- Каждая картинка ведёт на соответствующее изображение на официальном сайте Гартнера.
- Указана дата публикации соответствующего отчёта и его уникальный ID. По клику на ID можно перейти к самому отчёту и, например, купить его или получить по подписке, если она есть.
- При наличии действующей (и известной мне) полной текстовой версии отчёта, лицензированной для распространения, ссылка на неё также приведена. Обычно такие отчёты доступны лишь некоторое время, после чего исчезают.
- Access Management (2019) (2018) (2017)
- Advanced Analytics Platforms (2016) (2015)
- Application Performance Monitoring Suites (2016) (2015)
- Application Security Testing (2017) (2015) (2014) (2013)
- Business Analytics Services (2017)
- Business Continuity Management Planning Software (2016) (2014) (2013)
- Business Intelligence and Analytics Platforms (2017) (2016)
- CRM Customer Engagement Center (2016)
- CRM Lead Management (2015) (2014)
- Cloud Access Security Brokers (2018) (2017)
- Cloud Infrastructure as a Service (2015) (2014) (2013)
- Cloud-Based IT Project and Portfolio Management Services (2016)
- Contact Center Infrastructure (2016)
- Content Collaboration Platforms (2017)
- Content-Aware Data Loss Prevention (2013)
- Corporate Telephony (2015)
- Customer Management Contact Center BPO (2016)
- Data Center Backup and Recovery Software (2016)
- Data Center Networking (2016)
- Data Management Solutions for Analytics (2017)
- Data Masking Technology (2015) (2014) (2013)
- Data Science Platforms (2017)
- Digital Commerce (2016)
- Digital Marketing Hubs (2017) (2016)
- E-Discovery Software (2015) (2014) (2013)
- Endpoint Protection Platforms (2019) (2018) (2017) (2016) (2014) (2014) (2013)
- Enterprise Architecture Tools (2016)
- Enterprise Backup Software and Integrated Appliances (2015) (2014)
- Enterprise Backup-Recovery Software (2013)
- Enterprise Data Loss Prevention (2017) (2016)
- Enterprise File Synchronization and Sharing (2016) (2014)
- Enterprise Information Archiving (2015) (2014) (2013)
- Enterprise Mobility Management Suites (2017) (2016) (2015) (2014)
- (Enterprise) Network Firewalls (2019) (2018) (2017) (2016) (2015) (2014) (2013)
- Global Retail Core Banking (2016)
- Group Video Systems (2016)
- IT Project and Portfolio Management Software Applications
- IT Risk Management (2019)
- IT Services for Communications Service Providers (2016)
- Identity Governance and Administration (2019) (2018) (2017) (2016) (2015) (2013)
- Identity and Access Management as a Service (2016) (2015) (2014)
- Integrated Risk Management Solutions (2019)
- Intrusion Detection and Prevention Systems (2018) (2017) (2015) (2014) (2013)
- Managed Mobility Services (2016) (2013)
- Managed Security Services (2017) (2015)
- Marketing Resource Management (2016)
- Mobile Data Protection (2014)
- Mobile Device Management Software (2013)
- Modular Servers (2016) (2015)
- Network Access Control (2014) (2013)
- Network Performance Monitoring and Diagnostics (2017) (2016)
- Network Services (2017) (2016)
- Privileged Access Management (2018)
- Public Cloud Storage Services (2015) (2014)
- Sales Force Automation (2015)
- Sales Performance Management (2016)
- Secure Email Gateways (2015) (2014) (2013)
- Secure Web Gateways (2018) (2017) (2015) (2014) (2013)
- Security Awareness Computer-Based Training (2019) (2018) (2016)
- Security Information and Event Management (2020) (2018) (2017) (2016) (2015) (2014) (2013)
- Structured Data Archiving and Application Retirement (2015)
- Supply Chain Planning System of Record (2016)
- Third-Party Logistics Providers (2016)
- Transportation Management Systems (2016)
- Unified Communications (2016)
- Unified Endpoint Management Tools (2019)
- Unified Threat Management (2018) (2017) (2015) (2014) (2013)
- User Authentication (2014) (2013)
- Utilities Customer Information Systems (2016)
- WAN Optimization (2016)
- Warehouse Management Systems (2017) (2016)
- Web Application Firewalls (2019) (2018) (2017) (2016) (2015) (2014)
- Web Conferencing (2015)
- x86 Server Virtualization Infrastructure (2015) (2014) (2013)
Magic Quadrant for Access Management
SaaS-delivered access management has become the norm, as has advanced user authentication including MFA. AM vendors are maturing their approaches to session management, contextual and adaptive access, and API protection, which will begin to enable CARTA-aligned access management approaches.
Access management products and services have matured in single sign-on protocols and user authentication, and technical differentiators include adaptive access capabilities, as well as ease and breadth of target system enablement. Among new purchases, demand for IAM as a service continues to grow.
tos (Evidian), Auth0, CA Technologies, Centrify, ForgeRock, IBM, i-Sprint Innovations, Micro Focus, Microsoft, Okta, OneLogin, Optimal IdM, Oracle, Ping Identity, SecureAuth + Core Security
The access management market has evolved beyond supporting traditional web applications to support mobile applications and APIs, as well as adding contextual and adaptive access features. Vendors offering an IDaaS option outnumber those that don’t, and now there are more choices than ever.
Atos (Evidian), CA Technologies, Centrify, Covisint, ForgeRock, IBM, i-Sprint Innovations, Micro Focus, Microsoft, Okta, OneLogin, Optimal IdM, Oracle, Ping Identity, SecureAuth
Magic Quadrant for Advanced Analytics Platforms
Отзывы для Advanced Analytics Platforms: Reviews
Predictive analytics and other categories of advanced analytics represent the fastest-growing segment of the analytics market. Dell joins SAS, IBM, KNIME and RapidMiner as a Leader in this market.
Accenture, Alpine Data, Alteryx, Angoss, Dell, FICO, IBM, KNIME, Lavastorm, Megaputer, Microsoft, Predixion Software, Prognoz, RapidMiner, SAP, SAS
Predictive analytics and other types of advanced analytics technology are becoming major factors in the analytics market. This Magic Quadrant evaluates 16 leading providers of advanced analytics platforms that are used to build solutions from scratch.
Alpine Data Labs, Alteryx, Angoss, Dell, FICO, IBM, KNIME, Microsoft, Predixion, Prognoz, RapidMiner, Revolution Analytics, Salford Systems, SAP, SAS, Tibco Software
Magic Quadrant for Application Performance Monitoring Suites
For I&O leaders in 2016, there is no changing of the guard in terms of Leaders in the APM suite market. However, the competition continues to grow more fierce as historical Leaders continue to ramp up their game and new Challengers arise.
AppDynamics, BMC, CA Technologies, Correlsense, Dynatrace, HPE, IBM, Microsoft, Nastel Technologies, New Relic, Oracle, Riverbed
While providers in the Leaders quadrant remain the same, traditional APM providers have regained some of their competitive edge. For the first time, we also include APM vendors from Asia, an important and emerging regional market.
AppDynamics, AppNeta, BMC Software, CA Technologies, Dell, Dynatrace, Hewlett Packard Enterprise, IBM, JenniferSoft, ManageEngine, Microsoft, Nastel Technologies, New Relic, Riverbed Technology, Tingyun
Magic Quadrant for Application Security Testing
Отзывы для Application Security Testing: Reviews.
Security testing is growing faster than any other security market, as AST solutions adapt to new development methodologies and increased application complexity. Security and risk management leaders must integrate AST into their application security programs.
Acunetix, Checkmarx, Contrast Security, ERPScan, Fasoo, HPE, IBM, NSFOCUS, N-Stalker, PortSwigger, Qualys, Rapid7, SiteLock, Synopsys, Trustwave, Veracode, Virtual Forge, WhiteHat Security
Highly publicized breaches in the past 12 months have raised awareness of the need to identify and remediate vulnerabilities at the application layer. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy.
Acunetix, Appthority, Checkmarx, Cigital, Contrast Security, HP, IBM, NSFOCUS, N-Stalker, PortSwigger, Pradeo, Qualys, Rapid7 (NTO), SiteLock, Synopsys, Trustwave, Veracode, Virtual Forge, WhiteHat Security
Global-scale scandals around critical applications’ breaches have highlighted the need for effective detection of exploitable application security vulnerabilities. Application security testing is the solution for Web, cloud and mobile applications.
