Gartner defines the market of AI in communications service provider (CSP) network operations as commercial off-the-shelf (COTS) products with offerings in the form of capabilities embedded in CSP-specific operational technology (OT) applications or industry-agnostic horizontal applications. These products enable AI/ML-based network operations in CSPs. AI in CSP network operations helps CSPs to increase their network efficiency and performance, while reducing costs. CSPs are also evaluating use of AI in network operations to manage their energy consumption.
Gartner defines the market of AI in communications service provider (CSP) customer and business operations as commercial off-the-shelf (COTS) products. They are either capabilities embedded in CSP-specific operational technology (OT) applications (such as channels, CRM and other business support system [BSS] applications) or industry-agnostic horizontal applications delivering AI/machine learning (ML)-based customer and business operations in CSPs. CSP customer and business operations refer to marketing, sales, customer acquisition, customer journey, billing and revenue management, revenue assurance, and related risk management. The scope of AI products covers data readiness, life cycle management of algorithms and their application to CSP customer and business operations. AI in CSP customer and business operations helps CSPs utilize AI/ML to generate insights and automate business processes across a wide range of customer and business operations areas. These areas include marketing, sales, configure-price-quote (CPQ), order management, product management, billing and revenue management, customer journey and care, revenue assurance, and fraud/risk management. An example can be intelligent chatbots utilizing natural language processing for customer interaction use cases to automate call center operations. These products assist with insights and automation and help CSPs manage the life cycle of AI/ML algorithms, gradually enabling ModelOps/AIOps.
Gartner defines AI-augmented software testing tools as enablers of continuous, self-optimizing and adaptive automated testing through the use of AI technologies. The capabilities run the gamut of the testing life cycle including test scenario and test case generation, test automation generation, test suite optimization and prioritization, test analysis and defect prediction as well as test effort estimation and decision making. These tools help software engineering teams to increase test coverage, test efficacy and robustness. They assist humans in their testing efforts and reduce the need for human intervention in the different phases of testing.
Gartner defines the application programming interface (API) management market as the market for software to manage, govern and secure APIs. Organizations use APIs to modernize their architectures; APIs provide access to systems, services, partners and data services. API management software enables organizations to plan, deploy, secure, operate, version control and retire APIs, regardless of their size, region or industry.
Gartner defines access management (AM) as platforms that include an identity provider (IdP) and establish, manage and enforce runtime access controls to at least cloud, modern standards-based web and classic web applications. AM’s purpose is to enable single sign-on (SSO) access for people (workforce, consumer and other users) and machines into protected applications in a streamlined and consistent way that enhances user experience. AM is also responsible for providing security controls to protect the user session in runtime, enforcing authentication (with multifactor authentication [MFA]) and authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools to enable identity-first security.
Active metadata management is a set of capabilities that enables continuous access and processing of metadata that support ongoing analysis over a different spectrum of maturity, use cases and vendor solutions. Active metadata outputs range from design recommendations based upon execution results and reports of runtime steps through, and indicators of, business outcomes achieved. The resulting recommendations from those analytics are issued as design inputs to humans or system-level instructions that are expected to have a response.
Analytics and business intelligence platforms — enabled by IT and augmented by AI — empower users to model, analyze and share data. Analytics and business intelligence (ABI) platforms enable organizations to understand their data. For example, what are the dimensions of their data — such as product, customer, time, and geography? People need to be able to ask questions about their data (e.g., which customers are likely to churn? Which salespeople are not reaching their quotas?). They need to be able to create measures from their data, such as on-time delivery, accidents in the workplace and customer or employee satisfaction. Organizations need to blend modeled and nonmodeled data to create new data pipelines that can be explored to find anomalies and other insights. ABI platforms make all of this possible.
The supply chain A&DI technology market spans capabilities that provide different types of analytics, focusing on predictive and prescriptive ones. Many of these offerings have been enhanced with AI and DSML capabilities to support supply chain decision making. These capabilities could either be part of a broader supply chain application/suite or a separate encompassing A&DI platform. Such a platform consists of existing and emerging technologies, including: Graph technology, Advanced analytics, AI, DSML, Model development & Digital supply chain twin (DSCT).
The application development life cycle management (ADLM) tool market focuses on the planning and governance activities of the software development life cycle (SDLC). ADLM products focus on the 'development' portion of an application's life. Key elements of an ADLM solution include: software requirements definition and management, software change and configuration management, software project planning, with a current focus on agile planning, work item management, quality management, including defect management. Other key capabilities include: reporting, workflow, integration to version management, support for wikis and collaboration, strong facilities for integration to other ADLM tools.
Reviews for 'Application Development, Integration and Management - Others'
'Application integration platforms enable independently designed applications, apps and services to work together. Key capabilities of application integration technologies include: • Communication functionality that reliably moves messages/data among endpoints. • Support for fundamental web and web services standards. • Functionality that dynamically binds consumer and provider endpoints. • Message validation, mapping, transformation and enrichment. • Orchestration. • Support for multiple interaction patterns, content-based routing and typed messages.
Application platforms provide runtime environments for application logic. They manage the life cycle of an application or application component, and ensure the availability, reliability, scalability, security and monitoring of application logic. They typically support distributed application deployments across multiple nodes. Some also support cloud-style operations (elasticity, multitenancy and self-service).
“Application testing services” is a comprehensive term for the verification and validation services that support quality control and quality assurance (QA) of clients’ applications. Verification assesses whether a product/application or service complies with regulations, requirements, specifications or enforced constraints. Validation typically involves engagement with external customers to confirm suitability and acceptance. Infrastructure testing services, mobile device testing and software testing tools created for the market by independent software vendors (ISVs) are not included in this definition.
Asset Performance Management (APM) is a market of software tools and applications for optimizing operational assets (such as plants, equipment and infrastructure) essential to the operation of an enterprise. Organizations invest in APM tools and technologies to reduce unplanned repair work, increase asset availability, minimize maintenance costs and reduce the risk of failure for critical assets. These products can also improve an organization's ability to comply with regulations that prescribe how assets are inspected and maintained. APM uses data capture, integration, visualization and analytics to improve operations and maintenance timing, and to identify which maintenance and inspection activities to perform on mission-critical assets.
Internal auditors play the critical role of being the third line of defense. When risk owners and management do not identify risk or adequately mitigate the risk, it is imperative for the internal auditors to provide independent and objective insight on risk. The audit management solutions market caters to this need by automating internal audit operations through its primary and secondary offerings. Audit management solutions help manage the complexity of the auditor's role, not the organization's risk.
Gartner defines augmented data quality (ADQ) solutions as a set of capabilities for enhanced data quality experience aimed at improving insight discovery, next-best-action suggestions and process automation by leveraging AI/machine learning (ML) features, graph analysis and metadata analytics. Each of these technologies can work independently, or cooperatively, to create network effects that can be used to increase automation and effectiveness across a broad range of data quality use cases. These purpose-built solutions include a range of functions such as profiling and monitoring; data transformation; rule discovery and creation; matching, linking and merging; active metadata support; data remediation and role-based usability. These packaged solutions help implement and support the practice of data quality assurance, mostly embedded as part of a broader data and analytics (D&A) strategy. Various existing and upcoming use cases include: 1. Analytics, artificial intelligence and machine learning development 2. Data engineering 3. D&A governance 4. Master data management 5. Operational/transactional data quality
B2B gateway software is integration middleware that supports information exchange between your organization and its ecosystem trading partners, applications and endpoints. BGS consolidates and centralizes data and process integration and interoperability between a company's internal applications and external endpoints, such as business partners, SaaS or ecosystems. The BGS market is a composite market that includes pure-play BGS solutions and BGS that is embedded or combined with other IT solutions (for example, ESB suites that support BGS features as services connected to the ESB suite, integration brokerage services, e-invoicing software and networks, application platform suites, electronic data interchange [EDI] translators, and managed file transfer [MFT] technology).
BPM-platform-based case management frameworks are configurable 'apps' meant to help solution architects accelerate the delivery of unique and flexible case management solutions. Case management frameworks (CMFs) are commercial software offerings designed to reduce the time and complexity of creating case-style process solutions by providing architectural patterns and at least some business domain capabilities 'out of the box.' Work is caselike when each work item — each case — requires unique handling, involving complex interactions between content, people, transactions and business or regulatory policies in order to deliver an optimal outcome. Case-style processes do not progress in a serial or completely predictable fashion. Rather, they often require multiple dependent workflows to be orchestrated, making them particularly complex to architect. Very often, caseworkers need the flexibility to decide the best next action for a case, rather than following a prescribed workflow.
There are many blockchain providers in the marketplace, ranging from business consultants to technology specialists. This market covers service providers that are able to support clients in solving business problems and creating new business value, in order to integrate the solutions into the organization and sustain the new business venture. It is important to note that, due to the emerging nature of blockchain initiatives and the technologies, in addition to the fact that there are so few (if any) live production of blockchain initiatives, the value derived from the blockchain initiative is not technical in nature, but is the creation of a new business revenue generator or a model for business efficiency for the organization. Hence, business acumen and business strategy ideation capabilities are more important than technology skills to help clients navigate through the business environment uncertainties.
Blockchain platforms are emerging platforms and, at this point, nearly indistinguishable in some cases from core blockchain technology. They are being used for generalized distributed value exchange, consisting of an expanding list of cryptographically signed, irrevocable transactional records shared by all participants in a network. Each record contains a time stamp and reference links to previous transactions. It is a decentralized state transition machine that manages the life cycle of digitalized assets and immutably records operations in a distributed ledger. A digitalized asset can be any object with explicit or implicit value (such as digital currencies, securities, precious metals, commodities, materials, identity, credentials, patient health records).
