Gartner Magic Quadrants
Магические квадраты Гартнера преимущественно по информационной безопасности (Gartner Magic Quadrants on Security):
- Каждая картинка ведёт на соответствующее изображение на официальном сайте Гартнера.
- Указана дата публикации соответствующего отчёта и его уникальный ID. По клику на ID можно перейти к самому отчёту и, например, купить его или получить по подписке, если она есть.
- При наличии действующей (и известной мне) полной текстовой версии отчёта, лицензированной для распространения, ссылка на неё также приведена. Обычно такие отчёты доступны лишь некоторое время, после чего исчезают.
- Access Management (2019) (2018) (2017)
- Advanced Analytics Platforms (2016) (2015)
- Application Performance Monitoring Suites (2016) (2015)
- Application Security Testing (2017) (2015) (2014) (2013)
- Business Analytics Services (2017)
- Business Continuity Management Planning Software (2016) (2014) (2013)
- Business Intelligence and Analytics Platforms (2017) (2016)
- CRM Customer Engagement Center (2016)
- CRM Lead Management (2015) (2014)
- Cloud Access Security Brokers (2018) (2017)
- Cloud Infrastructure as a Service (2015) (2014) (2013)
- Cloud-Based IT Project and Portfolio Management Services (2016)
- Contact Center Infrastructure (2016)
- Content Collaboration Platforms (2017)
- Content-Aware Data Loss Prevention (2013)
- Corporate Telephony (2015)
- Customer Management Contact Center BPO (2016)
- Data Center Backup and Recovery Software (2016)
- Data Center Networking (2016)
- Data Management Solutions for Analytics (2017)
- Data Masking Technology (2015) (2014) (2013)
- Data Science Platforms (2017)
- Digital Commerce (2016)
- Digital Marketing Hubs (2017) (2016)
- E-Discovery Software (2015) (2014) (2013)
- Endpoint Protection Platforms (2019) (2018) (2017) (2016) (2014) (2014) (2013)
- Enterprise Architecture Tools (2016)
- Enterprise Backup Software and Integrated Appliances (2015) (2014)
- Enterprise Backup-Recovery Software (2013)
- Enterprise Data Loss Prevention (2017) (2016)
- Enterprise File Synchronization and Sharing (2016) (2014)
- Enterprise Information Archiving (2015) (2014) (2013)
- Enterprise Mobility Management Suites (2017) (2016) (2015) (2014)
- (Enterprise) Network Firewalls (2019) (2018) (2017) (2016) (2015) (2014) (2013)
- Global Retail Core Banking (2016)
- Group Video Systems (2016)
- IT Project and Portfolio Management Software Applications
- IT Risk Management (2019)
- IT Services for Communications Service Providers (2016)
- Identity Governance and Administration (2019) (2018) (2017) (2016) (2015) (2013)
- Identity and Access Management as a Service (2016) (2015) (2014)
- Integrated Risk Management Solutions (2019)
- Intrusion Detection and Prevention Systems (2018) (2017) (2015) (2014) (2013)
- Managed Mobility Services (2016) (2013)
- Managed Security Services (2017) (2015)
- Marketing Resource Management (2016)
- Mobile Data Protection (2014)
- Mobile Device Management Software (2013)
- Modular Servers (2016) (2015)
- Network Access Control (2014) (2013)
- Network Performance Monitoring and Diagnostics (2017) (2016)
- Network Services (2017) (2016)
- Privileged Access Management (2018)
- Public Cloud Storage Services (2015) (2014)
- Sales Force Automation (2015)
- Sales Performance Management (2016)
- Secure Email Gateways (2015) (2014) (2013)
- Secure Web Gateways (2018) (2017) (2015) (2014) (2013)
- Security Awareness Computer-Based Training (2019) (2018) (2016)
- Security Information and Event Management (2020) (2018) (2017) (2016) (2015) (2014) (2013)
- Structured Data Archiving and Application Retirement (2015)
- Supply Chain Planning System of Record (2016)
- Third-Party Logistics Providers (2016)
- Transportation Management Systems (2016)
- Unified Communications (2016)
- Unified Endpoint Management Tools (2019)
- Unified Threat Management (2018) (2017) (2015) (2014) (2013)
- User Authentication (2014) (2013)
- Utilities Customer Information Systems (2016)
- WAN Optimization (2016)
- Warehouse Management Systems (2017) (2016)
- Web Application Firewalls (2019) (2018) (2017) (2016) (2015) (2014)
- Web Conferencing (2015)
- x86 Server Virtualization Infrastructure (2015) (2014) (2013)
Magic Quadrant for Access Management
12.08.2019 G00433910

SaaS-delivered access management has become the norm, as has advanced user authentication including MFA. AM vendors are maturing their approaches to session management, contextual and adaptive access, and API protection, which will begin to enable CARTA-aligned access management approaches.
[Полный текст]
18.06.2018 G00335273

Access management products and services have matured in single sign-on protocols and user authentication, and technical differentiators include adaptive access capabilities, as well as ease and breadth of target system enablement. Among new purchases, demand for IAM as a service continues to grow.
tos (Evidian), Auth0, CA Technologies, Centrify, ForgeRock, IBM, i-Sprint Innovations, Micro Focus, Microsoft, Okta, OneLogin, Optimal IdM, Oracle, Ping Identity, SecureAuth + Core Security
07.06.2017 G00315479

The access management market has evolved beyond supporting traditional web applications to support mobile applications and APIs, as well as adding contextual and adaptive access features. Vendors offering an IDaaS option outnumber those that don’t, and now there are more choices than ever.
Atos (Evidian), CA Technologies, Centrify, Covisint, ForgeRock, IBM, i-Sprint Innovations, Micro Focus, Microsoft, Okta, OneLogin, Optimal IdM, Oracle, Ping Identity, SecureAuth
Magic Quadrant for Advanced Analytics Platforms
Отзывы для Advanced Analytics Platforms: Reviews
09.02.2016 G00275788

Predictive analytics and other categories of advanced analytics represent the fastest-growing segment of the analytics market. Dell joins SAS, IBM, KNIME and RapidMiner as a Leader in this market.
Accenture, Alpine Data, Alteryx, Angoss, Dell, FICO, IBM, KNIME, Lavastorm, Megaputer, Microsoft, Predixion Software, Prognoz, RapidMiner, SAP, SAS
[Полный текст]
19.02.2015 G00270612

Predictive analytics and other types of advanced analytics technology are becoming major factors in the analytics market. This Magic Quadrant evaluates 16 leading providers of advanced analytics platforms that are used to build solutions from scratch.
Alpine Data Labs, Alteryx, Angoss, Dell, FICO, IBM, KNIME, Microsoft, Predixion, Prognoz, RapidMiner, Revolution Analytics, Salford Systems, SAP, SAS, Tibco Software
Magic Quadrant for Application Performance Monitoring Suites
21.12.2016 G00298377

For I&O leaders in 2016, there is no changing of the guard in terms of Leaders in the APM suite market. However, the competition continues to grow more fierce as historical Leaders continue to ramp up their game and new Challengers arise.
AppDynamics, BMC, CA Technologies, Correlsense, Dynatrace, HPE, IBM, Microsoft, Nastel Technologies, New Relic, Oracle, Riverbed
17.12.2015 G00271707

While providers in the Leaders quadrant remain the same, traditional APM providers have regained some of their competitive edge. For the first time, we also include APM vendors from Asia, an important and emerging regional market.
AppDynamics, AppNeta, BMC Software, CA Technologies, Dell, Dynatrace, Hewlett Packard Enterprise, IBM, JenniferSoft, ManageEngine, Microsoft, Nastel Technologies, New Relic, Riverbed Technology, Tingyun
[Полный текст]
Magic Quadrant for Application Security Testing
Отзывы для Application Security Testing: Reviews.
28.02.2017 G00290926

Security testing is growing faster than any other security market, as AST solutions adapt to new development methodologies and increased application complexity. Security and risk management leaders must integrate AST into their application security programs.
Acunetix, Checkmarx, Contrast Security, ERPScan, Fasoo, HPE, IBM, NSFOCUS, N-Stalker, PortSwigger, Qualys, Rapid7, SiteLock, Synopsys, Trustwave, Veracode, Virtual Forge, WhiteHat Security
06.08.2015 G00268424

Highly publicized breaches in the past 12 months have raised awareness of the need to identify and remediate vulnerabilities at the application layer. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy.
Acunetix, Appthority, Checkmarx, Cigital, Contrast Security, HP, IBM, NSFOCUS, N-Stalker, PortSwigger, Pradeo, Qualys, Rapid7 (NTO), SiteLock, Synopsys, Trustwave, Veracode, Virtual Forge, WhiteHat Security
01.07.2014 G00259568

Global-scale scandals around critical applications’ breaches have highlighted the need for effective detection of exploitable application security vulnerabilities. Application security testing is the solution for Web, cloud and mobile applications.
HP, Veracode, IBM, WhiteHat Security, Checkmarx, Trustwave, Qualys, NT OBJECTives, PortSwigger, Appthority, Quotium, Contrast Security, Pradeo, Acunetix, N-Stalker, Virtual Forge, Trend Micro
[Полный текст]
02.07.2013 G00246914

