EMC Acquires Data Domain, Becomes Deduplication Leader, Signals Deduplication as a "Must Have" Capability
|
|
|
- Sherman Corey Gordon
- 10 years ago
- Views:
Transcription
1 Research Publication Date: 25 August 2009 ID Number: G EMC Acquires Data Domain, Becomes Deduplication Leader, Signals Deduplication as a "Must Have" Capability Dave Russell EMC's acquisition of Data Domain provides EMC with expanded revenue opportunities, including industry-leading data deduplication technology and a likely alternative and/or replacement for EMC's current deduplication and virtual tape library (VTL) solutions. The purchase makes EMC the dominant deduplication vendor in a move that sends a message to the storage industry that deduplication is now a critical capability. Key Findings EMC significantly bolsters its deduplication capabilities with Data Domain's mature technology, and becomes the market share leader in deduplication solutions by owning the market's top-selling, client-based and target-side deduplication products. Leveraging its large global sales force and partner ecosystem, EMC can quickly sell the Data Domain portfolio, because no new development or integration is required. Expect the current Quantum-based Disk Library (DL) 1500 and DL 3000 deduplication appliances to be supported by EMC, but phased out in favor of Data Domain. Within a few years, expect the FalconStor-based DL 4000 VTL solution to be replaced with Data Domain technology as well. With acquisitions of Avamar for client-side deduplication and Data Domain for targetside deduplication, EMC has made this technology a must-have function, as the efficiencies and cost containment potential for this feature will be too compelling to ignore. Recommendations Data Domain customers should: Expect added security and investment protection for current deployments. Be proactive in managing possible unwanted changes in local support staff or procedures. Be quick to escalate support issues to reduce the time to reach product specialists. EMC customers should: Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.
2 Current DL 1500 and 3000 customers should regard these Quantum-based solutions as essentially stabilized offerings that Gartner believes will be phased out in the near future. Current DL 4000 customers of the FalconStor-based VTL should hold off on the current Quantum-based deduplication option for the DL 4000 series, as Gartner believes that EMC will replace the current deduplication option with a Data Domainbased option. Current DL users should review the planned service lives of their disk-based backup solutions in expectation of EMC functionally stabilizing these products. DL for Mainframe (DLm) customers should weigh future mainframe VTL investments against the cost and capabilities of a Data Domain-based solution combined with a gateway device, such as Data Domain's current partner, Luminex. EMC DL and Data Domain prospects should: Base purchasing decisions only on currently shipping products and capabilities, not on future possibilities. Regarding deduplication in general: In May 2007, Gartner said that deduplication is a transformational technology with the potential for significant cost savings and expanded quality of service capabilities (see "Data Deduplication Is Poised to Transform Backup and Recovery"). We reiterate this assessment, and advise clients to investigate deduplication technologies for use in addressing current and anticipated storage challenges. Although deduplication currently is used largely for backup activity through a file or VTL interface, this technology can be used for archive and primary data and should increasingly be considered for such applications. Publication Date: 25 August 2009/ID Number: G Page 2 of 10
3 TABLE OF CONTENTS Strategic Planning Assumption(s)... 4 Analysis What You Need to Know Event Facts Data Domain EMC's Previous Deduplication Technology EMC's Acquisition and Partnership History EMC and Data Domain Data Domain Implications From the EMC Acquisition Future EMC Implications... 8 Recommended Reading... 9 Publication Date: 25 August 2009/ID Number: G Page 3 of 10
4 STRATEGIC PLANNING ASSUMPTION(S) By 2014, deduplication will be a standard feature in all backup products and applied to 75% of backups. By 2014, some form of primary data reduction, such as compression and/or deduplication, will be used for at least 20% of all enterprise primary storage workloads, up from low, single digits in In 2014, deduplication will be widely available for blocks and files, and pervasive in application software, middleware, operating systems, appliances and storage arrays. ANALYSIS 1.0 What You Need to Know EMC's July 2009 acquisition of Data Domain, combined with the November 2006 purchase of Avamar, now makes EMC the market leader in backup deduplication technologies. Gartner reiterates the assessment that deduplication is a transformational technology, and we advise clients to investigate deduplication for use in addressing current and anticipated storage challenges ranging from cost containment to improved quality of service. 