HP, Veracode, IBM, WhiteHat Security, Checkmarx, Trustwave, Qualys, NT OBJECTives, PortSwigger, Appthority, Quotium, Contrast Security, Pradeo, Acunetix, N-Stalker, Virtual Forge, Trend Micro
The market for application security testing is changing rapidly. Technology trends, such as mobile applications, advanced Web applications and dynamic languages, are forcing the need to combine dynamic and static testing capabilities, which is reshaping the overall market.
Magic Quadrant for Business Analytics Services
Data and analytics leaders expect business analytics to drive organization performance and guide digital transformation. Service providers are changing delivery toward IP assets and automation for support. We profile 20 of the most significant companies that offer business analytics services.
Accenture, Atos, Capgemini, CGI, Cognizant, Deloitte, EY, HCL Technologies, Hewlett Packard Enterprise, IBM Global Business Services, Infosys, KPMG, NEC, NTT Data, PwC, SAP, Tata Consultancy Services, Tech Mahindra, Teradata, Wipro
Magic Quadrant for Business Continuity Management Planning Software
The BCMP software market — with a global market revenue estimate of $250 million — is broadening its capabilities and becoming closer to operational risk management solutions. Gartner’s Magic Quadrant on this growing market evaluates 13 vendors to help in your vendor selection process.
Avalution, ClearView, Continuity Logic, EMC (RSA), Fusion, Global AlertLink, LockPath, MetricStream, Quantivate, RecoveryPlanner, Strategic BCP, Sungard Availability Services, Virtual
Most BCMP tools meet customer needs for recovery plan management, and a consistent and repeatable plan development process. The growing focus on BCM program analytics and integration into the operational risk management initiative has resulted in increased sophistication of BCMP tools.
Strategic BCP, SunGard Availability Services, MetricStream, Continuity Logic, Fusion Risk Management, Global AlertLink, RecoveryPlanner, EMC (RSA), Avalution Consulting, ClearView Continuity, Quantivate, BOLDplanning, Modulo, LockPath, eBRP Solutions, Phoenix, COOP Systems, Rentsys Recovery Services
The 2013 business continuity management planning market, in which there is no perfect product, has a 2012 revenue estimate of $130 million, 30% more than our 2010 estimate. This Magic Quadrant ranks 18 enterprise-class vendors.
RecoveryPlanner, EMC (RSA), MetricStream, Strategic BCP, Continuity Logic, eBRP Solutions, Coop Systems, Rentsys Recovery Services-EverGreen, BOLDplanning, Business Protector, Virtual, SunGard Availability Services, Fusion Risk Management, Modulo, Phoenix, Factonomy, Avalution Consulting, Quantivate
Magic Quadrant for Business Intelligence and Analytics Platforms
Отзывы для BI and Analytics Platforms: Reviews.
The business intelligence and analytics platform market’s shift from IT-led reporting to modern business-led analytics is now mainstream. Data and analytics leaders face countless choices: from traditional BI vendors that have closed feature gaps and innovated, to disrupters continuing to execute.
Alteryx, Birst, Board International, ClearStory Data, Datameer, Domo, IBM, Information Builders, Logi Analytics, Microsoft, MicroStrategy, Oracle, Pentaho, Pyramid Analytics, Qlik, Salesforce, SAP, SAS, Sisense, Tableau, ThoughtSpot, TIBCO Software, Yellowfin, Zoomdata
The BI and analytics platform market’s multiyear shift from IT-led enterprise reporting to business-led self-service analytics has passed the tipping point. Most new buying is of modern, business-user-centric platforms forcing a new market perspective, significantly reordering the vendor landscape.
Alteryx, BeyondCore, Birst, Board International, ClearStory Data, Datawatch, Domo, GoodData, IBM, Information Builders, Logi Analytics, Microsoft, MicroStrategy, Pentaho, Platfora, Pyramid Analytics, Qlik, Salesforce, SAP, SAS, Sisense, Tableau, TIBCO Software, Yellowfin
Magic Quadrant for CRM Customer Engagement Center
Vendors’ positions in this Magic Quadrant reflect the growing demand for cloud-based customer service applications to support agents who engage with customers through multiple channels. It remains the case that no vendor offers a suite that meets all global and cross-industry needs.
bpm’online, CRMnext, Eptica, Freshdesk, Lithium, Microsoft, mplsystems, Oracle, Pegasystems, Salesforce, SAP, SugarCRM, Verint, Zendesk
Magic Quadrant for CRM Lead Management
CRM lead management matures amid strong user interest and a more complex vendor environment. IT application leaders should work with business leaders to define both core and emerging B2B marketing requirements in this technology segment.
Act-On, Adobe, CallidusCloud, CRMnext, HubSpot, IBM (Silverpop), Marketo, Microsoft, MMIT, Oracle, Salesforce, Salesfusion, SugarCRM, Zoho
Investment in lead management continues to be healthy, but market consolidation has lengthened evaluation and sales cycles. Leaders in marketing and IT need to assess vendors’ visions of a single marketing automation suite against their own tactical and strategic business requirements.
Oracle, Marketo, Salesforce.com, Adobe, IBM, Silverpop, Callidus Software, SugarCRM, Zoho
Magic Quadrant for Cloud Access Security Brokers
Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Security and risk management leaders concerned about their organizations’ cloud use should investigate CASBs.
Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Security and risk management leaders should align CASB vendors to address specific use-case requirements.
Magic Quadrant for Cloud Infrastructure as a Service
The market for cloud IaaS is in a state of upheaval, as many service providers are shifting their strategies after failing to gain enough market traction. Customers must exercise caution when choosing providers.
Amazon Web Services, Microsoft, Google, CenturyLink, VMware, IBM (SoftLayer), Rackspace, Virustream, CSC, Verizon, Interoute, Fujitsu, NTT Communications, Joyent, Dimension Data
The market for cloud compute infrastructure as a service (a virtual data center of compute, storage and network resources delivered as a service) is still maturing and rapidly evolving. Strategic providers must therefore be chosen carefully.
Amazon Web Services, Microsoft, CenturyLink, IBM (SoftLayer), CSC, Google, Verizon Terremark, Rackspace, Virustream, VMware, Dimension Data, Fujitsu, Joyent, HP, GoGrid
The market for cloud compute infrastructure as a service (a virtual data center of compute, storage and network resources delivered as a service) is still maturing and rapidly evolving. As each provider has unique offerings, the task of sourcing their services must be handled with care.
Magic Quadrant for Cloud-Based IT Project and Portfolio Management Services
A “messy” market continues to confuse customers of IT PPM software because it provides both long-term and short-term buying options. Two Gartner Magic Quadrants are available to help. This Magic Quadrant analyzes cloud-based IT PPM service providers focused on offering short-term buying options.
Changepoint, Clarizen, Innotas, LiquidPlanner, One2Team, onepoint Projects, Project Objects, Upland Software, Workfront, WorkOtter
Magic Quadrant for Contact Center Infrastructure
Contact center infrastructure vendors continue to integrate their multichannel capabilities in order to develop “omnichannel” solutions, while enhancing their cloud delivery capabilities. Contact center decision makers should evaluate vendors’ technology and ability to deliver in relevant regions.
ALE, Altitude, Aspect, Avaya, Cisco, Collab, Enghouse Interactive, Genesys, Huawei, Interactive Intelligence, Mitel, NEC, Presence Technology, SAP, ShoreTel, Unify, Vocalcom, ZTE
Magic Quadrant for Content Collaboration Platforms
Content collaboration platforms are the evolution of the EFSS destination products and address digital workplace enablement strategies. Application leaders can choose among a range of options to transform individual productivity, team collaboration and business workflow automation.
Accellion, Axway (Syncplicity), BlackBerry, Box, Citrix, Ctera, Dropbox, Egnyte, Google, HighQ, Intralinks by Synchronoss, Microsoft, Thru
Magic Quadrant for Content-Aware Data Loss Prevention
Enterprise content-aware DLP has evolved to integrate more contextual awareness, enabling broader deployment use cases beyond regulatory compliance and intellectual property protection. Typical clients are organizations operating in regulated industries, intellectual property firms and governments.