Gartner defines business process automation (BPA) tools as software that automates business processes by enabling orchestration and choreography of diverse sets of actors (humans, systems and bots) involved in the execution of the process. BPA tools provide an environment for developing and running applications that incorporate process models (and optionally other business, decision and data models) enabling digitization of business operations
Gartner defines business processes as the coordination of the behavior of people, systems and things to produce specific business outcomes. 'Things' in this context refers to devices that are part of the Internet of Things (IoT). A BPM platform minimally includes: a graphical business process and/or rule modeling capability, a process registry/repository to handle the modeling metadata, a process execution engine and a state management engine or rule engine (or both). The three types of BPM platforms — basic BPM platforms, business process management suites (BPMSs), and intelligent business process management suites (iBPMSs) — can help solution architects and business outcome owners accelerate application development, transform business processes, and digitalize business processes to exploit business moments by providing capabilities that manage different aspects of the business process life cycle.
Gartner defines the customer relationship management (CRM) and customer experience (CX) implementation service market as project-based services to help clients develop a CX strategy and transform a customer relationship with consulting expertise. Providers in this market design, build, integrate and deploy process change and technology solutions that improve interactions between organizations and their customers. These services are specific to improving clients’ sales, customer service and marketing operations, and they focus on interactions with customers, including commerce transaction enablement.
CSP service and network assurance (S&NA) solutions are OSS products and offerings for use in physical, virtual, containerized and hybrid network environments. They enable CSPs to ensure services and networks for customers in various market segments, such as consumer, enterprise and wholesale markets, and include: Service- and network-monitoring solutions Fault management Performance management Service quality management Incident management Workforce management Note: This definition does not include the assurance of the underlying IT infrastructure (for example, servers and storage in data centers, public cloud or multiaccess edge compute [MEC]), which is used to host network functions (NFs) for delivery of a specific service.
Gartner defines cloud AI developer services (CAIDS) as cloud-hosted or containerized services and products that enable software developers who are not data science experts to use artificial intelligence (AI) models via APIs, software development kits (SDKs) or applications. Core capabilities include automated machine learning (autoML) including automated data preparation, automated feature engineering and automated model building, and model management and operationalization for language, vision and tabular use cases. Optional and important complementary capabilities include AI code models and assistants. Cloud AI developer services help organizations embed intelligence, such as AI and ML insights, into their applications. While that is what cloud AI developer services offer, it is more important to note how they accomplish this. These services democratize and increase the availability of AI and ML to software engineers through the automation and features offered. Traditional activities regarding data acquisition, data quality, feature engineering, algorithm selection and model training are augmented by the technology. Cloud AI developer services open up a world of possibilities for software engineers to build AI and ML production capabilities and features for enterprise-built applications.
Gartner defines the market for cloud database management systems (DBMSs) as the market for software products that store and manipulate data and that are primarily delivered as software as a service (SaaS) in the cloud. Cloud DBMSs may optionally be capable of running on-premises, or in hybrid, multicloud or intercloud configurations. They can be used for transactional work and/or analytical work. They may have features that enable them to participate in a wider data ecosystem. Must-have capabilities for this market include: Availability as SaaS on provider-managed public or private cloud systems; Management of data within cloud storage — that is, cloud DBMSs are not hosted in infrastructure as a service (IaaS), such as in a virtual machine or a container managed by the customer.
Gartner defines Cloud ERP services as services provided by third-party systems integrators to assess needs, implement solutions and evolve platforms that are transforming their back-office systems via the implementation of cloud-based ERP solutions. A cloud ERP solution is a set of applications (SaaS) that are sold/marketed as integrated products to support organizations. These integrated products include financial management (FM) functionality, human capital management (HCM), supply chain management (SCM) and other administrative ERP functionality.
Cloud xP&A is a platform-centric enterprise planning strategy to extend financial planning and analysis (FP&A) with multidiscipline planning capabilities that are packaged, marketed and sold as an integrated operational planning solution. xP&A solutions must include a cohesive, composable, data-harmonized vendor platform that can accommodate emerging technologies, horizontal functional and vertical-specific solutions for their target market(s)
Cloud management tooling enables organizations to manage hybrid and multicloud (that is, on-premises, public cloud and edge) services and resources. This includes providing governance, life cycle management, brokering and automation for managed cloud infrastructure resources across multiple functional areas. The tooling can be procured and operated by central IT organizations, such as I&O, cloud center of excellence (CCOE) and platform engineering/operations, or within specific lines of business. It can be deployed on-premises, in a customer’s public cloud account or purchased as a SaaS.
Gartner defines configure, price and quote (CPQ) applications as software that enables sales organizations to automate and optimize the creation of quotes and capture of orders. A CPQ application is a sales tool that captures the new goods and services a customer wants to buy or the changes a customer wants to make to existing goods and services. While generally focused on assisted sales channels, CPQ capabilities such as product configuration and pricing must be shared with the self-service commerce channel. The new purchases and changes must be priced and a binding contract must be formed with the customer before sending an order to downstream fulfillment systems.
Gartner defines container management as offerings that enable the deployment and operation of containerized workloads. Delivery methods include stand-alone software or as a service. Delivery methods include cloud, managed service and software for containers running on-premises, in the public cloud and/or at the edge. Container management automates the provisioning, operation and life cycle management of containerized workloads at scale. Centralized governance and security policies are used to manage container workloads and associated resources. Container management supports the requirements of modern applications (also refactoring legacy applications), including platform engineering, cloud management and continuous integration/continuous deployment (CI/CD) pipelines. Benefits include improved agility, elasticity and access to innovation.
Content collaboration tools provide an easy way for employees to use and share content both inside and outside the organizations. Since these tools can be used to collaborate with customers, partners and suppliers, they often provide rich security and privacy controls. Today, much of this functionality also can be found in other tools such as cloud office platforms, workstream collaboration platforms, content services platforms and content services applications. Functional differentiators in dedicated CCTs are difficult to identify.
Content services platforms (CSPs) are foundational for managing and utilizing content within an organization. CSP technologies enable employees to retrieve and work with content in a modern and seamless way across devices and organizational boundaries. Core CSP functionalities include content capture, creation, consolidation, processing and retention to support personal, team, departmental and enterprise business operations.
Crisis/Emergency Management Solutions help organizations consistently orchestrate and manage the data, resources, expenditures, communications and tasks used for response, recovery and restoration activities during and after a crisis. C/EMP solutions are also used to analyze the changing conditions during a crisis to ensure situational awareness as well as to ensure crisis/emergency management (C/EM) procedures are in compliance with government emergency management standards. Historically, C/EMP solutions have been used by government agencies, utilities and transportation organizations to manage the large public safety impacts of a crisis. However, other industries, including financial services and HDOs, are starting to use C/EMP solutions to demonstrate command and control across a mix of internal and external stakeholders during crisis events, as well as to align with national emergency/incident response management frameworks
Gartner defines custom software development (CSD) services as those that develop software in rapid increments and iterate custom applications and software products to meet an organization’s unique business needs. CSD services entail gathering business requirements and coding applications from inception, building applications on a platform as a service (PaaS), or assembling applications from existing web services or other reusable pieces of code. Services marketed as “software product engineering” or “digital product development” are likely to be examples of the category Gartner defines as CSD services.
Gartner's definition of business process outsourcing (BPO) is the delegation of one or more IT-intensive business activities; specifically, BPO contracts that always include the outsourcing of business process administration to a third-party service provider, which may include outsourcing the infrastructure along with application maintenance and ownership. Customer management (CM) contact center BPO is the processes linking an organization with its existing and potential customers (such as marketing, sales and customer services), which can be categorized in four subsegments: *customer selection *customer acquisition, * customer retention *customer extension. The four subsegments should also consistently be executed across the following five primary channels: * telephony * business process as a service (BPaaS) * email response management * web/mobile chat * knowledge management for web and mobile-based self-service.
Reviews for 'Customer Relationship Management - Others'
Reviews for 'Data Center - Others'
Gartner defines data integration as the discipline comprising the architectural patterns, methodologies and tools that allow organizations to achieve consistent access and delivery of data across a wide spectrum of data sources and data types to meet the data consumption requirements of business applications and end users. Data integration tools enable organizations to access, integrate, transform, process and move data that spans various endpoints and across any infrastructure to support their data integration use cases. The market for data integration tools includes vendors that offer a stand-alone software product (or products) to enable the construction and implementation of data access and data delivery infrastructure for a variety of data integration use cases.
Data masking is based on the premise that sensitive data can be transformed into less sensitive but still useful data. This is necessary to satisfy application testing use cases that require representative and coherent data, as well as analytics that involve the use of aggregate data for scoring, model building and statistical reporting. The market for data protection, DM included, continues to evolve with technologies designed to redact, anonymize, pseudonymize, or in some way deidentify data in order to protect it against confidentiality or privacy risk.
Data preparation is an iterative and agile process for finding, combining, cleaning, transforming and sharing curated datasets for various data and analytics use cases including analytics/business intelligence (BI), data science/machine learning (ML) and self-service data integration. Data preparation tools promise faster time to delivery of integrated and curated data by allowing business users including analysts, citizen integrators, data engineers and citizen data scientists to integrate internal and external datasets for their use cases. Furthermore, they allow users to identify anomalies and patterns and improve and review the data quality of their findings in a repeatable fashion. Some tools embed ML algorithms that augment and, in some cases, completely automate certain repeatable and mundane data preparation tasks. Reduced time to delivery of data and insight is at the heart of this market.
Gartner defines a data science and machine learning platform as an integrated set of code-based libraries and low-code tooling that support the independent use by, and collaboration between, data scientists and their business and IT counterparts through all stages of the data science life cycle. These stages include business understanding, data access and preparation, experimentation and model creation, and sharing of insights. They also support machine learning engineering workflows including creation of data, feature, deployment and testing pipelines. The platforms are provided via desktop client or browser with supporting compute instances and/or as a fully managed cloud offering. Data science and machine learning (DSML) platforms are designed to allow a broad range of users to develop and apply a comprehensive set of predictive and prescriptive analytical techniques. Leveraging data from distributed sources, cutting-edge user experience, and native machine learning and generative AI (GenAI) capabilities, these platforms help to augment and automate decision making across an enterprise. They provide a range of proprietary and open-source tools to enable data scientists and domain experts to find patterns in data that can be used to forecast financial metrics, understand customer behavior, predict supply and demand, and many other use cases. Models can be built on all types of data, including tabular, images, video and text for applications that require computer vision or natural language processing.
