Make Optimizing Security Protection in Virtualized Environments a Priority

Size: px
Start display at page:

Download "Make Optimizing Security Protection in Virtualized Environments a Priority"

Transcription

1 G Make Optimizing Security Protection in Virtualized Environments a Priority Published: 15 February 2012 Analyst(s): Neil MacDonald As the virtualization of servers and desktops becomes more common, endpoint protection platform (EPP) solutions are starting to adapt to the needs of these environments. Although most solutions will run in a virtual guest environment without modification, the performance impact, especially of scheduled scans, will affect the density of virtual machines (VMs) per server. Techniques such as randomized scanning, scanning of offline guests, gold image whitelisting, scan result caching and randomizing signature updates provide improved performance in virtual environments. Several vendors have added or improved these techniques; others are notably behind. Explicit support and optimization for virtualized environments should become a mandatory part of any endpoint security tool evaluation. Key Findings Not all anti-malware vendors have delivered scanning solutions that are optimized for virtual environments. Multiple simultaneous scans aren't the only cause of resource contention issues. Signature and engine distribution scenarios also create significant overhead. Resource contention issues can occur on virtualized server or desktop workloads, although the issue is more pronounced with hosted virtual desktops (HVDs). Resource contention issues caused by security protection will alter the economics of full-scale HVD implementations if anti-malware solutions are not optimized. Pilot programs, which typically have low server utilization rates, may not surface this problem. Agentless antivirus (AV) has received a significant amount of market attention, but there are limitations associated with this approach that must be considered. Recommendations Look for solutions that natively support and optimize anti-malware scanning in a virtualized environment in your EPP evaluation for servers and desktops. Favor vendors that offer solutions spanning physical and virtual servers and desktops with a consistent management and reporting interface and a consistent way to set policies across all environments

2 To reduce complexity and consolidate licensing costs, use the same anti-malware-scanning solution across desktops and servers virtual or physical where possible. What ou Need to Know Endpoint security protection capabilities must evolve to explicitly support virtualized environments ideally, providing virtualization exploitative solutions and protecting virtualized desktop and server workloads. Different vendors are at different levels of maturity in their virtualized protection capabilities, so this must become a key requirement in server and desktop security protection solutions moving forward. Don't assume that your vendor provides the best solution for virtual environments. Use the framework provided here to evaluate EPP solutions against each other, and to better understand the different approaches available. Analysis Virtualization of the data center server and desktop workloads is happening rapidly; 1, 2 however, most host-based protection software was designed with the now-outdated notion that the security stack was running on dedicated hardware. Agent-based security protection controls for endpoints, such as EPP (see "Magic Quadrant for Endpoint Protection Platforms"), create significant resource contention issues when multiple, separate, independent and uncoordinated anti-malware scans are initiated from within virtualized sessions on the same physical hardware. The issue can occur with real-time, on-access scanning; however, this problem is more pronounced with scheduled on-demand scans within HVD environments, where all workloads are typically protected by EPP agents set to perform anti-malware scanning or to update their signature files at the same time creating "AV storms." In many cases, server and desktop VM images are "cookie cutter" images of each other, built from common enterprise high-assurance "gold" templates. It makes no sense to scan the same set of files against the same signature set over and over. Furthermore, this inefficiency affects the alreadytenuous value proposition of HVD 3 by reducing the number of images that can be stored on a single physical host because of input/output or other hardware constraints. There are multiple ways that anti-malware vendors should address the need to secure virtualized environments from simply supporting a virtualized environment to exploiting native integration with the virtualization platform to optimize anti-malware protection. We provide a multilevel framework to evaluate the anti-malware protection in a virtualized endpoint environment (see Figures 1 and 2 for examples of vendors and solutions). Page 2 of 13 Gartner, Inc. G

