How to Develop an Effective Vulnerability Management Process
|
|
|
- Eric Washington
- 10 years ago
- Views:
Transcription
1 Research Publication Date: 1 March 2005 ID Number: G How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes that protect IT environments against external attack and internal threats, and ensure corporate compliance with government regulations. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 WHAT YOU NEED TO KNOW IT security organizations should implement a vulnerability management process that includes a vulnerability assessment and security configuration baseline. Mitigation activity should be prioritized based on the severity of the vulnerability, the current threat environment and the business use of the vulnerable asset. Shielding should be used to protect vulnerable assets until mitigation is completed. The root cause of vulnerabilities should be identified and eliminated through improvements in network, server and PC configuration polices, and better change management and administrative processes. ANALYSIS A major responsibility of IT security organizations is to define and operationalize security policies that protect the IT environment from external and internal threats, and also provide compliance with regulations. Effective protection of IT resources requires a combination of approaches that include: Vulnerability management Shielding at the network and system layers Network access control (see "Protect Your Resources With a Network Access Control Process") Vulnerability management is an ongoing process that establishes and maintains security policies for network and system resources; discovers, prioritizes and mitigates vulnerabilities; and eliminates their root causes (see Figure 1). Figure 1. Vulnerability Management Process Policy Define desired state (configuration, identity and access management) Monitor Policy compliance Vulnerabilities Threat environment Maintain Discover/Baseline Determine policy compliance Identify vulnerabilities Prioritize Vulnerability data, Threat data Asset classification Shield Controls/ Eliminate Root Cause Source: Gartner Research (February 2005) Mitigate High-priority vulnerabilities Publication Date: 1 March 2005/ID Number: G Page 2 of 6
3 The vulnerability management process consists of seven steps: Step 1: Policy The first step to improve IT security is defining the desired states for network and system configurations, resource protection and resource access. This requires the creation of policies that define secure configurations for network devices, servers, personal computers and other IT components; administrative constructs for users and application resources; and administrative processes that implement the policies. Step 2: Discovery and Baseline The next step is discovery of the network, system, desktop and data components that comprise the IT infrastructure, followed by the establishment of a security baseline. The discovery and baseline step must encompass systems that are corporate-owned and managed, and corporateowned and unmanaged, as well as external systems and applications that access the corporate network. Vulnerability Assessment: Vulnerability assessment provides a "bottom-up" baseline of the environment with respect to a database of known vulnerabilities. IT security organizations require a network-based approach that does not require management agents and can discover and evaluate vulnerabilities in managed and unmanaged systems. Many vulnerabilities are the result of configuration issues. Elimination of configuration-oriented vulnerabilities and their root causes requires a second baseline perspective compliance with security configuration standards. Security Configuration Policy Compliance: Security configuration policy compliance (SCPC) provides a "top-down" baseline of the environment with respect to security configuration policies that are organization-specific but are derived from industry-recognized best practices such as the Microsoft Security Guide, the SANS (SysAdmin, Audit, Network, Security) Institute, the Center for Internet Security, the National Institute of Standards and Technology or the National Security Agency vendor-defined interpretations of regulatory requirements, or corporate-defined configuration standards. The SCPC baseline audits the environment and discovers deviations from an organization's security configuration policies. An SCPC baseline is well-suited to the work of vulnerability remediation. The initial steps of configuration policy development force the collaboration of IT security and IT operations, and ultimately lead to the elimination of the root cause of configuration- or administration-based vulnerabilities. Policy definition and periodic audits are also important components of an organization's regulatory compliance program. Standard configurations are a prerequisite for automated-provisioning processes, and support higher levels of availability and reduced operations costs. Convergence of Vulnerability Assessment and Security Configuration Management: IT security groups that have attempted to use the output of a vulnerability assessment baseline to drive vulnerability mitigation projects within IT operations have found the data disorganized and unusable. As a result, reporting and analysis require the integration of vulnerability assessment and security configuration management data. IT security organizations should pressure vendors for analysis that cross-references vulnerabilities and configuration changes. Step 3: Prioritization When organizations baseline their environments in regard to vulnerabilities or security configuration standards, they need to do more mitigation work than time and resources will permit. Therefore, mitigation efforts need to be prioritized according to these factors: Publication Date: 1 March 2005/ID Number: G Page 3 of 6
4 The Nature of the Vulnerability and the State of the Current Threat Environment: As cyberattackers become more efficient at quickly exploiting software vulnerabilities, IT security managers need current information about the external threat environment. Vulnerability management products must factor near-real-time threat information into vulnerability prioritization and alert functions. The Business Use of the Vulnerable Asset Asset Inventory and Classification: Asset inventory and classification is a prerequisite for the second aspect of prioritization, which is the business use of the vulnerable asset. In general, vulnerabilities that are likely to be attacked and are present on business critical assets that are not effectively shielded should have the highest mitigation priority, but there are exceptions. When a vulnerability is widespread and subject to a worm attack, it needs to be mitigated regardless of asset use. On the other hand, if a vulnerability exposes corporate data or applications to inappropriate internal or external access, the business use of the asset becomes a major determinant of mitigation priority. The classification of assets by business use is required by both IT security and IT operations. IT security uses asset classification for business-oriented risk