Gartner defines CSP service design and orchestration (SD&O) solutions as part of operations support system (OSS). It’s a set of products/offerings that enable CSPs to design, fulfill and orchestrate services for their clients in various market segments such as consumer, enterprise and wholesale. These solutions include service design tools; policy tools; orchestration solutions; and inventories, provisioning and activation tools for use in physical, virtual, containerized and hybrid network environments.
Cloud management tooling enables organizations to manage hybrid and multicloud (that is, on-premises, public cloud and edge) services and resources. This includes providing governance, life cycle management, brokering and automation for managed cloud infrastructure resources across multiple functional areas. The tooling can be procured and operated by central IT organizations, such as I&O, cloud center of excellence (CCOE) and platform engineering/operations, or within specific lines of business. It can be deployed on-premises, in a customer’s public cloud account or purchased as a SaaS.
Gartner defines communications platform as a service (CPaaS) as a cloud-based platform used by developers, the IT team and other nontechnical business roles to build an array of communications-related capabilities using APIs, SDKs, documentation and no-code/low-code visual builders. The CPaaS tools facilitate access to multiple communications channels spanning voice, SMS, email, messaging apps, video and conversational capabilities, along with security. The purpose of CPaaS is to enable enterprises to improve communications workflows by providing simplified access to multiple communications capabilities. CPaaS enables enterprises to shorten time to market for new products and services, personalize communications, and orchestrate customer journeys across multiple channels. It delivers digital engagement and operationalizes customer experience, while also driving business efficiencies at scale with digital service delivery. It’s modular/composable in design and can expand from initial single-use cases to many others as additional business units learn of its value. CPaaS capabilities can also be consumed in a wholesale model, powering third-party cloud vendor offerings such as contact center, CRM, multichannel marketing and ERP. There are also wholesale use cases in which CPaaS providers wholesale to each other and telcos.
The CCI market covers solutions that include the equipment, software and services that enable customer service organizations to manage multichannel customer interactions holistically (using self-service and assisted service) from a customer experience and an employee engagement perspective. Central to the definition of CCI is that the solutions are dedicated to supporting a single customer or tenant on each instance of the system, even if that customer or tenant supports multiple contact center operations on that dedicated instance. CCI solutions are used by customer service and telemarketing centers, employee service and support centers, help desk service centers, and other types of structured communications operations.
Gartner defines contact center as a service (CCaaS) as solutions offering SaaS-based applications that enable customer service departments to manage multichannel customer interactions holistically from both a customer-experience and employee-experience perspective. CCaaS is a key technology platform used to support the customer service experience, whether it be self-service or assisted by customer service representatives. All organizations need to offer customer assistance. The preference is for remote support via voice and digital channels over physical presence in offices and stores, though it is common for organizations to offer multiple options.
The corporate telephony market is evolving from a focus on innovation in proprietary hardware to use of commodity hardware and standards-based software. While most telephony solutions are Internet Protocol (IP)-enabled or IP-PBX solutions, the associated endpoints are a mix of time division multiplexing (TDM) and IP. Corporate telephony platforms focus on high-availability, scalable solutions, which support Session Initiation Protocol (SIP), desktop and soft phone functionality, and the ability to integrate with enterprise IT applications while delivering toll-grade voice quality.
Reviews for 'Data Center - Others'
The data center and cloud networking vendors covered in this market provide hardware and/or software solutions to deliver connectivity primarily within enterprise data centers. This includes data center core/spine switches, access switches (top of rack [ToR], leaf), virtual switching, Ethernet fabrics, network operating systems (NOSs) and network overlays, and the requisite management, automation and orchestration of those components.
The market for DLP technology includes offerings that provide visibility into data usage and movement across an organization. It also involves dynamic enforcement of security policies based on content and context for data in use, data in motion and data at rest. DLP technology seeks to address data-related threats, including the risks of inadvertent or accidental data loss and the exposure of sensitive data, using monitoring, alerting, warning, blocking, quarantining and other remediation features.