3 Figure 1. Example of Virtualization Capabilities by Vendor in Shipping Solutions (Part 1) Capability Vendor and Version 1a. Support of the product running in virtualized environments: Support of the product running in a full VM 1b. Support of the product running in virtualized environments: Support of the product running in a terminal service environment 1c. Support of the product running in virtualized environments: Supporting the product's ability to look inside virtualized application containers Symantec McAfee Trend Micro Kaspersky Sophos Microsoft SEP 11 SEP 12.1 VirusScan Move 1.0 Move 2.0 Office Scan DeepSecurity v6 MP4 v8 v10 Forefront Endpoint Protection 1d. Support of the product running in virtualized environments: Support of the product running in a virtualized application container 2. Randomized or staggered scanning (via virtualization scan controller) 3. Build a whitelist of files from VM image templates (if gold image built with agent for initial cache) (if gold image built with agent for initial cache) N (future) Source: Gartner (February 2012) Gartner, Inc. G Page 3 of 13

4 Figure 2. Example of Virtualization Capabilities by Vendor in Shipping Solutions (Part 2) Vendor and Version Symantec McAfee Trend Micro Kaspersky Sophos Microsoft Capability SEP 11 SEP 12.1 VirusScan Move 1.0 Move 2.0 Office Scan DeepSecurity v6 MP4 v8 v10 Forefront Endpoint Protection 4. Intelligent signature file update (random based on VM boot) 5. Intelligent engine update (with VDI plug-in) 6. Extend scanning to offline VMs Partial (off by default; VHD only) 7. Update signature files and engines of offline VMs 8. Offload on-demand scanning to a security VM running on the same machine N (future) N (future) 9. Offload on-demand scanning to a security VM running on another machine 10. Intelligent caching of anti-malware scans across VMs Partial (via v10 "Allow List") 11. Hybrid security VM/lightweight agent architecture 12. Full agentless onaccess scanning 13. Agentless File Integrity Monitoring N (future) N (future) N (future) N (future) Source: Gartner (February 2012) Page 4 of 13 Gartner, Inc. G

5 In Figures 1 and 2, we provide information on shipping solutions. However, nearly every vendor has now publicly stated its intention to deliver virtualization-optimized solutions most of them with a specific option to integrate in the VMware vsphere hypervisor for agentless anti-malware scanning (see Figure 3). The information in Figure 3 is based on information provided by the vendors. Some vendors declined to include information on future versions, and this information is subject to final changes before release. Figure 3. Example of Virtualization Capabilities by Vendor Expected in Future Solutions Capability Vendor and Future Version 1a. Support of the product running in virtualized environments: Support of the product running in a full VM 1b. Support of the product running in virtualized environments: Support of the product running in a terminal service environment 1c. Support of the product running in virtualized environments: Supporting the product's ability to look inside virtualized application containers 1d. Support of the product running in virtualized environments: Support of the product running in a virtualized application container McAfee Move 2.5 (April 2012) Kaspersky Security for Virtualization 1.1 (February 2012) 2. Randomized or staggered scanning 3. Build a whitelist of files from VM image templates 4. Intelligent signature file update 5. Intelligent engine update (non-vmware) for VMware (non-vmware) for VMware 6. Extend scanning to offline VMs 7. Update signature files and engines of offline VMs 8. Offload on-demand scanning to a security VM running on the same machine 9. Offload on-demand scanning to a security VM running on another machine 10. Intelligent caching of anti-malware scans across VMs 11. Hybrid security VM/lightweight agent architecture (non-vmware) for VMware (non-vmware) N (future) 12. Full agentless on-access scanning (for VMware only) 13. Agentless file integrity monitoring Source: Gartner (February 2012) Gartner, Inc. G Page 5 of 13

