Technology and service providers (TSPs) who are able to offer an end-to-end service for 4G/5G private mobile network (PMN) include: CSPs, Network equipment providers (NEPs), Systems integrators (SIs) and Hyperscalers. PMNs are used exclusively by a given enterprise client, providing higher security and reliability than public cellular networks. PMN offerings can include voice, video, messaging and broadband data, as well as specific critical communications features (such as lone worker protection [LWP] or push-to-talk over cellular [PTToC]). PMNs can then support use cases around HD video, data, artificial intelligence (AI)/machine learning (ML) and Internet of Things (IoT), and run on-site or in a cloud, or a multiaccess edge computing data center (MEC DC).
Gartner defines the market of AI in communications service provider (CSP) customer and business operations as commercial off-the-shelf (COTS) products. They are either capabilities embedded in CSP-specific operational technology (OT) applications (such as channels, CRM and other business support system [BSS] applications) or industry-agnostic horizontal applications delivering AI/machine learning (ML)-based customer and business operations in CSPs. CSP customer and business operations refer to marketing, sales, customer acquisition, customer journey, billing and revenue management, revenue assurance, and related risk management. The scope of AI products covers data readiness, life cycle management of algorithms and their application to CSP customer and business operations. AI in CSP customer and business operations helps CSPs utilize AI/ML to generate insights and automate business processes across a wide range of customer and business operations areas. These areas include marketing, sales, configure-price-quote (CPQ), order management, product management, billing and revenue management, customer journey and care, revenue assurance, and fraud/risk management. An example can be intelligent chatbots utilizing natural language processing for customer interaction use cases to automate call center operations. These products assist with insights and automation and help CSPs manage the life cycle of AI/ML algorithms, gradually enabling ModelOps/AIOps.
Gartner defines the application programming interface (API) management market as the market for software that supports API life cycle stages such as planning and design, implementation and testing, deployment and operation, and versioning and retirement. Organizations use APIs to modernize their architectures; efficiently integrate systems, services and partners; and create and monetize data and services. API management software enables organizations to discover, design, build, manage and secure APIs, regardless of their size, region or industry. It helps them improve composability, security and business resilience, and accelerate their growth.
Gartner defines access management (AM) as platforms that include an identity provider (IdP) and establish, manage and enforce runtime access controls to at least cloud, modern standards-based web and classic web applications. AM’s purpose is to enable single sign-on (SSO) access for people (workforce, consumer and other users) and machines into protected applications in a streamlined and consistent way that enhances user experience. AM is also responsible for providing security controls to protect the user session in runtime, enforcing authentication (with multifactor authentication [MFA]) and authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools to enable identity-first security.
Active metadata management is a set of capabilities that enables continuous access and processing of metadata that support ongoing analysis over a different spectrum of maturity, use cases and vendor solutions. Active metadata outputs range from design recommendations based upon execution results and reports of runtime steps through, and indicators of, business outcomes achieved. The resulting recommendations from those analytics are issued as design inputs to humans or system-level instructions that are expected to have a response.
Gartner defines the ad tech market as technology for managing digital advertising across channels and devices, including display, video, streaming TV and audio, in-app (including games), social, and search. It provides functions for campaign planning, media buying, advertising analysis, optimization and automation. Ad tech can be used by buy-side and sell-side agents; this evaluation focuses exclusively on buy-side.
Analytics and business intelligence (ABI) platforms enable organizations to understand their data. For example, what are the dimensions of their data — such as product, customer, time, and geography? People need to be able to ask questions about their data (e.g., which customers are likely to churn? Which salespeople are not reaching their quotas?). They need to be able to create measures from their data, such as on-time delivery, accidents in the workplace and customer or employee satisfaction. Organizations need to blend modeled and non modeled data to create new data pipelines that can be explored to find anomalies and other insights. ABI platforms make all of this possible.
The supply chain A&DI technology market spans capabilities that provide different types of analytics, focusing on predictive and prescriptive ones. Many of these offerings have been enhanced with AI and DSML capabilities to support supply chain decision making. These capabilities could either be part of a broader supply chain application/suite or a separate encompassing A&DI platform. Such a platform consists of existing and emerging technologies, including: Graph technology, Advanced analytics, AI, DSML, Model development & Digital supply chain twin (DSCT).
The application delivery controller is a key component within enterprise and cloud data centers to improve availability, security and performance of applications. Application delivery controllers (ADCs) provide functions that optimize delivery of enterprise applications across the network. ADCs provide functionality for both user-to-application and application-to-application traffic, and effectively bridge the gap between the application and underlying protocols and traditional packet-based networks. This market evolved from the load-balancing systems that were developed in the latter half of the 1990s to ensure the availability and scalability of websites. Enterprises use ADCs today to improve the availability, scalability, end-user performance, data center resource utilization, security of their applications.
The application development life cycle management (ADLM) tool market focuses on the planning and governance activities of the software development life cycle (SDLC). ADLM products focus on the 'development' portion of an application's life. Key elements of an ADLM solution include: software requirements definition and management, software change and configuration management, software project planning, with a current focus on agile planning, work item management, quality management, including defect management. Other key capabilities include: reporting, workflow, integration to version management, support for wikis and collaboration, strong facilities for integration to other ADLM tools.
Reviews for 'Application Development, Integration and Management - Others'
'Application integration platforms enable independently designed applications, apps and services to work together. Key capabilities of application integration technologies include: • Communication functionality that reliably moves messages/data among endpoints. • Support for fundamental web and web services standards. • Functionality that dynamically binds consumer and provider endpoints. • Message validation, mapping, transformation and enrichment. • Orchestration. • Support for multiple interaction patterns, content-based routing and typed messages.
Application platforms provide runtime environments for application logic. They manage the life cycle of an application or application component, and ensure the availability, reliability, scalability, security and monitoring of application logic. They typically support distributed application deployments across multiple nodes. Some also support cloud-style operations (elasticity, multitenancy and self-service).
Gartner defines augmented data quality solutions as set of capabilities for enhanced data quality experience aimed at improving insight discovery, next-best-action suggestions, and automation by leveraging AI/machine learning (ML) features, graph analysis and metadata analytics. Each of these technologies can work independently, or cooperatively, to create network effects that, can then be used to increase data quality automation and effectiveness across a broad range of data quality use- cases. These purpose-built solutions include a range of functions, including profiling and monitoring/detection, data transformation, rule discovery and creation, matching, linking, merging, active metadata support, data quality remediation and role-based usability.
B2B gateway software is integration middleware that supports information exchange between your organization and its ecosystem trading partners, applications and endpoints. BGS consolidates and centralizes data and process integration and interoperability between a company's internal applications and external endpoints, such as business partners, SaaS or ecosystems. The BGS market is a composite market that includes pure-play BGS solutions and BGS that is embedded or combined with other IT solutions (for example, ESB suites that support BGS features as services connected to the ESB suite, integration brokerage services, e-invoicing software and networks, application platform suites, electronic data interchange [EDI] translators, and managed file transfer [MFT] technology).
Gartner defines B2B marketing automation platforms (B2B MAPs) as software that supports demand generation processes at scale. This includes building awareness, generating and nurturing high-quality leads, orchestrating multichannel engagement to guide customer journey progression, and using analytics to measure and optimize performance.
BPM-platform-based case management frameworks are configurable 'apps' meant to help solution architects accelerate the delivery of unique and flexible case management solutions. Case management frameworks (CMFs) are commercial software offerings designed to reduce the time and complexity of creating case-style process solutions by providing architectural patterns and at least some business domain capabilities 'out of the box.' Work is caselike when each work item — each case — requires unique handling, involving complex interactions between content, people, transactions and business or regulatory policies in order to deliver an optimal outcome. Case-style processes do not progress in a serial or completely predictable fashion. Rather, they often require multiple dependent workflows to be orchestrated, making them particularly complex to architect. Very often, caseworkers need the flexibility to decide the best next action for a case, rather than following a prescribed workflow.
Blockchain platforms are emerging platforms and, at this point, nearly indistinguishable in some cases from core blockchain technology. They are being used for generalized distributed value exchange, consisting of an expanding list of cryptographically signed, irrevocable transactional records shared by all participants in a network. Each record contains a time stamp and reference links to previous transactions. It is a decentralized state transition machine that manages the life cycle of digitalized assets and immutably records operations in a distributed ledger. A digitalized asset can be any object with explicit or implicit value (such as digital currencies, securities, precious metals, commodities, materials, identity, credentials, patient health records).
