Survey Confirms There Are Many Effective Disaster Recovery Strategies

Size: px
Start display at page:

Download "Survey Confirms There Are Many Effective Disaster Recovery Strategies"

Transcription

1 Page 1 of 5 ID Number: G Survey Confirms There Are Many Effective Disaster Recovery Strategies Browse Topics Advanced Search Contact Gartner 21 April 2005 Donna Scott We conducted a poll at Gartner's recent Data Center Conference regarding data replication architectures to meet disaster recovery strategies. The results confirmed our suspicion that there's no single strategy to meet all needs. There are, however, many effective strategies from which to choose. Download Document: survey_confirms...pdf (70.9KB) Help with Downloads What You Need to Know There are many successful data center and replication strategies for disaster recovery. Organizations should first define their disaster recovery requirements in terms of cost, recovery time objectives and recovery point objectives; then design strategies, architectures and technology implementations (for example, specifying the type of replication) to meet those requirements. Organizations shouldn't be concerned with finding a single "right" strategy, because this doesn't exist for all situations. Rather, they should implement strategies to meet their specific business requirements. Analysis Clients frequently ask us about best practices for selecting and implementing data replication architectures to support disaster recovery strategies. Companies and government agencies (organizations) want a panacea that can meet all of their needs in just one solution. We always tell them, however, that there's no such strategy, but it doesn't prevent the question from being asked. When it comes to disaster recovery strategies, organizations want to follow proven methods rather than lead with new ones (to reduce the risk of failure). At Gartner's annual Data Center Conference in December 2004, we asked CIOs, heads of IT operations and data center managers eight questions regarding disaster recovery and data replication architectures and strategies. The results confirmed what we've often seen before that many strategies are used across organizations, and that no single strategy meets all business needs, even for individual organizations. (The conference attracted more than 1,500 attendees; 120 responded to polls using electronic devices, which had selected questions inserted into each conference presentation. We recognize that the answers don't necessarily represent a statistically significant distribution, but we believe that the results will be interesting to our clients.) Data Center Strategies The first three questions focus on data center strategies, including the number of data centers in North America, as well as primary and secondary recovery strategies for critical and less-critical applications. As shown by the responses to the first question, there is near-equal distribution of organizations that have one, two, or three or more data centers. Data center consolidation strategies are popular because they reduce costs, but they also increase risk. Since the Sept. 11 terrorist attacks against the United States, many large organizations have increased the number of data centers they have, just to reduce risk and increase their control of IT service delivery during a disaster. The survey data supports this, with only one-third of the audience having a single data center in

2 Page 2 of 5 North America (see Figure 1). Figure 1. How many data centers do you operate in North America? The next question (see Figure 2) focuses on disaster recovery strategies, which tend to vary depending on the organization and the criticality of the IT service or set of applications. As shown in the results, about one-third of respondents (36 percent) use outsourced service providers, which is to be expected especially for those with only one data center in North America. Had the respondents included more midsize organizations rather than large organizations, this number would have been much higher. However, the remaining strategies are a close mix among using standby resources for disaster recovery (23 percent), production load sharing (21 percent) and development/test resources for disaster recovery (18 percent). Figure 2. What is your primary disaster recovery strategy for your most-critical applications? In a follow-up question, we asked whether organizations use more than one disaster recovery strategy. We found that they do. As shown in Figure 3, 29 percent of respondents don't have a secondary strategy, but 71 percent do. In other words, they have multiple recovery strategies that consider the business requirements and criticality of the applications. This includes multisourcing strategies, in which a company may insource disaster recovery for critical applications and outsource the others to a more shared-use, less-expensive model. Again, this is further proof that there isn't a one-size-fits-all disaster recovery strategy. Figure 3. What is your secondary disaster recovery strategy for less-critical applications?

