Quantcast
Channel: BLOG DAYA CIPTA MANDIRI GROUP
Viewing all 2781 articles
Browse latest View live

--- Article Removed ---

$
0
0
***
***
*** RSSing Note: Article removed by member request. ***
***

ManageEngine Accelerates Active Directory Incident Investigation, Management

$
0
0

ManageEngine Accelerates Active Directory Incident Investigation, Management

New Search Utility Instantly Pieces Together Vital Telltale Signs of a Suspected Account

  • Traces account actions, computers accessed, permission changes; eases detection of insider attacks
  • Generates convincing, context-rich audit trail for any account selected by compliance auditors
  • Download a 30-day, free trial of ADAudit Plus at http://ow.ly/RLsRy
PLEASANTON, Calif. - September 9, 2015 - ManageEngine, the real-time IT management company, today announced the latest version of ADAudit Plus, its web-based Active Directory (AD) auditing software. The new version includes a search utility that offers a consolidated audit trail, which enables AD administrators to analyze security incidents contextually. The software packs another new feature that provides a bird’s eye view of all the Active Directory changes that occurred in a specified time period.
Click to tweet this news.
While investigating Active Directory security incidents, administrators must elicit a complete audit trail of what the involved attacker may have done or accessed. Conventional tools, such as Event Viewer and PowerShell, can extract audit data but never offer the complete visibility or context required for such investigations - especially if they involve an insider who’s an AD expert, wherein detection can be complicated. Such situations require that the investigators glean every piece of information that could have had even a remote relevance to the investigation. They then must view that information contextually to establish a relationship, which helps in getting to the bottom of an incident.
"From our interactions with our customers, we realized that in addition to quickly tracing the footsteps of a compromised account, administrators investigating AD security alerts or incidents require a little background of what had been done with that account. This lends a perspective that can uncover the roots of an attack or reveal further layers of a multi-pronged attack," said Balasubramanian Palani, product manager, ManageEngine. "The new search utility of ADAudit Plus can pull in diverse but relevant pieces of forensic information that an investigator would require, and it distills and consolidates that data into a crisp yet context-rich summary, which makes spotting the adversary quicker and easier."

Detect Threats Using the New ADAudit Plus Search Utility

Using the new search utility, administrators can extract a consolidation of three different audit summaries, as listed below, for any user account (including an administrator) for a chosen period.
  • Actions by the account: This is a summary of all configuration changes that the specified account carried out on other AD objects.
  • Logon history of the account: Every computer that the account accessed — interactively or remotely — is listed in this summary, along with details such as logon hours and IP addresses.
  • Object history: This provides background on the specified account, summarizing what changes have been made to its properties and by whom. For example, it would show who changed the account’s permissions or passwords.
Every detail presented in the summary is a link, which, when clicked, displays an elaborate report for closer inspection. Similarly, the search also produces a consolidated audit summary for any given group or computer object, all of which would satisfy a compliance auditor if an account is selected for an audit.
From an incident investigation and management standpoint, an administrator can instantly learn what changes an attacker carried out in AD and which computers were compromised. This instant insight enables the admin to quickly restore secure AD configurations and isolate the compromised computers, thereby mitigating any effects of the attack.
Additionally, this search strings together all the clues, which, when analyzed together, offer a context that either exposes an attacker instantly or highlights the indicators of a compromise that lead to the attacker. This capability enables AD administrators to detect threats — especially insider attacks — which could be missed when security events are analyzed as isolated instances.

Get a Bird’s Eye View of Active Directory Changes with Aggregated Summary

The aggregated summary feature graphically summarizes all changes made to various AD elements (users, computers, groups, OU, DNS and GPO) for a time period specified by the admin. Capable of pinpointing who made those changes, this feature offers interesting statistics on past AD operations, which can be utilized to streamline AD management. Additionally, the feature offers users the flexibility to drill down from the summary view to a specific event that catches their attention.

MAGIC QUADRANT untuk WEB FIREWALL 2015

$
0
0



Magic Quadrant for Web Application Firewalls

15 July 2015 ID:G00271692
Analyst(s): Jeremy D'HoinneAdam HilsGreg Young

VIEW SUMMARY

The WAF market is growing quickly, with a range of deployments from "good enough" to more complex WAF deployments aiming at high security. Enterprise security teams should evaluate how WAFs can provide improved security, require tolerable staff involvement and integrate in their security ecosystem.

Market Definition/Description

This document was revised on 3 August 2015. The document you are viewing is the corrected version. For more information, see the Corrections page on gartner.com.
The WAF market is driven by a customer's need to protect internal and public Web applications when they are deployed locally (on-premises) or remotely (hosted, cloud or as a service). WAFs are deployed in front of Web servers to protect Web applications against external and internal attacks, to monitor access to Web applications, and to collect access logs for compliance/auditing and analytics. WAFs are most often deployed in-line, as a reverse proxy, because historically it was the only way to perform some in-depth inspections. Nowadays, other deployment modes exist, such as transparent proxy, bridge mode, or the WAF being positioned out of band (OOB or mirror mode) and, therefore, working on a copy of the network traffic.
The primary WAF benefit is providing protection for custom Web applications'"self-inflicted" vulnerabilities in Web application code developed by the enterprise. These vulnerabilities would otherwise go unprotected by other technologies that guard only against known exploits and prevent vulnerabilities in off-the-shelf Web application software (see "Web Application Firewalls Are Worth the Investment for Enterprises").
Secondarily, WAFs also integrate with other application and network security technology, such as application security testing (AST), distributed denial of service (DDoS) protection appliances, Web fraud detection and database security solutions. In addition, WAFs sometimes include performance acceleration, including content caching, and might be packaged with Web access management (WAM) modules to include authentication features — notably to provide single sign-on (SSO) for legacy or distributed Web applications.
To be considered for this Magic Quadrant, vendors must actively sell and market WAF technology to end-user organizations. The technology should include protection techniques that have been designed for Web security, beyond signatures that can be found in next-generation firewalls and IPSs. WAF products should support single and multiple Web server deployments. This Magic Quadrant includes WAFs that are deployed in front of Web applications and are not integrated directly on Web servers. This includes:
  • Purpose-built physical, virtual or software appliances
  • WAF modules embedded in application delivery controllers (ADCs; see "Magic Quadrant for Application Delivery Controllers")
  • Cloud services or virtual appliances available on infrastructure as a service (IaaS) platforms
The ability of WAFs to integrate with other enterprise security technologies — such as application security testing, database monitoring, or security information and event management (SIEM) — is often one of the indicators that reflects a strong presence in the enterprise market. Consolidation of WAFs with other technologies, like ADCs or anti-DDoS cloud services, brings its own benefits and challenges, but this market evaluation primarily focuses on the buyer's security needs when it comes to application security. This notably includes how WAF technology:
  • Maximizes the detection and catch rate for known and unknown threats
  • Minimizes false alerts (false positives) and adapts to continually evolving Web applications
  • Ensures broader adoption through ease of use and minimal performance impact
In particular, Gartner scrutinizes these features and innovations for their ability to improve Web application security beyond what a next-generation firewall, IPS and open-source WAF (such as ModSecurity and IronBee) would do.

Magic Quadrant

Figure 1. Magic Quadrant for Web Application Firewalls
Figure 1.Magic Quadrant for Web Application Firewalls
Source: Gartner (July 2015)

Vendor Strengths and Cautions

AdNovum

AdNovum, based in Zurich, Switzerland, provides application development and security services. AdNovum's Nevis Security and Compliance Suite includes WAF (nevisProxy), authentication, identity management and document signing, and was first shipped in 1997. The nevisProxy WAF is delivered as a software appliance. AdNovum provides a reporting solution for its Nevis Suite, including the WAF, based on the Elastic Search, Logstash and Kibana (ELK) stack, and integration with SIEM is available for Splunk. No integration with third-party vulnerability scanner, fraud detection or database audit technologies is available.
AdNovum is assessed as a Niche Player because it operates in a limited number of countries, has a stronger focus on WAM use cases and is not frequently cited on WAF shortlists. European enterprise buyers in need of a combined WAM and WAF solution to protect custom applications should consider AdNovum on their competitive shortlists, but should first verify its local presence.
Strengths
  • The Nevis Suite includes robust authentication and SSO features. Its centralized management (nevisAdmin) is available at no additional charge and is multitenancy-capable.
  • AdNovum has proven experience with large organizations in Switzerland, including financial institutions. It provides free licensing for test servers and unlimited flat-rate agreements for very large deals.
  • Surveyed clients like the automatic policy learning module and the advanced security features, like URL encryption, CSRF token injection and form signature.
Cautions
  • AdNovum's vision of WAF is as an integrated component, serving more than application security needs, with a stronger focus on WAM features. This limits the efforts devoted to the WAF roadmap and could impact the future ability to defend against advanced threats.
  • AdNovum does not appear on Gartner clients' shortlists for WAF outside of Switzerland. The maturity of its channel program lags behind other vendors. Prospective customers should verify the availability of local technical support and request references from peer organizations.
  • AdNovum lacks a standard hardware appliance offering that many of its competitors provide. A hardware appliance can, however, be provided by the vendor upon request. Clients report that initial configuration can be complex, but they cite recent improvements.
  • Protections against SQL injection and cross-site scripting (XSS) are focused primarily on ModSecurity open-source or commercial signatures, with no complementary threat research or reputation/threat intelligence feeds. Surveyed clients report that fine-tuning of the default signature set is necessary to avoid frequent false positives.