The market for application security testing is changing rapidly. Technology trends, such as mobile applications, advanced Web applications and dynamic languages, are forcing the need to combine dynamic and static testing capabilities, which is reshaping the overall market.
Magic Quadrant for Business Analytics Services
14.02.2017 G00292514

Data and analytics leaders expect business analytics to drive organization performance and guide digital transformation. Service providers are changing delivery toward IP assets and automation for support. We profile 20 of the most significant companies that offer business analytics services.
Accenture, Atos, Capgemini, CGI, Cognizant, Deloitte, EY, HCL Technologies, Hewlett Packard Enterprise, IBM Global Business Services, Infosys, KPMG, NEC, NTT Data, PwC, SAP, Tata Consultancy Services, Tech Mahindra, Teradata, Wipro
Magic Quadrant for Business Continuity Management Planning Software
11.07.2016 G00270187

The BCMP software market — with a global market revenue estimate of $250 million — is broadening its capabilities and becoming closer to operational risk management solutions. Gartner’s Magic Quadrant on this growing market evaluates 13 vendors to help in your vendor selection process.
Avalution, ClearView, Continuity Logic, EMC (RSA), Fusion, Global AlertLink, LockPath, MetricStream, Quantivate, RecoveryPlanner, Strategic BCP, Sungard Availability Services, Virtual
27.08.2014 G00261175

Most BCMP tools meet customer needs for recovery plan management, and a consistent and repeatable plan development process. The growing focus on BCM program analytics and integration into the operational risk management initiative has resulted in increased sophistication of BCMP tools.
Strategic BCP, SunGard Availability Services, MetricStream, Continuity Logic, Fusion Risk Management, Global AlertLink, RecoveryPlanner, EMC (RSA), Avalution Consulting, ClearView Continuity, Quantivate, BOLDplanning, Modulo, LockPath, eBRP Solutions, Phoenix, COOP Systems, Rentsys Recovery Services
26.08.2013 G00217265

The 2013 business continuity management planning market, in which there is no perfect product, has a 2012 revenue estimate of $130 million, 30% more than our 2010 estimate. This Magic Quadrant ranks 18 enterprise-class vendors.
RecoveryPlanner, EMC (RSA), MetricStream, Strategic BCP, Continuity Logic, eBRP Solutions, Coop Systems, Rentsys Recovery Services-EverGreen, BOLDplanning, Business Protector, Virtual, SunGard Availability Services, Fusion Risk Management, Modulo, Phoenix, Factonomy, Avalution Consulting, Quantivate
Magic Quadrant for Business Intelligence and Analytics Platforms
Отзывы для BI and Analytics Platforms: Reviews.
16.02.2017 G00301340

The business intelligence and analytics platform market’s shift from IT-led reporting to modern business-led analytics is now mainstream. Data and analytics leaders face countless choices: from traditional BI vendors that have closed feature gaps and innovated, to disrupters continuing to execute.
Alteryx, Birst, Board International, ClearStory Data, Datameer, Domo, IBM, Information Builders, Logi Analytics, Microsoft, MicroStrategy, Oracle, Pentaho, Pyramid Analytics, Qlik, Salesforce, SAP, SAS, Sisense, Tableau, ThoughtSpot, TIBCO Software, Yellowfin, Zoomdata
[Полный текст]
04.02.2016 G00275847

The BI and analytics platform market’s multiyear shift from IT-led enterprise reporting to business-led self-service analytics has passed the tipping point. Most new buying is of modern, business-user-centric platforms forcing a new market perspective, significantly reordering the vendor landscape.
Alteryx, BeyondCore, Birst, Board International, ClearStory Data, Datawatch, Domo, GoodData, IBM, Information Builders, Logi Analytics, Microsoft, MicroStrategy, Pentaho, Platfora, Pyramid Analytics, Qlik, Salesforce, SAP, SAS, Sisense, Tableau, TIBCO Software, Yellowfin
Magic Quadrant for CRM Customer Engagement Center
04.05.2016 G00278086

Vendors’ positions in this Magic Quadrant reflect the growing demand for cloud-based customer service applications to support agents who engage with customers through multiple channels. It remains the case that no vendor offers a suite that meets all global and cross-industry needs.
bpm’online, CRMnext, Eptica, Freshdesk, Lithium, Microsoft, mplsystems, Oracle, Pegasystems, Salesforce, SAP, SugarCRM, Verint, Zendesk
Magic Quadrant for CRM Lead Management
04.08.2015 G00277054

CRM lead management matures amid strong user interest and a more complex vendor environment. IT application leaders should work with business leaders to define both core and emerging B2B marketing requirements in this technology segment.
Act-On, Adobe, CallidusCloud, CRMnext, HubSpot, IBM (Silverpop), Marketo, Microsoft, MMIT, Oracle, Salesforce, Salesfusion, SugarCRM, Zoho
17.06.2014 G00262064

Investment in lead management continues to be healthy, but market consolidation has lengthened evaluation and sales cycles. Leaders in marketing and IT need to assess vendors’ visions of a single marketing automation suite against their own tactical and strategic business requirements.
Oracle, Marketo, Salesforce.com, Adobe, IBM, Silverpop, Callidus Software, SugarCRM, Zoho
Magic Quadrant for Cloud Access Security Brokers
20.10.2018 G00348564

Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Security and risk management leaders concerned about their organizations’ cloud use should investigate CASBs.
[Полный текст]
30.11.2017 G00318532

Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Security and risk management leaders should align CASB vendors to address specific use-case requirements.
Magic Quadrant for Cloud Infrastructure as a Service
18.05.2015 G00265139

The market for cloud IaaS is in a state of upheaval, as many service providers are shifting their strategies after failing to gain enough market traction. Customers must exercise caution when choosing providers.
Amazon Web Services, Microsoft, Google, CenturyLink, VMware, IBM (SoftLayer), Rackspace, Virustream, CSC, Verizon, Interoute, Fujitsu, NTT Communications, Joyent, Dimension Data
28.05.2014 G00261698

The market for cloud compute infrastructure as a service (a virtual data center of compute, storage and network resources delivered as a service) is still maturing and rapidly evolving. Strategic providers must therefore be chosen carefully.
Amazon Web Services, Microsoft, CenturyLink, IBM (SoftLayer), CSC, Google, Verizon Terremark, Rackspace, Virustream, VMware, Dimension Data, Fujitsu, Joyent, HP, GoGrid
19.08.2013 G00251789

The market for cloud compute infrastructure as a service (a virtual data center of compute, storage and network resources delivered as a service) is still maturing and rapidly evolving. As each provider has unique offerings, the task of sourcing their services must be handled with care.
[Полный текст]
Magic Quadrant for Cloud-Based IT Project and Portfolio Management Services
23.05.2016 G00278736

A “messy” market continues to confuse customers of IT PPM software because it provides both long-term and short-term buying options. Two Gartner Magic Quadrants are available to help. This Magic Quadrant analyzes cloud-based IT PPM service providers focused on offering short-term buying options.
Changepoint, Clarizen, Innotas, LiquidPlanner, One2Team, onepoint Projects, Project Objects, Upland Software, Workfront, WorkOtter
Magic Quadrant for Contact Center Infrastructure
19.05.2016 G00278585

Contact center infrastructure vendors continue to integrate their multichannel capabilities in order to develop “omnichannel” solutions, while enhancing their cloud delivery capabilities. Contact center decision makers should evaluate vendors’ technology and ability to deliver in relevant regions.
ALE, Altitude, Aspect, Avaya, Cisco, Collab, Enghouse Interactive, Genesys, Huawei, Interactive Intelligence, Mitel, NEC, Presence Technology, SAP, ShoreTel, Unify, Vocalcom, ZTE
Magic Quadrant for Content Collaboration Platforms
25.07.2017 G00314654

Content collaboration platforms are the evolution of the EFSS destination products and address digital workplace enablement strategies. Application leaders can choose among a range of options to transform individual productivity, team collaboration and business workflow automation.
Accellion, Axway (Syncplicity), BlackBerry, Box, Citrix, Ctera, Dropbox, Egnyte, Google, HighQ, Intralinks by Synchronoss, Microsoft, Thru
[Полный текст]
Magic Quadrant for Content-Aware Data Loss Prevention
См. также: Magic Quadrant for Enterprise Data Loss Prevention
12.12.2013 G00253215

Enterprise content-aware DLP has evolved to integrate more contextual awareness, enabling broader deployment use cases beyond regulatory compliance and intellectual property protection. Typical clients are organizations operating in regulated industries, intellectual property firms and governments.
Symantec, EMC (RSA), Verdasys, McAfee, Websense, CA Technologies, Trustwave, General Dynamics Fidelis Cybersecurity Solutions, GTB Technologies, Code Green Network, Absolute Software, Zecurion, InfoWatch
Magic Quadrant for Corporate Telephony
07.10.2015 G00271518