Data security platforms (DSPs) combine data discovery, policy definition and policy enforcement across data silos. Policy enforcement capabilities include format-preserving encryption, tokenization and dynamic data masking. These capabilities can be delivered through connectors, agents, proxies and APIs. Business requirements to leverage data and share data, for example for AI/ML use cases, require data security controls and highly-granular data access which is provisioned fast and humanly understandable. Tight-fitting data access and security controls allow you to reveal and share (leverage) more of your data. However, organizations face sufficient complexity when it comes to provisioning and rightsizing entitlements and data security controls. This extends to data privacy as well as analytics governance and ethics. The DSP delivers most of the required components critical to enabling good data governance and optimized data security controls while preventing the exponential increase of data access and policy rules.
Data virtualization technology is based on the execution of distributed data management processing, primarily for queries, against multiple heterogeneous data sources, and federation of query results into virtual views. This is followed by the consumption of these virtual views by applications, query/reporting tools, message-oriented middleware or other data management infrastructure components. Data virtualization can be used to create virtualized and integrated views of data in-memory, rather than executing data movement and physically storing integrated views in a target data structure. It provides a layer of abstraction above the physical implementation of data, to simplify querying logic.
Reviews for 'Data and Analytics - Others'
A D&A governance platform is a set of integrated business capabilities that helps business leaders and users evaluate and implement a diverse set of governance policies and monitor and enforce those policies across their organizations’ business systems. These platforms are unique from data management and discrete governance tools in that data management and such tools focus on policy execution, whereas these platforms are used primarily by business roles — not only or even specifically IT roles.
Gartner defines the market for data and analytics (D&A) services as consulting and system integration (C&SI) and managed services. These services manage data for all uses (operational and analytical), and analyze data to drive business processes and improve business outcomes through more effective decision making. The core capabilities for vendor solutions in the D&A services market include: D&A strategy and operating model design Data management Analytics and business intelligence (ABI) Data science and machine learning D&A governance Program management Enterprise metadata
Gartner defines DataOps as the collaborative data management practice focusing on improving communication, continuous integration, automation, observability and operations of data flows between data managers, data consumers, and their teams across the organization. DataOps tools connect and orchestrate data pipelines across heterogeneous systems. Data and analytics leaders are the buyers in this emerging market. The primary audience for DataOps tools is “data manager” personas like, data engineers, data integration developers, operations/incident analysts, database administrators and data architects. The secondary audience is “data consumer” personas like business analysts, business intelligence developers, data scientists and citizen roles (departmental users who are domain experts, but less technical).
Decentralized identity (DCI) democratizes digital identity by decentralizing both the storage and the use of identity data. The primary benefits of DCI are privacy, anonymity and user autonomy. DCI tools include a trust fabric, typically a distributed ledger like a blockchain; a digital wallet, which is tied to an entity (user); verifiable credentials (VCs), which represent identity attributes used to prove identity claims; and decentralized identifiers (DIDs), which establish pseudonymous relationships for issuing and verifying claims. DCI systems are delivered via software and SaaS capabilities. Users are primarily humans, but machines and even business entities can be users of DCI. DCI is used for user verification, identifying and tying a physical person to an identity wallet, and for user authentication and authorization, authenticating that user and authorizing them to access resources and data. Unlike conventional approaches, DCI does not use central stores of identity data, instead decentralizing the identity data, relationships between a user and service provider, and verification.
Gartner defines DevOps platforms as those that provide fully integrated capabilities to enable continuous delivery of software using Agile and DevOps practices. The capabilities span the development and delivery life cycle built around the continuous integration/continuous delivery (CI/CD) pipeline and include aspects such as versioning, testing, security, documentation and compliance. DevOps platforms support team collaboration, consistency, tool simplification and measurement of software delivery metrics. DevOps platforms simplify the creation, maintenance and management of the components required for the delivery of modern software applications. Platforms create common workflows and data models, simplify user access, and provide a consistent user experience (UX) to reduce cognitive load. They lead to improved visibility, auditability and traceability into the software development value stream. This end-to-end view encourages a systems-thinking mindset and accelerates feedback loops.
Gartner defines digital experience monitoring (DEM) tools as those that measure the availability, performance and quality of the user experience (human user or digital agent) of critical applications. This can include internal users (employees and contractors), external users (customers and partners) or a digital agent connecting to an API. In addition to performance, DEM technologies enable observability of user behavior and journey based on their interaction with applications.
The DRaaS market provides for the recovery of enterprise applications at another location in the event of a disaster. The provider can deliver the service as a fully managed, assisted recovery or as a self-service offering. The service should be marketed and sold as a stand-alone, industrialized offering and include, at a minimum: - An on-demand recovery cloud for planned tests, exercises and declarations - Server image and production data replication to the cloud - Automated failover and failback between production and the target cloud environment - Recovery time SLAs
Gartner defines file and object storage platforms as software and/or hardware platforms that offer object and distributed file system technologies for storing and managing unstructured data over NFS, SMB and Amazon S3 access protocols. File and object storage platforms store, secure, protect and scale an organization’s unstructured data with access over the network using protocols such as NFS, SMB and Amazon S3. Use cases include analytics, workload consolidation, backup and archiving, hybrid cloud, object-native applications, cloud IT operations, and high-performance files.
Gartner defines distributed hybrid infrastructure as offerings that deliver cloud-native attributes, which can be deployed and operated where the customer prefers. This is a key distinction to public cloud IaaS, which is based on a centralized approach. Offerings are software and/or integrated hardware with a unified control plane. Distributed hybrid infrastructure provides the foundation for the deployment of applications in a distributed manner that retains a cloud or cloud-inspired approach. In doing so, it improves agility and flexibility for the workloads outside of public cloud infrastructure.
Gartner defines document management as the tools and practices used to capture, store, process, and access documents and content in support of personal, team and enterprise needs. It is used for a wide range of collaborative and operational purposes, enabling the digital workplace, content collaboration, content-centric processes, content services for enterprise applications and content governance. Gartner estimates that 70% to 80% of enterprise information is unstructured, posing a significant challenge for organizations that must unlock the potential and mitigate the risks of content. Document management tools are critical to enterprise application strategies that need to support unstructured information or content.
The e-discovery solutions market comprises vendors offering technology solutions that facilitate the electronic discovery process. E-discovery solutions specialize in one or more areas to identify, collect, preserve, process, review, analyze and produce electronically stored information (ESI). ESI fulfills legal and compliance requirements for discovery that result from a variety of investigative scenarios. The scope of ESI often includes data sources, such as digital communications, file systems, cloud office platforms, endpoints, databases and applications. E-discovery solutions market includes software vendor offerings for a customer’s own deployment on-premises and in cloud infrastructure, as well as hosted offerings provided by software vendors and services providers.
Reviews for 'ERP and Corporate Management - Others'
Elevating Test Data Management for DevOps is the process of providing DevOps teams with test data to evaluate the performance, and functionality of applications. This process typically includes copying production data, anonymization or masking, and, sometimes, virtualization. In some cases, specialized techniques, such as synthetic data generation, are appropriate. With that, it applies data masking techniques to protect sensitive data, including PII, PHI, PCI, and other corporate confidential information, from fraud and unauthorized access while preserving contextual meaning.
EMNSs automate the distribution and management of messages to relevant stakeholders for localized events and regional and catastrophic disasters across multiple channels. Use cases include organizational crises, business-critical operations, IT outages, and public and personal safety.
The Endpoint Detection and Response Solutions (EDR) market is defined as solutions that record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems. EDR solutions must provide the following four primary capabilities: • Detect security incidents • Contain the incident at the endpoint • Investigate security incidents • Provide remediation guidance
Gartner defines enterprise agile planning (EAP) tools as products that enable organizations to scale their agile practices to support a holistic enterprise view. These tools act as a hub for defining, planning, managing and deploying work. They also serve as an information hub for the disparate islands of metrics from the full life cycle. Just as agile is an evolution of development methodologies, EAP tools are an evolution of project-/team-centric tools. They support a business-outcome-driven approach to managing the full life cycle of agile product delivery at scale. EAP tools in this market combine data from multiple sources to enable: - Monthly, weekly and even daily incremental value delivery based on business outcomes - Support for enterprise agile frameworks like Scaled Agile Framework (SAFe) - Product roadmapping - Management of strategy, investments and objectives - Increased visibility into the flow of work - Management of work backlogs - Collaboration capabilities for individuals and teams - Management of cross-team dependencies - Release planning and forecasting - Visibility into the financial aspects of the work being done
Enterprise asset management (EAM) is a business application used most comprehensively by asset-intensive industries to execute, track and optimize inspections, maintenance and repair of industrial plants and equipment. Examples of these industries are heavy discrete and process manufacturing industries, oil and gas, rail, and power and utilities. An alternative term used for EAM is “computerized maintenance management system” (CMMS), which is generally considered to be small-scale, single-site applications with less functionality around parts management and resource scheduling.