Symantec, EMC (RSA), Verdasys, McAfee, Websense, CA Technologies, Trustwave, General Dynamics Fidelis Cybersecurity Solutions, GTB Technologies, Code Green Network, Absolute Software, Zecurion, InfoWatch
Magic Quadrant for Corporate Telephony
Corporate telephony is a mature technology that plays a critical role in enterprise communications. This research helps IT managers in large enterprises select the best vendor for their on-premises telephony requirements.
ALE, Avaya, Cisco, Huawei, Microsoft, Mitel, NEC, Unify
Magic Quadrant for Customer Management Contact Center BPO
Gartner’s Magic Quadrant for customer management contact center business process outsourcing services evaluates a vibrant provider landscape. Sourcing managers need to know that the provider landscape is changing due to evolving technology, economic conditions and customer needs.
Aegis, Alorica, Atento, Concentrix, Convergys, EGS, Firstsource, FIS, HGS, HPE, Intelenet, Minacs, Sitel, Sutherland Global Services, Sykes, Tech Mahindra, Teleperformance, TeleTech, Transcom, transcosmos, Wipro, Xerox
Magic Quadrant for Data Center Backup and Recovery Software
Enterprise backup is among the oldest, most performed tasks for infrastructure and operations professionals. Gartner provides analysis and evaluation of the leading data center backup software vendors that offer a range of traditional to innovative recovery capabilities.
Actifio, Arcserve, Commvault, EMC, Hewlett Packard Enterprise, IBM, Unitrends, Veeam, Veritas Technologies
Magic Quadrant for Data Center Networking
Data center networking continues to evolve, with increasing choices for open and disaggregated network solutions, while other vendors aim for more closed, proprietary systems. Enterprises should evaluate different vendor approaches and architectures, with a particular focus on software capabilities.
Arista Networks, Avaya, Brocade, Cisco, Dell, Extreme Networks, Hewlett Packard Enterprise, Huawei, Juniper Networks, Lenovo, NEC, New H3C Group, VMware
Magic Quadrant for Data Management Solutions for Analytics
Disruption is accelerating in this market, with more demand for broad solutions that address multiple data types and offer distributed processing and repository. Cloud solutions are also gaining traction. We help data and analytics leaders to weigh up the vendors in an increasingly dynamic space.
1010data, Amazon Web Services, Cloudera, EnterpriseDB, Google, Hewlett Packard Enterprise, Hortonworks, Huawei, IBM, MapR Technologies, MarkLogic, MemSQL, Microsoft, MongoDB, Oracle, Pivotal, SAP, Snowflake Computing, Teradata, Transwarp Technology
Magic Quadrant for Data Masking Technology
Organizations should use data masking to protect sensitive data at rest and in transit from insiders’ and outsiders’ attacks. In 2015, continuous data breaches has, once again, demonstrated the growing importance of this technology market.
Informatica, IBM, Oracle, CA Technologies (Grid-Tools), Delphix (Axis), Camouflage, Mentis, Solix. HPE (Voltage Security), Dataguise, GreenSQL, Privacy Analytics, TCS, Compuware, Net 2000
Global-scale scandals around sensitive data losses have highlighted the need for effective data protection, especially from insider attacks. Data masking, which is focused on protecting data from insiders and outsiders, is a must-have technology in enterprises’ and governments’ security portfolios.
Axis, Camouflage Software, Compuware, Dataguise, GreenSQL, Grid-Tools, IBM, Informatica, Mentis, Net 2000, Oracle, Privacy Analytics, Solix Technologies, Voltage Security
Organizations should use data masking to protect sensitive data at rest and in transit from insiders’ and outsiders’ abuse. The market offers static and dynamic masking of relational and mainframe-based data, and begins to mask big and unstructured data.
IBM, Informatics, Oracle, Axis Technology, Mentis, Grid-Tools, Camouflage Software, Compuware, Solid Technologies, Voltage Security, Dataguise, Net 2000, Privacy Analytics, Epi-Use, GreenSQL
Magic Quadrant for Data Science Platforms
Data science platforms are engines for creating machine-learning solutions. Innovation in this market focuses on cloud, Apache Spark, automation, collaboration and artificial-intelligence capabilities. We evaluate 16 vendors to help you make the best choice for your organization.
Alpine Data, Alteryx, Angoss, Dataiku, Domino Data Lab, FICO, H2O.ai, IBM, KNIME, MathWorks, Microsoft, Quest, RapidMiner, SAP, SAS, Teradata
Magic Quadrant for Digital Commerce
Digital commerce has become a major part of the customer experience, one that involves a growing ecosystem of technologies, vendors and services. This report evaluates 21 providers of digital commerce platforms.
Aptos, Apttus, Avangate, Bigcommerce, cleverbridge, CloudCraze, Demandware, Digital River, Elastic Path, Episerver, IBM, Intershop, Magento Commerce, MarketLive, MyWebGroce,r NetSuite, Oracle, SAP Hybris Shopify, Unilog, Volusion
Magic Quadrant for Digital Marketing Hubs
Vendors from advertising, marketing automation and analytics are racing to deliver personalized digital marketing at scale. Marketing leaders need a system that can integrate and coordinate data and activities across channels, devices and contexts, continuously and in real time.
Adobe, BlueConic, Cxense, DataXu, Eulerian Technologies, IBM, IgnitionOne, Kitewheel, Marketo, MediaMath, Neustar, Nielsen, Oracle, RedPoint, Salesforce, SAP, Sitecore, Turn, Viant Technology, Ysance, Zeta Global
Marketers need integration and coordination among systems to manage and optimize individual dialogues in real time, across channels, devices and contexts, on a continuous basis. Vendors from advertising, marketing automation and analytics disciplines are converging on this opportunity.
Adobe, DataXu, Epsilon (Conversant), Experian Marketing Services, IBM, IgnitionOne, Kitewheel, Krux, Marin Software, Marketo, MediaMath, Neustar, Nielsen (eXelate), Oracle, RedPoint, Rocket Fuel, Salesforce, Sitecore, Sizmek, Teradata, Turn, Zeta Interactive
Magic Quadrant for E-Discovery Software
Controlling risk and cost remains the primary business goal for seeking better and more effective e-discovery solutions. Gartner evaluates 20 e-discovery software providers to help IT, legal and compliance leaders pick the right one for their needs.
AccessData, Catalyst, CommVault, Driven, Epiq Systems, Exterro, FTI Technology, Guidance Software, HP, IBM, kCura, Kroll Ontrack, LexisNexis, Microsoft, Nuix, Recommind, Symantec, Ubic, Xerox, ZyLAB
The e-discovery software market continues to evolve, with analytics for early case assessment and data reduction, predictive coding, and information governance as the dominating trends in the market. Gartner evaluates 22 e-discovery software vendors to help buyers pick the right one for their needs.
The e-discovery landscape continues to change, with end-to-end functionality, shifts in buying patterns, technology-assisted reviews and acquisitions dominating the market. Gartner evaluates 23 vendors of e-discovery software to help buyers pick the right one for their needs.
Magic Quadrant for Endpoint Protection Platforms
The endpoint protection market is transforming as new approaches challenge the status quo. We evaluated solutions with an emphasis on hardening, detection of advanced and fileless attacks, and response capabilities, favoring cloud-delivered solutions that provide a fusion of products and services.
Endpoint protection is evolving to address more of Gartner’s adaptive security architecture tasks such as hardening, investigation, incident detection, and incident response. Security and risk management leaders should ensure that their EPP vendor evolves fast enough to keep up with modern threats.
The endpoint protection platform provides security capabilities to protect workstations, smartphones and tablets. Security and risk management leaders of endpoint protection should investigate malware detection effectiveness, performance impact on the host machines and administrative overhead.
360 Enterprise Security Group, AhnLab, Bitdefender, Carbon Black, Comodo, CrowdStrike, Cylance, Eset, F-Secure, G Data Software, Intel Security, Invincea, Kaspersky Lab, Malwarebytes, Microsoft, Palo Alto Networks, Panda Security, SentinelOne, Sophos, Symantec, Trend Micro, Webroot
The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Buyers of endpoint protection should investigate the quality of protection capabilities, the depth and breadth of features, and the ease of administration.