Corporate telephony is a mature technology that plays a critical role in enterprise communications. This research helps IT managers in large enterprises select the best vendor for their on-premises telephony requirements.
ALE, Avaya, Cisco, Huawei, Microsoft, Mitel, NEC, Unify
[Полный текст]
Magic Quadrant for Customer Management Contact Center BPO
28.01.2016 G00273869

Gartner’s Magic Quadrant for customer management contact center business process outsourcing services evaluates a vibrant provider landscape. Sourcing managers need to know that the provider landscape is changing due to evolving technology, economic conditions and customer needs.
Aegis, Alorica, Atento, Concentrix, Convergys, EGS, Firstsource, FIS, HGS, HPE, Intelenet, Minacs, Sitel, Sutherland Global Services, Sykes, Tech Mahindra, Teleperformance, TeleTech, Transcom, transcosmos, Wipro, Xerox
Magic Quadrant for Data Center Backup and Recovery Software
08.06.2016 G00280391

Enterprise backup is among the oldest, most performed tasks for infrastructure and operations professionals. Gartner provides analysis and evaluation of the leading data center backup software vendors that offer a range of traditional to innovative recovery capabilities.
Actifio, Arcserve, Commvault, EMC, Hewlett Packard Enterprise, IBM, Unitrends, Veeam, Veritas Technologies
Magic Quadrant for Data Center Networking
16.05.2016 G00278427

Data center networking continues to evolve, with increasing choices for open and disaggregated network solutions, while other vendors aim for more closed, proprietary systems. Enterprises should evaluate different vendor approaches and architectures, with a particular focus on software capabilities.
Arista Networks, Avaya, Brocade, Cisco, Dell, Extreme Networks, Hewlett Packard Enterprise, Huawei, Juniper Networks, Lenovo, NEC, New H3C Group, VMware
Magic Quadrant for Data Management Solutions for Analytics
20.02.2017 G00302535

Disruption is accelerating in this market, with more demand for broad solutions that address multiple data types and offer distributed processing and repository. Cloud solutions are also gaining traction. We help data and analytics leaders to weigh up the vendors in an increasingly dynamic space.
1010data, Amazon Web Services, Cloudera, EnterpriseDB, Google, Hewlett Packard Enterprise, Hortonworks, Huawei, IBM, MapR Technologies, MarkLogic, MemSQL, Microsoft, MongoDB, Oracle, Pivotal, SAP, Snowflake Computing, Teradata, Transwarp Technology
Magic Quadrant for Data Masking Technology
22.12.2015 G00273093

Organizations should use data masking to protect sensitive data at rest and in transit from insiders’ and outsiders’ attacks. In 2015, continuous data breaches has, once again, demonstrated the growing importance of this technology market.
Informatica, IBM, Oracle, CA Technologies (Grid-Tools), Delphix (Axis), Camouflage, Mentis, Solix. HPE (Voltage Security), Dataguise, GreenSQL, Privacy Analytics, TCS, Compuware, Net 2000
[Полный текст]
10.12.2014 G00259570

Global-scale scandals around sensitive data losses have highlighted the need for effective data protection, especially from insider attacks. Data masking, which is focused on protecting data from insiders and outsiders, is a must-have technology in enterprises’ and governments’ security portfolios.
Axis, Camouflage Software, Compuware, Dataguise, GreenSQL, Grid-Tools, IBM, Informatica, Mentis, Net 2000, Oracle, Privacy Analytics, Solix Technologies, Voltage Security
12.12.2013 G00247005

Organizations should use data masking to protect sensitive data at rest and in transit from insiders’ and outsiders’ abuse. The market offers static and dynamic masking of relational and mainframe-based data, and begins to mask big and unstructured data.
IBM, Informatics, Oracle, Axis Technology, Mentis, Grid-Tools, Camouflage Software, Compuware, Solid Technologies, Voltage Security, Dataguise, Net 2000, Privacy Analytics, Epi-Use, GreenSQL
Magic Quadrant for Data Science Platforms
14.02.2017 G00301536

Data science platforms are engines for creating machine-learning solutions. Innovation in this market focuses on cloud, Apache Spark, automation, collaboration and artificial-intelligence capabilities. We evaluate 16 vendors to help you make the best choice for your organization.
Alpine Data, Alteryx, Angoss, Dataiku, Domino Data Lab, FICO, H2O.ai, IBM, KNIME, MathWorks, Microsoft, Quest, RapidMiner, SAP, SAS, Teradata
Magic Quadrant for Digital Commerce
09.03.2016 G00270948

Digital commerce has become a major part of the customer experience, one that involves a growing ecosystem of technologies, vendors and services. This report evaluates 21 providers of digital commerce platforms.
Aptos, Apttus, Avangate, Bigcommerce, cleverbridge, CloudCraze, Demandware, Digital River, Elastic Path, Episerver, IBM, Intershop, Magento Commerce, MarketLive, MyWebGroce,r NetSuite, Oracle, SAP Hybris Shopify, Unilog, Volusion
Magic Quadrant for Digital Marketing Hubs
14.02.2017 G00299410

Vendors from advertising, marketing automation and analytics are racing to deliver personalized digital marketing at scale. Marketing leaders need a system that can integrate and coordinate data and activities across channels, devices and contexts, continuously and in real time.
Adobe, BlueConic, Cxense, DataXu, Eulerian Technologies, IBM, IgnitionOne, Kitewheel, Marketo, MediaMath, Neustar, Nielsen, Oracle, RedPoint, Salesforce, SAP, Sitecore, Turn, Viant Technology, Ysance, Zeta Global
05.01.2016 G00273467

Marketers need integration and coordination among systems to manage and optimize individual dialogues in real time, across channels, devices and contexts, on a continuous basis. Vendors from advertising, marketing automation and analytics disciplines are converging on this opportunity.
Adobe, DataXu, Epsilon (Conversant), Experian Marketing Services, IBM, IgnitionOne, Kitewheel, Krux, Marin Software, Marketo, MediaMath, Neustar, Nielsen (eXelate), Oracle, RedPoint, Rocket Fuel, Salesforce, Sitecore, Sizmek, Teradata, Turn, Zeta Interactive
Magic Quadrant for E-Discovery Software
18.05.2015 G00267058

Controlling risk and cost remains the primary business goal for seeking better and more effective e-discovery solutions. Gartner evaluates 20 e-discovery software providers to help IT, legal and compliance leaders pick the right one for their needs.
AccessData, Catalyst, CommVault, Driven, Epiq Systems, Exterro, FTI Technology, Guidance Software, HP, IBM, kCura, Kroll Ontrack, LexisNexis, Microsoft, Nuix, Recommind, Symantec, Ubic, Xerox, ZyLAB
19.06.2014 G00260499

The e-discovery software market continues to evolve, with analytics for early case assessment and data reduction, predictive coding, and information governance as the dominating trends in the market. Gartner evaluates 22 e-discovery software vendors to help buyers pick the right one for their needs.
10.06.2013 G00252032

The e-discovery landscape continues to change, with end-to-end functionality, shifts in buying patterns, technology-assisted reviews and acquisitions dominating the market. Gartner evaluates 23 vendors of e-discovery software to help buyers pick the right one for their needs.
Magic Quadrant for Endpoint Protection Platforms
20.08.2019 G00352135

The endpoint protection market is transforming as new approaches challenge the status quo. We evaluated solutions with an emphasis on hardening, detection of advanced and fileless attacks, and response capabilities, favoring cloud-delivered solutions that provide a fusion of products and services.
[Полный текст]
24.01.2018 G00325704

Endpoint protection is evolving to address more of Gartner’s adaptive security architecture tasks such as hardening, investigation, incident detection, and incident response. Security and risk management leaders should ensure that their EPP vendor evolves fast enough to keep up with modern threats.
30.01.2017 G00301183

The endpoint protection platform provides security capabilities to protect workstations, smartphones and tablets. Security and risk management leaders of endpoint protection should investigate malware detection effectiveness, performance impact on the host machines and administrative overhead.
360 Enterprise Security Group, AhnLab, Bitdefender, Carbon Black, Comodo, CrowdStrike, Cylance, Eset, F-Secure, G Data Software, Intel Security, Invincea, Kaspersky Lab, Malwarebytes, Microsoft, Palo Alto Networks, Panda Security, SentinelOne, Sophos, Symantec, Trend Micro, Webroot
[Полный текст]
01.02.2016 G00273851

The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Buyers of endpoint protection should investigate the quality of protection capabilities, the depth and breadth of features, and the ease of administration.
Bitdefender, Check Point Software Technologies, Cylance, Eset, F-Secure, Heat Software, IBM, Intel Security, Kaspersky Lab, Landesk, Microsoft, Panda Security, Qihoo 360, SentinelOne, Sophos, Symantec, Trend Micro, Webroot
[Полный текст]
22.12.2014 G00262733