Gartner defines digital experience monitoring (DEM) tools as those that measure the availability, performance and quality of the user experience (human user or digital agent) of critical applications. This can include internal users (employees and contractors), external users (customers and partners) or a digital agent connecting to an API. In addition to performance, DEM technologies enable observability of user behavior and journey based on their interaction with applications.
Email security refers collectively to the prediction, prevention, detection and response framework used to provide attack protection and access protection for email. Email security spans gateways, email systems, user behavior, content security, and various supporting processes, services and adjacent security architecture. Effective email security requires not only the selection of the correct products, with the required capabilities and configurations, but also having the right operational procedures in place.
The Endpoint Detection and Response Solutions (EDR) market is defined as solutions that record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems. EDR solutions must provide the following four primary capabilities: • Detect security incidents • Contain the incident at the endpoint • Investigate security incidents • Provide remediation guidance
Gartner defines an endpoint protection platform (EPP) as security software designed to protect managed endpoints — including desktop PCs, laptop PCs, mobile devices and, in some cases, server endpoints — against known and unknown malicious attacks. EPPs provide capabilities for security teams to investigate and remediate incidents that evade prevention controls. EPP products are delivered as software agents, deployed to endpoints, and connected to centralized security analytics and management consoles. EPPs provide a defensive security control to protect end-user endpoints against known and unknown malware infections using a combination of security techniques (such as static and behavioral analysis) and system controls (such as device control and host firewall management). EPP prevention and protection capabilities are deployed as a part of a defense-in-depth strategy to help reduce the attack surface and minimize the risk of endpoint compromise. EPP detection and response capabilities are used to uncover, investigate, and respond to endpoint threats that evade security prevention, often as a part of broader security operations platforms.
Reviews for 'Enterprise Networking and Communications - Others'
Enterprise session border controllers (E-SBCs) are situated at the edge of the enterprise network and provide secure voice and video connectivity to Session Initiation Protocol (SIP) trunking providers, users in remote branch offices, home workers/remote workers, and unified communications as a service (UCaaS) providers. The name 'session border controller' is derived from the following: Session, from Session Initiation Protocol, refers to a real-time communication connection between endpoints or users. This is typically a voice and/or video call. Border refers to the interface between networks that do not have full trust of each other. Controller refers to the ability of the E-SBC to control (allow, deny, transform, end) each session that traverses the border. The 'E' in E-SBC stands for 'enterprise.' It is intended to differentiate enterprise-focused SBCs from those aimed at carriers.
Enterprise video content management (EVCM) comprises products intended to manage and facilitate the delivery of one-to-any, on-demand or live video across internet protocols. It may also include associated network services - content delivery networks (CDN) or enterprise content delivery networks (ECDN) - intended to facilitate the delivery of video. EVCM serves workers and customers who need to watch - and workers who need to share - videos.
Gartner defines the enterprise wired and wireless LAN infrastructure market as wired and wireless networking hardware and the related network software. Related components of the solution include enterprise switches, access points and the requisite tools to secure, manage, test and optimize the network infrastructure that provides connectivity for users, devices and applications that may reside on the network or on other networks. Enterprises in all vertical markets use enterprise wired and wireless networks to connect and transport data for fixed and end-user devices to applications that may be local or remote to the physical end user. In addition to physical connectivity, these solutions provide the following capabilities in diverse markets, including the ability to: 1. Discover, identify, secure, manage and segment Internet of Things (IoT)/operational technology (OT) devices 2. Support, test and maintain network infrastructure components 3. Provide a resilience infrastructure 4. Secure the network infrastructure 5. Provide scalability and flexibility for management and control plane communication processes 6. Provide no-touch/low-touch Day 2 environment
Gartner defines event technology platforms as tools that enable B2B marketers to execute virtual and/or in-person events for external audiences. These platforms provide native capabilities to engage and communicate with prospective attendees, registrants and sponsors, manage logistics, deliver content and enable attendees to engage with other participants. Out-of-the-box integrations with sales force automation and marketing automation platforms are provided to track engagement. Features and capabilities are provided in a self-service model, with some offering managed service support to run the technology when preferred.