Bitdefender, Check Point Software Technologies, Cylance, Eset, F-Secure, Heat Software, IBM, Intel Security, Kaspersky Lab, Landesk, Microsoft, Panda Security, Qihoo 360, SentinelOne, Sophos, Symantec, Trend Micro, Webroot
Intel Security (McAfee), Kaspersky Lab, Symantec, Trend Micro, Sophos, Microsoft, Panda Security, Webroot, Landesk, IBM, Stromshield, Lumension Security, Eset, Bitdefender, F-Secure, Qihoo 360, Check Point Software Technologies, ThreatTrack Security
The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
McAfee, Symantec, Kaspersky Lab, Trend Micro, Sophos, Microsoft, LANDesk, IBM, Webroot, Panda Security, Lumension Security, Arkoon Network Security, Bitdefender, Eset, F-Secure, Check Point Software Technologies, ThreatTrack Security, BeyondTrust
The endpoint protection platform provides a collection of security utilities to protect PCs and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
Arkoon Network Security, BeyondTrust, Check Point Software Technologies, Eset, F-Secure, GFI Software, IBM, Kaspersky Lab, LANDesk, Lumension Security, McAfee, Microsoft, Panda Security, Sophos, Symantec, Trend Micro, Webroot
Magic Quadrant for Enterprise Architecture Tools
Enterprise architects are moving from seat-based purchases of EA tools to broader enterprise purchases as platforms for change. This shift, in response to the needs of digital business and the drive to a more business-outcome-driven approach, led to a rise in the number of large sales in 2015.
Avolution, BiZZdesign, Casewise, Mega, Planview, QualiWare, SAP, Software AG, Unicom Systems
Magic Quadrant for Enterprise Backup Software and Integrated Appliances
Enterprise backup is among the oldest, most-performed tasks for infrastructure and operations professionals. Gartner provides analysis and evaluation of the leading providers that offer a range of traditional to innovative recovery capabilities.
CommVault, EMC, IBM, Symantec, HP, Veeam, Actifio, Unitrends, Barracuda Networks, Arcserve, Dell, Asigra, FalconStor, Seagate, Acronis.
Enterprise backup is among the oldest, most-performed tasks for IT professionals. Gartner provides analysis and evaluation of the leading providers that offer a range of traditional to innovative recovery capabilities.
CommVault, EMC, IBM, Symantec, HP, Actifio, Veeam Software, Unitrends, Asigra, CA Technologies, Dell, Barracuda Networks, EVault, FalconStor, Acronis, Catalogic Software
Magic Quadrant for Enterprise Backup-Recovery Software
Backup is among the oldest, most performed tasks in IT. The industry continues to undergo significant change as organizations embrace new technologies and techniques and show a propensity to augment or switch legacy vendors and backup techniques.
Acronis, Actifio, Asigra, CA Technologies, CommVault, Dell, EMC, EVault, a Seagate Company, FalconStor Software, HP, IBM, NetApp, Symantec, Syncsort, Veeam Software
Magic Quadrant for Enterprise Data Loss Prevention
Security and risk management leaders purchase on-premises enterprise DLP to solve for either organizationwide regulatory compliance or to better protect specific types of intellectual property, while monitoring emerging cloud DLP capabilities.
Clearswift, CoSoSys, Digital Guardian, Fidelis Cybersecurity, Forcepoint, GTB Technologies, InfoWatch, Intel Security, SearchInform, Somansa, Symantec, Zecurion
Enterprise DLP continues evolving to support both content-aware and context-aware capabilities, as well as support for IT security leaders to cover broader deployment use cases beyond regulatory compliance and intellectual property protection.
Clearswift, Digital Guardian, Fidelis Cybersecurity, Forcepoint, GTB Technologies, InfoWatch, Intel Security, Somansa, Symantec, Zecurion
Magic Quadrant for Enterprise File Synchronization and Sharing
EFSS destination vendors increasingly address digital workplace enablement. IT leaders can consider this market and choose among a range of maturing options for cloud-based content collaboration and data infrastructure modernization.
Accellion, Box, Citrix, Dropbox, Egnyte, Google, Huddle, Intralinks, Microsoft, Syncplicity, Thru, Varonis, WatchDox by BlackBerry
The enterprise file synchronization and sharing market is maturing, which will benefit IT leaders, and mobile and collaboration planners. EFSS capabilities continue to standardize, forcing players to differentiate mobile content and collaboration.
Citrix, EMC, Box, Accellion, Microsoft, Dropbox, Google, IBM, WatchDox, Alfresco, Egnyte, Huddle, AirWatch, Intralinks, Hightail, Workshare, Novell, Acronis, ownCloud
Magic Quadrant for Enterprise Information Archiving
Enterprise information archiving offers organizations solutions for compliance and discovery, while reducing overall storage costs. To aid IT leaders, Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types.
Actiance, Barracuda Networks, Bloomberg, Commvault, EMC, Global Relay, Google, GWAVA, Hewlett Packard Enterprise, IBM, Microsoft, Mimecast, Proofpoint, Smarsh, Veritas, ZL Technologies
Enterprise information archiving offers IT managers in organizations solutions for compliance and e-discovery, while reducing primary storage costs. Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types.
Actiance, Artec IT Solutions, Barracuda Networks, Bloomberg, CommVault, EMC, Global Relay, Google, GWAVA, HP, IBM, MessageSolution, Metalogix, Microsoft, Mimecast, OpenText, Proofpoint, Smarsh, Symantec, ZL Technologies
Enterprise information archiving offers organizations solutions for compliance and e-discovery while reducing primary storage costs. Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types.
Magic Quadrant for Enterprise Mobility Management Suites
Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. I&O leaders responsible for mobile and endpoint strategies, must maintain focus on near- and long-term goals in this rapidly changing market.
BlackBerry, Cisco, Citrix, IBM, Ivanti, Matrix42, Microsoft, MobileIron, NationSky, Snow Software, Sophos, SOTI, VMware
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives.
BlackBerry, Cisco, Citrix, IBM, Landesk, Matrix42, Microsoft, MobileIron, NationSky, SAP, Snow Software, Sophos, SOTI, VMware AirWatch
Enterprise mobility management suites are the glue that connects mobile devices to their enterprise workflow. End-user computing leaders must consider short-term and long-term objectives amid rapid market changes.
AirWatch by VMware, MobileIron, Citrix, IBM, Good Technologies, SAP, Soti, Microsoft, Sophos, BlackBerry, Landesk, Globo
The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders’ choices.
MobileIron, AirWatch, Citrix, IBM, Good Technologies, SAP, Soti, Symantec, Sophos, BlackBerry, Globo, Absolute Software, Landesk, Tangoe
Magic Quadrant for (Enterprise) Network Firewalls
With firewall providers embedding multiple security features in firewalls and enabling integration and automation capabilities with other security products, firewalls are evolving into network security platforms.
In this mature market, vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and risk tolerance.
“Next generation” capabilities have been achieved by all products in the enterprise network firewall market, and vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and cost.
AhnLab, Barracuda Networks, Check Point Software Technologies, Cisco, Forcepoint, Fortinet, Hillstone, Huawei, Juniper Networks, New H3C Group, Palo Alto Networks, Sangfor, SonicWall, Sophos, Stormshield, WatchGuard
“Next generation” capability has been achieved by the products in the network firewall market, and vendors differentiate on feature strengths. Buyers must consider the trade-offs between best-of-breed function and costs.
AhnLab, Barracuda Networks, Check Point Software Technologies, Cisco, Dell SonicWALL, Forcepoint, Fortinet, Hillstone Networks, Huawei, Juniper Networks, Palo Alto Networks, Sangfor, Sophos, Stormshield, WatchGuard
“Next-generation” capability has been achieved by the leading products in the network firewall market, and competitors are working to keep the gap from widening. Buyers must consider their operational realities, the burden of switching, and the trade-offs between “best-of-breed” function and costs.
Check Point Software Technologies, Palo Alto Networks, Fortinet, Cisco, Intel Security (McAfee), WatchGuard, Dell SonicWALL, Juniper Networks, Hillstone Networks, Sophos, Huawei, Barracuda Networks, AhnLab, HP, F5, Stormshield, Sangfor
“Next generation” capability has been achieved by the leading products in the network firewall market, and competitors are struggling to keep the gap from widening too much. Buyers must consider their own operational realities and the burden of switching.