The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Buyers of endpoint protection should investigate the quality of protection capabilities, the depth and breadth of features, and the ease of administration.
Intel Security (McAfee), Kaspersky Lab, Symantec, Trend Micro, Sophos, Microsoft, Panda Security, Webroot, Landesk, IBM, Stromshield, Lumension Security, Eset, Bitdefender, F-Secure, Qihoo 360, Check Point Software Technologies, ThreatTrack Security
08.01.2014 G00247705

The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
McAfee, Symantec, Kaspersky Lab, Trend Micro, Sophos, Microsoft, LANDesk, IBM, Webroot, Panda Security, Lumension Security, Arkoon Network Security, Bitdefender, Eset, F-Secure, Check Point Software Technologies, ThreatTrack Security, BeyondTrust
02.01.2013 G00239869

The endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
Arkoon Network Security, BeyondTrust, Check Point Software Technologies, Eset, F-Secure, GFI Software, IBM, Kaspersky Lab, LANDesk, Lumension Security, McAfee, Microsoft, Panda Security, Sophos, Symantec, Trend Micro, Webroot
Magic Quadrant for Enterprise Architecture Tools
03.05.2016 G00294575

Enterprise architects are moving from seat-based purchases of EA tools to broader enterprise purchases as platforms for change. This shift, in response to the needs of digital business and the drive to a more business-outcome-driven approach, led to a rise in the number of large sales in 2015.
Avolution, BiZZdesign, Casewise, Mega, Planview, QualiWare, SAP, Software AG, Unicom Systems
Magic Quadrant for Enterprise Backup Software and Integrated Appliances
15.06.2015 G00266742

Enterprise backup is among the oldest, most-performed tasks for infrastructure and operations professionals. Gartner provides analysis and evaluation of the leading providers that offer a range of traditional to innovative recovery capabilities.
CommVault, EMC, IBM, Symantec, HP, Veeam, Actifio, Unitrends, Barracuda Networks, Arcserve, Dell, Asigra, FalconStor, Seagate, Acronis.
[Полный текст]
16.06.2014 G00262146

Enterprise backup is among the oldest, most-performed tasks for IT professionals. Gartner provides analysis and evaluation of the leading providers that offer a range of traditional to innovative recovery capabilities.
CommVault, EMC, IBM, Symantec, HP, Actifio, Veeam Software, Unitrends, Asigra, CA Technologies, Dell, Barracuda Networks, EVault, FalconStor, Acronis, Catalogic Software
[Полный текст]
Magic Quadrant for Enterprise Backup-Recovery Software
05.06.2013 G00245495

Backup is among the oldest, most performed tasks in IT. The industry continues to undergo significant change as organizations embrace new technologies and techniques and show a propensity to augment or switch legacy vendors and backup techniques.
Acronis, Actifio, Asigra, CA Technologies, CommVault, Dell, EMC, EVault, a Seagate Company, FalconStor Software, HP, IBM, NetApp, Symantec, Syncsort, Veeam Software
Magic Quadrant for Enterprise Data Loss Prevention
См.также: Magic Quadrant for Content-Aware Data Loss Prevention
16.02.2017 G00300911

Security and risk management leaders purchase on-premises enterprise DLP to solve for either organizationwide regulatory compliance or to better protect specific types of intellectual property, while monitoring emerging cloud DLP capabilities.
Clearswift, CoSoSys, Digital Guardian, Fidelis Cybersecurity, Forcepoint, GTB Technologies, InfoWatch, Intel Security, SearchInform, Somansa, Symantec, Zecurion
[Полный текст]
28.01.2016 G00277564

Enterprise DLP continues evolving to support both content-aware and context-aware capabilities, as well as support for IT security leaders to cover broader deployment use cases beyond regulatory compliance and intellectual property protection.
Clearswift, Digital Guardian, Fidelis Cybersecurity, Forcepoint, GTB Technologies, InfoWatch, Intel Security, Somansa, Symantec, Zecurion
Magic Quadrant for Enterprise File Synchronization and Sharing
21.07.2016 G00290239

EFSS destination vendors increasingly address digital workplace enablement. IT leaders can consider this market and choose among a range of maturing options for cloud-based content collaboration and data infrastructure modernization.
Accellion, Box, Citrix, Dropbox, Egnyte, Google, Huddle, Intralinks, Microsoft, Syncplicity, Thru, Varonis, WatchDox by BlackBerry
02.07.2014 G00261766

The enterprise file synchronization and sharing market is maturing, which will benefit IT leaders, and mobile and collaboration planners. EFSS capabilities continue to standardize, forcing players to differentiate mobile content and collaboration.
Citrix, EMC, Box, Accellion, Microsoft, Dropbox, Google, IBM, WatchDox, Alfresco, Egnyte, Huddle, AirWatch, Intralinks, Hightail, Workshare, Novell, Acronis, ownCloud
Magic Quadrant for Enterprise Information Archiving
29.10.2015 G00272049

Enterprise information archiving offers organizations solutions for compliance and discovery, while reducing overall storage costs. To aid IT leaders, Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types.
Actiance, Barracuda Networks, Bloomberg, Commvault, EMC, Global Relay, Google, GWAVA, Hewlett Packard Enterprise, IBM, Microsoft, Mimecast, Proofpoint, Smarsh, Veritas, ZL Technologies
10.11.2014 G00262936

Enterprise information archiving offers IT managers in organizations solutions for compliance and e-discovery, while reducing primary storage costs. Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types.
Actiance, Artec IT Solutions, Barracuda Networks, Bloomberg, CommVault, EMC, Global Relay, Google, GWAVA, HP, IBM, MessageSolution, Metalogix, Microsoft, Mimecast, OpenText, Proofpoint, Smarsh, Symantec, ZL Technologies
05.11.2013 G00254034

Enterprise information archiving offers organizations solutions for compliance and e-discovery while reducing primary storage costs. Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types.
Magic Quadrant for Enterprise Mobility Management Suites
06.06.2017 G00311193

Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. I&O leaders responsible for mobile and endpoint strategies, must maintain focus on near- and long-term goals in this rapidly changing market.
BlackBerry, Cisco, Citrix, IBM, Ivanti, Matrix42, Microsoft, MobileIron, NationSky, Snow Software, Sophos, SOTI, VMware
[Полный текст]
08.06.2016 G00279887

Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives.
BlackBerry, Cisco, Citrix, IBM, Landesk, Matrix42, Microsoft, MobileIron, NationSky, SAP, Snow Software, Sophos, SOTI, VMware AirWatch
08.06.2015 G00265477

Enterprise mobility management suites are the glue that connects mobile devices to their enterprise workflow. End-user computing leaders must consider short-term and long-term objectives amid rapid market changes.
AirWatch by VMware, MobileIron, Citrix, IBM, Good Technologies, SAP, Soti, Microsoft, Sophos, BlackBerry, Landesk, Globo
[Полный текст]
03.06.2014 G00261703

The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders’ choices.
MobileIron, AirWatch, Citrix, IBM, Good Technologies, SAP, Soti, Symantec, Sophos, BlackBerry, Globo, Absolute Software, Landesk, Tangoe
Magic Quadrant for (Enterprise) Network Firewalls
17.09.2019 G00375686

With firewall providers embedding multiple security features in firewalls and enabling integration and automation capabilities with other security products, firewalls are evolving into network security platforms.
[Полный текст]
04.10.2018 G00337968

In this mature market, vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and risk tolerance.
10.07.2017 G00310171

“Next generation” capabilities have been achieved by all products in the enterprise network firewall market, and vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and cost.
AhnLab, Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet, Hillstone, Huawei, Juniper Networks, New H3C Group, Palo Alto Networks, Sangfor, SonicWall, Sophos, Stormshield, WatchGuard
[Полный текст]
25.05.2016 G00277994

“Next generation” capability has been achieved by the products in the network firewall market, and vendors differentiate on feature strengths. Buyers must consider the trade-offs between best-of-breed function and costs.
AhnLab, Barracuda Networks, Check Point Software Technologies, Cisco, Dell SonicWALL, Forcepoint, Fortinet, Hillstone Networks, Huawei, Juniper Networks, Palo Alto Networks, Sangfor, Sophos, Stormshield, WatchGuard
[Полный текст]
22.04.2015 G00263955

“Next-generation” capability has been achieved by the leading products in the network firewall market, and competitors are working to keep the gap from widening. Buyers must consider their operational realities, the burden of switching, and the trade-offs between “best-of-breed” function and costs.
Check Point Software Technologies, Palo Alto Networks, Fortinet, Cisco, Intel Security (McAfee), WatchGuard, Dell SonicWALL, Juniper Networks, Hillstone Networks, Sophos, Huawei, Barracuda Networks, AhnLab, HP, F5, Stormshield, Sangfor
15.04.2014 G00258296

“Next generation” capability has been achieved by the leading products in the network firewall market, and competitors are struggling to keep the gap from widening too much. Buyers must consider their own operational realities and the burden of switching.
Check Point Software Technologies, Palo Alto Networks, Fortinet, Cisco, Juniper Networks, McAfee, Dell SonicWALL, HP, Hillstone Networks, WatchGuard, Huawei, Sophos, Barracuda Networks, AhnLab, Arkoon+Netasq, F5
[Полный текст]
07.02.2013 G00229302