Blockchain as a Service is a cloud-based service that enables users to build, host, and use their own blockchain apps, functions, and smart contracts without the need to maintain and setup the underlying infrastructure themselves. It's similar to how software as a service (SaaS) works, offering blockchain technology on a subscription basis, making it easier and more accessible for businesses, financial institutions and developers to leverage blockchain technology for various features like scaling up the blockchain solutions, secure transactions, and decentralization, without the complexity and cost of developing and managing a blockchain infrastructure on their own.
Gartner defines the cyber-physical systems (CPS) protection platforms market as products and services that use knowledge of industrial protocols, operational/production network packets or traffic metadata, and physical process asset behavior to discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT environments. Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance. Attributes of these platforms include: - Discovery, visibility and categorization of CPS assets - Detailed pedigree of assets - Support for proprietary industrial protocols - Detailed network diagrams and data flows - Vulnerability information - Threat intelligence management - Integration with IT security tools
Gartner defines the CRM Customer Engagement Center market as a cohesive set of software built around core case management tools, used to provide customer service and support by engaging with customers, while intelligently orchestrating the processes, data, systems, and resources of an organization. CEC applications offer workflow management capabilities and may be used as a system of record for customer interactions. The orchestration of customer service and support processes through a CEC application involves both assisted and self-service moments within customer journeys. It is built around case management records and processes. Workflow is an important CEC component, in terms of an organization being able to orchestrate the processing of customer engagements for the best outcomes in an effortless, effective and timely way. In addition to case, workflow, and knowledge management, personalization and enrichment of customer engagements are crucial.
Gartner defines cloud AI developer services (CAIDS) as cloud-hosted or containerized services and products that enable software developers who are not data science experts to use artificial intelligence (AI) models via APIs, software development kits (SDKs) or applications. Core capabilities include automated machine learning (autoML) including automated data preparation, automated feature engineering and automated model building, and model management and operationalization for language, vision and tabular use cases. Optional and important complementary capabilities include AI code models and assistants. Cloud AI developer services help organizations embed intelligence, such as AI and ML insights, into their applications. While that is what cloud AI developer services offer, it is more important to note how they accomplish this. These services democratize and increase the availability of AI and ML to software engineers through the automation and features offered. Traditional activities regarding data acquisition, data quality, feature engineering, algorithm selection and model training are augmented by the technology. Cloud AI developer services open up a world of possibilities for software engineers to build AI and ML production capabilities and features for enterprise-built applications.
Gartner defines the market for cloud database management systems (DBMSs) as the market for software products that store and manipulate data and that are primarily delivered as software as a service (SaaS) in the cloud. Cloud DBMSs may optionally be capable of running on-premises, or in hybrid, multicloud or intercloud configurations. They can be used for transactional work and/or analytical work. They may have features that enable them to participate in a wider data ecosystem. Must-have capabilities for this market include: Availability as SaaS on provider-managed public or private cloud systems; Management of data within cloud storage — that is, cloud DBMSs are not hosted in infrastructure as a service (IaaS), such as in a virtual machine or a container managed by the customer.
Gartner defines cloud enterprise resource planning (ERP) for product-centric enterprises as a market for application technology that supports the automation of operational and financial activities for the manufacturing, distribution, delivery and servicing of goods. Cloud ERP for Product-Centric Enterprises is delivered under a SaaS license model with frequent updates and where application support and infrastructure is the responsibility of the vendor.
Gartner defines a service-centric cloud ERP solution as a suite that is marketed and sold as an integrated product that provides at least three of the following: Financial management system (FMS) functionality, including general ledger, accounts payable (AP), accounts receivable (AR) and financial planning. Order-to-cash (O2C) functionality, ranging from configure, price and quote (CPQ) to cash collection activities. Source-to-pay (S2P) functionality, which must cover at least e-sourcing, contract life cycle management, e-purchasing, AP invoice automation, supplier management, collaboration and payments. Human capital management (HCM) functionality, which must cover at least administrative HR capabilities, such as core HR data management, employee life cycle transactions and position management. Other administrative ERP functionality, to support typical service-centric activities, such as extended planning and analysis (xP&A), project management (for project-centric capabilities), service procurement and real estate lease management. In addition, Gartner defines the market for cloud ERP for service-centric enterprises as serving organizations that typically focus on service (nonproduct) industries, including: Professional services Healthcare Software Media Financial services Telecommunications Nonprofit sectors Real estate
Gartner defines cloud HCM suites for 1,000+ employee enterprises as cloud application suites that deliver functionality for attracting, developing, engaging, retaining and managing workers. The core functional capabilities of cloud HCM suites for enterprises with more than 1,000 employees include: Administrative HR — Employee data, organization structure, employment life cycle transaction, role-based self-service, payroll and benefits administration. It may also include absence management, health and safety administration and other value-added capabilities. Talent management — Recruiting, onboarding, performance management, compensation planning, career and succession planning, and learning and skills development. Integrated HR service management (IHRSM) — Personalized direct access to policy, procedure and program guidance for employees and managers. It may also include integrated case management, knowledge bases, digital document management, virtual assistants and workflow management.
Cloud management tooling enables organizations to manage hybrid and multicloud (that is, on-premises, public cloud and edge) services and resources. This includes providing governance, life cycle management, brokering and automation for managed cloud infrastructure resources across multiple functional areas. The tooling can be procured and operated by central IT organizations, such as I&O, cloud center of excellence (CCOE) and platform engineering/operations, or within specific lines of business. It can be deployed on-premises, in a customer’s public cloud account or purchased as a SaaS.
Cloud security posture management tools help in the identification and remediation of risks across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). These tools continuously assess the security posture across multi-cloud environments by maintaining a current inventory of the cloud assets for proactive analysis and risk assessment to detect any misconfigurations. Once these misconfigurations are identified, security controls are developed and implemented. CSPM solutions also integrate with DevOps tools, streamlining the incident response process and ensuring continuous compliance with regulatory requirements and security frameworks by providing visibility of the cloud environment’s security posture.
Gartner defines cloud WAAP as a category of security solutions designed to protect web applications irrespective of their hosted locations. Typically delivered as a service, cloud WAAP is offered as a series of security modules that provide protection from a broad range of runtime attacks. It offers protection from the Top 10 web application security risks defined by the Open Web Application Security Project (OWASP) and automated threats, provides API security, and can detect and protect against multiple sophisticated Layer 7 attacks targeted at web applications. Cloud WAAP’s core features include web application firewall (WAF), bot management, distributed denial of service (DDoS) mitigation and API protection.
Cloud-native application protection platforms (CNAPPs) are a unified and tightly integrated set of security and compliance capabilities designed to secure and protect cloud-native applications across development and production. CNAPPs consolidate a large number of previously siloed capabilities, including container scanning, cloud security posture management, infrastructure as code scanning, cloud infrastructure entitlement management, runtime cloud workload protection and runtime vulnerability/configuration scanning.
Gartner defines the collaborative work management market as products that provide task-driven workspaces to enable end users to plan, coordinate and automate their work. These solutions provide user-friendly capabilities for work planning, in-context collaboration, content creation, workflow and automation, reporting, analytics and dashboards, as well as use-case accelerators on a platform that handles data management and administrative operations. Products in this market are defined by their purpose (work planning and execution), their target users and their broad functionality.
Gartner defines communications platform as a service (CPaaS) as a cloud-based platform used by developers, the IT team and other nontechnical business roles to build an array of communications-related capabilities using APIs, SDKs, documentation and no-code/low-code visual builders. The CPaaS tools facilitate access to multiple communications channels spanning voice, SMS, email, messaging apps, video and conversational capabilities, along with security.
Gartner defines container management as offerings that enable the deployment and operation of containerized workloads. Delivery methods include cloud, managed service and software. Container management may be required for containers running on-premises, in the public cloud, at the edge or a combination thereof. Associated technologies include service mesh, orchestration and scheduling, service discovery and registration, image registry, routing and networking, service catalog and management user interface, and API.
Content collaboration tools provide an easy way for employees to use and share content both inside and outside the organizations. Since these tools can be used to collaborate with customers, partners and suppliers, they often provide rich security and privacy controls. Today, much of this functionality also can be found in other tools such as cloud office platforms, workstream collaboration platforms, content services platforms and content services applications. Functional differentiators in dedicated CCTs are difficult to identify.
Content services platforms (CSPs) are foundational for managing and utilizing content within an organization. CSP technologies enable employees to retrieve and work with content in a modern and seamless way across devices and organizational boundaries. Core CSP functionalities include content capture, creation, consolidation, processing and retention to support personal, team, departmental and enterprise business operations.
