Technology and service providers (TSPs) who are able to offer an end-to-end service for 4G/5G private mobile network (PMN) include: CSPs, Network equipment providers (NEPs), Systems integrators (SIs) and Hyperscalers. PMNs are used exclusively by a given enterprise client, providing higher security and reliability than public cellular networks. PMN offerings can include voice, video, messaging and broadband data, as well as specific critical communications features (such as lone worker protection [LWP] or push-to-talk over cellular [PTToC]). PMNs can then support use cases around HD video, data, artificial intelligence (AI)/machine learning (ML) and Internet of Things (IoT), and run on-site or in a cloud, or a multiaccess edge computing data center (MEC DC).
Gartner defines the market of AI in communications service provider (CSP) customer and business operations as commercial off-the-shelf (COTS) products. They are either capabilities embedded in CSP-specific operational technology (OT) applications (such as channels, CRM and other business support system [BSS] applications) or industry-agnostic horizontal applications delivering AI/machine learning (ML)-based customer and business operations in CSPs. CSP customer and business operations refer to marketing, sales, customer acquisition, customer journey, billing and revenue management, revenue assurance, and related risk management. The scope of AI products covers data readiness, life cycle management of algorithms and their application to CSP customer and business operations. AI in CSP customer and business operations helps CSPs utilize AI/ML to generate insights and automate business processes across a wide range of customer and business operations areas. These areas include marketing, sales, configure-price-quote (CPQ), order management, product management, billing and revenue management, customer journey and care, revenue assurance, and fraud/risk management. An example can be intelligent chatbots utilizing natural language processing for customer interaction use cases to automate call center operations. These products assist with insights and automation and help CSPs manage the life cycle of AI/ML algorithms, gradually enabling ModelOps/AIOps.
Gartner defines the application programming interface (API) management market as the market for software to manage, govern and secure APIs. Organizations use APIs to modernize their architectures; APIs provide access to systems, services, partners and data services. API management software enables organizations to plan, deploy, secure, operate, version control and retire APIs, regardless of their size, region or industry.
Gartner defines access management (AM) as tools that include authentication and single sign-on (SSO) capabilities, and that establish, manage and enforce runtime access controls for modern standards-based and classic web applications and APIs. AM’s purpose is to enable SSO access for people (employees, consumers and other users) and machines to protected applications in a streamlined and consistent way that enhances the user experience. AM is also responsible for providing security controls to protect the user session in runtime, enforcing authentication and authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools and reliant applications to enable identity-first security.
Accounts payable invoice automation (APIA) tools automate the capture, validation and processing of invoices. These solutions attempt to automatically match invoices to purchase orders (POs) and contracts, or automatically code those invoices that would not have a PO. Payment management, ranging from OK to pay to complete invoice payment, is also included. The expanded scope of APIA includes advanced capabilities, such as automated multiway matching, fraud detection and cash management.
Active metadata management is a set of capabilities that enables continuous access and processing of metadata that support ongoing analysis over a different spectrum of maturity, use cases and vendor solutions. Active metadata outputs range from design recommendations based upon execution results and reports of runtime steps through, and indicators of, business outcomes achieved. The resulting recommendations from those analytics are issued as design inputs to humans or system-level instructions that are expected to have a response.
Advertising technology (ad tech) platforms help digital marketing leaders plan, buy and manage digital advertising campaigns across channels, including, but not limited to, display, video, streaming TV and audio, mobile, social media and search. They provide functions for campaign planning, media buying, advertising analysis and optimization and automation. Ad tech platforms can be used by buy-side and sell-side agents.
Analytics and business intelligence platforms — enabled by IT and augmented by AI — empower users to model, analyze and share data. Analytics and business intelligence (ABI) platforms enable organizations to understand their data. For example, what are the dimensions of their data — such as product, customer, time, and geography? People need to be able to ask questions about their data (e.g., which customers are likely to churn? Which salespeople are not reaching their quotas?). They need to be able to create measures from their data, such as on-time delivery, accidents in the workplace and customer or employee satisfaction. Organizations need to blend modeled and nonmodeled data to create new data pipelines that can be explored to find anomalies and other insights. ABI platforms make all of this possible.
The supply chain A&DI technology market spans capabilities that provide different types of analytics, focusing on predictive and prescriptive ones. Many of these offerings have been enhanced with AI and DSML capabilities to support supply chain decision making. These capabilities could either be part of a broader supply chain application/suite or a separate encompassing A&DI platform. Such a platform consists of existing and emerging technologies, including: Graph technology, Advanced analytics, AI, DSML, Model development & Digital supply chain twin (DSCT).
The application delivery controller is a key component within enterprise and cloud data centers to improve availability, security and performance of applications. Application delivery controllers (ADCs) provide functions that optimize delivery of enterprise applications across the network. ADCs provide functionality for both user-to-application and application-to-application traffic, and effectively bridge the gap between the application and underlying protocols and traditional packet-based networks. This market evolved from the load-balancing systems that were developed in the latter half of the 1990s to ensure the availability and scalability of websites. Enterprises use ADCs today to improve the availability, scalability, end-user performance, data center resource utilization, security of their applications.
The application development life cycle management (ADLM) tool market focuses on the planning and governance activities of the software development life cycle (SDLC). ADLM products focus on the 'development' portion of an application's life. Key elements of an ADLM solution include: software requirements definition and management, software change and configuration management, software project planning, with a current focus on agile planning, work item management, quality management, including defect management. Other key capabilities include: reporting, workflow, integration to version management, support for wikis and collaboration, strong facilities for integration to other ADLM tools.
Reviews for 'Application Development, Integration and Management - Others'
'Application integration platforms enable independently designed applications, apps and services to work together. Key capabilities of application integration technologies include: • Communication functionality that reliably moves messages/data among endpoints. • Support for fundamental web and web services standards. • Functionality that dynamically binds consumer and provider endpoints. • Message validation, mapping, transformation and enrichment. • Orchestration. • Support for multiple interaction patterns, content-based routing and typed messages.
Application platforms provide runtime environments for application logic. They manage the life cycle of an application or application component, and ensure the availability, reliability, scalability, security and monitoring of application logic. They typically support distributed application deployments across multiple nodes. Some also support cloud-style operations (elasticity, multitenancy and self-service).
Gartner defines augmented data quality (ADQ) solutions as a set of capabilities for enhanced data quality experience aimed at improving insight discovery, next-best-action suggestions and process automation by leveraging AI/machine learning (ML) features, graph analysis and metadata analytics. Each of these technologies can work independently, or cooperatively, to create network effects that can be used to increase automation and effectiveness across a broad range of data quality use cases. These purpose-built solutions include a range of functions such as profiling and monitoring; data transformation; rule discovery and creation; matching, linking and merging; active metadata support; data remediation and role-based usability. These packaged solutions help implement and support the practice of data quality assurance, mostly embedded as part of a broader data and analytics (D&A) strategy. Various existing and upcoming use cases include: 1. Analytics, artificial intelligence and machine learning development 2. Data engineering 3. D&A governance 4. Master data management 5. Operational/transactional data quality
B2B gateway software is integration middleware that supports information exchange between your organization and its ecosystem trading partners, applications and endpoints. BGS consolidates and centralizes data and process integration and interoperability between a company's internal applications and external endpoints, such as business partners, SaaS or ecosystems. The BGS market is a composite market that includes pure-play BGS solutions and BGS that is embedded or combined with other IT solutions (for example, ESB suites that support BGS features as services connected to the ESB suite, integration brokerage services, e-invoicing software and networks, application platform suites, electronic data interchange [EDI] translators, and managed file transfer [MFT] technology).
Gartner defines B2B marketing automation platforms (B2B MAPs) as software applications that support demand generation processes at scale. B2B MAPs help marketers capture and qualify leads and accounts, orchestrate marketing-driven engagement across the full customer journey, and use analytics to optimize and measure performance. B2B MAPs enable marketers to automate a wide range of activities intended to drive new customer acquisition, retention and growth. To support the pursuit of new commercial opportunities (from current or prospective customers), marketers use B2B MAPs to generate, prioritize, and manage leads and buying teams across the revenue life cycle. This includes the distribution of marketing-generated and qualified leads to sales teams for further pursuit.
BPM-platform-based case management frameworks are configurable 'apps' meant to help solution architects accelerate the delivery of unique and flexible case management solutions. Case management frameworks (CMFs) are commercial software offerings designed to reduce the time and complexity of creating case-style process solutions by providing architectural patterns and at least some business domain capabilities 'out of the box.' Work is caselike when each work item — each case — requires unique handling, involving complex interactions between content, people, transactions and business or regulatory policies in order to deliver an optimal outcome. Case-style processes do not progress in a serial or completely predictable fashion. Rather, they often require multiple dependent workflows to be orchestrated, making them particularly complex to architect. Very often, caseworkers need the flexibility to decide the best next action for a case, rather than following a prescribed workflow.
Blockchain platforms are emerging platforms and, at this point, nearly indistinguishable in some cases from core blockchain technology. They are being used for generalized distributed value exchange, consisting of an expanding list of cryptographically signed, irrevocable transactional records shared by all participants in a network. Each record contains a time stamp and reference links to previous transactions. It is a decentralized state transition machine that manages the life cycle of digitalized assets and immutably records operations in a distributed ledger. A digitalized asset can be any object with explicit or implicit value (such as digital currencies, securities, precious metals, commodities, materials, identity, credentials, patient health records).
Blockchain as a Service is a cloud-based service that enables users to build, host, and use their own blockchain apps, functions, and smart contracts without the need to maintain and setup the underlying infrastructure themselves. It's similar to how software as a service (SaaS) works, offering blockchain technology on a subscription basis, making it easier and more accessible for businesses, financial institutions and developers to leverage blockchain technology for various features like scaling up the blockchain solutions, secure transactions, and decentralization, without the complexity and cost of developing and managing a blockchain infrastructure on their own.