Advances in threats have driven mainstream firewall demand for next-generation firewall capabilities. Buyers should focus on the quality, not quantity, of the features and the R&D behind them. This market includes mature vendors and new entrants.
[Полный текст]
Magic Quadrant for Global Retail Core Banking
21.04.2016 G00272194

The core banking market demand for practical and enabling technology to support significant business initiatives, such as a digital banking strategy, is surging. Lack of agility and the high cost of technology are driving more banks to build the business case for core banking renewal.
Avaloq, BML Istisharat, Datapro, FIS, Fiserv (DNA), Fiserv (Signature), Infosys, Intellect Design Arena, Misys, Oracle, SAB, SAP, Silverlake Axis, Sopra Banking Software (Sopra Banking Amplitude), Sopra Banking Software (Sopra Banking Platform), TCS, Temenos
Magic Quadrant for Group Video Systems
14.07.2016 G00290014

Software video infrastructure, video as a service and innovative form factors are reshaping video collaboration. We review eight vendors with the necessary reach, scale and interoperability for the global enterprise market so that IT infrastructure and operations leaders can make an informed choice.
Avaya, Cisco, Huawei, Lifesize, Polycom, StarLeaf, Vidyo, ZTE
Magic Quadrant for IT Project and Portfolio Management Software Applications
Magic Quadrant for IT Risk Management
03.07.2019 G00383242

Demand for ITRM solutions continues to increase as digital ecosystems evolve. Security and risk management leaders managing cybersecurity initiatives, board risk oversight and digital compliance should use this research to evaluate the opportunities and challenges in automating IT risk workflows.
[Полный текст]
Magic Quadrant for IT Services for Communications Service Providers
14.07.2016 G00290240

This Magic Quadrant helps communications service provider CIOs identify and evaluate suppliers to meet their operational IT service needs. The profiled vendors have expertise in discrete and multiyear engagements around CSPs’ operational IT in a multiregional context.
Accenture, Amdocs, Atos, Capgemini, CGI, Cognizant, Deloitte, Ericsson, HCL Technologies, Hewlett Packard Enterprise, Huawei, IBM, Infosys, Tata Consultancy Services, Tech Mahindra, VirtusaPolaris, Wipro
Magic Quadrant for Identity Governance and Administration
Отзывы для Identity Governance and Administration: Reviews
09.10.2019 G00354412

IGA is a mature market that faces increasing client demand for cloud-delivered solutions and is splitting between solutions focused on either basic or mature IGA requirements. Security and risk management leaders should scrutinize vendors for compelling roadmaps and a track record of innovation.
[Полный текст]
21.02.2018 G00326925

While the market for IGA tools delivered as on-premises software is mature, intense vendor activity renders many new choices for IGA delivered as a service. Security and risk management leaders responsible for IAM should emphasize future requirements when planning to purchase an IGA solution.
AlertEnterprise, Atos (Evidian), CA Technologies, Core Security, Dell Technologies (RSA), Hitachi ID Systems, IBM, Micro Focus (NetIQ), Microsoft, Omada, One Identity, Oracle, SailPoint, SAP, Saviynt
[Полный текст]
22.02.2017 G00302686

Several vendors are accelerating efforts to offer cloud-delivered IGA, improve analytics and align with PAM products. Security and risk management leaders responsible for IAM should be aware of functional differences and trade-offs between on-premises and cloud-delivered IGA and plan accordingly.
AlertEnterprise, Atos (Evidian), CA Technologies, Core Security, Dell Technologies (RSA), IBM, Micro Focus (NetIQ), Omada, One Identity, Oracle, SailPoint, SAP, Saviynt
29.02.2016 G00274258

The IGA market is maturing into an early mainstream phase. IAM and security leaders should take note of emerging requirements around more risk-aware identity approaches and cloud adoption that are causing innovative vendors to integrate analytics with adjacent IT and data security technologies.
AlertEnterprise, Atos (Evidian), CA Technologies, Courion, Dell, EMC (RSA), Hitachi ID Systems, IBM, Micro Focus (NetIQ), Omada, Oracle, SailPoint, SAP, Saviynt
[Полный текст]
12.01.2015 G00261633

The IGA market is transforming legacy, on-premises IAM products. IGA vendors are investing heavily to meet client needs in ease of use, mobility, business agility, and lower total cost of ownership. User provisioning and access governance functions continue to consolidate.
AlertEnterprise, Atos, Avatier, Beta Systems, CA Technologies, Courion, Dell, EMC (RSA), Evidian, Fischer International, Hitachi ID Systems, Identity Automation, IBM, NetIQ, Omada, Oracle, SailPoint, SAP, The Dot Net Factory
30.12.2013 G00253758

The identity and access management market has experienced significant upheaval along with its usual growth over the past two years. What began as two relatively distinct markets, user provisioning and access governance, have merged into a single category of identity governance and administration.
SailPoint, EMC (RSA Aveksa), Oracle, Courion, Hitachi ID Systems, NetIQ, Omanda, Dell, CA Technologies, IBM, AlertEnterprise, CrossIdeas, SAP, Avatier, Beta Systems, Evidian, Fischer International, Atos, iSM Secu-Sys, Caradigm, Deep Identity, e-trust
Magic Quadrant for Identity and Access Management as a Service
06.06.2016 G00279633

Lightweight web-centric services with few identity governance and administration capabilities remain in high demand, and vendors are adding IGA features. Vendors delivering deeper functionality for IGA and legacy application support, including niche vendors, may be best for IAM leaders’ needs.
Centrify, Covisint, EMC (RSA), Fischer International, IBM, Ilantus, iWelcome, Microsoft, Okta, OneLogin, Ping Identity, SailPoint, Salesforce, Simeio Solutions
04.06.2015 G00265376

Large vendor entrants in 2014 began to make their presence felt. Web-centric but shallow-function services are in high demand. Vendors that can deliver deeper functionality for IGA and legacy application support, including niche vendors, may be the best for your needs.
Okta, Microsoft, Saleforce, IBM, Centrify, Ping Identity, SailPoint, Covisint, CA Technologies, Simeio Solutions, Fischer International Identity, iWelcome, Exostar, Ilantus
02.06.2014 G00260221

The IDaaS market is still in its early days. Vendors come from distinctly different backgrounds, and there are significant variances among providers with regard to IAM functional depth and support provided for different use cases. Niche vendors may be the best for your needs.
Okta, Ping Identity, Covisint, OneLogin, CA Technologies, Centrify, Lighthouse Security Group, Fischer International Identity, iWelcome, Simplified, Simeio Solutions, Exostar, SailPoint, Symplified
Magic Quadrant for Integrated Risk Management Solutions
15.07.2019 G00369371

An IRM strategy reduces siloed risk domains and supports dynamic business decision making via risk-data correlations and shared risk processes. Security and risk management leaders should use this Magic Quadrant to identify technology solutions that support this strategy.
[Полный текст]
Magic Quadrant for Intrusion Detection and Prevention Systems
10.01.2018 G00324914

IDPS continues to be absorbed by firewall placements at the perimeter, yet still offers the best detection efficacy and a central prevention, detection, and response solution on a network. Security and risk management leaders should seek innovation in advanced analytics and public cloud support.
Alert Logic, Cisco, FireEye, Hillstone Networks, McAfee, NSFOCUS, Trend Micro, Vectra Networks, Venustech
16.01.2017 G00295470

Security and risk management leaders should know that while IDPSs are being absorbed by firewall placements at the perimeter, they give the best protection. They’re also responding to pressure from uptake of other threat defense solutions, and providing credible internal and cloud placement options.
AhnLab, Alert Logic, Cisco, Hillstone Networks, Huawei, IBM, Intel Security (McAfee), NSFOCUS, Trend Micro (TippingPoint), Venustech, Wins
[Полный текст]
16.11.2015 G00271823

The network IPS market continues being absorbed by next-generation firewall placements at the perimeter. Next-generation IPSs offer the best protection and are responding to pressure coming from the uptake of advanced threat defense solutions and the requirement to provide cloud placements.
Cisco, Hewlett Packard Enterprise, Huawei, IBM, Intel Security (McAfee), NSFOCUS, Wins
[Полный текст]
29.12.2014 G00263353

The network IPS market continues being absorbed by next-generation firewall placements. Next-generation IPSs offer the best protection, but the IPS market must respond to the pressure coming from the uptake of advanced threat defense solutions and the requirement to provide cloud placements.
Intel Security (McAfee), Cisco, IBM, HP, Radware, Huawei, NSFOCUS Information Technologies
16.12.2013 G00253078

The network intrusion prevention system market has undergone dynamic evolution, increasingly being absorbed by next-generation firewall placements. Next-generation IPSs are available for the best protection, but the IPS market is being pressured by the uptake of advanced threat defense solutions.
Sourcefire (Cisco), McAfee, HP, Cisco, IBM, Stonesoft (McAfee), Radware, NSFOCUS Information Technologies, Huawei, Enterasys Networks (Extreme Networks)
Magic Quadrant for Managed Mobility Services
27.10.2016 G00294111