Gartner defines enterprise backup and recovery software solutions as technology that captures a point-in-time copy (backup) of enterprise data in on-premises, hybrid, multicloud and software as a service (SaaS) environments. These solutions write this data to one or more secondary storage targets for the primary purpose of recovering it in case of loss. Protecting and recovering business application data, irrespective of the underlying infrastructure type and its location, is more important than ever. As enterprises move toward more complex environments that include large and expansive amounts of business-critical data, enterprise backup and recovery software solutions protect these workloads, whether they reside in on-premises, hybrid, multicloud or software as a service (SaaS) environments. These solutions are vital to organizations’ ability to recover data following events that cause it to become inaccessible. Whether such an event is accidental, malicious or environmental, organizations use these solutions to recover and restore access to the affected data accurately and efficiently. Solutions must offer effective capabilities to simplify the management of data protection across complex enterprise environments. They must also ensure reliable recovery not just from accidental or operational errors but also from data loss arising from constantly changing threats, and expedite and orchestrate data recovery responses to traditional disaster and ransomware events.
EBPA is a comprehensive approach toward business and process modeling aimed at transforming and improving business performance with an emphasis on cross-viewpoint (strategy, analysis, architecture, automation), cross-functional analysis to support strategic and operational decisions.
Gartner defines the enterprise conversational AI platform market as the market for software platforms used to build, orchestrate and maintain multiple use cases and modalities of conversational automation. The enterprise conversational AI platform consists of: A capability layer providing runtime capabilities that include: Natural language understanding (NLU), Dialogue management, Channel integration, Back-end integration, Access control for platform users, Life cycle management; A tooling layer geared toward business users that includes: A no-code environment for building and maintaining, applications, Analytic tools for understanding dialogue flows, NLU intent and entity tuning tools, A/B flow testing tools.
Reviews for 'Enterprise Networking and Communications - Others'
Enterprise social networking applications facilitate, capture and organize open conversations and information sharing between individual workers and groups within an organization. In addition to capabilities that support conversations and information sharing, they can keep track of the network of relationships between participants (via social graphs), in order to deliver a personalized stream of updates about events or conversations to individuals (via news feeds and activity streams). These applications help people find out about each other, have discussions, share information and generally interact. Interaction occurs either at a one-to-one level, or in groups, teams, communities and networks, and in the context of structured or unstructured business activities.
Enterprise video content management (EVCM) comprises products intended to manage and facilitate the delivery of one-to-any, on-demand or live video across internet protocols. It may also include associated network services - content delivery networks (CDN) or enterprise content delivery networks (ECDN) - intended to facilitate the delivery of video. EVCM serves workers and customers who need to watch - and workers who need to share - videos.
Event brokering is a role played by middleware in facilitating event-driven application architecture. The minimum capability required to play the role of event broker is pub-sub messaging. All middleware products, including MOMs and ESBs, supporting pub-sub can play the role of an event broker and can be referred to as basic 'event brokers' when so deployed. Middleware products that additionally offer special support for event-centric use cases (for example, a persistent event ledger for analysis and event sourcing, or programmable extensibility for custom filtering and analysis) are 'advanced' event brokers.
The market for ESP platforms consists of software subsystems that perform real-time computation on streaming event data. They execute calculations on unbounded input data continuously as it arrives, enabling immediate responses to current situations and/or storing results in files, object stores or other databases for later use. Examples of input data include clickstreams; copies of business transactions or database updates; social media posts; market data feeds; images; and sensor data from physical assets, such as mobile devices, machines and vehicles.
File analysis (FA) products analyze, index, search, track and report on file metadata and file content, enabling organizations to take action on files according to what was identified. FA provides detailed metadata and contextual information to enable better information governance and organizational efficiency for unstructured data management. FA is an emerging solution, made of disparate technologies, that assists organizations in understanding the ever-growing volume of unstructured data, including file shares, email databases, enterprise file sync and share, records management, enterprise content management, Microsoft SharePoint and data archives.
Gartner defines finance and accounting (F&A) business process outsourcing (BPO) as the use of digital F&A technology solutions and managed services supplied by a third-party service provider. F&A BPO services provide transformation expertise and technology solutions that meet finance departments’ requirement to move from labor-intensive service delivery models to automation-intensive models supporting the digital transformation of finance operations. F&A BPO providers offer processing services and technology solutions for purchase to pay (P2P), order to cash (O2C) and record to report (R2R). BPO providers meet finance buyers’ needs to address improving process maturity at a competitive price. Providers offer processing and technology services to improve P2P, O2C and R2R processes, which offer buyers the ability to purchase transformation expertise and technology solutions to help their finance operations mature. At minimum, an F&A BPO provider processes finance activities on behalf of its customers via a delivery center network, often in low-cost locations, passing on cost savings in the form of labor arbitrage. Mature BPO offerings move beyond labor arbitrage efforts and offer buyers end-to-end intelligent processing capabilities through either proprietary or partner technology ecosystems, which are often cloud-based and are focused on reducing human dependencies in process workflows. Buyers benefit from these types of agreements by maturing their processes and adopting technologies that require minimum human intervention.
Gartner defines financial close and consolidation solutions (FCCS) as applications that enable corporate controllers and their teams to manage the organization’s group close, consolidation and reporting processes. The FCCS market equips organizations to (1) manage and drive financial control across their close cycles through configurable workflows and dashboards that support collaboration and provide a centralized auditable view; (2) execute financial consolidation across multiple legal entities (LEs) and geographies; (3) meet accounting standards for currency translation, intercompany elimination and top-side adjustments; and (4) generate reporting that adheres to Generally Accepted Accounting Principles (GAAP), International Financial Reporting Standards (IFRS) and regional compliance.
Gartner defines financial planning software as the key tool that enables organizations to automate and streamline their enterprisewide financial planning processes. The software supports planning, budgeting and forecasting processes by connecting relevant operational and driver data to profit and loss, balance sheet and cash-flow financial statements. Additionally, the software offers enhanced decision support and analytics that can be customized to unique planning requirements. To provide this support, financial planning software offers data integration, data modeling, reporting and workflow capabilities, which all enhance a user’s ability to effectively manage the planning process and their organization’s financial performance.
The GRC for assurance leaders solutions market offers technologies that support identifying, assessing, managing, monitoring and reporting on risks associated with the enterprise and compliance risks assurance leaders manage. These solutions commonly include tools for tracking workflow associated with these activities and their related aggregate data. Solutions in this market also support wide varieties of risk domains and niche workflows of risk managers or owners throughout the enterprise. Vendors’ products included in this research offer at least one capability in all core risk management capabilities and a module or solution package to support more than one risk domain. They are designed to facilitate coordination throughout the “three lines of defense” by providing a synthesized view of assurance activity and data to second-line functions — especially enterprise risk management (ERM) and compliance.
Generative AI (GenAI) apps use generative AI capabilities for user experience and task augmentation to accelerate and assist the completion of a user’s desired outcomes. Generative AI refers to technologies that can generate new derived versions of content, strategies, designs and methods by learning from large repositories of original source content. When embedded in the experience, generative AI offers richer contextualization for singular tasks such as generating and editing text, code, images and other multimodal output. As an emerging capability, process-aware generative AI agents can be prompted by users to accelerate workflows that tie multiple tasks together. Apart from helping save time and money, generative AI apps help improve branding of businesses by creating more engaging and effective content while also creating more engaging and immersive experiences for customers. Please note that this market is based on Beta research and is continuously evolving. We will be making changes as and when there are new updates.
Generative AI (GenAI) engineering refers to the field of engineering that focuses on the development, implementation and optimization of generative AI models. Generative AI refers to technologies that can generate new derived versions of content, strategies, designs and methods by learning from large repositories of original source content. By developing GenAI models, engineers can create new and innovative ways to generate content. The vendors in this segment are made up by incumbent and startup vendors covering full-model life cycle management, specifically adjusted to and catering to development, refinement and deployment of generative models (e.g., LLMs) and other GenAI artifacts in production applications. Please note that this market is based on Beta research and is continuously evolving. We will be making changes as and when there are new updates.
The global industrial IoT platform delivers multiple integrations to industrial OT assets and other asset-intensive enterprises’ industrial data sources to aggregate, curate and deliver contextualized insights that enable intelligent applications and dashboards through an edge-to-cloud architecture. The global industrial Internet of Things (IIoT) platform market exists because of the core capabilities of integrated middleware software that support a multivendor marketplace of intelligent applications to facilitate and automate asset management decision making. IIoT platforms also provide operational visibility and control for plants, infrastructure and equipment. Common use cases are augmentation of industrial automation, remote operations, sustainability and energy management, global scalability, IT/operational technology (OT) convergence, and product servitization of industrial products. The IIoT platform monitors IoT endpoints and event streams, supports and/or translates a variety of manufacturer and industry proprietary protocols, analyzes data in the platform, at the edge and in the cloud, integrates and engages IT and OT systems in data sharing and consumption, enables application development and deployment and can enrich and supplement OT functions for improved asset management life cycle strategies and processes. In some emerging use cases, the IIoT platform may obviate some OT functions.
Hadoop distributions are used to provide scalable, distributed computing against on-premises and cloud-based file store data. Distributions are composed of commercially packaged and supported editions of open-source Apache Hadoop-related projects. Distributions provide access to applications, query/reporting tools, machine learning and data management infrastructure components. First introduced as collections of components for any use case, distributions are now often delivered as part of a specific solution for data lakes, machine learning or other uses. They subsequently grow into additional, expanded roles, competing with both older technologies like database management systems (DBMSs) and newer ones like Apache Spark.
Population Health Management (PHM) is the approach used to achieve measurable improvements in the health outcomes of a population. In the broadest definition, healthcare provider population health management platforms cover the set of IT capabilities and related services that enable provider organizations to manage populations of patients and achieve the specific quality, cost and experience goals. The products included in this market provide the crucial capabilities for identifying patients at high risk of poor health, presenting a care plan to address poor health, visualizing the gaps between their current care and the care plan, engaging patients in their health, and tracking the outcomes of care.
