Gartner defines AI-augmented software testing tools as enablers of continuous, self-optimizing and adaptive automated testing through the use of AI technologies. The capabilities run the gamut of the testing life cycle including test scenario and test case generation, test automation generation, test suite optimization and prioritization, test analysis and defect prediction as well as test effort estimation and decision making. These tools help software engineering teams to increase test coverage, test efficacy and robustness. They assist humans in their testing efforts and reduce the need for human intervention in the different phases of testing.
Gartner defines access management (AM) as tools that include authentication and single sign-on (SSO) capabilities, and that establish, manage and enforce runtime access controls for modern standards-based and classic web applications and APIs. AM’s purpose is to enable SSO access for people (employees, consumers and other users) and machines to protected applications in a streamlined and consistent way that enhances the user experience. AM is also responsible for providing security controls to protect the user session in runtime, enforcing authentication and authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools and reliant applications to enable identity-first security.
Accounts payable invoice automation (APIA) tools automate the capture, validation and processing of invoices. These solutions attempt to automatically match invoices to purchase orders (POs) and contracts, or automatically code those invoices that would not have a PO. Payment management, ranging from OK to pay to complete invoice payment, is also included. The expanded scope of APIA includes advanced capabilities, such as automated multiway matching, fraud detection and cash management.
Analytics and business intelligence platforms — enabled by IT and augmented by AI — empower users to model, analyze and share data. Analytics and business intelligence (ABI) platforms enable organizations to understand their data. For example, what are the dimensions of their data — such as product, customer, time, and geography? People need to be able to ask questions about their data (e.g., which customers are likely to churn? Which salespeople are not reaching their quotas?). They need to be able to create measures from their data, such as on-time delivery, accidents in the workplace and customer or employee satisfaction. Organizations need to blend modeled and nonmodeled data to create new data pipelines that can be explored to find anomalies and other insights. ABI platforms make all of this possible.
The application development life cycle management (ADLM) tool market focuses on the planning and governance activities of the software development life cycle (SDLC). ADLM products focus on the 'development' portion of an application's life. Key elements of an ADLM solution include: software requirements definition and management, software change and configuration management, software project planning, with a current focus on agile planning, work item management, quality management, including defect management. Other key capabilities include: reporting, workflow, integration to version management, support for wikis and collaboration, strong facilities for integration to other ADLM tools.
Reviews for 'Application Development, Integration and Management - Others'
Gartner defines the application security testing (AST) market as the buyers and sellers of products and services designed to analyze and test applications for security vulnerabilities. This market is highly dynamic and continues to experience rapid evolution in response to changing application architectures and enabling technologies. AST tools are offered either as software-as-a-service (SaaS)-based subscription offerings, or less often, as on-premises software. Many vendors offer both options.
Gartner defines artificial intelligence applications in IT service management as tools that augment and extend IT service management (ITSM) workflows using AI. These analyze ITSM data and metadata (primarily found in ITSM platforms) to provide intelligent advice and actions on ITSM practices and workflows, such as IT service desk and support activities. This software can either be a stand-alone product, capabilities within an ITSM platform or an add-on to an ITSM platform.
B2B gateway software is integration middleware that supports information exchange between your organization and its ecosystem trading partners, applications and endpoints. BGS consolidates and centralizes data and process integration and interoperability between a company's internal applications and external endpoints, such as business partners, SaaS or ecosystems. The BGS market is a composite market that includes pure-play BGS solutions and BGS that is embedded or combined with other IT solutions (for example, ESB suites that support BGS features as services connected to the ESB suite, integration brokerage services, e-invoicing software and networks, application platform suites, electronic data interchange [EDI] translators, and managed file transfer [MFT] technology).
BPM-platform-based case management frameworks are configurable 'apps' meant to help solution architects accelerate the delivery of unique and flexible case management solutions. Case management frameworks (CMFs) are commercial software offerings designed to reduce the time and complexity of creating case-style process solutions by providing architectural patterns and at least some business domain capabilities 'out of the box.' Work is caselike when each work item — each case — requires unique handling, involving complex interactions between content, people, transactions and business or regulatory policies in order to deliver an optimal outcome. Case-style processes do not progress in a serial or completely predictable fashion. Rather, they often require multiple dependent workflows to be orchestrated, making them particularly complex to architect. Very often, caseworkers need the flexibility to decide the best next action for a case, rather than following a prescribed workflow.
