Gartner defines access management (AM) as platforms that include an identity provider (IdP) and establish, manage and enforce runtime access controls to at least cloud, modern standards-based web and classic web applications. AM’s purpose is to enable single sign-on (SSO) access for people (workforce, consumer and other users) and machines into protected applications in a streamlined and consistent way that enhances user experience. AM is also responsible for providing security controls to protect the user session in runtime, enforcing authentication (with multifactor authentication [MFA]) and authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools to enable identity-first security.
“Application testing services” is a comprehensive term for the verification and validation services that support quality control and quality assurance (QA) of clients’ applications. Verification assesses whether a product/application or service complies with regulations, requirements, specifications or enforced constraints. Validation typically involves engagement with external customers to confirm suitability and acceptance. Infrastructure testing services, mobile device testing and software testing tools created for the market by independent software vendors (ISVs) are not included in this definition.
Gartner defines the customer relationship management (CRM) and customer experience (CX) implementation service market as project-based services to help clients develop a CX strategy and transform a customer relationship with consulting expertise. Providers in this market design, build, integrate and deploy process change and technology solutions that improve interactions between organizations and their customers. These services are specific to improving clients’ sales, customer service and marketing operations, and they focus on interactions with customers, including commerce transaction enablement.
'CSB serves as both an IT role and service business model, whereby a service provider or another entity adds value to one or more (public or private) cloud services on behalf of one or more consumers of those services. Value can be added via four primary roles: Aggregation Integration Customization Governance A CSB provider supplies technology to take on some of the activities of the brokerage function, and offers combined technology, people, managed services and methodologies to implement and manage CSB-related projects and requirements.
Gartner defines custom software development (CSD) services as those that develop software in rapid increments and iterate custom applications and software products to meet an organization’s unique business needs. CSD services entail gathering business requirements and coding applications from inception, building applications on a platform as a service (PaaS), or assembling applications from existing web services or other reusable pieces of code. Services marketed as “software product engineering” or “digital product development” are likely to be examples of the category Gartner defines as CSD services.
Gartner defines the market for data and analytics (D&A) services as consulting and system integration (C&SI) and managed services. These services manage data for all uses (operational and analytical), and analyze data to drive business processes and improve business outcomes through more effective decision making. The core capabilities for vendor solutions in the D&A services market include: D&A strategy and operating model design Data management Analytics and business intelligence (ABI) Data science and machine learning D&A governance Program management Enterprise metadata
The global industrial IoT platform delivers multiple integrations to industrial OT assets and other asset-intensive enterprises’ industrial data sources to aggregate, curate and deliver contextualized insights that enable intelligent applications and dashboards through an edge-to-cloud architecture. The global industrial Internet of Things (IIoT) platform market exists because of the core capabilities of integrated middleware software that support a multivendor marketplace of intelligent applications to facilitate and automate asset management decision making. IIoT platforms also provide operational visibility and control for plants, infrastructure and equipment. Common use cases are augmentation of industrial automation, remote operations, sustainability and energy management, global scalability, IT/operational technology (OT) convergence, and product servitization of industrial products. The IIoT platform monitors IoT endpoints and event streams, supports and/or translates a variety of manufacturer and industry proprietary protocols, analyzes data in the platform, at the edge and in the cloud, integrates and engages IT and OT systems in data sharing and consumption, enables application development and deployment and can enrich and supplement OT functions for improved asset management life cycle strategies and processes. In some emerging use cases, the IIoT platform may obviate some OT functions.
Gartner defines identity governance and administration (IGA) as the solution to manage the identity life cycle and govern access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data, and provide full capability controls over accounts and associated access. IGA solutions also fulfill the purpose of unifying and correlating identity data for organizations with multiple person and machine identity authoritative sources. This is done to provide a single view of identity (system of record) for their dependent processes and systems
Gartner defines managed detection and response (MDR) services as those that provide customers with remotely delivered security operations center (SOC) functions. These functions allow organizations to perform rapid detection, analysis, investigation and response through threat disruption and containment. They offer a turnkey experience, using a predefined technology stack that commonly covers endpoints, networks, logs and cloud. Telemetry is analyzed within a provider’s platform using a range of techniques. The MDR provider’s analyst team then performs threat hunting and incident management to deliver recommended actions to their clients. MDR offers outcome-driven security incident management that is predicated on the detection, analysis and investigation of potentially impactful security events and the delivery of active threat disruption and containment actions to respond to and mitigate the impact of cyber breaches.