Check Point Software Technologies, Palo Alto Networks, Fortinet, Cisco, Juniper Networks, McAfee, Dell SonicWALL, HP, Hillstone Networks, WatchGuard, Huawei, Sophos, Barracuda Networks, AhnLab, Arkoon+Netasq, F5
Advances in threats have driven mainstream firewall demand for next-generation firewall capabilities. Buyers should focus on the quality, not quantity, of the features and the R&D behind them. This market includes mature vendors and new entrants.
Magic Quadrant for Global Retail Core Banking
The core banking market demand for practical and enabling technology to support significant business initiatives, such as a digital banking strategy, is surging. Lack of agility and the high cost of technology are driving more banks to build the business case for core banking renewal.
Avaloq, BML Istisharat, Datapro, FIS, Fiserv (DNA), Fiserv (Signature), Infosys, Intellect Design Arena, Misys, Oracle, SAB, SAP, Silverlake Axis, Sopra Banking Software (Sopra Banking Amplitude), Sopra Banking Software (Sopra Banking Platform), TCS, Temenos
Magic Quadrant for Group Video Systems
Software video infrastructure, video as a service and innovative form factors are reshaping video collaboration. We review eight vendors with the necessary reach, scale and interoperability for the global enterprise market so that IT infrastructure and operations leaders can make an informed choice.
Avaya, Cisco, Huawei, Lifesize, Polycom, StarLeaf, Vidyo, ZTE
Magic Quadrant for IT Project and Portfolio Management Software Applications
Magic Quadrant for IT Risk Management
Demand for ITRM solutions continues to increase as digital ecosystems evolve. Security and risk management leaders managing cybersecurity initiatives, board risk oversight and digital compliance should use this research to evaluate the opportunities and challenges in automating IT risk workflows.
Magic Quadrant for IT Services for Communications Service Providers
This Magic Quadrant helps communications service provider CIOs identify and evaluate suppliers to meet their operational IT service needs. The profiled vendors have expertise in discrete and multiyear engagements around CSPs’ operational IT in a multiregional context.
Accenture, Amdocs, Atos, Capgemini, CGI, Cognizant, Deloitte, Ericsson, HCL Technologies, Hewlett Packard Enterprise, Huawei, IBM, Infosys, Tata Consultancy Services, Tech Mahindra, VirtusaPolaris, Wipro
Magic Quadrant for Identity Governance and Administration
Отзывы для Identity Governance and Administration: Reviews
IGA is a mature market that faces increasing client demand for cloud-delivered solutions and is splitting between solutions focused on either basic or mature IGA requirements. Security and risk management leaders should scrutinize vendors for compelling roadmaps and a track record of innovation.
While the market for IGA tools delivered as on-premises software is mature, intense vendor activity renders many new choices for IGA delivered as a service. Security and risk management leaders responsible for IAM should emphasize future requirements when planning to purchase an IGA solution.
AlertEnterprise, Atos (Evidian), CA Technologies, Core Security, Dell Technologies (RSA), Hitachi ID Systems, IBM, Micro Focus (NetIQ), Microsoft, Omada, One Identity, Oracle, SailPoint, SAP, Saviynt
Several vendors are accelerating efforts to offer cloud-delivered IGA, improve analytics and align with PAM products. Security and risk management leaders responsible for IAM should be aware of functional differences and trade-offs between on-premises and cloud-delivered IGA and plan accordingly.
AlertEnterprise, Atos (Evidian), CA Technologies, Core Security, Dell Technologies (RSA), IBM, Micro Focus (NetIQ), Omada, One Identity, Oracle, SailPoint, SAP, Saviynt
The IGA market is maturing into an early mainstream phase. IAM and security leaders should take note of emerging requirements around more risk-aware identity approaches and cloud adoption that are causing innovative vendors to integrate analytics with adjacent IT and data security technologies.
AlertEnterprise, Atos (Evidian), CA Technologies, Courion, Dell, EMC (RSA), Hitachi ID Systems, IBM, Micro Focus (NetIQ), Omada, Oracle, SailPoint, SAP, Saviynt
The IGA market is transforming legacy, on-premises IAM products. IGA vendors are investing heavily to meet client needs in ease of use, mobility, business agility, and lower total cost of ownership. User provisioning and access governance functions continue to consolidate.
AlertEnterprise, Atos, Avatier, Beta Systems, CA Technologies, Courion, Dell, EMC (RSA), Evidian, Fischer International, Hitachi ID Systems, Identity Automation, IBM, NetIQ, Omada, Oracle, SailPoint, SAP, The Dot Net Factory
The identity and access management market has experienced significant upheaval along with its usual growth over the past two years. What began as two relatively distinct markets, user provisioning and access governance, have merged into a single category of identity governance and administration.
SailPoint, EMC (RSA Aveksa), Oracle, Courion, Hitachi ID Systems, NetIQ, Omanda, Dell, CA Technologies, IBM, AlertEnterprise, CrossIdeas, SAP, Avatier, Beta Systems, Evidian, Fischer International, Atos, iSM Secu-Sys, Caradigm, Deep Identity, e-trust
Magic Quadrant for Identity and Access Management as a Service
Lightweight web-centric services with few identity governance and administration capabilities remain in high demand, and vendors are adding IGA features. Vendors delivering deeper functionality for IGA and legacy application support, including niche vendors, may be best for IAM leaders’ needs.
Centrify, Covisint, EMC (RSA), Fischer International, IBM, Ilantus, iWelcome, Microsoft, Okta, OneLogin, Ping Identity, SailPoint, Salesforce, Simeio Solutions
Large vendor entrants in 2014 began to make their presence felt. Web-centric but shallow-function services are in high demand. Vendors that can deliver deeper functionality for IGA and legacy application support, including niche vendors, may be the best for your needs.
Okta, Microsoft, Saleforce, IBM, Centrify, Ping Identity, SailPoint, Covisint, CA Technologies, Simeio Solutions, Fischer International Identity, iWelcome, Exostar, Ilantus
The IDaaS market is still in its early days. Vendors come from distinctly different backgrounds, and there are significant variances among providers with regard to IAM functional depth and support provided for different use cases. Niche vendors may be the best for your needs.
Okta, Ping Identity, Covisint, OneLogin, CA Technologies, Centrify, Lighthouse Security Group, Fischer International Identity, iWelcome, Simplified, Simeio Solutions, Exostar, SailPoint, Symplified
Magic Quadrant for Integrated Risk Management Solutions
An IRM strategy reduces siloed risk domains and supports dynamic business decision making via risk-data correlations and shared risk processes. Security and risk management leaders should use this Magic Quadrant to identify technology solutions that support this strategy.
Magic Quadrant for Intrusion Detection and Prevention Systems
IDPS continues to be absorbed by firewall placements at the perimeter, yet still offers the best detection efficacy and a central prevention, detection, and response solution on a network. Security and risk management leaders should seek innovation in advanced analytics and public cloud support.
Alert Logic, Cisco, FireEye, Hillstone Networks, McAfee, NSFOCUS, Trend Micro, Vectra Networks, Venustech
Security and risk management leaders should know that while IDPSs are being absorbed by firewall placements at the perimeter, they give the best protection. They’re also responding to pressure from uptake of other threat defense solutions, and providing credible internal and cloud placement options.
AhnLab, Alert Logic, Cisco, Hillstone Networks, Huawei, IBM, Intel Security (McAfee), NSFOCUS, Trend Micro (TippingPoint), Venustech, Wins
The network IPS market continues being absorbed by next-generation firewall placements at the perimeter. Next-generation IPSs offer the best protection and are responding to pressure coming from the uptake of advanced threat defense solutions and the requirement to provide cloud placements.
Cisco, Hewlett Packard Enterprise, Huawei, IBM, Intel Security (McAfee), NSFOCUS, Wins
The network IPS market continues being absorbed by next-generation firewall placements. Next-generation IPSs offer the best protection, but the IPS market must respond to the pressure coming from the uptake of advanced threat defense solutions and the requirement to provide cloud placements.
Intel Security (McAfee), Cisco, IBM, HP, Radware, Huawei, NSFOCUS Information Technologies
The network intrusion prevention system market has undergone dynamic evolution, increasingly being absorbed by next-generation firewall placements. Next-generation IPSs are available for the best protection, but the IPS market is being pressured by the uptake of advanced threat defense solutions.