Gartner defines business processes as the coordination of the behavior of people, systems and things to produce specific business outcomes. 'Things' in this context refers to devices that are part of the Internet of Things (IoT). A BPM platform minimally includes: a graphical business process and/or rule modeling capability, a process registry/repository to handle the modeling metadata, a process execution engine and a state management engine or rule engine (or both). The three types of BPM platforms — basic BPM platforms, business process management suites (BPMSs), and intelligent business process management suites (iBPMSs) — can help solution architects and business outcome owners accelerate application development, transform business processes, and digitalize business processes to exploit business moments by providing capabilities that manage different aspects of the business process life cycle.
Gartner defines the market for cloud database management systems (DBMSs) as the market for software products that store and manipulate data and that are primarily delivered as software as a service (SaaS) in the cloud. Cloud DBMSs may optionally be capable of running on-premises, or in hybrid, multicloud or intercloud configurations. They can be used for transactional work and/or analytical work. They may have features that enable them to participate in a wider data ecosystem. Must-have capabilities for this market include: Availability as SaaS on provider-managed public or private cloud systems; Management of data within cloud storage — that is, cloud DBMSs are not hosted in infrastructure as a service (IaaS), such as in a virtual machine or a container managed by the customer.
Cloud Investigation and Response Automation (CIRA) is a technology that leverages advanced analytics, artificial intelligence (AI), and automation to enhance the detection, investigation, and response to security incidents within cloud environments. It provides real-time insights into potential threats, automates the collection and analysis of forensic data, and uses machine learning (ML) algorithms for proactive threat detection. CIRA tools integrate seamlessly with existing Security Operations (SecOps) technologies to improve an organization’s overall security posture.
Cloud management tooling enables organizations to manage hybrid and multicloud (that is, on-premises, public cloud and edge) services and resources. This includes providing governance, life cycle management, brokering and automation for managed cloud infrastructure resources across multiple functional areas. The tooling can be procured and operated by central IT organizations, such as I&O, cloud center of excellence (CCOE) and platform engineering/operations, or within specific lines of business. It can be deployed on-premises, in a customer’s public cloud account or purchased as a SaaS.
Workforce engagement management (WEM) software is a collection of technologies that help manage the customer service workforce to ensure a high level of operational performance while elevating employee well-being, discretionary effort and satisfaction. The core capabilities of WEM products include: • Evaluation and improvement • Time management • Metrics and recognition (that is, performance management) • Assistance and task management • Voice of the employee (VoE) feedback • Recruitment and onboarding
Content collaboration tools provide an easy way for employees to use and share content both inside and outside the organizations. Since these tools can be used to collaborate with customers, partners and suppliers, they often provide rich security and privacy controls. Today, much of this functionality also can be found in other tools such as cloud office platforms, workstream collaboration platforms, content services platforms and content services applications. Functional differentiators in dedicated CCTs are difficult to identify.
Content services platforms (CSPs) are foundational for managing and utilizing content within an organization. CSP technologies enable employees to retrieve and work with content in a modern and seamless way across devices and organizational boundaries. Core CSP functionalities include content capture, creation, consolidation, processing and retention to support personal, team, departmental and enterprise business operations.
CCM software is defined as both a strategy and a market-fulfilled by applications that improve the creation, delivery, storage and retrieval of outbound and interactive communications. It supports the production of individualized customer messages, marketing collateral, new product introductions and transaction documents. It is a collection of computer programs that composes, personalizes, formats and delivers content acquired from various sources into targeted and relevant electronic and physical communications between an enterprise and its customers, prospective customers and business partners. It delivers targeted communications through a wide range of media including mobile, email, SMS, Web pages, social media sites and print. The CCM market has evolved from the convergence of document generation/composition and output management technologies. Current CCM solutions include the core elements of a design tool, a composition engine, a workflow/rule engine and multichannel output management.
Reviews for 'Customer Relationship Management - Others'
Reviews for 'Data Center - Others'
The data integration tools market comprises stand-alone software products that allow organizations to combine data from multiple sources, including performing tasks related to data access, transformation, enrichment and delivery. Data integration tools enable use cases such as data engineering, operational data integration, delivering modern data architectures, and enabling less-technical data integration. Data integration tools are procured by data and analytics (D&A) leaders and their teams for use by data engineers or less-technical users, such as business analysts or data scientists. These products are consumed as SaaS or deployed on-premises, in public or private cloud, or in hybrid configurations.