Akamai

Akamai (AKAM) is based in Cambridge, Massachusetts, and provides a leading content delivery network (CDN). Its network and cloud security services, including its WAF (Kona Site Defender), are built on top of the Akamai Intelligent Platform, its global cloud infrastructure. The Kona Site Defender has been available since 2009. Akamai's management and monitoring consoles (Luna Control Center and Security Monitor) are also delivered as Web portals.
Akamai's WAF is delivered as a service with a monthly fee, based on performance requirements and the number of protected Web applications. Additional subscriptions are available to limit the extra costs in case of volumetric DDoS attacks (DDoS Fee Protection), and to get assistance with Web security rule updates and tuning (Rule Update Service). Akamai also provides tools to help its clients with compliance requirements. Akamai's WAF is available as a cloud service only, primarily used to protect public-facing Web applications.
In 2014, Akamai completed the acquisition of DDoS protection service Prolexic Technologies, and released a new IP reputation feed called Client Reputation as a paid option. The vendor has also recently made available a managed service offering (Managed Kona Site Defender Service).
Akamai is evaluated as a Challenger because of its strong presence on WAF shortlists for public-facing Web applications. The Kona Site Defender is a good choice for large-scale Web applications with simple WAF deployment requirements and for existing Akamai customers as an extension to deployed Akamai solutions.
Strengths
  • Combining application and volumetric DDoS protection with a Web application firewall is a differentiator, allowing for a "one-stop" Web server security platform.
  • Kona Site Defender is well-suited for use cases where detection and alerting are the priorities. Akamai leverages its visibility into a substantial share of Internet traffic, with multiple steps for anomaly detection that feed a scoring mechanism, including IP reputation scoring.
  • Akamai has a growing presence on WAF shortlists. Clients cite ease of deployment, low maintenance workload and performance as reasons to select the vendor's WAF.
  • Akamai has increased its security credibility recently through continued visibility and threat research into high-profile Web-based attacks.
Cautions
  • Akamai's WAF is available as a cloud service only. It does not provide the on-premises appliance option that many of its competitors offer to protect internal applications, or to maintain Secure Sockets Layer (SSL) secrets on the clients' corporate network.
  • Although all cloud-based WAFs are less configurable and have less behavioral detection, Gartner clients consistently rate Kona as having the least capability. They also cite the high price, compared to other cloud WAFs, as a major reason to discard Akamai during evaluation.
  • Akamai lacks lower-price WAF subscriptions to reach smaller enterprises and midsize organizations, which is a conflict given that both small and midsize businesses (SMBs) have a greater preference for cloud-based WAFs than do large enterprises.
  • Kona Site Defender security still relies primarily on signatures and reputation scoring. It is, in general, less suited to use cases primarily requiring blocking or active response. It lags behind competitors in other capabilities, such as an automatic learning engine and the degree of custom configuration of Web application behavior.
  • The Akamai-owned Prolexic DDoS service is viewed as a premium service overlapping with cloud DDoS protection service from Akamai. This can make deciding on a DDoS protection solution more difficult for enterprise clients with high-security requirements already using Kona WAF.

Barracuda Networks

Based in Campbell, California, Barracuda Networks (CUDA) offers a wide variety of information security products that are largely targeted at SMBs. Barracuda delivers its Web Application Firewall line in three primary form factors: 10 appliance models (five core models, each available in two versions) with up to 4 Gbps of throughput; a virtual appliance; and a cloud-based service that can be deployed on the Microsoft Azure, Amazon Web Services (AWS) and VMware vCloud Air platforms.
During the last few months, Barracuda released support for JavaScript Object Notation (JSON) inspection, URL encryption, SAML 2.0 and an updated management console for its WAF line.
Barracuda Networks is evaluated as a Challenger because of its ability to win WAF deals based on cost-effective prices and good-enough security. Resource-strapped security teams, and SMB buyers that require a cost-effective solution and attentive vendor support, should consider this product.
Strengths
  • Barracuda has a very broad range of platform options, and is one of the only vendors to offer a WAF on the Azure and vCloud Air platforms. Having an XML firewall on the same platform is likely of interest to SMBs (which are more likely to combine Web and application servers).
  • Barracuda's WAF provides strong IP reputation, cookie protection and client fingerprinting capabilities. It also combines embedded authentication features and integration with several third-party authentication solutions.
  • Barracuda customers rate its geographically distributed support capabilities quite highly. Clients also like the availability of a free evaluation unit and the Instant Replacement Service program that facilitate the upgrade of WAF appliances after four years.
  • The vendor offers a wide range of foreign language support in its management interface, including many European languages that others local vendors don't provide, but also Mandarin, Cantonese, Japanese and Korean.
Cautions
  • Gartner observes a consistent critique that the management interface is challenging to use. we have yet to receive client feedback on the updated management console introduced with WAF v.7.9.
  • Barracuda's WAF lags behind its leading competitors in security automation. The result of vulnerability scans must be imported manually. Automatic learning capabilities are disabled by default and need to be re-enabled after an application change.
  • Gartner has observed very few mentions of the Barracuda WAF on Gartner enterprise client shortlists, but it is frequently cited as the legacy WAF in WAF upgrade selections.
  • There is currently no 5 Gbps or 10 Gbps models to support enterprise use cases.

Citrix

With headquarters in Santa Clara, California, and Fort Lauderdale, Florida, Citrix (CTXS) is a global provider with a broad portfolio of virtualization, cloud infrastructure and ADC solutions. Citrix has offered WAF functionality (NetScaler AppFirewall) for more than a decade as a software option, or included in the Platinum Edition of the NetScaler Application Delivery Controller (ADC) suite. The Citrix hardware appliance product line (NetScaler MPX) can also run a license-restricted version of the full NetScaler software to act as a stand-alone WAF. In addition, Citrix provides a line of virtual appliances (NetScaler VPX). The NetScaler SDX platform allows several instances of Citrix solutions, including ADC and NetScaler AppFirewall software in a single hardware appliance. NetScaler can also be bundled in Citrix Mobile Workspace offerings.
In 2014, Citrix released several new NetScaler platforms (MPX 5650, MPX 8005, MPX 11515, MPX 11520 and MPX 11540) with improved performance. Some of these included a new streaming support feature, released to enhance performance.
Citrix is assessed as a Challenger because it mainly serves its current customers looking for good-enough WAF capability and has relatively low visibility in WAF selection based on security. NetScaler AppFirewall is a good choice for organizations looking for an easy way to add WAF functionalities to their existing Citrix infrastructures.
Strengths
  • NetScaler AppFirewall includes mature features for Web security, and can be bundled with SSL VPNs for remote access to internal applications.
  • NetScaler's ability to scale appeals to large organizations, especially when massive SSL offloading is required.
  • Citrix has started investing more heavily in go-to-market activities, which should enhance an already capable and extensive network of channel partners. Gartner expects Citrix's WAF to become much more visible to a wider range of Gartner clients.
  • The vendor offers an extensive range of hardware (MPX/SDX) and virtual (VPX) appliances, and continues to invest, with five new MPX appliances released in 2014.
Cautions
  • Like most ADC vendors, Citrix primarily targets enterprise clients with ADC solutions and does not focus its efforts on pure-play security use cases. However, the new MPX releases indicate a potential shift in focus to encompass pure-play security use cases.
  • Citrix appears less often on Gartner clients' shortlists than its direct competitors. In a survey of WAF vendors, Citrix is not one of the most-listed competitive threats.
  • Despite an adaptive discount strategy, cost is often cited as a reason for midsize organizations to select another WAF vendor, if the target organization is not already using Citrix.
  • The vendor does not offer or collaborate with cloud-based DDoS protection services.
  • Gartner does not see Citrix's WAF displacing the competition based on its security capabilities, but rather sees it as an accompanying sale for ADC placements.

DBAPPSecurity

DBAPPSecurity, headquartered in Hangzhou, China, is a vendor of Web application and database security solutions. Its product offering includes a WAF (DAS-WAF) that was first released in 2007. DBAPPSecurity also provides Web application and database vulnerability scanners (DAS-WebScan and DAS-DBScan), along with a database audit platform (DAS-DBAuditor).
In 2014, DBAPPSecurity refreshed its hardware appliance product line with four new models and also released DAS-WAF v.4.0.
DBAPPSecurity is assessed as a Niche Player because it primarily sells its WAF solution to midmarket organizations in China only. DBAPPSecurity is a good shortlist candidate in China for SMBs and smaller enterprises in financial and government sectors.
Strengths
  • DAS-WAF includes automatic policy learning and Web application caching, and it can operate in reverse-proxy, transparent proxy or monitoring mode.
  • Clients mention good price and local presence as reasons to select DAS-WAF.
  • DAS-WAF can integrate with the vendor's vulnerability scanner and database security products.
Cautions
  • DBAPPSecurity's WAF lags behind several competitors' WAFs in areas such as role-based management, detailed activity reports and authentication features. Clients mention that the management and reporting consoles require improvements.
  • DBAPPSecurity has very limited market visibility and does not appear on Gartner clients' WAF shortlists outside of China. It serves primarily midsize organizations.
  • The vendor did not provide international client and value-added reseller (VAR) references to Gartner. There is limited information available on the international version of its website. Prospective customers considering DBAPPSecurity WAF outside of China should request peer references, check vendor and channel expertise, and perform a proof of concept before purchase.
  • DBAPPSecurity's strategic focus is on its security scanners. DAS-WAF's recent updates and roadmap are limited to marginal improvements.

