Página 1 de 9 Critical Capabilities for Enterprise Endpoint Backup 24 October 2013 ID:G00255640 Analyst(s): Pushan Rinnen, Dave Russell VIEW SUMMARY This research provides detailed stack ranking of seven endpoint backup products against 11 critical capabilities and across two use cases. This can help IT leaders narrow their enterprise endpoint backup product shortlists. Overview Key Findings Endpoint backup is no longer just about data protection; it also applies to reducing security risk and increasing user productivity. Endpoint backup capability gaps among leading products have narrowed in the past year, making product selection more difficult than before. While all products offer decent PC backup capabilities, key differentiations focus on performancerelated metrics, mobile device support and additional capabilities, such as integrated remote wipe and remote tracking. Almost 40% of user references surveyed reported that they have started implementing the practice of bring your own device (BYOD); however, support for integrated backup and file sync and share remains unavailable from the majority of vendors. Recommendations Procure budget for endpoint backup to protect your company's intellectual property and to increase knowledge workers' productivity. Work closely with the endpoint security/compliance team and the mobile team to design a comprehensive corporate plan for endpoint protection, including backup. Choose endpoint backup products based on employees' risk profiles. The mobile workforce tends to be more at risk than office workers, and will need a product that has stronger built-in security features and more data capture capabilities, and offers better self-service experiences. Choose endpoint backup products that offer strong mobile device support if your company is planning to introduce BYOD. What You Need to Know This document was revised on 18 July 2014. For more information, see the Corrections page. Endpoint backup is fundamentally different from server backup. Endpoint backup deals with the unpredictability of people, rather than predictability of servers. Many organizations had given up on endpoint backup because of management complexity and high failure rates. Modern endpoint backup solutions have beefed up basic backup capabilities and, more importantly, are no longer only about backup. Vendors are adding functions such as easy self-restore, mobile access, file sync, e-discovery and remote wipe to increase user productivity and reduce compliance and security risks associated with human behavior. Meanwhile, the increased mobile work options and adoption of BYOD are increasing security risks. As a result, we are seeing greater interest in deploying endpoint backup from large organizations, including well-known technology companies. These companies realize that increased workforce mobility heightens data loss risks, as more employees store their data locally on their endpoints. The old way of either ignoring endpoint backup or forcing users to write to a corporate network share is no longer valid. EVIDENCE 1 Among the 19 user references that responded to our endpoint backup survey, only five mentioned that they sometimes hear end users complaining about the performance issues when backup is initiated. Some mentioned they heard complaints when users back up huge files, such as 10GB size. CRITICAL CAPABILITIES METHODOLOGY Critical capabilities are attributes that differentiate products in a class in terms of their quality and performance. Gartner recommends that users consider the set of critical capabilities as some of the most important criteria for acquisition decisions. This methodology requires analysts to identify the critical capabilities for a class of products. Each capability is then weighted in terms of its relative importance overall, as well as for specific product use cases. Next, products are rated in terms of how well they achieve each of the critical capabilities. A score that summarizes how well they meet the critical capabilities overall, and for each use case, is then calculated for each product. Ratings and summary scores range from 1.0 to 5.0: 1 = Poor: most or all defined requirements not achieved 2 = Fair: some requirements not achieved 3 = Good: meets requirements 4 = Excellent: meets or exceeds some requirements 5 = Outstanding: significantly exceeds requirements Product viability is distinct from the critical capability scores for each product. It is our assessment of the vendor's strategy and its ability to enhance and support a product over its expected life cycle; it is not an evaluation of the vendor as a whole. Four major areas are considered: strategy, support, execution and investment. Strategy includes how a vendor's strategy for a particular product fits in relation to its other product lines, its market direction and its business overall. Support includes the quality of technical and account support as well as customer experiences for that product. Execution considers a vendor's structure and processes for sales, marketing, pricing and deal management. Investment considers the vendor's financial health and the likelihood of the individual business unit responsible for a product to continue investing in it. Each product is rated on a five-point scale from poor to outstanding for each of these four areas, and it is then assigned an overall product viability rating. The critical capabilities Gartner has selected do not represent all capabilities for any product and, therefore, may not represent those most important for a specific use situation or business objective. Clients should use a critical capabilities analysis as one of several sources of input about a product before making an acquisition decision. This updated report has several major changes compared with last year's report. We have excluded one product that is no longer available and three products that almost never show up in Gartner end-user inquiries and lack development focus on endpoints from their vendors. Good Technology acquired Copiun in 4Q12 for its file sync and share function and discontinued the backup product. The other products that are excluded are CA Technologies' CA ARCserve, EMC Avamar and IBM Tivoli Storage Manager (TSM) FastBack for Workstations and TSM with Backup/Archive Client. These vendors and their respective products have a much stronger focus than on endpoint backup development. Again, we haven't included Symantec's Desktop and Laptop Option backup product, because Symantec hasn't been focusing on endpoint backup and doesn't have a future strategy.