3 Page 3 of 5 Data Replication Architectures The next set of questions assesses the methods used to implement disaster recovery architectures. As expected, respondents say they use multiple replication methods and architectures, depending on the application (as shown by the total results, which add up to 203 percent, or an average of two methods per respondent). Figure 4 shows the overall proportion of respondents using each method type. Application/transaction level use, which offers the potential to achieve 100-percent availability, is used by only 18 percent of respondents, because the application must come architected for this capability. Custom applications must be crafted early in the design phase of the application. Figure 4. Percent of Respondents Using Various Data Replication Architectures The most-popular implementations are database management system (DBMS) log-shipping solutions at 59 percent usage (they're often included in DBMS solutions). The second-most-popular solutions are synchronous-storagecontroller-based solutions at 51 percent of respondents. These offer the capability to use one solution to mitigate risks for many applications/platforms. Asynchronous-disk-controller-based solutions, which are less mature in the market, ranked next at 43 percent, followed by volume/file-based replication at 32 percent. Application/transaction level use, which offers the potential to achieve 100-percent availability, is used by only 18 percent of respondents. Figure 5, Figure 6, Figure 7, Figure 8 and Figure 9 detail which specific vendor solutions have been implemented. Figure 5. Do you implement application/transaction-level replication to achieve a goal of 100-percent uptime?

4 Page 4 of 5 Figure 6. Do you use DBMS log-based replication in your disaster recovery architecture? Figure 7. Do you use synchronous-storage-controller-based replication in your disaster recovery architecture? Figure 8. Do you use asynchronous-storage-controller-based replication in your disaster recovery architecture?

5 Page 5 of 5 Figure 9. Do you use file and volume/host-based replication in your disaster recovery architecture? All of these results indicate what we said from the beginning: There's no single strategy or solution for disaster recovery. Although many organizations use storage-controller-based solutions as a first line of defense (because they protect many applications and platforms), they don't meet the needs of all applications. Thus, using application/transaction-level, DBMS-level, volume-level or file-level replication as alternatives to meet specific needs is a valid and popular strategy. This research is part of a set of related research pieces. See Data Center Conference Poll Results Offer IT Operations Insights for an overview. Browse Topics: Disaster Recovery Data Center Management 2005 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice. Resource Id:

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

Data Center Conference Survey Results: Server Consolidation

Data Center Conference Survey Results: Server Consolidation Events, J. Phelps Research Note 31 March 2004 Data Center Conference Survey Results: Server Consolidation At the December 2003 Data Center Conference, attendees were asked questions for each presentation.

More information

Public/Private/Hybrid Cloud choosing horses for courses. NetEvents APAC Cloud Summit

Public/Private/Hybrid Cloud choosing horses for courses. NetEvents APAC Cloud Summit Public/Private/Hybrid Cloud choosing horses for courses NetEvents APAC Cloud Summit David Coyle Managing Vice President Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication

More information

Midsize Enterprise Summit Business Continuity Questions

Midsize Enterprise Summit Business Continuity Questions Select Q&A, D. Scott, F. DeSalvo Research Note 6 February 2003 Midsize Enterprise Summit Business Continuity Questions Current events have created a new awareness of the importance of business continuity

More information

Midsize Enterprises Lead in Adoption of Payment Outsourcing

Midsize Enterprises Lead in Adoption of Payment Outsourcing Research Brief Midsize Enterprises Lead in Adoption of Payment Outsourcing Abstract: More than one-third of midsize enterprises plan to use payment outsourcing by 2004. New areas of interest include automated

More information

IT Operational Considerations for Cloud Computing

IT Operational Considerations for Cloud Computing Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.

More information

North American Call Centers Market Share and Forecast, 2002 (Executive Summary) Executive Summary

North American Call Centers Market Share and Forecast, 2002 (Executive Summary) Executive Summary North American Call Centers Market Share and Forecast, 2002 (Executive Summary) Executive Summary Publication Date: July 11, 2002 Authors Drew Kraus Lily Yu This document has been published to the following

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

Enterprise Resource Planning Software Market: Europe, 2002 (Executive Summary) Executive Summary

Enterprise Resource Planning Software Market: Europe, 2002 (Executive Summary) Executive Summary Enterprise Resource Planning Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Fabrizio Biscotti Chris Pang Chad Eschinger This document has been published

More information

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

The Lack of a CRM Strategy Will Hinder Health Insurer Growth Industry Research Publication Date: 15 October 2008 ID Number: G00162107 The Lack of a CRM Strategy Will Hinder Health Insurer Growth Joanne Galimi The Gartner 2008 healthcare payer application survey

More information

The Business-Centric CIO

The Business-Centric CIO The Business-Centric CIO Issue 2 1 The Business-Centric CIO 2 From the Gartner Files: Using IT Financial Management to Improve Business Outcomes 6 About VMware Today s successful CIOs are not only technology