Data masking is based on the premise that sensitive data can be transformed into less sensitive but still useful data. This is necessary to satisfy application testing use cases that require representative and coherent data, as well as analytics that involve the use of aggregate data for scoring, model building and statistical reporting. The market for data protection, DM included, continues to evolve with technologies designed to redact, anonymize, pseudonymize, or in some way deidentify data in order to protect it against confidentiality or privacy risk.
Reviews for 'Data and Analytics - Others'
Gartner defines DevOps platforms as those that provide fully integrated capabilities to enable continuous delivery of software using Agile and DevOps practices. The capabilities span the development and delivery life cycle built around the continuous integration/continuous delivery (CI/CD) pipeline and include aspects such as versioning, testing, security, documentation and compliance. DevOps platforms support team collaboration, consistency, tool simplification and measurement of software delivery metrics. DevOps platforms simplify the creation, maintenance and management of the components required for the delivery of modern software applications. Platforms create common workflows and data models, simplify user access, and provide a consistent user experience (UX) to reduce cognitive load. They lead to improved visibility, auditability and traceability into the software development value stream. This end-to-end view encourages a systems-thinking mindset and accelerates feedback loops.
Digital asset management software includes capabilities for ingestion, storage, retrieval, collaboration and life cycle management of rich-media assets, including text, graphics, images, videos and audio.
A digital experience platform (DXP) is an integrated set of technologies designed for the composition, management, delivery and optimization of personalized digital experiences across multiple channels in the customer journey. A DXP binds capabilities from multiple applications to allow the creation, orchestration and presentation of seamless experiences. It also forms part of a digital business ecosystem via API-based integrations with adjacent technologies. DXPs are applicable to business-to-consumer (B2C), business-to-business (B2B) and business-to-employee (B2E) use cases.
Gartner defines document management as the tools and practices used to capture, store, process, and access documents and content in support of personal, team and enterprise needs. It is used for a wide range of collaborative and operational purposes, enabling the digital workplace, content collaboration, content-centric processes, content services for enterprise applications and content governance. Gartner estimates that 70% to 80% of enterprise information is unstructured, posing a significant challenge for organizations that must unlock the potential and mitigate the risks of content. Document management tools are critical to enterprise application strategies that need to support unstructured information or content.
The e-discovery solutions market comprises vendors offering technology solutions that facilitate the electronic discovery process. E-discovery solutions specialize in one or more areas to identify, collect, preserve, process, review, analyze and produce electronically stored information (ESI). ESI fulfills legal and compliance requirements for discovery that result from a variety of investigative scenarios. The scope of ESI often includes data sources, such as digital communications, file systems, cloud office platforms, endpoints, databases and applications. E-discovery solutions market includes software vendor offerings for a customer’s own deployment on-premises and in cloud infrastructure, as well as hosted offerings provided by software vendors and services providers.
Gartner defines an endpoint protection platform (EPP) as security software designed to protect managed endpoints — including desktop PCs, laptop PCs, mobile devices and, in some cases, server endpoints — against known and unknown malicious attacks. EPPs provide capabilities for security teams to investigate and remediate incidents that evade prevention controls. EPP products are delivered as software agents, deployed to endpoints, and connected to centralized security analytics and management consoles. EPPs provide a defensive security control to protect end-user endpoints against known and unknown malware infections using a combination of security techniques (such as static and behavioral analysis) and system controls (such as device control and host firewall management). EPP prevention and protection capabilities are deployed as a part of a defense-in-depth strategy to help reduce the attack surface and minimize the risk of endpoint compromise. EPP detection and response capabilities are used to uncover, investigate, and respond to endpoint threats that evade security prevention, often as a part of broader security operations platforms.