6 We provide an explanation of the importance of each capability: 1. Support of the product running in virtualized environments: Because virtualization can occur at different layers, there are multiple ways a vendor should support virtualized environments: Support of the product running in a full VM: One of the first things an organization should do is ensure that its EPP vendor's solutions run correctly in a virtualized environment and support the major virtualization platforms. This should include virtual server workloads, HVDs and VMs that may run locally on a machine for example, in a Windows VM on Macintosh or on Windows using hosted virtualization, or in a Windows VM on a local desktop hypervisor. Ideally, the ability to be run and fully supported inside a VM would extend to the vendor's EPP management console as well. Support of the product running in a terminal service environment: The organization should ensure that support extends to remote desktop services (presentation virtualization) from Citrix and Microsoft. Nearly all vendors have done this at this point, because x86 terminal service technology has been around for more than two decades. Supporting the product's ability to look inside virtualized application containers: Enterprises are increasingly using application virtualization solutions from vendors such as Microsoft, VMware, Symantec and others as an easier way to package and distribute applications and as a way to manage composite desktop images. Security solutions need to be able to see into these containers to perform real-time malware scanning and other EPP functions, such as application control. Support of the product running in a virtualized application container: It is also possible that the security or management software itself could be containerized using application virtualization technologies to enable the security protection to be more easily composited into a workload image. However, this has not yet been delivered because of the low-level OS integration requirements of security agents required to be able to scan outside of the virtualized application container. 2. Randomized or staggered scanning: Once the agent is running in a VM, most organizations encounter resource contention issues with EPP solutions that are not optimized for virtualized environments. In most cases, this is because all anti-malware scheduled scans are set to start at the same time, which creates memory, CPU and disk contention. To reduce contention, enterprises should look for EPP providers to enable randomization of the scans or grouping of scans of machines to scan at staggered starting times by policy. 3. Build a whitelist of files from VM image templates: Many VMs (especially with HVD) are based on clones or templated images, or they are thinly provisioned from a common base of high assurance images. One way is to include the EPP agent in the base image and initiate a scan to build the initial cache. A better approach is to ingest a gold image to construct a whitelist of files that do not have to be subsequently scanned. Because there is a slight risk that the gold image has been compromised, a periodic scan should be performed of these templates (see No. 6 below). The whitelist should be based on a hash of the file (not file name, path or directory) to reduce the risk that a whitelisted file is compromised and not detected. If Page 6 of 13 Gartner, Inc. G

7 the solution doesn't support this, the entire system must be scanned periodically; however, this can also be optimized (see No. 10 below). 4. Intelligent signature file update: Like the problem of scheduled on-demand scans initiating at the same time, resource contention is created if all the VMs attempt to update their signature file at the same time (for example, during the boot process). At a minimum, the EPP solution must allow signature file updates to be staggered or randomized. An improved solution would be to have one machine update its signature file and then act as a relay to update the others. The best solution would be to have an architecture optimized to use a single, shared signature file across all engines saving the redundancy of maintaining hundreds of identical files. EPP solutions that have a live cloud lookup mechanism (such as Trend Micro's solutions to its Smart Protection Network) should also have techniques to avoid network resource contention (for example, a relay mechanism such that if one VM asks the cloud about a particular file, it can share that update with other VMs). 5. Intelligent engine update: Most EPP providers have the ability to update their security engines as a way to counter new threats that can't be addressed using signature file updates alone. In the same way that signature file updates need to be updated intelligently (as in the previous section), EPP engine updates need to able to be intelligently distributed as well in similar ways. 6. Extend scanning to offline VMs: Most organizations maintain libraries of offline VM images (for example, templates, clones, snapshots and users with persistent HVD sessions). The antimalware scanning process must be extended to offline VMs. This becomes important to ensure that dormant VMs do not contain embedded malware. Even though the dormant VM may have an agent of its own, it is not actively being updated or scanned. Also, files that were previously scanned and not determined to be malicious may be malicious when the VMs are rescanned with an updated signature set. One solution would be to programmatically mount the VMs in a quarantined state to scan the VMs in a live state. However, a better solution would be for the EPP vendor to be able to understand and crawl the specific VM image format to scan for malware. 7. Update signature files and engines of offline VMs: Offline VMs with EPP solutions installed will be immediately out of date when they boot. This can create a delay in the boot process or responsiveness if the EPP agent is required to update its signature file and/or engine at boot time. One solution would be for the EPP provider to provide a way to update the EPP signature file and/or engine while the VM is offline. For signature files, this could be simply a file replacement so that when the VM is brought up, not only has it been scanned, but it also has the latest engine and set of signature files and rules. Note that this is not an issue with agentless anti-malware scanning (see No. 12 below). 8. Offload on-demand scanning to a security VM running on the same machine: Most EPP offerings provide a combination of on-demand (scheduled) and on-access (real time) scanning for malware. To optimize on-demand scanning, one VM should be responsible for the scheduled scanning of all the VM images. This works for file-based malware (on-demand) but not for on-access scanning. Also, because live VM images are held open, they are not easily accessible from other VMs for scanning. One solution here is to use snapshots of live machines to create a copy that is then scanned for malware. One advantage to placing protection Gartner, Inc. G Page 7 of 13