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

TOTAL DATA WAREHOUSING: 2013-2018

TOTAL DATA WAREHOUSING: 2013-2018 TOTAL DATA WAREHOUSING: 2013-2018 Analytic Database and Hadoop Market Sizing and Forecasts This report examines the marketplace for Total Data Warehousing including competing players, revenue generation

More information

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase

2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

CLOUD CLIENTS AND VIRTUAL CLIENTS

CLOUD CLIENTS AND VIRTUAL CLIENTS CLOUD CLIENTS AND VIRTUAL CLIENTS The Transformation of Virtual Desktops Through Mobility and Cloud Computing Over the past three years, the technology we used to know as virtual desktop infrastructure

More information

Lead architect. Business architect. Technical architect. Lead Architect

Lead architect. Business architect. Technical architect. Lead Architect Tactical Guidelines, G. James Research Note 20 September 2002 Best Practices for Selecting Enterprise Architects A good enterprise architect needs not only excellent technical skills, but business and

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

Research. Key Issues for Software as a Service, 2009

Research. Key Issues for Software as a Service, 2009 Research Publication Date: 6 February 2009 ID Number: G00164873 Key Issues for Software as a Service, 2009 Robert P. Desisto, Ben Pring As organizations' capital budgets dry up, clients evaluating SaaS

More information

2002-2003 Web Services Development, North America (Executive Summary) Executive Summary

2002-2003 Web Services Development, North America (Executive Summary) Executive Summary 2002-2003 Web Services Development, North America (Executive Summary) Executive Summary Publication Date: 3 July 2003 Authors Nicole S. Latimer Colleen Graham Joanne M. Correia Norma Schroder This document

More information

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives

More information

Disaster Recovery: Weighing Data Replication Alternatives

Disaster Recovery: Weighing Data Replication Alternatives Technology, D. Scott, J. Krischer, J. Rubin Research te 15 June 2001 Disaster Recovery: Weighing Data Replication Alternatives Enterprises with short disaster recovery time objectives use data replication

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending?

Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Industry Research Publication Date: 11 February 2009 ID Number: G00164764 Cost-Cutting IT: Should You Cut Back Your Disaster Recovery Exercise Spending? Jeff Vining Government CIOs are under increasing

More information

Key Findings. Recommendations

Key Findings. Recommendations Total Cost of Ownership Comparison of PCs With Server-Based Computing Gartner RAS Core Research Note G00159622, Federica Troni, Mark A. Margevicius, Michael A. Silver, 4 August 2008, R1 04032009 Server-based

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

TOTAL DATA INTEGRATION

TOTAL DATA INTEGRATION The Impact of Big Data on Integration and Governance Big data and Total Data have the potential to change the face of the data integration market. This report outlines the key drivers shaping this sector

More information

The Outlook for IT. 2014 to 2017. Michael Smith VP Distinguished Analyst January 31, 2014

The Outlook for IT. 2014 to 2017. Michael Smith VP Distinguished Analyst January 31, 2014 The Outlook for IT Michael Smith VP Distinguished Analyst January 31, 2014 2014 to 2017 Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

What Are Network Security Platforms?

What Are Network Security Platforms? Markets, J. Pescatore, M. Easley, R. Stiennon Research Note 7 November 2002 Network Security Platforms Will Transform Security Markets An integrated network security platform approach will increase network

More information

New Sales and Marketing Models Required to Sell Business Process Services

New Sales and Marketing Models Required to Sell Business Process Services Research Brief New Sales and Marketing Models Required to Sell Business Process Services Abstract: Numerous internal and external catalysts of change are forcing service providers to continuously reassess

More information

HIPAA Compliance Hindered by Lagging Vendors

HIPAA Compliance Hindered by Lagging Vendors Markets, M-21-473 W. Rishel Research Note November 3 HIPAA Compliance Hindered by Lagging Vendors Independent software vendors are significant contributors to the delays on HIPAA transactions. Their customers

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

Government Insights: Possible IT Budget Cuts

Government Insights: Possible IT Budget Cuts Tactical Guidelines, J. Kost Research Note 6 January 2003 Government Insights: Possible IT Budget Cuts In tough economic times, government leaders pressure CIOs to reduce IT budgets. Although IT investments

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures

More information

Vertical Data Warehouse Solutions for Financial Services

Vertical Data Warehouse Solutions for Financial Services Decision Framework, M. Knox Research Note 24 July 2003 Vertical Data Warehouse Solutions for Financial Services Packaged DW financial services solutions differ in degree of and approach to verticalization,