DenyAll

DenyAll is based in Sevres, France, and has marketed its WAF technology (rWeb) since 2001. Later, it added sProxy (a plug-in to rWeb with predefined policies for email, SharePoint and SAP) and rXML (a Web services firewall). Following the acquisition of French WAF vendor BeeWare in May 2014, DenyAll continues to offer two WAF product lines, now called DenyAll rWeb and DenyAll WAF. Its portfolio also includes DenyAll WAM, DenyAll Web Service Firewall (WSF) and DenyAll Vulnerability Manager. DenyAll WAFs are currently available predominantly installed on-premises, although they are available as a managed service through a small group of managed security service partners (MSSPs). The WAF technology can be deployed as software or an appliance (physical or virtual). DenyAll WAFs are already available via AWS and Microsoft Azure. The vendor also provides a cloud-based WAF ("as a service") called Cloud Protector.
DenyAll mostly focuses on the French market, and also on the European market, where it primarily targets midsize and large enterprises in the financial, utility and government sectors. Despite the BeeWare acquisition, DenyAll remains a relatively small vendor in the WAF market, but is able to sustain a focus on technology innovation.
DenyAll is assessed as a Visionary, because it manages to win WAF evaluations based on its WAF security features and to maintain a steady pace of security developments. European organizations that are looking for high security first should consider adding DenyAll to their shortlists.
Strengths
  • DenyAll's customers list high-quality support and responsiveness to feature requests as a reason to select the vendor.
  • DenyAll's technology includes several advanced protection techniques, including JSON traffic analysis/protection, code leakage detection and a lightweight browser agent.
  • DenyAll wins deals among Type A security-conscious prospects. Its ambitious roadmap indicates a continued focus on security-first customers.
  • The vendor also offers a comprehensive list of anti-evasion techniques and a scoring list feature (a weighted scoring approach in addition to signatures) for protection against attacks, such as SQL injection (SQLi) and cross-site scripting (XSS).
  • DenyAll enables correlation between its WAF and dynamic application security testing (DAST) to increase the accuracy of detection and protection.
Cautions
  • DenyAll mainly focuses on the French and EU markets, which limits its visibility and adoption in other geographies. Through partners, it has expanded its reach into certain Middle Eastern, South American and Southeast Asian nations, and is looking to increase its U.S. presence.
  • Gartner has not yet observed any negative impact coming from the acquisition of BeeWare on DenyAll's WAF security roadmap, but the acquisition has already presented challenges for legacy BeeWare customers. It is difficult to find BeeWare product information on the combined website, and the product life cycle for those products is unclear.
  • DenyAll's organic growth is low compared with the Leaders, Challengers and even some Niche Players in this Magic Quadrant.
  • DenyAll's reporting and logging are areas that customers say need improvement.
  • DenyAll's WAF correlation process between WAF and DAST mainly focuses on WAF integration with its own DAST, but not DAST from other application security testing vendors. Therefore, the value of the integration depends on DenyAll's ability to continually improve its DAST product.

Ergon Informatik

Swiss vendor Ergon Informatik, headquartered in Zurich, Switzerland, has been shipping its WAF technology (Airlock WAF) for more than 15 years. In 2015, Ergon rebranded its product offering, creating the Airlock Suite, which includes WAF, IAM and the more basic authentication module, Airlock Login. Airlock WAF can be deployed as a reverse proxy; is available as a hardware, software or virtual appliance; and can run on Amazon Elastic Compute Cloud (EC2). Its pricing is primarily based on the number of protected Web applications and additional modules, such as SSL VPNs, XML security or graphical reports, which are available for an additional one-time fee.
Ergon Informatik is assessed as a Niche Player mainly because most of its Airlock WAF wins are in Europe and many of them are based on the perceived combined value of WAF and one of its authentication modules. The vendor is a viable shortlist candidate for organizations' WAF projects, especially large banking and insurance enterprises in Europe and the Middle East that have access management needs.
Strengths
  • Ergon Informatik's customers give good scores for the efficiency of its support and the robustness of the WAF solution when deployed in production environments.
  • Airlock's most recent update made it easier to manage security signatures and improved the visibility over security features for the administrator of the WAF component.
  • Airlock includes extensive techniques for Web application parameters, with URL encryption, various cookie protections (including a cookie store) and form parameter integrity checks.
  • Airlock's integration of a full IAM solution adds comprehensive authentication and SSO features. Airlock Login — its simplified version — provides a cost-effective alternative.
Cautions
  • Airlock lacks some of the advanced security features that enterprises might require, including automatic policy learning and CSRF token injection.
  • Airlock does not offer centralized management and has a lower number of WAF deployments protecting a large number of different Web applications than the Leaders and Challengers in this Magic Quadrant.
  • Airlock provides only a Splunk App, but the vendor reports that its customers have integrated with the leading SIEM technologies.
  • Airlock has very low visibility among Gartner's client base.

F5

Seattle-headquartered F5 (FFIV) is an application infrastructure vendor that is focused on ADCs. The primary WAF offering is a software module called Application Security Manager (ASM) for the F5 Big-IP ADC platform, often sold as a component of F5's Best bundle of services. Other F5 security modules include the network firewall Advanced Firewall Manager (AFM), the Access Policy Manager (APM) module, and the more recent Secure Web Gateway services and WebSafe Web fraud protection services. ASM is also available on the virtual edition of Big-IP. The F5 hardware Big-IP appliance product line can also run a license-restricted (yet upgradable) version of the full software to act as a stand-alone security solution (such as a stand-alone WAF).
F5 introduced several new WAF models in 2014. It also introduced new features, including the ability for ASM to integrate with the new Silverline anti-DDoS service. In the first half of 2015, it added the Silverline WAF service as a cloud-delivered service.
F5 is assessed as a Challenger because of its strong ability to sell WAF as a companion to its ADC module. F5 has more limited success when it tries to displace Leaders when WAF evaluations put the highest weight on security features. The vendor is a good shortlist candidate, especially for large organizations that value automated attack identification, and that own or are considering ADC technology.
Strengths
  • Surveyed customers list WAF integration with ADC and other F5 functions as the most prominent criterion for selecting F5 ASM. Many Gartner clients have reported that F5 ASM has been a differentiator in their ADC decisions.
  • F5's corporate teams and channels provide logistic capabilities and support that are greater and have more geographic coverage than the majority of WAF vendors.
  • ASM utilizes the same management software that is familiar to F5 administrators. iRules scripting enables the creation of custom policies that complement the predefined rule sets.
  • F5 has been active in adding new WAF features, including alert scoring for easier triage and geo-IP-based challenges. F5 also messages well on overall security.
  • As a leading ADC vendor with a large installed base of clients, F5 leverages the scalability of its ADC Big-IP platforms and the strength of its ADC sales as the entry point for add-on WAF licenses. This gives existing F5 clients an easy path to add WAF to their security portfolio.
Cautions
  • Users report difficulty in initial configuration and policy tuning, and report some difficulty maintaining things like reporting history and automated policy after reboot. Some Gartner clients have commented that ASM support can be challenging until escalated.
  • Like other ADC-based WAFs, F5's WAF buyers are most likely to consider its WAF as a feature add-on to the accompanying ADC in reverse-proxy mode. This places F5 at a potential disadvantage versus pure-play WAFs when prospects have an incumbent ADC from another vendor.
  • Many surveyed VARs reselling F5 also have a pure-play WAF in their portfolio. Clients interested in F5's WAF for high-security deployments should get a confirmation that the selected partner is sufficiently skilled on the ASM module to support this use case.

Fortinet

Based in Sunnyvale, California, Fortinet (FTNT) is a significant network security and network infrastructure vendor. It started as a unified threat management vendor in 2000. It later expanded its portfolio to include multiple security offerings, including a WAF (FortiWeb, released in 2008), an ADC (FortiADC) and a database protection platform (FortiDB). The vendor remains most well-known for its FortiGate firewall, which is its most dynamic product line.
FortiWeb provides multiple deployment options with a physical or virtual (FortiWeb-VM) appliance, and acts as a reverse/transparent proxy or not in-line. It is also available on AWS and can be purchased as an on-demand instance. FortiWeb subscriptions include IP reputation, antivirus and security signature updates.
During the last 18 months, Fortinet released four incremental updates (v.5.1 to v.5.4), adding templates for well-known Web applications, support for perfect forward secrecy (PFS) cipher suites and integration with ArcSight SIEM. It also released an entry-level appliance, the FortiWeb 100D, and refreshed its high-end WAF appliances.
Fortinet is assessed as a Niche Player because, despite its large existing channel, its WAF solution did not succeed in broadly reaching enterprise WAF buyers. The vendor's current customers and midsize organizations should include Fortinet's WAF in their competitive assessments.
Strengths
  • Clients cite vendor reputation, competitive prices and satisfaction with other products from Fortinet as reasons to purchase FortiWeb.
  • FortiWeb relies on a solid hardware product line with accelerated SSL decryption. Straightforward documentation on product performance and limitations per deployment mode help to ensure reliable product sizing practices across Fortinet's channel.
  • Clients purchasing FortiWeb frequently use its antivirus engine for malware inspection on file sharing Web services. Gartner expects the integration with sandboxing to further improve the relevance of FortiWeb for this use case.
  • FortiWeb includes an integrated vulnerability scanner, OOB deployments and a good number of predefined reports.
  • FortiWeb has a good set of features, including automatic policy learning, IP reputation (maintained by the FortiGuard team), cookie signing, SSL acceleration, Web application caching and bot detection.
Cautions
  • FortiWeb is a secondary product for Fortinet compared to FortiGate, with only a narrow portion of the Fortinet channel actively selling its WAF. Gartner believes that local technical skills availability is much scarcer than those relating to network firewalls.
  • Clients report that deploying FortiWeb in nontrivial application environments might require a fair amount of fine-tuning for a prolonged period of time to avoid false positives.
  • Fortinet does not offer WAF functionalities on top of its ADC, and does not provide a WAF as a cloud service. The vendor also does not offer some features that security-conscious organizations request, such as hardware security module (HSM) support or integration with DDoS cloud-based protection services. It integrates only with Acunetix DAST solutions.
  • FortiWeb has limited integration with other Fortinet solutions, thereby limiting the benefits for current Fortinet customers mostly to a common log reporting solution (FortiAnalyzer).
  • Fortinet's WAF rarely appears on WAF selection shortlists and is mostly seen in compliance-driven WAF selections.

