Establishing a Strategy for Database Security Is No Longer Optional
|
|
|
- Tyrone Scott
- 10 years ago
- Views:
Transcription
1 Establishing a Strategy for Database Security Is No Longer Optional Published: 29 November 2011 G Analyst(s): Jeffrey Wheatman The options for securing increasingly valuable databases are very broad and deep, and can be confusing. This research provides an overview of three categories of controls that should be implemented to ensure that enterprise data is protected in the most efficient and effective manner. Key Findings Databases continue to grow in size, complexity and importance, while enterprises struggle to identify the most appropriate controls regarding their use and misuse. There are limits to many of the preventive controls that are being used to keep out individuals who should not have or don't need access. The most effective database security implementations will leverage controls across administrative, preventive and detective controls. Balance is critical to get maximum protection with limited budget and head count. Relational database management system (RDBMS) vendors have gotten better with native security controls and add-ons, but third-party tools generally provide the best balance of security, usability and cost. Recommendations Evaluate the current state of enterprise database security. Identify gaps, and look for opportunities to close them. Integrate database security with data security policy and governance directives. Implement detective controls to address risks associated with the inability to implement comprehensive preventive measures.
2 What You Need to Know The importance of database management systems (DBMSs) continues to grow. The current volume of data stored in DBMSs continue to increase at a rapid rate, and the increasing complexity of the systems makes it more difficult to secure than ever before. DBMS vendors have come a long way in providing more secure platforms for system deployment, and there are many vendors and tools that can enhance the security of databases, but securing DBMSs has not gotten significantly easier. There are numerous drivers for the growth of DBMSs, most notably: Database migration Data warehousing Consolidation of databases Data retention and e-discovery Advent of big data Unfortunately, the security controls for databases and DBMSs have not kept pace with increasing risks. It is also important to note that there has been an increase in focus on nonrelational data stores, and this model and the traditional approach must be adjusted for these systems. Analysis Context The guidance in this research is applicable to clients that store regulated or data otherwise defined as "business critical" within RDBMSs. Analysis To help clients properly secure their relational databases, Gartner has developed a model for database security (see Figure 1). Page 2 of 10 Gartner, Inc. G
3 Figure 1. Gartner's Database Security Model Policy and Governance Administrative Installation, Change and Configuration Management Preventative Encryption Tokenization Detective Database Activity Monitoring (DAM) Data Discovery and Classification Masking Security Information and Event Management (SIEM) Vulnerability Scanning Access Controls Data Loss Prevention (DLP) Source: Gartner (November 2011) The First Step: Governance and Policy An effective security governance process is a key precursor to the most basic decisions about the implementation of processes or tools. Sound data security governance must be integrated with overall IT and information governance initiatives, requiring that the enterprise's security and risk management leaders be involved in risk decision making. Once these foundational decisions have been made, they must be translated into policies that are realistic, reflect the enterprise's business drivers, and are targeted at the appropriate stakeholders. For example, a policy for protecting the enterprise's intellectual property (IP) must describe the processes supporting the policy; define the IP; detail the business, technical and security requirements to be considered; describe the tools to support the requirements; and show how the tools will be implemented and managed. Whatever controls are selected, the control objectives and targets must be linked back to the enterprise's classification schema. Administrative Controls Installation, Change and Configuration Management Default installation of a DBMS is geared toward ease of installation, rather than security. As much as focus on security has increased during the past few years, Gartner still sees inconsistently applied hardening at the data storage layer. Common risks are: Gartner, Inc. G Page 3 of 10
4 Default privileged user account settings DBMS installed using standard configuration Sample scripts and code left in place DBMS vendors provide security guidelines and may provide hardening scripts that can be run after installation. Numerous third-party guides (see Note 1) provide guidance for securing your systems, although they tend to be stricter than the vendor guidelines, and all changes should be tested to ensure operational viability. Deploying a secure system is only the first step. Ongoing change and configuration management continue to be critical and are often not done very effectively, leaving systems in inconstant and unsecure states. Harden systems at all layers, customize security configuration by function, and define patching procedures. Integrate DBMSs into your threat and vulnerability management process. Develop a release management process for business-critical systems. Data Discovery and Classification As the volume of enterprise data expands at an ever-increasing rate, it becomes more difficult to locate and classify data as part of a data protection program. There are still huge volumes of data and individuals