analysis, vulnerability mitigation prioritization and the generation of security metrics. IT operations uses asset classification in the areas of business-relevant availability, capacity, change analysis and reporting on service-level agreements. Asset classification requires a substantial amount of initial project work. Ongoing maintenance requires well-developed processes across the IT organization. The majority of vulnerability assessment, security management and operational configuration management tools build and maintain system inventory data in product-specific repositories. Organizations should establish a single source for asset classification so that maintenance costs are minimized. This strategy requires that systems and security management products support the import and export of asset classification and business service data. Step 4: Shielding and Mitigation Mitigation is the slowest, most-difficult part of vulnerability management because it requires the management of changes that are implemented across many IT operations and support areas. The IT security group is responsible for developing security administration and configuration policies, and must monitor the current state of the environment with respect to those policies; however, the network, server and desktop support organizations carry out the bulk of the mitigation work. Rapid patching alone is an inadequate response to vulnerability mitigation (see "IT Operations Must Change to Deal With Windows Attacks"). Use technologies such as firewalls, network- and host-based intrusion prevention, and network access controls to shield vulnerable assets until mitigation work has been completed. Workflow: Workflow functions are needed to organize mitigation work. There is a requirement for loose integration with operational workflow processes. There is also a requirement for embedded workflow within vulnerability management products for organizations that have not yet deployed enterprise workflow systems, and to address situations where detailed vulnerability information is too sensitive to expose within the enterprise workflow system. Automated Mitigation: Automated mitigation of vulnerabilities is possible but not commonly deployed on a wide scale. For example, it is possible to completely automate the download and installation of security patches but a completely automated approach is only common for consumer PCs. In a corporate environment, patch installation occurs only after quality assurance testing is completed, and is scheduled within a time widow that is appropriate for the applications or business functions supported by the system. We see the same situation for other types of system changes that are related to vulnerability management. In most cases, it is useful to have the vulnerability management baseline generate the system change, and stage the change so that it can be implemented at the appropriate time in the context of a change-management process. More-aggressive forms of automation are appropriate in a small number of cases. Publication Date: 1 March 2005/ID Number: G Page 4 of 6
5 Examples include scan and quarantine at network connect time and the automated elimination of some configuration errors or unwanted functions on corporate PCs. Vulnerability Management and Network Access Control (NAC): There is widespread demand for the capability to evaluate the security state of systems as they connect to the network, implement a network access policy and mitigate discovered vulnerabilities. Incumbent vulnerability assessment or security configuration management tools can potentially provide NAC baseline and mitigation functions in specific customer environments (see "Protect Your Resources With a Network Access Control Process"). Step 5: Controls/Eliminating Root Cause As organizations take action to eliminate the vulnerabilities that have been exposed by the security baseline, they also need to evaluate the overall pattern of vulnerabilities to identify and eliminate the root causes. Many vulnerabilities are the result of poorly formed system configuration or user administration policies, and inadequate provisioning or change management processes. Eliminating root causes requires improvements in the policies and processes that are used to provision, configure and change systems, and administer users. Step 6: Maintenance IT operations is responsible for the bulk of vulnerability remediation project work, the implementation of virtually all system maintenance and administrative changes, and the provisioning of new systems and users. An effective vulnerability management program requires that security configuration and administration policies become part of day-to-day operational tasks (see "IT Security and Operational Management Must Converge"). Step 7: Monitoring New attacks can emerge and spread rapidly, and new applications and administrative changes can introduce new vulnerabilities. The activities of system users and system administrators must also be monitored. The discovery and baseline steps need to be continuous, and all subsequent vulnerability management steps should be repeated as part of an ongoing process. Up-to-date vulnerability assessment and security configuration information is needed: To monitor the security state of the IT environment and the current status of patch management and vulnerability mitigation activities To discover unmanaged and misconfigured devices as they connect to the network As an input to IT security risk reporting As a data feed to the real-time event prioritization functions of IT security management systems IT security management technologies can also be used to monitor external threats to the IT environment and to provide additional information about specific changes that have caused lapses in security configuration or security administration policies. Technology Evolution Vulnerability assessment and security configuration policy compliance tools have been used by IT security organizations for discovery and baseline for many years. However, major changes in tool deployment and data use are driving changes in the vulnerability management market. Vulnerability assessment and security configuration management are evolving from utility functions that periodically generate reports for security personnel to security infrastructure that provides near-continuous scanning and reporting for IT security and operations. Integration and Publication Date: 1 March 2005/ID Number: G Page 5 of 6
6 cross-referencing of vulnerability assessment data with security configuration policy compliance data is needed to improve data use for mitigation. Improvements in asset classification and risk analysis will enable security reporting and metrics for IT and business area management. Key Issues How will enterprises manage IT configurations to eliminate vulnerabilities and implement security policies? This research is part of a set of related research pieces. See "Improve IT Security with Vulnerability Management" for an overview. REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Level 7, 40 Miller Street North Sydney New South Wales 2060 AUSTRALIA Latin America Headquarters Av. das Nações Unidas andar WTC São Paulo SP BRAZIL Publication Date: 1 March 2005/ID Number: G Page 6 of 6