Reviews for 'IT Infrastructure and Operations Management - Others'
IT Resilience Orchestration (ITRO) solutions are chiefly aimed at helping to improve the reliability, speed and granularity of workload recovery due to unplanned outages by automating disaster recovery (DR) processes while lowering costs of DR exercising and DR operations staff. Gartner’s ITRO definition focuses on tools that support a majority of these capabilities: • Automated failover, failback and availability/continuity management • Replication and orchestration • Discovery, dependency mapping and workload analysis • DR management and run book creation • Reporting and validation of recovery capability
The IT risk management (ITRM) market focuses on solutions that support the ITRM discipline through automating common workflows and requirements. For the purposes of defining this market, IT risks are risks within the scope and responsibility of the IT department. These include IT dependencies that create uncertainty in daily tactical business activities, and IT risk events resulting from inadequate or failed internal IT processes, people or systems, or from external events.
Gartner defines IT service management (ITSM) platforms as software that offers workflow management that enables organizations to design, automate, plan, manage, report on and deliver integrated IT services and related digital experiences. Supported practices include request, incident, problem, change, knowledge and configuration management, and case management, as well as interfaces for non-IT business needs. ITSM platforms are typically acquired as SaaS; however, they are also sold as on-premises deployments. I&O leaders select these solutions to be consumed by service desks and service operations, and are identifying opportunities for business workflows in other IT-adjacent departments.
Gartner defines IT Services for Communication Service Providers (ITS-CSP) as multivendor IT services CSPs buy to: ■ Enable solutions to their customers, particularly enterprises ■ Transform their customer, partner, workforce, service or infrastructure management IT must deliver a cloud-first, agile, automation- and intelligence-based “digital factory” that can support broader corporate goals of product diversification, innovation, revenue growth and improved digital customer journeys. Geopolitical issues, ecosystems, transparency, trust and security are mission-critical in the uncertain world and add to the factors affecting CSPs’ competitiveness. Communications service providers want to buy and understand business outcomes over technology. They want their IT service partners to have a personal investment. CIOs in large CSPs would like to work with a smaller number of more strategic IT service partners. At the same time, business unit leaders also want to speed up their initiatives, creating possibilities for IT service providers. CSPs want help with revenue growth from enterprises, including joint go-to-market and new digital technology capabilities from IT service providers. Communications service providers expect cost-efficiency from automation, from IT enabling their networks and from using more cloud-delivered software capability. All this is underpinned by the CSP’s desire to run data-focused businesses, including digital key performance indicators (KPIs).
Gartner defines IT vendor risk management (IT VRM) as the discipline of addressing the residual risk that businesses and governments face when working with external service providers, IT vendors and related third parties. The scope typically addresses risks related to data protection, business continuity, security and other risk domains as relevant to laws, regulation and industry practices.
Gartner defines identity governance and administration (IGA) as the solution to manage the identity life cycle and govern access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data, and provide full capability controls over accounts and associated access. IGA solutions also fulfill the purpose of unifying and correlating identity data for organizations with multiple person and machine identity authoritative sources. This is done to provide a single view of identity (system of record) for their dependent processes and systems
IMDGs provide a lightweight, distributed, scale-out in-memory object store — the data grid. Multiple applications can concurrently perform transactional and/or analytical operations in the low-latency data grid, thus minimizing access to high-latency, hard-disk-drive-based or solid-state-drive-based data storage. IMDGs maintain data grid durability across physical or virtual servers via replication, partitioning and on-disk persistence. Objects in the data grid are uniquely identified through a primary key, but can also be retrieved via other attributes. The most typical use of IMDGs is for web-scale transaction processing applications. However, adoption for analytics, often in combination with Apache Spark and Hadoop or stream analytics platforms, is growing fast — for example, for fraud detection, risk management, operation monitoring, dynamic pricing and real-time recommendation management.
Infrastructure monitoring tools capture the health and resource utilization of IT infrastructure components, no matter where they reside (e.g., in a data center, at the edge, infrastructure as a service [IaaS] or platform as a service [PaaS] in the cloud). This enables I&O leaders to monitor and collate the availability and resource utilization data of physical and virtual entities — including servers, containers, network devices, database instances, hypervisors and storage. These tools collect data in real time and perform historical data analysis or trending of the elements they monitor.
Gartner defines insider risk management as a methodology that includes the tools and capabilities to measure, detect and contain undesirable behavior of trusted accounts in the organization. It includes solutions that monitor the behavior of employees, service partners and key suppliers working inside the organization. These tools then evaluate whether behavior falls within the expectations of the role and corporate risk tolerance. For CISOs and cybersecurity leaders, insider risk management refers to the use of technical solutions to solve a fundamentally human problem. Managing insider risks requires collaboration among many cross-functional partners. Components of an insider risk management methodology are policies, guidelines and investigative work that fall outside the bounds of a typical cybersecurity organization. For our purposes, the insider risk management market consists of tools and solutions that monitor the behavior of employees, service partners and key suppliers working inside the organization. It evaluates whether behavior falls within the expectations of the role and corporate risk tolerance.
Gartner defines Insight Engines as follows: Insight engines apply relevancy methods to discover, analyze, describe and organize content and data. They enable the interactive or proactive delivery or synthesis of information to people, and data to machines, in the context of their respective business moments. Insight engines should be viewed as platforms on which applications are provided, developed or augmented by applying the capabilities listed above to specific employee and customer experience use cases. Such applications are provided out of the box by vendors (e.g., intranet or site search), developed through technical partnerships (e.g., search within third-party applications), developed with customers in-house (e.g., expert finder), or developed through integration with third-party applications (e.g., extracting data from documents to support RPA).
Gartner defines Integrated risk management (IRM) as the combined technology, processes and data that serves to fulfill the objective of enabling the simplification, automation and integration of strategic, operational and IT risk management across an organization.
Integrated systems combine server, shared storage and network devices, along with management software and support in a preintegrated stack. The integrated system market has four segments: integrated infrastructure system, integrated reference architecture, integrated stack system and hyperconverged infrastructure (HCI) segment. The overall HCI segment is further subdivided into Hyperconverged Integrated Systems (HCIS), which provides both software and hardware in an appliance model and the software only segment in which vendors provide the Hyperconverged software. This is then integrated with HW by a reseller or the end customer.
Gartner defines the integrated workplace management systems market (IWMS) as an enterprise software solution that supports the life cycle management of corporate real estate (CRE) assets. The solution is delivered as a cloud-based or an on-premises installation that enables organizations to manage and optimize their building portfolio. An IWMS is a software platform that centralizes real estate and facilities management into a single solution to optimize building portfolio asset rationalization. As organizations adapt to changing environments with increased remote, hybrid and sustainability requirements, IWMS enables life cycle management of buildings for greater operational efficiency and workplace effectiveness by providing an integrated dynamic facilities management approach.
Gartner defines integration platform as a service (iPaaS) as a vendor-managed cloud service that enables end users to implement integrations between a variety of applications, services and data sources, both internal and external to their organization. iPaaS enables end users of the platform to integrate a variety of internal and external applications, services and data sources for at least one of the three main uses of integration technology: Data consistency: The ability to monitor for or be notified by applications, services and data sources about changes, and to propagate those changes to the appropriate applications and data destinations (for example, “synchronize customer data” or “ingest into data lake”). Multistep process: The ability to implement multistep processes between applications, services and data sources (for example, to “onboard employee” or “process insurance claim”). Composite service: The ability to create composite services exposed as APIs or events and composed from existing applications, services and data sources (for example, to create a “credit check” service or to create a “generate fraud score” service). These integration processes, data pipelines, workflows, automations and composite services are most commonly created via intuitive low-code or no-code developer environments, though some vendors provide more-complex developer tooling.
Intelligent asset management (IAM) software enables asset intensive businesses in optimizing the performance of their physical assets by leveraging the advanced technologies, such as artificial intelligence (AI), machine learning (ML), and automation. These technologies analyze the collected data to identify and predict the performance, reliability, and safety of assets through easy-to-understand reports and dashboards. In addition, it facilitates collaboration across a network of multiple stakeholders, regardless of their physical location or network connectivity to share data, assign task, and reduces manual effort in managing asset-related processes. This software is typically used by industries including manufacturing, utilities, oil and gas, transportation, and more.
Gartner defines intelligent document processing (IDP) solutions as specialized data integration tools enabling automated extraction of data from multiple formats and varying layouts of document content. IDP solutions ingest data for dependent applications and workflows, and can be provided as a software product and/or as a service. Organizations receive and process documents in multiple formats to enable activities such as onboarding new suppliers, receiving applications for loans or insurance claims. This results in large numbers of documents, the content of which is designed for people to comprehend rather than machines to process. Extracting data from content is essential for document processing and the automated activities this supports. IDP solutions fulfill this role, augmented by and potentially replacing people.
The network intrusion detection and prevention system (IDPS) appliance market is composed of stand-alone physical and virtual appliances that inspect defined network traffic either on-premises or in the cloud. They are often located in the network to inspect traffic that has passed through perimeter security devices, such as firewalls, secure Web gateways and secure email gateways. IDPS devices are deployed in-line and perform full-stream reassembly of network traffic. They provide detection via several methods — for example, signatures, protocol anomaly detection, behavioral monitoring or heuristics, advanced threat defense (ATD) integration, and threat intelligence (TI). When deployed in-line, IDPSs can also use various techniques to detect and block attacks that are identified with high confidence; this is one of the primary benefits of this technology. Next-generation IDPSs have evolved in response to advanced targeted threats that can evade first-generation IDPSs.
Integration means making independently designed applications and data work well together. IoT integration means making the mix of new IoT devices, IoT data, IoT platforms and IoT applications — combined with IT assets (business applications, legacy data, mobile, and SaaS) — work well together in the context of implementing end-to-end IoT business solutions. The IoT integration market is defined as the set of IoT integration capabilities that IoT project implementers need to successfully integrate end-to-end IoT business solutions.