Gartner defines the cyber-physical systems (CPS) protection platforms market as products and services that use knowledge of industrial protocols, operational/production network packets or traffic metadata, and physical process asset behavior to discover, categorize, map and protect CPS in production or mission-critical environments outside of enterprise IT environments. Gartner defines CPS as engineered systems that orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans). When secure, they enable safe, real-time, reliable, resilient and adaptable performance. Attributes of these platforms include: - Discovery, visibility and categorization of CPS assets - Detailed pedigree of assets - Support for proprietary industrial protocols - Detailed network diagrams and data flows - Vulnerability information - Threat intelligence management - Integration with IT security tools
Gartner defines the CRM Customer Engagement Center market as a cohesive set of software built around core case management tools, used to provide customer service and support by engaging with customers, while intelligently orchestrating the processes, data, systems, and resources of an organization. CEC applications offer workflow management capabilities and may be used as a system of record for customer interactions. The orchestration of customer service and support processes through a CEC application involves both assisted and self-service moments within customer journeys. It is built around case management records and processes. Workflow is an important CEC component, in terms of an organization being able to orchestrate the processing of customer engagements for the best outcomes in an effortless, effective and timely way. In addition to case, workflow, and knowledge management, personalization and enrichment of customer engagements are crucial.
Gartner defines cloud AI developer services (CAIDS) as cloud-hosted or containerized services and products that enable software developers who are not data science experts to use artificial intelligence (AI) models via APIs, software development kits (SDKs) or applications. Core capabilities include automated machine learning (autoML) including automated data preparation, automated feature engineering and automated model building, and model management and operationalization for language, vision and tabular use cases. Optional and important complementary capabilities include AI code models and assistants. Cloud AI developer services help organizations embed intelligence, such as AI and ML insights, into their applications. While that is what cloud AI developer services offer, it is more important to note how they accomplish this. These services democratize and increase the availability of AI and ML to software engineers through the automation and features offered. Traditional activities regarding data acquisition, data quality, feature engineering, algorithm selection and model training are augmented by the technology. Cloud AI developer services open up a world of possibilities for software engineers to build AI and ML production capabilities and features for enterprise-built applications.
Gartner defines cloud application platforms as those that provide managed application runtime environments for applications and integrated capabilities to manage the life cycle of an application or application component. They typically enable distributed application deployments and support cloud-style operations — such as elasticity, multitenancy and self-service — without requiring infrastructure provisioning or container management. Cloud application platforms are designed to facilitate the deployment, runtime execution, and management of modern cloud-native or cloud-optimized applications (e.g., web-based apps, back-end services with/without APIs, etc.) without the need to manage any underlying compute infrastructure. Also, they are designed to enhance developer productivity, accelerate development and deployment cycles, and increase operational effectiveness by making it easier to scale on demand.
Gartner defines the market for cloud database management systems (DBMSs) as the market for software products that store and manipulate data and that are primarily delivered as software as a service (SaaS) in the cloud. Cloud DBMSs may optionally be capable of running on-premises, or in hybrid, multicloud or intercloud configurations. They can be used for transactional work and/or analytical work. They may have features that enable them to participate in a wider data ecosystem. Must-have capabilities for this market include: Availability as SaaS on provider-managed public or private cloud systems; Management of data within cloud storage — that is, cloud DBMSs are not hosted in infrastructure as a service (IaaS), such as in a virtual machine or a container managed by the customer.
Gartner defines cloud enterprise resource planning (ERP) for product-centric enterprises as a market for application technology that supports the automation of operational activities for the manufacturing, distribution, delivery and servicing of goods. Cloud ERP for product-centric enterprises is delivered under a SaaS license model (with frequent mandatory updates), where application support, infrastructure provisioning and management are the responsibility of the vendor.
Gartner defines a service-centric cloud ERP solution as a suite that is marketed and sold as an integrated product that provides at least three of the following: Financial management system (FMS) functionality, including general ledger, accounts payable (AP), accounts receivable (AR) and financial planning. Order-to-cash (O2C) functionality, ranging from configure, price and quote (CPQ) to cash collection activities. Source-to-pay (S2P) functionality, which must cover at least e-sourcing, contract life cycle management, e-purchasing, AP invoice automation, supplier management, collaboration and payments. Human capital management (HCM) functionality, which must cover at least administrative HR capabilities, such as core HR data management, employee life cycle transactions and position management. Other administrative ERP functionality, to support typical service-centric activities, such as extended planning and analysis (xP&A), project management (for project-centric capabilities), service procurement and real estate lease management. In addition, Gartner defines the market for cloud ERP for service-centric enterprises as serving organizations that typically focus on service (nonproduct) industries, including: Professional services Healthcare Software Media Financial services Telecommunications Nonprofit sectors Real estate
Gartner defines cloud HCM suites for 1,000+ employee enterprises as cloud application suites that deliver functionality for attracting, developing, engaging, retaining and managing employees. Cloud HCM suites for 1,000+ employee enterprises are designed to support transactions and/or analytical processing for more than one of the following use cases within a single integrated solution
Cloud management tooling enables organizations to manage hybrid and multicloud (that is, on-premises, public cloud and edge) services and resources. This includes providing governance, life cycle management, brokering and automation for managed cloud infrastructure resources across multiple functional areas. The tooling can be procured and operated by central IT organizations, such as I&O, cloud center of excellence (CCOE) and platform engineering/operations, or within specific lines of business. It can be deployed on-premises, in a customer’s public cloud account or purchased as a SaaS.
Cloud security posture management tools help in the identification and remediation of risks across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). These tools continuously assess the security posture across multi-cloud environments by maintaining a current inventory of the cloud assets for proactive analysis and risk assessment to detect any misconfigurations. Once these misconfigurations are identified, security controls are developed and implemented. CSPM solutions also integrate with DevOps tools, streamlining the incident response process and ensuring continuous compliance with regulatory requirements and security frameworks by providing visibility of the cloud environment’s security posture.
Gartner defines cloud WAAP as a category of security solutions designed to protect web applications irrespective of their hosted locations. Typically delivered as a service, cloud WAAP is offered as a series of security modules that provide protection from a broad range of runtime attacks. It offers protection from the Top 10 web application security risks defined by the Open Web Application Security Project (OWASP) and automated threats, provides API security, and can detect and protect against multiple sophisticated Layer 7 attacks targeted at web applications. Cloud WAAP’s core features include web application firewall (WAF), bot management, distributed denial of service (DDoS) mitigation and API protection.
Cloud-native application protection platforms (CNAPPs) are a unified and tightly integrated set of security and compliance capabilities, designed to protect cloud-native infrastructure and applications. CNAPPs incorporate an integrated set of proactive and reactive security capabilities, including artifact scanning, security guardrails, configuration and compliance management, risk detection and prioritization, and behavioral analytics, providing visibility, governance and control from code creation to production runtime. CNAPP solutions use a combination of API integrations with leading cloud platform providers, continuous integration/continuous development (CI/CD) pipeline integrations, and agent and agentless workload integration to offer combined development and runtime security coverage.
Gartner defines co-managed security monitoring as services that provide remote maintenance and monitoring of client-owned threat detection, investigation and response (TDIR) capable products. These services ensure availability and performance of the system, and assist with and provide professional services consultancy in a wide range of functions., such as Examples include the creation of use cases, detection engineering, configuration of APIs, data normalization and reporting content. Co-managed security monitoring offers clients the ability to share management and responsibility for their TDIR platform monitoring in varying degrees. The types of services offered are divided into two main categories: (a) Monitoring and reaction to platform maintenance issues, (b) Real-time threat monitoring.
Gartner defines the collaborative work management (CWM) market as the market for stand-alone software tools that provide task-driven workspaces to enable end users to plan, coordinate and automate their work. These tools provide an integrated assembly of user-friendly capabilities for work planning, in-context collaboration, content collaboration, workflow and automation, reporting, analysis and dashboarding, intelligent assistance, and use-case acceleration on a platform that handles data management and administrative operations. Tools are defined by their purpose (work planning and execution), target users and breadth of functionality.
Gartner defines communications platform as a service (CPaaS) as a cloud-based platform used by developers, the IT team and other nontechnical business roles to build an array of communications-related capabilities using APIs, SDKs, documentation and no-code/low-code visual builders. The CPaaS tools facilitate access to multiple communications channels spanning voice, SMS, email, messaging apps, video and conversational capabilities, along with security. The purpose of CPaaS is to enable enterprises to improve communications workflows by providing simplified access to multiple communications capabilities. CPaaS enables enterprises to shorten time to market for new products and services, personalize communications, and orchestrate customer journeys across multiple channels. It delivers digital engagement and operationalizes customer experience, while also driving business efficiencies at scale with digital service delivery. It’s modular/composable in design and can expand from initial single-use cases to many others as additional business units learn of its value. CPaaS capabilities can also be consumed in a wholesale model, powering third-party cloud vendor offerings such as contact center, CRM, multichannel marketing and ERP. There are also wholesale use cases in which CPaaS providers wholesale to each other and telcos.
Gartner defines container management as offerings that enable the deployment and operation of containerized workloads. Delivery methods include stand-alone software or as a service. Delivery methods include cloud, managed service and software for containers running on-premises, in the public cloud and/or at the edge. Container management automates the provisioning, operation and life cycle management of containerized workloads at scale. Centralized governance and security policies are used to manage container workloads and associated resources. Container management supports the requirements of modern applications (also refactoring legacy applications), including platform engineering, cloud management and continuous integration/continuous deployment (CI/CD) pipelines. Benefits include improved agility, elasticity and access to innovation.
Content collaboration tools provide an easy way for employees to use and share content both inside and outside the organizations. Since these tools can be used to collaborate with customers, partners and suppliers, they often provide rich security and privacy controls. Today, much of this functionality also can be found in other tools such as cloud office platforms, workstream collaboration platforms, content services platforms and content services applications. Functional differentiators in dedicated CCTs are difficult to identify.
Content services platforms (CSPs) are foundational for managing and utilizing content within an organization. CSP technologies enable employees to retrieve and work with content in a modern and seamless way across devices and organizational boundaries. Core CSP functionalities include content capture, creation, consolidation, processing and retention to support personal, team, departmental and enterprise business operations.
The corporate telephony market is evolving from a focus on innovation in proprietary hardware to use of commodity hardware and standards-based software. While most telephony solutions are Internet Protocol (IP)-enabled or IP-PBX solutions, the associated endpoints are a mix of time division multiplexing (TDM) and IP. Corporate telephony platforms focus on high-availability, scalable solutions, which support Session Initiation Protocol (SIP), desktop and soft phone functionality, and the ability to integrate with enterprise IT applications while delivering toll-grade voice quality.