The corporate telephony market is evolving from a focus on innovation in proprietary hardware to use of commodity hardware and standards-based software. While most telephony solutions are Internet Protocol (IP)-enabled or IP-PBX solutions, the associated endpoints are a mix of time division multiplexing (TDM) and IP. Corporate telephony platforms focus on high-availability, scalable solutions, which support Session Initiation Protocol (SIP), desktop and soft phone functionality, and the ability to integrate with enterprise IT applications while delivering toll-grade voice quality.
The market for distributed denial of service (DDoS) mitigation includes vendors that detect and mitigate DDoS attacks and offer it as a dedicated offering. It includes specialty vendors, whose primary focus is DDoS mitigation, as well as providers that offer DDoS mitigation as a feature of other services. These include dedicated appliance-based vendors, communication service providers (CSPs), content delivery network (CDN) vendors, hosting providers and cloud infrastructure and platform services (CIPS) vendors.
Reviews for 'Data Center - Others'
Gartner defines data integration as the discipline comprising the architectural patterns, methodologies and tools that allow organizations to achieve consistent access and delivery of data across a wide spectrum of data sources and data types to meet the data consumption requirements of business applications and end users. Data integration tools enable organizations to access, integrate, transform, process and move data that spans various endpoints and across any infrastructure to support their data integration use cases. The market for data integration tools includes vendors that offer a stand-alone software product (or products) to enable the construction and implementation of data access and data delivery infrastructure for a variety of data integration use cases.
The market for DLP technology includes offerings that provide visibility into data usage and movement across an organization. It also involves dynamic enforcement of security policies based on content and context for data in use, data in motion and data at rest. DLP technology seeks to address data-related threats, including the risks of inadvertent or accidental data loss and the exposure of sensitive data, using monitoring, alerting, warning, blocking, quarantining and other remediation features.
Data masking is based on the premise that sensitive data can be transformed into less sensitive but still useful data. This is necessary to satisfy application testing use cases that require representative and coherent data, as well as analytics that involve the use of aggregate data for scoring, model building and statistical reporting. The market for data protection, DM included, continues to evolve with technologies designed to redact, anonymize, pseudonymize, or in some way deidentify data in order to protect it against confidentiality or privacy risk.
Data preparation is an iterative and agile process for finding, combining, cleaning, transforming and sharing curated datasets for various data and analytics use cases including analytics/business intelligence (BI), data science/machine learning (ML) and self-service data integration. Data preparation tools promise faster time to delivery of integrated and curated data by allowing business users including analysts, citizen integrators, data engineers and citizen data scientists to integrate internal and external datasets for their use cases. Furthermore, they allow users to identify anomalies and patterns and improve and review the data quality of their findings in a repeatable fashion. Some tools embed ML algorithms that augment and, in some cases, completely automate certain repeatable and mundane data preparation tasks. Reduced time to delivery of data and insight is at the heart of this market.
Gartner defines a data science and machine learning platform as an integrated set of code-based libraries and low-code tooling that support the independent use by, and collaboration between, data scientists and their business and IT counterparts through all stages of the data science life cycle. These stages include business understanding, data access and preparation, experimentation and model creation, and sharing of insights. They also support machine learning engineering workflows including creation of data, feature, deployment and testing pipelines. The platforms are provided via desktop client or browser with supporting compute instances and/or as a fully managed cloud offering.
Reviews for 'Data and Analytics - Others'
A D&A governance platform is a set of integrated business capabilities that helps business leaders and users evaluate and implement a diverse set of governance policies and monitor and enforce those policies across their organizations’ business systems. These platforms are unique from data management and discrete governance tools in that data management and such tools focus on policy execution, whereas these platforms are used primarily by business roles — not only or even specifically IT roles.
Decentralized identity (DCI) leverages technologies such as blockchain or other distributed ledger technologies (DLTs) to allow an entity to create and control its own digital identity. Thus, it provides an alternative to centralized IAM architectures by establishing trust in identities and resilience within the overall system, with little reliance on centralized arbiters or identity stores. DCI solution providers provide services such as manage verifiable credentials for individuals and validate a Verified ID credential with their approval through their secure and encrypted digital wallet. Decentralized identity is important for confirming user identities and securely storing them. It offers numerous advantages separate of the greater identity autonomy it delivers to customers.
Gartner defines desktop as a service (DaaS) as the provision of virtual desktops by a public cloud or service provider. DaaS provides desktop or application end-user experiences from virtual machines accessed using a remote display protocol. DaaS vendors incorporate a fully managed control plane service into their offerings, which facilitates user connections and provides a management interface. DaaS can be delivered preconfigured as a service or can be delivered as a DaaS platform where clients are responsible for self-assembly, configuration and management. It is charged on subscription- or usage-based payment structures.
Gartner defines DevOps platforms as those that provide fully integrated capabilities to enable continuous delivery of software using Agile and DevOps practices. The capabilities span the development and delivery life cycle built around the continuous integration/continuous delivery (CI/CD) pipeline and include aspects such as versioning, testing, security, documentation and compliance. DevOps platforms support team collaboration, consistency, tool simplification and measurement of software delivery metrics.
Gartner defines a digital commerce platform as the core technology that enables customers to purchase goods and services through an interactive and usually self-service experience. The platform provides necessary information for customers to make buying decisions and uses rules and data to present fully priced orders for payment.
A digital twin is a virtual representation of a real entity that can be a physical object, a process, an organization or a person. It relies on sensors or other monitoring technologies to collect the state of an object to build a digital representation. It adds value by testing changes to the twin before implementing them on their real-world counterpart. Finance can use digital twins to represent business processes and assess the impact of changes before implementing them. Financial institutions, analysts, and decision-makers can leverage AI and ML to enhance predictive capabilities, allowing for the accurate forecasting of outcomes. This technology enables the simulation of diverse financial scenarios, providing deep insights while ensuring that the actual financial system remains unaffected.
The DRaaS market provides for the recovery of enterprise applications at another location in the event of a disaster. The provider can deliver the service as a fully managed, assisted recovery or self-service offering. The service should be marketed and sold as a stand-alone, industrialized offering and minimally include: - On-demand recovery cloud for planned tests, exercises and declarations - Server image and production data replication to the cloud - Automated failover and failback between production and the target cloud environment - Recovery time service-level agreements (SLAs)
The e-discovery solutions market comprises vendors offering technology solutions that facilitate the electronic discovery process. E-discovery solutions specialize in one or more areas to identify, collect, preserve, process, review, analyze and produce electronically stored information (ESI). ESI fulfills legal and compliance requirements for discovery that result from a variety of investigative scenarios. The scope of ESI often includes data sources, such as digital communications, file systems, cloud office platforms, endpoints, databases and applications. E-discovery solutions market includes software vendor offerings for a customer’s own deployment on-premises and in cloud infrastructure, as well as hosted offerings provided by software vendors and services providers.
Email security refers collectively to the prediction, prevention, detection and response framework used to provide attack protection and access protection for email. Email security spans gateways, email systems, user behavior, content security, and various supporting processes, services and adjacent security architecture. Effective email security requires not only the selection of the correct products, with the required capabilities and configurations, but also having the right operational procedures in place.
An embedded operating system (OS) is a type of OS that is used in embedded computing devices. The term 'embedded' refers to devices that are installed (that is, embedded) as built-in components of a wider system, in which they serve a special, functional purpose. Embedded OSs differ from other types of OSs by their optimized design. Form factors, price points and other parameters of embedded devices set constraints on the OS, for example, in terms of functionality, user interface, memory space and driver support. Consequently, the architectures of embedded OSs tend to be extensively optimized for single-purpose deployment, stripped out of anything that is considered unnecessary for their use. This does not mean that embedded OSs cannot be applied outside of embedded devices. For instance, it is common to see embedded real-time operating systems (RTOSs) being used to handle the baseband functionality in smartphones.
The ECA market consists of vendors offering a discrete application, well-defined module, or cohesive set of capabilities that enables people in “communicator” roles to plan, create, coordinate, and distribute internal communications across the workforce or to specific audiences. ECAs include analytics that measure interactions and effectiveness of communications across content, channels, devices, campaigns and feedback loops to assess business and employee value.
The Endpoint Detection and Response Solutions (EDR) market is defined as solutions that record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems. EDR solutions must provide the following four primary capabilities: • Detect security incidents • Contain the incident at the endpoint • Investigate security incidents • Provide remediation guidance
Gartner defines an endpoint protection platform (EPP) as security software designed to protect managed end-user endpoints — including desktop PCs, laptop PCs, and mobile devices — against known and unknown malicious attacks. Additionally, EPPs provide capabilities for security teams to investigate and remediate incidents that evade prevention controls. EPP products are delivered as software agents deployed to endpoints and connected to centralized security analytics and management interfaces.