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

Don't Pay to Support CRM 'Shelfware'

Don't Pay to Support CRM 'Shelfware' Tactical Guidelines, J. Disbrow Research Note 3 May 2003 Don't Pay to Support CRM 'Shelfware' Enterprises license customer relationship management solutions that are often never totally deployed. Software

More information

BACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments

BACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments BACKUP IN A VIRTUAL WORLD Data-Protection Challenges in Virtual Server Environments Data protection for virtual environments became crucial when end users began virtualizing tier-one, mission-critical

More information

MOBILE APP LIFECYCLE

MOBILE APP LIFECYCLE MOBILE APP LIFECYCLE Design and Development As enterprises invest in developing or externally sourcing mobile apps, they are finding the need to integrate this process into the overall software development

More information

Cloud Brokers EXECUTIVE OVERVIEW MAKING ITAAS A PRACTICAL REALITY?

Cloud Brokers EXECUTIVE OVERVIEW MAKING ITAAS A PRACTICAL REALITY? Cloud Brokers MAKING ITAAS A PRACTICAL REALITY? This report examines what a cloud broker is, its components and functions, its role(s), its audience and how it supports the delivery of ITaaS by turning

More information

Gartner Updates Its Definition of IT Infrastructure Utility

Gartner Updates Its Definition of IT Infrastructure Utility Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some

More information

Why Enterprises Choose Private Cloud

Why Enterprises Choose Private Cloud Why Enterprises Choose Private Cloud IT IQ Intelligent IT Infrastructure solutions that take your business to a higher level. Connectivity Colocation Managed Hosting Cloud Enabling Private Clouds for the

More information

Assessing the Security Risks of Cloud Computing

Assessing the Security Risks of Cloud Computing Research Publication Date: 3 June 2008 ID Number: G00157782 Assessing the Security Risks of Cloud Computing Jay Heiser, Mark Nicolett Organizations considering cloud-based services must understand the

More information

Economics of the Cloud: Business Value Assessments

Economics of the Cloud: Business Value Assessments Economics of the Cloud: Business Value Assessments Gartner RAS Core Research Note G00168554, Joseph Feiman, David W. Cearley, 25 September 2009, RA7 042010 This research defines and quantitatively assesses

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

Magic Quadrant for Data Center Outsourcing, 4Q03

Magic Quadrant for Data Center Outsourcing, 4Q03 Markets, R. Matlus, W. Maurer, L. Scardino, B. Caldwell Research Note 12 November 2003 Magic Quadrant for Data Center Outsourcing, 4Q03 Gartner's positioning of the 14 external service providers in the

More information

Managers Begin to Apply Business Activity Monitoring

Managers Begin to Apply Business Activity Monitoring Research Brief Managers Begin to Apply Business Activity Monitoring Abstract: Managers are not fully using real-time capabilities for decision making; they implement BAM with basic analytic methods instead

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023

Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023 G00261104 Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023 Published: 24 January 2014 Analyst(s): Nigel Rayner This Gartner Research Circle survey conducted in September 2013 shows that some organizations

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

IT Architecture Is Not Enterprise Architecture

IT Architecture Is Not Enterprise Architecture Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

Management Alert: Effective Disaster Recovery Management Could Save Your Business

Management Alert: Effective Disaster Recovery Management Could Save Your Business IGG-07232003-02 R. Witty Article 23 July 2003 Management Alert: Effective Disaster Recovery Management Could Save Your Business Many enterprises have inadequate business continuity and disaster recovery

More information

Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant

Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant IGG-02192003-03 R. Matlus Article 19 February 2003 Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant The North American help desk outsourcing market is growing despite a down economy.

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

The disaster recovery procedures started immediately. Services to IBM users were restored within 48 hours.

The disaster recovery procedures started immediately. Services to IBM users were restored within 48 hours. C. Da Rold, S. Mingay Research Note 7 November 2003 Commentary Italian Blackout Impacts IBM Image and Clients' Business IBM's data center in Vimercate failed to deliver IT services to several clients after

More information

DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE. Monitoring, Managing and Optimizing the Datacenter

DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE. Monitoring, Managing and Optimizing the Datacenter Analyzing the Business of Enterprise IT Innovation DATACENTER INFRASTRUCTURE MANAGEMENT SOFTWARE Monitoring, Managing and Optimizing the Datacenter As datacenters become bigger, denser and more complex,