The market for distributed denial of service (DDoS) mitigation includes vendors that detect and mitigate DDoS attacks and offer it as a dedicated offering. It includes specialty vendors, whose primary focus is DDoS mitigation, as well as providers that offer DDoS mitigation as a feature of other services. These include dedicated appliance-based vendors, communication service providers (CSPs), content delivery network (CDN) vendors, hosting providers and cloud infrastructure and platform services (CIPS) vendors.
Reviews for 'Data Center - Others'
The data integration tools market comprises stand-alone software products that allow organizations to combine data from multiple sources, including performing tasks related to data access, transformation, enrichment and delivery. Data integration tools enable use cases such as data engineering, operational data integration, delivering modern data architectures, and enabling less-technical data integration. Data integration tools are procured by data and analytics (D&A) leaders and their teams for use by data engineers or less-technical users, such as business analysts or data scientists. These products are consumed as SaaS or deployed on-premises, in public or private cloud, or in hybrid configurations.
The market for DLP technology includes offerings that provide visibility into data usage and movement across an organization. It also involves dynamic enforcement of security policies based on content and context for data in use, data in motion and data at rest. DLP technology seeks to address data-related threats, including the risks of inadvertent or accidental data loss and the exposure of sensitive data, using monitoring, alerting, warning, blocking, quarantining and other remediation features.
Data masking is based on the premise that sensitive data can be transformed into less sensitive but still useful data. This is necessary to satisfy application testing use cases that require representative and coherent data, as well as analytics that involve the use of aggregate data for scoring, model building and statistical reporting. The market for data protection, DM included, continues to evolve with technologies designed to redact, anonymize, pseudonymize, or in some way deidentify data in order to protect it against confidentiality or privacy risk.
Data preparation is an iterative and agile process for finding, combining, cleaning, transforming and sharing curated datasets for various data and analytics use cases including analytics/business intelligence (BI), data science/machine learning (ML) and self-service data integration. Data preparation tools promise faster time to delivery of integrated and curated data by allowing business users including analysts, citizen integrators, data engineers and citizen data scientists to integrate internal and external datasets for their use cases. Furthermore, they allow users to identify anomalies and patterns and improve and review the data quality of their findings in a repeatable fashion. Some tools embed ML algorithms that augment and, in some cases, completely automate certain repeatable and mundane data preparation tasks. Reduced time to delivery of data and insight is at the heart of this market.
Gartner defines a data science and machine learning platform as an integrated set of code-based libraries and low-code tooling that support the independent use by, and collaboration between, data scientists and their business and IT counterparts through all stages of the data science life cycle. These stages include business understanding, data access and preparation, experimentation and model creation, and sharing of insights. They also support machine learning engineering workflows including creation of data, feature, deployment and testing pipelines. The platforms are provided via desktop client or browser with supporting compute instances and/or as a fully managed cloud offering. Data science and machine learning (DSML) platforms are designed to allow a broad range of users to develop and apply a comprehensive set of predictive and prescriptive analytical techniques. Leveraging data from distributed sources, cutting-edge user experience, and native machine learning and generative AI (GenAI) capabilities, these platforms help to augment and automate decision making across an enterprise. They provide a range of proprietary and open-source tools to enable data scientists and domain experts to find patterns in data that can be used to forecast financial metrics, understand customer behavior, predict supply and demand, and many other use cases. Models can be built on all types of data, including tabular, images, video and text for applications that require computer vision or natural language processing.
Reviews for 'Data and Analytics - Others'
A D&A governance platform is a set of integrated business capabilities that helps business leaders and users evaluate and implement a diverse set of governance policies and monitor and enforce those policies across their organizations’ business systems. These platforms are unique from data management and discrete governance tools in that data management and such tools focus on policy execution, whereas these platforms are used primarily by business roles — not only or even specifically IT roles.
Decentralized identity (DCI) democratizes digital identity by decentralizing both the storage and the use of identity data. The primary benefits of DCI are privacy, anonymity and user autonomy. DCI tools include a trust fabric, typically a distributed ledger like a blockchain; a digital wallet, which is tied to an entity (user); verifiable credentials (VCs), which represent identity attributes used to prove identity claims; and decentralized identifiers (DIDs), which establish pseudonymous relationships for issuing and verifying claims. DCI systems are delivered via software and SaaS capabilities. Users are primarily humans, but machines and even business entities can be users of DCI. DCI is used for user verification, identifying and tying a physical person to an identity wallet, and for user authentication and authorization, authenticating that user and authorizing them to access resources and data. Unlike conventional approaches, DCI does not use central stores of identity data, instead decentralizing the identity data, relationships between a user and service provider, and verification.
Gartner defines desktop as a service (DaaS) as the provision of virtual desktops by public cloud or other service providers. DaaS provides desktop or application end-user experiences from virtual machines (VMs) accessed using a remote display protocol. DaaS vendors incorporate a fully managed control plane service into their offerings, which facilitates user connections and provides a management interface. DaaS can be delivered preconfigured as a service. Alternatively, it can be delivered as a platform, in which case the client is responsible for assembly, configuration and management. DaaS is charged for using subscription- or usage-based payment structures. DaaS solutions allow remote workers, offshore workers, third-party employees, contractors, home workers and office workers to access virtual desktops hosted in the cloud. DaaS solutions include technology that enables centralized management of all VMs. DaaS virtual desktops can be configured for a variety of use cases associated with contact center workers, process workers, information workers, and workers who require high-performance computing or rich graphics.
Gartner defines DevOps platforms as those that provide fully integrated capabilities to enable continuous delivery of software using Agile and DevOps practices. The capabilities span the development and delivery life cycle built around the continuous integration/continuous delivery (CI/CD) pipeline and include aspects such as versioning, testing, security, documentation and compliance. DevOps platforms support team collaboration, consistency, tool simplification and measurement of software delivery metrics. DevOps platforms simplify the creation, maintenance and management of the components required for the delivery of modern software applications. Platforms create common workflows and data models, simplify user access, and provide a consistent user experience (UX) to reduce cognitive load. They lead to improved visibility, auditability and traceability into the software development value stream. This end-to-end view encourages a systems-thinking mindset and accelerates feedback loops.
Gartner defines digital commerce as the technology that enables customers to purchase goods and services through an interactive and self-service or assisted experience. The platform provides necessary information for customers to make their buying decisions and uses rules and data to present fully priced orders for payment. The commerce product must support interoperability with customer data, product content (e.g., price, availability) and order functionality and data via APIs. Digital commerce is commonly delivered as single or multitenant SaaS, or as single-tenant hosted or managed hosted (PaaS) applications. It could be offered for on-premises implementations in some circumstances. Digital commerce enables customers to purchase goods and services through an interactive and self-service or assisted experience, providing the necessary information for customers to make buying decisions.
Gartner defines Digital communications governance solutions as they are designed to enforce corporate governance and regulatory compliance, across a growing number of communications tools available to employees. For the various communication tools in use across the enterprise, DCG solutions enable consistent policy management, enforcement and reporting capabilities
A digital twin is a virtual representation of a real entity that can be a physical object, a process, an organization or a person. It relies on sensors or other monitoring technologies to collect the state of an object to build a digital representation. It adds value by testing changes to the twin before implementing them on their real-world counterpart. Finance can use digital twins to represent business processes and assess the impact of changes before implementing them. Financial institutions, analysts, and decision-makers can leverage AI and ML to enhance predictive capabilities, allowing for the accurate forecasting of outcomes. This technology enables the simulation of diverse financial scenarios, providing deep insights while ensuring that the actual financial system remains unaffected.
The DRaaS market provides for the recovery of enterprise applications at another location in the event of a disaster. The provider can deliver the service as a fully managed, assisted recovery or as a self-service offering. The service should be marketed and sold as a stand-alone, industrialized offering and include, at a minimum: - An on-demand recovery cloud for planned tests, exercises and declarations - Server image and production data replication to the cloud - Automated failover and failback between production and the target cloud environment - Recovery time SLAs
Gartner defines document management as the tools and practices used to capture, store, process, and access documents and content in support of personal, team and enterprise needs. It is used for a wide range of collaborative and operational purposes, enabling the digital workplace, content collaboration, content-centric processes, content services for enterprise applications and content governance. Gartner estimates that 70% to 80% of enterprise information is unstructured, posing a significant challenge for organizations that must unlock the potential and mitigate the risks of content. Document management tools are critical to enterprise application strategies that need to support unstructured information or content.
The e-discovery solutions market comprises vendors offering technology solutions that facilitate the electronic discovery process. E-discovery solutions specialize in one or more areas to identify, collect, preserve, process, review, analyze and produce electronically stored information (ESI). ESI fulfills legal and compliance requirements for discovery that result from a variety of investigative scenarios. The scope of ESI often includes data sources, such as digital communications, file systems, cloud office platforms, endpoints, databases and applications. E-discovery solutions market includes software vendor offerings for a customer’s own deployment on-premises and in cloud infrastructure, as well as hosted offerings provided by software vendors and services providers.
Edge Distribution Platform (EDP) is a highly distributed, edge-based, integrated network and cloud delivery infrastructure. It provides as-a-service functionalities such as edge compute and storage, web application and perimeter security, content and API acceleration, and data and analytics and AI applications. Edge distribution platform providers offer these functionalities by deploying network, compute, storage and caching nodes across geographically distributed self-owned or third party data center locations. Figure 1 shows the functionalities and potential offerings provided from an edge distribution platform
Email security refers collectively to the prediction, prevention, detection and response framework used to provide attack protection and access protection for email. Email security spans gateways, email systems, user behavior, content security, and various supporting processes, services and adjacent security architecture. Effective email security requires not only the selection of the correct products, with the required capabilities and configurations, but also having the right operational procedures in place.
Gartner defined Embedded analytics: Allows analytics, data science or low-code application platform (LCAP) features to be included in a business workflow via APIs. Analytics outputs can either be included in host business applications or be exposed in extranet applications to customers, suppliers or partners. Embedded analytics tends to be narrowly deployed around specific processes, such as marketing campaign optimization, sales lead conversions, inventory demand planning and financial budgeting. It is software that delivers real-time reporting, interactive data visualization and/or advanced analytics — including machine learning — directly into an enterprise business application.
