Analytics and business intelligence (ABI) platforms enable less technical users, including businesspeople, to model, analyze, explore, share and manage data, and collaborate and share findings, enabled by IT and augmented by artificial intelligence (AI). ABI platforms may optionally include the ability to create, modify or enrich a semantic model including business rules.
Gartner defines the Application Performance Monitoring and Observability Market as software that enables the observation and analysis of application health & user experience. The targeted roles are IT operations, site reliability engineers, cloud and platform ops, application developers and product owners. These solutions may be offered for self hosted deployment, as a vendor managed hosted environment, or via SaaS.
Reviews for 'Data and Analytics - Others'
ITIM tools capture the health and resource utilization of IT infrastructure components no matter where they reside (for example, in a data center, at the edge, infrastructure as a service [IaaS] or platform as a service [PaaS] in the cloud). This enables I&O leaders to monitor and collate the availability and resource utilization metrics of physical and virtual entities, including servers, containers, network devices, database instances, hypervisors and storage. Notably, these tools collect data in real time and perform historical data analysis or trending of the elements they monitor.
The Network Performance Monitoring (NPM) market consists of tools that leverage a combination of data sources to provide a holistic view of how networks (including corporate on-premises, cloud, multicloud, hybrid and other networks) are performing. Data sources include: Network-device-generated traffic data Raw network packets Network-device-generated health metrics and events NPM tools provide diagnostic workflows and forensic data to identify the root causes of performance degradations — increasingly through the adoption of advanced technology, such as artificial intelligence (AI) or machine learning algorithms (ML). Finally, based on network-derived performance data, NPM tools provide insight into the quality of the end-user experience.
Gartner defines the operations intelligence platform as a suite of development and runtime software tools that monitor, alert and support interactive decision making by providing data and analytics about current conditions. These platforms have adapters to receive and send data; event processing logic to detect threats and opportunities; rule processing; analytics; dashboards; alerting facilities; and capabilities to trigger responses in applications, devices or workflow tools. The platforms apply to the operational aspects of a business. Business operations are activities that produce, deliver or directly enable goods, services and information products. Applications built on operations intelligence platforms work at the oversight level; they do not directly control work at a detailed level.
Gartner defines the security and information event management (SIEM) market by the customer’s need to analyze event data in real time for early detection of targeted attacks and data breaches, and to collect, store, investigate and report on log data for incident response, forensics and regulatory compliance. SIEM technology aggregates event data produced by security devices, network infrastructure, systems and applications. The primary data source is log data, but SIEM technology can also process other forms of data, such as network telemetry. Event data is combined with contextual information about users, assets, threats and vulnerabilities. The data may be normalized, so that events, data and contextual information from disparate sources can be analyzed for specific purposes, such as network security event monitoring, user activity monitoring and compliance reporting. The technology provides real-time analysis of events for security monitoring, query and long-range analytics for historical analysis.
Gartner defines security orchestration, automation and response (SOAR) as technologies that enable organizations to take inputs from a variety of sources (mostly from security information and event management [SIEM] systems) and apply workflows aligned to processes and procedures. These can be orchestrated via integrations with other technologies and automated to achieve the desired outcome and greater visibility. Additional capabilities include case and incident management features; the ability to manage threat intelligence, dashboards and reporting; and analytics that can be applied across various functions. SOAR tools significantly enhance security operations activities like threat detection and response by providing machine-powered assistance to human analysts to improve the efficiency and consistency of people and processes.