2.0 Event Facts On 23 July 2009, EMC announced that it had completed the acquisition of deduplication vendor Data Domain. In its second-quarter 10Q filed on August 6, EMC indicated that it acquired all the capital stock of Data Domain for approximately $1.9 billion in cash, which was net of Data Domain's cash and investment balances of $240.5 million. The completion of the acquisition brings to an end a bidding war between EMC and NetApp over Data Domain that started with a $1.5 billion offer from NetApp at the end of May. EMC stated that it intends to create a new product division within EMC's storage business that will focus on next-generation data protection, and that the plan is for all of Data Domain's employees to join EMC. 3.0 Data Domain Founded in 2001, Data Domain offers data deduplication solutions, shipping its first product in early Data deduplication is the activity of dividing a file into smaller "chunks," or segments, of data and comparing each segment to a catalog of chunks that have been previously processed by a backup application, archiving solution or a disk-based appliance. If a segment has been processed before, then a pointer is made to the previous copy of the data instead of storing it again. This process can result in significant disk savings, often in the range of 15 times or higher for backup workloads. Data Domain focused on the backup market, expounding a message of tape replacement, offering appliances that are placed after the backup server that perform "inline" deduplication to remove redundant data before the backup server writes data to the disk. Due to where deduplication occurs (after the backup server), Data Domain's approach is referred to as "target-side" deduplication. While Data Domain's devices could be used for archival data and for primary data through its file interface, Gartner believes that more than 90% of the appliances sold were used for backup data. As an early provider of deduplication, Data Domain has delivered six major software revisions and many processor upgrades, improving performance and capacity and extending its replication capabilities. At the time of the acquisition announcement, Data Domain is a mature provider of Publication Date: 25 August 2009/ID Number: G Page 4 of 10
5 deduplication technology, with approximately 825 employees, approximately 3,100 customers and over 8,000 systems deployed. For Data Domain, this acquisition represents the best possible exit strategy. Data Domain had grown very quickly and had enjoyed relatively little competition during most of its history, but that was beginning to change. Beginning in 2008, other major storage vendors, such as EMC and IBM, made acquisitions or OEM agreements in the deduplication market. Additionally, ExaGrid Systems, FalconStor, HP, NEC, Ocarina Networks, Permabit, Quantum, Sepaton and Sun Microsystems entered the market with enhanced disk solutions with deduplication capabilities. Gartner expects that by the end of 2009 every major storage vendor will have some form of competing solution, and that issues such as account control, routes to market, pricing, channel partner saturation and "good enough" solutions would have eventually limited Data Domain's growth. Gartner believes that many current Data Domain channel partners will continue selling Data Domain products. However, Gartner expects that some Data Domain partners may have concerns over EMC's ownership and the likely Dell reselling of the product, and that a subset of Data Domain partners will seek alternative solutions this may particularly be an issue for partners that sell Data Domain and NetApp offerings, and/or compete against EMC and Dell. 4.0 EMC's Previous Deduplication Technology EMC already appeared to be well-positioned for deduplication. It acquired Avamar for deduplication in 2006, completed an OEM agreement in 2008 with Quantum for deduplication appliances and, in 2009, began shipping data reduction technology that EMC called "file deduplication" at no cost in its network-attached storage (NAS) solutions to compete with NetApp. EMC acquired Avamar in November 2006 for client-side deduplication for $165 million in cash. Avamar's solution was an early-to-market deduplication product that was a software combination of deduplication and a backup application that deduplicates data before it is transmitted across the network to a backup server (hence the name "client-side deduplication," as the data is reduced at the source, or client). EMC quickly moved to package the Avamar software into an appliance that had the components preinstalled and integrated. The Avamar Data Store appliance has been a highly successful product, and EMC recently announced that the Avamar portfolio is experiencing a 44% growth rate, making it one of EMC's fastest-growing storage products. Gartner has seen EMC's direct sales force and partners push the Avamar solution in many bids, and customer reactions to the appliance packaging has been favorable. In 2007, EMC announced that it would offer target-side deduplication by Target-side deduplication performs the data reduction process after the backup server sends data to a disk target, thus any application data, operating system and backup solution usually are supported. In one of the most speculated activities