Imperva

Headquartered in Redwood Shores, California, Imperva (IMPV) is a security vendor with a long WAF legacy under the SecureSphere brand. Other Imperva products are focused on data security, including products for database audit and protection, file activity monitoring, both application and volumetric DDoS prevention, and the Imperva Skyfence cloud access security broker (CASB). Imperva also has two packages for security monitoring and managed services of the SecureSphere and Incapsula WAFs.
Early on, Imperva positioned itself primarily as a transparent bridge deployment. This aligned it with enterprises, because deployments could more easily be made behind ADCs without introducing a second proxy, and "try before you buy" was easier with the transparent, yet in-line, mode, especially when incumbent ADCs were proposing their own WAFs. As most pure-play competitors were acquired or disappeared, Imperva continued to grow its share of the WAF market.
Imperva Incapsula is the cloud-based or as-a-service WAF that is bundled with other services, including DDoS mitigation. ThreatRadar is the family of add-on subscription services available for SecureSphere, delineated into four offerings: reputation, anti-bot, anti-fraud and community defense. The SecureSphere WAF is available for AWS, as a virtual appliance and on seven appliance models supporting up to 10 Gbps. Two models of physical and virtual appliances are also available for dedicated management.
Gartner sees a good attach rate level for Imperva's WAF with its database security offering. The vendor has a good third-party ecosystem, which includes data loss prevention, anti-fraud, SIEM and vulnerability scanners.
Imperva is assessed as a Leader, because it continually wins based on security features and innovations, and resists price pressure from direct competitors with the recognition of its premium offering. Imperva is a strong shortlist contender for organizations of all sizes, especially those with high-security requirements or those looking for an easy-to-deploy, cloud-based WAF.
Strengths
  • Gartner sees Imperva consistently scoring very high and/or winning competitive assessments done by Gartner clients, with a high success rate when security, reporting and protection, rather than detection, are the most weighted criteria. Postsales, Gartner client commentaries also usually are very positive.
  • Imperva has continually led the WAF market in new features that forced competitors to react; it also includes several advanced techniques for better efficiency of protection that its competitors lack. Thus, it is a good shortlist contender when protection is foremost and having a different vendor for WAFs and ADCs is an acceptable scenario. Clients using Imperva's "manager of manager" option is another sign of the vendor's presence in large deployments.
  • The vendor has consistently and effectively messaged on and delivered WAF features in response to changes in the data center and the application threat landscape, such as the first integration between Incapsula WAF and Skyfence CASB. Imperva has done well in thought leadership and threat reporting for new Web-based attacks.
  • Having the WAF-as-a-service Incapsula and on-premises SecureSphere options gives Imperva access to a larger addressable market in the enterprise and SMBs. This provides a transition path for clients whose application security needs change, and Incapsula is a good source to feed SecureSphere's threat intelligence (ThreatRadar Reputation Services).
  • Like the on-premises SecureSphere, Incapsula continually scores high in Gartner client feedback versus other in-the-cloud WAFs.
Cautions
  • As a premium enterprise product, Imperva SecureSphere is usually too advanced for SMBs, or for projects where the WAF is being deployed only as a "check the box" measure to meet compliance requirements. Enterprise clients cite SecureSphere's premium price as the main reason to select an alternate WAF solution. This is especially true when competing with ADC vendors.
  • Although Imperva consistently scores highest in security capability, SecureSphere faces the most competition from WAFs provided by ADC vendors, which often already have products on-site with customers and can offer a WAF via a license key. These customers do not want to pay the premium for a point security product.
  • Imperva's clients and prospects frequently feel pressure from Imperva's channel and sales team to integrate with its database solutions, which increases the total costs of Web application security projects and lengthens the purchase cycle with additional discussions between the data and network security buying centers for a yet unproven combined benefit.
  • Clients report occasional frustration with Imperva's management console, which they find a bit dated, especially when deploying clusters of applications.
  • Although Gartner has not observed it as a barrier to any deals, Imperva only supports AWS at present, whereas competitors have versions for other cloud platforms.

NSFOCUS

NSFOCUS is based in Beijing, China. It started in 2000 as a provider of an anti-DDoS solution (ADS Series), and then introduced new product lines for intrusion prevention (NIPS Series) and a vulnerability scanner (RSAS Series). NSFOCUS's WAF (WAF Series) offering was first released in 2007. It is delivered as a physical or virtual appliance, and can perform in reverse- or transparent proxy mode, and support OOB deployment. NSFOCUS also offers centralized management software (Enterprise Security Manager), along with managed services for its WAF.
The vendor recently announced IPv6 support and a new high-end WAF appliance aimed at midsize organizations.
NSFOCUS is evaluated as a Niche Player for the WAF market because a majority of its WAF sales are connected to other NSFOCUS products in the Asia/Pacific region. NSFOCUS's WAF is a good shortlist candidate for the vendor's current customers, and for SMBs and larger organizations in China.
Strengths
  • Clients selecting NSFOCUS's WAF often report competitive price and performance, especially low latency, as being decisive factors. NSFOCUS has recently added a localized GUI for its Japanese clients.
  • The WAF can redirect incoming Web traffic to NSFOCUS's anti-DDoS ADS devices located on a cloud infrastructure when congestion is detected, and then switch back to normal.
  • The WAF has a good mix of local and global product certification, including ICSA Labs WAF certification.
  • NSFOCUS's WAF integrates with its DAST product, NSFOCUS Web Vulnerability Scanning System (NSFOCUS WVSS).
Cautions
  • NSFOCUS is not visible in WAF offering evaluations outside of China. Its international channel's technical investment in WAF still lags behind the other products, which can limit the availability of local skilled resources for support.
  • NSFOCUS's WAF lags behind the Leaders in some enterprise-class features, such as limited role-based management, active-active clusters restricted to two appliances, and no SSL acceleration or HSM.
  • NSFOCUS's WAF does not provide authentication features.
  • Surveyed clients report that automatic policy learning could be easier to fine-tune.
  • NSFOCUS's WAF integrates with the vendor's vulnerability scanner (RSAS); however, to date, there are no integrations with third-party SIEM or vulnerability scanners.

Penta Security

Established in 1997, Penta Security is headquartered in Seoul, South Korea. Its product portfolio includes WAFs (Wapples), database encryption (D'Amo) and authentication/SSO (ISign Plus). Wapples is offered as a physical or virtual appliance (Wapples V-Series) and as a cloud service (Cloudbric). A centralized WAF management system (Wapples MS) and a free-to-use monitoring cloud-based Web portal (WMP) are also available. Penta Security emphasizes Wapples'"logic detection" technology, which does not require regular signature updates.
Last year, the vendor launched WAF as a service (Cloudbric) and signed partnerships with a few telecom providers to offer its WAF as a service. The vendor also refreshed its Wapples appliance line with four new appliances and added support for JSON inspection.
Penta Security is rated as a Niche Player because of its limited presence outside of its home market. Enterprise buyers should consider Penta Security for WAF selection, but should verify the availability of local technical support and require peer references first.
Strengths
  • Surveyed clients praise Penta Security's WAF ease of deployment and low operational workload. They give good scores for the quality of the protection and for the low false-positive rate.
  • Wapples is the only WAF evaluated in this research with Common Criteria EAL4 certification.
  • Wapples includes parameter and cookie security features, and it can create whitelists from IP reputation feeds. Its audit logs provide good traceability of configuration changes. Cloudbric, its cloud WAF, is free for up to 4GB of data per month.
  • Penta Security's local partnership agreement with telecom providers offers an easy option to combine cloud-based DDoS protection with the WAF.
Cautions
  • Wapples includes limited automation features to create its security policy from Web application behavior. Even if multiple default security policies are available, it lacks predefined templates for well-known Web applications.
  • Wapples security heavily depends on the robustness of its generic engine, with few complementary techniques available in case it fails to detect targeted attacks.
  • Penta Security does not offer authentication features, which can limit its ability to integrate with internal Web applications.
  • To date, integrations with third-party SIEM or Web vulnerability scanners rely on generic SNMP and syslog support.
  • The vendor does not yet appear on Gartner clients' shortlists outside the Asia/Pacific region.

Positive Technologies

Positive Technologies is headquartered in Moscow, London and Boston, and has shipped its WAF, called PT Application Firewall, since 2013. Positive Technologies shipped its first WAF central management platform and introduced clustering capability in 2014. The vendor also has MaxPatrol (a vulnerability scanner that can look for general network vulnerabilities and SAP and ICS/SCADA vulnerabilities) and PT Application Inspector, which combines static, dynamic and interactive code analysis techniques. Positive Technologies' WAF product is currently available as a dedicated appliance, as a software version that can run on a third-party appliance and as a virtual machine that is predominantly installed on the enterprise's premises; it can also be delivered as a managed security service through carrier partners. PT Application Firewall is not available to secure workloads on public IaaS cloud platforms.
While Positive Technologies currently mostly sells in the EMEA markets, it is working to establish a firmer foothold in other markets in 2015. Its customers are distributed relatively evenly among the SMB, enterprise and large-enterprise segments. Most of its customers are governmental agencies and financial institutions. It is one of the smallest vendors included in this Magic Quadrant, but it's growing quickly while maintaining a focus on innovation.
Positive Technologies is rated as a Visionary because of its unique, leading-edge security features. Organizations that are looking for high security first should consider adding Positive Technologies to their shortlists, but verify the level of local expertise on and support for the technology.
Strengths
  • Positive Technologies' customers list good security, ease of configuration through self-learning, and heuristics as reasons for selection.
  • Partners and customers speak highly of the vendor's responsiveness to feature requests and the quality of technical support.
  • PT Application Firewall enables reflected XSS detection by analyzing HTTP responses, and uses machine learning for anomaly detection.
  • Positive Technologies has a strong capability, using templates to protect certain business applications, most notably SAP.
  • The vendor enables correlation between its WAF and DAST/static application security testing (SAST) to increase the accuracy of detection and protection.
Cautions
  • Positive Technologies' WAF is a young product; therefore, it has been focused on a limited set of geographies. In 2015, the vendor plans to expand its reach into South American and North American nations, and certain Asia/Pacific region and Middle Eastern nations.
  • The vendor lacks integration with Active Directory, and does not support hardware SSL offload.
  • Positive Technologies' revenue is low compared with the Leaders, Challengers and most of the Niche Players in this Magic Quadrant. It does not show up as a top competitor among surveyed vendors, and Gartner seldom sees PT Application Firewall on client shortlists.
  • Customers cite management console and inflexible reporting as areas for improvement.