In the past year, service providers that globally manage the life cycle of distributed mobile estates have moved from a mobile-first focus to become outcome-based. This research supplies buyers of managed mobility services with an evaluation of providers that have improved both vision and execution.
AT&T, DMI, Fujitsu, Honeywell Enterprise Mobility, HPE, IBM, Mobi, Orange, Tangoe, Telefónica, Vodafone, Vox Mobile-GEMA, Zebra, Zensar
25.07.2013 G00247819

This research focuses on vendors managing pools of globally-distributed, corporate-liable devices and bring your own device users. No Leaders or Challengers have emerged in this market as providers need to invest more in people, processes, tools and awareness to better serve a growing global demand.
Accenture, Atos, AT&T, Deutsche Telekom, DMI, Enterprise Mobile, IBM, Mobi, Motorola Solutions, Orange, Stratix, Tangoe, Tata Consultancy Services, Telefonica, Unisys, Vodafone, Vox Mobile, WidePoint Solutions
Magic Quadrant for Managed Security Services
26.01.2017 G00299064

Security and risk management leaders considering managed security services should use this Magic Quadrant to help identify and evaluate providers with effective threat detection and compliance capabilities, and their ability to deliver services globally.
AT&T, Atos, BAE Systems, BT, CenturyLink, CSC, HCL Technologies, HPE, IBM, NTT Security, Orange Business Services, SecureWorks, Symantec, Trustwave, Verizon, Wipro
23.12.2015 G00273932

Security managers should evaluate MSSPs for enterprise scale operations, multinational and local presence, and effective threat management and compliance capabilities. Use this Magic Quadrant to evaluate MSSPs to support global service requirements, regional presence and leading-edge services.
AT&T, BAE Systems, BT, CenturyLink, CSC, Dell SecureWorks, HPE, IBM, NTT, Orange Business Services, Symantec, Trustwave, Verizon, Wipro
[Полный текст]
Magic Quadrant for Marketing Resource Management
08.02.2016 G00274973

This Magic Quadrant evaluates vendors of applications that support the management of marketing resources, such as people, plans, budgets, projects, tasks, assets and branded content. It will help IT leaders work with marketing leaders to find an MRM solution.
BrandMaker, BrandSystems, Capital ID, Code Worldwide, Direxxis, Elateral, IBM, Infor, MarcomCentral, Microsoft, Saepoi, SAP, SAS, Teradata, Wedia, Workfront.
Magic Quadrant for Mobile Data Protection
08.09.2014 G00262734

Mobile data protection solutions defend access to secure data on storage systems in notebooks, removable media, desktops, servers and, in a few cases, cloud storage environments. Buyers seek data protection policy enforcements across multiple platforms, minimal support costs and proof of protection.
Intel Security (McAfee), Sophos, Check Point Software Technologies, Symantec, WinMagic, Dell, Digital Guardian, Trend Micro, Wave Systems, Kaspersky Lab, Microsoft, CenterTools
Magic Quadrant for Mobile Device Management Software
(см.также Enterprise Mobility Management Suites)
23.05.2013 G00249820

Interest and adoption in mobile device management continues to grow at a fast rate, with companies looking for enterprise security and mobile optimization and enablement. Strong offerings go beyond policy to support enterprise mobile management.
Absolute Software, AirWatch, BlackBerry, BoxTone, Citrix, Fiberlink, Good Technology, IBM, Kaspersky Lab, LANDesk, McAfee, MobileIron, SAP, Sophos, Soti, Symantec, Tangoe, Trend Micro
[Полный текст]
Magic Quadrant for Modular Servers
23.05.2016 G00278242

Any server that is hosted by a dedicated chassis or enclosure is termed a modular server by Gartner. The market chiefly comprises blade and multinode servers. I&O leaders should use this research to help choose both the right form factor and the right vendor for new projects.
Atos, Cisco, Cray, Dell, Fujitsu, Hitachi, HPE, Huawei, Inspur, Lenovo, SGI, Supermicro
[Полный текст]
04.05.2015 G00258233

Modular servers form a compound market where the traditional market for blade servers and multinode servers overlap. Data center managers should use this Magic Quadrant to understand the modular server market and evaluate the related vendors and their offerings.
Atos, Cisco, Cray, Dell, Fujitsu, HP, Hitachi, Huawei, Lenovo, SGI, Supermicro
[Полный текст]
Magic Quadrant for Network Access Control
10.12.2014 G00262737

Most NAC vendors provide good support for the BYOD use case. Now, the market is evolving to address another use case, where NAC policy servers act as “warehouses of context” and share contextual data with firewalls and other security components to enable fine-grained policy enforcement.
Cisco, ForeScout Technologies, Aruba Networks, Pulse Secure, Extreme Networks, Portnox, Impulse Point, InfoExpress, Auconet, Bradford Networks
12.12.2013 G00249599

NAC vendors are beginning to differentiate their solutions through their breadth of integrations with other products. Mobile device management integrations are a requirement to address the BYOD trend, and integrations with firewalls and other security components enable sharing of contextual data.
Cisco, ForeScout Technologies, Aruba Networks, Juniper Networks, Bradford Networks, Extreme Networks (Enterasys), Portnox, InfoExpress, Impulse Point, StillSecure, Auconet
Magic Quadrant for Network Performance Monitoring and Diagnostics
Отзывы для Network Performance Monitoring and Diagnostics: Reviews.
21.02.2017 G00301193

NPMD solutions are key in helping I&O leaders support more complex technologies and services with network visibility, performance issue detection and root cause analysis. Vendors are innovating with cloud monitoring, support for software-defined environments and more flexible deployment models.
AppNeta, CA Technologies, Cisco, Corvil, ExtraHop, Flowmon Networks, Genie Networks, HPE, InfoVista, Ipswitch, LiveAction, NetScout, Paessler, Riverbed, SevOne, SolarWinds, Viavi
01.02.2016 G00275307

NPMD solutions play a key role in helping IT ops support increasingly complex technologies and services with network visibility, detection of performance issues and root cause analysis. Vendors continue to innovate with operational analytics, integrated GUIs and more flexible deployment options.
Automic, CA Technologies, Cisco, Corvil, Flowmon Networks, Genie Networks, Hewlett Packard Enterprise, InfoVista, NetScout Systems, NetScout Systems (Fluke Networks), Niksun, Paessler, Riverbed, SevOne, SolarWinds, Viavi Solutions
Magic Quadrant for Network Services
Отзывы на Network Services, Global: Reviews.
13.02.2017 G00299950

Driven by cloud IT service adoption, the market for global enterprise network services is undergoing a generational shift in both technologies and the provider landscape. Infrastructure and operations leaders must adapt their network sourcing approaches to reflect this transformation.
AT&T, BT, CenturyLink, Global Cloud Xchange, GTT, Level 3 Communications, Masergy, NTT Communications, Orange Business Services, Sprint, Tata Communications, Telefonica, Telstra, T-Systems, Verizon, Vodafone
14.01.2016 G00274439

Global enterprise networks are entering a time of rapid technological evolution, driven by enterprise adoption of cloud IT service delivery and availability of new SDN technologies. With growing differentiation among providers, enterprises must ensure supplier roadmaps are aligned with their needs.
AT&T, BT Global Services, Level 3 Communications, NTT Communications, Orange Business Services, Sprint, Tata Communications, Telefonica, Telstra, T-Systems, Verizon, Vodafone
Magic Quadrant for Privileged Access Management
03.12.2018 G00356017

Privileged access management is one of the most critical security controls, particularly in today’s increasingly complex IT environment. Security and risk management leaders must use PAM tools in a long-term strategy for comprehensive risk mitigation.
[Полный текст]
Magic Quadrant for Public Cloud Storage Services
25.06.2015 G00268914

The public cloud storage services market continues to rapidly evolve, with market domination by the hyperscale vendors. With the price wars subsiding, CIOs and infrastructure managers should prioritize vendors’ product strength, breadth of ecosystem and TCO as key purchase criteria.
Amazon Web Services, Microsoft, Google, AT&T, IBM, Rackspace, Verizon
09.07.2014 G00262037

The public cloud storage service market is evolving rapidly, with early signs of consolidation amid growing price competition that impact IT leaders. Gartner assesses the key cloud storage service providers on their execution prowess and strategic vision.
Magic Quadrant for Sales Force Automation
09.07.2015 G00269153

IT leaders supporting sales will find expanded options in the sales force automation market with new vendor entrants and one less option with the removal of former industry leader Oracle Siebel CRM.
Aptean, Base, Bullhorn, CRMnext, Infor, Microsoft (Dynamics CRM), Microsoft (Dynamics CRM Online), NetSuite, Oracle, Sage, Salesforce, SAP (Cloud for Sales), SAP (CRM), SugarCRM, Tour de Force, Zoho
[Полный текст]
Magic Quadrant for Sales Performance Management
Отзывы для Sales Performance Management: Reviews.
21.01.2016 G00274059