More information

The Data Management of Things

The Data Management of Things The Data Management of Things THE IMPLICATIONS OF IOT FOR DATA ANALYTICS The Internet of Things (IoT) is placing new demands on data storage, networking, processing and analytics. For end users, vendors

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Small and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary

Small and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary Small and Midsize Business IT Outsourcing Vendor Market Trends, 2003 (Executive Summary) Executive Summary Publication Date: 15 January 2004 Author Robert H. Brown This document has been published to the

More information

Risk Intelligence: Applying KM to Information Risk Management

Risk Intelligence: Applying KM to Information Risk Management Research Publication Date: 19 September 2007 ID Number: G00151742 Risk Intelligence: Applying KM to Information Risk Management French Caldwell Risk intelligence is the alignment of information governance

More information

THE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS

THE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS EXECUTIVE OVERVIEW THE AWS PARTNER NETWORK IMPACT ON THE INTERNET INFRASTRUCTURE SERVICES BUSINESS KEY FINDINGS The IaaS market is currently about 20% the size of the managed hosting market; however, it

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

CIO Update: Microsoft's Business Intelligence Strategy Is a Work in Progress

CIO Update: Microsoft's Business Intelligence Strategy Is a Work in Progress IGG-05282003-04 B. Hostmann, K. Strange Article 28 May 2003 CIO Update: Microsoft's Business Intelligence Strategy Is a Work in Progress Microsoft s SQL Server and related business intelligence (BI) products

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Management Update: CRM Success Lies in Strategy and Implementation, Not Software

Management Update: CRM Success Lies in Strategy and Implementation, Not Software IGG-03122003-01 D. Hagemeyer, S. Nelson Article 12 March 2003 Management Update: CRM Success Lies in Strategy and Implementation, Not Software A customer relationship management (CRM) package doesn t ensure

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

Highlights of the 2015 CEO Survey: Business Leaders Are Betting on Tech

Highlights of the 2015 CEO Survey: Business Leaders Are Betting on Tech G00274032 Highlights of the 2015 CEO Survey: Business Leaders Are Betting on Tech Published: 10 April 2015 Analyst(s): Mark Raskino Gartner's annual survey reveals CEOs' heightened interest in tech-related

More information

Business Process Management's Success Hinges on Business-Led Initiatives

Business Process Management's Success Hinges on Business-Led Initiatives Business Process Management's Success Hinges on Business-Led Initiatives 26 July 2005 Michael James Melenovsky Source: Gartner Note Number: G00129411 Organizations that had the most-successful BPM initiatives

More information

COM-19-8868 M. Margevicius

COM-19-8868 M. Margevicius M. Margevicius Research Note 11 September 2003 Commentary TCO Comparison of s vs. Notebooks Differences in technology, price, life cycles and usage patterns dictate that notebook total cost of ownership

More information

The Future of IT Sourcing

The Future of IT Sourcing The Future of IT Sourcing Finanstilsynet Seminar Ali Hamadi Senior Managing Partner, FSI Nordics ali.hamadi@gartner.com 22. May 2014 Gartner is a registered trademark of Gartner, Inc. or its affiliates.

More information

Management Update: Powerhouse Vendors Implement Document Management

Management Update: Powerhouse Vendors Implement Document Management IGG-10302002-04 G. Landers, K. Shegda, D. Logan Article 30 October 2002 Management Update: Powerhouse Vendors Implement Document Management Interest within enterprises is growing in the management of unstructured

More information

Business Intelligence: The European Perspective

Business Intelligence: The European Perspective Markets, F. Buytendijk Research Note 5 November 2002 Business Intelligence: The European Perspective When choosing business intelligence products, European users are not that different from North American

More information

Digital Marketing Budgets Increase, Reflecting Focus on Customer Experience

Digital Marketing Budgets Increase, Reflecting Focus on Customer Experience G00255396 Digital Marketing Budgets Increase, Reflecting Focus on Customer Experience Published: 9 January 2014 Analyst(s): Laura McLellan Gartner's Digital Marketing Spending Survey shows that digital

More information

Gartner Defines Enterprise Information Architecture

Gartner Defines Enterprise Information Architecture Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit

More information

The State of the European Public Cloud Market

The State of the European Public Cloud Market The State of the European Public Cloud Market 2015 UPDATE A year ago, startups, early adopters, and test and development professionals were the key markets for European public cloud service providers.