Gartner defines the MDM external service provider (ESP) market as a subset of the broader data and analytics services market that is composed of consulting, implementation and managed services for master data governance. MDM ESPs provide strategic, tactical and operational support to organizations engaging in MDM programs. MDM services include the formulation of strategies, business cases, roadmaps, business and technical metrics, governance organizations and processes, information life cycle discovery, and program and project planning. Services may be used to assist in the selection, installation and configuration of commercial off-the-shelf (COTS) MDM software solutions, or for the provision of proprietary offerings that focus on specific business cases and outcomes.
Machine learning Infrastructure as a Service (ML IaaS) is an infrastructure delivery model that provisions virtualized or bare-metal infrastructure resources that are performance optimized for compute-intensive ML and DNN workloads . The ML IaaS market is characterized by core capabilities, including hardware-accelerated, high-performance compute platforms, usually augmented by accelerator technologies like GPU, FPGA or custom processors like Google TPU. Due to the unique nature of hardware-involved DNN frameworks (such as TensorFlow, pyTorch, Caffe and MxNet), they need to be reconfigured and integrated with appropriate libraries to take full advantage of ML IaaS capabilities.
MSSs provide organizations with a variety of management and operational services specific to security technologies and business outcomes for security. Capabilities include security monitoring, detection and response, exposure assessment and management as well as security consulting and security technology implementation. MSSs are delivered in a variety of modes, in the providers’ cloud infrastructure, as consultative engagements or through staff augmentation and on-premises. MSS providers offer a variety of different engagement models. These include heavily customized and consultancy-led models and commoditized technology management-driven experiences.
MDM is a technology-enabled business discipline in which business and IT work together to ensure the uniformity, accuracy, stewardship, governance, semantic consistency and accountability of an enterprise’s official shared master data assets. Master data has the lowest number of consistent and uniform sets of identifiers and attributes that uniquely describe the core entities of the enterprise and are used across multiple business processes.
Master data management (MDM) of customer data solutions are software products that: Support the global identification, linking and synchronization of customer information across heterogeneous data sources through semantic reconciliation of master data. Create and manage a central, persisted system of record or index of record for customer master data. Enable the delivery of a single, trusted customer view to all stakeholders, to support various business initiatives. Support ongoing master data stewardship and governance requirements through workflow-based monitoring and corrective-action techniques. Are agnostic to the business application landscape in which they reside; that is, they do not assume or depend on the presence of any particular business application(s) to function.
Master data management (MDM) of product data solutions are software products that: Support the global identification, linking and synchronization of product data across heterogeneous data sources through semantic reconciliation of master data. Create and manage a central, persisted system of record or index of record for product master data. Enable the delivery of a single, trusted product view to all stakeholders, to support various business initiatives. Support ongoing master data stewardship and governance requirements through workflow-based monitoring and corrective-action techniques. Are agnostic to the business application landscape in which they reside; that is, they do not assume or depend on the presence of any particular business application(s) to function.
Meeting solutions are real-time communication services with their associated devices that support live interactions between participants for internal and external collaboration, presentations, learning, training sessions and webinars. Meeting solutions power diverse use cases, such as one-on-one meetings, remote sales engagements, board meetings, telehealth sessions, remote banking and consulting services, to name just a few. Meeting solutions enable rich information sharing and interaction by combining audio and video, in-meeting chat, content and screen sharing, and visual collaboration and whiteboarding.
Gartner defines a mobile application management (MAM) tool as an on-premises or SaaS tool specifically designed for the license management, distribution, securing and life cycle management of apps for mobile device platforms. Thus, MAM tools provide integration with public app store payment and licensing mechanisms (such as Apple's Volume Purchase Program [VPP]), an enterprise app store, and the ability to set policies related to security, usage and ongoing management for apps or groups of apps. At minimum, a MAM product supports native and HTML 5 apps. Many also support a variety of popular hybrid app architectures, which may be highly desirable based on a particular client's needs.
Gartner defines mobile marketing platforms (MMPs) as software solutions that help organizations create, activate, execute, analyze and optimize mobile marketing campaigns and experiences. The platforms target audiences on their mobile device through multiple message types such as SMS/text, push notifications, messaging apps and in-app messages. These platforms enable marketers to engage customers and prospects through a range of mobile-specific tactics — spanning mobile websites, mobile applications, smart device engagement, messaging (such as SMS and native applications), push notifications (such as on mobile apps and off websites), location-triggered interactions and mobile wallet cards. Mobile tactics are particularly suited to, for example, providing time-sensitive notifications to audiences, whether that’s in response to a live event, location-specific moment or a fulfillment update. MMPs also help measure and optimize the effectiveness of mobile strategy. MMPs can operate as stand-alone solutions within a marketing organization’s tech stack, or operate alongside other marketing technology. These technologies can include a set of capabilities within a multichannel marketing hub (MMH), marketing automation platform (MAP), customer data platform (CDP) or other marketing automation applications. Stand-alone MMPs are a more specialized solution, often used in conjunction with an MMH, email platform or B2B MAP.
Mobile threat defense (MTD) products protect organizations from malicious threats on iOS and Android devices, at the device, network and application levels. To successfully attack a mobile device, mobile malware must circumvent the controls built into mobile OSs, such as those for app store curation and native mobile OS hardening. MTD products tend to focus on preventing and detecting anomalous behavior by collecting and analyzing indicators of compromise, as well as expected behavior. MTD products gather threat intelligence from the devices they support, as well as from external sources, and use an analysis engine that resides in the cloud, on-premises or on an MTD app installed on devices.
Multiagent orchestration platforms (MAO platforms) act like intelligent middleware that integrates and orchestrates work between various business applications, heterogenous fleets of operational robots, and other automated agents like doors or elevators. These solutions monitor and coordinate the activities of diverse fleets of robots within a complex environment to achieve a common goal. Their capability to assign work in near real-time is essential for adapting to changing conditions and work demands in the warehouse. These solutions often include advanced data analytics and reporting capabilities, providing insights into operational efficiency and process optimization opportunities. These can also integrate with a variety of business applications. MAO platforms are widely used in various fields such as robotics, supply chain management, smart grid management, and cloud computing, where multiple autonomous systems need to work together efficiently.
Gartner defines multichannel marketing hubs (MMHs) as software applications that orchestrate personalized communications to individuals in common marketing channels. MMHs optimize the timing, format and content of interactions through the analysis of customer data, audience segments and offers. MMHs are foundational for multichannel marketing, customer journey orchestration and next best action programs.
Gartner defines multienterprise collaboration networks (MCNs) as solutions that support a community of trading partners of any tier and type that need to coordinate and execute on business processes extending across multiple enterprises. Gartner considers cloud-based MCNs to be a key technology to coordinate, orchestrate and automate an organization’s extended supply chain within the overall business ecosystem they operate in. The key capabilities of MCN solutions include three layers: Network representation and management, Application functions, Embedded analytics and intelligence.
An MXDP is an opinionated, integrated set of front-end development tools and “backend for frontend” (BFF) capabilities. It enables a distributed, scalable development approach (in terms of both teams and architecture) to build fit-for-purpose apps across digital touchpoints and interaction modalities. At minimum, an MXDP must support cross-platform development and building of both custom iOS and Android app binaries, responsive web apps, and at least one of the following: PWAs, chatbots, voice apps, wearables and Internet of Things (IoT) apps, and augmented-reality (AR) and mixed-reality (MR) apps.
Gartner defines observability platforms as products that ingest telemetry (operational data) from a variety of sources including, but not limited to, logs, metrics, events and traces. They are used to understand the health, performance and behavior of applications, services and infrastructure. Observability platforms enable an analysis of the telemetry, either via human operator or machine intelligence, to determine changes in system behavior that impact end-user experience such as outages or performance degradation. This allows for early, and even preemptive, problem remediation. Observability solutions are used by IT operations, site reliability engineers, cloud and platform teams, application developers, and product owners. Observability platforms are used by organizations to understand and improve the availability, performance and resilience of these critical applications and services. Investment in and successful deployment of observability platforms leads to revenue loss avoidance and enables faster product development cycles and improvements in brand perception.
Reviews for 'Office Productivity Solutions - Others'
Gartner defines the OFD market as the market for solutions that detect and prevent fraudulent actions within digital channels (browsers and mobile apps). OFD solutions provide a spectrum of capabilities within digital channels to prevent direct and indirect financial losses and to mitigate risks. Their core capabilities: Mitigate the activity of malicious automated bots; Detect account takeover (ATO) attacks and trigger remedial actions; Detect fraudulent activity in high-risk events along the digital customer journey, such as when customers make payments, transfer funds, perform account management actions or access personally identifiable information (PII).
Gartner defines operational technology (OT) as “hardware and software that detects or causes a change, through direct monitoring and/or control of industrial equipment, assets, processes and events”. OT security includes practices and technologies used to protect them, but these practices and technologies are now evolving into distinct categories to address the growing threats, security practices and vendor dynamics.
An operational support system (OSS) is a set of programs that help a company in monitoring, controlling, analyzing and managing a computer network. OSS software is specifically dedicated to communications service providers and mainly used for supporting network planning, network provisioning, service fulfillment, and service assurance from a common core of service and resource management. Other functionality includes embedded analytics, correlation and aggregation, reporting, product life cycle management, multichannel support, resource and asset planning. OSS data is of strategic importance to measure the impact of operational technical processes on customer and business goals.
This market is focused on the full life cycle of Oracle application services, spanning project-based implementation and multiyear application management services (AMS). Evaluate service providers for their ability to deliver a comprehensive set of implementation and management services across the Oracle portfolio of products for clients worldwide. Comprehensive is defined as follows: • A distinct offering, consistent with common market service offerings as defined by the following: scope of service, delivery structure, intellectual property (IP), roles and responsibilities, service metrics and levels, terms and conditions, and pricing model. • A consolidated set of distinct offerings to address industry-specific demand or cross-industry demand, where the offering is recognized by clients or analysts as an integrated offering.