and applications that provision storage that are not always consistent in naming conventions or formats. Locating, categorizing, classifying and valuing data contained in DBMSs are important prerequisites for securing it. Discover RDBMSs stand-alone systems, as well as those part of business systems. Locate your critical data within your databases. Clarify data types that need to be protected because of business requirements, and legal and regulatory mandates. Leverage data discovery tools wherever possible. Vulnerability Scanners Vulnerability scanning tools are an integral part of a threat and vulnerability management program, and will support enterprise goals for database security. These tools use active and passive mechanisms to locate known vulnerabilities, common misconfigurations and other weaknesses. There are tools that focus specifically on databases, but it is common to use network or application scanners. Scanning tools function by sending attack and probe packages against the database Page 4 of 10 Gartner, Inc. G
5 and, in some cases, the underlying operating system by using agent-based technology to evaluate database configurations and parameters. Some of these tools integrate with database activity monitoring (DAM) or security information and event management (SIEM) as part of a comprehensive vulnerability management program. Leverage current vulnerability scanning tools for databases. Evaluate whether the deployment of a dedicated DBMS scanner tool will give you better results, but ensure you can manage extra remediation. Use scanning to support change and configuration management program goals. Preventative Controls Encryption Early versions of encryption tools often required the entire database to be encrypted, leading to performance degradation and broken applications. In addition, the data was not hidden from administrators. Most DBMS vendors now offer native encryption at the database, table and field levels, and prevent administrators from having access to keys. There are also third-party encryption tools that provide a single point configuration and key management. It is important to understand that, although encryption can be a strong control, it does have limitations. Encryption is good for enforcing segregation of duties and keeping data out of the hands of unapproved users. And it can be used to protect data as it moves from one place to another (for example, backing up data). But, it won't help if roles are not clearly defined. For example, if the user is given a role that is not appropriate, he will have access to the keys, and it won't prevent inappropriate use of legitimate access, such as downloading thousands of records. Tokenization is a subset of encryption that involves substituting "tokens" for real data and removing the data to be protected from areas where they would be easily accessible. Tokenization can be helpful in protecting easy-to-define data, such as credit card numbers or Social Security numbers in the U.S. It can, however, be challenging to leverage tokenization for data such as privacy and healthcare data, which tends to be more difficult to define. Assess your DBMS platforms, and evaluate what options may be available from your DBMS vendors. Educate stakeholders on the benefits and limitations of encryption tools. Encryption has become a "go to" for legal and regulatory scenarios but does not always address risks appropriately. Gartner, Inc. G Page 5 of 10
6 Test encryption solutions in a lab environment before deploying in production to ensure they won't break your applications. Evaluate tokenization for discrete, easy-to-define data types, such as credit card numbers or Social Security numbers. Data Masking Masking technologies help prevent sensitive data from being exposed to unauthorized individuals by replacing it with realistic substitute data. This is a data security protection that is often recommended by regulatory bodies and legal requirements for example, PCI and the Health Insurance Portability and Accountability Act. Data-masking technology takes two basic forms: Static masking aims to prevent the misuse of data by users of nonproduction databases by masking data in advance of testing. Dynamic masking is an emerging technology that aims to mask data in real time, typically in production databases. Consider using static data masking to limit access to sensitive data by employees (such as programmers, testers and database administrators [DBAs]) during development and testing. Begin to look at dynamic data masking for use cases (such as in call centers), as the technology matures. Access Management Once your DBMSs are deployed and configured, ensure that your access controls are set appropriately at all layers network, application and data. The ultimate goal, however impractical it may be, is to implement least privilege. In other words, allow only what is strictly necessary to get the job done. Identity and access management (IAM) offerings provide a key central access management locus. Several common vulnerabilities associated with access management are: Allowing connections directly to the database, rather than going through applications bypassing application controls Allowing connections from nonstandard applications, such as RDBMS tools Use of administrative credentials for "normal" work activity Poor mapping between business roles and technology access roles Depending on access control at one layer (for example, implementing only application-based access control) Page 6 of 10 Gartner, Inc. G
