Search Gartner

Are you a Gartner client?

to search within your MyGartner experience.
125,732 results sorted by relevancy

Magic Quadrant for Data Integration Tools

19 July 2018

| 

The discipline of data integration comprises the practices, architectural techniques and tools that ingest, transform, combine and provision data across the spectrum of information types. This integration takes place in the enterprise and beyond the enterprise — across partners and ...

Analyst(s): Mark A. Beyer Eric Thoo Ehtisham Zaidi

Magic Quadrant for Integrated Risk Management

16 July 2018

| 

Integrated risk management (IRM) solutions combine technology, processes and data that fulfill the objective of enabling the simplification, automation and integration of strategic, operational and IT risk management across an organization (see ). To understand the full scope of risk, ...

Analyst(s): John A. Wheeler Jie Zhang Earl Perkins

Magic Quadrant for Disaster Recovery as a Service

12 July 2018

| 

Gartner defines the disaster recovery as a service (DRaaS) market as a productized service offering in which the provider manages server image and production data replication to the cloud, disaster recovery run book creation, automated server recovery within the cloud, automated server ...

Analyst(s): Mark Thomas Jaggers Ron Blair

Magic Quadrant for Mobile App Development Platforms

17 July 2018

| 

By 2021, at least one-third of enterprises will have deployed a multiexperience development platform to support mobile, web, conversational and augmented-reality development. Gartner defines a mobile app development platform (MADP) as a product or suite that offers tools, technologies, ...

Analyst(s): Jason Wong Van L. Baker Adrian Leow Marty Resnick

SWOT: Inspur, Data Center Infrastructure, Worldwide

13 July 2018

| 

Inspur is a China-based provider of data center infrastructure and a software developer, with its primary business being server hardware. Inspur has its headquarters in Jinan, Shandong, China, and it has a marketing center in Beijing. As one of the world's fastest-growing server ...

Analyst(s): Jeffrey Hewitt Roger W. Cox Kiyomi Yamada Uko Tian Matthew Cheung

Critical Capabilities for Disaster Recovery as a Service

12 July 2018

| 

In 2017, individual customer count for the disaster recovery as a service (DRaaS) providers analyzed in this research increased by 46%, on average, while there was continued commoditization of core capabilities for recovery. Due to provider's heritage of other service offerings, some ...

Analyst(s): Mark Thomas Jaggers Ron Blair

Critical Capabilities for Data Center Outsourcing and Hybrid Infrastructure Managed Services, Europe

17 July 2018

| 

Cloud and digital transformation are often the catalyst for transforming the entire organization, and DCO/HIMS is the backbone of these initiatives. However, the needs of each organization cover a very broad spectrum, and providers' coverage and capabilities vary, requiring a thorough ...

Analyst(s): Claudio Da Rold David Groombridge

Consumer Insight: Top Trends 2017

19 July 2018

| 

Our 2017 slate includes five top trends, plus the following critical contextual information: Zeitgeist 2017, our wrapper highlighting the key shared themes across all the content below Our 2017 Values Backdrop, providing a current snapshot of U.S. consumer sentiment and drivers Our ...

Analyst(s): Iconoculture Research Team

Consumer Insight: Top Trends 2018

19 July 2018

| 

Our 2018 slate includes five top trends, plus the following critical contextual information: Our 2018 Values Backdrop, providing a current snapshot of U.S. consumer sentiment and drivers Our 2017 Trend Trajectory, following up on last year's top trends Consumer values can be seen ...

Analyst(s): Iconoculture Research Team

Fighting Phishing — 2020 Foresight

19 July 2018

| 

Phishing attacks are still increasing as a targeting method of attackers. Phishing attacks targeting credentials will continue to escalate as applications and data migrate to better-protected cloud providers. Email is not designed to truly authenticate sender identity. Efforts like ...

Analyst(s): Peter Firstbrook Neil Wynne