of 2008, EMC announced in June 2008 that despite an OEM agreement and a successful VTL product line based on FalconStor technology, rather than adopting FalconStor's deduplication, EMC was entering in to an OEM agreement with Quantum to license deduplication and VTL software. Similar to the Avamar Data Store, EMC again offered an appliance. The new EMC DL 1500 and 3000 solutions were based on Quantum deduplication and VTL technology with no FalconStor code. However, EMC also delivered a deduplication option to its FalconStor-based DL 4000 VTL whereby a Quantum-based appliance would perform deduplication on data after it was written to the DL 4000 VTL. Why did EMC look for another deduplication partner when its current VTL provider already had the capability? At the time of the decision, the installed base and the number of production implementations with FalconStor's deduplication was much lower than Quantum's installed base. Also, Quantum's architecture completely bundled in deduplication and VTL capabilities, and had Publication Date: 25 August 2009/ID Number: G Page 5 of 10
6 a file interface (using Common Internet File System [CIFS] and Network File System [NFS] protocols), whereas FalconStor had not yet offered the same level of integration and capabilities (this has since changed in 2009). Additionally, EMC may have favored Quantum's ability to, at times, perform "in-line" deduplication, whereby data is deduplicated as it is being written to the device, whereas FalconStor provided "post processing" deduplication that writes all data to disk first and then performs deduplication as a background process. Why did EMC acquire Data Domain if EMC already had target-side deduplication solutions in the market? Gartner inquiry regarding the Quantum-based DL solutions indicated challenges with the Quantum approach. Concerns over the speed of the deduplication process when the device performed in-line deduplication, the level of robustness in the replication capability and, most especially, the need to have extra disk capacity available as the solutions would often have to resort to postprocessing deduplication led to some installations where customer expectations were not met. By contrast, Data Domain delivered its first deduplication appliance to market nearly three years ahead of Quantum. Gartner estimates that Data Domain had approximately three and a half times as many customers and just more than five times as many deduplication appliances in production, compared with the combined Quantum and EMC deployments at the time of the acquisition. Additionally, Data Domain offered faster in-line deduplication speeds, a broader range of appliances and more-robust replication, and possessed most of the deduplication "mind share" in the industry. EMC may have also seen the Data Domain buy as a defensive move whereby the technology was kept out of the hands of rival NetApp's direct sales force and partners' hands. 5.0 EMC's Acquisition and Partnership History EMC has relied heavily on acquisitions and OEM agreements to drive its growth in the storage market, particularly in the backup and recovery market. In the past six years, EMC has made approximately a dozen acquisitions and three OEM deals in the backup space. Some of EMC's storage acquisitions have been very large, such as Data General, Legato and now Data Domain (each at more than $1 billion), while other acquisitions have been comparatively smaller, such as Avamar, Berkeley Data Systems, Dantz, Kashya, Iomega and others. EMC's storage software strategy has been to strive to "check the boxes early" for emerging functions and capabilities, and to sell into its storage installed base, leveraging its large sales force and customer account relationships. When early solutions no longer seem appropriate, EMC is willing to change gears to provide more-robust solutions, as was the case for continuous data protection (CDP) in 2005, when EMC was early to offer a solution (RecoverPoint) that was based on an OEM relationship with the now defunct Mendocino Software. EMC replaced Mendocino seven months later with the acquisition of Kashya, which offered superior technology. Likewise, in September 2006, EMC released a data classification product called Infoscape that was based on a combination of existing EMC solutions, but, in April 2007, EMC acquired Tablus for content monitoring and later in 2007 Infoscape was discontinued. Similarly, in 2007, EMC investigated the target-side deduplication feature of its existing VTL supplier, FalconStor, then in 2008 chose to strike an OEM deal with Quantum for the capability, and now, in 2009, has invested in owning the intellectual property via the acquisition of Data Domain. In the last 10 years, EMC has made more than 30 storage technology and company acquisitions. While the merger and acquisition activity has substantially added to the assets that EMC possesses, issues of product overlap, positioning and customer, partner and sales force confusion can arise. Integrating a large number of solutions and/or swapping out technologies can also prove to be time-consuming and expensive. The net result can be the impression that the strategy is more opportunistic than methodical; however, Gartner believes that EMC often looks to be an early mover, or to test the market through partnerships and then to acquire when demand and/or the technology is proven. Publication Date: 25 August 2009/ID Number: G Page 6 of 10
