Emerging PC Life Cycle Configuration Management Vendors



Similar documents
Toolkit: Reduce Dependence on Desk-Side Support Technicians

Key Issues for Identity and Access Management, 2008

Gartner's View on 'Bring Your Own' in Client Computing

Research. Key Issues for Software as a Service, 2009

The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools

The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption

The IT Service Desk Market Is Ready for SaaS

Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.

Private Cloud Computing: An Essential Overview

2010 FEI Technology Study: CPM and BI Show Improvement From 2009

Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost

Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products

In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand

Cloud IaaS: Service-Level Agreements

Data in the Cloud: The Changing Nature of Managing Data Delivery

Q&A: The Many Aspects of Private Cloud Computing

Best Practices for Confirming Software Inventories in Software Asset Management

Repurposing Old PCs as Thin Clients as a Way to Save Money

Organizations Should Implement Web Application Security Scanning

Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process

Understanding Vulnerability Management Life Cycle Functions

Cloud, SaaS, Hosting and Other Off-Premises Computing Models

Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users

IT asset management (ITAM) will proliferate in midsize and large companies.

Strategic Road Map for Network Access Control

How to Choose Providers for Mobile Consumer Application Platforms

Organizations Must Employ Effective Data Security Strategies

The Lack of a CRM Strategy Will Hinder Health Insurer Growth

IT Architecture Is Not Enterprise Architecture

The Five Competencies of MRM 'Re-' Defined

Research Agenda and Key Issues for Converged Infrastructure, 2006

When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud

Choosing a Replacement for Incumbent One-Time Password Tokens

Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing

Q&A: How Can ERP Recurring Costs Be Contained?

Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in

NAC Strategies for Supporting BYOD Environments

Tactical Guideline: Minimizing Risk in Hosting Relationships

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

Key Issues for Business Intelligence and Performance Management Initiatives, 2008

Agenda for Supply Chain Strategy and Enablers, 2012

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

The Current State of Agile Method Adoption

Eight Critical Forces Shape Enterprise Data Center Strategies

NGFWs will be most effective when working in conjunction with other layers of security controls.

Establishing a Strategy for Database Security Is No Longer Optional

Invest in an analysis of current metrics and those missing, and develop a plan for continuous management and improvement.

Business Intelligence Platform Usage and Quality Dynamics, 2008

The What, Why and When of Cloud Computing

Managing IT Risks During Cost-Cutting Periods

IT Operational Considerations for Cloud Computing

Deliver Process-Driven Business Intelligence With a Balanced BI Platform

Overcoming the Gap Between Business Intelligence and Decision Support

Cloud Decision-Making Criteria for Educational Organizations

Case Study: A K-12 Portal Project at the Miami-Dade County Public Schools

BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle

2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities

X.509 Certificate Management: Avoiding Downtime and Brand Damage

The Six Triggers for Using Data Center Infrastructure Management Tools

Salesforce.com's Chatter: Facebook-Like Feel for CRM Applications

The Next Generation of Functionality for Marketing Resource Management

Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing

The Seven Building Blocks of MDM: A Framework for Success

Key Issues for Consumer Goods Manufacturers, 2011

Business Intelligence Focus Shifts From Tactical to Strategic

Roundup of Business Intelligence and Information Management Research, 1Q08

Research. Mastering Master Data Management

Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets

Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game

MarketScope for IT Governance, Risk and Compliance Management, 2008

Energy savings from well-managed data centers can reduce operating expenses by as much as 20%.

The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.

Key Issues for Data Management and Integration, 2006

Recognize the Importance of Digital Marketing

An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success

A Guide to Adapting IT Tools for Smart Grid OT Management Challenges

For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.

Additional Tools for a World-Class ERP Infrastructure

Use These Guidelines for Making Better CRM Consulting Provider Selections

Discovering the Value of Unified Communications

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Containers and Modules: Is This the Future of the Data Center?

Now Is the Time for Security at the Application Level

Cloud IaaS: Security Considerations

How to Develop an Effective Vulnerability Management Process

Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality

Embrace Virtual Assistants as Part of a Holistic Web Customer Service Strategy

User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009

Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve

Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students

What Is the Role of Quality Assurance in a SaaS Environment?