Gartner defines enterprise agile planning (EAP) tools as products that enable organizations to scale their agile practices to support a holistic enterprise view. EAP tools are an evolution of project-/team-centric tools to support a business-outcome-driven approach to managing agile product delivery at scale. This evolution is highlighted by the fact that several of these tools also offer project portfolio management (PPM) and strategic portfolio management (SPM) capabilities. EAP tools in this market combine data from multiple sources to enable: - Monthly, weekly and even daily incremental value delivery based on business outcomes - Support for enterprise agile frameworks like Scaled Agile Framework (SAFe) - Product roadmapping - Management of strategy, investments and objectives - Increased visibility into the flow of work - Management of work backlogs - Collaboration capabilities for individuals and teams - Management of cross-team dependencies - Release planning and forecasting - Visibility into the financial aspects of the work being done
Enterprise asset management (EAM) is a business application used by manufacturing and other asset-intensive industries to optimize maintenance and repair of industrial plants and equipment. It is focused on solutions for organizations in asset-intensive industries such as heavy discrete and process manufacturing industries, rail and energy/utilities Such organizations use EAM software products to address physical asset support requirements. An alternative term used for EAM is “computerized maintenance management system” (CMMS), generally considered to be small-scale, single-site applications with less functionality around parts management and resource scheduling.
Gartner defines enterprise backup and recovery software solutions as vendor-developed solutions that capture a point-in-time copy (backup) of enterprise workloads in on-premises, hybrid, multicloud and SaaS environments. These solutions write the data to one or more secondary storage targets for the primary purpose of recovering this data in case of loss. They can be offered as software-only, integrated hardware or virtualized appliance, or as a SaaS-based, backup as a service (BaaS).
EBPA is a comprehensive approach toward business and process modeling aimed at transforming and improving business performance with an emphasis on cross-viewpoint (strategy, analysis, architecture, automation), cross-functional analysis to support strategic and operational decisions.
Gartner defines the enterprise conversational AI platform market as the market for software platforms used to build, orchestrate and maintain multiple use cases and modalities of conversational automation. The enterprise conversational AI platform consists of: A capability layer providing runtime capabilities that include: Natural language understanding (NLU), Dialogue management, Channel integration, Back-end integration, Access control for platform users, Life cycle management; A tooling layer geared toward business users that includes: A no-code environment for building and maintaining, applications, Analytic tools for understanding dialogue flows, NLU intent and entity tuning tools, A/B flow testing tools.
Enterprise information archiving (EIA) solutions are designed for archiving data sources to a centralized platform to satisfy information governance requirements, including regulatory and/or corporate governance and privacy; improve data accessibility; surface new data insights; and gain operational efficiencies. There are several core capabilities of this market. They include archiving digital communication content, such as email, workstream collaboration, instant messaging (IM) and SMS; classifying data and enabling retention management of archive content; creating a searchable index of content; and providing basic tools for e-discovery and supervision.
Gartner defines low-code application platforms (LCAPs) as application platforms that are used to rapidly develop and run custom applications by abstracting and minimizing the use of programming languages. Enterprise LCAPs are a subset of this market that target a wider range of developer personas — especially enterprise developers — and provide features essential for application delivery and maintenance in midsize and large organizations. These features include support for high performance, availability and scalability of applications, disaster recovery, security, API access to (and from) enterprise and third-party cloud services, usage monitoring, service-level agreements, and availability of technical support and training. LCAPs are the foundation for a wide range of application types, application components and process automation.
Reviews for 'Enterprise Networking and Communications - Others'
Enterprise social networking applications facilitate, capture and organize open conversations and information sharing between individual workers and groups within an organization. In addition to capabilities that support conversations and information sharing, they can keep track of the network of relationships between participants (via social graphs), in order to deliver a personalized stream of updates about events or conversations to individuals (via news feeds and activity streams). These applications help people find out about each other, have discussions, share information and generally interact. Interaction occurs either at a one-to-one level, or in groups, teams, communities and networks, and in the context of structured or unstructured business activities.
Enterprise video content management (EVCM) comprises products intended to manage and facilitate the delivery of one-to-any, on-demand or live video across internet protocols. It may also include associated network services - content delivery networks (CDN) or enterprise content delivery networks (ECDN) - intended to facilitate the delivery of video. EVCM serves workers and customers who need to watch - and workers who need to share - videos.
Event brokering is a role played by middleware in facilitating event-driven application architecture. The minimum capability required to play the role of event broker is pub-sub messaging. All middleware products, including MOMs and ESBs, supporting pub-sub can play the role of an event broker and can be referred to as basic 'event brokers' when so deployed. Middleware products that additionally offer special support for event-centric use cases (for example, a persistent event ledger for analysis and event sourcing, or programmable extensibility for custom filtering and analysis) are 'advanced' event brokers.
The market for ESP platforms consists of software subsystems that perform real-time computation on streaming event data. They execute calculations on unbounded input data continuously as it arrives, enabling immediate responses to current situations and/or storing results in files, object stores or other databases for later use. Examples of input data include clickstreams; copies of business transactions or database updates; social media posts; market data feeds; images; and sensor data from physical assets, such as mobile devices, machines and vehicles.
Gartner defines event technology platforms as tools that enable B2B marketers to execute virtual and/or in-person events for external audiences. These platforms provide native capabilities to engage and communicate with prospective attendees, registrants and sponsors, manage logistics, deliver content and enable attendees to engage with other participants. Out-of-the-box integrations with sales force automation and marketing automation platforms are provided to track engagement. Features and capabilities are provided in a self-service model, with some offering managed service support to run the technology when preferred. The event technology market does not include webinars or meeting-specific solutions.
Extended detection and response (XDR) delivers security incident detection and automated response capabilities for security infrastructure. XDR integrates threat intelligence and telemetry data from multiple sources with security analytics to provide contextualization and correlation of security alerts. XDR must include native sensors, and can be delivered on-premises or as a SaaS offering. Typically, it is deployed by organizations with smaller security teams.
External Attack Surface Management (EASM) refers to the processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers, exposed enterprise data such as credentials and third-party partner software code vulnerabilities that could be exploited by adversaries. EASM provides valuable risk prioritization and context and actionable information through regular or continuously monitoring and discovery for external-facing assets and systems. External attack surface management is a top priority for security teams and security risk managers.
Gartner defines FSM as software suites that support FSPs whose technicians typically travel to customer locations to provide installation, repair, inspection and maintenance services for equipment and systems (consumer, commercial or industrial). FSPs may also manage, maintain and monitor these assets under a predefined service or maintenance contract.
Full-stack hyperconverged infrastructure (HCI) software provides a complete software solution that includes virtualized compute, storage and networking from a single instantiation running on server hardware. This market consists of those vendors that develop and sell hyperconverged infrastructure software comprising the vendor’s own server virtualization, software-defined storage and network management tools.
Generative AI (GenAI) apps use generative AI capabilities for user experience and task augmentation to accelerate and assist the completion of a user’s desired outcomes. Generative AI refers to technologies that can generate new derived versions of content, strategies, designs and methods by learning from large repositories of original source content. When embedded in the experience, generative AI offers richer contextualization for singular tasks such as generating and editing text, code, images and other multimodal output. As an emerging capability, process-aware generative AI agents can be prompted by users to accelerate workflows that tie multiple tasks together. Apart from helping save time and money, generative AI apps help improve branding of businesses by creating more engaging and effective content while also creating more engaging and immersive experiences for customers. Please note that this market is based on Beta research and is continuously evolving. We will be making changes as and when there are new updates.
Generative AI (GenAI) engineering refers to the field of engineering that focuses on the development, implementation and optimization of generative AI models. Generative AI refers to technologies that can generate new derived versions of content, strategies, designs and methods by learning from large repositories of original source content. By developing GenAI models, engineers can create new and innovative ways to generate content. The vendors in this segment are made up by incumbent and startup vendors covering full-model life cycle management, specifically adjusted to and catering to development, refinement and deployment of generative models (e.g., LLMs) and other GenAI artifacts in production applications. Please note that this market is based on Beta research and is continuously evolving. We will be making changes as and when there are new updates.
Generative AI (GenAI) Infrastructure providers are infrastructure vendors (such as cloud platforms and hardware manufacturers) that offer underlying technology, tools and hardware that other companies and developers use to build and deploy specific generative AI applications in production. Generative AI refers to technologies that can generate new derived versions of content, strategies, designs and methods by learning from large repositories of original source content. These providers offer scalable, reliable and cost-effective solutions for generative AI projects, which can be complex and expensive to train and deploy. Generative AI infrastructure providers focus on research and developing the foundational AI techniques, while application developers focus on building products using those foundational technologies. Please note that this market is based on Beta research and is continuously evolving. We will be making changes as and when there are new updates.