The SPM software market grew 10% in 2015 to about $715 million. IT leaders supporting sales should focus on sales incentive compensation in the short term, but also support use cases for sales enablement and corporate performance management in the midterm. This report will help them select a vendor.
Anaplan, beqom, CallidusCloud, IBM, Incentives Solutions, Nice Systems, Optymyze, Oracle, Salesforce, SAP, Vistex, Xactly, Zoho
Magic Quadrant for Secure Email Gateways
29.06.2015 G00268427

The secure email gateway market is experiencing renewed interest due largely to an increase in targeted phishing attacks. Vendors are responding with URL link protection and attachment sandboxing, but have not addressed social engineering attacks with no payload.
Proofpoint, Cisco, Microsoft, Symantec, Intel Security, Trend Micro, Mimecast, Websense, BAE Systems, Barracuda Networks, Sophos, Clearswift, Fortinet, Dell, Trustwave, WatchGuard Technologies
01.07.2014 G00259855

The secure email gateway market is fractured between providers of basic protection delivered by embedded functionality from incumbent email, firewall, or endpoint protection solutions; and vendors that focus on the state of the art in advanced attack and information protection.
Proofpoint, Cisco, Symantec, Microsoft, Barracuda Networks, Sophos, McAfee, Trend Micro, Websense, Mimecast, Clearswift, SilverSky, Trustwave, WatchGuard Technologies, Fortinet, Dell
02.07.2013 G00247704

The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability encryption and better protection from targeted phishing attacks.
Magic Quadrant for Secure Web Gateways
26.11.2018 G00335718

The secure web gateway marketplace continues to be dominated by appliances; however, the rapid growth of cloud services is becoming a disruptive force in the marketplace. Many vendors have added cloud access security broker functionality through partnerships or technology acquisitions.
[Полный текст]
12.06.2017 G00328904

On-premises appliances continue to rule the SWG market, with a 71% market share (as measured by revenue). However, cloud-based SWG services are growing more rapidly, with a five-year historical compound annual growth rate of 32%, versus only 5% for appliances.
Barracuda Networks, Cisco, ContentKeeper, Forcepoint, iboss, McAfee, Sangfor, Sophos, Symantec, Trend Micro, Zscaler
28.05.2015 G00267241

The market for SWG solutions is still dominated by traditional on-premises appliances. But, the use of cloud-based services is growing rapidly, and advanced threat protection functionality remains an important differentiator.
Zscaler, Blue Coat, Websense, Cisco, Intel Security (McAfee), Trend Micro, Barracuda Networks, iboss, ContentKeeper, Symantec, Sophos, Trustwave, Sangfor
23.06.2014 G00262738

The SWG market is evolving rapidly as vendors respond to the mobility trend and the evolving threat landscape. SWG vendors are highly differentiated in their ability to deliver cloud-based services, and to protect users with advanced threat defense features.
Blue Coat Systems, Zscaler, Cisco, Websense, Intel Security (McAfee), Barracuda Networks, Trend Micro, iboss, Symantec, ContentKeeper Technologies, Trustwave, Sophos, Sangfor
[Полный текст]
28.05.2013 G00249600

Malware detection and cloud services are two areas of continuing disparity among SWG vendors. Our market analysis of the vendors highlights key differences in these capabilities and other key functions.
Magic Quadrant for Security Awareness Computer-Based Training
18.07.2019 G00378818

People influence security more than technology or policy, and cybercriminals know how to exploit human behaviors. Security and risk management leaders should invest in tools that increase awareness and influence behavior that supports security business objectives through computer-based training.
[Полный текст]
13.11.2018 G00345889

People influence security more than technology or policy, and cybercriminals know how to exploit human behaviors. Security and risk management leaders must invest in tools that increase awareness and influence behavior that supports security business objectives through computer-based training.
25.10.2016 G00293102

Humans can be either the strongest or weakest defense against threats. Security leaders are, more than ever, seeking to increase security awareness and influence end-user behavior while also boosting security performance, as well as supporting productivity, accountability and compliance.
BeOne Development, Digital Defense, Global Learning Systems, Inspired eLearning, Junglemap, KnowBe4, MediaPro, Optiv Security, PhishLine, PhishMe, Popcorn Training, SANS Institute, Secure Mentem, Security Innovation, Security Mentor, Symantec (Blackfin Security), Terranova WW, The Security Awareness Co., Wombat Security Technologies
Magic Quadrant for Security Information and Event Management
18.02.2020 G00381093

Security and risk management leaders increasingly seek security information and event management solutions with capabilities that support early attack detection, investigation and response. Users should balance advanced SIEM capabilities with the resources needed to run and tune the solution.
03.12.2018 G00348811

Security and risk management leaders increasingly seek SIEM solutions with capabilities that support early targeted attack detection and response. Users must balance advanced SIEM capabilities with the resources needed to run and tune the solution.
[Полный текст]
04.12.2017 G00315428

Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
10.08.2016 G00290113

The need for early targeted attack detection and response is driving the expansion of new and existing SIEM deployments. Advanced users seek SIEM with advanced profiling, analytics and response features.
AlienVault, BlackStratus, EMC (RSA), EventTracker, Fortinet (AccelOps), HPE, IBM, Intel Security, LogRhythm, ManageEngine, Micro Focus, SolarWinds, Splunk, Trustwave
20.07.2015 G00267505

The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
IBM Security, Splunk, HP, Intel Security, LogRhythm, EMC (RSA), AlienVault, Trustwave, MicroFocus (NetIQ), SolarWinds, AccelOps, EventTracker, BlackStratus
25.06.2014 G00261641

Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics.
IBM Security, HP, McAfee, Splunk, LogRhythm, EMC (RSA), NetIQ, AlienVault, Trustwave, SolarWinds, Tibco Software, Tenable Network Security, AccelOps, EventTracker, BlackStratus
[Полный текст]
07.05.2013 G00246886

Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics.
AlienVault, EiQ Networks, EMC-RSA, EventTracker, HP-ArcSight, IBM-Q1 Labs, LogRhythm, McAfee, NetIQ, Sensage, SolarWinds, Splunk, Symantec, Tenable Network Security, Tibco-LogLogic, Trustwave
[Полный текст]
Magic Quadrant for Structured Data Archiving and Application Retirement
16.06.2015 G00266173

Structured data archiving technologies help IT leaders retire legacy applications, reduce capital and operating expenses, and meet governance and compliance requirements. We evaluate vendors offering products and services that provide archiving for databases and data from enterprise applications.
Informatica, IBM, HP, Solix Technologies, Delphix, PBS Software, OpenText, Teradata (RainStor), EMC, Data Migration, DataVard, Actifio, DCSoftware
[Полный текст]
Magic Quadrant for Supply Chain Planning System of Record
19.01.2016 G00263113

This Magic Quadrant examines vendors that provide supply chain planning system-of-record solutions. Supply chain and IT leaders can use this research when evaluating and selecting an SCP system to underpin their journey to Stage 3 SCP maturity and beyond.
Adexa, Arkieva, Barloworld Supply Chain Software, Blue Ridge, Demand Solutions, FuturMaster, GAINSystems, Infor, JDA Software, Kinaxis, Logility, NeoGrid, OM Partners, Oracle, Quintiq, SAP APO, SAS, Slimstock, Steelwedge, Syncron, ToolsGroup
Magic Quadrant for Third-Party Logistics Providers
02.05.2016 G00264438

This Magic Quadrant evaluates third-party logistics providers’ ability to be a global preferred provider. Logistics executives can use this research to better understand these 3PLs and their capabilities when evaluating and selecting the right set of providers to meet their global logistics needs.
Agility, APL Logistics, Bolloré Logistics (formerly SDV), Ceva Logistics, Damco, DB Schenker, DHL, DSV, Expeditors, Geodis, Kuehne + Nagel, Panalpina, Pantos Logistics, UPS Supply Chain Solutions, XPO Logistics, Yusen Logistics
Magic Quadrant for Transportation Management Systems
30.03.2016 G00277030

Intelligent business process management suites compress the observation-to-action-to-outcome cycle, and help business transformation leaders, business process directors and solution architects establish a fluid capability to handle big change. This Magic Quadrant evaluates 15 iBPMS vendors.
Supply Chain Execution (SCE) Convergence, Globalization, Deployment Model, SMB TMS, Implementation
Magic Quadrant for Unified Communications
13.07.2016 G00310071

As the enterprise UC market continues to mature, we expect more consolidation and increased user expectations — prompting an emphasis on vendors’ telephony capabilities and financial viability. Enterprise planners must match their own priorities to vendor strengths before committing to a solution.
ALE, Avaya, Cisco, Huawei, Interactive Intelligence, Microsoft, Mitel, NEC, ShoreTel, Unify
Magic Quadrant for Unified Endpoint Management Tools
06.08.2019 G00369801