Gartner defines enterprise agile planning (EAP) tools as products that enable organizations to scale their agile practices to support a holistic enterprise view. These tools act as a hub for defining, planning, managing and deploying work. They also serve as an information hub for the disparate islands of metrics from the full life cycle. Just as agile is an evolution of development methodologies, EAP tools are an evolution of project-/team-centric tools. They support a business-outcome-driven approach to managing the full life cycle of agile product delivery at scale. EAP tools in this market combine data from multiple sources to enable: - Monthly, weekly and even daily incremental value delivery based on business outcomes - Support for enterprise agile frameworks like Scaled Agile Framework (SAFe) - Product roadmapping - Management of strategy, investments and objectives - Increased visibility into the flow of work - Management of work backlogs - Collaboration capabilities for individuals and teams - Management of cross-team dependencies - Release planning and forecasting - Visibility into the financial aspects of the work being done
Gartner defines enterprise backup and recovery software solutions as technology that captures a point-in-time copy (backup) of enterprise data in on-premises, hybrid, multicloud and software as a service (SaaS) environments. These solutions write this data to one or more secondary storage targets for the primary purpose of recovering it in case of loss. Protecting and recovering business application data, irrespective of the underlying infrastructure type and its location, is more important than ever. As enterprises move toward more complex environments that include large and expansive amounts of business-critical data, enterprise backup and recovery software solutions protect these workloads, whether they reside in on-premises, hybrid, multicloud or software as a service (SaaS) environments. These solutions are vital to organizations’ ability to recover data following events that cause it to become inaccessible. Whether such an event is accidental, malicious or environmental, organizations use these solutions to recover and restore access to the affected data accurately and efficiently. Solutions must offer effective capabilities to simplify the management of data protection across complex enterprise environments. They must also ensure reliable recovery not just from accidental or operational errors but also from data loss arising from constantly changing threats, and expedite and orchestrate data recovery responses to traditional disaster and ransomware events.
EBPA is a comprehensive approach toward business and process modeling aimed at transforming and improving business performance with an emphasis on cross-viewpoint (strategy, analysis, architecture, automation), cross-functional analysis to support strategic and operational decisions.
Enterprise information archiving (EIA) solutions are designed for archiving data sources to a centralized platform to satisfy information governance requirements, including regulatory and/or corporate governance and privacy; improve data accessibility; surface new data insights; and gain operational efficiencies. There are several core capabilities of this market. They include archiving digital communication content, such as email, workstream collaboration, instant messaging (IM) and SMS; classifying data and enabling retention management of archive content; creating a searchable index of content; and providing basic tools for e-discovery and supervision.
Gartner defines enterprise low-code application platforms (LCAPs) as platforms for accelerated development and maintenance of applications, using model-driven tools for the entire application’s technology stack, generative AI and prebuilt component catalogs. Enterprise LCAPs target software engineering teams responsible for custom application development and maintenance. Enterprise LCAP features include support for the collaborative development of all application components; runtime environments for high performance, availability and scalability of applications; application deployment and monitoring with detailed usage insights. Enterprise LCAP platforms feature governance controls and success management through self-service capabilities and APIs, developer documentation and training, and service-level agreements for platform operations. Enterprise LCAPs provide the foundation for developing a wide range of application types and application components, including complex front ends, business process automation and distributed data sources.
File analysis (FA) products analyze, index, search, track and report on file metadata and file content, enabling organizations to take action on files according to what was identified. FA provides detailed metadata and contextual information to enable better information governance and organizational efficiency for unstructured data management. FA is an emerging solution, made of disparate technologies, that assists organizations in understanding the ever-growing volume of unstructured data, including file shares, email databases, enterprise file sync and share, records management, enterprise content management, Microsoft SharePoint and data archives.
Reviews for 'IT Infrastructure and Operations Management - Others'
Gartner defines IT service management (ITSM) platforms as software that offers workflow management that enables organizations to design, automate, plan, manage, report on and deliver integrated IT services and related digital experiences. Supported practices include request, incident, problem, change, knowledge and configuration management, and case management, as well as interfaces for non-IT business needs. ITSM platforms are typically acquired as SaaS; however, they are also sold as on-premises deployments. I&O leaders select these solutions to be consumed by service desks and service operations, and are identifying opportunities for business workflows in other IT-adjacent departments.
Gartner defines identity governance and administration (IGA) as the solution to manage the identity life cycle and govern access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data, and provide full capability controls over accounts and associated access. IGA solutions also fulfill the purpose of unifying and correlating identity data for organizations with multiple person and machine identity authoritative sources. This is done to provide a single view of identity (system of record) for their dependent processes and systems
Infrastructure monitoring tools capture the health and resource utilization of IT infrastructure components, no matter where they reside (e.g., in a data center, at the edge, infrastructure as a service [IaaS] or platform as a service [PaaS] in the cloud). This enables I&O leaders to monitor and collate the availability and resource utilization data of physical and virtual entities — including servers, containers, network devices, database instances, hypervisors and storage. These tools collect data in real time and perform historical data analysis or trending of the elements they monitor.