Radware

Headquartered in Tel Aviv, Israel, and Mahwah, New Jersey, Radware (RDWR) delivers a variety of application delivery and security products. These security products include a hybrid DDoS mitigation tool (DefensePro), a DDoS protection virtual appliance (DefenseFlow), a DDoS protection managed service (DefensePipe) and a WAF (AppWall), which can be purchased individually or bundled together in Radware's Attack Mitigation System (AMS) offering. Radware has been shipping the AppWall WAF, which it acquired from Protegrity, since 2010. AppWall may be deployed as a physical or virtual appliance. Radware also provides a solution for the centralized management, monitoring and reporting of its own products (APSolute Vision).
During 2014, Radware released no new hardware models for AppWall. It did have new WAF service introductions, including a fully managed cloud-based WAF and an on-premises fully managed WAF service. Radware also introduced support for out-of-band WAF deployment integrated with the DefensePro appliance for mitigation.
Gartner rates Radware as a Niche Player because, despite recent efforts, its WAF still predominantly serves its current customer base of midsize and large enterprises. It is a good fit in security environments that use other Radware security or ADC products.
Strengths
  • Among other deployment scenarios, AppWall can be deployed in transparent bridge mode while providing reverse-proxy capabilities to specific traffic. Combined with automatic policy learning, this enables AppWall to be deployed easily, with no configuration changes to the network.
  • Surveyed Radware customers cite security and price as two primary reasons for selecting the vendor.
  • Radware's WAF console includes strong service-provider-focused multitenancy capabilities, and integrates authentication and SSO modules.
  • Radware has executed well on its roadmap for the past three years, showing a stronger commitment to the WAF market than many of the other Niche Players in this Magic Quadrant.
Cautions
  • AppWall lacks integration with third-party dynamic vulnerability scanners and database monitoring solutions.
  • Radware was slow to integrate AppWall as a module with the Radware Alteon ADC (it was added in June 2014), thereby putting the vendor at a competitive disadvantage with fully integrated ADC/WAF competitors. Since then, Gartner has not seen many deals with AppWall sold alongside Alteon.
  • Radware has low visibility on Gartner client WAF shortlists. It gets fewer mentions in Gartner client inquiries than several of its direct competitors.

Trustwave

Based in Chicago, Trustwave provides managed services around its comprehensive portfolio of network security solutions, including its WAF, secure Web gateway, IPS, application security and SIEM offerings. Trustwave is also a qualified security assessor (QSA) for PCI DSS. The Trustwave WAF was first available in 2006 as a physical appliance (TX Series), and then in 2013 as a virtual appliances (VX Series) for VMware hypervisors. Trustwave's WAF works with other solutions from the vendor, including the SIEM and vulnerability scanner. Trustwave also supports the open-source ModSecurity WAF, and provides a commercial signature package that is maintained by SpiderLabs, its threat research team.
In April 2015, Singtel announced its intention to acquire Trustwave and that Trustwave will continue to operate as a stand-alone business unit after the acquisition closes. Recently, Trustwave and WAF competitor Akamai agreed on an alliance to resell select solutions from each other.
Trustwave is assessed as a Niche Player because many of its WAF sales come from compliance projects in North America with focused security requirements. Trustwave is a good choice for organizations in North America that are seeking PCI compliance, and is a logical shortlist candidate for businesses looking for a managed WAF.
Strengths
  • Trustwave's support of ModSecurity gives its large threat research team (SpiderLabs) access to feedback from its community, which is useful for improving the quality of its WAF — notably the recently introduced IP reputation subscription.
  • Trustwave's WAF provides a PCI-ready default configuration. Its well-crafted OOB deployment mode, with multiple types of blocking capabilities and the ability to decrypt SSL connections using a copy of the network traffic, appeals to its WAF clients.
  • With its latest release (v.7.0), Trustwave WAF can inspect JSON content and deploy signatures automatically.
  • Clients report that they have confidence in the SpiderLabs team's expertise.
Cautions
  • The impact of the Singtel acquisition could influence Trustwave's roadmap and switch the focus to other products and services. It also could alienate some channel partners in regions where Singtel operates.
  • Gartner sees Trustwave's partnership with Akamai as a double-edged sword for Trustwave customers, offering them a cloud option with a known brand, but vastly different technology, pricing and management approaches when migrating their Web application to the cloud.
  • Except for compliance projects in North America, Gartner rarely sees Trustwave on WAF shortlists.
  • Clients cite centralized management and the false-positive rate (in default configuration and subsequent application changes) as needed improvements.
  • Trustwave lags its competitors in several areas, including authentication, in-house protection against application DDoS, integration with third-party SIEM and Web application delivery optimization.

United Security Providers

United Security Providers, headquartered in Bern, Switzerland, provides a WAM solution (USP Secure Entry Server) that includes a tightly integrated WAF, authentication server and XML gateway. It also offers managed security services, including products from other vendors. The WAF is available as a physical, software or virtual appliance, and as a cloud service. USP also provides MSSP services for its WAF.
In 2014, United Security Providers introduced nine new WAF models and recently signed its first distributor in the U.K.
United Security Providers is assessed as a Niche Player because it serves almost only Swiss and German clients, even though the vendor began to intensify its efforts for international expansion in 2014. The vendor's WAF best-serves organizations with authentication and security needs to protect Web applications with restricted access requirements.
Strengths
  • The integration with the WAM solution offers a lot of flexibility for authentication and SSO, which can be factored into WAF security decisions.
  • United Security Providers has recently started operations in the U.K., with dedicated objectives for WAF expansion, and has further developed its WAF appliance product lines. Gartner sees these moves as good first signals for a future increased focus on WAF client needs.
  • United Security Providers' WAF includes advanced security features, such as URL encryption, protection against CSRF, cookie security and Web client fingerprinting. It also supports JSON and WebSockets.
  • The vendor has a faithful base of clients and channel partners. When surveyed, clients mentioned positive feedback from peer references as a reason to select United Security Providers. They give good scores to its support and professional service, and to the vendor's WAF managed services offering.
Cautions
  • United Security Providers increased its efforts in WAF product development, but its marketing remains primarily centered on WAM buyers.
  • Surveyed clients indicate that the management and reporting console could be improved.
  • The vendor's WAF can't redirect traffic to a DDoS protection cloud or integrate with third-party DDoS protection. It does not integrate with any of the leading application security testing vendors, and has integration with SIEM using syslog only.
  • Outside of Switzerland, United Security Providers does not appear on Gartner competitive shortlists for WAF, and it is not mentioned as a competitor by other vendors for WAF selections.

Vendors Added and Dropped

We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor's appearance in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may be a reflection of a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor.

Added

  • Positive Technologies

Dropped

  • BeeWare was acquired by DenyAll

Inclusion and Exclusion Criteria

WAF vendors that meet Gartner's market definition/description are considered for this Magic Quadrant under the following conditions:
  • Their offerings can protect applications running on different types of Web servers.
  • Their WAF technology is known to be approved by qualified security assessors as a solution for PCI Data Security Standard (DSS) Requirement 6.6 (which covers Open Web Application Security Project [OWASP] Top 10 threats, in addition to others).
  • They provide physical, virtual or software appliances, or cloud instances.
  • Their WAFs were generally available as of 1 January 2014.
  • Their WAFs demonstrate features/scale relevant to enterprise-class organizations.
  • They have achieved $4 million in revenue from the sales of WAF technology.
  • Gartner has determined that they are significant players in the market due to market presence or technology innovation.
  • Gartner analysts estimate that the vendor's WAF technology provides more than repackaged ModSecurity engine and signatures.
WAF companies that were not included in this research may have been excluded for one or more of the following reasons:
  • The vendor primarily has a network firewall or IPS with a non-enterprise-class WAF.
  • The vendor has minimal or negligible apparent market share among Gartner clients, or is not actively shipping products.
  • The vendor is not the original manufacturer of the firewall product. This includes hardware OEMs, resellers that repackage products that would qualify from their original manufacturers, and carriers and Internet service providers that provide managed services. We assess the breadth of OEM partners as part of the WAF evaluation, and do not rate platform providers separately.
  • The vendor has a host-based WAF or API security gateway (these are considered distinct markets).
In addition to the vendors included in this Magic Quadrant, Gartner tracks other vendors that did not meet our inclusion criteria because of a specific vertical market focus and/or WAF revenue and/or competitive visibility levels in WAF projects, including: A10 Networks, Alert Logic, Array Networks, Brocade, CloudFlare, DB Networks, ditno, Indusface, Instart Logic, Kemp Technologies, Piolink, Qualys, Sangfor, Sucuri, Venustech, Verizon and ZenEdge.
The different markets focusing on Web application security continue to be highly innovative. The vendors included in this Magic Quadrant participate, as do others that are not included. Those vendors take part in Web application security, but often focus on specific market needs, or take an alternative approach to Web application security. Examples include Juniper Networks (with its WebApp Secure product), Sentrix and Shape Security.