An embedded operating system (OS) is a type of OS that is used in embedded computing devices. The term 'embedded' refers to devices that are installed (that is, embedded) as built-in components of a wider system, in which they serve a special, functional purpose. Embedded OSs differ from other types of OSs by their optimized design. Form factors, price points and other parameters of embedded devices set constraints on the OS, for example, in terms of functionality, user interface, memory space and driver support. Consequently, the architectures of embedded OSs tend to be extensively optimized for single-purpose deployment, stripped out of anything that is considered unnecessary for their use. This does not mean that embedded OSs cannot be applied outside of embedded devices. For instance, it is common to see embedded real-time operating systems (RTOSs) being used to handle the baseband functionality in smartphones.
The ECA market consists of vendors offering a discrete application, well-defined module, or cohesive set of capabilities that enables people in “communicator” roles to plan, create, coordinate, and distribute internal communications across the workforce or to specific audiences. ECAs include analytics that measure interactions and effectiveness of communications across content, channels, devices, campaigns and feedback loops to assess business and employee value.
Gartner defines an endpoint protection platform (EPP) as security software designed to protect managed endpoints — including desktop PCs, laptop PCs, mobile devices and, in some cases, server endpoints — against known and unknown malicious attacks. EPPs provide capabilities for security teams to investigate and remediate incidents that evade prevention controls. EPP products are delivered as software agents, deployed to endpoints, and connected to centralized security analytics and management consoles. EPPs provide a defensive security control to protect end-user endpoints against known and unknown malware infections using a combination of security techniques (such as static and behavioral analysis) and system controls (such as device control and host firewall management). EPP prevention and protection capabilities are deployed as a part of a defense-in-depth strategy to help reduce the attack surface and minimize the risk of endpoint compromise. EPP detection and response capabilities are used to uncover, investigate, and respond to endpoint threats that evade security prevention, often as a part of broader security operations platforms.
Gartner defines enterprise agile planning (EAP) tools as products that enable organizations to scale their agile practices to support a holistic enterprise view. These tools act as a hub for defining, planning, managing and deploying work. They also serve as an information hub for the disparate islands of metrics from the full life cycle. Just as agile is an evolution of development methodologies, EAP tools are an evolution of project-/team-centric tools. They support a business-outcome-driven approach to managing the full life cycle of agile product delivery at scale. EAP tools in this market combine data from multiple sources to enable: - Monthly, weekly and even daily incremental value delivery based on business outcomes - Support for enterprise agile frameworks like Scaled Agile Framework (SAFe) - Product roadmapping - Management of strategy, investments and objectives - Increased visibility into the flow of work - Management of work backlogs - Collaboration capabilities for individuals and teams - Management of cross-team dependencies - Release planning and forecasting - Visibility into the financial aspects of the work being done
Enterprise asset management (EAM) is a business application used most comprehensively by asset-intensive industries to execute, track and optimize inspections, maintenance and repair of industrial plants and equipment. Examples of these industries are heavy discrete and process manufacturing industries, oil and gas, rail, and power and utilities. An alternative term used for EAM is “computerized maintenance management system (CMMS),' which generally consists of small-scale, single-site applications with less functionality around parts management and resource scheduling.
Gartner defines enterprise backup and recovery software solutions as technology that captures a point-in-time copy (backup) of enterprise data in on-premises, hybrid, multicloud and software as a service (SaaS) environments. These solutions write this data to one or more secondary storage targets for the primary purpose of recovering it in case of loss. Protecting and recovering business application data, irrespective of the underlying infrastructure type and its location, is more important than ever. As enterprises move toward more complex environments that include large and expansive amounts of business-critical data, enterprise backup and recovery software solutions protect these workloads, whether they reside in on-premises, hybrid, multicloud or software as a service (SaaS) environments. These solutions are vital to organizations’ ability to recover data following events that cause it to become inaccessible. Whether such an event is accidental, malicious or environmental, organizations use these solutions to recover and restore access to the affected data accurately and efficiently. Solutions must offer effective capabilities to simplify the management of data protection across complex enterprise environments. They must also ensure reliable recovery not just from accidental or operational errors but also from data loss arising from constantly changing threats, and expedite and orchestrate data recovery responses to traditional disaster and ransomware events.
An enterprise browser is a specialized web browser designed for corporate use, featuring advanced security, centralized management, and seamless integration with enterprise systems. It ensures compliance with corporate policies, protects against cyber threats, and optimizes productivity by managing web access and securing sensitive data. The key features include comprehensive protection against malware and phishing, IT management tools for remote control of settings and policies, and secure data handling through encryption. The typical users include IT administrators, security professionals, and business leaders, and more.
EBPA is a comprehensive approach toward business and process modeling aimed at transforming and improving business performance with an emphasis on cross-viewpoint (strategy, analysis, architecture, automation), cross-functional analysis to support strategic and operational decisions.
Gartner defines the enterprise conversational AI platform market as the market for software platforms used to build, orchestrate and maintain multiple use cases and modalities of conversational automation. The enterprise conversational AI platform consists of: A capability layer providing runtime capabilities that include: Natural language understanding (NLU), Dialogue management, Channel integration, Back-end integration, Access control for platform users, Life cycle management; A tooling layer geared toward business users that includes: A no-code environment for building and maintaining applications, Analytic tools for understanding dialogue flows, NLU intent and entity tuning tools, A/B flow testing tools.
Enterprise information archiving (EIA) solutions are designed for archiving data sources to a centralized platform to satisfy information governance requirements, including regulatory and/or corporate governance and privacy; improve data accessibility; surface new data insights; and gain operational efficiencies. There are several core capabilities of this market. They include archiving digital communication content, such as email, workstream collaboration, instant messaging (IM) and SMS; classifying data and enabling retention management of archive content; creating a searchable index of content; and providing basic tools for e-discovery and supervision.
Gartner defines enterprise low-code application platforms (LCAPs) as platforms for accelerated development and maintenance of applications, using model-driven tools for the entire application’s technology stack, generative AI and prebuilt component catalogs. Enterprise LCAPs target software engineering teams responsible for custom application development and maintenance. Enterprise LCAP features include support for the collaborative development of all application components; runtime environments for high performance, availability and scalability of applications; application deployment and monitoring with detailed usage insights. Enterprise LCAP platforms feature governance controls and success management through self-service capabilities and APIs, developer documentation and training, and service-level agreements for platform operations. Enterprise LCAPs provide the foundation for developing a wide range of application types and application components, including complex front ends, business process automation and distributed data sources.
Reviews for 'Enterprise Networking and Communications - Others'
An enterprise search engine is a specialized search tool designed to help organizations index, search, and retrieve information stored within their internal data repositories. Unlike general web search engines that index and search the entire internet, enterprise search engines focus on the internal data of an organization, which can include documents, emails, databases, intranet sites, and other digital assets or data sources. Modern enterprise search engines often incorporate Natural Language Processing (NLP) and Machine Learning (ML) and AI-powered technologies to enhance their capabilities and improve the search experience. This type of search engine is adept at handling both structured and unstructured data, making it invaluable for diverse use cases such as knowledge management, customer support, and business intelligence. By integrating these enterprise search software capabilities, organizations can ensure that employees have quick and relevant access to the information they need, thereby improving productivity and decision-making.
Enterprise social networking applications facilitate, capture and organize open conversations and information sharing between individual workers and groups within an organization. In addition to capabilities that support conversations and information sharing, they can keep track of the network of relationships between participants (via social graphs), in order to deliver a personalized stream of updates about events or conversations to individuals (via news feeds and activity streams). These applications help people find out about each other, have discussions, share information and generally interact. Interaction occurs either at a one-to-one level, or in groups, teams, communities and networks, and in the context of structured or unstructured business activities.
Enterprise video content management (EVCM) comprises products intended to manage and facilitate the delivery of one-to-any, on-demand or live video across internet protocols. It may also include associated network services - content delivery networks (CDN) or enterprise content delivery networks (ECDN) - intended to facilitate the delivery of video. EVCM serves workers and customers who need to watch - and workers who need to share - videos.
Gartner defines an event broker as a technology that enables the publish-subscribe communication pattern between event producers and event consumers. An event broker can be delivered as hardware, as software or as a service. Event producers (also known as publishers or sources) publish events to a topic. Event consumers (also known as subscribers or sinks) subscribe to topics to see all related events. This means that event producers are typically unaware of, and decoupled from, event consumers. The role of the event broker is to mediate communications between event producers and event consumers
The market for ESP platforms consists of software subsystems that perform real-time computation on streaming event data. They execute calculations on unbounded input data continuously as it arrives, enabling immediate responses to current situations and/or storing results in files, object stores or other databases for later use. Examples of input data include clickstreams; copies of business transactions or database updates; social media posts; market data feeds; images; and sensor data from physical assets, such as mobile devices, machines and vehicles.
Gartner defines event technology platforms as tools that enable B2B marketers to execute virtual and/or in-person events for external audiences. These platforms provide native capabilities to engage and communicate with prospective attendees, registrants and sponsors, manage logistics, deliver content and enable attendees to engage with other participants. Out-of-the-box integrations with sales force automation and marketing automation platforms are provided to track engagement. Features and capabilities are provided in a self-service model, with some offering managed service support to run the technology when preferred.
Extended detection and response (XDR) delivers security incident detection and automated response capabilities for security infrastructure. XDR integrates threat intelligence and telemetry data from multiple sources with security analytics to provide contextualization and correlation of security alerts. XDR must include native sensors, and can be delivered on-premises or as a SaaS offering. Typically, it is deployed by organizations with smaller security teams.
External Attack Surface Management (EASM) refers to the processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers, exposed enterprise data such as credentials and third-party partner software code vulnerabilities that could be exploited by adversaries. EASM provides valuable risk prioritization and context and actionable information through regular or continuously monitoring and discovery for external-facing assets and systems. External attack surface management is a top priority for security teams and security risk managers.
Gartner defines FSM as software suites that support FSPs whose technicians typically travel to customer locations to provide installation, repair, inspection and maintenance services for equipment and systems (consumer, commercial or industrial). FSPs may also manage, maintain and monitor these assets under a predefined service or maintenance contract.
Full-stack HCI software provides a complete software solution that includes virtualized compute, storage and networking from a single instantiation designed to run on-premises or in a colocation environment. This market consists of those vendors that develop and sell hyperconverged infrastructure software that comprises the vendor’s own server virtualization, software-defined storage and network management tools. The full-stack software solution may also be integrated with a hardware stack as a complete offering spanning both software and hardware. In the last year, the full-stack HCI market has been heavily influenced by the positioning of storage virtualization and private cloud infrastructure looking to revirtualize compute, as well as considering alternatives to incumbent vendors.
