Gartner defines desktop as a service (DaaS) as the provision of virtual desktops by public cloud or other service providers. DaaS provides desktop or application end-user experiences from virtual machines (VMs) accessed using a remote display protocol. DaaS vendors incorporate a fully managed control plane service into their offerings, which facilitates user connections and provides a management interface. DaaS can be delivered preconfigured as a service. Alternatively, it can be delivered as a platform, in which case the client is responsible for assembly, configuration and management. DaaS is charged through subscription- or usage-based payment structures.
IT Infrastructure and IoT refers to the products and services that support the deployment, management, and optimization of core technology systems and connected devices across enterprise environments. This category includes markets that focus on enabling organizations to build and operate resilient, scalable, and intelligent infrastructure. It encompasses solutions for data center management, network infrastructure, and IoT connectivity—spanning on-premises, cloud, edge, and hybrid models.
IT Security refers to products and services that protect digital systems and data from cyber threats and unauthorized access. This category includes markets that focus on network security, identity management, data protection, and cloud security, enabling organizations to reduce risk, ensure compliance, and operate securely in a digital world.
Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. Without effective authentication, the security of and trust in that person’s digital interactions are deeply undermined. User authentication is foundational to and protects the value of other functions within an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD), audit (individual accountability), and identity analytics.