Use Heterogeneous Storage Virtualization as a Bridge to the Cloud

Singapore Empowers Land Transport Planners With Data Warehouse

What to Consider When Designing Next-Generation Data Centers

Best Practice: Having a 'Big Picture' View of IP Telephony Will Give the Buyer More Control

Case Study for Supply Chain Leaders: Dell's Transformative Journey Through Supply Chain Segmentation

Real-Time Decisions Need Corporate Performance Management

Consider Identity and Access Management as a Process, Not a Technology

Solution Path: Threats and Vulnerabilities

Critical Privacy Questions to Ask an HCM/CRM SaaS Provider

Transcription:

Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market is mature, with large vendors selling established products, they have not responded quickly to the myriad new customer requirements, which has created opportunity for new vendors. IT leaders who have struggled with established products, due to a lack of comprehensive platform support, an inability to manage security configurations effectively or a lack of resources to manage the PCCLM product infrastructure, should consider these emerging vendors. Key Findings The mainstream PCCLM vendors haven't addressed some of the emerging market requirements, such as non-windows device management, providing software-as-aservice (SaaS) delivery models and tying together vulnerability assessment with remediation. New vendors are entering the PCCLM market, attempting to provide solutions for small to midsize organizations, offering more security capability through tighter endpoint control and managing devices beyond traditional Windows systems. Recommendations Consider emerging PCCLM vendors a viable choice when you have a specific need that matches one of their strengths (for example, Mac/mobile device management, integrating vulnerability assessment with configuration management and SaaS). Request to speak with at least two references as part of your evaluation of these vendors; ensure that the references are using the product in the way that you intend to use it. 2011 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity" on its website, http://www.gartner.com/technology/about/ombudsman/omb_guide2.jsp

ANALYSIS The PCCLM market continues to mature. Vendor offerings in the core areas of inventory, software distribution, patch management and OS deployment have become increasingly similar during the past several years. Still, the mainstream vendors in the PCCLM market (see "Magic Quadrant for PC Configuration Life Cycle Management Tools") can fail to meet organizations' needs in various circumstances. This means that smaller, less established vendors in the PCCLM market may offer the best option for organizations that require particular strengths. The vendors discussed in this research did not qualify for the PCCLM Magic Quadrant; however, they have specific strengths, and may be compelling to organizations that are willing to assume some risk in working with a less established vendor in the PCCLM market. Mainstream PCCLM vendors are (to various extents) behind the market in meeting some evolving trends. There are three market needs that these emerging PCCLM vendors have developed solutions to help address: SaaS, alternative device management, and integration of endpoint security and client management. SaaS As discussed in "Alternative PCCLM Delivery Models Are Emerging," organizations are starting to look for alternatives to traditional on-premises PCCLM software. PCCLM products are complex, and they introduce new infrastructure that must be implemented and managed. This is one of the primary reasons that PCCLM products have not seen substantial uptake in organizations with fewer than 1,000 users. Appliances have seen more market acceptance, but organizations are also starting to seek SaaS products. SaaS platforms represent a new model of monetizing PCCLM software. They are not easily built, and some elements of PC life cycle management must take place on-premises (e.g., OS deployment), so only a handful of offerings exist. Alternative Device Management Recent Gartner surveys found that many organizations are supporting client platforms beyond Windows: 45% to 50% of organizations support Macs; however, their footprint within organizations is significantly smaller than that of Windows PCs. 87% to 93% of organizations support mobile devices. 50% to 75% of organizations have requested support for the ipad, and we believe a large percentage of these organizations are already providing support. The depth and breadth of support for non-windows client devices among the established PCCLM vendors varies significantly. Organizations that want to collect inventory and deploy occasional applications to non-windows clients can often use their PCCLM tools successfully. These tools can have trouble deploying complex applications or performing more-advanced functions, such as software usage monitoring. Organizations that require comprehensive non-windows capability along with traditional Windows-based PCCLM functionality will have to do a thorough evaluation of a small shortlist of vendors, because few offer comprehensive support across multiple client platform types. Integration of Endpoint Security and Client Management The convergence of security and operations has been a key theme in client computing for several years. Many security best practices involve standardization, good change management and the Publication Date: 20 January 2011/ID Number: G00209766 Page 2 of 6

enforcement of policies on the endpoint. Desktop organizations have been assuming more security responsibilities, particularly those that are operational. Consequently, organizations have increasingly been drawn to products that tie together vulnerability discovery and remediation. This convergence is particularly strong in midsize organizations, where the same people are often responsible for desktop management and endpoint security. Emerging PCCLM Vendors Absolute Software Based in Vancouver, British Columbia, Canada, Absolute Software has two product lines. Its flagship product is Computrace, an asset tracking product that helps organizations locate and secure lost or stolen PCs and Macs. Absolute Software acquired LANrev in December 2009, and rebranded it as "Absolute Manage." Absolute Manage is particularly strong at managing Mac clients, as this was LANrev's primary focus. Absolute Manage also has the core functionality of Windows client management, but its primary differentiation is in its Mac management. Absolute Software also recently announced comprehensive mobile device management for Apple's ios4; it is one of the few vendors that offers software distribution for in-house applications to the ios4 platform. Alternative device management is the emerging market need that Absolute Software addresses most substantially. Cautions: Kaseya Absolute Manage's Mac support is the strongest among vendors that offer both Windows and Mac management capabilities. Customers have reported good experiences working with Absolute Software's customer support. Absolute Manage recently added Windows PC imaging based on Free, Open-Source Ghost (FOG). There is a lack of proof points on how well FOG works within Absolute Manage's architecture, and how well Absolute Software can support customers trying to do Windows OS deployments. Absolute Software does not have a broader service management offering (e.g., service desk and asset management), which is something that many organizations (particularly midmarket organizations) look for from a single vendor. Based in Switzerland, Kaseya has a wide range of client management functionality. It has several product editions. The Enterprise Edition is positioned for large organizations, while the Small- Medium Enterprise Edition is positioned for smaller organizations. Both of these are on-premises software products. Kaseya also recently released a SaaS platform (called IT Center), which contains a subset of the functionality available in the on-premises editions (and, most notably, lacking OS deployment). SaaS is the emerging market need that Kaseya is working on addressing. Kaseya's products have developed a reputation for being easy to install and use, compared with many competitive products. We generally see Kaseya Enterprise Edition in organizations with 200 to 1,000 end users, a market segment in which many organizations struggle with many of the established PCCLM products. Publication Date: 20 January 2011/ID Number: G00209766 Page 3 of 6