Extended detection and response (XDR) delivers security incident detection and automated response capabilities for security infrastructure. XDR integrates threat intelligence and telemetry data from multiple sources with security analytics to provide contextualization and correlation of security alerts. XDR must include native sensors, and can be delivered on-premises or as a SaaS offering. Typically, it is deployed by organizations with smaller security teams.
Full-stack HCI software provides a complete software solution that includes virtualized compute, storage and networking from a single instantiation designed to run on-premises or in a colocation environment. This market consists of those vendors that develop and sell hyperconverged infrastructure software that comprises the vendor’s own server virtualization, software-defined storage and network management tools. The full-stack software solution may also be integrated with a hardware stack as a complete offering spanning both software and hardware. In the last year, the full-stack HCI market has been heavily influenced by the positioning of storage virtualization and private cloud infrastructure looking to revirtualize compute, as well as considering alternatives to incumbent vendors.
Reviews for 'IT Infrastructure and Operations Management - Others'
Indoor location application platforms allow clients to develop business processes and applications that can leverage asset tracking, people tracking, occupancy monitoring and wayfinding. The market consists of vendors that ingest location information from IoT and other devices, process that information, provide analytics of location information, and provide APIs and software development kits (SDKs) to enable business applications to leverage location data.
Gartner defines the indoor location services market as “the hardware, software and service components that provide indoor location coordinates and services.” Indoor location solutions use differing hardware components, data collection methodologies, location data elements, location engine algorithms and architectures to achieve the core functionality of the indoor location market. Solutions look to provide the location of a static/mobile asset or person, as defined by the needs of the specific vertical market.
Infrastructure monitoring tools capture the health and resource utilization of IT infrastructure components, no matter where they reside (e.g., in a data center, at the edge, infrastructure as a service [IaaS] or platform as a service [PaaS] in the cloud). This enables I&O leaders to monitor and collate the availability and resource utilization data of physical and virtual entities — including servers, containers, network devices, database instances, hypervisors and storage. These tools collect data in real time and perform historical data analysis or trending of the elements they monitor.
Many IT infrastructure and operations leaders want to make their infrastructure services more agile and accessible via self-service. At the same time, they want a simplified, less complex implementation experience for hardware and software. As a result, I&O leaders often acquire infrastructure-centric CMPs with integrated infrastructure systems. IISs offer pre-integrated compute, storage and networking in combination with management software that typically includes IIS configuration management and monitoring. This same pattern extends to hyperconverged integrated systems (HCISs), which have a scale-out design based on commodity components to both reduce the initial acquisition price and enable pay-as-you-grow pricing, but may not offer networking capabilities in the solution.
The network intrusion detection and prevention system (IDPS) appliance market is composed of stand-alone physical and virtual appliances that inspect defined network traffic either on-premises or in the cloud. They are often located in the network to inspect traffic that has passed through perimeter security devices, such as firewalls, secure Web gateways and secure email gateways. IDPS devices are deployed in-line and perform full-stream reassembly of network traffic. They provide detection via several methods — for example, signatures, protocol anomaly detection, behavioral monitoring or heuristics, advanced threat defense (ATD) integration, and threat intelligence (TI). When deployed in-line, IDPSs can also use various techniques to detect and block attacks that are identified with high confidence; this is one of the primary benefits of this technology. Next-generation IDPSs have evolved in response to advanced targeted threats that can evade first-generation IDPSs.
Location-based marketing software uses geolocation technology to deliver targeted content and promotions to users based on their physical location. This software can identify where users are through their mobile devices, IP addresses, or other connected devices, allowing businesses to send personalized messages, offers, or ads when users are near a specific location, such as a store or event. The software is used by retailers, event organizers, restaurants and cafes, travel and hospitality, etc. Key features include geofencing, location tracking, analytics & reporting, location data, push notifications, and mobile apps, which help businesses optimize their marketing strategies and measure campaign effectiveness.