Gartner defines insider risk management as a methodology that includes the tools and capabilities to measure, detect and contain undesirable behavior of trusted accounts in the organization. It includes solutions that monitor the behavior of employees, service partners and key suppliers working inside the organization. These tools then evaluate whether behavior falls within the expectations of the role and corporate risk tolerance. For CISOs and cybersecurity leaders, insider risk management refers to the use of technical solutions to solve a fundamentally human problem. Managing insider risks requires collaboration among many cross-functional partners. Components of an insider risk management methodology are policies, guidelines and investigative work that fall outside the bounds of a typical cybersecurity organization. For our purposes, the insider risk management market consists of tools and solutions that monitor the behavior of employees, service partners and key suppliers working inside the organization. It evaluates whether behavior falls within the expectations of the role and corporate risk tolerance.
Gartner defines Insight Engines as follows: Insight engines apply relevancy methods to discover, analyze, describe and organize content and data. They enable the interactive or proactive delivery or synthesis of information to people, and data to machines, in the context of their respective business moments. Insight engines should be viewed as platforms on which applications are provided, developed or augmented by applying the capabilities listed above to specific employee and customer experience use cases. Such applications are provided out of the box by vendors (e.g., intranet or site search), developed through technical partnerships (e.g., search within third-party applications), developed with customers in-house (e.g., expert finder), or developed through integration with third-party applications (e.g., extracting data from documents to support RPA).
Gartner defines intelligent document processing (IDP) solutions as specialized data integration tools enabling automated extraction of data from multiple formats and varying layouts of document content. IDP solutions ingest data for dependent applications and workflows, and can be provided as a software product and/or as a service. Organizations receive and process documents in multiple formats to enable activities such as onboarding new suppliers, receiving applications for loans or insurance claims. This results in large numbers of documents, the content of which is designed for people to comprehend rather than machines to process. Extracting data from content is essential for document processing and the automated activities this supports. IDP solutions fulfill this role, augmented by and potentially replacing people.
The network intrusion detection and prevention system (IDPS) appliance market is composed of stand-alone physical and virtual appliances that inspect defined network traffic either on-premises or in the cloud. They are often located in the network to inspect traffic that has passed through perimeter security devices, such as firewalls, secure Web gateways and secure email gateways. IDPS devices are deployed in-line and perform full-stream reassembly of network traffic. They provide detection via several methods — for example, signatures, protocol anomaly detection, behavioral monitoring or heuristics, advanced threat defense (ATD) integration, and threat intelligence (TI). When deployed in-line, IDPSs can also use various techniques to detect and block attacks that are identified with high confidence; this is one of the primary benefits of this technology. Next-generation IDPSs have evolved in response to advanced targeted threats that can evade first-generation IDPSs.
Legal Document Management Solutions are used by law firms and law professionals to store and organize legal documents and streamline document workflow which in turn aid in faster operations. A centralized document management system helps in creating continuity and consistency within an organization.This is achieved through integration with other applications such as office suites, emails, and other legal applications. The systems are designed for automated file sorting, storage, and retrieval of electronically-stored legal documents with advanced search tools. Additionally, legal document management solutions ensure security and access control of the documents shared for collaboration.
RIM Solutions Allow Organizations to Scale and Speed Products to Market: RIM solutions are a set of key capabilities that a life science company needs to manage the regulatory approval and maintenance of a life science product for commercial use. Each RIM solution capability addresses a specific aspect of the process to gain and maintain regulatory authorization in one or more regulated markets. RIM solutions can be stand-alone point solutions or part of a RIM platform, and either deployed on-premises or in the cloud. Much investment in these solutions from life science companies has involved the shift to cloud deployments (primarily public cloud deployments) over the last five years. RIM capabilities consist of solutions used for: - Product registration management - Regulatory intelligence and regulatory requirements management - Product detail and product information management - Dossier management - Submission content management, including authoring, development and approval - Product label and promotional material development - Health authority interactions, communications and commitment tracking - Submission planning, production and archival
Load Testing Tools determine the performance of a system, software product, or software application under real-life based load conditions and resource utilization levels. The goal of load testing is to improve performance bottlenecks and to ensure stability and smooth functioning of software application before deployment. Through specialized testing software,various scenarios are simulated to test the system’s behavior under different load conditions. The software places a simulated “load” or demand from multiple sources on applications to ensure it remains stable during operation and peak load. It enables test analysts to evaluate application performance and maximize the operating capacity of the application.