Generative AI (GenAI) apps use generative AI capabilities for user experience and task augmentation to accelerate and assist the completion of a user’s desired outcomes. Generative AI refers to technologies that can generate new derived versions of content, strategies, designs and methods by learning from large repositories of original source content. When embedded in the experience, generative AI offers richer contextualization for singular tasks such as generating and editing text, code, images and other multimodal output. As an emerging capability, process-aware generative AI agents can be prompted by users to accelerate workflows that tie multiple tasks together. Apart from helping save time and money, generative AI apps help improve branding of businesses by creating more engaging and effective content while also creating more engaging and immersive experiences for customers. Please note that this market is based on Beta research and is continuously evolving. We will be making changes as and when there are new updates.
Generative AI (GenAI) engineering refers to the field of engineering that focuses on the development, implementation and optimization of generative AI models. Generative AI refers to technologies that can generate new derived versions of content, strategies, designs and methods by learning from large repositories of original source content. By developing GenAI models, engineers can create new and innovative ways to generate content. The vendors in this segment are made up by incumbent and startup vendors covering full-model life cycle management, specifically adjusted to and catering to development, refinement and deployment of generative models (e.g., LLMs) and other GenAI artifacts in production applications. Please note that this market is based on Beta research and is continuously evolving. We will be making changes as and when there are new updates.
Generative AI (GenAI) Infrastructure providers are infrastructure vendors (such as cloud platforms and hardware manufacturers) that offer underlying technology, tools and hardware that other companies and developers use to build and deploy specific generative AI applications in production. Generative AI refers to technologies that can generate new derived versions of content, strategies, designs and methods by learning from large repositories of original source content. These providers offer scalable, reliable and cost-effective solutions for generative AI projects, which can be complex and expensive to train and deploy. Generative AI infrastructure providers focus on research and developing the foundational AI techniques, while application developers focus on building products using those foundational technologies. Please note that this market is based on Beta research and is continuously evolving. We will be making changes as and when there are new updates.
Generative AI (GenAI) model providers focus on developing and providing generative AI technologies and make them available to other developers, businesses and general public through APIs or commercial licenses. Generative AI refers to technologies that can generate new derived versions of content, strategies, designs and methods by learning from large repositories of original source content. This layer of vendors offers access to commercial or open-source foundation models such as LLMs and other types of generative algorithms (such as GANs, genetic/evolutionary algorithms or simulations). These models can be provided for developers to embed into their applications or be used as base models for fine-tuning customized models for their software offerings or internal enterprise use cases. This helps businesses gain the benefits of advanced generative AI technologies while avoiding the high costs, expertise requirements and time needed to develop these technologies in-house. Please note that this market is based on Beta research and is continuously evolving. We will be making changes as and when there are new updates.
The global industrial IoT platform delivers multiple integrations to industrial OT assets and other asset-intensive enterprises’ industrial data sources to aggregate, curate and deliver contextualized insights that enable intelligent applications and dashboards through an edge-to-cloud architecture. The global industrial Internet of Things (IIoT) platform market exists because of the core capabilities of integrated middleware software that support a multivendor marketplace of intelligent applications to facilitate and automate asset management decision making. IIoT platforms also provide operational visibility and control for plants, infrastructure and equipment. Common use cases are augmentation of industrial automation, remote operations, sustainability and energy management, global scalability, IT/operational technology (OT) convergence, and product servitization of industrial products. The IIoT platform monitors IoT endpoints and event streams, supports and/or translates a variety of manufacturer and industry proprietary protocols, analyzes data in the platform, at the edge and in the cloud, integrates and engages IT and OT systems in data sharing and consumption, enables application development and deployment and can enrich and supplement OT functions for improved asset management life cycle strategies and processes. In some emerging use cases, the IIoT platform may obviate some OT functions.
Hadoop distributions are used to provide scalable, distributed computing against on-premises and cloud-based file store data. Distributions are composed of commercially packaged and supported editions of open-source Apache Hadoop-related projects. Distributions provide access to applications, query/reporting tools, machine learning and data management infrastructure components. First introduced as collections of components for any use case, distributions are now often delivered as part of a specific solution for data lakes, machine learning or other uses. They subsequently grow into additional, expanded roles, competing with both older technologies like database management systems (DBMSs) and newer ones like Apache Spark.
The hybrid cloud storage market comprises diverse deployment patterns with underlying technologies that address a wide range of data types. Products in this market must facilitate seamless data services across different environments, including disparate data centers, co-locations, edge locations and public cloud infrastructure. Hybrid cloud data solutions are offered through various means such as distributed hybrid infrastructure, hybrid cloud storage platforms, data transfer appliances, hyperconverged solutions, storage arrays, software-defined storage (SDS) products, and comprehensive data management software.
Reviews for 'IT Infrastructure and Operations Management - Others'
Gartner defines IT service management (ITSM) platforms as software that offers workflow management that enables organizations to design, automate, plan, manage, report on and deliver integrated IT services and related digital experiences. Supported practices include request, incident, problem, change, knowledge and configuration management, and case management, as well as interfaces for non-IT business needs. ITSM platforms are typically acquired as SaaS; however, they are also sold as on-premises deployments. I&O leaders select these solutions to be consumed by service desks and service operations, and are identifying opportunities for business workflows in other IT-adjacent departments.
Gartner defines identity governance and administration (IGA) as the solution to manage the identity life cycle and govern access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data, and provide full capability controls over accounts and associated access. IGA solutions also fulfill the purpose of unifying and correlating identity data for organizations with multiple person and machine identity authoritative sources. This is done to provide a single view of identity (system of record) for their dependent processes and systems
Information-centric security products focus on content, more than device, and apply encryption and authentication to block file access and movement from unauthorized people or circumstances. Endpoint systems are porous, mistakenly sharing data is easy, and users can be careless. Information-centric security is the last line of defense for data when firewalls, anti-malware tools, best practices and other traditional defenses fail. The scope of this market is the protection of stored information, commonly referred to as data at rest. The protection of data at rest in some ways takes precedence, because the interconnectedness of today’s systems often undermines network protections. In other words, high-value information should be protected “at rest” to prevent the risk of a breach caused by an unexpected data in motion event.
Infrastructure monitoring tools capture the health and resource utilization of IT infrastructure components, no matter where they reside (e.g., in a data center, at the edge, infrastructure as a service [IaaS] or platform as a service [PaaS] in the cloud). This enables I&O leaders to monitor and collate the availability and resource utilization data of physical and virtual entities — including servers, containers, network devices, database instances, hypervisors and storage. These tools collect data in real time and perform historical data analysis or trending of the elements they monitor.
Gartner defines insider risk management as a methodology that includes the tools and capabilities to measure, detect and contain undesirable behavior of trusted accounts in the organization. It includes solutions that monitor the behavior of employees, service partners and key suppliers working inside the organization. These tools then evaluate whether behavior falls within the expectations of the role and corporate risk tolerance. For CISOs and cybersecurity leaders, insider risk management refers to the use of technical solutions to solve a fundamentally human problem. Managing insider risks requires collaboration among many cross-functional partners. Components of an insider risk management methodology are policies, guidelines and investigative work that fall outside the bounds of a typical cybersecurity organization. For our purposes, the insider risk management market consists of tools and solutions that monitor the behavior of employees, service partners and key suppliers working inside the organization. It evaluates whether behavior falls within the expectations of the role and corporate risk tolerance.
Gartner defines Insight Engines as follows: Insight engines apply relevancy methods to discover, analyze, describe and organize content and data. They enable the interactive or proactive delivery or synthesis of information to people, and data to machines, in the context of their respective business moments. Insight engines should be viewed as platforms on which applications are provided, developed or augmented by applying the capabilities listed above to specific employee and customer experience use cases. Such applications are provided out of the box by vendors (e.g., intranet or site search), developed through technical partnerships (e.g., search within third-party applications), developed with customers in-house (e.g., expert finder), or developed through integration with third-party applications (e.g., extracting data from documents to support RPA).
Integrated Development Environment software provides an interface to write code facilitating application development. IDEs provide programmers with tools to design, build, test, and debug software programs in a graphical user interface (GUI). The user can write and edit source code in the code editor. The compiler in the IDEs translates the source code into an executable language for the computer. The debugger helps examine the code to detect and solve any issues or bugs. Some of the IDEs have advanced features like refactoring, code search, data visualization, continuous integration and continuous deployment (CI/CD) tools.
Integrated systems combine server, shared storage and network devices, along with management software and support in a preintegrated stack. The integrated system market has four segments: integrated infrastructure system, integrated reference architecture, integrated stack system and hyperconverged infrastructure (HCI) segment. The overall HCI segment is further subdivided into Hyperconverged Integrated Systems (HCIS), which provides both software and hardware in an appliance model and the software only segment in which vendors provide the Hyperconverged software. This is then integrated with HW by a reseller or the end customer.
Gartner defines integration platform as a service (iPaaS) as a vendor-managed cloud service that enables end users to implement integrations between a variety of applications, services and data sources, both internal and external to their organization. iPaaS enables end users of the platform to integrate a variety of internal and external applications, services and data sources for at least one of the three main uses of integration technology: Data consistency: The ability to monitor for or be notified by applications, services and data sources about changes, and to propagate those changes to the appropriate applications and data destinations (for example, “synchronize customer data” or “ingest into data lake”). Multistep process: The ability to implement multistep processes between applications, services and data sources (for example, to “onboard employee” or “process insurance claim”). Composite service: The ability to create composite services exposed as APIs or events and composed from existing applications, services and data sources (for example, to create a “credit check” service or to create a “generate fraud score” service). These integration processes, data pipelines, workflows, automations and composite services are most commonly created via intuitive low-code or no-code developer environments, though some vendors provide more-complex developer tooling.
Gartner defines an intranet packaged solution (IPS) as a software product that organizations use to create and deploy an internal website or network of websites, portals, hubs, mobile apps and other digital experiences supporting business-to-employee needs. An IPS is delivered as an integrated assembly of capabilities geared specifically for intranet use cases, including employee communications and engagement, employee service and self-service, application access and knowledge services. “Packaged” signifies a holistic and fit-for-purpose approach. In contrast, a custom-built or developed approach would leverage a platform or array of products not specifically designed to support intranet use cases.