UEM tools continue to mature as buyers migrate PCs away from legacy client management tools. I&O leaders responsible for mobile and endpoint strategy must evaluate these capabilities along with UEM tools’ ability to perform modern management of PCs and management of mobile devices.
[Полный текст]
Magic Quadrant for Unified Threat Management
20.09.2018 G00336625

SMB multifunctional firewalls, or UTM, provide multiple security features in a single appliance to SMB and distributed enterprises. Security and risk management leaders should use this research to select the right vendor based on their requirements and geography.
20.06.2017 G00316047

SMB multifunction firewalls, or UTM, provide SMBs and distributed enterprises with multiple security functions in a single appliance. Network security leaders should use this research to evaluate performance, security, ease of use, local support and technology’s ability to handle new SMB practices.
Barracuda Networks, Check Point Software Technologies, Cisco, Fortinet, Hillstone Networks, Huawei, Juniper Networks, Rohde & Schwarz Cybersecurity, SonicWall, Sophos, Stormshield, Untangle, Venustech, WatchGuard
27.08.2015 G00269677

Unified threat management devices provide small and midsize businesses with multiple network security functions in a single appliance. SMB buyers should carefully evaluate UTMs’ performance when numerous security functions are enabled, and UTMs’ ability to handle new SMB practices.
Fortinet, Check Point Technologies, Sophos, Dell, Cisco, Juniper Networks, WatchGuard, Stormshield, Barracuda Networks, Rohde & Schwarz (gateprotect), Huawei, Hillstone Networks, Aker Security Solutions
[Полный текст]
07.08.2014 G00261973

Unified threat management devices provide small and midsize businesses with multiple network security functions in a single appliance. Buyers should focus on performance when many security functions are enabled, and on the skill set of the associated channel partner.
Fortinet, Check Point Technologies, WatchGuard, Dell, Sophos, Cisco, Juniper Networks, Cyberoam, Stormshield (Netasq), Barracuda Networks, Huawei, gateprotect, Hillstone Networks, Aker Security Solutions, Clavister
19.07.2013 G00245469

Unified threat management devices provide small or midsize businesses with multiple network security functions in a single appliance. Buyers should focus on performance when every targeted feature is enabled, and on total cost of ownership instead of initial purchase price.
Magic Quadrant for User Authentication
01.12.2014 G00260746

The market is dominated by 10% of the authentication vendors globally. While mobile and cloud remain disruptive, buyers continue to give weight to user experience. Investment in contextual, adaptive techniques increases, but biometric methods remain niche. Smart things will become authenticators.
SafeNet, EMC (RSA), TeleSign, Gemalto, SecurEnvoy, PointSharp, SMS Passcode, Microsoft, Deepnet Security, Entrust Datacard, Authentify, CA Technologies, neXus, Symantec, Vasco Data Security, HID Global, Duo Security
09.12.2013 G00249409

The market is dominated by 5% of the vendors. Mobile and cloud are disruptive. Buyers give greater weight than before to user experience. Legacy authentication methods are increasingly deprecated. Vendors must invest appropriately to stay relevant.
SafeNet, EMC (RSA), Gemalto, Technology Nexus, CA Technologies, Vasco Data Security, TeleSign, Symantec, HID Global, SecurEnvoy, Authentify, SecureAuth, Entrust, Swivel Secure, Equifax, SMS Passcode, Deepnet Security, Microsoft, PointSharp, Mi-Token
Magic Quadrant for Utilities Customer Information Systems
09.06.2016 G00279419

We provide updated vendors’ positioning in this important utility software market to reflect the changes in utilities’ buying criteria resulting from evolving business needs such as rising consumers’ expectations and the impact of digital business transformation.
efluid SAS, Ferranti Computer Systems, Fluentgrid, Gruppo Engineering, Indra, Itineris, Open International, Oracle Utilities, SAP
Magic Quadrant for WAN Optimization
16.05.2016 G00276843

Network managers are building hybrid networks to address increased cloud adoption and now see WAN optimization as just one feature needed for WAN designs. Vendors are responding by adding functionality that supports hybrid WAN, while carriers are embedding WAN optimization in the WAN infrastructure.
Array Networks, Aryaka, Blue Coat, Circadence, Cisco, Citrix, Exinda, FatPipe Networks, InfoVista (Ipanema Technologies), NTT Communications, Riverbed, Sangfor, Silver Peak
Magic Quadrant for Warehouse Management Systems
13.02.2017 G00300345

The WMS market is very mature, but differentiation continues to exist — most notably in usability, adaptability, intelligence and how well solutions orchestrate end-to-end logistics processes. Supply chain and IT leaders should use this research to understand the current state of the WMS market.
HighJump, Infor, JDA Software, Made4net, Manhattan Associates, Microlistics, Oracle, Reply, SAP, Softeon, Synergy Logistics, Tecsys, Vinculum
21.01.2016 G00271023

While WMS applications are approaching functional parity, vendor innovation continues making these solutions more usable, adaptive, smarter and better able to orchestrate end-to-end logistics processes.
HighJump, Infor, JDA Software, LogFire, Made4net, Manhattan Associates, Oracle, Reply, SAP, Softeon, Synergy Logistics, Tecsys
Magic Quadrant for Web Application Firewalls
17.09.2019 G00373533

Driven by the adoption of cloud web application and API protection services, the web application firewall market is growing. Network and application security leaders need to evaluate how WAFs can provide improved security that’s easy to consume and manage, while respecting data privacy requirements.
[Полный текст]
29.08.2018 G00340592

The WAF market is growing, driven by the adoption of cloud WAF services. Enterprise security teams should use this research as part of their evaluations of how WAFs can provide improved security that’s easy to consume and manage, while respecting data privacy requirements.
07.08.2017 G00314552

The WAF market is growing, driven by the adoption of cloud-based WAF service. Enterprise security teams should use this research as part of their evaluation on how WAFs can provide improved security that is also easy to consume and manage, while respecting data privacy requirements.
Akamai, Amazon Web Services, Barracuda Networks, Citrix, Cloudflare, Ergon Informatik, F5, Fortinet, Imperva, Instart Logic, NSFOCUS, Penta Security Systems, Positive Technologies, Radware, Rohde & Schwarz Cybersecurity (DenyAll), Venustech
19.07.2016 G00290000

The WAF market is growing, with new use cases and security requirements ranging from “good enough” security for compliance to protection against targeted attacks. Enterprise security teams should evaluate how WAFs can provide high security that is also easy to consume and manage.
AdNovum, Akamai, Barracuda Networks, Citrix, CloudFlare, DenyAll, Ergon Informatik, F5, Fortinet, Imperva, NSFOCUS, Penta Security Systems, Positive Technologies, Radware, Trustwave, United Security Providers
[Полный текст]
15.07.2015 G00271692

The WAF market is growing quickly, with a range of deployments from “good enough” to more complex WAF deployments aiming at high security. Enterprise security teams should evaluate how WAFs can provide improved security, require tolerable staff involvement and integrate in their security ecosystem.
Imperva, F5, Citrix, Akamai, Barracuda Networks, Positive Technologies, DenyAll, Radware, Fortinet, Trustwave, NSFOCUS, Penta Security, Ergon Informatik, United Security Providers, AdNovum, DBAPPSecurity
17.06.2014 G00259365

The WAF market is growing quickly from a small base; it is composed of pure players, application delivery controller vendors, cloud service providers and network security vendors. Buyers should evaluate how WAFs can provide high security, minimize false positives and sustain performance.
Imperva, F5, Citrix, Barracuda Networks, Akamai, Fortinet, DenyAll, NSFOCUS, Radware, Trustwave, Ergon Informatik, Penta Security, BeeWare, AdNovum, United Security Providers, DBAPPSecurity
Magic Quadrant for Web Conferencing
28.12.2015 G00273007

Web conferencing is emblematic of the dynamic blend of content and collaboration in the digital workplace. Conferencing markets converge as audio, video and Web mix with persistent spaces to enable faster decisions and remote teamwork.
Adobe, Arkadin, AT&T, Blackboard, Cisco, Citrix, Fuze, Google, IBM, LogMeIn, Microsoft, PGi, Vidyo, West Unified Communications Services, Zoom
Magic Quadrant for x86 Server Virtualization Infrastructure
14.07.2015 G00268538

About 75% of x86 server workloads are virtualized, but virtualization technologies are becoming more lightweight, supporting more workloads and agile development. Price, cloud interoperability and specific use cases are driving enterprises to deploy multiple virtualization technologies.
VMware, Microsoft, Oracle, Odin, Red Hat, Citrix, Huawei
02.07.2014 G00262673

At least 70% of x86 server workloads are virtualized, the market is mature and competitive, and enterprises have viable choices. An increasing number of enterprises are evaluating both the cost benefits of competitive migrations and the benefits of deploying multiple virtualization technologies.
[Полный текст]
27.06.2013 G00251472

Roughly two-thirds of x86 server workloads are virtualized, the market is mature and competitive, and enterprises have viable choices. More than ever before, enterprises are evaluating the cost-benefits of switching technologies and considering deployment of multiple virtualization infrastructures.
В настоящее время нет комментариев. Вы можете стать первым.