7 6.0 EMC and Data Domain Initially, EMC plans no major changes for the Data Domain portfolio or its employees, all of whom are reported to have been offered a position within EMC. Importantly, EMC has also stated that R&D investment in the Data Domain product portfolio will be increased. EMC has further stated that Data Domain will eventually form the cornerstone of a new EMC division within the current storage business, which will focus on next-generation data protection. The exact title of the new division and the products it will comprise are still under evaluation; however, EMC CEO Joe Tucci has publicly said that offerings such as Data Domain, Avamar and the DL VTL portfolio are all strong candidates. According to Tucci, the intent of the new division is to reach $1 billion in revenue by the end of 2010 with a combination of product and related service revenue from Data Domain and EMC's Avamar products alone. Gartner believes that the new division would benefit from a broad portfolio of EMC's backup and recovery offerings, and, therefore, believes that Avamar, Data Domain, EMC's DL systems (FalconStor and Quantumbased), NetWorker and other EMC data protection products are also being considered as part of the portfolio for this new division. Former Data Domain CEO Frank Slootman has been tapped to head the new division and will report to EMC CEO Joe Tucci and to Frank Hauck, head of EMC's overall storage business. Data Domain reported on its last quarterly earnings call that its average sales transaction was approximately $113,000. With an acquisition price of $1.9 billion, excluding maintenance revenue potential and the modest installation charge, roughly 16,800 new transactions at the current average deal size would need to be completed to break even on the deal. Gartner believes that EMC has the potential to dramatically increase the average Data Domain deal size, sell more services and sell more of its storage portfolio. However, it's obvious that many thousands of transactions need to occur to recoup the acquisition cost of the deal. EMC has moved quickly to offer positioning on where its deduplication assets best fit. EMC will need to quickly and effectively communicate the positioning to its field force, partners and, of course, its customers and prospects. Gartner believes that EMC can double and perhaps triple the average Data Domain deal size primarily due to EMC's substantial installed base and its penetration of large enterprise accounts. EMC is a heritage storage company that has expanded into other areas. EMC competes against portfolio vendors, such as HP, IBM and Sun, all of which also happen to sell storage Hitachi Data Systems and NetApp are high-profile exceptions to this. With EMC's significant installed base, access to very large accounts, strong account control and combined 9,300 plus storage field force (EMC had more than 9,000 storage field resources, and Data Domain had over 400), EMC has the routes to market, relationships and brand image to push a great deal of Data Domain solutions. The EMC/Dell relationship only adds to the ability to secure new deals. By owning both Avamar and Data Domain, EMC has acquired two of the most mature deduplication solutions. Data Domain introduced its first deduplication product in late 2002, and Avamar introduced its first deduplication solution in early Avamar is the market-leading product in client-side deduplication, and Data Domain is the market-leading offering of target-side deduplication. Thus, EMC must now be considered the market leader in deduplication. 7.0 Data Domain Implications From the EMC Acquisition Data Domain's board of directors twice accepted offers from NetApp to acquire Data Domain. Data Domain accepted NetApp's first offer of $1.5 billion in cash and stock, then accepted NetApp's improved offer of $1.8 billion in cash and stock after EMC made on offer for the company. This sent the signal that Data Domain wanted to be acquired by NetApp and not by Publication Date: 25 August 2009/ID Number: G Page 7 of 10
8 EMC, which raises the question: "How well will key Data Domain management and employees integrate with EMC?" Data Domain's chief technology officer was a former NetApp employee, and other employees had a lineage that traces back to NetApp. Additionally, Data Domain's three main locations are all near NetApp facilities. Gartner believes that the Data Domain direct sales force is likely to view EMC ownership as preferable to NetApp, as the prospect of larger deal sizes will be enticing. Typically, acquiring companies offers attractive retention packages for key management and engineers, and EMC likely secured several years of Data Domain's top talent, thus reducing the risk of a "brain drain" due to a mass exodus of key individuals. Still, there may be cultural items to work through; however, the fact that Data Domain's CEO will lead the new division at EMC of which Data Domain will