7 Implement logical network segmentation and tiered architectures. Use access control lists to prevent unauthorized connections to databases. Deploy jump boxes for DBAs to conduct database administrative activities, and limit access to database tools such as Toad and SQLTools to approved DBAs. Require clearly defined access roles rooted in an IAM program. Review role membership and access controls to ensure that they match job requirements. Implement complementary access controls at the database layer. Don't depend only on application-layer access controls. Detective Controls Although there have been improvements in DBMS security options, organizations struggle to secure established DBMSs that were not designed with effective security controls. We have also seen an increased focus on data security resulting from regulatory pressures. Even if you follow all best practices above, there are still risks to your data: Data must be accessible to be used. Once data is accessible, it's at risk. Keeping up to date with patches is difficult. Encryption is a partial solution that has risks caused by key management issues and DBA access. A strong access control program can limit exposures, but role-based provisioning, especially in complicated systems, is difficult. Network segmentation and filtering will limit risks, but data must be accessible to be useful. None of the solutions above will prevent data disclosure to legitimate users with malicious goals. These are controls that can and should be included in the database security program to ensure that risks associated with gaps in other protections are mitigated and that legitimate privileges are not misused. There are three primary detective controls that can be leveraged for database security. Database Activity Monitoring DAM controls analyze database activity to identify and report on fraudulent, illegal or other inappropriate behaviors, with minimal impact on user operations and productivity. When configured with knowledge of database structures, DAM can operate as an extension of DBMS audit functionality or independently. DAM has two primary use cases: (1) privileged user monitoring, focused on monitoring, analyzing and reporting on actions undertaken by users with high levels of access; and (2) application user monitoring, focused largely on database access that results from Gartner, Inc. G Page 7 of 10
8 transaction activity from the end users and applications that connect to the database. During the past several years, DAM tools have added a wider range of functions, such as: Data discovery Workflow and remediation management Prevention/blocking Vulnerability scanning Entitlement management Implement DAM to mitigate the high levels of risk from database vulnerabilities, and address audit findings in areas such as database segregation of duties and change management. DAM technology should be used when a need exists for granular monitoring, or when the overhead of database audit functions is unacceptable. Implement DAM to monitor privileged-user access and access to critical data. Establish thresholds for "normal" behavior in your database and DBMSs. Content-Aware Data Loss Prevention Content-aware data loss prevention (DLP) tools address the risk of accidental exposure of sensitive data outside authorized channels, using monitoring, blocking and remediation functionality. They enable the dynamic application of policy based on the classification of content determined at the time of operation. DLP technologies are being increasingly leveraged for data discovery and classification purposes. These technologies perform deep-content inspection, using detection techniques that extend beyond basic keyword matching (for example, advanced regular expressions, Bayesian analysis and machine learning). Best Practices Develop clear DLP strategies with concrete requirements before evaluating products. Understand the limitations of DLP within RDBMSs. DLP is a data-centric control and does not have any understanding of SQL, which is the primary mechanism for interacting with RDBMSs. Security Information and Event Management SIEM technology provides two primary data security capabilities: (1) log management (the collection, reporting and analysis of log data) and (2) security event management, which processes data from security devices, network devices, systems and applications in real time to provide security monitoring, event correlation and incident response. While SIEM is sometimes used for database security, SIEM deployments tend to be more device-centric and suffer from the same Page 8 of 10 Gartner, Inc. G
9 gaps as DLP not truly understanding SQL. Additionally, SIEM requires native DBMS logging to be turned on, resulting in increased overhead and management. Define the requirements for data-centric compliance reporting, log management, resource access monitoring and security incident response. Product selection decisions should be driven by enterprise-specific considerations, including event management capabilities, capital and operations costs and support capabilities, and integration with established system and application infrastructures. Implement other monitoring solutions instead of or to complement DAM. Key Facts Databases continue to grow in size, complexity and value. However, the programmatic requirement to protect them has not kept pace. Database security still tends to be managed by DBAs and other technical resources, with a narrow view into the overall risk of the systems. Recommended Reading Some documents may not be available as part of your current Gartner subscription. "Best Practices in Change, Configuration and Release Management" "Four Factors Driving Interest in Content-Aware Data Loss Prevention: A DLP Spotlight" "Hype Cycle for Identity and Access Management Technologies, 2011" "SIEM Enables Enterprise Security Intelligence" "Key Trends in Securing Sensitive Data With Data-Masking Technologies" "How to Identify Appropriate Controls for Enterprise Data Security Initiatives" Note 1 Third-Party Database Hardening Guides route=downloads.browse.category.benchmarks.servers.database Gartner, Inc. G Page 9 of 10