8 capabilities in a separate VM is that the VM can be throttled to limit the overall impact on the server. 9. Offload on-demand scanning to a security VM running on another machine: There is no technical reason that consolidated on-demand scanning has to be performed from a VM running in the same physical server. Any physical server that can access the same shared storage could perform this function. To do this effectively will require integration with tools such as snapshotting and virtual server management tools. 10. Intelligent caching of anti-malware scans across VMs: In addition to the ability to create a whitelist or common cache (see No. 3 above), there are occasions when a set of VMs will need to be completely scanned. Ideally, the EPP solution would support caching the results of VM scans and enable the sharing of this cache across VMs. For example, this approach is used by Symantec Endpoint Protection (SEP) 12's Shared Insight Cache. In this way, the scanning engine can intelligently avoid rescanning the same files against the same signature set. This capability should support online and offline VMs: If the scanning engine knows that a given file has been scanned (typically based on its hash) and the signature set hasn't changed, then don't scan it again. An improved approach would support differential intelligence. If a signature file receives an update, then the engine would be smart enough to only scan differentially with the net new signatures, as opposed to rescanning with the entire set. This approach requires the use of a shared cache, which is coordinated using a security VM, or one of the agents takes on this role. 11. Hybrid security VM/lightweight agent architecture: Some solutions (for example, McAfee's MOVE) have developed a hybrid architecture that combines in-vm agents with a security VM that oversees the scanning across VMs. In this way, the vendor is able to provide optimization of on-demand scanning by using the security VM to coordinate scanning and using the in-vm agent for on-access scanning. Another advantage to this approach is that it can be designed in such a way that it is virtualization-platform-neutral. 12. Full agentless on-access scanning: All the approaches to this point still require a local agent for real-time, on-access scanning as files are accessed. Introspection techniques offer the ability to remove the agent entirely This capability was first commercialized in VMware with vsphere 4.1 and VMware's vshield Endpoint set of APIs. The first vendor to support this was Trend Micro. Since then, multiple providers have announced road maps and intentions to support this, but none have yet shipped. Agentless anti-malware scanning is an extremely useful way to extend protection to VMs that have no protection at all (for example, virtual appliances), and to provide immediate and up-to-date protection from previously dormant VMs. There is a significant amount of marketing hype around this approach and significant interest from clients; 4 however, there are trade-offs to being completely outside the VM that you are trying to protect (see Figures 4 and 5). Page 8 of 13 Gartner, Inc. G