Página 2 de 9 We have modified some categories of critical capabilities based on new product developments and more logical groupings. For example, we combined last year's device diversity and content variety into one category: PC device/os diversity. We changed heterogeneous restore to PC content restore/migration. Last year, support for mobile devices, such as tablets and smartphones, were blended with PCs; this year, we created mobile device support as a separate category. Another new category is back-end server/storage capabilities, which is useful information for organizations planning to implement endpoint backup on-premises. Due to many changes in evaluation categories and what is included in each category, we advise against comparing this year's report with last year's report, as they will not be exact comparisons. Additionally, the market is changing as larger-scale deployments progress and vendors refine solutions. The two use cases remain the same mobile-workforce-centric versus office-workforce-centric although weightings for each critical capability against each use case are changed due to new capabilities created in 2013. Analysis Introduction Endpoint backup was not adopted widely because traditional products had a lot of performance issues, such as long backup windows and performance degradation during backup, as well as management limitations such as lack of silent deployment and self-restore functions. Some organizations tried and gave up on endpoint backup, while others worked around this problem by requiring users to write to network shares. However, the latter practice is typically not enforced, as many users store their data on their local drives, and road warriors, for example, don't have access to VPNs. With technology advancements, today's endpoint backup has become much more user-transparent 1 and user-friendly, and can even increase user productivity with mobile access and sync capabilities. On the security side, some products have remote wipe and geographical tracking capabilities to reduce security risks. Endpoint backup remains predominantly focused on PC backup for desktops and laptops. The need to back up mobile devices (tablets and smartphones) is limited to photos and documents. Mobile access (read and download, but not upload) to PC backup copies, however, has become widely available as a standard feature. Due to the sandboxed nature of many mobile OSs, version-based file sync has become a convenient way to offer mobile data protection. During 2012, Druva was the only vendor to offer an endpoint backup product that had a companion file sync product for business organizations. In 2013, EMC (Mozy) added file sync capability based on its previous consumer product. Code 42 Software and CommVault introduced file sync capabilities in October 2013 with different implementations, and their product ratings reflect their upcoming capabilities. When backup is file-sync-aware, files that have been synced to the server will no longer need to be transmitted over the Internet again, thus reducing network traffic. Moreover, file sync offered by backup vendors may provide the same source-side deduplication used in endpoint backup, further decreasing network traffic and increasing performance. We believe that, over time, enterprise endpoint backup will merge with access/file sync and data loss prevention (DLP) functions more seamlessly to form a total solution to prevent data loss and leak from endpoint devices, and to increase user productivity. While all products evaluated in this report offer decent PC backup capabilities, key differentiations focus on performance-related metrics, mobile device support and more advanced capabilities, such as file sync, device/os migration, e-discovery functions, and integration with DLP features, such as remote wipe and remote tracking. While a few products have proven records of large, scalable deployments, others need to improve their presence in large enterprises. Of the seven products evaluated, five introduced new or refreshed graphical user interfaces (GUIs) since our last report. The new or refreshed GUIs have a more intuitive and more modern look than their older versions, and aim to make users' experiences and the administrator's job easier. Product Class Definition Enterprise endpoint backup refers to backup of endpoint devices, such as desktops, laptops, tablets and smartphones, which can access corporate content and create business content locally. There are numerous PC backup products in the market, especially for consumers and small businesses. The focus of this report is on the products that have proven ability to meet enterprise endpoint backup support and implementation requirements. Critical Capabilities Definition All endpoint backup