Understanding Vulnerability Management Life Cycle Functions
Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability
Security and Identity Management Auditing Converge
Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,
Gartner Updates Its Definition of IT Infrastructure Utility
Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
Research. Identity and Access Management Defined
Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from
CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
Selection Requirements for Business Activity Monitoring Tools
Research Publication Date: 13 May 2005 ID Number: G00126563 Selection Requirements for Business Activity Monitoring Tools Bill Gassman When evaluating business activity monitoring product alternatives,
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
Overcoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
Use This Eight-Step Process for Identity and Access Management Audit and Compliance
Research Publication Date: 28 March 2005 ID Number: G00126592 Use This Eight-Step Process for Identity and Access Management Audit and Compliance Roberta J. Witty, Ant Allan, Jay Heiser Authentication,
For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
Deliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
Q&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
Toolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
Real-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
Five Business Drivers of Identity and Access Management
Research Publication Date: 31 October 2003 ID Number: SPA-21-3673 Five Business Drivers of Identity and Access Management Roberta J. Witty The primary reasons to implement IAM solutions are business facilitation,
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
NGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
Consider Identity and Access Management as a Process, Not a Technology
Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
The IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
Eight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
Key Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
The Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
Governance Is an Essential Building Block for Enterprise Information Management
Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways
The What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
Best Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
Strategic Road Map for Network Access Control
G00219087 Strategic Road Map for Network Access Control Published: 11 October 2011 Analyst(s): Lawrence Orans, John Pescatore Long derided as an overhyped concept, network access control (NAC) has emerged
The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives
Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
Repurposing Old PCs as Thin Clients as a Way to Save Money
Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers
Risk Intelligence: Applying KM to Information Risk Management
Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance
Solution Path: Threats and Vulnerabilities
Solution Path: Threats and Vulnerabilities Published: 24 January 2012 Burton IT1 Research G00226331 Analyst(s): Dan Blum This solution path helps Gartner clients develop a strategy and program for managing
X.509 Certificate Management: Avoiding Downtime and Brand Damage
G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity
Establishing a Strategy for Database Security Is No Longer Optional
Establishing a Strategy for Database Security Is No Longer Optional Published: 29 November 2011 G00226793 Analyst(s): Jeffrey Wheatman The options for securing increasingly valuable databases are very
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
The Six Triggers for Using Data Center Infrastructure Management Tools
G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using
Cloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
MarketScope for IT Governance, Risk and Compliance Management, 2008
Research Publication Date: 11 February 2008 ID Number: G00154941 MarketScope for IT Governance, Risk and Compliance Management, 2008 Paul E. Proctor, Mark Nicolett, French Caldwell The IT GRCM market was
Cloud IaaS: Security Considerations
G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase
Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial
Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost
G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures
The Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
Cloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality
Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers
In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand
Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable
ERP, SCM and CRM: Suites Define the Packaged Application Market
Research Publication Date: 25 July 2008 ID Number: G00158827 ERP, SCM and CRM: Suites Define the Packaged Application Market Yvonne Genovese, Jeff Woods, James Holincheck, Nigel Rayner, Michael Maoz Users
Gartner Defines Enterprise Information Architecture
Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit
IT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
Document the IT Service Portfolio Before Creating the IT Service Catalog
Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service
Gartner Clarifies the Definition of the Term 'Enterprise Architecture'
Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
Agenda for Supply Chain Strategy and Enablers, 2012
G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
How BPM Can Enhance the Eight Building Blocks of CRM
Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's
An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success
Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
Transactional HR self-service applications typically get implemented first because they typically automate manual, error-prone processes.
Research Publication Date: 28 August 2008 ID Number: G00159897 HR Self-Service Applications Defined James Holincheck In this research, we discuss the different types of HR self-service and strategies for
Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS. Executive Summary
GARTNER EXP CIO TOOLKIT: THE FIRST 100 DAYS Executive Summary Gartner EXP is an exclusive, membership-based organization of more than 3,000 CIOs and senior IT leaders worldwide. Members benefits from the
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
Gartner's Business Intelligence and Performance Management Framework
Research Publication Date: 9 October 2006 ID Number: G00142827 Gartner's Business Intelligence and Performance Management Framework Bill Hostmann, Nigel Rayner, Ted Friedman The use of business intelligence
Gartner's View on 'Bring Your Own' in Client Computing
G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting
NAC Strategies for Supporting BYOD Environments
G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach
Successful EA Change Management Requires Five Key Elements
Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the