9 Figure 4. Pros of Agentless Anti-Malware Scanning Anti-malware scanning is orchestrated by a separate security virtual machine (VM), optimizing scanning across VMs, and improving performance and resource virtualization The security VM provides separation of the security controls from the containers it protects, providing tamper resistance. Because there is no vendor-supplied agent installed in each VM, keeping engines and signature files up to date is simplified. When new or offline VMs are booted, they are protected immediately, and there is no local signature file that requires updating. Anti-malware scanning extends security protection to third-party VMs and virtual appliances where anti-malware agents may not have been installed. The security VM can be throttled to restrict its impact on system resources. Source: Gartner (February 2012) Figure 5. Cons of Agentless Anti-Malware Scanning The solution ties you to a specific virtualization platform (currently only VMware offers this capability). It requires VMware's vsphere 4.1 or higher and licensing of vshield Endpoint. It requires code (vshield Endpoint) to be installed on each physical server at the hypervisor layer, which will support this functionality. This is a significant issue when considering the protection of cloud-based workloads in infrastructure-as-a-service offerings where the provider won't provide direct hypervisor access. The solution is not truly agentless. Stub code is supplied by VMware that instruments each VM using VMware Tools to install the code. VMware provides stub code for Windows-based VMs only. There is no option to protect Linux-based workloads. The solution is limited to file-based anti-malware scanning. There's no ability to protect memory. There's no behavioral monitoring, application control or device control. Because malware is detected outside the VM container it is protecting, there is a limited ability to interact with users to let them know why a particular piece of executable code was not allowed to run. Although malware can be quarantined and simple malware can be removed, it is difficult to remove deeply rooted malware that requires multiple simultaneous interactions with the registry, boot record, Windows system files and so on in order to be completely removed. Source: Gartner (February 2012) Gartner, Inc. G Page 9 of 13

10 13. Agentless file integrity monitoring (FIM): Introspection provides access to all file, disk, network and CPU activity, and could be used for a large number of information security protection mechanisms beyond just agentless anti-malware scanning. Introduced in August 2011, vsphere 5.0 provided the next generation of VMware's vshield set of APIs, including support for agentless FIM. Trend Micro is the first to support agentless FIM with its Deep Security offering. 14. Agentless data loss prevention (DLP): Agentless DLP scanning is offered only from VMware providers using RSA's (the parent company of VMware and security division of EMC) DLP engine. This capability was introduced with vsphere 5.0 in Because only VMware provides this, and there is no option to replace the RSA engine that provides this capability, it is not shown in Figures 1, 2 and Agentless application control: This capability is not yet available, so it is not included in Figures 1, 2 and 3. The ability to control what applications are allowed to launch (also referred to as whitelisting) is a powerful, foundational security capability, and we expect VMware to enable this capability by year-end Tactical Guidelines Migrating server and desktop workloads from physical to virtual does not eliminate the need for endpoint protection. Ensure that pilot programs for HVD include specific testing to surface EPP resource contention issues. As you evaluate EPP solutions, use this framework to ask providers specific questions about their support and optimization for virtualized environments. Explicit support and optimization for virtualized environments must become a mandatory part of any endpoint security tool evaluation. Look for independent, third-party comparison testing of the performance of anti-malware scanning in virtualized environments. Be wary of vendor-sponsored studies. 5 Configuring EPP products for randomization is a first step to reduce the impact on server, network and storage infrastructures. Don't overlook the need to scan offline VM images. Keep these images up to date from a signature file, engine and patch perspective, or consider an agentless approach that helps address these issues. Don't assume that agentless AV is always the best approach. Alternatives using hybrid architectures and intelligent caching also optimize performance without creating hypervisor lock-in. Innovation in this space is rapid, so demand specific road map commitments from your incumbent EPP providers. If your incumbent EPP provider can't deliver, switch vendors even if this means using a different solution to protect physical versus virtualized environments. Page 10 of 13 Gartner, Inc. G