Gartner defines the invoice-to-cash (I2C) applications market as cloud-based applications that enable corporate controllers to automatically manage collections and apply customer payments to invoices. I2C applications typically gather, disseminate, track and analyze data from and to internal and external sources. They make I2C processes more efficient and effective, including managing and monitoring deductions, disputes and credit risk. They also typically can ensure invoices are delivered to customers and that customers have options to pay them. I2C applications enable I2C transaction processing across multiple ERP systems. Organizations use I2C applications to collect and apply customer payments to open invoices, perform credit and collections activities, manage deductions and disputes, and deliver and present invoices to customers for payment. I2C applications are cloud-based tools that provide organizations with a standard way of processing across ERPs, while creating flexibility for buyers in how they receive or access invoices as well as pay and dispute them. I2C applications allow an organization to connect and exchange data with multiple ERP systems and other operational tools, such as customer relationship management tools, as well as with partners such as credit and collections agencies, logistics providers, banks and payment service providers. They use data to determine credit risk, automate collections and cash applications activities as well as help manage the resolution of deductions and disputes. Such activities result in faster collection of cash, improved visibility to cash flow, an improved customer experience and reduced process cost.
The amount of information being transmitted from things continues to rise. Much of this data originates outside of the enterprise. The scale of security risks in the Internet of Things (IoT) era is therefore much greater than in the pre-IoT environment, and the 'attack surface' is much larger. Most sensor-based things have minimal computing resources, and the opportunities for antivirus, encryption and other forms of protection within things are more restricted. Therefore, IoT security products with a variety of capabilities emerged to help dispel some of these challenges.
Gartner defines managed hybrid cloud hosting (MHCH) as a standardized, productized offering that combines a cloud-enabled system infrastructure platform — consisting of a pool of compute, network and storage hardware — with cloud infrastructure framework software to facilitate self-service and rapid provisioning. In addition to offering this service from cloud infrastructure located in its own data center, the provider must offer a choice of using a hyperscale public infrastructure as a service (IaaS) provider or an Asian country-specific, large-scale IaaS provider. The infrastructure platform should be located both in a service provider's data center for the cloud-enabled system infrastructure (CESI) platform and in an Asia country for the public IaaS platform. It also requires the use of a standardized deployment across all service provider customers and leverages a single codebase.
MDM is a technology-enabled business discipline in which business and IT work together to ensure the uniformity, accuracy, stewardship, governance, semantic consistency and accountability of an enterprise’s official shared master data assets. Master data has the lowest number of consistent and uniform sets of identifiers and attributes that uniquely describe the core entities of the enterprise and are used across multiple business processes.
Master data management (MDM) of customer data solutions are software products that: Support the global identification, linking and synchronization of customer information across heterogeneous data sources through semantic reconciliation of master data. Create and manage a central, persisted system of record or index of record for customer master data. Enable the delivery of a single, trusted customer view to all stakeholders, to support various business initiatives. Support ongoing master data stewardship and governance requirements through workflow-based monitoring and corrective-action techniques. Are agnostic to the business application landscape in which they reside; that is, they do not assume or depend on the presence of any particular business application(s) to function.
Meeting solutions are real-time communication services with their associated devices that support live interactions between participants for internal and external collaboration, presentations, learning, training sessions and webinars. Meeting solutions power diverse use cases, such as one-on-one meetings, remote sales engagements, board meetings, telehealth sessions, remote banking and consulting services, to name just a few. Meeting solutions enable rich information sharing and interaction by combining audio and video, in-meeting chat, content and screen sharing, and visual collaboration and whiteboarding.
Gartner defines microsegmentation as the ability to insert a security policy into the access layer between any two workloads in the same extended data center. Microsegmentation technologies enable the definition of fine-grained network zones, down to individual assets and applications. Core capabilities include: - Flow mapping, which is the ability to gather and show North/South and East/West traffic flows and use them in the policy definition (it can present this data in a visual manner) - Workload isolation, which is isolation from other workloads based on security policy - Policy enforcement, including the definition of rules based on different factors - The ability to deploy in the virtualized and infrastructure as a service environments Some of the most frequent optional capabilities of microsegmentation technologies include: - Automation of the deployment as part of a continuous integration/continuous deployment (CI/CD) pipeline - Integration with cloud infrastructure to ease deployment, enforce rules or automate policy updates when new assets are deployed - Asset discovery: adjacent to the flow mapping, microsegmentation tools can show more advanced context for the assets - Policy recommendation engine: complementary to the asset discovery, microsegmentation technology can suggest policy rules to authorize discovered flows - Threat detection: based on threat intelligence, layer seven protocol inspection and anomaly detection - Interoperability through direct integration with third-party products, such as a firewall, and hardware, such as switches and routers - Internet of Things (IoT)/operational technology (OT) coverage — the solution supports microsegmentation for IoT/OT infrastructure - Kubernetes/Container coverage — the solution supports microsegmentation for containers/K8s
Implementation and support services for Office 365 (including Microsoft SharePoint and Microsoft Teams for Office 365 Enterprise E3 and E5) include readiness assessment, user directory preparation, network remediation, data migration, system integration, risk mitigation and organizational change management activities. This enables a move from existing on-premises Microsoft applications to cloud-based solutions.
Gartner defines a mobile application management (MAM) tool as an on-premises or SaaS tool specifically designed for the license management, distribution, securing and life cycle management of apps for mobile device platforms. Thus, MAM tools provide integration with public app store payment and licensing mechanisms (such as Apple's Volume Purchase Program [VPP]), an enterprise app store, and the ability to set policies related to security, usage and ongoing management for apps or groups of apps. At minimum, a MAM product supports native and HTML 5 apps. Many also support a variety of popular hybrid app architectures, which may be highly desirable based on a particular client's needs.
Gartner defines mobile data protection (MDP) products and services as software security methods that enforce confidentiality policies by encrypting data, and then defending access to that encrypted data on the mass storage systems of end-user workstations. These storage systems include the primary boot drive of a workstation, additional system drives and removable devices used for portability. Storage technologies affected by MDP include magnetic hard-disk drives (HDDs), solid-state drives (SSDs), self-encrypting drives (SEDs), flash drives and optical media. Several methods allow MDP products to delegate all or part of the encryption process to be accomplished by hardware elements, including the CPU and drive controller, and to native capabilities in the OS. Some vendors also have protection capabilities for network storage, and a few also support cloud-based storage environments as an extension to the desktop.
Mobile threat defense (MTD) products protect organizations from malicious threats on iOS and Android devices, at the device, network and application levels. To successfully attack a mobile device, mobile malware must circumvent the controls built into mobile OSs, such as those for app store curation and native mobile OS hardening. MTD products tend to focus on preventing and detecting anomalous behavior by collecting and analyzing indicators of compromise, as well as expected behavior. MTD products gather threat intelligence from the devices they support, as well as from external sources, and use an analysis engine that resides in the cloud, on-premises or on an MTD app installed on devices.
Gartner defines multichannel marketing hubs (MMHs) as software applications that orchestrate personalized communications to individuals in common marketing channels. MMHs optimize the timing, format and content of interactions through the analysis of customer data, audience segments and offers. MMHs are foundational for multichannel marketing, customer journey orchestration and next best action programs.
An MXDP is an opinionated, integrated set of front-end development tools and “backend for frontend” (BFF) capabilities. It enables a distributed, scalable development approach (in terms of both teams and architecture) to build fit-for-purpose apps across digital touchpoints and interaction modalities. At minimum, an MXDP must support cross-platform development and building of both custom iOS and Android app binaries, responsive web apps, and at least one of the following: PWAs, chatbots, voice apps, wearables and Internet of Things (IoT) apps, and augmented-reality (AR) and mixed-reality (MR) apps.
Gartner defines the network firewall market as the market for firewalls that use bidirectional stateful traffic inspection (for both egress and ingress) to secure networks. Network firewalls are enforced through hardware, virtual appliances and cloud-native controls. Network firewalls are used to secure networks. These can be on-premises, hybrid (on-premises and cloud), public cloud or private cloud networks. Network firewall products support different deployment use cases, such as for perimeters, midsize enterprises, data centers, clouds, cloud-native and distributed offices.
Network management tools are software applications used to monitor, maintain, and administer computer networks. They help in ensuring the network's efficient operation, detecting and resolving problems, and optimizing performance. Key functions include monitoring network traffic, managing network devices, ensuring security, and troubleshooting issues. Network Administrators, IT Managers, and Security Professionals utilize these tools to monitor and manage network hardware effectively. They track the performance of network devices such as routers and switches, ensuring these devices operate optimally. Additionally, they maintain and update the configuration of these network components to ensure robust security and efficient network functionality.
OKR Software is a tool which helps individuals, teams and broader organization set, track and measure their goals and objectives. It facilitates the implementation of the OKR framework, which is a popular goal-setting methodology used by businesses to align the objectives of teams and individuals with the overall organizational strategy. It provides insights into progress and areas for improvement through reporting and analytical dashboards and is also easily integratable with other productivity tools and systems. By using it, organizations can improve their goal setting process, increase transparency, and foster a culture of accountability and continuous improvement.
Gartner defines observability platforms as products that ingest telemetry (operational data) from a variety of sources including, but not limited to, logs, metrics, events and traces. They are used to understand the health, performance and behavior of applications, services and infrastructure. Observability platforms enable an analysis of the telemetry, either via human operator or machine intelligence, to determine changes in system behavior that impact end-user experience such as outages or performance degradation. This allows for early, and even preemptive, problem remediation. Observability solutions are used by IT operations, site reliability engineers, cloud and platform teams, application developers, and product owners. Observability platforms are used by organizations to understand and improve the availability, performance and resilience of these critical applications and services. Investment in and successful deployment of observability platforms leads to revenue loss avoidance and enables faster product development cycles and improvements in brand perception.
Reviews for 'Office Productivity Solutions - Others'
Gartner defines operational technology (OT) as “hardware and software that detects or causes a change, through direct monitoring and/or control of industrial equipment, assets, processes and events”. OT security includes practices and technologies used to protect them, but these practices and technologies are now evolving into distinct categories to address the growing threats, security practices and vendor dynamics.