be a key piece may appease concerns by former Data Domain employees. EMC has publicly stated that it intends to increase the level of R&D investment in Data Domain solutions, and this should be well-received by the Data Domain team. 8.0 Future EMC Implications Gartner does not believe that Avamar investments or futures are in jeopardy as a result of the Data Domain acquisition. EMC's current sales focus on Avamar solutions is likely to continue, even in light of EMC's recent buy. Avamar is a fast-growing product within EMC, and Avamar possesses advantages over Data Domain for a number of use cases in remote-office, servervirtualized and NAS backups. There will be some overlap for data center backup workloads, and some future Avamar sales are likely to be supplanted by Data Domain products. In 2010, expect EMC to investigate manufacturing changes for Data Domain, including the transition of Data Domain products from current Xyratex disk shelves to EMC-based disk. Gartner believes that by 2010 the EMC-Quantum relationship for disk-based appliances will have terminated. Note that EMC is Quantum's largest tape reseller, and this is likely to continue. Gartner predicts that by 2011 the FalconStor-based VTLs will give way to a Data Domain-based solution, as in the next two years the need to emulate physical tape will be supplanted by the desire for well-integrated advanced disk solutions. EMC's current OEM relationship with Bus- Tech for its mainframe VTL solution, the DLm, could also dissolve, though this has not been decided, in favor of a Data Domain solution. Currently, Data Domain has approximately 25 mainframe installations that utilize a Luminex gateway device to convert mainframe data to an open-system format. Looking further into the future, the new EMC next-generation data protection division could extend not only existing products, but also could develop and bring to market entirely new backup solutions that would capitalize on EMC's many backup and recovery assets. However, rationalizing the various products and integrating several current offerings and/or designing brand new solutions are likely to take some time. Today, deduplication is most frequently deployed for backup activities. In large part, this is due to the highly repetitive nature of the backup process, which captures the same data again and again, leading to redundancies that deduplication is very good at factoring out. Data reduction can also be beneficial for archiving and for primary data (see "Emerging Technology Analysis: Primary Data Deduplication, Storage Software and Hardware Technologies"), and EMC is likely to explore how Data Domain's technology can fit into its future disk, NAS and archiving solutions. By moving beyond backup, EMC will have acquired Data Domain not only as a means of obtaining a fast-growing backup disk appliance, but will also have added hundreds of storage engineers and salespeople and added functionality to its storage portfolio to differentiate itself from competitors such as 3PAR, Compellent, Hitachi Data Systems, HP, IBM and NetApp. Publication Date: 25 August 2009/ID Number: G Page 8 of 10
9 RECOMMENDED READING "How EMC's Data Domain Buy Will Affect the Industry:" EMC's high-profile bidding war and ultimate buy of Data Domain has significantly raised the awareness level of deduplication in the industry; in the future, this deal could trigger additional partnerships and/or business development activity. "Data Deduplication Is Poised to Transform Backup and Recovery:" Data deduplication is an advanced form of data compression. The use of this technology is poised to transform the way data is protected, improving backup and recovery times, as well as the economics of disk-based approaches. "Use Data Deduplication to Improve Availability and Lower Cost:" Organizations continue to evaluate data deduplication as they seek new, cost-effective ways to store data. This research examines the benefits of deduplication, focusing on its effect on data availability, and addresses concerns about risk. "Emerging Technology Analysis: Primary Data Deduplication, Storage Software and Hardware Technologies:" Primary data reduction is getting more traction as IT departments look to reduce the ever-expanding footprint of data in their storage environments. "SWOT: NetApp, Worldwide, 2008:" This strength, weakness, opportunity and threat (SWOT) analysis examines the key factors Gartner expects will have the greatest impact on NetApp's strategy and market position in the global, external-controller-based disk storage market today, and during the next 12 months. "Vendor Rating Update: EMC's Information Infrastructure Business:" This research is a 2Q09 update to Gartner's evaluation of EMC's information infrastructure business. "Four Technologies That Midsize Businesses Should Consider in 2009:" This analysis identifies four technologies that have not been widely adopted in the midmarket, but have reached a level of maturity and affordability that makes them good investments for midsize businesses. "IBM Legitimizes Enterprise-Level Deduplication with Diligent Buy:" IBM's acquisition of Diligent Technologies gives significant visibility and legitimacy to data deduplication, which will speed the evolution and adoption of the technology in general. Publication Date: 25 August 2009/ID Number: G Page 9 of 10