products profiled here share some basic features and functions, such as centralized management, user transparency in terms of agent deployment and backup, backup of files and email archives, restore to a different device, support for scheduled backup and support for interrupted backup where backup jobs resume where they have stopped. We concentrate on 11 critical capabilities that differentiate competing endpoint backup products: PC OS Diversity Degree of diversity in PC OS platforms and data supported PC Content Restore/Migration Ability to restore individual files to a different OS version or platform, as well as to migrate the entire PC content to a new device Mobile Device Support The level of data protection support for mobile devices such as tablets and smartphones Scalability
Página 3 de 9 Size of the deployment in the real world, as well as based on product design Data Reduction Techniques Type of data reduction techniques used in the product, such as deduplication and compression, and how they are implemented Performance Performance-boosting techniques from initial seeding options to recovery, as well as default backup intervals, and network and CPU throttling Security Security features such as access control methods, encryption, remote wipe/remote tracking, and mobile containerization support User Experience Factors impacting both end-user and administrator experiences, such as user interfaces, self-restore capability, and monitoring/reporting tools Back-End Server/Storage Capability Capabilities to implement data integrity checks, high-availability for backup server and storage, and dynamic client load balancing Proven Cloud Presence Degree of supporting the vendor's cloud or third-party cloud, including cloud adoption and data center presence E-Discovery Functions Functions that allow easy e-discovery for compliance, such as full-text indexing and search, federated search, and support for legal hold Use Cases Since the use cases have to be supported by all products evaluated, we are rating the endpoint backup products for two use cases as well as the overall use case: Overall Overall use case is a generalized usage scenario and is not representative of how specific users will use or deploy a technology or service within their enterprise. Mobile-Workforce-Centric Endpoint backup software needs to cater to the dynamic and unpredictable online/offline schedules of the mobile workforce, as well as the unsecure environment outside corporate firewalls. For this use case, heterogeneous OS backup/restore and migration, security-related capabilities and support for mobile devices such as tablets and smartphones and cloud have a higher weighting than the officeworkforce-centric use case. Office-Workforce-Centric Endpoint backup software caters to a workforce that is always online during predictable business hours. These kinds of employees are typically sitting within a company's firewall (office workers) or connected via a secure corporate VPN (telecommuters). For this type of workforce, scalability, user experiences, back-end server/storage capabilities and e-discovery functions carry higher weighting. Table 1 looks at the weightings of all use cases in this research. Each use case weighs the capabilities individually based on the needs of that case, which impacts the score. Each vendor may have a different position based on its capability and the weighting for each one. The overall use case is the general scoring for the vendor's product, which is the average of the two different use cases. Inclusion Criteria The inclusion criteria for various endpoint backup products focus on enterprise-level support with proven field records and a central management console. This year, Gartner showed preference toward the products that focus on protecting endpoint data or have shown solid enhancements and road maps regarding endpoint backup/recovery. The other detailed inclusion criteria have not changed: In addition to desktop backup, the product must support portable endpoint devices (at least laptops, with tablet and smartphone support as a plus). The product targets large-enterprise customers, as well as small or midsize businesses (SMBs), with basic enterprise-class capabilities, such as a centralized common management tool for multiple devices and the capability to support at least 1,000 endpoint devices. The product is developed and owned by the vendor. If the product is sourced from an OEM partner, it is not qualified for separate evaluation. The product must have an installed base of at least 100 business customers (with at least 100 employees per customer) or have at least 100,000 endpoint devices being managed. The vendor must provide at least three reference customers who are using the product's key features.