Evaluation Criteria

Ability to Execute

  • Product or Service: This includes the core WAF technology offered by the technology provider that competes in/serves the defined market. This also includes current product or service capabilities, quality, feature sets, and skills, whether offered natively or through OEM agreements/partnerships, as defined in the Market Definition/Description section. Strong execution means that a vendor has demonstrated to Gartner that its products or services are successfully and continually deployed in enterprises. Execution is not primarily about company size or market share, although these factors can considerably affect a company's ability to execute. Some key features, such as the ability to support complex deployments, including on-premises and cloud-based options, with real-time transaction demands, are weighted heavily.
  • Overall Viability: This includes an assessment of the overall organization's financial health, the financial and practical success of the business unit, and the likelihood that the individual business unit will continue to invest in WAF, offer WAF products, and advance the state of the art within the organization's portfolio of products.
  • Sales Execution/Pricing: This is the technology provider's capabilities in all presales activities and the structure that supports them. It includes deal management, pricing and negotiation, presales support, and the overall effectiveness of the sales channel. It also includes deal size, as well as the use of the product or service in large enterprises with critical public Web applications, such as banking applications or e-commerce. Low pricing will not guarantee high execution or client interest. Buyers want good results more than they want bargains.
  • Market Responsiveness/Record: This is the ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, and security trends and customer needs evolve. A vendor's responsiveness to new or updated Web application frameworks and standards, as well as its ability to adapt to market dynamics, changes (such as the relative importance of PCI compliance). This criterion also considers the provider's history of releases, but weights its responsiveness during the most recent product life cycle higher.
  • Marketing Execution: This is the clarity, quality, creativity and efficacy of programs that are designed to deliver the organization's message in order to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in buyers' minds. This mind share can be driven by a combination of publicity, promotional activities, thought leadership, word of mouth and sales activities.
  • Customer Experience: This assesses the relationships, products and services/programs that enable clients to be successful with the products that are evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups, service-level agreements and so on.
  • Operations: This is the organization's ability to meet its goals and commitments. Factors include the quality of the organizational structure, including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis.
Table 1. Ability to Execute Evaluation Criteria
Evaluation Criteria
Weighting
Product or Service
High
Overall Viability
Medium
Sales Execution/Pricing
Medium
Market Responsiveness/Record
High
Marketing Execution
Medium
Customer Experience
High
Operations
Medium
Source: Gartner (July 2015)

Completeness of Vision

  • Market Understanding: This is the technology provider's ability to understand buyers' wants and needs, and to translate them into products and services. Vendors that show the highest degree of vision listen to and understand buyers' wants and needs, and can shape or enhance them with their added vision. They also determine when emerging use cases will greatly influence how the technology has to work.
  • Marketing Strategy: This is a clear, differentiated set of messages that is consistently communicated throughout the organization and externalized through the website, advertising, customer programs and positioning statements.
  • Sales Strategy: This is the strategy for selling products that uses the appropriate network of direct and indirect sales, marketing, service, and communication affiliates to extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. The ability to attract new customers in need of Web application security only has a strong influence on this criterion.
  • Offering (Product) Strategy: This is the technology provider's approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature sets as they map to current and future requirements. As attacks change and become more targeted and complex, we highly weight vendors that move their WAFs beyond rule-based Web protections that are limited to known attacks. For example:
    • Enabling a positive security model with automatic and efficient policy learning
    • Using a weighted scoring mechanism based on a combination of techniques
    • Providing updated security engines to handle new protocols and standards (such as JSON, HTML5, SPDY, IPv6 and WebSockets), as well as remaining efficient against the changes in how older Web technologies (such as Java, JavaScript and Adobe Flash) are used
    • Actively countering evasion techniques
    This criterion includes the evaluation of the depth of features, especially features that ease the management of the solution, and the integration with other solutions, including DDoS protection services and emerging technologies like CASB.
  • Business Model: This is the soundness and logic of a technology provider's underlying business proposition.
  • Vertical/Industry Strategy: This is the technology provider's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including vertical markets. This criterion is not rated this year.
  • Innovation: This is the direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. It includes product innovation and quality differentiators, such as:
    • New methods for detecting Web attacks and avoiding false positives
    • A management interface, monitoring and reporting that contribute to easy Web application setup and maintenance, better visibility, and faster incident response
    • Integration with companion security technologies, which improves overall security
  • Geographic Strategy: This is the technology provider's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography — either directly or through partners, channels and subsidiaries — as appropriate for those geographies and markets.
Table 2. Completeness of Vision Evaluation Criteria
Evaluation Criteria
Weighting
Market Understanding
High
Marketing Strategy
Medium
Sales Strategy
Low
Offering (Product) Strategy
High
Business Model
Medium
Vertical/Industry Strategy
Not rated
Innovation
High
Geographic Strategy
Medium
Source: Gartner (July 2015)

Quadrant Descriptions

Leaders

The Leaders quadrant contains vendors that have the ability to shape the market by introducing additional capabilities in their offerings, by raising awareness of the importance of those features and by being the first to do so. They also meet the enterprise requirements for the different use cases of Web application security.
We expect Leaders to have strong market share and steady growth, but these alone are not sufficient. Key capabilities for Leaders in the WAF market are to ensure higher security and smooth integration in the Web application environment. They also include advanced Web application behavior learning; a superior ability to block common threats (such as SQLi, XSS and CSRF), protect custom Web applications and avoid evasion techniques; and strong deployment, management, real-time monitoring, and extensive reporting. In addition to providing technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements and evolution in Web applications that will require paradigm changes.

Challengers

Challengers in this market are vendors that have achieved a sound customer base, but they are not leading on security features. Many Challengers leverage existing clients from other markets to sell their WAF technology, rather than competing on products to win deals. A Challenger may also be well-positioned and have good market share in a specific segment of the WAF market, but does not address (and may not be interested in addressing) the entire market.

Visionaries

The Visionaries quadrant is composed of vendors that have provided key innovative elements to answer Web application security concerns. They devote more resources on security features that help protecting critical business applications against targeted attacks. However, they lack the capability to influence a large portion of the market; they haven't expanded their sales and support capabilities on a global basis; or they lack the funding to execute with the same capabilities as vendors in the Leaders and Challengers quadrants. Visionaries quadrant vendors also have a smaller presence in the WAF market, as measured by installed base, revenue size or growth, or by smaller overall company size or long-term viability.

Niche Players

The Niche Players quadrant is composed primarily of smaller vendors that provide WAF technology that is a good match for specific WAF use cases (such as PCI compliance), or those that have a limited geographic reach. The WAF market includes several European and Asian vendors that serve clients in their regions well with local support and an ability to quickly adapt their roadmaps to specific needs; however, they do not sell outside their home countries or regions. Many Niche Players, even when making large products, offer features that would suit only SMB and smaller enterprises' needs.
Vendors in this quadrant may also have a small installed base or be limited, according to Gartner's criteria, by a number of factors. These factors may include limited investments or capabilities, or other inhibitors to providing a broader set of capabilities to enterprises now and during the 12-month planning horizon. Inclusion in this quadrant does not reflect negatively on a vendor's value in the more narrowly focused service spectrum.

Context

Gartner generally recommends that client organizations consider products from vendors in every quadrant of this Magic Quadrant, based on their specific functional and operational requirements. This is especially true for the WAF market, which includes a large number of relatively small vendors, or larger vendors, but with a small share of their revenue coming from their WAF offerings. Product selection decisions should be driven by organization-specific requirements in areas such as deployment constraints and scale, the relative importance of compliance, the characteristics and risk exposures of business-critical and custom Web applications, and the vendor's local support and market understanding.
Security managers who are considering WAF deployments should first define their deployment constraints, especially:
  • Their tolerance for a full in-line reverse proxy with blocking capabilities in front of the Web applications
  • The benefits and constraints of the different WAF delivery options: dedicated appliances, CDNs, ADCs and cloud services
  • SSL decryption/re-encryption and other scalability requirements
For more information on WAF technology selection and deployment challenges, see "Web Application Firewalls Are Worth the Investment for Enterprises."

Market Overview

Gartner estimates that the WAF market amounts to $420 million in 2014, growing 24% compared to 2013. The Americas represent 45% of the total market, EMEA accounts for 29% of the market and the Asia/Pacific region accounts for 26%.
The WAF market includes different categories of vendors. In 2013, dedicated WAF offerings from pure players and network security vendors dominated the market with more than 50% of the WAF revenue. Large ADC vendors that were the first to add WAF capabilities have good market shares, leveraging their existing client bases. Smaller ADC vendors now have also added the WAF option (A10 Networks in 2013, Kemp Technologies in 2014). They offer lower costs than dedicated technology, and emphasize easy integration and high performance to win WAF deals. Various CDN and anti-DDoS cloud providers now offer WAF subscriptions, growing quickly and from a small base.
PCI and other compliance requirements are still mentioned as the primary reasons for WAF purchases in 25% to 30% of inquiries with Gartner clients, especially in midsize organizations and smaller enterprises. With PCI 3.0, Requirement 6.6 was updated, loosening slightly the constraints on WAF deployment, but this change did not affect the WAF market.1
However, 2014 has been marked by stronger positions from security buyers with more differentiated needs for good-enough WAF and high-security requirements. The growing number of ADCs and cloud services integrating WAF as a feature raises the awareness of Web application security requirements, but might also put additional price pressure on pure-player WAF vendors when they are unable to justify the higher deployment costs with proven results on how they provide higher security, but also reduce overall workload with better management and reporting tools. WAF delivered as a service continues to gain traction, and its ease of deployment appeals to more and more security buyers. Still, the maturity of these cloud offerings can often be far from best of breed, especially the ability for their clients to act on false alerts or to get more than a set of repackaged signatures protecting predominantly against injection flaws.
In May 2014, French WAF vendor DenyAll acquired its French competitor BeeWare. In April 2015, Singtel announced its intention to acquire Trustwave. Gartner believes that more mergers and acquisitions are likely to happen in the upcoming years, as large security vendors look for growth opportunities and smaller vendors try to reach critical size.
The open-source module ModSecurity and the more recently released IronBee are also considered cost-effective competition for commercial WAF, especially for good-enough WAF use cases.

Organizations Better Understand the Value of WAF Technology, but Expect More Benefits

Gartner already sees Type A organizations (see Note 1) continue to deploy WAFs for their public and internal Web applications, even when there are no compliance constraints. Thanks to cloud-based offering and virtual appliances available on IaaS (such as AWS), WAF technology now reaches smaller enterprises and midsize organizations, especially when bundled with DDoS protection and CDN features.
With a growing number of WAF upgrades, the selection process integrates more stringent requirements, as a result of the experience gained from previous WAF projects. To continue to grow in the future, WAF vendors need to satisfy these upgraded demands, and to justify the investment not only with ease of use and smooth integration, but also with strong and actionable security measures. While many WAF vendors highlight their partnerships with application security testing providers, only a subset of the Type A enterprises effectively manage to gain sufficient benefits from the integration, partly due to the partial automation of the virtual patching workflow. Integration with third-party solutions (AST, database monitoring, Web access management) also creates a risk of diluted value for WAF technology as a stand-alone option.
Gartner clients also often complain about WAF reporting for security analysts and the limited automation available to remediate attacks or fix false positives. Reliance on positive security models (whitelists or policies derived from automatic Web application behavior learning engines) in prevention mode and automatic deployment of virtual patches are rare, and are signs of security teams' aversion to any risk of incident that could disrupt business applications. These perceived limitations profit some MSSP offerings, which increasingly convince organizations to subscribe to their managed WAF service.
The most successful WAF vendors understand and continue to invest in tighter integration of security features in the WAF platform. Other vendors maintain their investment in the WAF technology at a good-enough level to follow the evolution of the Web standard but, with time, move closer to good-enough-only, making it harder to win against platforms integrating WAF as one of many features.
Organizations that handle very large public Web applications will also require better automation during the staging, but also in cases of frequent Web application changes. They will also require optimized operational costs, with larger appliances replacing complex cluster architectures. In addition, security for mobile Web applications, cloud hosting and cloud services implies new security measures and an alternative deployment setup that could impact how the WAF market evolves in the future.
Increased visibility into well-known Web application behavior, better security against targeted attacks and ease of use will continue to be highly weighted in competitive evaluations; however, incremental improvements alone won't be sufficient to maintain a long-term high growth rate. WAF vendors must also find new ways to provide high value to client organizations, and to adapt to new methods of delivery and consumption for Web applications and services.

Rupiah Melemah, Ini Solusi bagi Pebisnis TI

$
0
0

Reporter: Rimba LautEditor: Dudi RahmanKamis 17 September 2015, 11:37:00

Jakarta - Nilai tukar rupiah yang melemah terhadap dolar Amerika Serikat (AS) membawa dampak yang luas terhadap bisnis komputer dan teknologi informasi (TI). Soegiharto Santoso, Ketua Umum Asosiasi Pengusaha Komputer Indonesia (Apkomindo), mengatakan pebisnis TI harus pandai memanfaatkan celah di bidang jasa dan aplikasi yang prospeknya masih cerah.

"Perdagangan hardware memang sedikit terhambat. Namun, di bidang jasa dan aplikasi, seperti cloud, hosting, website, e-commerce dan lain sebagainya terus bertumbuh," kata dia kepada IFT, Kamis (17/9).

Pada perdagangan hari ini, rupiah dibuka menguat karena tertekannya dolar AS di perdagangan Asia. Para pelaku pasar fokus ke hasil pertemuan Federal Reserve (The Fed) mengenai suku bunga acuan.

Berdasarkan data Yahoo Finance, rupiah berada di level Rp 14.343 per dolar AS. Angka ini menguat 103 poin dibandingkan penutupan sehari sebelumnya di level Rp 14.446 per dolar AS.

Sementara berdasarkan data Bloomberg, rupiah dibuka pada level Rp 14.420 per dolar AS. Mata uang garuda terapresiasi dibandingkan penutupan kemarin yang berada di level Rp 14.459 per dolar AS.

Sedangkan kurs referensi Jakarta Interbank spot dollar rate (Jisdor) Bank Indonesia (BI) berada di level Rp 14.452 per dolar AS. Rupiah tercatat melemah sebesar 10 poin dari posisi sebelumnya di level Rp 14.442 per dolar AS.

Soegiharto menjelaskan, saat ini merupakan waktu yang tepat bagi pemerintah, sektor pendidikan dan swasta untuk kembali menggenjot kualitas sumber daya manusia (SDM) di bidang TI. Misalnya, melalui pelatihan, workshop ataupun perbaikan kurikulum TI.

Selain itu, dia mengungkapkan, Apkomindo bermitra dengan AP3I (Asosiasi Penyelenggara Pendidikan dan Pelatihan Indonesia), KOMISI (Komunitas Sales Indonesia), Yayasan IPWIJA (Institut Pengembangan Wiraswasta Indonesia Jakarta) dan IAII (Ikatan Ahli Informatikan Indonesia) telah mendirikan LSP KOMPUTER. Tujuannya, dapat semakin siap untuk menghadapi MEA (Masyarakat Ekonomi ASEAN) 2016.

"Kami di Apkomindo ingin menggugah setiap pihak bahwa investasi di bidang SDM sangat penting. Bagaimanapun situasi ekonomi kita nantinya ke depan, jika kita memiliki SDM yang berkualitas, kreatif dan produktif, maka bisnis TI akan mampu berkontribusi terhadap pemasukan negara, selain dari itu kami juga ingin tetap menggairahkan pasar ritel tradisional yang ada di beberapa Computer Center di Tanah Air," tambahnya.

Rimba Laut

PRTG menggunakan Ticketing System

$
0
0


Introducing the
PRTG Ticketing System

 
 
 
Dear IT-Pro,
This is Kimberley, Sr. Systems Engineer with Paessler. Ever wonder how you could more effectively manage your network with PRTG?
I wanted to take a moment to introduce ourticketing system, which enables users to more proactivley manage and maintain information about issues and tasks which appear while monitoring their network. Not only will this make your job easier, but it will also increase the proficiency of your network.
 
 Kimberley Trommler
  
 Video about Ticketing System
View Video (9:58 min)
 
 
Watch the video on the left to learn:
  • How to create tickets within PRTG.
  • How to assign, resolve and close tickets
  • How to set up system notifications via SMS & email.
  • And much, much more...
 
 

Why you should use the PRTG Ticketing System
The PRTG ticketing system can help improve network management by proactively notifying you within the system, by SMS and email when:
  • New devices are added to the network
  • A new task has been assigned to you
  • A sensor has identified a problem with the network
For any further questions on this or other monitoring topics: please do not hesitate to contact us via email at learnmore@paessler.com.

Mencari Data Integration Tools ? Lihat Gartner Magic Quadrant

$
0
0


Magic Quadrant for Data Integration Tools

29 July 2015 ID:G00269320
Analyst(s): Eric ThooLakshmi Randall

VIEW SUMMARY

Enterprise buyers increasingly see data integration as a strategic requirement, for which they want comprehensive data delivery capabilities, flexible deployment models, and synergies with information and application infrastructures. To help them make the right choice, Gartner assesses 13 vendors.