Gartner defines managed IoT connectivity services as a market that enables connectivity, data collection and analysis, and additional decision services that are necessary for connected solutions. For large organizations, managed IoT connectivity services are normally delivered fully managed, including dedicated help desk and project and service management capabilities. For midsize and small organizations, they are frequently delivered as a self-service provided through an IoT connectivity management portal, including Level 2 and Level 3 back-office support. Connections can use various technologies. Connections can be cellular (2G, 3G, 4G/LTE and 5G); satellite, low-power wide-area (LPWA) networks (3GPP and non-3GPP); and managed field-area networks (FANs). Public hot spots are not part of the scope. Managed IoT connectivity services also enable businesses and IoT providers to collect, analyze and interact with data streams, thus providing businesses with the ability to monitor, manage and control (manually and through automation) assets associated with business processes. This includes connected consumer, commercial or industrial products. Additionally, managed IoT connectivity services may encompass integrated and managed IT infrastructure and systems, operational technology (OT) infrastructure and systems, software, network services (connectivity), and IT services. Managed IoT connectivity services are a solution element within the broader solution sets of digital businesses and OT systems in enterprise environments.
MSSs provide organizations with a variety of management and operational services specific to security technologies and business outcomes for security. Capabilities include security monitoring, detection and response, exposure assessment and management as well as security consulting and security technology implementation. MSSs are delivered in a variety of modes, in the providers’ cloud infrastructure, as consultative engagements or through staff augmentation and on-premises. MSS providers offer a variety of different engagement models. These include heavily customized and consultancy-led models and commoditized technology management-driven experiences.
MDMS products are IT components of the advanced metering infrastructure (AMI). The core MDMS is responsible for cleansing, calculating and providing the data persistence of commodity consumption data. Additional MDMS capabilities now include disseminating metered consumption data for internal as well as external use. Meter data can be used to support billing, as well as analytics use cases, such as load profiling, consumption tracking, forecasting, asset loading and revenue protection, including the detection of tampering, theft or leakage. Beyond supporting internal utility needs, MDMS plays a role in open consumption data by supporting the sharing of consumption data with customers, partners, market operators and regulators. In most markets, data sharing is done with standardized data exchange formats.
Gartner defines public cloud IT transformation services (PCITS) as services designed to deliver transformational outcomes via the utilization of cloud-native professional and managed services. It includes migration, modernization and the building of new transformational solutions on public hyperscale cloud infrastructure and platform services. Organizations seeking to use public clouds such as Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, Oracle Cloud Infrastructure (OCI) and similar platforms engage with providers in this market to realize the greatest transformational benefits. PCITS transforms client applications, workloads and data to the public cloud to achieve their clients’ business outcomes. It makes primary use of cloud-native tools and manages IT operations in the public cloud. It encapsulates cloud management, optimization and modernization to continuously manage reliability, scalability, interoperability and more.
This market is focused on the full life cycle of SAP application services, spanning project-based implementation and multiyear application management services (AMS). Evaluate service providers for their ability to deliver a comprehensive set of implementation and management services across the SAP portfolio of products for clients worldwide. Comprehensive is defined as follows: • A distinct offering, consistent with common market service offerings as defined by the following: scope of service, delivery structure, intellectual property (IP), roles and responsibilities, service metrics and levels, terms and conditions, and pricing model. • A consolidated set of distinct offerings to address industry-specific demand or cross-industry demand, where the offering is recognized by clients or analysts as an integrated offering.
Gartner defines the SAP S/4HANA Application Services as: assessment, implementation and applications management services. Assessment services are discrete, project based services to assess the impact of either a new SAP S/4HANA implementation or a migration from a legacy platform(s) to SAP S/4HANA. These services include consulting and potentially Proof of Concept, and covers the analysis of all SAP S/4HANA products, applications, databases, analytics, middleware, mobile and other technologies. Implementation services are discrete, project-based implementations of SAP S/4HANA applications without ongoing management responsibilities. These services include consulting, development and integration services, and covers all SAP S/4HANA products, applications, databases, analytics, middleware, mobile and other technologies. Management services are ongoing services focused on SAP S/4HANA applications that are provided as part of a multiyear-based agreement and managed against defined quality metrics.
Security consulting firms are advisory and consulting services (see 'Definition: Cybersecurity' ) related to information and IT security design, evaluation and recommendations. These services are procured by various stakeholders in an organization, including boards of directors, CEOs, chief risk officers (CROs), chief information security officers (CISOs), chief information officers (CIOs), and other business and IT leaders for the purpose of obtaining and ensuring acceptable risk levels for a specific client organization.