Página 4 de 9 Table 1. Weighting for Critical Capabilities in Use Cases Critical Capabilities Overall Mobile-Workforce-Centric Office-Workforce-Centric PC OS Diversity 6.5% 8.0% 5.0% PC Content Restore/Migration 5.0% 7.0% 3.0% Mobile Device Support 9.0% 12.0% 6.0% Scalability 10.5% 6.0% 15.0% Data Reduction Techniques 10.0% 10.0% 10.0% Performance 15.0% 15.0% 15.0% Security 9.0% 10.0% 8.0% User Experience 12.5% 10.0% 15.0% Back-End Server/Storage Capability 9.0% 6.0% 12.0% Proven Cloud Presence 7.5% 10.0% 5.0% E-Discovery Functions 6.0% 6.0% 6.0% Total 100.0% 100.0% 100.0% As of October 2013 Critical Capabilities Rating Each of the products that meets our inclusion criteria has been evaluated on the critical capabilities, on a scale of 1.0 to 5.0 (see the Critical Capabilities Methodology section for details about out methodology): 1 = Poor or absent: Most (or all) defined requirements for a capability are not achieved. 2 = Fair: Some requirements are not achieved. 3 = Good: Meets requirements. 4 = Excellent: Meets and exceeds some requirements. 5 = Outstanding: Significantly exceeds requirements ("best in class"). The baselines for each of the capabilities are: PC OS diversity: Products that meet requirements can back up the latest versions of Windows and Mac OSs. Products that have support for open-file backup across multiple OS platforms and additional data type backup receive higher ratings. PC content restore/migration: Products that can restore files and email archive files, such as personal storage table (PST) files, meet the basic requirement. Those that can restore local settings and do bare metal restore for device migration, as well as those that can restore to a different OS while maintaining existing structure, receive higher ratings. Mobile device support: Mobile access to backup data and mobile apps are basic requirements. Products that can back up select mobile content, auto prevent backup over 3G/4G networks, and/or support file sync among mobile and PC devices receive higher ratings. Scalability: Products should support at least 1,000 endpoints per server and have no practical limit on file size and count. Those that have many proven records of large customers or scalable architecture designs receive higher ratings. Data reduction techniques: Products that meet requirements support block-level incremental and source-side deduplication and compression. Those that offer target-side global deduplication and offer more efficient deduplication algorithms receive higher ratings. Performance: Products that meet basic requirements support online initial full backup, more frequent than daily backup, and backup to local disk, as well as network and CPU throttling. Those that offer additional performance-boosting techniques, such as near continuous data protection (CDP) by default or local cache, receive higher ratings. Security: Products that meet requirements support Active Directory (AD), encryption for data in flight and at rest, and VPN-less backup over the Internet. Those that have more robust implementation techniques and more security features, such as special encryption techniques, remote wipe and remote tracking, receive higher ratings. User experience: For end users, products should at least offer silent deployment and backup, simple GUI for self-service restore, and a mobile app. For administrators, products that meet requirements support solid AD integration, useful dashboard, a good monitoring/reporting tool and offline restore support. Those that support a more intuitive GUI and real-time monitoring/reporting receive higher scores. Proven cloud presence: Products that mainly are delivered via cloud services with key customers are rated higher than those that are deployed mostly on-premises. Among cloud service providers, their number of global data centers is factored into their rating as well. E-discovery functions: Products that meet requirements offer flexible retention policies. Those that offer embedded full-text indexing and search, federated search, and legal hold receive higher ratings than those that require a stand-alone product. Table 2 shows the numeric ratings for each endpoint backup product.
Página 5 de 9 Table 2. Product Rating on Critical Capabilities Product or Service Ratings Asigra (Cloud Backup) Code 42 Software (CrashPlan) CommVault (Simpana Edge) Datacastle (Red) Druva (insync) EMC (Mozy) HP (Autonomy Connected) PC OS Diversity 3.6 3.7 3.7 3.2 3.7 2.9 3.0 PC Content Restore/Migration Mobile Device Support 3.2 3.0 3.6 3.3 3.9 3.5 3.4 3.6 3.4 3.2 3.0 3.8 3.6 2.6 Scalability 3.1 4.2 3.7 3.4 3.7 3.6 3.7 Data Reduction Techniques 3.4 3.3 3.4 3.6 3.6 2.5 2.9 Performance 3.1 3.5 3.2 3.6 3.5 3.2 2.5 Security 3.1 3.2 3.1 3.5 3.9 3.1 3.1 User Experience 3.3 3.8 3.1 3.1 3.6 3.0 3.2 Back-End Server/Storage Capability Proven Cloud Presence E-Discovery Functions 3.7 3.4 3.2 3.7 2.8 3.5 3.5 3.4 3.6 2.3 3.5 3.3 3.9 4.5 3.1 3.4 3.6 3.0 3.7 2.9 3.7 As of October 2013 To determine an overall score for each product in the use cases, the ratings in Table 2 are multiplied by the weightings shown in Table 1. These scores are shown in Table 3. Figure 1 shows the product ratings for the seven products in this report. Table 3. Product Score Use Cases Asigra (Cloud Backup) Code 42 Software (CrashPlan) CommVault (Simpana Edge) Datacastle (Red) Druva (insync) EMC (Mozy) HP (Autonomy Connected) Overall 3.31 3.54 3.26 3.38 3.57 3.23 3.21 Mobile- Workforce- Centric Office- Workforce- Centric 3.32 3.49 3.23 3.36 3.60 3.24 3.19 3.31 3.58 3.29 3.39 3.55 3.22 3.22 As of October 2013 Figure 1. Product Rating Chart