Generative AI (GenAI) model providers focus on developing and providing generative AI technologies and make them available to other developers, businesses and general public through APIs or commercial licenses. Generative AI refers to technologies that can generate new derived versions of content, strategies, designs and methods by learning from large repositories of original source content. This layer of vendors offers access to commercial or open-source foundation models such as LLMs and other types of generative algorithms (such as GANs, genetic/evolutionary algorithms or simulations). These models can be provided for developers to embed into their applications or be used as base models for fine-tuning customized models for their software offerings or internal enterprise use cases. This helps businesses gain the benefits of advanced generative AI technologies while avoiding the high costs, expertise requirements and time needed to develop these technologies in-house. Please note that this market is based on Beta research and is continuously evolving. We will be making changes as and when there are new updates.
Gartner defines “content delivery networks” as highly distributed edge-based cloud delivery platforms that provide the following functionality: content acceleration, API caching, image optimization, streaming video delivery, web application and perimeter security, and edge compute and storage. CDN providers deploy tens to hundreds of caching, storage and compute nodes in owned and third-party data center locations via public and private Internet Protocol networks.
The global industrial IoT platform delivers multiple integrations to industrial OT assets and other asset-intensive enterprises’ industrial data sources to aggregate, curate and deliver contextualized insights that enable intelligent applications and dashboards through an edge-to-cloud architecture. The global industrial Internet of Things (IIoT) platform market exists because of the core capabilities of integrated middleware software that support a multivendor marketplace of intelligent applications to facilitate and automate asset management decision making. IIoT platforms also provide operational visibility and control for plants, infrastructure and equipment. Common use cases are augmentation of industrial automation, remote operations, sustainability and energy management, global scalability, IT/operational technology (OT) convergence, and product servitization of industrial products.
Hadoop distributions are used to provide scalable, distributed computing against on-premises and cloud-based file store data. Distributions are composed of commercially packaged and supported editions of open-source Apache Hadoop-related projects. Distributions provide access to applications, query/reporting tools, machine learning and data management infrastructure components. First introduced as collections of components for any use case, distributions are now often delivered as part of a specific solution for data lakes, machine learning or other uses. They subsequently grow into additional, expanded roles, competing with both older technologies like database management systems (DBMSs) and newer ones like Apache Spark.
The hybrid cloud storage market comprises diverse deployment patterns with underlying technologies that address a wide range of data types. Products in this market must facilitate seamless data services across different environments, including disparate data centers, co-locations, edge locations and public cloud infrastructure. Hybrid cloud data solutions are offered through various means such as distributed hybrid infrastructure, hybrid cloud storage platforms, data transfer appliances, hyperconverged solutions, storage arrays, software-defined storage (SDS) products, and comprehensive data management software.
Reviews for 'IT Infrastructure and Operations Management - Others'
Gartner defines IT service management (ITSM) platforms as software that offers workflow management that enables organizations to design, automate, plan, manage, report on and deliver integrated IT services and related digital experiences. Supported practices include request, incident, problem, change, knowledge and configuration management, and case management, as well as interfaces for non-IT business needs. ITSM platforms are typically acquired as SaaS; however, they are also sold as on-premises deployments. I&O leaders select these solutions to be consumed by service desks and service operations, and are identifying opportunities for business workflows in other IT-adjacent departments.
Gartner defines IGA as the enterprise solution to manage digital identity life cycle and govern user access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data that is distributed throughout the IT landscape to enhance control over human and machine access. GA’s must-have capabilities: - Identity life cycle management - Access request process - Basic analytics and reporting
Information-centric security products focus on content, more than device, and apply encryption and authentication to block file access and movement from unauthorized people or circumstances. Endpoint systems are porous, mistakenly sharing data is easy, and users can be careless. Information-centric security is the last line of defense for data when firewalls, anti-malware tools, best practices and other traditional defenses fail. The scope of this market is the protection of stored information, commonly referred to as data at rest. The protection of data at rest in some ways takes precedence, because the interconnectedness of today’s systems often undermines network protections. In other words, high-value information should be protected “at rest” to prevent the risk of a breach caused by an unexpected data in motion event.
Infrastructure monitoring tools capture the health and resource utilization of IT infrastructure components, no matter where they reside (e.g., in a data center, at the edge, infrastructure as a service [IaaS] or platform as a service [PaaS] in the cloud). This enables I&O leaders to monitor and collate the availability and resource utilization data of physical and virtual entities — including servers, containers, network devices, database instances, hypervisors and storage. These tools collect data in real time and perform historical data analysis or trending of the elements they monitor.
Gartner defines insider risk management as a methodology that includes the tools and capabilities to measure, detect and contain undesirable behavior of trusted accounts in the organization. It includes solutions that monitor the behavior of employees, service partners and key suppliers working inside the organization. These tools then evaluate whether behavior falls within the expectations of the role and corporate risk tolerance. For CISOs and cybersecurity leaders, insider risk management refers to the use of technical solutions to solve a fundamentally human problem. Managing insider risks requires collaboration among many cross-functional partners. Components of an insider risk management methodology are policies, guidelines and investigative work that fall outside the bounds of a typical cybersecurity organization. For our purposes, the insider risk management market consists of tools and solutions that monitor the behavior of employees, service partners and key suppliers working inside the organization. It evaluates whether behavior falls within the expectations of the role and corporate risk tolerance.
Gartner defines Insight Engines as follows: Insight engines apply relevancy methods to discover, analyze, describe and organize content and data. They enable the interactive or proactive delivery or synthesis of information to people, and data to machines, in the context of their respective business moments. Insight engines should be viewed as platforms on which applications are provided, developed or augmented by applying the capabilities listed above to specific employee and customer experience use cases. Such applications are provided out of the box by vendors (e.g., intranet or site search), developed through technical partnerships (e.g., search within third-party applications), developed with customers in-house (e.g., expert finder), or developed through integration with third-party applications (e.g., extracting data from documents to support RPA).
Integrated Development Environment software provides an interface to write code facilitating application development. IDEs provide programmers with tools to design, build, test, and debug software programs in a graphical user interface (GUI). The user can write and edit source code in the code editor. The compiler in the IDEs translates the source code into an executable language for the computer. The debugger helps examine the code to detect and solve any issues or bugs. Some of the IDEs have advanced features like refactoring, code search, data visualization, continuous integration and continuous deployment (CI/CD) tools.
Integrated systems combine server, shared storage and network devices, along with management software and support in a preintegrated stack. The integrated system market has four segments: integrated infrastructure system, integrated reference architecture, integrated stack system and hyperconverged infrastructure (HCI) segment. The overall HCI segment is further subdivided into Hyperconverged Integrated Systems (HCIS), which provides both software and hardware in an appliance model and the software only segment in which vendors provide the Hyperconverged software. This is then integrated with HW by a reseller or the end customer.
Gartner defines integration platform as a service (iPaaS) as a vendor-managed cloud service that enables end users to implement integrations between a variety of applications, services and data sources, both internal and external to their organization.
Gartner defines an intranet packaged solution (IPS) as a software product that organizations use to create and deploy an internal website or network of websites, portals, hubs, mobile apps and other digital experiences supporting business-to-employee needs. An IPS is delivered as an integrated assembly of capabilities geared specifically for intranet use cases, including employee communications and engagement, employee service and self-service, application access and knowledge services. “Packaged” signifies a holistic and fit-for-purpose approach. In contrast, a custom-built or developed approach would leverage a platform or array of products not specifically designed to support intranet use cases.
Gartner defines managed hybrid cloud hosting (MHCH) as a standardized, productized offering that combines a cloud-enabled system infrastructure platform — consisting of a pool of compute, network and storage hardware — with cloud infrastructure framework software to facilitate self-service and rapid provisioning. In addition to offering this service from cloud infrastructure located in its own data center, the provider must offer a choice of using a hyperscale public infrastructure as a service (IaaS) provider or an Asian country-specific, large-scale IaaS provider. The infrastructure platform should be located both in a service provider's data center for the cloud-enabled system infrastructure (CESI) platform and in an Asia country for the public IaaS platform. It also requires the use of a standardized deployment across all service provider customers and leverages a single codebase.
MDM is a technology-enabled business discipline in which business and IT work together to ensure the uniformity, accuracy, stewardship, governance, semantic consistency and accountability of an enterprise’s official shared master data assets. Master data has the lowest number of consistent and uniform sets of identifiers and attributes that uniquely describe the core entities of the enterprise and are used across multiple business processes.