Gartner defines managed detection and response (MDR) services as those that provide customers with remotely delivered security operations center (SOC) functions. These functions allow organizations to perform rapid detection, analysis, investigation and response through threat disruption and containment. They offer a turnkey experience, using a predefined technology stack that commonly covers endpoints, networks, logs and cloud. Telemetry is analyzed within a provider’s platform using a range of techniques. The MDR provider’s analyst team then performs threat hunting and incident management to deliver recommended actions to their clients. MDR offers outcome-driven security incident management that is predicated on the detection, analysis and investigation of potentially impactful security events and the delivery of active threat disruption and containment actions to respond to and mitigate the impact of cyber breaches.
Gartner defines managed IoT connectivity services as a market that enables connectivity, data collection and analysis, and additional decision services that are necessary for connected solutions. For large organizations, managed IoT connectivity services are normally delivered fully managed, including dedicated help desk and project and service management capabilities. For midsize and small organizations, they are frequently delivered as a self-service provided through an IoT connectivity management portal, including Level 2 and Level 3 back-office support. Connections can use various technologies. Connections can be cellular (2G, 3G, 4G/LTE and 5G); satellite, low-power wide-area (LPWA) networks (3GPP and non-3GPP); and managed field-area networks (FANs). Public hot spots are not part of the scope. Managed IoT connectivity services also enable businesses and IoT providers to collect, analyze and interact with data streams, thus providing businesses with the ability to monitor, manage and control (manually and through automation) assets associated with business processes. This includes connected consumer, commercial or industrial products. Additionally, managed IoT connectivity services may encompass integrated and managed IT infrastructure and systems, operational technology (OT) infrastructure and systems, software, network services (connectivity), and IT services. Managed IoT connectivity services are a solution element within the broader solution sets of digital businesses and OT systems in enterprise environments.
The managed network services (MNS) market focuses on externally provided, network operations center (NOC) functionality, as well as relevant network and security life cycle services that deliver current and emerging requirements to end users. Gartner defines the MNS market as globally capable providers of remote service management functions for the network and security operations of enterprise networks, including: Managed LAN services (MNS for LAN) Managed WAN services (MNS for WAN) Managed security (MNS for security) functions
Meeting solutions are real-time communication services with their associated devices that support live interactions between participants for internal and external collaboration, presentations, learning, training sessions and webinars. Meeting solutions power diverse use cases, such as one-on-one meetings, remote sales engagements, board meetings, telehealth sessions, remote banking and consulting services, to name just a few. Meeting solutions enable rich information sharing and interaction by combining audio and video, in-meeting chat, content and screen sharing, and visual collaboration and whiteboarding.
Gartner defines microsegmentation as the ability to insert a security policy into the access layer between any two workloads in the same extended data center. Microsegmentation technologies enable the definition of fine-grained network zones, down to individual assets and applications. Core capabilities include: - Flow mapping, which is the ability to gather and show North/South and East/West traffic flows and use them in the policy definition (it can present this data in a visual manner) - Workload isolation, which is isolation from other workloads based on security policy - Policy enforcement, including the definition of rules based on different factors - The ability to deploy in the virtualized and infrastructure as a service environments Some of the most frequent optional capabilities of microsegmentation technologies include: - Automation of the deployment as part of a continuous integration/continuous deployment (CI/CD) pipeline - Integration with cloud infrastructure to ease deployment, enforce rules or automate policy updates when new assets are deployed - Asset discovery: adjacent to the flow mapping, microsegmentation tools can show more advanced context for the assets - Policy recommendation engine: complementary to the asset discovery, microsegmentation technology can suggest policy rules to authorize discovered flows - Threat detection: based on threat intelligence, layer seven protocol inspection and anomaly detection - Interoperability through direct integration with third-party products, such as a firewall, and hardware, such as switches and routers - Internet of Things (IoT)/operational technology (OT) coverage — the solution supports microsegmentation for IoT/OT infrastructure - Kubernetes/Container coverage — the solution supports microsegmentation for containers/K8s
Gartner defines mobile marketing platforms (MMPs) as software solutions that help organizations create, activate, execute, analyze and optimize mobile marketing campaigns and experiences. The platforms target audiences on their mobile device through multiple message types such as SMS/text, push notifications, messaging apps and in-app messages. These platforms enable marketers to engage customers and prospects through a range of mobile-specific tactics — spanning mobile websites, mobile applications, smart device engagement, messaging (such as SMS and native applications), push notifications (such as on mobile apps and off websites), location-triggered interactions and mobile wallet cards. Mobile tactics are particularly suited to, for example, providing time-sensitive notifications to audiences, whether that’s in response to a live event, location-specific moment or a fulfillment update. MMPs also help measure and optimize the effectiveness of mobile strategy. MMPs can operate as stand-alone solutions within a marketing organization’s tech stack, or operate alongside other marketing technology. These technologies can include a set of capabilities within a multichannel marketing hub (MMH), marketing automation platform (MAP), customer data platform (CDP) or other marketing automation applications. Stand-alone MMPs are a more specialized solution, often used in conjunction with an MMH, email platform or B2B MAP.