Gartner defines Oracle Cloud Application (OCA) services as only those services associated with the products under Oracle Cloud Applications, also known as SaaS. This means consultancy, migration, implementation, ongoing services, postimplementation evolution and optimization services. To qualify, each vendor project must have an “anchoring” OCA product from at least one of the following Oracle “Fusion” solutions: - Advertising and customer experience (ACX) - Industry applications (IA) - Enterprise resource planning (ERP; includes the previous EPM applications) - Human capital management (HCM) - Supply chain management (SCM)
Penetration Testing tools and services are designed to test vulnerabilities and weaknesses within computer systems and applications by simulating a cyber attack on a computer system, network, or web application. Companies conduct penetration tests to uncover new defects and test the security of communication channels and integrations. These tools and services either use vulnerability scanners or conduct manual/automated tests that scan networks and systems for open ports, and services and conduct vulnerability assessments to find any software lapse that may prove a route of attack on the system later. Further, the identified vulnerabilities are exploited to gain unauthorized access to systems or data and they try to escalate or pivot to key assets to have a better understanding about the impact of a specific attack. The process ends with generating a detailed and comprehensive testing report that describes, gives evidence for, assesses the risk, and recommends the solution to any vulnerability found. Typically these are used by security professionals and ethical hackers to identify vulnerabilities, understand how cyber attacks work, and test the effectiveness of security measures.
Gartner defines personalization engines as technology that enables marketing professionals to identify, set up, conduct and measure the optimum experience for an individual based on knowledge about them, their intent and context. Personalization engines apply context about individual users and their circumstances to select, tailor and deliver messaging such as content, offers and other interactions through various digital channels in support of three use cases: Marketing: Delivering the right message to the right audience and in the right context (i.e., tone, timing and channel) to maximize marketing and advertising performance. It involves behavioral inference, segmentation, testing, targeting and optimization of marketing campaign content, messaging and engagements across marketing and communication channels. Digital commerce: Tailoring content, offers, recommendations and experiences across digital sales channels. It includes personalized site search and navigation and customized content across homepages, category landing pages and product detail pages, with the goal of increasing conversion and delivering online revenue growth. Service and support: Using customer insight, journey context and user feedback (i.e., surveys and stated intent) to customize online and offline experiences across business functions to reduce customer effort or increase customer satisfaction and advocacy.
Predictive analytics software uses advanced analytics capabilities to analyze current and historical data to make predictions about future events. This software connects data from different data sources and employs techniques like data mining and statistical analysis to forecast future trends, detect patterns, identify potential risks and opportunities, and plan for the best possible outcome. As a result, organizations can make better business decisions with machine-generated analytics, visualization, and reporting on predictive insights. These can be used in a wide range of industries, including healthcare, finance, marketing, and manufacturing.
The primary storage platform (PSP) market addresses the need of I&O leaders to operate and support standardized enterprise storage products, along with platform-native service capabilities to support structured data applications. PSP products like primary enterprise storage arrays provide mandatory and common enterprise-class primary storage features and capabilities needed to support the platform. Platform-native services like storage as a service (STaaS) and ransomware protection, with PSP product capabilities, are required to support platform-native services. The PSP market has emerged at the convergence of two major enterprise storage market developments: the evolution of the PSP product market in conjunction with the demand for hybrid, multidomain platform-native storage services, extending on-premises services to public cloud, edge and colocation environments.
Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands, which are used to administer or configure systems and applications. PAM tools — available as software, SaaS or hardware appliances — manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines four distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, and cloud infrastructure entitlement management (CIEM).
Process mining platforms are designed to discover, monitor and improve processes by extracting knowledge from events captured in information systems to continuously deliver visibility and insights. Process mining includes automated process discovery (extracting process models from an event log), conformance checking (monitoring deviations by comparing model and log), social network/organizational mining, automated construction of simulation models, model extension, model repair, case prediction and history-based recommendations. Process mining platforms extend process mining capabilities by advanced process analytics, process improvement detection and process improvement recommendations, partly driven by AI and generative AI (GenAI).
Gartner defines public cloud IT transformation services (PCITS) as services designed to deliver transformational outcomes via the utilization of cloud-native professional and managed services. It includes migration, modernization and the building of new transformational solutions on public hyperscale cloud infrastructure and platform services. Organizations seeking to use public clouds such as Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, Oracle Cloud Infrastructure (OCI) and similar platforms engage with providers in this market to realize the greatest transformational benefits. PCITS transforms client applications, workloads and data to the public cloud to achieve their clients’ business outcomes. It makes primary use of cloud-native tools and manages IT operations in the public cloud. It encapsulates cloud management, optimization and modernization to continuously manage reliability, scalability, interoperability and more.
Public cloud storage is infrastructure as a service (IaaS) that provides block, file, object and hybrid cloud storage services delivered through various protocols. The services are stand-alone, but often used in conjunction with compute and other IaaS products. The services are priced based on capacity, data transfer and/or number of requests. The services provide on-demand storage capacity and self-provisioning capabilities. Stored data exists in a multitenant environment, and users access that data through the block, network and REST protocols provided by the services.
The regulatory change management solutions market tracks regulatory changes across multiple risk domains and triggers business processes to promote compliance with those regulations. Products in this market are distinguishable from regulatory tracking solutions alone in that the change management solutions are capable of triggering business processes.
Retail assortment management applications (RAMAs) are a foundational component of modern category management solutions for long life cycle products. Using data & analytics and AI technology, RAMAs can curate targeted assortments to create compelling customer experiences, leading to an increase in sales conversion. Long life cycle products in retail include categories such as grocery, consumables and hard goods. The long life cycle retailers’ traditionally broad approach to assortments is not satisfying customers’ demands for more curated assortments to match their lifestyles. Local trends mean that even more granular store-specific assortments are necessary. Advanced analytics, algorithms, AI and automation will play pivotal roles in driving this transformation through better customer understanding and alignment.
DOM systems use configurable rule-based procedures to orchestrate the fulfillment of customer orders placed through a retailer’s online channel, although many nonretailers are now also exploring or using DOM capabilities within their own supply chain. The purpose of a DOM system is to allow companies to optimize their order fulfillment performance while balancing two primary constraints: - The customer’s expected lead time for receiving their order on-time, in-full - The company’s desire to meet these customer expectations at the optimum fulfillment cost
Gartner defines robotic process automation (RPA) as the software to automate tasks within business and IT processes via software scripts that emulate human interaction with the application UI. RPA enables a manual task to be recorded or programmed into a software script, which users can develop by programming, or by using the RPA platform’s low-code and no-code GUIs. This script can then be deployed and executed into different runtimes. The runtime executable of the deployed script is referred to as a bot, or robot. RPA is used across numerous business functions for tactical task automation. Business and IT users can leverage RPA to: Move data in or out of application systems without human interaction (unattended automation). Scripts are designed to replicate the actions of a human interacting with those systems or documents, which usually do not have available APIs. The goal is to automate and complete a task successfully without human intervention. Typically, unattended automation is triggered by a system and bots executed on a server. Automate tasks with a human in the loop (attended automation). RPA can extract information from systems and related documents, shaping it and preparing it for consumption by a human at the point of need. Typically, attended automation is triggered by a human and bots executed on a local device.
This market is focused on the full life cycle of SAP application services, spanning project-based implementation and multiyear application management services (AMS). Evaluate service providers for their ability to deliver a comprehensive set of implementation and management services across the SAP portfolio of products for clients worldwide. Comprehensive is defined as follows: • A distinct offering, consistent with common market service offerings as defined by the following: scope of service, delivery structure, intellectual property (IP), roles and responsibilities, service metrics and levels, terms and conditions, and pricing model. • A consolidated set of distinct offerings to address industry-specific demand or cross-industry demand, where the offering is recognized by clients or analysts as an integrated offering.
Gartner defines the SAP S/4HANA Application Services as: assessment, implementation and applications management services. Assessment services are discrete, project based services to assess the impact of either a new SAP S/4HANA implementation or a migration from a legacy platform(s) to SAP S/4HANA. These services include consulting and potentially Proof of Concept, and covers the analysis of all SAP S/4HANA products, applications, databases, analytics, middleware, mobile and other technologies. Implementation services are discrete, project-based implementations of SAP S/4HANA applications without ongoing management responsibilities. These services include consulting, development and integration services, and covers all SAP S/4HANA products, applications, databases, analytics, middleware, mobile and other technologies. Management services are ongoing services focused on SAP S/4HANA applications that are provided as part of a multiyear-based agreement and managed against defined quality metrics.
SAP SuccessFactors provides human capital management (HCM) cloud applications, including core HR, talent management and workforce analytics. SAP SuccessFactors services are life cycle services provided by third-party service providers, focused on adoption and support of SAP SuccessFactors applications. Services included in this market are consulting, implementation and management. SAP SuccessFactors services are procured by HR leaders, IT managers and sourcing managers to standardize, harmonize and modernize HR or talent management systems globally, or as the catalyst to transform the HR operating model. These buyers look for service providers to rapidly implement a cloud-based solution in an agile manner, and to support its operation postimplementation.
Gartner defines Search and Product Discovery as applications that augment digital commerce solutions to facilitate navigation, filtering, comparisons, and ultimately selection of products. They provide search (keyword, natural language and visual), merchandising (automation, configuration, and curation of business rules to make a product discoverable based on business needs), product recommendations, catalog navigation (and SEO keyword automation), personalization and analytics capabilities through SaaS to enable customers (B2C and B2B) to transact. They also enable providers (merchandisers, content managers, and search specialists) to support customer experiences. With the emergence of generative AI, conversational search interfaces are now appearing. Search and Product Discovery applications use product data to facilitate navigation, filtering, comparisons and ultimately product selection. Search results can be highly visual, using engaging layouts and multimedia. Content other than product information, such as educational information, compliance materials and related news may also be included in search results to engage customers and further support buying decisions.