Sourcefire (Cisco), McAfee, HP, Cisco, IBM, Stonesoft (McAfee), Radware, NSFOCUS Information Technologies, Huawei, Enterasys Networks (Extreme Networks)
Magic Quadrant for Managed Mobility Services
In the past year, service providers that globally manage the life cycle of distributed mobile estates have moved from a mobile-first focus to become outcome-based. This research supplies buyers of managed mobility services with an evaluation of providers that have improved both vision and execution.
AT&T, DMI, Fujitsu, Honeywell Enterprise Mobility, HPE, IBM, Mobi, Orange, Tangoe, Telefónica, Vodafone, Vox Mobile-GEMA, Zebra, Zensar
This research focuses on vendors managing pools of globally-distributed, corporate-liable devices and bring your own device users. No Leaders or Challengers have emerged in this market as providers need to invest more in people, processes, tools and awareness to better serve a growing global demand.
Accenture, Atos, AT&T, Deutsche Telekom, DMI, Enterprise Mobile, IBM, Mobi, Motorola Solutions, Orange, Stratix, Tangoe, Tata Consultancy Services, Telefonica, Unisys, Vodafone, Vox Mobile, WidePoint Solutions
Magic Quadrant for Managed Security Services
Security and risk management leaders considering managed security services should use this Magic Quadrant to help identify and evaluate providers with effective threat detection and compliance capabilities, and their ability to deliver services globally.
AT&T, Atos, BAE Systems, BT, CenturyLink, CSC, HCL Technologies, HPE, IBM, NTT Security, Orange Business Services, SecureWorks, Symantec, Trustwave, Verizon, Wipro
Security managers should evaluate MSSPs for enterprise scale operations, multinational and local presence, and effective threat management and compliance capabilities. Use this Magic Quadrant to evaluate MSSPs to support global service requirements, regional presence and leading-edge services.
AT&T, BAE Systems, BT, CenturyLink, CSC, Dell SecureWorks, HPE, IBM, NTT, Orange Business Services, Symantec, Trustwave, Verizon, Wipro
Magic Quadrant for Marketing Resource Management
This Magic Quadrant evaluates vendors of applications that support the management of marketing resources, such as people, plans, budgets, projects, tasks, assets and branded content. It will help IT leaders work with marketing leaders to find an MRM solution.
BrandMaker, BrandSystems, Capital ID, Code Worldwide, Direxxis, Elateral, IBM, Infor, MarcomCentral, Microsoft, Saepoi, SAP, SAS, Teradata, Wedia, Workfront.
Magic Quadrant for Mobile Data Protection
Mobile data protection solutions defend access to secure data on storage systems in notebooks, removable media, desktops, servers and, in a few cases, cloud storage environments. Buyers seek data protection policy enforcements across multiple platforms, minimal support costs and proof of protection.
Intel Security (McAfee), Sophos, Check Point Software Technologies, Symantec, WinMagic, Dell, Digital Guardian, Trend Micro, Wave Systems, Kaspersky Lab, Microsoft, CenterTools
Magic Quadrant for Mobile Device Management Software
(см.также Enterprise Mobility Management Suites)
Interest and adoption in mobile device management continues to grow at a fast rate, with companies looking for enterprise security and mobile optimization and enablement. Strong offerings go beyond policy to support enterprise mobile management.
Absolute Software, AirWatch, BlackBerry, BoxTone, Citrix, Fiberlink, Good Technology, IBM, Kaspersky Lab, LANDesk, McAfee, MobileIron, SAP, Sophos, Soti, Symantec, Tangoe, Trend Micro
Magic Quadrant for Modular Servers
Any server that is hosted by a dedicated chassis or enclosure is termed a modular server by Gartner. The market chiefly comprises blade and multinode servers. I&O leaders should use this research to help choose both the right form factor and the right vendor for new projects.
Atos, Cisco, Cray, Dell, Fujitsu, Hitachi, HPE, Huawei, Inspur, Lenovo, SGI, Supermicro
Modular servers form a compound market where the traditional market for blade servers and multinode servers overlap. Data center managers should use this Magic Quadrant to understand the modular server market and evaluate the related vendors and their offerings.
Atos, Cisco, Cray, Dell, Fujitsu, HP, Hitachi, Huawei, Lenovo, SGI, Supermicro
Magic Quadrant for Network Access Control
Most NAC vendors provide good support for the BYOD use case. Now, the market is evolving to address another use case, where NAC policy servers act as “warehouses of context” and share contextual data with firewalls and other security components to enable fine-grained policy enforcement.
Cisco, ForeScout Technologies, Aruba Networks, Pulse Secure, Extreme Networks, Portnox, Impulse Point, InfoExpress, Auconet, Bradford Networks
NAC vendors are beginning to differentiate their solutions through their breadth of integrations with other products. Mobile device management integrations are a requirement to address the BYOD trend, and integrations with firewalls and other security components enable sharing of contextual data.
Cisco, ForeScout Technologies, Aruba Networks, Juniper Networks, Bradford Networks, Extreme Networks (Enterasys), Portnox, InfoExpress, Impulse Point, StillSecure, Auconet
Magic Quadrant for Network Performance Monitoring and Diagnostics
Отзывы для Network Performance Monitoring and Diagnostics: Reviews.
NPMD solutions are key in helping I&O leaders support more complex technologies and services with network visibility, performance issue detection and root cause analysis. Vendors are innovating with cloud monitoring, support for software-defined environments and more flexible deployment models.
AppNeta, CA Technologies, Cisco, Corvil, ExtraHop, Flowmon Networks, Genie Networks, HPE, InfoVista, Ipswitch, LiveAction, NetScout, Paessler, Riverbed, SevOne, SolarWinds, Viavi
NPMD solutions play a key role in helping IT ops support increasingly complex technologies and services with network visibility, detection of performance issues and root cause analysis. Vendors continue to innovate with operational analytics, integrated GUIs and more flexible deployment options.
Automic, CA Technologies, Cisco, Corvil, Flowmon Networks, Genie Networks, Hewlett Packard Enterprise, InfoVista, NetScout Systems, NetScout Systems (Fluke Networks), Niksun, Paessler, Riverbed, SevOne, SolarWinds, Viavi Solutions
Magic Quadrant for Network Services
Отзывы на Network Services, Global: Reviews.
Driven by cloud IT service adoption, the market for global enterprise network services is undergoing a generational shift in both technologies and the provider landscape. Infrastructure and operations leaders must adapt their network sourcing approaches to reflect this transformation.
AT&T, BT, CenturyLink, Global Cloud Xchange, GTT, Level 3 Communications, Masergy, NTT Communications, Orange Business Services, Sprint, Tata Communications, Telefonica, Telstra, T-Systems, Verizon, Vodafone
Global enterprise networks are entering a time of rapid technological evolution, driven by enterprise adoption of cloud IT service delivery and availability of new SDN technologies. With growing differentiation among providers, enterprises must ensure supplier roadmaps are aligned with their needs.
AT&T, BT Global Services, Level 3 Communications, NTT Communications, Orange Business Services, Sprint, Tata Communications, Telefonica, Telstra, T-Systems, Verizon, Vodafone
Magic Quadrant for Privileged Access Management
Privileged access management is one of the most critical security controls, particularly in today’s increasingly complex IT environment. Security and risk management leaders must use PAM tools in a long-term strategy for comprehensive risk mitigation.
Magic Quadrant for Public Cloud Storage Services
The public cloud storage services market continues to rapidly evolve, with market domination by the hyperscale vendors. With the price wars subsiding, CIOs and infrastructure managers should prioritize vendors’ product strength, breadth of ecosystem and TCO as key purchase criteria.
Amazon Web Services, Microsoft, Google, AT&T, IBM, Rackspace, Verizon
The public cloud storage service market is evolving rapidly, with early signs of consolidation amid growing price competition that impact IT leaders. Gartner assesses the key cloud storage service providers on their execution prowess and strategic vision.
Magic Quadrant for Sales Force Automation
IT leaders supporting sales will find expanded options in the sales force automation market with new vendor entrants and one less option with the removal of former industry leader Oracle Siebel CRM.