Página 6 de 9 Product Viability Each product is rated on a five-point scale from poor to outstanding for each of these four areas (strategy, support, execution and investment), and is then assigned an overall product viability rating (see Table 4). Table 4. Product Viability Rating Vendor (Product Name) Asigra (Cloud Backup) Code 42 Software (CrashPlan) CommVault (Simpana Edge) Datacastle (Red) Druva (insync) EMC (Mozy) HP (Autonomy Connected) Product Viability Good Excellent Good Good Excellent Good Good The weighted capabilities scores for all use cases are displayed as components of the overall score (see Figure 2, Figure 3 and Figure 4). Figure 2. Product Rating Chart for the Mobile-Workforce-Centric Use Case Figure 3. Product Rating Chart for the Office-Workforce-Centric Use Case
Página 7 de 9 Figure 4. Product Rating Chart for the Overall Use Case Vendors Asigra (Cloud Backup) Asigra, a private company based in Toronto, Canada, is known in the industry for its server and endpoint backup and recovery solutions designed for managed service providers, although a few companies also use its product as an on-premises implementation. The endpoint support of its Cloud Backup stands out in its ios and Android backup capabilities, in addition to mobile access to both PC and file server backup. Its mobile apps have native look and feel. The product supports source-side deduplication, as well as target-side global deduplication. In 2013, Asigra introduced a Windows RT/Metro style GUI for administrators. However, Asigra's customer references only have small deployments. Asigra's Cloud Backup does not have other advanced features, such as integrated file sync, remote wipe and e-discovery capabilities. A few examples of Asigra management service provider (MSP) partners that offer endpoint backup services include Data Storage in New York City, Phoenix IT Services in the U.K., and Matrix in Germany. Code 42 Software (CrashPlan) Code 42 Software (Code 42) is headquartered in Minneapolis, Minnesota. Founded in 2001, the company has raised more than $55 million in private equity. In addition to its consumer and small business offerings, it has an enterprise offering called CrashPlan PROe, with its largest customer supporting 160,000 devices. Code 42 has gained many large customers, including two leading mobile OS vendors, most of which deployed CrashPlan on their own premises. Code 42 has six global data centers (two in the U.S., one in Europe and three in Asia/Pacific and Japan), which store backup data of nearly 1 million endpoint devices, many of them from consumers or small businesses. Many customers use its default 15-minute backup intervals with little performance issues. In addition to its capability of mobile access to backup, Code 42 recently introduced a file sync and share product called SharePlan, which is integrated with backup with a single data transfer and a single management console. CrashPlan has an intuitive interface. However, unlike many competitive products, CrashPlan doesn't back up system and application settings and can't be used for PC migration or upgrades. It supports very granular source-side deduplication, but doesn't support global deduplication at the target side. Other advanced features beyond backup, such as remote wipe and full-text search, are not supported. CommVault (Simpana Edge) CommVault is best known for its Simpana enterprise server backup suite. A small percentage of its customers use Simpana Edge today, with the largest customer protecting over 28,000 laptops. Unlike many leading enterprise server backup vendors that treat endpoint backup as an afterthought, CommVault shows strong commitment to its endpoint data protection development beyond basic backup, including client access, file sync and e-discovery (additional cost) from a single data repository. CommVault's newly launched capability of mobile uploads allows documents and photos created on a
Página 8 de 9 mobile device to be uploaded to a PC and then to be backed up by the PC agent. Edge's Web console and mobile app can access/download backup data from Simpana Content Store (which is positioned as a personal data cloud), and the backup data could be from a PC, a file server or an Exchange server. Since our 2012 report, Simpana v.10 added enhancements to Edge, including new GUIs, workflow management and integration with Windows Explorer for user self-restore without having to open the Web console. It also supports a file modification option to enable backups to occur in a near continuous mode and when there is changed data. The new GUI has a useful preview feature before restore. On the down side, some customers commented that CommVault's Edge may require more scripting to manage endpoint backup and that some VPN remote users have performance issues. CommVault's cloud presence is relatively low, compared with competitors, as it is typically installed as an onpremises solution. Datacastle (Red) Datacastle is a private software company headquartered in Seattle, Washington. It has raised $16 million of its funding since 2008. Datacastle Red (the company's endpoint backup offering) is sold primarily to user organizations through cloud services. Its largest service provider partner supports hundreds of thousands of devices in a single vault. It has been certified by Microsoft Azure and IBM SmartCloud, and Microsoft's Enterprise