Security consulting firms are advisory and consulting services (see 'Definition: Cybersecurity' ) related to information and IT security design, evaluation and recommendations. These services are procured by various stakeholders in an organization, including boards of directors, CEOs, chief risk officers (CROs), chief information security officers (CISOs), chief information officers (CIOs), and other business and IT leaders for the purpose of obtaining and ensuring acceptable risk levels for a specific client organization.
SIEM is a configurable security system of record that aggregates and analyzes security event data from on-premises and cloud environments. SIEM assists with response actions to mitigate issues that cause harm to the organization and satisfy compliance and reporting requirements. The security information and event management (SIEM) system must assist with: 1. Aggregating and normalizing data from various IT and operational technology (OT) environments 2. Identifying and investigating security events of interest 3. Supporting manual and automated response actions 4. Maintaining and reporting on current and historical security events
Security orchestration, automation and response (SOAR) solutions combine incident response, orchestration and automation, and threat intelligence (TI) management capabilities in a single platform. SOAR tools are also used to document and implement processes (aka playbooks, workflows and processes); support security incident management; and apply machine-based assistance to human security analysts and operators. SOAR solutions must provide: - Highly customizable workflow process management that enables repeatable automated tasks to be turned into playbooks that run in isolation or joined together into more sophisticated workflows. - The ability to store (locally or in a third-party system) incident management data to support SecOps investigations. - Manually instigated and automated triggers that augment human security analyst operators to carry out operational tasks consistently. - A mechanism to collate and better operationalize the use of threat intelligence. - Support for a broad range of existing security technologies that supports improved analyst efficiency and acts as an abstraction layer between the desired outcomes and the custom-made set of solutions in place in your environment.
Reviews for 'Security Solutions - Others'
The security threat intelligence products and services market refers to the combination of products and services that deliver knowledge (context, mechanisms, indicators, implications and action-oriented advice), information and data about cybersecurity threats, threat actors and other cybersecurity-related issues. The output of these products and services aims to provide or assist in the curation of information about the identities, motivations, characteristics and methods of threats, commonly referred to as tactics, techniques and procedures (TTPs). The intent is to enable better decision making and improve security technology capabilities to reduce the likelihood and impact of a potential compromise. Threat intelligence (TI) products and services support the different stages of a TI process life cycle. In particular, this involves defining the aims and objectives, collecting and processing intelligence originating from various sources, analyzing and disseminating it to different stakeholders within the organization, and regularly providing feedback on the entire process. These products and services support ongoing security investigations and assist in preventing future breaches by prioritizing infrastructure hardening. TI tools and services are most commonly cloud-based products and services, but can also be delivered “as a service.”
Sentiment Analysis Tools enable organizations to analyze all forms of text data to determine the overall sentiment, opinion, or emotional tone expressed by the users in their messages. These tools use technologies such as machine learning, natural language processing (NLP), text analysis, and biometrics for analyzing and breaking a large amount of text data into small chunks to identify the underlying sentiment of a message. The underline sentiment can be positive, negative, or neutral, which is calculated by assigning the sentiment score based on a pre-determined scale to each chunk. These tools also provide multilingual support to enable sentiment analysis across different languages. These tools are commonly used in marketing, customer support, e-commerce, and finance.
Gartner defines the service orchestration and automation platform (SOAP) market as encompassing solution suites that deliver capabilities enabling organizations to manage workloads, workflows, resource provisioning and data pipelines across their technology landscapes. SOAPs enable infrastructure and operations (I&O) leaders to design and implement business services. These platforms combine workflow orchestration, workload automation and resource provisioning across an organization’s hybrid digital infrastructure. Increasingly, they are central to an organization’s ability to deploy workloads and to optimize deployments as a part of cost and availability initiatives. SOAPs expand the role of traditional workload automation by adapting to use cases that deliver and extend into data pipelines, cloud-native infrastructures and application architectures. These tools complement and integrate with DevOps toolchains to provide customer-focused agility, cost savings, operational efficiency and process standardization.
Gartner defines ServiceNow implementation, consulting and managed services as consulting and system integration, including implementation, optimization and managed services, for ServiceNow products. Consulting services are commonly delivered as a fixed-price selection process with potential follow-up time and material-based implementation support. Integration services include services to implement ServiceNow solutions. Specific post-go-live activities are included in optimization services and may consist of health checks, value analysis and maximization, analytics, new report creation, and ongoing alignment to business strategy. Managed services involve the complete management of the ServiceNow solution, from monitoring to updates and upgrades, as well as training
Gartner defines speech-to-text (STT) platforms as business applications that process speech content, either live or in batch to produce: A transcript of the conversation Metadata about the call, the callers, attributes of call, emotional context Value-added services (e.g., biometric, legal) Workflow tools to support downstream work (e.g., intent detection, CRM updates) The capabilities of STT solutions vary. At a minimum, providers can offer a set of generic APIs with no tailored industry offering. More advanced solutions support complex deployments of edge technologies tailored to specific industries such as medical and legal. As natural language experiences are rapidly adopted by customers, users and employees, STT solutions must address a number of deployment configurations and be tailored for end-user domain knowledge to improve their accuracy.
Gartner defines strategic cloud platform services (SCPS) as standardized, automated, public cloud offerings integrating infrastructure services (e.g., computing, network and storage), platform services (e.g., application, data and value-added services such as AI/ML) and transformation services (resources to help customers adopt cloud-oriented IT delivery models). Although owned by the service provider, infrastructure and platform services may be hosted in providers’ infrastructures or customers’ data centers. Services should be elastically scalable, metered by use, and consumable via web-based interfaces and programmable APIs. Transformation programs may be delivered by automated, self-service interfaces, and managed interactions facilitated by account teams/partners.
Strategic sourcing application suites are a set of related, integrated solutions that support upstream procurement activities; in other words, the strategic work the procurement team does for planning, assessment and performance management. Strategic sourcing application suites are used primarily by companies with $800 million or more in annual revenue that, typically, have the necessary critical mass of spend. The strategic sourcing application suite delivers four primary capabilities. Most vendors offer these capabilities as separately licensable modules: Spend analysis is a software- and service-based solution for cleansing, enhancing, classifying and analyzing spend data. It features rule-based data cleansing, automated category-level classification, analytics and decision support. Automated spend analysis is used in procurement and sourcing to quantify spend by supplier, category and part, and to identify opportunities for cost reduction and supply base resizing.
The structured data archiving and application retirement market is identified by an array of technology solutions that manage the life cycle of application-generated data and accommodate corporate and regulatory compliance requirements. Application-generated data is inclusive of databases and related unstructured data. SDA solutions focus on improving the storage efficiency of data generated by on-premises and cloud-based applications and orchestrating the retirement of legacy application data and their infrastructure. The SDA market includes solutions that can be deployed on-premises, and on private and public infrastructure, and includes managed services offerings such as SaaS or PaaS.
Gartner defines supply chain planning (SCP) solutions as platforms that provide technological support to enable a company to manage, link, align, collaborate and share its planning data across an extended supply chain. An SCP solution supports planning, ranging from demand planning through detailed supply-side response planning and from strategic planning through execution-level planning. It is the planning decision repository for a defined end-to-end supply chain. It is also the environment in which end-to-end-integrated supply chain decisions are managed. It establishes a single version of the truth for planning data and decisions, regardless of the underlying execution technology environment. Organizations use SCP solutions to improve their supply chain planning decisions and reach higher levels of maturity.
Supply chain strategy and planning consulting is a subset of corporate strategy consulting. Gartner defines the latter as “strategic advisory services that analyze risks and opportunities for clients, working with them to develop a detailed strategic roadmap. They focus on cross-functional client issues, including innovation, digital, regulatory, sustainability, growth, transformation, postmerger and postacquisition integration, supply chain management and transfer pricing strategies that precede configuration of ERP or other software”. Supply chain operations consulting is a specialized form of business operations consulting, which Gartner defines as “transformation advisory services that improve quality and efficiency for business operations in an organization. These include process reengineering, improvement, optimization and standardization aligned with business strategy”
Task mining is a technique by which enterprises can infer meaningful information by scraping desktop-level event data. This data may be from individual users or a cohort of individuals (e.g., in a call center) and takes the form of screen recordings, keystrokes, mouse clicks and data entries. Additional mining capabilities interpret the data by applying natural language processing and optical character recognition to correlate data in different ways. Task mining helps an enterprise identify inefficiencies and automation or AI potential, improve task execution and enhance the employee experience.
A digital twin of an organization (DTO) is a dynamic software model of any organization that relies on operational and contextual data to understand how an organization operationalizes its business model, connects with its current state, responds to changes, deploys resources and delivers customer value.
Gartner defines a unified endpoint management (UEM) tool as a software-based tool that provides agent and agentless management of computers and mobile devices through a single console. Modern UEM tools: Provide a user-centric view of devices across device platforms; Offer agent and/or agentless management through native Windows endpoint, macOS, Linux and Chrome OS controls. Offer agentless mobile management through native Apple iOS/iPad OS and Google Android controls; Aggregate telemetry and signals from identities, apps, connectivity and devices to inform policy and related actions; Aggregate and analyze technology performance and employee experience data; Integrate with identity, security and remote access tools to support zero-trust access and contextual authentication, vulnerability, policy, and configuration and data management; Manage nontraditional devices, including Internet of Things (IoT) devices, wearables and rugged handhelds.
Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. User authentication is foundational to and protects the value of other functions with an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD); audit (individual accountability); and identity analytics.
Gartner uses the following market definitions: Web analytics tools — Specialized analytics tools used to understand and improve the digital CX, attract and retain users, and analyze operations and actions taken across responsive websites and mobile apps. Product analytics tools — Tools and processes used to understand the behavior of users across products or services to inform decisions about how to improve the product experience and increase product engagement. Digital experience analytics tools — Tools that provide diagnostic insights into visitor activity and the CX on responsive web and mobile apps, enabled by advanced analytics and machine learning, session replay and heat map technology.