Master data management (MDM) of customer data solutions are software products that: Support the global identification, linking and synchronization of customer information across heterogeneous data sources through semantic reconciliation of master data. Create and manage a central, persisted system of record or index of record for customer master data. Enable the delivery of a single, trusted customer view to all stakeholders, to support various business initiatives. Support ongoing master data stewardship and governance requirements through workflow-based monitoring and corrective-action techniques. Are agnostic to the business application landscape in which they reside; that is, they do not assume or depend on the presence of any particular business application(s) to function.
Meeting solutions are real-time communication services with their associated devices that support live interactions between participants for internal and external collaboration, presentations, learning, training sessions and webinars. Meeting solutions power diverse use cases, such as one-on-one meetings, remote sales engagements, board meetings, telehealth sessions, remote banking and consulting services, to name just a few. Meeting solutions enable rich information sharing and interaction by combining audio and video, in-meeting chat, content and screen sharing, and visual collaboration and whiteboarding.
Gartner defines microsegmentation as the ability to insert a security policy into the access layer between any two workloads in the same extended data center. Microsegmentation technologies enable the definition of fine-grained network zones, down to individual assets and applications. Core capabilities include: - Flow mapping, which is the ability to gather and show North/South and East/West traffic flows and use them in the policy definition (it can present this data in a visual manner) - Workload isolation, which is isolation from other workloads based on security policy - Policy enforcement, including the definition of rules based on different factors - The ability to deploy in the virtualized and infrastructure as a service environments Some of the most frequent optional capabilities of microsegmentation technologies include: - Automation of the deployment as part of a continuous integration/continuous deployment (CI/CD) pipeline - Integration with cloud infrastructure to ease deployment, enforce rules or automate policy updates when new assets are deployed - Asset discovery: adjacent to the flow mapping, microsegmentation tools can show more advanced context for the assets - Policy recommendation engine: complementary to the asset discovery, microsegmentation technology can suggest policy rules to authorize discovered flows - Threat detection: based on threat intelligence, layer seven protocol inspection and anomaly detection - Interoperability through direct integration with third-party products, such as a firewall, and hardware, such as switches and routers - Internet of Things (IoT)/operational technology (OT) coverage — the solution supports microsegmentation for IoT/OT infrastructure - Kubernetes/Container coverage — the solution supports microsegmentation for containers/K8s
Implementation and support services for Office 365 (including Microsoft SharePoint and Microsoft Teams for Office 365 Enterprise E3 and E5) include readiness assessment, user directory preparation, network remediation, data migration, system integration, risk mitigation and organizational change management activities. This enables a move from existing on-premises Microsoft applications to cloud-based solutions.
Gartner defines a mobile application management (MAM) tool as an on-premises or SaaS tool specifically designed for the license management, distribution, securing and life cycle management of apps for mobile device platforms. Thus, MAM tools provide integration with public app store payment and licensing mechanisms (such as Apple's Volume Purchase Program [VPP]), an enterprise app store, and the ability to set policies related to security, usage and ongoing management for apps or groups of apps. At minimum, a MAM product supports native and HTML 5 apps. Many also support a variety of popular hybrid app architectures, which may be highly desirable based on a particular client's needs.
Gartner defines mobile data protection (MDP) products and services as software security methods that enforce confidentiality policies by encrypting data, and then defending access to that encrypted data on the mass storage systems of end-user workstations. These storage systems include the primary boot drive of a workstation, additional system drives and removable devices used for portability. Storage technologies affected by MDP include magnetic hard-disk drives (HDDs), solid-state drives (SSDs), self-encrypting drives (SEDs), flash drives and optical media. Several methods allow MDP products to delegate all or part of the encryption process to be accomplished by hardware elements, including the CPU and drive controller, and to native capabilities in the OS. Some vendors also have protection capabilities for network storage, and a few also support cloud-based storage environments as an extension to the desktop.
Mobile threat defense (MTD) products protect organizations from threats on iOS and Android devices. MTD products protect at the device, network and application levels and focus on countering malicious actions.
Gartner defines multichannel marketing hubs (MMHs) as software applications that orchestrate personalized communications to individuals in common marketing channels. MMHs optimize the timing, format and content of interactions through the analysis of customer data, audience segments and offers. MMHs are foundational for multichannel marketing, customer journey orchestration and next best action programs.
An MXDP is an opinionated, integrated set of front-end development tools and “backend for frontend” (BFF) capabilities. It enables a distributed, scalable development approach (in terms of both teams and architecture) to build fit-for-purpose apps across digital touchpoints and interaction modalities. At minimum, an MXDP must support cross-platform development and building of both custom iOS and Android app binaries, responsive web apps, and at least one of the following: PWAs, chatbots, voice apps, wearables and Internet of Things (IoT) apps, and augmented-reality (AR) and mixed-reality (MR) apps.
Gartner defines the network firewall market as the market for firewalls that use bidirectional stateful traffic inspection (for both egress and ingress) to secure networks. Network firewalls are enforced through hardware, virtual appliances and cloud-native controls. Network firewalls are used to secure networks. These can be on-premises, hybrid (on-premises and cloud), public cloud or private cloud networks. Network firewall products support different deployment use cases, such as for perimeters, midsize enterprises, data centers, clouds, cloud-native and distributed offices.
Network management tools are software applications used to monitor, maintain, and administer computer networks. They help in ensuring the network's efficient operation, detecting and resolving problems, and optimizing performance. Key functions include monitoring network traffic, managing network devices, ensuring security, and troubleshooting issues. Network Administrators, IT Managers, and Security Professionals utilize these tools to monitor and manage network hardware effectively. They track the performance of network devices such as routers and switches, ensuring these devices operate optimally. Additionally, they maintain and update the configuration of these network components to ensure robust security and efficient network functionality.
OKR Software is a tool which helps individuals, teams and broader organization set, track and measure their goals and objectives. It facilitates the implementation of the OKR framework, which is a popular goal-setting methodology used by businesses to align the objectives of teams and individuals with the overall organizational strategy. It provides insights into progress and areas for improvement through reporting and analytical dashboards and is also easily integratable with other productivity tools and systems. By using it, organizations can improve their goal setting process, increase transparency, and foster a culture of accountability and continuous improvement.
Gartner defines observability platforms as products used to understand the health, performance and behavior of applications, services and infrastructure. They ingest telemetry (operational data) from a variety of sources, including but not limited to logs, metrics, events and traces. Observability platforms enable analysis of the telemetry, either via human operator or machine intelligence, to determine changes in system behavior that impact end user experience such as outages or performance degradation. This allows for early, even preemptive, problem remediation. Observability solutions are used by IT operations, site reliability engineers, cloud and platform teams, application developers, and product owners.
Reviews for 'Office Productivity Solutions - Others'
Gartner defines operational technology (OT) as “hardware and software that detects or causes a change, through direct monitoring and/or control of industrial equipment, assets, processes and events”. OT security includes practices and technologies used to protect them, but these practices and technologies are now evolving into distinct categories to address the growing threats, security practices and vendor dynamics.
Predictive analytics software uses advanced analytics capabilities to analyze current and historical data to make predictions about future events. This software connects data from different data sources and employs techniques like data mining and statistical analysis to forecast future trends, detect patterns, identify potential risks and opportunities, and plan for the best possible outcome. As a result, organizations can make better business decisions with machine-generated analytics, visualization, and reporting on predictive insights. These can be used in a wide range of industries, including healthcare, finance, marketing, and manufacturing.
Gartner defines process mining platforms as platforms that are designed to discover, monitor and improve processes by extracting knowledge from events captured in information systems to continuously deliver visibility and insights. Process mining includes automated process discovery (extracting process models from an event log), conformance checking (monitoring deviations by comparing model and log), social network/organizational mining, automated construction of simulation models, model extension, model repair, case prediction and history-based recommendations. Process mining platforms extend process mining capabilities by advanced process analytics, process improvement detection and process improvement recommendations, partly driven by AI and generative AI (GenAI).
PPM software providers covered under this market definition aim to support the selection, planning and execution of a variety of different work packages or containers, including, but not limited to, traditional projects. They often fold in collaboration and communication capabilities and allow work teams and project offices to report, monitor and identify course correction in resource-intensive project and work environments. Providers included in this market offer these capabilities directly through their own products, but frequently recognize that specific integration points may also be needed to connect niche tools or data sources. The PPM capabilities identified as essential or critical include: • Project demand management • Project planning and management • Time management • Resource management • Resource capacity planning • Project portfolio management • Project collaboration • Program management • Reporting services • Security and user management • Integration • Usability
Public cloud storage is infrastructure as a service (IaaS) that provides block, file, object and hybrid cloud storage services delivered through various protocols. The services are stand-alone, but often used in conjunction with compute and other IaaS products. The services are priced based on capacity, data transfer and/or number of requests. The services provide on-demand storage capacity and self-provisioning capabilities. Stored data exists in a multitenant environment, and users access that data through the block, network and REST protocols provided by the services.