Gartner defines network access control (NAC) as technologies that enable organizations to implement policies for controlling access to corporate infrastructure by both user-oriented devices and Internet of Things (IoT) devices. Policies may be based on authentication, endpoint configuration (posture) or users' role/identity. NAC can also implement postconnect policies based on integration with other security products. For example, NAC could enforce a policy to contain the endpoint based on an alert from a SIEM. An organization should evaluate the following capabilities: • Device visibility/profiling • Access control • Security posture check • Guest management • Bidirectional integration with other security products.
Network automation platforms are products that automate and orchestrate multiple vendors’ network functionality. These platforms support a broad range of capabilities including provisioning, deprovisioning, orchestration, troubleshooting, operations, workflow, configuration management, event-driven automation, validation and reporting. These platforms are well-suited to add value on top of existing point network automation tools by orchestrating end-to-end network workflows across existing automation tools. Network automation platforms interact directly with network devices, other automation and orchestration tools, network management systems/controllers, and/or network services. These platforms increase agility and efficiency of network infrastructure while lowering costs, reducing the amount of manual human errors, and improving compliance with required rules, regulations and laws.
Network detection and response (NDR) products detect abnormal system behaviors by applying behavioral analytics to network traffic data. They continuously analyze raw network packets or traffic metadata within internal networks (east-west) and between internal and external networks (north-south). NDR products include automated responses, such as host containment or traffic blocking, directly or through integration with other cybersecurity tools. NDR can be delivered as a combination of hardware and software appliances for sensors, some with IaaS support. Management and orchestration consoles can be software or SaaS.
Gartner defines the network firewall market as the market for firewalls that use bidirectional stateful traffic inspection (for both egress and ingress) to secure networks. Network firewalls are enforced through hardware, virtual appliances and cloud-native controls. Network firewalls are used to secure networks. These can be on-premises, hybrid (on-premises and cloud), public cloud or private cloud networks. Network firewall products support different deployment use cases, such as for perimeters, midsize enterprises, data centers, clouds, cloud-native and distributed offices.
Network management tools are software applications used to monitor, maintain, and administer computer networks. They help in ensuring the network's efficient operation, detecting and resolving problems, and optimizing performance. Key functions include monitoring network traffic, managing network devices, ensuring security, and troubleshooting issues. Network Administrators, IT Managers, and Security Professionals utilize these tools to monitor and manage network hardware effectively. They track the performance of network devices such as routers and switches, ensuring these devices operate optimally. Additionally, they maintain and update the configuration of these network components to ensure robust security and efficient network functionality.
Reviews for 'Office Productivity Solutions - Others'
Gartner defines operational technology (OT) as “hardware and software that detects or causes a change, through direct monitoring and/or control of industrial equipment, assets, processes and events”. OT security includes practices and technologies used to protect them, but these practices and technologies are now evolving into distinct categories to address the growing threats, security practices and vendor dynamics.