Gartner defines managed detection and response (MDR) services as those that provide customers with remotely delivered security operations center (SOC) functions. These functions allow organizations to perform rapid detection, analysis, investigation and response through threat disruption and containment. They offer a turnkey experience, using a predefined technology stack that commonly covers endpoints, networks, logs and cloud. Telemetry is analyzed within a provider’s platform using a range of techniques. The MDR provider’s analyst team then performs threat hunting and incident management to deliver recommended actions to their clients. MDR offers outcome-driven security incident management that is predicated on the detection, analysis and investigation of potentially impactful security events and the delivery of active threat disruption and containment actions to respond to and mitigate the impact of cyber breaches.
The mobile AST market is composed of buyers and sellers of products and services that analyze and identify vulnerabilities in applications used with mobile platforms (iOS, Android and Windows 10 Mobile) during or post development. Many variations and flavors of techniques exist, but fundamentally mobile AST solutions test applications in three main ways: (1) SAST: These solutions statically analyze the source, binary or bytecode of an application to identify vulnerabilities. (2) Behavioral testing: Mobile AST solutions use behavioral analysis to observe the behavior of the app during runtime and identify actions that could be exploited by an attacker. (3) DAST: These solutions also use dynamic analysis to test the app in its runtime state. DAST simulates attacks against an application and analyzes the application's reactions, determining whether it is vulnerable.
Gartner defines multienterprise collaboration networks (MCNs) as solutions that support a community of trading partners of any tier and type that need to coordinate and execute on business processes extending across multiple enterprises. Gartner considers cloud-based MCNs to be a key technology to coordinate, orchestrate and automate an organization’s extended supply chain within the overall business ecosystem they operate in. The key capabilities of MCN solutions include three layers: Network representation and management, Application functions, Embedded analytics and intelligence.
Network automation platforms are products that automate and orchestrate multiple vendors’ network functionality. These platforms support a broad range of capabilities including provisioning, deprovisioning, orchestration, troubleshooting, operations, workflow, configuration management, event-driven automation, validation and reporting. These platforms are well-suited to add value on top of existing point network automation tools by orchestrating end-to-end network workflows across existing automation tools. Network automation platforms interact directly with network devices, other automation and orchestration tools, network management systems/controllers, and/or network services. These platforms increase agility and efficiency of network infrastructure while lowering costs, reducing the amount of manual human errors, and improving compliance with required rules, regulations and laws.
Network detection and response (NDR) products detect abnormal system behaviors by applying behavioral analytics to network traffic data. They continuously analyze raw network packets or traffic metadata within internal networks (east-west) and between internal and external networks (north-south). NDR products include automated responses, such as host containment or traffic blocking, directly or through integration with other cybersecurity tools. NDR can be delivered as a combination of hardware and software appliances for sensors, some with IaaS support. Management and orchestration consoles can be software or SaaS.
Gartner defines observability platforms as products that ingest telemetry (operational data) from a variety of sources including, but not limited to, logs, metrics, events and traces. They are used to understand the health, performance and behavior of applications, services and infrastructure. Observability platforms enable an analysis of the telemetry, either via human operator or machine intelligence, to determine changes in system behavior that impact end-user experience such as outages or performance degradation. This allows for early, and even preemptive, problem remediation. Observability solutions are used by IT operations, site reliability engineers, cloud and platform teams, application developers, and product owners. Observability platforms are used by organizations to understand and improve the availability, performance and resilience of these critical applications and services. Investment in and successful deployment of observability platforms leads to revenue loss avoidance and enables faster product development cycles and improvements in brand perception.
Reviews for 'Office Productivity Solutions - Others'
Password management (PM) tools are products that provide users with the means to reset their own passwords after an account lockout or when they forget their passwords. PM tools can also synchronize passwords for users across multiple systems, allowing users to access multiple applications with the same password.
Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands, which are used to administer or configure systems and applications. PAM tools — available as software, SaaS or hardware appliances — manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines four distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, and cloud infrastructure entitlement management (CIEM).
PPM software providers covered under this market definition aim to support the selection, planning and execution of a variety of different work packages or containers, including, but not limited to, traditional projects. They often fold in collaboration and communication capabilities and allow work teams and project offices to report, monitor and identify course correction in resource-intensive project and work environments. Providers included in this market offer these capabilities directly through their own products, but frequently recognize that specific integration points may also be needed to connect niche tools or data sources. The PPM capabilities identified as essential or critical include: • Project demand management • Project planning and management • Time management • Resource management • Resource capacity planning • Project portfolio management • Project collaboration • Program management • Reporting services • Security and user management • Integration • Usability
SIEM is a configurable security system of record that aggregates and analyzes security event data from on-premises and cloud environments. SIEM assists with response actions to mitigate issues that cause harm to the organization and satisfy compliance and reporting requirements. The security information and event management (SIEM) system must assist with: 1. Aggregating and normalizing data from various IT and operational technology (OT) environments 2. Identifying and investigating security events of interest 3. Supporting manual and automated response actions 4. Maintaining and reporting on current and historical security events
Security orchestration, automation and response (SOAR) solutions combine incident response, orchestration and automation, and threat intelligence (TI) management capabilities in a single platform. SOAR tools are also used to document and implement processes (aka playbooks, workflows and processes); support security incident management; and apply machine-based assistance to human security analysts and operators. SOAR solutions must provide: - Highly customizable workflow process management that enables repeatable automated tasks to be turned into playbooks that run in isolation or joined together into more sophisticated workflows. - The ability to store (locally or in a third-party system) incident management data to support SecOps investigations. - Manually instigated and automated triggers that augment human security analyst operators to carry out operational tasks consistently. - A mechanism to collate and better operationalize the use of threat intelligence. - Support for a broad range of existing security technologies that supports improved analyst efficiency and acts as an abstraction layer between the desired outcomes and the custom-made set of solutions in place in your environment.
Reviews for 'Security Solutions - Others'
Sentiment Analysis Tools enable organizations to analyze all forms of text data to determine the overall sentiment, opinion, or emotional tone expressed by the users in their messages. These tools use technologies such as machine learning, natural language processing (NLP), text analysis, and biometrics for analyzing and breaking a large amount of text data into small chunks to identify the underlying sentiment of a message. The underline sentiment can be positive, negative, or neutral, which is calculated by assigning the sentiment score based on a pre-determined scale to each chunk. These tools also provide multilingual support to enable sentiment analysis across different languages. These tools are commonly used in marketing, customer support, e-commerce, and finance.
Gartner defines the service orchestration and automation platform (SOAP) market as encompassing solution suites that deliver capabilities enabling organizations to manage workloads, workflows, resource provisioning and data pipelines across their technology landscapes. SOAPs enable infrastructure and operations (I&O) leaders to design and implement business services. These platforms combine workflow orchestration, workload automation and resource provisioning across an organization’s hybrid digital infrastructure. Increasingly, they are central to an organization’s ability to deploy workloads and to optimize deployments as a part of cost and availability initiatives. SOAPs expand the role of traditional workload automation by adapting to use cases that deliver and extend into data pipelines, cloud-native infrastructures and application architectures. These tools complement and integrate with DevOps toolchains to provide customer-focused agility, cost savings, operational efficiency and process standardization.
The market for social software in the workplace includes software products that support people working together in teams, communities or networks. These products can be tailored to support a variety of collaborative activities. Buyers are looking for virtual environments that can engage participants to create, organize and share information, and encourage them to find, connect and interact with each other. Business use of these products ranges from project coordination within small teams or homogeneous groups, to information exchange between employees across an entire organization.