Partner Group is actively selling Datacastle Red as part of its Azure solution promotions. Among the assessed products, Datacastle Red has some strong capabilities: Patented ability to encrypt data blocks before they are deduplicated; QuickCache, a centrally managed, encrypted local cache on a Windows Storage Server for fast LAN backup and restore/migration; RoamSmart, a function that can autodetect 3G/4G networks even for PCs tethered to a smartphone; and global deduplication, which could be applied across companies/tenants in the same vault with each company owning a different encryption key for the same data block. Many of these features are appealing to cloud service providers. It supports near CDP, with many customers using the recommended 15-minute intervals, and has solid remote wipe and tracking capabilities. However, it lacks support for mobile devices, as it doesn't have a mobile app and doesn't offer file sync. The Datacastle Red interface looks somewhat outdated compared with competitors' offerings, and its e-discovery/legal hold capabilities are weak. Druva (insync) Druva is a private software company located in Sunnyvale, California. It launched insync in 2010. It raised $30 million venture capital funding in October 2013 for a total of $47 million. Its largest customer has deployed more than 30,000 devices. Druva has increased its brand awareness among enterprises by leading the movement toward an integrated endpoint data protection and management solution. It was the first vendor to offer a unified platform for integrated endpoint backup, sync and share, mobile support and DLP. Its product is one of only two products among those profiled in this report that support backup of select ios and Android local content. Druva's backup is file sync aware, so data doesn't need to be sent out twice from the client, and storage quotas can be shared for backup and sync. Its DLP features, such as remote wipe and GPS tracking, and its analytics functions are now part of the standard offering. Druva's insync client-side cache and server-side cache reduce disk input/output (I/O) significantly and enables many parallel backup jobs. On the cloud front, the product is available as a service running in the Amazon cloud with single pricing for customers. In the past year, it added support for five additional Amazon international data centers. Druva doesn't support near CDP, and the default setting for backup schedule is every two hours. Although it supports object storage, such as Amazon S3, EMC Atmos and OpenStack Swift, and added dual backup destination support for high availability in 2013, it relies on back-end storage's native capabilities to do automated load balancing. EMC (Mozy) After the 2007 acquisition by EMC, Mozy experienced some uncertainties associated with internal organizational changes between EMC and VMware. Since becoming part of EMC's Backup Recovery Systems (BRS) Division, which oversees the rest of the EMC data protection products, Mozy has begun refocusing on its product development. In the past year, Mozy added pooled storage quota and caught up in the areas of AD support with federated ID and single sign-on capabilities and resuming backup where it's left off (instead of starting from the beginning). Its mobile apps for ios and Android can now upload photos to the cloud for backup via its enhanced Personal Sync function. It increased the standard 30-day retention period to 90 days. However, it still lacks important features such as CDP/near CDP scheduling and block-level deduplication and compression, as well as advanced functions such as remote wipe and e-discovery. Although Mozy offers cloud services, its global presence is limited and doesn't offer cross-geographical storage redundancy. HP (Autonomy Connected) HP's Autonomy Connected PC backup has been around for many years, and has established good enterprise presence with its Iron Mountain legacy. Iron Mountain sold this business in May 2011 to Autonomy, which was bought by HP in 4Q11. Today, Iron Mountain still offers this service as an HP reseller. However, the two ownership changes in a short period, followed by HP's internal changes, slowed down product development. As a result, the Connected product has lagged behind competition in many areas, notably the lack of CDP/near CDP, block-level deduplication, no CPU or disk I/O throttling, file size limitation, and mobile device backup capabilities. HP doesn't have advanced feature functions such as file sync and remote wipe. On the positive side, the product has proven its scalability with large deployments (HP itself is a customer backing up 250,000 devices to the Connected cloud). It offers full-text index/search and federated search through its integration with Autonomy's Intelligent Data Operating Layer, a common information platform for structured and unstructured information that provides conceptual understanding of information. Connected is also one of the data sources for Autonomy Legal Hold. In 2013, HP added federated ID support, introduced a migration mode where a user could download the newest content first to a new device for access, reducing downtime during migration. It also refreshed its GUI and updated its mobile access app for Android to support more Android OS versions. 2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for
Página 9 de 9 Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity. About Gartner Careers Newsroom Policies Site Index IT Glossary Contact Gartner