10 Regional Headquarters Corporate Headquarters 56 Top Gallant Road Stamford, CT USA European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity on its website, ombudsman/omb_guide2.jsp. Page 10 of 10 Gartner, Inc. G
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
Understanding Vulnerability Management Life Cycle Functions
Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability
CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
Best Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
X.509 Certificate Management: Avoiding Downtime and Brand Damage
G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity
Cloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
Cloud IaaS: Security Considerations
G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the
IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
Key Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
Q&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
Critical Privacy Questions to Ask an HCM/CRM SaaS Provider
Research Publication Date: 31 July 2009 ID Number: G00168488 Critical Privacy Questions to Ask an HCM/CRM SaaS Provider Carsten Casper, Thomas Otter, Arabella Hallawell The vast majority (probably greater
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
IT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
The Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
Consider Identity and Access Management as a Process, Not a Technology
Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research
Deliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost
G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
How to Develop an Effective Vulnerability Management Process
Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes
The What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
Overcoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
Strategic Road Map for Network Access Control
G00219087 Strategic Road Map for Network Access Control Published: 11 October 2011 Analyst(s): Lawrence Orans, John Pescatore Long derided as an overhyped concept, network access control (NAC) has emerged
In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand
Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable
Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
Toolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
The Six Triggers for Using Data Center Infrastructure Management Tools
G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using
For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
Governance Is an Essential Building Block for Enterprise Information Management
Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
Solution Path: Threats and Vulnerabilities
Solution Path: Threats and Vulnerabilities Published: 24 January 2012 Burton IT1 Research G00226331 Analyst(s): Dan Blum This solution path helps Gartner clients develop a strategy and program for managing
The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
The Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
Eight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
Assessing the Security Risks of Cloud Computing
Research Publication Date: 3 June 2008 ID Number: G00157782 Assessing the Security Risks of Cloud Computing Jay Heiser, Mark Nicolett Organizations considering cloud-based services must understand the
Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
Agenda for Supply Chain Strategy and Enablers, 2012
G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling
Gartner Clarifies the Definition of the Term 'Enterprise Architecture'
Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,
Selection Requirements for Business Activity Monitoring Tools
Research Publication Date: 13 May 2005 ID Number: G00126563 Selection Requirements for Business Activity Monitoring Tools Bill Gassman When evaluating business activity monitoring product alternatives,
NAC Strategies for Supporting BYOD Environments
G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach
Singapore Empowers Land Transport Planners With Data Warehouse
G00219502 Singapore Empowers Land Transport Planners With Data Warehouse Published: 18 October 2011 Analyst(s): Eric Thoo The Land Transport Authority (LTA) of Singapore wanted to improve planning and
Gartner Defines Enterprise Information Architecture
Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit
The IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
Real-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
NGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality
Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers
Prepare for the Inevitable With an Effective Security Incident Response Plan
G00236455 Prepare for the Inevitable With an Effective Security Incident Response Plan Published: 19 July 2012 Analyst(s): Rob McMillan A serious security incident is a question of "when," not "if," for
Choosing a Replacement for Incumbent One-Time Password Tokens
Research Publication Date: 21 April 2011 ID Number: G00212244 Choosing a Replacement for Incumbent One-Time Password Tokens Ant Allan This research outlines the options for enterprises seeking replacements
Security and Identity Management Auditing Converge
Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,
Cloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
Gartner's View on 'Bring Your Own' in Client Computing
G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
IT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
The Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
What to Consider When Designing Next-Generation Data Centers
Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,
Roundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
Realize That Big Security Data Is Not Big Security Nor Big Intelligence
G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