11 Recommended Reading Some documents may not be available as part of your current Gartner subscription. "Magic Quadrant for Endpoint Protection Platforms" "Radically Transforming Security and Management in a Virtualized World: Concepts" "Radically Transforming Security and Management in a Virtualized World: Considerations" "Tactical Guidelines for Evaluating Virtualization Security Solutions" "VMware Pushes Further Into the Security Market With Its vshield Offerings" "Tactical Guidelines for Evaluating Virtualization Security Solutions" "McAfee Leverages Intel for Deeper Security" "How to Devise a Server Protection Strategy" "What Can Desktop Virtualization Do for our Organization?" "Forecast: Hosted Virtual Desktops, Worldwide, (2010 Update)" Evidence 1 In "Forecast: Hosted Virtual Desktops, Worldwide, (2010 Update)," Gartner research projects that the total number of HVDs will grow sharply to 70 million users by In "Virtual Machines Will Slow in the Enterprise, Grow in the Cloud," we estimated that, at yearend 2011, 49% of the x86 in data centers that could be virtualized had been virtualized. 3 In "Forecast: Hosted Virtual Desktops, Worldwide, (2010 Update)," Gartner survey data indicates that a reduction in total cost of ownership is the highest priority cited for the adoption of HVD. However, nonoptimized anti-malware scanning will affect the ability of servers to scale to support HVD sessions and will ultimately impact the overall TCO of HVD by increasing hardware requirements beyond the approximately 1.4 to 1.6 times the cost of using physical hardware. 4 Gartner's information security team has received an increasing number of calls looking for solutions to reduce resource contention created by anti-malware scanning in virtualized environments. In a majority of these calls, Trend Micro's early embrace of the agentless approach using introspection was brought up proactively by Gartner clients as a possible solution. However, as discussed in this research, there are alternative approaches, and each approach has its pros and cons. 5 Third-party test reports of anti-malware scanning in virtualized environments are appearing, providing alternative sources of resource utilization information and comparisons, such as and Gartner, Inc. G Page 11 of 13

12 However, some of these tests are vendorsponsored, so confirmation in your own test lab setting with typical user workloads and applications is required. Page 12 of 13 Gartner, Inc. G

13 Regional Headquarters Corporate Headquarters 56 Top Gallant Road Stamford, CT USA European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity on its website, ombudsman/omb_guide2.jsp. Gartner, Inc. G Page 13 of 13

Cloud IaaS: Security Considerations

Cloud IaaS: Security Considerations G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the

More information

Emerging PC Life Cycle Configuration Management Vendors

Emerging PC Life Cycle Configuration Management Vendors Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market

More information

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration

More information

Q&A: The Many Aspects of Private Cloud Computing

Q&A: The Many Aspects of Private Cloud Computing Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner

More information

Private Cloud Computing: An Essential Overview

Private Cloud Computing: An Essential Overview Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan

More information

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

IT asset management (ITAM) will proliferate in midsize and large companies.

IT asset management (ITAM) will proliferate in midsize and large companies. Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter

More information

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

2010 FEI Technology Study: CPM and BI Show Improvement From 2009 Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management

More information

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very

More information

Gartner's View on 'Bring Your Own' in Client Computing

Gartner's View on 'Bring Your Own' in Client Computing G00217298 Gartner's View on 'Bring Your Own' in Client Computing Published: 20 October 2011 Analyst(s): Leif-Olof Wallin Here, we bring together recently published research covering the hot topic of supporting

More information

From Secure Virtualization to Secure Private Clouds

From Secure Virtualization to Secure Private Clouds Research Publication Date: 13 October 2010 ID Number: G00208057 From Secure Virtualization to Secure Private Clouds Neil MacDonald, Thomas J. Bittman As enterprises move beyond virtualizing their data

More information

Eight Critical Forces Shape Enterprise Data Center Strategies

Eight Critical Forces Shape Enterprise Data Center Strategies Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects

More information

NAC Strategies for Supporting BYOD Environments

NAC Strategies for Supporting BYOD Environments G00226204 NAC Strategies for Supporting BYOD Environments Published: 22 December 2011 Analyst(s): Lawrence Orans, John Pescatore Network access control (NAC) will be a key element in a flexible approach

