief. Understand the varieties and business value of single sign-on.
Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies
Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03
Markets, H. Dresner, B. Hostmann, F. Buytendijk, A. Tiedrich Research Note 25 August 2003 Magic Quadrants for EBIS/Reporting and BI Platforms, 2H03 The business intelligence technology markets continue
Strategic Sourcing Magic Quadrant Criteria: An Explanation
Markets, D. Hope-Ross, J. Woods Research Note 14 March 2003 Strategic Sourcing Magic Quadrant Criteria: An Explanation A new Gartner Magic Quadrant for strategic sourcing applications is being introduced.
Federated Identity in the Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember
Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant
IGG-02192003-03 R. Matlus Article 19 February 2003 Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant The North American help desk outsourcing market is growing despite a down economy.
Business Intelligence: The European Perspective
Markets, F. Buytendijk Research Note 5 November 2002 Business Intelligence: The European Perspective When choosing business intelligence products, European users are not that different from North American
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
SIEM and IAM Technology Integration
SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security
By 2007, 80 percent of enterprise communications purchase decisions will require support for unified communications (0.6 probability).
Page 1 of 5 Magic Quadrant for Unified Communications, 2005 14 February 2005 Bern Elliot Steve Blood Drew Kraus Source: Gartner Note Number: G00125707 Unified communications technology and applications
The Identity and Access Management Market Landscape
Research Publication Date: 7 November 2003 ID Number: COM-21-4534 The Identity and Access Management Market Landscape Roberta J Witty Integrating identity and access management components into an overall
Management Update: How to Implement a Successful ERP II Project
IGG-09252002-02 B. Zrimsek, P. Phelan Article 25 September 2002 Management Update: How to Implement a Successful ERP II Project Gartner provides insights and recommendations on how enterprises can make
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for
Integrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
Management Update: Gartner s BI Magic Quadrant Update Sailing in Rough Waters
IGG-09112002-02 H. Dresner Article 11 September 2002 Management Update: Gartner s BI Magic Quadrant Update Sailing in Rough Waters Although the business intelligence (BI) market continues to ride out the
Strategic Sourcing Applications Magic Quadrant, 1Q03
Markets, D. Hope-Ross, C. Eschinger, A. Kyte Research Note 17 March 2003 Strategic Sourcing Applications Magic Quadrant, 1Q03 Strategic sourcing applications are emerging, despite market immaturity. Applications
National Student Clearinghouse's Web Services Network
Case Studies, B. Lheureux Research Note 3 January 2003 National Student Clearinghouse's Web Services Network NSC provides access to U.S.-based college and university student records via electronic data
CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow
IGG-03192003-03 D. Vecchio Article 19 March 2003 CIO Update: Legacy Modernization Magic Quadrant Helps in Providing Applications for Tomorrow The conversion of aging applications to more modern architectures
The Business Rule Engine 2003 Magic Quadrant
Markets, J. Sinur Research Note 7 April 2003 The Business Rule Engine 2003 Magic Quadrant Business rule engines are moving toward maturity. In 2003, they will support business agility when called on to
ORACLE FUSION MIDDLEWARE PROFILE
ORACLE FUSION MIDDLEWARE PROFILE Corporate Addvantum, is a global service provider of Information Technology consulting and services, to customers in GCC region. Addvantum has technical delivery centers
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
SAML:The Cross-Domain SSO Use Case
SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 [email protected] Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Server Vendors' High-Availability Services: Magic Quadrant
Markets, A. Mac Neela, B. Igou, E. Rocco Research Note 30 September 2002 Server Vendors' High-Availability Services: Magic Quadrant User demand for high availability of critical systems is driving the
Troux Configuration Management Software
Sharon Fisher Product Report 5 December 2003 Troux Configuration Management Software Summary With the Troux Blueprinting System, Troux hopes to help create a new market with software to map an information
Implementing Business Portal in an Extranet Environment
Implementing Business Portal in an Extranet Environment Published: December 2005 Table of contents Introduction...1 What is extranet access?...1 Why deploy Business Portal in an extranet?...1 Order Management...1
IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
Windows Server 2003 Active Directory: Perspective
Mary I. Hubley, MaryAnn Richardson Technology Overview 25 September 2003 Windows Server 2003 Active Directory: Perspective Summary The Windows Server 2003 Active Directory lies at the core of the Windows
Patch management point solution. Platform. Patch Management Point Solution
Markets, R. Colville, M. Nicolett Research Note 18 March 2003 Patch Management: Identifying the Vendor Landscape As the importance of patch management increases, it is important to understand the limitations
Single Sign-On Systems
Helsinki University of Technology Telecommunications Software and Multimedia Laboratory Research Seminar in Telecommunications Business I T-109.501 Single Sign-On Systems 19.11.2002 Tomi Määttänen 45342K
PLM Eclipses CPC as a Software Market
Markets, M. Halpern, K. Brant Research Note 20 March 2003 PLM Eclipses CPC as a Software Market Gartner is retiring the Collaborative Product Commerce Magic Quadrant and introducing the Product Life Cycle
SAML: The Secret to Centralized Identity Management
1 of 7 1/10/2007 9:05 AM December 2004 http://www.intelligententerprise.com/showarticle.jhtml?articleid=54200324 SAML: The Secret to Centralized Identity Management Complicated by too many systems, too
EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report
KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing
EMEA CRM Analytics Suite Magic Quadrant 3Q02
Markets, J. Radcliffe, G. Herschel Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant 3Q02 SAS Institute leverages its strength in analytics to take the lead in the immature CRM analytics
Defining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant.
Markets, M. Halpern Research Note 18 March 2003 Defining the PLM Magic Quadrant by Criteria and Use We provide the methodology used in developing our product life cycle management Magic Quadrant. Core
Magic Quadrant for Data Center Outsourcing, 4Q03
Markets, R. Matlus, W. Maurer, L. Scardino, B. Caldwell Research Note 12 November 2003 Magic Quadrant for Data Center Outsourcing, 4Q03 Gartner's positioning of the 14 external service providers in the
Management Update: The Eight Building Blocks of CRM
IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful
Security and Identity Management Auditing Converge
Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,
Magic Quadrant for Global Enterprise Desktops and Notebooks
Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
Management Update: The Importance of Developing a CRM Strategy
IGG-10302002-03 J. Kirkby Article 30 October 2002 Management Update: The Importance of Developing a CRM A customer relationship management (CRM) strategy states how to turn a customer base into an intangible
The PC life cycle configuration management Market Overview
Magic Quadrant for PC Life Cycle Configuration Management, 2005 Gartner RAS Core Research Note G00131185, 17 October 2005, Ronni J. Colville, Michael A. Silver, R1580 05052006. The PC life cycle configuration
SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management
Solution in Detail NetWeaver Business-Driven, Compliant Identity Table of Contents 3 Quick Facts 4 Business Challenges Identity for the User Lifecycle 5 The Solution Supporting a Heterogeneous IT Landscape
Approaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Management Update: The Cornerstones of Business Intelligence Excellence
G00120819 T. Friedman, B. Hostmann Article 5 May 2004 Management Update: The Cornerstones of Business Intelligence Excellence Business value is the measure of success of a business intelligence (BI) initiative.
Simplify and Automate IT
Simplify and Automate IT The current state of IT INCIDENT SERVICE LEVEL DATA SERVICE REQUEST ASSET RELEASE CONFIGURATION GOVERNANCE AND COMPLIANCE EVENT AND IMPACT ENTERPRISE SCHEDULING DASHBOARDS CAPACITY