More information

Using Corporate Performance Management to Deliver the CEO s Strategic Vision

Using Corporate Performance Management to Deliver the CEO s Strategic Vision Using Corporate Performance Management to Deliver the CEO s Strategic Vision Gartner RAS Core Research Note G00157458, Nigel Rayner, 30 April 2008 Corporate performance management (CPM) applications offer

More information

E-DISCOVERY AND E-DISCLOSURE 5 IMPLICATIONS

E-DISCOVERY AND E-DISCLOSURE 5 IMPLICATIONS Analyzing the Business of Enterprise IT Innovation E-DISCOVERY AND E-DISCLOSURE Bringing It All Back Home Almost four years after all electronic information became legally discoverable in US courts, organizations

More information

Managing the Risks of Running Windows Server 2003 After July 2015

Managing the Risks of Running Windows Server 2003 After July 2015 G00263054 Managing the Risks of Running Windows Server 2003 After July 2015 Published: 1 April 2014 Analyst(s): Carl Claunch Windows Server 2003 and Windows Server 2003 R2 reach the end of their extended

More information

Open Source: The New Data Center Standard

Open Source: The New Data Center Standard Open Source: The New Data Center Standard 1 From the Gartner Files: The State of Open-Source RDBMSs, 2015 10 ABN AMRO Clearing: Financial Systems on Postgres Plus Contact Us! sales@enterprisedb.com www.enterprisedb.com

More information

What CIOs Want to Know About Microsoft Active Directory

What CIOs Want to Know About Microsoft Active Directory IGG-01222003-01 J. Enck Article 22 January 2003 What CIOs Want to Know About Microsoft Active Directory Active Directory deployments are increasing and so are questions about the technology. Gartner addresses

More information

Five Business Drivers of Identity and Access Management

Five Business Drivers of Identity and Access Management Research Publication Date: 31 October 2003 ID Number: SPA-21-3673 Five Business Drivers of Identity and Access Management Roberta J. Witty The primary reasons to implement IAM solutions are business facilitation,

More information

Vendors of specialized applications protect the keystones of fusion

Vendors of specialized applications protect the keystones of fusion Strategic Planning, M. Raskino, A. Kyte, W. Andrews, C. Abrams Research Note 19 January 2004 SOBA Offers New Hope for Niche Vendors of Business Software Niche vendors often fall prey to larger rivals that

More information

Organizations Should Implement Web Application Security Scanning

Organizations Should Implement Web Application Security Scanning Research Publication Date: 21 September 2005 ID Number: G00130869 Organizations Should Implement Web Application Security Scanning Amrit T. Williams, Neil MacDonald Web applications are prone to vulnerabilities

More information

Q&A: How Can ERP Recurring Costs Be Contained?

Q&A: How Can ERP Recurring Costs Be Contained? Research Publication Date: 18 December 2008 ID Number: G00163030 Q&A: How Can ERP Recurring Costs Be Contained? Peter Wesche Driven by increased pressure for cost containment, attendees at the 2008 Financial

More information

How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary

How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary Publication Date: 2 January 2004 Author Bruce M. Caldwell This document has been published to the following

More information

The ITO and BPO Offering Continuum

The ITO and BPO Offering Continuum Markets, K. Harris Research Note 9 May 2003 Outsourcers in India Set Their Sights on Insurance BPO Vendors in India are targeting the insurance business process outsourcing market. Evaluation of vendor

More information

Decision Framework, DF-19-1071 J. Holincheck. Application Service Provider Traditional Payroll/Benefits Outsourcing Business Process Outsourcing

Decision Framework, DF-19-1071 J. Holincheck. Application Service Provider Traditional Payroll/Benefits Outsourcing Business Process Outsourcing Decision Framework, J. Holincheck Research Note 28 February 2003 Deciding to Insource or Outsource for Human Resources Enterprises making new technology decisions are often considering various types of

More information

Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models

Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models G00237716 Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models Published: 6 February 2013 Analyst(s): David W. Cearley, Donna Scott, Joe Skorupa, Thomas J. Bittman Cloud

More information

Managing Vulnerabilities For PCI Compliance

Managing Vulnerabilities For PCI Compliance Managing Vulnerabilities For PCI Compliance Christopher S. Harper Vice President of Technical Services, Secure Enterprise Computing, Inc. June 2012 NOTE CONCERNING INTELLECTUAL PROPERTY AND SOLUTIONS OF

More information

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced

More information