Retail loss prevention and asset protection software solutions help retail stores to keep products safe, and prevent retail theft and inventory loss by identifying shrinkage causes and prescribing a suitable solution. These solution providers collect data from IoT-enabled devices such as product tracking tags, security cameras, and motion sensors and are combined with a strong software system. With these analytics and insights, they assist an organization in creating loss prevention strategies. By implementing loss prevention policies and procedures backed by modern technology, retailers can reduce shrinkage, bolster security, and keep employees safe.
Gartner defines SD-WAN as functionality primarily used to connect branch locations to other enterprise and cloud locations. SD-WAN products provide dynamic path selection based on business or application policy, routing, centralized orchestration of policy and management of appliances, virtual private network (VPN), and zero-touch configuration. SD-WAN products are WAN transport/carrier-agnostic and create secure paths across physical WAN connections. SD-WAN products replace traditional branch routers and enable connectivity between enterprise branch locations as well as the cloud. They facilitate WAN connectivity’s evolution from Multiprotocol Label Switching (MPLS)-centric to public internet-centric in support of enterprise traffic shifts from private data centers to public cloud and SaaS.
Gartner defines security service edge (SSE) as a solution that secures access to the web, cloud services and private applications regardless of the location of the user or the device they are using or where that application is hosted. SSE protects users from malicious and inappropriate content on the web and provides enhanced security and visibility for the SaaS and private applications accessed by end users. Security service edge provides a primarily cloud-delivered solution to control access from end users and edge devices to applications (private or delivered via SaaS) as well as websites (and to a lesser extent general internet traffic). It enables a hybrid workforce more efficiently than traditional on-premises solutions. Capabilities integrated across multiple traffic types and destinations allow a more seamless experience for both users and admins while maintaining a consistent security stance.
Reviews for 'Security Solutions - Others'
Gartner defines single-vendor secure access service edge (SASE) offerings as those that deliver multiple converged-network and security-as-a-service capabilities, such as software-defined wide-area network (SD-WAN), secure web gateway (SWG), cloud access security broker (CASB), network firewalling and zero trust network access (ZTNA). These offerings use a cloud-centric architecture and are delivered by one vendor. SASE securely connects users and devices with applications. It supports branch office, remote worker and on-premises general internet security, private application access and cloud service consumption use cases.
UCaaS monitoring tools measure the UCaaS user experience by providing key performance indicators (KPIs), visibility and insight based on application, session and network availability, performance, and health from multiple sources. An instantiation of digital experience monitoring, UCaaS monitoring tools combine elements of application and network performance monitoring capabilities. Strong tools continually collect packet trace data, decode and play back captured voice and video streams, interrogate network infrastructure, and assess the functional status of bidirectional sessions, segments and endpoints. They gather and assess data in real time and perform synthetic call testing for service initiation and change/contingency management purposes.
All unified communications (UC) solutions are intended principally to improve user productivity and enhance business processes that relate to communications and collaboration. Gartner defines UC solutions — equipment, software and services — as offerings that facilitate the use of multiple enterprise communications methods to achieve those aims. UC solutions integrate communications channels (media), networks and systems, as well as IT business applications, and, in some cases, consumer applications and devices. UC offers the ability to significantly improve how individuals, groups and companies interact and perform. The UC solutions that enterprises deploy range from stand-alone suites from single vendors, to integrated applications and platforms from multiple vendors. UC is often deployed to extend and add functionality to established communications investments.
Gartner defines unified communications as a service (UCaaS) as a multitenant, subscription-based service. It is cloud-delivered, and it provides business telephony features; external, public switched telephone network (PSTN) connectivity that enables inbound or outbound calling; and collaboration features, such as messaging and meetings. UCaaS services can be consumed by end users with traditional handsets, desktop clients, meeting room systems and mobile apps. Gartner’s definition of meetings for the UCaaS market focuses on the capabilities for internal collaboration, work from home and external presentation meeting use cases only. Other specialized use cases — such as webinar, remote support, distance learning and training — are often available from UCaaS offerings, but are not mandatory for this research. These use cases are part of a separate market defined by Gartner (meeting solutions).