Software asset management (SAM) tools are solutions that provide automation to support tasks required to produce and maintain compliance with independent software vendor (ISV) license use rights, while improving an organization’s ability to proactively identify and optimize software risk and spend. SAM tools provide in-depth software asset analysis through: - Conducting discovery - Analyzing software license entitlements - Automating the collection of software consumption data - Establishing ISV effective license position (ELP) - Governing software assets - Optimizing software value delivery - Sharing information with other tools and stakeholders
Gartner defines strategic portfolio management (SPM) as a set of business capabilities, processes and supporting portfolio management technology. Business leaders, enterprise portfolio management office (EPMO) leaders and IT leaders require SPM to support enterprisewide strategy-to-execution alignment and adaptation. The SPM market addresses the integrated portfolio management technology needs of business leaders, EPMO leaders and IT leaders. SPM technology supports clear definition of key business strategies and desired business outcomes, and the formulation and mapping of these with key portfolio elements, such as business capabilities, investments, programs, digital and physical products, applications and projects. SPM technology allows users to create multiple portfolio and subportfolio types with focused themes, such as programs, digital products, physical products, business or IT services, projects and applications. It allows users to link and cross-reference elements in the different portfolios and subportfolios to support integrated portfolio analysis and tracking.
The structured data archiving and application retirement market is identified by an array of technology solutions that manage the life cycle of application-generated data and accommodate corporate and regulatory compliance requirements. Application-generated data is inclusive of databases and related unstructured data. SDA solutions focus on improving the storage efficiency of data generated by on-premises and cloud-based applications and orchestrating the retirement of legacy application data and their infrastructure. The SDA market includes solutions that can be deployed on-premises, and on private and public infrastructure, and includes managed services offerings such as SaaS or PaaS.
Tokenization platform turns sensitive data into non-sensitive data called tokens to increase data protection and reduce fraud risks in financial transactions. The original data is then safely stored in a centralized location for subsequent reference while businesses utilize these tokens to carry out their business activities. In addition, the tokenization platform enables merchants to adhere to industry and governmental regulations like GDPR, CCPA, PCI DSS, and HIPAA with minimum liability and security expenses. The typical users of the technology are financial institutions, real estate, banks, retailers, healthcare providers, insurance, and e-commerce companies. These businesses deploy tokenization to protect the personal information of their users, including credit card numbers, PANs, PII, and PHI.
Gartner defines a unified endpoint management (UEM) tool as a software-based tool that provides agent and agentless management of computers and mobile devices through a single console. Modern UEM tools: Provide a user-centric view of devices across device platforms; Offer agent and/or agentless management through native Windows endpoint, macOS, Linux and Chrome OS controls. Offer agentless mobile management through native Apple iOS/iPad OS and Google Android controls; Aggregate telemetry and signals from identities, apps, connectivity and devices to inform policy and related actions; Aggregate and analyze technology performance and employee experience data; Integrate with identity, security and remote access tools to support zero-trust access and contextual authentication, vulnerability, policy, and configuration and data management; Manage nontraditional devices, including Internet of Things (IoT) devices, wearables and rugged handhelds.
Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. User authentication is foundational to and protects the value of other functions with an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD); audit (individual accountability); and identity analytics.
Value stream management platforms enable organizations to optimize end-to-end product delivery and improve business outcomes. VSMPs are tool-agnostic; they connect to existing tools and ingest data from all phases of software product delivery all the way from customer need to value delivery. They help software engineering leaders identify and quantify opportunities to improve software product performance by optimizing cost, operating models, technology and processes. VSMPs use AI-/machine learning (ML)-powered analytics and insights to surface constraints, detect bottlenecks and improve flow. This enables stakeholders to take actions that improve throughput and align to business priorities and objectives.
Gartner defines WCM as the process of creating, managing and delivering content to one or more digital channels. This is achieved through the use of specific content management features based on a core repository. WCM tools are used to manage content to be delivered to websites and other digital channels. These tools are used by both IT and marketing/business. They may be procured as commercial products or open-source tools and are typically cloud-based. The functionality of WCM solutions goes beyond the publication of webpages. It also includes: - Content-creation functions, such as assembling content components, pages, websites, microsites and landing pages. - A content repository that organizes different content types and their metadata. - Library services, such as check-in and check-out, versioning and rollback. - Security and roles, and permissions management. - Management features such as layout and templates, menus and navigation, and workflows. - Content and application deployment functions. - Personalization capabilities. - The ability to integrate, via APIs, with adjacent technologies such as digital commerce platforms, CRM, and marketing automation platforms. - Hybrid and headless capabilities for API-driven multiexperience content delivery beyond websites and to other channels — such as mobile apps, progressive web apps (PWAs), single-page applications (SPAs), digital and voice assistants and smart devices.