Gartner defines access management (AM) as platforms that include an identity provider (IdP) and establish, manage and enforce runtime access controls to at least cloud, modern standards-based web and classic web applications. AM’s purpose is to enable single sign-on (SSO) access for people (workforce, consumer and other users) and machines into protected applications in a streamlined and consistent way that enhances user experience. AM is also responsible for providing security controls to protect the user session in runtime, enforcing authentication (with multifactor authentication [MFA]) and authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools to enable identity-first security.
Active metadata management is a set of capabilities that enables continuous access and processing of metadata that support ongoing analysis over a different spectrum of maturity, use cases and vendor solutions. Active metadata outputs range from design recommendations based upon execution results and reports of runtime steps through, and indicators of, business outcomes achieved. The resulting recommendations from those analytics are issued as design inputs to humans or system-level instructions that are expected to have a response.
Reviews for 'Application Development, Integration and Management - Others'
'Cloud office migration' refers to the process of consolidating and transferring a collection of workloads. Workloads can include emails, files, calendars, document types, related metadata, instant messages, applications, user permissions, compound structure and linked components. Migration of such workloads from at least one permanent on-premises platform or cloud office to a new cloud office environment, across a variety of similar product classes, is typical. During the migration process, enterprises will choose to cleanse their existing platforms by archiving old and outdated data. Migration tools are able to conduct an analysis of the respective workloads, identify if the data is deemed suitable for migration while maintaining its integrity, migrate the data between the source and target, and ensure governance in the subsequent platform.
Crisis/Emergency Management Solutions help organizations consistently orchestrate and manage the data, resources, expenditures, communications and tasks used for response, recovery and restoration activities during and after a crisis. C/EMP solutions are also used to analyze the changing conditions during a crisis to ensure situational awareness as well as to ensure crisis/emergency management (C/EM) procedures are in compliance with government emergency management standards. Historically, C/EMP solutions have been used by government agencies, utilities and transportation organizations to manage the large public safety impacts of a crisis. However, other industries, including financial services and HDOs, are starting to use C/EMP solutions to demonstrate command and control across a mix of internal and external stakeholders during crisis events, as well as to align with national emergency/incident response management frameworks
Reviews for 'Data Center - Others'
Data preparation is an iterative and agile process for finding, combining, cleaning, transforming and sharing curated datasets for various data and analytics use cases including analytics/business intelligence (BI), data science/machine learning (ML) and self-service data integration. Data preparation tools promise faster time to delivery of integrated and curated data by allowing business users including analysts, citizen integrators, data engineers and citizen data scientists to integrate internal and external datasets for their use cases. Furthermore, they allow users to identify anomalies and patterns and improve and review the data quality of their findings in a repeatable fashion. Some tools embed ML algorithms that augment and, in some cases, completely automate certain repeatable and mundane data preparation tasks. Reduced time to delivery of data and insight is at the heart of this market.
Reviews for 'Data and Analytics - Others'
A D&A governance platform is a set of integrated business capabilities that helps business leaders and users evaluate and implement a diverse set of governance policies and monitor and enforce those policies across their organizations’ business systems. These platforms are unique from data management and discrete governance tools in that data management and such tools focus on policy execution, whereas these platforms are used primarily by business roles — not only or even specifically IT roles.
The DRaaS market provides for the recovery of enterprise applications at another location in the event of a disaster. The provider can deliver the service as a fully managed, assisted recovery or as a self-service offering. The service should be marketed and sold as a stand-alone, industrialized offering and include, at a minimum: - An on-demand recovery cloud for planned tests, exercises and declarations - Server image and production data replication to the cloud - Automated failover and failback between production and the target cloud environment - Recovery time SLAs
Gartner defines the market for Enterprise Architecture Tools as tools that allow organizations to examine both the need for, and the impact of, change. They allow users to capture the interrelationships and interdependencies within and between an ecosystem of partners, operating models, capabilities, people, processes, information, and applications and technologies. They provide a central repository to capture data and metadata about the artifacts that an enterprise cares about, and their related life cycles. Models represent the relationships between these artifacts and are themselves treated as assets that help describe and shape the future of the enterprise. EA tools provide a means to model the business and IT aspects of the enterprise in support of business outcome delivery. Doing so requires the collaboration of multiple stakeholders across the organization — each playing a different role at a different time. The models and methods used by the stakeholders will vary depending on their role and must be integrated and connected to other models to be useful. To support these needs, EA tools have two aspects. The first provides a modeling environment, along with a supporting repository. The second facilitates collaboration between a diverse group of stakeholders across the organization, right from business strategy to IT. A broad array of architectural and IT disciplines, such as business, information, solution, security, applications and infrastructure use EA tools. EA tools operate at many levels and across a wide spectrum to enable insights and support informed decision making. With such a broad array of stakeholders, EA tools must also facilitate their consumption of, and contribution to, the information contained within the repository. As they undertake their work, these users switch between an ever-expanding set of views and visual representations of the datasets contained in the repository.