Cautions: Kaseya's products offer a wide range of client management functionality, including capabilities that many other PCCLM products don't offer, such as PC backup and system performance monitoring. Kaseya's functionality is based on a single agent, and has a Web-based user interface. The vendor's product editions lack a full-featured OS deployment module. For example, it does not provide pre-execution environment (PXE) boot imaging, which is something Kaseya plans to address in the second quarter of 2011. While Kaseya has a ticketing offering, it doesn't have the breadth of service management functionality that many established PCCLM vendors have, such as an asset repository. Numara Software Numara Software is based in Tampa, Florida. It acquired Criston Software in 2009, and renamed Criston's product Numara Asset Management Platform (NAMP), which (despite its name) is a PCCLM product. Numara Software's heritage is in the service desk space, and a big part of the company's strategy involves tying together service desk and asset management processes by integrating Numara FootPrints and NAMP. NAMP has full PCCLM capabilities, but its primary differentiator (with respect to the emerging market needs discussed above) is to integrate security and operations processes by doing vulnerability assessment and remediation from the same console, using the same agent and working with the same set of data. The lion's share of Numara Software's business is generated by its service desk products, Numara FootPrints and Numara Track-It!; Criston did not have a large installed base prior to its acquisition by Numara Software. Although Numara Software has had some traction with NAMP, it must continue to demonstrate an ability to execute as a new vendor in the mature PCCLM market. Cautions: Viewfinity NAMP uses a single agent for all life cycle management functions (inventory, software distribution, patch, vulnerability management, etc.). Agentless asset discovery helps organizations identify rogue machines and keep an accurate account of IT assets. NAMP only has basic Mac support, offering inventory, software deployment and power management. It lacks patching, OS deployment, remote control and software usage monitoring for Mac clients. NAMP does not have mobile device management functionality; organizations must use third-party products to manage smartphones and tablets. Based in Waltham, Massachusetts, Viewfinity is a SaaS-based PCCLM and privilege management vendor. Its SaaS delivery model is the emerging market need that it most substantially addresses. The company was started by the founders of XOsoft, who had a unique approach to managing data using a filter driver to capture byte-level changes, which enabled them to create time-captured checkpoints for each input/output event. They took a similar approach to managing Windows configurations when they founded Viewfinity. This allows Publication Date: 20 January 2011/ID Number: G00209766 Page 4 of 6

Viewfinity to encapsulate applications (similar to application virtualization technology) and roll back configurations more granularly than can be done using native Windows capabilities. While Viewfinity offers the core capabilities of PCCLM, its focus of late has been around privilege elevation, to help organizations implement PC lockdown more effectively. Most Gartner client conversations involving Viewfinity have been about privilege elevation, not client management. Organizations that find Viewfinity's approach to managing the endpoint compelling should request at least two references that are using the product for system management. Cautions: The SaaS platform allows organizations to quickly trial and deploy PCCLM and privilege management functionality. The agent, based on a low-level filter driver, allows for granular control of the endpoint. Viewfinity is still unproven in the PCCLM space, a market with established products. Potential customers must do their own reference validations to ensure that other customers are using Viewfinity successfully to solve PCCLM problems. OS deployment is provided through a partnership with Acronis, which adds a layer of vendor complexity. RECOMMENDED READING Some documents may not be available as part of your current Gartner subscription. "Magic Quadrant for PC Configuration Life Cycle Management Tools" Publication Date: 20 January 2011/ID Number: G00209766 Page 5 of 6

REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT 06902-7700 U.S.A. +1 203 964 0096 European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM +44 1784 431611 Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA +61 2 9459 4600 Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo 153-0042 JAPAN +81 3 3481 3670 Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, 12551 9 andar World Trade Center 04578-903 São Paulo SP BRAZIL +55 11 3443 1509 Publication Date: 20 January 2011/ID Number: G00209766 Page 6 of 6