Predictive analytics software uses advanced analytics capabilities to analyze current and historical data to make predictions about future events. This software connects data from different data sources and employs techniques like data mining and statistical analysis to forecast future trends, detect patterns, identify potential risks and opportunities, and plan for the best possible outcome. As a result, organizations can make better business decisions with machine-generated analytics, visualization, and reporting on predictive insights. These can be used in a wide range of industries, including healthcare, finance, marketing, and manufacturing.
Process mining platforms are designed to discover, monitor and improve processes by extracting knowledge from events captured in information systems to continuously deliver visibility and insights. Process mining includes automated process discovery (extracting process models from an event log), conformance checking (monitoring deviations by comparing model and log), social network/organizational mining, automated construction of simulation models, model extension, model repair, case prediction and history-based recommendations. Process mining platforms extend process mining capabilities by advanced process analytics, process improvement detection and process improvement recommendations, partly driven by AI and generative AI (GenAI).
PPM software providers covered under this market definition aim to support the selection, planning and execution of a variety of different work packages or containers, including, but not limited to, traditional projects. They often fold in collaboration and communication capabilities and allow work teams and project offices to report, monitor and identify course correction in resource-intensive project and work environments. Providers included in this market offer these capabilities directly through their own products, but frequently recognize that specific integration points may also be needed to connect niche tools or data sources. The PPM capabilities identified as essential or critical include: • Project demand management • Project planning and management • Time management • Resource management • Resource capacity planning • Project portfolio management • Project collaboration • Program management • Reporting services • Security and user management • Integration • Usability
Public cloud storage is infrastructure as a service (IaaS) that provides block, file, object and hybrid cloud storage services delivered through various protocols. The services are stand-alone, but often used in conjunction with compute and other IaaS products. The services are priced based on capacity, data transfer and/or number of requests. The services provide on-demand storage capacity and self-provisioning capabilities. Stored data exists in a multitenant environment, and users access that data through the block, network and REST protocols provided by the services.
Rapid mobile app development (RMAD) tools are a class of coding-optional tools that enable nonprogrammers to build mobile apps to support, at a minimum, iOS and Android devices. These tools offer high productivity for developers and nondevelopers alike through a variety of approaches that both automate and abstract app development efforts, including drag-and-drop editors, code generation and orchestration, model-driven development, virtualization, business process mapping, component assembly, app configuration and forms construction.
DOM systems use configurable rule-based procedures to orchestrate the fulfillment of customer orders placed through a retailer’s online channel, although many nonretailers are now also exploring or using DOM capabilities within their own supply chain. The purpose of a DOM system is to allow companies to optimize their order fulfillment performance while balancing two primary constraints: - The customer’s expected lead time for receiving their order on-time, in-full - The company’s desire to meet these customer expectations at the optimum fulfillment cost
Gartner defines retail media networks as packaged retail website search, display, app, in-store assets and other digital advertising opportunities (e.g., ad impressions) that are sold to brands and advertisers. Retailers leverage media networks to execute their unified retail commerce strategy and to develop new lines of revenue, while advertisers aim to increase their exposure to and influence the behavior of retail shoppers at or near the final point of purchase. RMNs offer retailers supplemental revenue from their owned digital and physical assets and datasets. RMNs let companies buy branding and conversion-oriented ads at or near the final point of purchase — which stands out as its unique selling proposition. Retailers build RMNs to aggregate audiences of shoppers across commerce websites, apps, and digital assets in physical stores into media opportunities for advertisers. These media opportunities, including search listing ads, product ads (display and video) and audio, are purchased by advertisers through direct insertion orders or digital buying methods like programmatic real-time auctions. Marketing and technology leaders at retailers develop these advertising exchange capabilities internally or partner with ad technology platforms, such as with demand- and supply-side partners, to offer their media for sale in a scalable and cost-efficient way. In addition to their value as media opportunities, retailers can assemble these audiences into valuable data segments by historical browsing and purchase behavior, which can be used to improve both on-site personalization and targeting.
Gartner defines robotic process automation (RPA) as the software to automate tasks within business and IT processes via software scripts that emulate human interaction with the application UI. RPA enables a manual task to be recorded or programmed into a software script, which users can develop by programming, or by using the RPA platform’s low-code and no-code GUIs. This script can then be deployed and executed into different runtimes. The runtime executable of the deployed script is referred to as a bot, or robot. RPA is used across numerous business functions for tactical task automation. Business and IT users can leverage RPA to: Move data in or out of application systems without human interaction (unattended automation). Scripts are designed to replicate the actions of a human interacting with those systems or documents, which usually do not have available APIs. The goal is to automate and complete a task successfully without human intervention. Typically, unattended automation is triggered by a system and bots executed on a server. Automate tasks with a human in the loop (attended automation). RPA can extract information from systems and related documents, shaping it and preparing it for consumption by a human at the point of need. Typically, attended automation is triggered by a human and bots executed on a local device.
Sales engagement applications (SEAs) streamline how sellers execute sales activities and deal workflows at scale. They optimize seller productivity by combining three key capabilities into a single interface: multichannel engagement (e.g., email, voice, SMS, video, social media), outbound workflow execution and time-saving AI/automation. Sellers rely on SEAs to streamline guidance into whom to engage and when, and what messaging to use, while capturing sales activities back into sales force automation (SFA) platforms.
Gartner defines sales force automation platforms as AI-augmented tools supporting automation and capture of sales activities, processes and administrative tasks, facilitating initiation, engagement and documentation of buyer-seller interactions through multiexperience and channel-agnostic approaches and devices. They leverage advanced analytics to support actionable insights, tracking and monitoring sales contact, pipeline and opportunity management; guided selling; and forecasting process execution. Optimal UX for sales managers or leadership extends beyond internal use cases, and is scalable to support buyer-seller intermediation and shared prospect/customer experiences. These platforms incorporate AI features beyond add-on products in predictive and prescriptive analytics, ML and NLP, enhancing processes and customer interactions. Sales force automation (SFA) is a foundational sales technology implemented to automate and augment an organization’s core sales processes. Leveraging AI and advanced analytics, it enhances the seller’s ability to engage with customers across various interaction touchpoints and devices. It not only streamlines administrative tasks, but also provides actionable insights for improved sales contact, pipeline and opportunity management.
Scheduling Automation software is a tool designed to automate and streamline the process of scheduling and managing appointments, meetings, tasks, and other time-related activities. The software improves overall efficiency in scheduling processes, enhances communication, reduces manual efforts, and scheduling conflicts. The typical features include calendar integration, online appointment booking, availability management, reminders and notifications, time zone management, and resource allocation. It is widely leveraged by individuals, teams, or organizations across various industries, such as healthcare, customer service, education, project management, and more.
Gartner defines Search and Product Discovery as applications that augment digital commerce solutions to facilitate navigation, filtering, comparisons, and ultimately selection of products. They provide search (keyword, natural language and visual), merchandising (automation, configuration, and curation of business rules to make a product discoverable based on business needs), product recommendations, catalog navigation (and SEO keyword automation), personalization and analytics capabilities through SaaS to enable customers (B2C and B2B) to transact. They also enable providers (merchandisers, content managers, and search specialists) to support customer experiences. With the emergence of generative AI, conversational search interfaces are now appearing. Search and Product Discovery applications use product data to facilitate navigation, filtering, comparisons and ultimately product selection. Search results can be highly visual, using engaging layouts and multimedia. Content other than product information, such as educational information, compliance materials and related news may also be included in search results to engage customers and further support buying decisions.
SIEM is a configurable security system of record that aggregates and analyzes security event data from on-premises and cloud environments. SIEM assists with response actions to mitigate issues that cause harm to the organization and satisfy compliance and reporting requirements. The security information and event management (SIEM) system must assist with: 1. Aggregating and normalizing data from various IT and operational technology (OT) environments 2. Identifying and investigating security events of interest 3. Supporting manual and automated response actions 4. Maintaining and reporting on current and historical security events
Security orchestration, automation and response (SOAR) solutions combine incident response, orchestration and automation, and threat intelligence (TI) management capabilities in a single platform. SOAR tools are also used to document and implement processes (aka playbooks, workflows and processes); support security incident management; and apply machine-based assistance to human security analysts and operators. SOAR solutions must provide: - Highly customizable workflow process management that enables repeatable automated tasks to be turned into playbooks that run in isolation or joined together into more sophisticated workflows. - The ability to store (locally or in a third-party system) incident management data to support SecOps investigations. - Manually instigated and automated triggers that augment human security analyst operators to carry out operational tasks consistently. - A mechanism to collate and better operationalize the use of threat intelligence. - Support for a broad range of existing security technologies that supports improved analyst efficiency and acts as an abstraction layer between the desired outcomes and the custom-made set of solutions in place in your environment.
Gartner defines security service edge (SSE) as a solution that secures access to the web, cloud services and private applications regardless of the location of the user or the device they are using or where that application is hosted. SSE protects users from malicious and inappropriate content on the web and provides enhanced security and visibility for the SaaS and private applications accessed by end users. Security service edge provides a primarily cloud-delivered solution to control access from end users and edge devices to applications (private or delivered via SaaS) as well as websites (and to a lesser extent general internet traffic). It enables a hybrid workforce more efficiently than traditional on-premises solutions. Capabilities integrated across multiple traffic types and destinations allow a more seamless experience for both users and admins while maintaining a consistent security stance.
Reviews for 'Security Solutions - Others'
The security threat intelligence products and services market refers to the combination of products and services that deliver knowledge (context, mechanisms, indicators, implications and action-oriented advice), information and data about cybersecurity threats, threat actors and other cybersecurity-related issues. The output of these products and services aims to provide or assist in the curation of information about the identities, motivations, characteristics and methods of threats, commonly referred to as tactics, techniques and procedures (TTPs). The intent is to enable better decision making and improve security technology capabilities to reduce the likelihood and impact of a potential compromise. Threat intelligence (TI) products and services support the different stages of a TI process life cycle. In particular, this involves defining the aims and objectives, collecting and processing intelligence originating from various sources, analyzing and disseminating it to different stakeholders within the organization, and regularly providing feedback on the entire process. These products and services support ongoing security investigations and assist in preventing future breaches by prioritizing infrastructure hardening. TI tools and services are most commonly cloud-based products and services, but can also be delivered “as a service.”