Gartner defines enterprise backup and recovery software solutions as technology that captures a point-in-time copy (backup) of enterprise data in on-premises, hybrid, multicloud and software as a service (SaaS) environments. These solutions write this data to one or more secondary storage targets for the primary purpose of recovering it in case of loss. Protecting and recovering business application data, irrespective of the underlying infrastructure type and its location, is more important than ever. As enterprises move toward more complex environments that include large and expansive amounts of business-critical data, enterprise backup and recovery software solutions protect these workloads, whether they reside in on-premises, hybrid, multicloud or software as a service (SaaS) environments. These solutions are vital to organizations’ ability to recover data following events that cause it to become inaccessible. Whether such an event is accidental, malicious or environmental, organizations use these solutions to recover and restore access to the affected data accurately and efficiently. Solutions must offer effective capabilities to simplify the management of data protection across complex enterprise environments. They must also ensure reliable recovery not just from accidental or operational errors but also from data loss arising from constantly changing threats, and expedite and orchestrate data recovery responses to traditional disaster and ransomware events.
EBPA is a comprehensive approach toward business and process modeling aimed at transforming and improving business performance with an emphasis on cross-viewpoint (strategy, analysis, architecture, automation), cross-functional analysis to support strategic and operational decisions.
Enterprise information archiving (EIA) solutions are designed for archiving data sources to a centralized platform to satisfy information governance requirements, including regulatory and/or corporate governance and privacy; improve data accessibility; surface new data insights; and gain operational efficiencies. There are several core capabilities of this market. They include archiving digital communication content, such as email, workstream collaboration, instant messaging (IM) and SMS; classifying data and enabling retention management of archive content; creating a searchable index of content; and providing basic tools for e-discovery and supervision.
Reviews for 'IT Infrastructure and Operations Management - Others'
IT Resilience Orchestration (ITRO) solutions are chiefly aimed at helping to improve the reliability, speed and granularity of workload recovery due to unplanned outages by automating disaster recovery (DR) processes while lowering costs of DR exercising and DR operations staff. Gartner’s ITRO definition focuses on tools that support a majority of these capabilities: • Automated failover, failback and availability/continuity management • Replication and orchestration • Discovery, dependency mapping and workload analysis • DR management and run book creation • Reporting and validation of recovery capability
Gartner defines SaaS management platforms (SMP) as software tools that aim to help organizations discover, manage, optimize and automate the SaaS application life cycle from one centralized console. Core SMP capabilities include discovery, cost optimization, employee self-service via an application store, insights to increase adoption and automation of onboarding/offboarding activities. As SaaS adoption accelerates, IT leaders struggle to discover and support SaaS-hosted applications in accordance with company, market or geographic policies and regulations. Increased SaaS costs — combined with limited visibility into the entire SaaS portfolio (including unapproved SaaS) and high levels of overdeployed and underconsumed licenses — result in significant financial, operational and cybersecurity risk.
Reviews for 'Security Solutions - Others'
The structured data archiving and application retirement market is identified by an array of technology solutions that manage the life cycle of application-generated data and accommodate corporate and regulatory compliance requirements. Application-generated data is inclusive of databases and related unstructured data. SDA solutions focus on improving the storage efficiency of data generated by on-premises and cloud-based applications and orchestrating the retirement of legacy application data and their infrastructure. The SDA market includes solutions that can be deployed on-premises, and on private and public infrastructure, and includes managed services offerings such as SaaS or PaaS.
Gartner defines a unified endpoint management (UEM) tool as a software-based tool that provides agent and agentless management of computers and mobile devices through a single console. Modern UEM tools: Provide a user-centric view of devices across device platforms; Offer agent and/or agentless management through native Windows endpoint, macOS, Linux and Chrome OS controls. Offer agentless mobile management through native Apple iOS/iPad OS and Google Android controls; Aggregate telemetry and signals from identities, apps, connectivity and devices to inform policy and related actions; Aggregate and analyze technology performance and employee experience data; Integrate with identity, security and remote access tools to support zero-trust access and contextual authentication, vulnerability, policy, and configuration and data management; Manage nontraditional devices, including Internet of Things (IoT) devices, wearables and rugged handhelds.