Find An Analyst

Browse

Name Coverage Area
Baghdassarian,Stephanie Mobile & Wireless
Bain,Megan Servers & Storage - Comparative Hardware
Baker,Van L. Mobile & Wireless
Bandopadhyay,Tapati IT Operations
Barber,John Semiconductors
Barber,Victoria IT Asset Management
Barger Jr,Ray Supply Chain
Barnes,Hank Cross Industries
Barrett,Jane Supply Chain
Bartel,Hendrik Mobile & Wireless
Basiliere,Pete Print Markets & Management
Basso,Monica Mobile & Wireless
Baylock,Joseph IT Operations
Networking & Communications Equipment
Mobile & Wireless
Networking & Communications Services
Beck,Jennifer S. Digital Marketing
Benson,Karen Servers & Storage
Berenbaum,Jim Networking & Communications Equipment
Networking & Communications Services
Mobile & Wireless
Bergfors,Magnus Enterprise Business Applications & ERP
Berkowitz,Todd Cross Industries
Berry,Diane IT Management
Bertram,Ian A. Business Intelligence
Beyer,Mark A. Data Management & Integration
Application Development & Integration
Bhalla,Vivek IT Operations
Bhatia,Kamlesh Networking & Communications Services
Bidaud,Bertrand Networking & Communications Equipment
Biscotti,Fabrizio Business Process Management
Application Development & Integration
Software Markets
Bittman,Thomas J. Servers & Storage
Blackmore,Dean Outsourcing & IT Services
Blanco,Adriana Semiconductors
Blanton,Cathleen E. Enterprise Architecture
Blau,Brian Mobile & Wireless
Consumer Technologies
Blood,Steve Networking & Communications Services
Networking & Communications Equipment
Blosch,Marcus Supply Chain
Emerging Trends & Technologies
Bona,Alexa IT Asset Management
Boon,Matthew J Servers & Storage
Booz,Robert H. Healthcare
Bova,Tiffani Cross Industries
Outsourcing & IT Services
Bowers,Daniel Servers & Storage
Bradley,Anthony J. Application Development & Integration
Web Services
Brand,Saul Enterprise Architecture
Brant,Kenneth F. Manufacturing
Brian,Danny Application Development & Integration
Web Services
Brisse,Matthew Servers & Storage
Britz,Bryan Outsourcing & IT Services
Brooks,Jeffrey M. IT Operations
Browning,James A. Small & Midsize Business
Buchanan,Stewart IT Asset Management
Bugajski,Joe Data Management & Integration
Application Development & Integration
Burke,Brian Enterprise Architecture
Burkett,Michael Supply Chain
Burt,Miriam Retail
Burton,Betsy Enterprise Architecture
Burton,Jim Servers & Storage - Competitive Positioning
Butler,Andrew Servers & Storage
Buytendijk,Frank Data Management & Integration
Byrnes,F. Christian Security & Privacy
Gartner, Inc.

Become a Client

Call us now at:

+1-800-213-4848 Or
Contact us Online

RESEARCH

MORE
  • 10 September 2014

    2014 Gartner Supply Chain Top 25: Europe This research highlights the top 15 companies headquartered in Europe that feature on the Gartner Supply Chain Top 25 for 2014. Chief supply chain officers can use Gartner's analysis of these leading organizations to develop collaborative and customer-driven supply chain strategies.
  • 26 August 2014

    The Move to Digital Business Demands Investment in Five Classes of Technology The transition to digital business models will require the coordinated application of five classes of technology, including digital security and the Internet of Things. These will affect every industry and will offer benefits such as greater agility and performance improvements.

WEBINARS

MORE
  • 23 Sep 2014

    The Future of IT Service Support Management Claims of the death of the IT service desk are greatly exaggerated. Although the Nexus of Forces present challenges to traditional IT service desks, it also enables opportunities to modernize the business user experience. The ability to demonstrate value is paramount, and modern IT service support must place more emphasis on proactive business user productivity enablement. This presentation provides an overview of the current state of IT service management challenges and how IT service support organizations are modernizing to meet the needs of the business.
  • 23 Sep 2014

    How Intelligence-Aware Security Controls Will Shape the Security Market Intelligence-aware security control (IASC) is an emerging concept in security, built on the foundation of big data and intelligent analytics that enables security technologies to reach new bounds. This presentation discusses what IASC actually is, examples of technologies using this today and how IASC is positioned to change the security landscape of tomorrow.