10 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 25 August 2009/ID Number: G Page 10 of 10
Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
Eight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
Q&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
Deliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
Key Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
Best Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
The IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives
Gartner Updates Its Definition of IT Infrastructure Utility
Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
IT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
The Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
Bankinter Differentiates Itself by Focusing on Innovation and CRM
Research Publication Date: 4 October 2005 ID Number: G00127276 Bankinter Differentiates Itself by Focusing on Innovation and CRM John Radcliffe Bankinter successfully competes in the Spanish banking market
Real-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
The Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
Cloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
IT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
Toolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success
Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical
The What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
Mainframe Modernization: When Migration Is the Answer
Research Publication Date: 8 January 2010 ID Number: G00171622 Mainframe Modernization: When Migration Is the Answer Dale Vecchio Mainframe migrations can be executed in a number of ways. Which choice
Roundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
Containers and Modules: Is This the Future of the Data Center?
Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet
Successful EA Change Management Requires Five Key Elements
Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
ERP, SCM and CRM: Suites Define the Packaged Application Market
Research Publication Date: 25 July 2008 ID Number: G00158827 ERP, SCM and CRM: Suites Define the Packaged Application Market Yvonne Genovese, Jeff Woods, James Holincheck, Nigel Rayner, Michael Maoz Users
User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009
Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly
How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
Gartner Clarifies the Definition of the Term 'Enterprise Architecture'
Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,
CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost
G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
X.509 Certificate Management: Avoiding Downtime and Brand Damage
G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity
Recognize the Importance of Digital Marketing
Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated
Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game
Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s
Agenda for Supply Chain Strategy and Enablers, 2012
G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling
Repurposing Old PCs as Thin Clients as a Way to Save Money
Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers
Governance Is an Essential Building Block for Enterprise Information Management
Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways
Overcoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.
Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for
The Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
MarketScope for IT Governance, Risk and Compliance Management, 2008
Research Publication Date: 11 February 2008 ID Number: G00154941 MarketScope for IT Governance, Risk and Compliance Management, 2008 Paul E. Proctor, Mark Nicolett, French Caldwell The IT GRCM market was
2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase
Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial
Choosing a Replacement for Incumbent One-Time Password Tokens
Research Publication Date: 21 April 2011 ID Number: G00212244 Choosing a Replacement for Incumbent One-Time Password Tokens Ant Allan This research outlines the options for enterprises seeking replacements
What to Consider When Designing Next-Generation Data Centers
Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,
How BPM Can Enhance the Eight Building Blocks of CRM
Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's
Risk Intelligence: Applying KM to Information Risk Management
Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance
Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.
Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important
IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
Global Talent Management Isn't Just Global
Research Publication Date: 22 July 2008 ID Number: G00159366 Global Talent Management Isn't Just Global Thomas Otter Global talent management projects must take into account local compliance issues or
NGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality
Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers
