Find An Analyst


Name Coverage Area
Iams,Tony Servers & Storage - Competitive Positioning
Ianni,Dolores IT Asset Management
Ichishi,Tatsuya Data Management & Integration
Business Intelligence
Idoine,Carlie J. Business Intelligence
Iervolino,Christopher Business Intelligence
Enterprise Business Applications & ERP
Igou,Bob Outsourcing & IT Services
Iijima,Kimihiko Application Development & Integration
Ikeda,Takeshi Networking & Communications Services
Networking & Communications Equipment
Mobile & Wireless
Emerging Trends & Technologies
Ingelbrecht,Nick Consumer Technologies
Mobile & Wireless
Ishibashi,Masahiko Security & Privacy
Emerging Trends & Technologies
Isoda,Yuichi Emerging Trends & Technologies
Security & Privacy
Iverson,Brian Security & Privacy
Iyengar,Partha Digital Marketing
IT Management
Iyer,Nandita Servers & Storage

Become a Client

Call us now at:

+1-800-213-4848 Or
Contact us Online


  • 9 March 2018

    2018 CIO Agenda: An Australia and New Zealand Perspective CIOs in Australia and New Zealand continue to lag behind global digital leaders in technology investment, innovation and capability — a trend we saw in 2017. This year, CIOs need to be bold and take advantage of unfolding digital business opportunities and defending continued disruption and threats.
  • 28 February 2018

    It's Time for App Leadership to Reframe Mobile App Development Decisions The landscape of available tools and technologies for mobile app development is expanding to support multiple experience app development. Application leaders need to reframe mobile app development as a cornerstone that can lead to optimized user experience on multiple channels and touchpoints.


  • 26 Mar 2018

    Digital Business Impact on Leadership, Talent, Organizations and Culture EDT: 9:00 a.m. | PDT: 6:00 a.m. | GMT: 14:00 Our business models are under attack by digital transformation. The CIO holds a unique view on how to withstand the attack and guide the organization to victory. So how do we get there, and who does the CIO need as allies? Join us as we discuss the impact of digital business on leadership, talent, organizations and their culture and how to successfully guide and engage your employees amidst change.
  • 26 Mar 2018

    Apply Deception Techniques to Detect Security Threats EDT: 11:00 a.m. | PDT: 8:00 a.m. | GMT: 16:00 As organizations struggle to deal with the evolving security threat landscape, there has been a resurgence in interest on deception techniques. Simple honeypots have evolved into distributed deception platforms and existing security solutions have also started to include deception components. This webinar focuses on using deception as a "low-friction" method to detect lateral threat movement and as an alternative or a complement to other detection technologies.