Gartner defines a unified endpoint management (UEM) tool as a software-based tool that provides agent and agentless management of computers and mobile devices through a single console. Modern UEM tools: Provide a user-centric view of devices across device platforms; Offer agent and/or agentless management through native Windows endpoint, macOS, Linux and Chrome OS controls. Offer agentless mobile management through native Apple iOS/iPad OS and Google Android controls; Aggregate telemetry and signals from identities, apps, connectivity and devices to inform policy and related actions; Aggregate and analyze technology performance and employee experience data; Integrate with identity, security and remote access tools to support zero-trust access and contextual authentication, vulnerability, policy, and configuration and data management; Manage nontraditional devices, including Internet of Things (IoT) devices, wearables and rugged handhelds.
Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. User authentication is foundational to and protects the value of other functions with an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD); audit (individual accountability); and identity analytics.
A video management system (VMS) orchestrates a surveillance workflow by integrating with cameras, encoders, recording systems, underlying storage infrastructure, client workstations, gateway systems and analytics software, mainly by providing a single interface for video surveillance infrastructure management.
Gartner defines a voice of the customer (VoC) platform as one that integrate feedback collection, analysis and action into a single unified solution that helps organizations to understand and improve the customer experience. Feedback inputs extend beyond direct surveying to include other direct, and indirect and inferred sources. Voice of customer (VoC) platforms enable revenue and retention leaders to better manage the customer experience (CX) through a deep understanding of customer needs and perceptions. The resulting insights trigger recommendations and actions across the enterprise.
VA solutions identify, categorize and prioritize vulnerabilities as well as orchestrate their remediation or mitigation. Their primary focus is vulnerability and security configuration assessments for enterprise risk identification and reduction, and reporting against various compliance standards. VA can be delivered via on-premises, hosted and cloud-based solutions, and it may use appliances and agents. Core capabilities include: - Discovery, identification and reporting on device, OS, software vulnerabilities and configuration against security-related criteria - Establishing a baseline for systems, applications and databases to identify and track changes in state - Reporting options for compliance, control frameworks and multiple roles Standard capabilities include: - Pragmatic remediation prioritization with the ability to correlate vulnerability severity, asset context and threat context that then presents a better picture of true risk for your specific environment - Guidance for remediating and configuring compensating controls - Management of scanner instances, agents and gateways - Direct integration with, or API access to, asset management tools, workflow management tools and patch management tools
Gartner defines WAN optimization tools as products that improve the performance of applications running across the WAN as well as reduce WAN service expenses. WAN optimization solutions continue to evolve, and now support four high-level needs: improving the response times for users of business-critical applications over WAN links or mobile connections; assisting in maximizing ROI for WAN bandwidth; optimizing data-center-to-data-center (DC-to-DC) traffic for faster storage replication and synchronization; and assisting in directing traffic across multiple WANS, such as a hybrid WAN or public cloud connectivity.
A self-organizing network (SON) is a framework that automates some planning functions as well as maintenance functions for mobile networks. Its main goals are to enable self-configuration, self-optimization and self-healing of radio network elements. It also minimizes interference between adjacent cells and between macro and small cells. SON is an automation technology for the operations and maintenance (O&M) of LTE networks, defined in Third Generation Partnership Project (3GPP) Release 8 and onwards (as such, W-Fi support is not natively included in 3GPP's definition of SON).
The workstream collaboration (WSC) market consists of products that deliver a conversational workspace based on a persistent group chat. Products in this market are primarily used to organize, coordinate, and execute outcome-driven teamwork such as that associated with the project- or process-related activities. Secondary uses can include ad hoc collaboration and community discussions.
Gartner defines zero trust network access (ZTNA) as products and services that create an identity and context-based, logical-access boundary that encompasses an enterprise user and an internally hosted application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a collection of named entities, which limits lateral movement within a network.