More information

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures

More information

Research Agenda and Key Issues for Converged Infrastructure, 2006

Research Agenda and Key Issues for Converged Infrastructure, 2006 Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the

More information

Addressing the Most Common Security Risks in Data Center Virtualization Projects

Addressing the Most Common Security Risks in Data Center Virtualization Projects Research Publication Date: 25 January 2010 ID Number: G00173434 Addressing the Most Common Security Risks in Data Center Virtualization Projects Neil MacDonald In 2007, we addressed the security considerations

More information

X.509 Certificate Management: Avoiding Downtime and Brand Damage

X.509 Certificate Management: Avoiding Downtime and Brand Damage G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity

More information

Toolkit: Reduce Dependence on Desk-Side Support Technicians

Toolkit: Reduce Dependence on Desk-Side Support Technicians Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life

More information

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers

More information

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Deliver Process-Driven Business Intelligence With a Balanced BI Platform Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations

More information

NGFWs will be most effective when working in conjunction with other layers of security controls.

NGFWs will be most effective when working in conjunction with other layers of security controls. Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such

More information

The Five Competencies of MRM 'Re-' Defined

The Five Competencies of MRM 'Re-' Defined Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management

More information

Data in the Cloud: The Changing Nature of Managing Data Delivery

Data in the Cloud: The Changing Nature of Managing Data Delivery Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play

More information

Repurposing Old PCs as Thin Clients as a Way to Save Money

Repurposing Old PCs as Thin Clients as a Way to Save Money Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers

More information

Choosing a Replacement for Incumbent One-Time Password Tokens

Choosing a Replacement for Incumbent One-Time Password Tokens Research Publication Date: 21 April 2011 ID Number: G00212244 Choosing a Replacement for Incumbent One-Time Password Tokens Ant Allan This research outlines the options for enterprises seeking replacements

More information

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes. Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing

More information

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research

More information

Real-Time Decisions Need Corporate Performance Management

Real-Time Decisions Need Corporate Performance Management Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends

More information

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must

More information

Overcoming the Gap Between Business Intelligence and Decision Support

Overcoming the Gap Between Business Intelligence and Decision Support Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision

More information

Best Practices for Confirming Software Inventories in Software Asset Management

Best Practices for Confirming Software Inventories in Software Asset Management Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Roundup of Business Intelligence and Information Management Research, 1Q08

Roundup of Business Intelligence and Information Management Research, 1Q08 Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our

More information

Cloud IaaS: Service-Level Agreements

Cloud IaaS: Service-Level Agreements G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of

More information

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial

More information

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Cloud, SaaS, Hosting and Other Off-Premises Computing Models Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,

More information

Understanding Vulnerability Management Life Cycle Functions

Understanding Vulnerability Management Life Cycle Functions Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability

More information

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable

More information

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing

More information

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references

More information

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability. Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based

More information

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor

More information

Agenda for Supply Chain Strategy and Enablers, 2012

Agenda for Supply Chain Strategy and Enablers, 2012 G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling

More information

Strategic Road Map for Network Access Control

Strategic Road Map for Network Access Control G00219087 Strategic Road Map for Network Access Control Published: 11 October 2011 Analyst(s): Lawrence Orans, John Pescatore Long derided as an overhyped concept, network access control (NAC) has emerged

More information

The Six Triggers for Using Data Center Infrastructure Management Tools

The Six Triggers for Using Data Center Infrastructure Management Tools G00230904 The Six Triggers for Using Data Center Infrastructure Management Tools Published: 29 February 2012 Analyst(s): Rakesh Kumar This research outlines the six main triggers for users to start using

More information

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions. Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information

More information

The Next Generation of Functionality for Marketing Resource Management

The Next Generation of Functionality for Marketing Resource Management G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management

More information

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management

More information

The Current State of Agile Method Adoption

The Current State of Agile Method Adoption Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand

More information

The IT Service Desk Market Is Ready for SaaS

The IT Service Desk Market Is Ready for SaaS Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service