Aptean, Base, Bullhorn, CRMnext, Infor, Microsoft (Dynamics CRM), Microsoft (Dynamics CRM Online), NetSuite, Oracle, Sage, Salesforce, SAP (Cloud for Sales), SAP (CRM), SugarCRM, Tour de Force, Zoho
Magic Quadrant for Sales Performance Management
Отзывы для Sales Performance Management: Reviews.
The SPM software market grew 10% in 2015 to about $715 million. IT leaders supporting sales should focus on sales incentive compensation in the short term, but also support use cases for sales enablement and corporate performance management in the midterm. This report will help them select a vendor.
Anaplan, beqom, CallidusCloud, IBM, Incentives Solutions, Nice Systems, Optymyze, Oracle, Salesforce, SAP, Vistex, Xactly, Zoho
Magic Quadrant for Secure Email Gateways
The secure email gateway market is experiencing renewed interest due largely to an increase in targeted phishing attacks. Vendors are responding with URL link protection and attachment sandboxing, but have not addressed social engineering attacks with no payload.
Proofpoint, Cisco, Microsoft, Symantec, Intel Security, Trend Micro, Mimecast, Websense, BAE Systems, Barracuda Networks, Sophos, Clearswift, Fortinet, Dell, Trustwave, WatchGuard Technologies
The secure email gateway market is fractured between providers of basic protection delivered by embedded functionality from incumbent email, firewall, or endpoint protection solutions; and vendors that focus on the state of the art in advanced attack and information protection.
Proofpoint, Cisco, Symantec, Microsoft, Barracuda Networks, Sophos, McAfee, Trend Micro, Websense, Mimecast, Clearswift, SilverSky, Trustwave, WatchGuard Technologies, Fortinet, Dell
The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability encryption and better protection from targeted phishing attacks.
Magic Quadrant for Secure Web Gateways
The secure web gateway marketplace continues to be dominated by appliances; however, the rapid growth of cloud services is becoming a disruptive force in the marketplace. Many vendors have added cloud access security broker functionality through partnerships or technology acquisitions.
On-premises appliances continue to rule the SWG market, with a 71% market share (as measured by revenue). However, cloud-based SWG services are growing more rapidly, with a five-year historical compound annual growth rate of 32%, versus only 5% for appliances.
Barracuda Networks, Cisco, ContentKeeper, Forcepoint, iboss, McAfee, Sangfor, Sophos, Symantec, Trend Micro, Zscaler
The market for SWG solutions is still dominated by traditional on-premises appliances. But, the use of cloud-based services is growing rapidly, and advanced threat protection functionality remains an important differentiator.
Zscaler, Blue Coat, Websense, Cisco, Intel Security (McAfee), Trend Micro, Barracuda Networks, iboss, ContentKeeper, Symantec, Sophos, Trustwave, Sangfor
The SWG market is evolving rapidly as vendors respond to the mobility trend and the evolving threat landscape. SWG vendors are highly differentiated in their ability to deliver cloud-based services, and to protect users with advanced threat defense features.
Blue Coat Systems, Zscaler, Cisco, Websense, Intel Security (McAfee), Barracuda Networks, Trend Micro, iboss, Symantec, ContentKeeper Technologies, Trustwave, Sophos, Sangfor
Malware detection and cloud services are two areas of continuing disparity among SWG vendors. Our market analysis of the vendors highlights key differences in these capabilities and other key functions.
Magic Quadrant for Security Awareness Computer-Based Training
People influence security more than technology or policy, and cybercriminals know how to exploit human behaviors. Security and risk management leaders should invest in tools that increase awareness and influence behavior that supports security business objectives through computer-based training.
People influence security more than technology or policy, and cybercriminals know how to exploit human behaviors. Security and risk management leaders must invest in tools that increase awareness and influence behavior that supports security business objectives through computer-based training.
Humans can be either the strongest or weakest defense against threats. Security leaders are, more than ever, seeking to increase security awareness and influence end-user behavior while also boosting security performance, as well as supporting productivity, accountability and compliance.
BeOne Development, Digital Defense, Global Learning Systems, Inspired eLearning, Junglemap, KnowBe4, MediaPro, Optiv Security, PhishLine, PhishMe, Popcorn Training, SANS Institute, Secure Mentem, Security Innovation, Security Mentor, Symantec (Blackfin Security), Terranova WW, The Security Awareness Co., Wombat Security Technologies
Magic Quadrant for Security Information and Event Management
Security and risk management leaders increasingly seek security information and event management solutions with capabilities that support early attack detection, investigation and response. Users should balance advanced SIEM capabilities with the resources needed to run and tune the solution.
Security and risk management leaders increasingly seek SIEM solutions with capabilities that support early targeted attack detection and response. Users must balance advanced SIEM capabilities with the resources needed to run and tune the solution.
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
The need for early targeted attack detection and response is driving the expansion of new and existing SIEM deployments. Advanced users seek SIEM with advanced profiling, analytics and response features.
AlienVault, BlackStratus, EMC (RSA), EventTracker, Fortinet (AccelOps), HPE, IBM, Intel Security, LogRhythm, ManageEngine, Micro Focus, SolarWinds, Splunk, Trustwave
The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
IBM Security, Splunk, HP, Intel Security, LogRhythm, EMC (RSA), AlienVault, Trustwave, MicroFocus (NetIQ), SolarWinds, AccelOps, EventTracker, BlackStratus
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics.
IBM Security, HP, McAfee, Splunk, LogRhythm, EMC (RSA), NetIQ, AlienVault, Trustwave, SolarWinds, Tibco Software, Tenable Network Security, AccelOps, EventTracker, BlackStratus
AlienVault, EiQ Networks, EMC-RSA, EventTracker, HP-ArcSight, IBM-Q1 Labs, LogRhythm, McAfee, NetIQ, Sensage, SolarWinds, Splunk, Symantec, Tenable Network Security, Tibco-LogLogic, Trustwave
Magic Quadrant for Structured Data Archiving and Application Retirement
Structured data archiving technologies help IT leaders retire legacy applications, reduce capital and operating expenses, and meet governance and compliance requirements. We evaluate vendors offering products and services that provide archiving for databases and data from enterprise applications.
Informatica, IBM, HP, Solix Technologies, Delphix, PBS Software, OpenText, Teradata (RainStor), EMC, Data Migration, DataVard, Actifio, DCSoftware
Magic Quadrant for Supply Chain Planning System of Record
This Magic Quadrant examines vendors that provide supply chain planning system-of-record solutions. Supply chain and IT leaders can use this research when evaluating and selecting an SCP system to underpin their journey to Stage 3 SCP maturity and beyond.
Adexa, Arkieva, Barloworld Supply Chain Software, Blue Ridge, Demand Solutions, FuturMaster, GAINSystems, Infor, JDA Software, Kinaxis, Logility, NeoGrid, OM Partners, Oracle, Quintiq, SAP APO, SAS, Slimstock, Steelwedge, Syncron, ToolsGroup
Magic Quadrant for Third-Party Logistics Providers
This Magic Quadrant evaluates third-party logistics providers’ ability to be a global preferred provider. Logistics executives can use this research to better understand these 3PLs and their capabilities when evaluating and selecting the right set of providers to meet their global logistics needs.
Agility, APL Logistics, Bolloré Logistics (formerly SDV), Ceva Logistics, Damco, DB Schenker, DHL, DSV, Expeditors, Geodis, Kuehne + Nagel, Panalpina, Pantos Logistics, UPS Supply Chain Solutions, XPO Logistics, Yusen Logistics
Magic Quadrant for Transportation Management Systems
Intelligent business process management suites compress the observation-to-action-to-outcome cycle, and help business transformation leaders, business process directors and solution architects establish a fluid capability to handle big change. This Magic Quadrant evaluates 15 iBPMS vendors.
Supply Chain Execution (SCE) Convergence, Globalization, Deployment Model, SMB TMS, Implementation
Magic Quadrant for Unified Communications
As the enterprise UC market continues to mature, we expect more consolidation and increased user expectations — prompting an emphasis on vendors’ telephony capabilities and financial viability. Enterprise planners must match their own priorities to vendor strengths before committing to a solution.
ALE, Avaya, Cisco, Huawei, Interactive Intelligence, Microsoft, Mitel, NEC, ShoreTel, Unify
Magic Quadrant for Unified Endpoint Management Tools
UEM tools continue to mature as buyers migrate PCs away from legacy client management tools. I&O leaders responsible for mobile and endpoint strategy must evaluate these capabilities along with UEM tools’ ability to perform modern management of PCs and management of mobile devices.