Rapid mobile app development (RMAD) tools are a class of coding-optional tools that enable nonprogrammers to build mobile apps to support, at a minimum, iOS and Android devices. These tools offer high productivity for developers and nondevelopers alike through a variety of approaches that both automate and abstract app development efforts, including drag-and-drop editors, code generation and orchestration, model-driven development, virtualization, business process mapping, component assembly, app configuration and forms construction.
DOM systems use configurable rule-based procedures to orchestrate the fulfillment of customer orders placed through a retailer’s online channel, although many nonretailers are now also exploring or using DOM capabilities within their own supply chain. The purpose of a DOM system is to allow companies to optimize their order fulfillment performance while balancing two primary constraints: - The customer’s expected lead time for receiving their order on-time, in-full - The company’s desire to meet these customer expectations at the optimum fulfillment cost
Gartner defines retail media networks as packaged retail website search, display, app, in-store assets and other digital advertising opportunities (e.g., ad impressions) that are sold to brands and advertisers. Retailers leverage media networks to execute their unified retail commerce strategy and to develop new lines of revenue, while advertisers aim to increase their exposure to and influence the behavior of retail shoppers at or near the final point of purchase. RMNs offer retailers supplemental revenue from their owned digital and physical assets and datasets. RMNs let companies buy branding and conversion-oriented ads at or near the final point of purchase — which stands out as its unique selling proposition. Retailers build RMNs to aggregate audiences of shoppers across commerce websites, apps, and digital assets in physical stores into media opportunities for advertisers. These media opportunities, including search listing ads, product ads (display and video) and audio, are purchased by advertisers through direct insertion orders or digital buying methods like programmatic real-time auctions. Marketing and technology leaders at retailers develop these advertising exchange capabilities internally or partner with ad technology platforms, such as with demand- and supply-side partners, to offer their media for sale in a scalable and cost-efficient way. In addition to their value as media opportunities, retailers can assemble these audiences into valuable data segments by historical browsing and purchase behavior, which can be used to improve both on-site personalization and targeting.
Gartner defines robotic process automation (RPA) as the software to automate tasks within business and IT processes via software scripts that emulate human interaction with the application user interface. RPA enables a manual task to be recorded or programmed into a software script, which users can develop by programming, or by using the RPA platform’s low-code and no-code graphical user interfaces. This script can then be deployed and executed into different runtimes. The runtime executable of the deployed script is referred to as a bot, or robot.
Sales engagement applications (SEAs) streamline how sellers orchestrate sales activities and deal workflows at scale. They optimize seller productivity by combining three key capabilities into a single interface: multichannel engagement (e.g., email, voice, SMS, video, social media), workflow execution and time-saving AI/automation. Because the technology is a new front end for SFA/CRM, sellers rely on it to streamline guidance into whom to engage and when, and what messaging to use, while capturing sales activities back into SFA/CRM. Vendors in the market have expanded to offer a portfolio of capabilities, configurable to the needs of a wide array of customer-facing B2B selling use cases.
Gartner defines SFA platforms as tools that natively support (not via third-party add-ons and solutions) automation and capture of sales activities, processes and administrative responsibilities for organizations’ sales professionals. They also support initiation, engagement and capture of buyer-seller interactions through multiexperience and channel-agnostic approaches and devices, and dissemination of actionable insights to improve sales contact management, pipeline management, opportunity management, guided selling and forecasting process execution. The optimal desired experience for sales users (leadership, managers and sellers) are not limited to internal use cases, and can be scaled to support buyer-seller intermediation and shared experiences with prospects and customers.
Scheduling Automation software is a tool designed to automate and streamline the process of scheduling and managing appointments, meetings, tasks, and other time-related activities. The software improves overall efficiency in scheduling processes, enhances communication, reduces manual efforts, and scheduling conflicts. The typical features include calendar integration, online appointment booking, availability management, reminders and notifications, time zone management, and resource allocation. It is widely leveraged by individuals, teams, or organizations across various industries, such as healthcare, customer service, education, project management, and more.
Gartner defines Search and Product Discovery as applications that augment digital commerce solutions to facilitate navigation, filtering, comparisons, and ultimately selection of products. They provide search (keyword, natural language and visual), merchandising (automation, configuration, and curation of business rules to make a product discoverable based on business needs), product recommendations, catalog navigation (and SEO keyword automation), personalization and analytics capabilities through SaaS to enable customers (B2C and B2B) to transact. They also enable providers (merchandisers, content managers, and search specialists) to support customer experiences. With the emergence of generative AI, conversational search interfaces are now appearing.
SIEM is a configurable security system of record that aggregates and analyzes security event data from on-premises and cloud environments. SIEM assists with response actions to mitigate issues that cause harm to the organization and satisfy compliance and reporting requirements.
Security orchestration, automation and response (SOAR) solutions combine incident response, orchestration and automation, and threat intelligence (TI) management capabilities in a single platform. SOAR tools are also used to document and implement processes (aka playbooks, workflows and processes); support security incident management; and apply machine-based assistance to human security analysts and operators. SOAR solutions must provide: - Highly customizable workflow process management that enables repeatable automated tasks to be turned into playbooks that run in isolation or joined together into more sophisticated workflows. - The ability to store (locally or in a third-party system) incident management data to support SecOps investigations. - Manually instigated and automated triggers that augment human security analyst operators to carry out operational tasks consistently. - A mechanism to collate and better operationalize the use of threat intelligence. - Support for a broad range of existing security technologies that supports improved analyst efficiency and acts as an abstraction layer between the desired outcomes and the custom-made set of solutions in place in your environment.
Gartner defines security service edge (SSE) as a solution that secures access to the web, cloud services and private applications regardless of the location of the user or the device they are using or where that application is hosted. SSE protects users from malicious and inappropriate content on the web and provides enhanced security and visibility for the SaaS and private applications accessed by end users. Security service edge provides a primarily cloud-delivered solution to control access from end users and edge devices to applications (private or delivered via SaaS) as well as websites (and to a lesser extent general internet traffic). It provides a range of security capabilities, including adaptive access based on identity and context, malware protection, data security, and threat prevention as well as the associated analytics and visibility. It enables a hybrid workforce more efficiently than traditional on-premises solutions. Capabilities that are integrated across multiple traffic types and destinations allow a more seamless experience for both users and admins while maintaining a consistent security stance.
Reviews for 'Security Solutions - Others'
TI products and services deliver knowledge, information and data about cybersecurity threats and other organization-specific threat exposures, including but not limited to indicators of compromise (IOCs), threat actor attribution and campaigns. The output of these products and services aim to provide or assist in the curation of information about the identities, motivations, characteristics and methods of threats, commonly referred to as tactics, techniques and procedures (TTPs). The intent is to enable better decision making and improve security technology capabilities to reduce risk and the chance of being compromised.
Sentiment Analysis Tools enable organizations to analyze all forms of text data to determine the overall sentiment, opinion, or emotional tone expressed by the users in their messages. These tools use technologies such as machine learning, natural language processing (NLP), text analysis, and biometrics for analyzing and breaking a large amount of text data into small chunks to identify the underlying sentiment of a message. The underline sentiment can be positive, negative, or neutral, which is calculated by assigning the sentiment score based on a pre-determined scale to each chunk. These tools also provide multilingual support to enable sentiment analysis across different languages. These tools are commonly used in marketing, customer support, e-commerce, and finance.
Server virtualization includes a range of technologies that abstract an underlying infrastructure layer (networking, storage and compute [including memory]). In doing so, it improves hardware utilization, workload portability, automation and availability. Server virtualization is most often associated with hypervisor-based server workloads running in data center environments on industry-standard servers. In reality, server virtualization incorporates multiple technologies, spans locations from public cloud to edge, and supports initiatives for both cloud-native transformation and infrastructure modernization. It includes hardware- and software-based technologies.
SOAPs enable I&O leaders to design and implement business services. These platforms combine workflow orchestration, workload automation and resource provisioning across an organization’s hybrid digital infrastructure. Increasingly, they are central to an organization’s ability to deploy workloads and to optimize deployments as a part of cost and availability initiatives. SOAPs provide a unified administration console and an orchestration engine to manage workloads and data pipelines and to enable event-driven application workflows. Most tools expose APIs enabling scheduling batch processes, monitoring task statuses and alerting users when new events are triggered and can be integrated into DevOps pipelines to increase delivery velocity. SOAPs expand the role of traditional workload automation by adapting to use cases that deliver and extend into data pipelines, cloud-native infrastructure and application architectures. These tools complement and integrate with DevOps toolchains to provide customer-focused agility and to cost savings, operational efficiency and process standardization.
