Gartner defines document management as the tools and practices used to capture, store, process, and access documents and content in support of personal, team and enterprise needs. It is used for a wide range of collaborative and operational purposes, enabling the digital workplace, content collaboration, content-centric processes, content services for enterprise applications and content governance. Gartner estimates that 70% to 80% of enterprise information is unstructured, posing a significant challenge for organizations that must unlock the potential and mitigate the risks of content. Document management tools are critical to enterprise application strategies that need to support unstructured information or content.
An embedded operating system (OS) is a type of OS that is used in embedded computing devices. The term 'embedded' refers to devices that are installed (that is, embedded) as built-in components of a wider system, in which they serve a special, functional purpose. Embedded OSs differ from other types of OSs by their optimized design. Form factors, price points and other parameters of embedded devices set constraints on the OS, for example, in terms of functionality, user interface, memory space and driver support. Consequently, the architectures of embedded OSs tend to be extensively optimized for single-purpose deployment, stripped out of anything that is considered unnecessary for their use. This does not mean that embedded OSs cannot be applied outside of embedded devices. For instance, it is common to see embedded real-time operating systems (RTOSs) being used to handle the baseband functionality in smartphones.
EMNSs automate the distribution and management of messages to relevant stakeholders for localized events and regional and catastrophic disasters across multiple channels. Use cases include organizational crises, business-critical operations, IT outages, and public and personal safety.
Gartner defines an endpoint management tool as a platform or tool that provides configuration management, patching and deployment of operating systems and applications for computers or mobile devices. Endpoint management tools are used to provide management capabilities for endpoint devices of various operating systems. These tools help maintain cybersecurity hygiene and enable end-user computing operations and automation by facilitating operating system and application deployment, patching and configuration management.
Information-centric security products focus on content, more than device, and apply encryption and authentication to block file access and movement from unauthorized people or circumstances. Endpoint systems are porous, mistakenly sharing data is easy, and users can be careless. Information-centric security is the last line of defense for data when firewalls, anti-malware tools, best practices and other traditional defenses fail. The scope of this market is the protection of stored information, commonly referred to as data at rest. The protection of data at rest in some ways takes precedence, because the interconnectedness of today’s systems often undermines network protections. In other words, high-value information should be protected “at rest” to prevent the risk of a breach caused by an unexpected data in motion event.
The market for instant communications security and compliance consists of solutions that protect instant communications sent over networks, while also ensuring regulatory compliance.
Gartner defines a mobile application management (MAM) tool as an on-premises or SaaS tool specifically designed for the license management, distribution, securing and life cycle management of apps for mobile device platforms. Thus, MAM tools provide integration with public app store payment and licensing mechanisms (such as Apple's Volume Purchase Program [VPP]), an enterprise app store, and the ability to set policies related to security, usage and ongoing management for apps or groups of apps. At minimum, a MAM product supports native and HTML 5 apps. Many also support a variety of popular hybrid app architectures, which may be highly desirable based on a particular client's needs.