Sentiment Analysis Tools enable organizations to analyze all forms of text data to determine the overall sentiment, opinion, or emotional tone expressed by the users in their messages. These tools use technologies such as machine learning, natural language processing (NLP), text analysis, and biometrics for analyzing and breaking a large amount of text data into small chunks to identify the underlying sentiment of a message. The underline sentiment can be positive, negative, or neutral, which is calculated by assigning the sentiment score based on a pre-determined scale to each chunk. These tools also provide multilingual support to enable sentiment analysis across different languages. These tools are commonly used in marketing, customer support, e-commerce, and finance.
Server virtualization includes a range of technologies that abstract an underlying infrastructure layer (networking, storage and compute [including memory]). In doing so, it improves hardware utilization, workload portability, automation and availability. Server virtualization is most often associated with hypervisor-based server workloads running in data center environments on industry-standard servers. In reality, server virtualization incorporates multiple technologies, spans locations from public cloud to edge, and supports initiatives for both cloud-native transformation and infrastructure modernization. It includes hardware-, cloud- and software-based technologies.
Gartner defines the service orchestration and automation platform (SOAP) market as encompassing solution suites that deliver capabilities enabling organizations to manage workloads, workflows, resource provisioning and data pipelines across their technology landscapes. SOAPs enable infrastructure and operations (I&O) leaders to design and implement business services. These platforms combine workflow orchestration, workload automation and resource provisioning across an organization’s hybrid digital infrastructure. Increasingly, they are central to an organization’s ability to deploy workloads and to optimize deployments as a part of cost and availability initiatives. SOAPs expand the role of traditional workload automation by adapting to use cases that deliver and extend into data pipelines, cloud-native infrastructures and application architectures. These tools complement and integrate with DevOps toolchains to provide customer-focused agility, cost savings, operational efficiency and process standardization.
Social analytics is the process of collecting, measuring, analyzing and interpreting the results of interactions and associations among people, topics and ideas from social media sources. This market examines social analytics solutions covering social filtering, text analytics, sentiment analysis, image analysis and public-facing social media analytics. It focuses on solutions that derive at least 60% of their revenue from software versus solutions that are mainly based on consulting services.
The market for social software in the workplace includes software products that support people working together in teams, communities or networks. These products can be tailored to support a variety of collaborative activities. Buyers are looking for virtual environments that can engage participants to create, organize and share information, and encourage them to find, connect and interact with each other. Business use of these products ranges from project coordination within small teams or homogeneous groups, to information exchange between employees across an entire organization.
Software asset management (SAM) tools are solutions that provide automation to support tasks required to produce and maintain compliance with independent software vendor (ISV) license use rights, while improving an organization’s ability to proactively identify and optimize software risk and spend. SAM tools provide in-depth software asset analysis through: - Conducting discovery - Analyzing software license entitlements - Automating the collection of software consumption data - Establishing ISV effective license position (ELP) - Governing software assets - Optimizing software value delivery - Sharing information with other tools and stakeholders
Gartner defines speech-to-text (STT) platforms as business applications that process speech content, either live or in batch to produce: A transcript of the conversation Metadata about the call, the callers, attributes of call, emotional context Value-added services (e.g., biometric, legal) Workflow tools to support downstream work (e.g., intent detection, CRM updates) The capabilities of STT solutions vary. At a minimum, providers can offer a set of generic APIs with no tailored industry offering. More advanced solutions support complex deployments of edge technologies tailored to specific industries such as medical and legal. As natural language experiences are rapidly adopted by customers, users and employees, STT solutions must address a number of deployment configurations and be tailored for end-user domain knowledge to improve their accuracy.
Gartner defines strategic cloud platform services (SCPS) as standardized, automated, public cloud offerings integrating infrastructure services (e.g., computing, network and storage), platform services (e.g., application, data and value-added services such as AI/ML) and transformation services (resources to help customers adopt cloud-oriented IT delivery models). Although owned by the service provider, infrastructure and platform services may be hosted in providers’ infrastructures or customers’ data centers. Services should be elastically scalable, metered by use, and consumable via web-based interfaces and programmable APIs. Transformation programs may be delivered by automated, self-service interfaces, and managed interactions facilitated by account teams/partners.
The structured data archiving and application retirement market is identified by an array of technology solutions that manage the life cycle of application-generated data and accommodate corporate and regulatory compliance requirements. Application-generated data is inclusive of databases and related unstructured data. SDA solutions focus on improving the storage efficiency of data generated by on-premises and cloud-based applications and orchestrating the retirement of legacy application data and their infrastructure. The SDA market includes solutions that can be deployed on-premises, and on private and public infrastructure, and includes managed services offerings such as SaaS or PaaS.
Gartner defines supply chain planning (SCP) solutions as platforms that provide technological support to enable a company to manage, link, align, collaborate and share its planning data across an extended supply chain. An SCP solution supports planning, ranging from demand planning through detailed supply-side response planning and from strategic planning through execution-level planning. It is the planning decision repository for a defined end-to-end supply chain. It is also the environment in which end-to-end-integrated supply chain decisions are managed. It establishes a single version of the truth for planning data and decisions, regardless of the underlying execution technology environment. Organizations use SCP solutions to improve their supply chain planning decisions and reach higher levels of maturity.
All unified communications (UC) solutions are intended principally to improve user productivity and enhance business processes that relate to communications and collaboration. Gartner defines UC solutions — equipment, software and services — as offerings that facilitate the use of multiple enterprise communications methods to achieve those aims. UC solutions integrate communications channels (media), networks and systems, as well as IT business applications, and, in some cases, consumer applications and devices. UC offers the ability to significantly improve how individuals, groups and companies interact and perform. The UC solutions that enterprises deploy range from stand-alone suites from single vendors, to integrated applications and platforms from multiple vendors. UC is often deployed to extend and add functionality to established communications investments.
Gartner defines unified communications as a service (UCaaS) as a multitenant, subscription-based service. It is cloud-delivered, and it provides business telephony features; external, public switched telephone network (PSTN) connectivity that enables inbound or outbound calling; and collaboration features, such as messaging and meetings. UCaaS services can be consumed by end users with traditional handsets, desktop clients, meeting room systems and mobile apps. Gartner’s definition of meetings for the UCaaS market focuses on the capabilities for internal collaboration, work from home and external presentation meeting use cases only. Other specialized use cases — such as webinar, remote support, distance learning and training — are often available from UCaaS offerings, but are not mandatory for this research. These use cases are part of a separate market defined by Gartner (meeting solutions).
Gartner defines a unified endpoint management (UEM) tool as a software-based tool that provides agent and agentless management of computers and mobile devices through a single console. Modern UEM tools: Provide a user-centric view of devices across device platforms; Offer agent and/or agentless management through native Windows endpoint, macOS, Linux and Chrome OS controls. Offer agentless mobile management through native Apple iOS/iPad OS and Google Android controls; Aggregate telemetry and signals from identities, apps, connectivity and devices to inform policy and related actions; Aggregate and analyze technology performance and employee experience data; Integrate with identity, security and remote access tools to support zero-trust access and contextual authentication, vulnerability, policy, and configuration and data management; Manage nontraditional devices, including Internet of Things (IoT) devices, wearables and rugged handhelds.
Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. User authentication is foundational to and protects the value of other functions with an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD); audit (individual accountability); and identity analytics.
Visual collaboration applications enable teams to communicate and creatively collaborate for asynchronous and real-time work activities on a blank, infinitely scalable shared digital canvas. These applications support colocated and remote users to create, co-edit, review and share precreated content to visualize complex ideas. Some vendors also provide extended capabilities such as voice and video communication, APIs to connect with other business applications, and predesigned templates for structured formats. The users can export created content in portable formats. These applications are generally offered as cloud-based SaaS products, but a few vendors offer on-premises and private cloud deployment options as well.
Visual intelligence helps customers find products with relevant visual attributes using real-world images, video and text. Expanding on visual search capabilities, this helps customers identify a specific product, provides related content or detailed information, or otherwise triggers engagement. These solutions analyze catalogs to understand taxonomy and product attributes in addition to visual features, product identification using technologies like computer vision, natural language processing and machine learning. This technology helps ease the path to purchase, driving consumers in sectors like Healthcare, Sports & entertainment, manufacturing , retail etc., from awareness to conversion in an instant by presenting products with relevant visual attributes.
VA solutions identify, categorize and prioritize vulnerabilities as well as orchestrate their remediation or mitigation. Their primary focus is vulnerability and security configuration assessments for enterprise risk identification and reduction, and reporting against various compliance standards. VA can be delivered via on-premises, hosted and cloud-based solutions, and it may use appliances and agents. Core capabilities include: - Discovery, identification and reporting on device, OS, software vulnerabilities and configuration against security-related criteria - Establishing a baseline for systems, applications and databases to identify and track changes in state - Reporting options for compliance, control frameworks and multiple roles Standard capabilities include: - Pragmatic remediation prioritization with the ability to correlate vulnerability severity, asset context and threat context that then presents a better picture of true risk for your specific environment - Guidance for remediating and configuring compensating controls - Management of scanner instances, agents and gateways - Direct integration with, or API access to, asset management tools, workflow management tools and patch management tools
Gartner defines a warehouse management system (WMS) as a software application that helps manage and intelligently execute the operations of a warehouse, distribution center (DC) or fulfillment center (FC). WMS operations natively exploit mobile devices along with bar codes and potentially RFID or other scanning/sensing technologies, to form the transactional foundation of warehouse management. This enables efficiencies of directed work activity (optimization) and the delivery of accurate information in near real time. Core WMS capabilities address, among others, the needs to receive, put away, store, count and pick, pack and ship goods. Gartner also includes additional integrated functionality offered by WMS providers beyond core WMS. These extended WMS capabilities can include more advanced capabilities such as managing labor or optimizing the locating of inventory within a facility.
The workstream collaboration (WSC) market consists of products that deliver a conversational workspace based on a persistent group chat. Products in this market are primarily used to organize, coordinate, and execute outcome-driven teamwork such as that associated with the project- or process-related activities. Secondary uses can include ad hoc collaboration and community discussions.
Gartner defines zero trust network access (ZTNA) as products and services that create an identity and context-based, logical-access boundary that encompasses an enterprise user and an internally hosted application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a collection of named entities, which limits lateral movement within a network.