Magic Quadrant for Unified Threat Management
SMB multifunctional firewalls, or UTM, provide multiple security features in a single appliance to SMB and distributed enterprises. Security and risk management leaders should use this research to select the right vendor based on their requirements and geography.
SMB multifunction firewalls, or UTM, provide SMBs and distributed enterprises with multiple security functions in a single appliance. Network security leaders should use this research to evaluate performance, security, ease of use, local support and technology’s ability to handle new SMB practices.
Barracuda Networks, Check Point Software Technologies, Cisco, Fortinet, Hillstone Networks, Huawei, Juniper Networks, Rohde & Schwarz Cybersecurity, SonicWall, Sophos, Stormshield, Untangle, Venustech, WatchGuard
Unified threat management devices provide small and midsize businesses with multiple network security functions in a single appliance. SMB buyers should carefully evaluate UTMs’ performance when numerous security functions are enabled, and UTMs’ ability to handle new SMB practices.
Fortinet, Check Point Technologies, Sophos, Dell, Cisco, Juniper Networks, WatchGuard, Stormshield, Barracuda Networks, Rohde & Schwarz (gateprotect), Huawei, Hillstone Networks, Aker Security Solutions
Unified threat management devices provide small and midsize businesses with multiple network security functions in a single appliance. Buyers should focus on performance when many security functions are enabled, and on the skill set of the associated channel partner.
Fortinet, Check Point Technologies, WatchGuard, Dell, Sophos, Cisco, Juniper Networks, Cyberoam, Stormshield (Netasq), Barracuda Networks, Huawei, gateprotect, Hillstone Networks, Aker Security Solutions, Clavister
Unified threat management devices provide small or midsize businesses with multiple network security functions in a single appliance. Buyers should focus on performance when every targeted feature is enabled, and on total cost of ownership instead of initial purchase price.
Magic Quadrant for User Authentication
The market is dominated by 10% of the authentication vendors globally. While mobile and cloud remain disruptive, buyers continue to give weight to user experience. Investment in contextual, adaptive techniques increases, but biometric methods remain niche. Smart things will become authenticators.
SafeNet, EMC (RSA), TeleSign, Gemalto, SecurEnvoy, PointSharp, SMS Passcode, Microsoft, Deepnet Security, Entrust Datacard, Authentify, CA Technologies, neXus, Symantec, Vasco Data Security, HID Global, Duo Security
The market is dominated by 5% of the vendors. Mobile and cloud are disruptive. Buyers give greater weight than before to user experience. Legacy authentication methods are increasingly deprecated. Vendors must invest appropriately to stay relevant.
SafeNet, EMC (RSA), Gemalto, Technology Nexus, CA Technologies, Vasco Data Security, TeleSign, Symantec, HID Global, SecurEnvoy, Authentify, SecureAuth, Entrust, Swivel Secure, Equifax, SMS Passcode, Deepnet Security, Microsoft, PointSharp, Mi-Token
Magic Quadrant for Utilities Customer Information Systems
We provide updated vendors’ positioning in this important utility software market to reflect the changes in utilities’ buying criteria resulting from evolving business needs such as rising consumers’ expectations and the impact of digital business transformation.
efluid SAS, Ferranti Computer Systems, Fluentgrid, Gruppo Engineering, Indra, Itineris, Open International, Oracle Utilities, SAP
Magic Quadrant for WAN Optimization
Network managers are building hybrid networks to address increased cloud adoption and now see WAN optimization as just one feature needed for WAN designs. Vendors are responding by adding functionality that supports hybrid WAN, while carriers are embedding WAN optimization in the WAN infrastructure.
Array Networks, Aryaka, Blue Coat, Circadence, Cisco, Citrix, Exinda, FatPipe Networks, InfoVista (Ipanema Technologies), NTT Communications, Riverbed, Sangfor, Silver Peak
Magic Quadrant for Warehouse Management Systems
The WMS market is very mature, but differentiation continues to exist — most notably in usability, adaptability, intelligence and how well solutions orchestrate end-to-end logistics processes. Supply chain and IT leaders should use this research to understand the current state of the WMS market.
HighJump, Infor, JDA Software, Made4net, Manhattan Associates, Microlistics, Oracle, Reply, SAP, Softeon, Synergy Logistics, Tecsys, Vinculum
While WMS applications are approaching functional parity, vendor innovation continues making these solutions more usable, adaptive, smarter and better able to orchestrate end-to-end logistics processes.
HighJump, Infor, JDA Software, LogFire, Made4net, Manhattan Associates, Oracle, Reply, SAP, Softeon, Synergy Logistics, Tecsys
Magic Quadrant for Web Application Firewalls
Driven by the adoption of cloud web application and API protection services, the web application firewall market is growing. Network and application security leaders need to evaluate how WAFs can provide improved security that’s easy to consume and manage, while respecting data privacy requirements.
The WAF market is growing, driven by the adoption of cloud WAF services. Enterprise security teams should use this research as part of their evaluations of how WAFs can provide improved security that’s easy to consume and manage, while respecting data privacy requirements.
The WAF market is growing, driven by the adoption of cloud-based WAF service. Enterprise security teams should use this research as part of their evaluation on how WAFs can provide improved security that is also easy to consume and manage, while respecting data privacy requirements.
Akamai, Amazon Web Services, Barracuda Networks, Citrix, Cloudflare, Ergon Informatik, F5, Fortinet, Imperva, Instart Logic, NSFOCUS, Penta Security Systems, Positive Technologies, Radware, Rohde & Schwarz Cybersecurity (DenyAll), Venustech
The WAF market is growing, with new use cases and security requirements ranging from “good enough” security for compliance to protection against targeted attacks. Enterprise security teams should evaluate how WAFs can provide high security that is also easy to consume and manage.
AdNovum, Akamai, Barracuda Networks, Citrix, CloudFlare, DenyAll, Ergon Informatik, F5, Fortinet, Imperva, NSFOCUS, Penta Security Systems, Positive Technologies, Radware, Trustwave, United Security Providers
The WAF market is growing quickly, with a range of deployments from “good enough” to more complex WAF deployments aiming at high security. Enterprise security teams should evaluate how WAFs can provide improved security, require tolerable staff involvement and integrate in their security ecosystem.
Imperva, F5, Citrix, Akamai, Barracuda Networks, Positive Technologies, DenyAll, Radware, Fortinet, Trustwave, NSFOCUS, Penta Security, Ergon Informatik, United Security Providers, AdNovum, DBAPPSecurity
The WAF market is growing quickly from a small base; it is composed of pure players, application delivery controller vendors, cloud service providers and network security vendors. Buyers should evaluate how WAFs can provide high security, minimize false positives and sustain performance.
Imperva, F5, Citrix, Barracuda Networks, Akamai, Fortinet, DenyAll, NSFOCUS, Radware, Trustwave, Ergon Informatik, Penta Security, BeeWare, AdNovum, United Security Providers, DBAPPSecurity
Magic Quadrant for Web Conferencing
Web conferencing is emblematic of the dynamic blend of content and collaboration in the digital workplace. Conferencing markets converge as audio, video and Web mix with persistent spaces to enable faster decisions and remote teamwork.
Adobe, Arkadin, AT&T, Blackboard, Cisco, Citrix, Fuze, Google, IBM, LogMeIn, Microsoft, PGi, Vidyo, West Unified Communications Services, Zoom
Magic Quadrant for x86 Server Virtualization Infrastructure
About 75% of x86 server workloads are virtualized, but virtualization technologies are becoming more lightweight, supporting more workloads and agile development. Price, cloud interoperability and specific use cases are driving enterprises to deploy multiple virtualization technologies.
VMware, Microsoft, Oracle, Odin, Red Hat, Citrix, Huawei
At least 70% of x86 server workloads are virtualized, the market is mature and competitive, and enterprises have viable choices. An increasing number of enterprises are evaluating both the cost benefits of competitive migrations and the benefits of deploying multiple virtualization technologies.
Roughly two-thirds of x86 server workloads are virtualized, the market is mature and competitive, and enterprises have viable choices. More than ever before, enterprises are evaluating the cost-benefits of switching technologies and considering deployment of multiple virtualization infrastructures.