Social analytics is the process of collecting, measuring, analyzing and interpreting the results of interactions and associations among people, topics and ideas from social media sources. This market examines social analytics solutions covering social filtering, text analytics, sentiment analysis, image analysis and public-facing social media analytics. It focuses on solutions that derive at least 60% of their revenue from software versus solutions that are mainly based on consulting services.
The market for social software in the workplace includes software products that support people working together in teams, communities or networks. These products can be tailored to support a variety of collaborative activities. Buyers are looking for virtual environments that can engage participants to create, organize and share information, and encourage them to find, connect and interact with each other. Business use of these products ranges from project coordination within small teams or homogeneous groups, to information exchange between employees across an entire organization.
Software asset management (SAM) tools are solutions that provide automation to support tasks required to produce and maintain compliance with independent software vendor (ISV) license use rights, while improving an organization’s ability to proactively identify and optimize software risk and spend. SAM tools provide in-depth software asset analysis through: - Conducting discovery - Analyzing software license entitlements - Automating the collection of software consumption data - Establishing ISV effective license position (ELP) - Governing software assets - Optimizing software value delivery - Sharing information with other tools and stakeholders
Gartner defines speech-to-text (STT) platforms as business applications that process speech content, either live or in batch to produce: A transcript of the conversation Metadata about the call, the callers, attributes of call, emotional context Value-added services (e.g., biometric, legal) Workflow tools to support downstream work (e.g., intent detection, CRM updates) The capabilities of STT solutions vary. At a minimum, providers can offer a set of generic APIs with no tailored industry offering. More advanced solutions support complex deployments of edge technologies tailored to specific industries such as medical and legal. As natural language experiences are rapidly adopted by customers, users and employees, STT solutions must address a number of deployment configurations and be tailored for end-user domain knowledge to improve their accuracy.
Gartner defines strategic cloud platform services as standardized, automated, public cloud offerings integrating infrastructure services (e.g., computing, network and storage), platform services (e.g., managed application and data services) and transformation services (programs/resources that help customers adopt cloud-oriented IT delivery models). Infrastructure and platform services may be hosted in providers’ infrastructures or customers’ data centers; however, they’re owned by the service provider. Services should be elastically scalable, metered by use, and consumable via web-based interfaces and programmable APIs. Transformation programs may be delivered by automated, self-service interfaces and managed interactions facilitated by account teams/partners.
The structured data archiving and application retirement market is identified by an array of technology solutions that manage the life cycle of application-generated data and accommodate corporate and regulatory compliance requirements. Application-generated data is inclusive of databases and related unstructured data. SDA solutions focus on improving the storage efficiency of data generated by on-premises and cloud-based applications and orchestrating the retirement of legacy application data and their infrastructure. The SDA market includes solutions that can be deployed on-premises, and on private and public infrastructure, and includes managed services offerings such as SaaS or PaaS.
Gartner defines supply chain planning (SCP) solutions as platforms that provide technological support to enable a company to manage, link, align, collaborate and share its planning data across an extended supply chain. An SCP solution supports planning, ranging from demand planning through detailed supply-side response planning and from strategic planning through execution-level planning. It is the planning decision repository for a defined end-to-end supply chain. It is also the environment in which end-to-end-integrated supply chain decisions are managed. It establishes a single version of the truth for planning data and decisions, regardless of the underlying execution technology environment.
All unified communications (UC) solutions are intended principally to improve user productivity and enhance business processes that relate to communications and collaboration. Gartner defines UC solutions — equipment, software and services — as offerings that facilitate the use of multiple enterprise communications methods to achieve those aims. UC solutions integrate communications channels (media), networks and systems, as well as IT business applications, and, in some cases, consumer applications and devices. UC offers the ability to significantly improve how individuals, groups and companies interact and perform. The UC solutions that enterprises deploy range from stand-alone suites from single vendors, to integrated applications and platforms from multiple vendors. UC is often deployed to extend and add functionality to established communications investments.
Gartner defines unified communications as a service (UCaaS) as a cloud-delivered service that provides the following core capabilities: 1) Telephony 2) Meetings 3) Messaging 4) Software apps 5) APIs 6) Adjacent services
Gartner defines a unified endpoint management (UEM) tool as a software-based tool that provides agent and agentless management of computers and mobile devices through a single console. Modern UEM tools: Provide a user-centric view of devices across device platforms; Offer agent and/or agentless management through native Windows endpoint, macOS, Linux and Chrome OS controls. Offer agentless mobile management through native Apple iOS/iPad OS and Google Android controls; Aggregate telemetry and signals from identities, apps, connectivity and devices to inform policy and related actions; Aggregate and analyze technology performance and employee experience data; Integrate with identity, security and remote access tools to support zero-trust access and contextual authentication, vulnerability, policy, and configuration and data management; Manage nontraditional devices, including Internet of Things (IoT) devices, wearables and rugged handhelds.
Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. User authentication is foundational to and protects the value of other functions with an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD); audit (individual accountability); and identity analytics.
Visual collaboration applications are cloud-based platforms that enable teams to communicate and creatively collaborate during both asynchronous and real-time work activities. Visual collaboration applications provide an infinitely scalable shared digital canvas offering robust collaboration features. Multiple users can interact on the same virtual canvas simultaneously, regardless of whether they are colocated or collaborating from anywhere via their smartphones, tablets, laptops, or conference room touchscreen monitors. These applications accept input from touchscreen devices, digital pens and keyboards. Vendors offer these solutions as either fully feature-rich downloadable applications or as more-lightweight options accessed through browsers. Visual collaboration applications default to a blank, free-form canvas, but often include templates for graphs, diagrams, project plans, brainstorming, mind maps, Kanban boards and other structured formats. User- and role-based access rights govern reading, editing and commenting rights for internal and external collaborators. Features to export canvasses are essential to enable sharing in various portable formats, such as PDF and JPEG. Vendors may store content in cloud infrastructure or provide server software.
Visual intelligence helps customers find products with relevant visual attributes using real-world images, video and text. Expanding on visual search capabilities, this helps customers identify a specific product, provides related content or detailed information, or otherwise triggers engagement. These solutions analyze catalogs to understand taxonomy and product attributes in addition to visual features, product identification using technologies like computer vision, natural language processing and machine learning. This technology helps ease the path to purchase, driving consumers in sectors like Healthcare, Sports & entertainment, manufacturing , retail etc., from awareness to conversion in an instant by presenting products with relevant visual attributes.
VA solutions identify, categorize and prioritize vulnerabilities as well as orchestrate their remediation or mitigation. Their primary focus is vulnerability and security configuration assessments for enterprise risk identification and reduction, and reporting against various compliance standards. VA can be delivered via on-premises, hosted and cloud-based solutions, and it may use appliances and agents. Core capabilities include: - Discovery, identification and reporting on device, OS, software vulnerabilities and configuration against security-related criteria - Establishing a baseline for systems, applications and databases to identify and track changes in state - Reporting options for compliance, control frameworks and multiple roles Standard capabilities include: - Pragmatic remediation prioritization with the ability to correlate vulnerability severity, asset context and threat context that then presents a better picture of true risk for your specific environment - Guidance for remediating and configuring compensating controls - Management of scanner instances, agents and gateways - Direct integration with, or API access to, asset management tools, workflow management tools and patch management tools
Gartner defines a warehouse management system (WMS) as a software application that helps manage and intelligently execute the operations of a warehouse, distribution center (DC) or fulfillment center (FC). WMS operations natively exploit mobile devices along with bar codes and potentially RFID or other scanning/sensing technologies, to form the transactional foundation of warehouse management. This enables efficiencies of directed work activity (optimization) and the delivery of accurate information in near real time. Core WMS capabilities address, among others, the needs to receive, put away, store, count and pick, pack and ship goods. Gartner also includes additional integrated functionality offered by WMS providers beyond core WMS. These extended WMS capabilities can include more advanced capabilities such as managing labor or optimizing the locating of inventory within a facility.
The workstream collaboration (WSC) market consists of products that deliver a conversational workspace based on a persistent group chat. Products in this market are primarily used to organize, coordinate, and execute outcome-driven teamwork such as that associated with the project- or process-related activities. Secondary uses can include ad hoc collaboration and community discussions.
Gartner defines zero trust network access (ZTNA) as products and services that create an identity and context-based, logical-access boundary that encompasses an enterprise user and an internally hosted application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a collection of named entities, which limits lateral movement within a network.