Published: 19 December 2011
Analyst(s): Robin Wilton
After a decade of deployment experience, the time has come to re-evaluate some core assumptions about how and when to use electronic signatures. Relying on public-key infrastructure (PKI)-based technology has its risks and drawbacks, but those risks can be reduced and managed, and some of the drawbacks can be overcome by the judicious use of alternative technologies and specialist service providers. Two of the dominant technologies of recent years -- mobile devices and cloud-based services -- can be exploited to materially change the picture and should prompt organizations to check whether their current thinking about electronic signature is still valid.
Summary of Findings
©2019 Gartner, Inc. and/or its affiliates.
All rights reserved.
Gartner is a registered trademark of Gartner, Inc. and its affiliates.
This publication may not be reproduced or distributed in any form without Gartner’s prior written permission.
It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact.
While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information.
Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such.
Your access and use of this publication are governed by Gartner’s Usage Policy.
Gartner prides itself on its reputation for independence and objectivity.
Its research is produced independently by its research organization without input or influence from any third party.
For further information, see
Guiding Principles on Independence and Objectivity.