More information

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement

More information

Establishing a Strategy for Database Security Is No Longer Optional

Establishing a Strategy for Database Security Is No Longer Optional Establishing a Strategy for Database Security Is No Longer Optional Published: 29 November 2011 G00226793 Analyst(s): Jeffrey Wheatman The options for securing increasingly valuable databases are very

More information

Singapore Empowers Land Transport Planners With Data Warehouse

Singapore Empowers Land Transport Planners With Data Warehouse G00219502 Singapore Empowers Land Transport Planners With Data Warehouse Published: 18 October 2011 Analyst(s): Eric Thoo The Land Transport Authority (LTA) of Singapore wanted to improve planning and

More information

Solution Path: Threats and Vulnerabilities

Solution Path: Threats and Vulnerabilities Solution Path: Threats and Vulnerabilities Published: 24 January 2012 Burton IT1 Research G00226331 Analyst(s): Dan Blum This solution path helps Gartner clients develop a strategy and program for managing

More information

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other. Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives

More information

Containers and Modules: Is This the Future of the Data Center?

Containers and Modules: Is This the Future of the Data Center? Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet

More information

Business Intelligence Platform Usage and Quality Dynamics, 2008

Business Intelligence Platform Usage and Quality Dynamics, 2008 Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's

More information

Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing

Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Research Publication Date: 19 July 2011 ID Number: G00214537 Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Benoit J. Lheureux Paper manufacturer Mohawk Fine Papers needed

More information

IT Architecture Is Not Enterprise Architecture

IT Architecture Is Not Enterprise Architecture Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research

More information

VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY

VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY VIRTUALIZATION SECURITY OPTIONS: CHOOSE WISELY With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next One Size Does Not Fit All 1 For virtualization security, there s no one size

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

VIRTUALIZATION SECURITY IN THE REAL WORLD

VIRTUALIZATION SECURITY IN THE REAL WORLD VIRTUALIZATION SECURITY IN THE REAL WORLD Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials Sponsored by McAfee Protecting Virtual Endpoints with McAfee Server Security Suite Essentials December 2013 A SANS Analyst Whitepaper Written by Dave Shackleford Capability Sets for Virtualization Security

More information

The What, Why and When of Cloud Computing

The What, Why and When of Cloud Computing Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.

More information

What to Consider When Designing Next-Generation Data Centers

What to Consider When Designing Next-Generation Data Centers Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,

More information

Organizations Must Employ Effective Data Security Strategies

Organizations Must Employ Effective Data Security Strategies Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security

More information

McAfee MOVE / VMware Collaboration Best Practices

McAfee MOVE / VMware Collaboration Best Practices McAfee MOVE / VMware Collaboration Best Practices Christie J. Karrels Sales Engineer Federal DoD January 11, 2013 1 P a g e Contents Introduction... 3 Traditional Anti-Malware vs. Optimized Anti-Malware...

More information

Now Is the Time for Security at the Application Level

Now Is the Time for Security at the Application Level Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now

More information

Key Issues for Data Management and Integration, 2006

Key Issues for Data Management and Integration, 2006 Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity

More information

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are

More information

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits

How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with

More information

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...

More information

Business Intelligence Focus Shifts From Tactical to Strategic

Business Intelligence Focus Shifts From Tactical to Strategic Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth

More information

Gartner Clarifies the Definition of the Term 'Enterprise Architecture'

Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,

More information

Recognize the Importance of Digital Marketing

Recognize the Importance of Digital Marketing Recognize the Importance of Digital Marketing Laura McLellan, Lead Author Laura McLellan, Laura McLellan serves CMOs and other marketing executives, sharing how digital strategies are being integrated

More information

How To Create A Cloud Computing System

How To Create A Cloud Computing System G00230221 Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus

More information

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships

Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving

More information

IT Operational Considerations for Cloud Computing

IT Operational Considerations for Cloud Computing Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.

More information