Market Definition/Description

The discipline of data integration comprises the practices, architectural techniques and tools for achieving consistent access to, and delivery of, data across the spectrum of data subject areas and data structure types in the enterprise — to meet the data consumption requirements of all applications and business processes.
The market for data integration tools includes vendors that offer software products to enable the construction and implementation of data access and data delivery infrastructure for a variety of data integration scenarios. These include:
  • Data acquisition for business intelligence (BI), analytics and data warehousing —Extracting data from operational systems, transforming and merging that data, and delivering it to integrated data structures for analytics purposes. The variety of data and context for analytics is expanding as emergent environments — such as NoSQL and Hadoop distributions for supporting big data, in-memory DBMSs, logical data warehouse architectures and end-user capability to integrate data (as part of data preparation) — increasingly become parts of the information infrastructure.
  • Sourcing and delivery of master data in support of master data management (MDM) —Enabling the connectivity and integration of the data representing critical business entities such as customers, products and employees. Data integration tools can be used to build the data access and synchronization processes to support MDM initiatives.
  • Data migrations/conversions — Although traditionally addressed most often via the custom coding of conversion programs, data integration tools are increasingly addressing the data movement and transformation challenges inherent in the replacement of legacy applications and consolidation efforts during mergers and acquisitions.
  • Data consistency between operational applications — Data integration tools provide the ability to ensure database-level consistency across applications, both on an internal and an interenterprise basis (for example, involving data structures for SaaS applications or cloud-resident data sources), and in a bidirectional or unidirectional manner.
  • Interenterprise data sharing — Organizations are increasingly required to provide data to, and receive data from, external trading partners (customers, suppliers, business partners and others). Data integration tools are relevant for addressing these challenges, which often consist of the same types of data access, transformation and movement component found in other common use cases.
The usage of data integration tools may display characteristics not unique to one of these individual scenarios. Technologies in this market are required to execute many of the core functions of data integration, which can apply to any of the above scenarios. Examples of resulting characteristics include:
  • Interoperating with application integration technology in a single solution architecture to, for instance, expose extraction, transformation and loading (ETL) processes that extract data from sources as a service to be provisioned via an enterprise service bus.
  • Enabling data services as an architectural technique in a service-oriented architecture (SOA) context. Rather than a use of data integration per se, this represents an emerging trend for data integration capabilities to play a role, and to be implemented within, software-defined architecture for application services.
  • Integrating a combination of data residing on-premises and in SaaS applications or other cloud-based data stores and services, to fulfill requirements such as cloud service integration.
  • Supporting the delivery of data to, and the access of data from, platforms typically associated with big data initiatives, such as Hadoop, NoSQL and cloud-based data stores. These platforms provide opportunities for distributing data integration workloads to external parallelized processes. The emerging concept of a "data lake," where data is continuously collected and stored in a lightly structured NoSQL repository, poses data integration challenges but also opportunities to assist in the application of schemas at data read-time, if needed, and to deliver data to business users, processes or applications, or to use data iteratively.
Gartner has defined several classes of functional capability that vendors of data integration tools provide to deliver optimal value to organizations in support of a full range of data integration scenarios:
  • Connectivity/adapter capabilities (data source and target support). The ability to interact with a range of different types of data structure, including:
    • Relational databases
    • Legacy and nonrelational databases
    • Various file formats
    • XML
    • Packaged applications, such as those for CRM and supply chain management
    • SaaS and cloud-based applications and sources
    • Industry-standard message formats, such as electronic data interchange (EDI), Health Level Seven International (HL7) and Society for Worldwide Interbank Financial Telecommunication (SWIFT)
    • Parallel distributed processing environments such as Hadoop Distributed File System (HDFS) and other NoSQL-type repositories, such as graph, table-style, document store and key-value DBMSs
    • Message queues, including those provided by application integration middleware products and standards-based products (such as Java Message Service)
    • Data types of a less structured nature, such as that associated with social media, Web clickstreams, email, websites, office productivity tools and content
    • Emergent sources, such as data on in-memory repositories, mobile platforms and spatial applications
    • Screen-scraping and/or user interaction simulations (for example, scripts to interact with Web, 3270, VT100 and others)
  • Data integration tools must support different modes of interaction with this range of data structure types, including:
    • Bulk/batch acquisition and delivery
    • Granular trickle-feed acquisition and delivery
    • Change data capture (CDC) — the ability to identify and extract modified data
    • Event-based acquisition (time-based, data-value-based, or links to application integration tools to interact with message request/reply, publish/subscribe, and routing)
  • Data delivery capabilities. The ability to provide data to consuming applications, processes and databases in a variety of modes, including:
    • Physical bulk/batch data movement between data repositories, such as processes for ETL or extraction, loading and transformation (ELT)
    • Data federation/virtualization
    • Message-oriented encapsulation and movement of data (via linkage with application integration tool capability)
    • Replication of data between homogeneous or heterogeneous DBMSs and schemas
  • In addition, support for the delivery of data across the range of latency requirements is important, including:
    • Scheduled batch delivery
    • Streaming/near-real-time delivery
    • Event-driven delivery of data based on identification of a relevant event
  • Data transformation capabilities. Built-in capabilities for achieving data transformation operations of varying complexity, including:
    • Basic transformations, such as data-type conversions, string manipulations and simple calculations
    • Transformations of intermediate complexity, such as look-up and replace operations, aggregations, summarizations, integrated time series, deterministic matching and the management of slowly changing dimensions
    • Complex transformations, such as sophisticated parsing operations on free-form text, rich media and patterns/events in big data
In addition, the tools must provide facilities for developing custom transformations and extending packaged transformations.
  • Metadata and data modeling support. As the increasingly important heart of data integration capabilities, metadata management and data modeling requirements include:
    • Automated discovery and acquisition of metadata from data sources, applications and other tools
    • Discernment of relationships between data models and business process models
    • Data model creation and maintenance
    • Physical-to-logical model mapping and rationalization
    • Ability to define model-to-model relationships via graphical attribute-level mapping
    • Lineage and impact analysis reporting, in graphical and tabular formats
    • An open metadata repository, with the ability to share metadata bidirectionally with other tools
    • Automated synchronization of metadata across multiple instances of the tools
    • Ability to extend the metadata repository with customer-defined metadata attributes and relationships
    • Documentation of project/program delivery definitions and design principles in support of requirements definition activities
    • A business analyst/end-user interface to view and work with metadata
  • Design and development environment capabilities. Facilities for enabling the specification and construction of data integration processes, including:
    • Graphical representation of repository objects, data models and data flows
    • Management of the development process workflow, addressing requirements such as approvals and promotions
    • Granular, role-based and developer-based security
    • Team-based development capabilities, such as version control and collaboration
    • Functionality to support reuse across developers and projects, and to facilitate the identification of redundancies
    • A common or shared user interface for design and development (of diverse data delivery styles, of data integration and data quality operations, of cloud and on-premises environments, and so on)
    • A business analyst/end-user interface to specify and manage mapping and transformation logic through the use of end-user functionality for data integration/preparation
    • Support for testing and debugging
  • Information governance support capabilities (via interoperation with data quality, profiling and mining capabilities with the vendor's or a third party's tools). Mechanisms to work with related capabilities to help with the understanding and assurance of data quality over time, including interoperability with:
    • Data profiling tools (profiling and monitoring the conditions of data quality)
    • Data mining tools (relationship discovery)
    • Data quality tools (supporting data quality improvements)
  • Deployment options and runtime platform capabilities. Breadth of support for the hardware and operating systems on which data integration processes may be deployed, and the choices of delivery model — specifically:
    • Mainframe environments, such as IBM z/OS and z/Linux
    • Midrange environments, such as IBM System i or HP Tandem
    • Unix-based environments
    • Windows environments
    • Linux environments
    • On-premises (at the customer site) installation and deployment of software
    • Hosted off-premises software deployment (dedicated, single-tenant implementation)
    • Integration platform as a service (iPaaS), consumed by the customer completely "as a service"— the vendor provides cloud infrastructure; the customer does not install and administer the software
    • Cloud deployment support (requires organizations to deploy software in cloud infrastructure)
    • In-memory computing environment
    • Server virtualization (support for shared, virtualized implementations)
    • Parallel distributed processing (such as Hadoop and MapReduce)
  • Operations and administration capabilities. Facilities for enabling adequate ongoing support, management, monitoring and control of the data integration processes implemented by the tools, such as:
    • Error-handling functionality, both predefined and customizable
    • Monitoring and control of runtime processes, both via functionality in the tools and through interoperability with other IT operations technologies
    • Collection of runtime statistics to determine use and efficiency, as well as an application-style interface for visualization and evaluation
    • Security controls, for both data in-flight and administrator processes
    • A runtime architecture that ensures performance and scalability
  • Architecture and integration capabilities. The degree of commonality, consistency and interoperability between the various components of the data integration toolset, including:
    • A minimal number of products (ideally one) supporting all data delivery modes
    • Common metadata (a single repository) and/or the ability to share metadata across all components and data delivery modes
    • A common design environment to support all data delivery modes
    • The ability to switch seamlessly and transparently between delivery modes (bulk/batch versus granular real-time versus federation) with minimal rework
    • Interoperability with other integration tools and applications, via certified interfaces, robust APIs and links to messaging support
    • Efficient support for all data delivery modes, regardless of runtime architecture type (centralized server engine versus distributed runtime)
    • The ability to execute data integration in cloud and on-premises environments, as appropriate, where developed artifacts can be interchanged, reused and deployed across both environments with minimal rework
  • Service enablement capabilities. As acceptance of data service concepts continues to grow, so data integration tools must exhibit service-oriented characteristics and provide support for SOA, such as:
    • The ability to deploy all aspects of runtime functionality as data services (for example, deployed functionality can be called via a Web services interface)
    • Management of publication and testing of data services
    • Interaction with service repositories and registries
    • Service enablement of development and administration environments, so that external tools and applications can dynamically modify and control the runtime behavior of the tools

Magic Quadrant

Figure 1. Magic Quadrant for Data Integration Tools
Figure 1.Magic Quadrant for Data Integration Tools
Source: Gartner (July 2015)

Vendor Strengths and Cautions

Actian

Based in Redwood City, California, U.S., Actian offers data integration capabilities via Actian DataConnect and Actian DataCloud. Actian's customer base for data integration tools is estimated to number more than 6,800 organizations.
Strengths
  • Core capability and performance. Actian's continued focus on diverse connectivity and emphasis on industry-standard message formats enable companies to support diverse data integration requirements, from real-time to batch mode. Customers report Actian's bulk/batch data delivery to be a key strength, one favored in implementations for having strong scalability and performance.
  • User productivity. The extension of functionality so that business roles can control user-defined integration mapping and data loading enables productivity gains. Actian has extended the capabilities of DataCloud and DataConnect, which will evolve to be delivered as managed services to further simplify customer onboarding and ease use for interenterprise data sharing.
  • Customer relationship. Actian's partnering posture toward companies results in a strong customer experience, encompassing the presale process, the selling process, and the postsale relationship.
Cautions
  • Challenges with major upgrades. Customers report challenges with upgrades between major releases. A migration utility offered by Actian, along with increased frequency of releases, is intended to reduce the complexity of each upgrade and ease migration efforts.
  • Linkage of product support with professional services. Customers would like to see better alignment between Actian's data integration tools, along with access to implementation skills and professional services.
  • Market positioning of use cases. The perceived closeness of alignment between Actian's portfolio and analytics support requirements represents a competitive disadvantage for prospective buyers. However, customers report diverse data integration use cases in production.

Adeptia

Based in Chicago, Illinois, U.S., Adeptia offers the Adeptia Integration Suite and Adeptia Connect. Adeptia's customer base for this product set is estimated to number approximately 530 organizations.
Strengths
  • Integrated product and time-to-value: Adeptia's data integration technology is offered alongside other integration tools that provide an enterprise service bus, B2B integration and trading partner management — all in a single product. Customers appreciate the tight integration of the underlying components and the ability to support rapid implementation.
  • Expanded applicability using cloud services. Adeptia Connect offers iPaaS functionality that enables interenterprise data sharing, where businesses are able to publish and use data connectors for B2B integration. Planned enhancements to support EDI schemas, data dictionaries, mapping and prebuilt EDI connections to common applications are expected at the end of 2015, followed by a single interface for using both iPaaS and on-premises tools.
  • Pricing and value. Customers view Adeptia's tools as attractively priced and as delivering good value, relative to the cost of tools from major competitors. Adeptia's recent standardization of subscription-based pricing aims to simplify procurement, based on tiered editions and feature sets.
Cautions
  • Skills and market coverage. While Adeptia claims its products' ease of use and reduced dependence on skilled resources are differentiators, finding those skilled resources might prove challenging for organizations trying to implement and maintain deployments as their requirements grow.
  • Learning experience. Some Adeptia customers indicate usage challenges when business-oriented users, rather than integration developers, are first learning to perform complex data integration activities. Generally, however, Adeptia's enabling of business-user-driven integration tasks and overall ease of use attract buyers to 'its Web-based product — and these are differentiating factors that the company continues to focus on.
  • Big data support. Overall, Adeptia's implementations and competitive activities indicate limited traction in support of big data initiatives, which are increasingly emphasized in this market.

Cisco

Based in San Jose, California, U.S., Cisco offers the Cisco Information Server and Cisco Integration Platform. Cisco's customer base for this product set is estimated to number more than 320 organizations.
Strengths
  • Agility and rapid time-to-value. Cisco has a strong focus on data federation/virtualization, and a well-established track record for capitalizing on the growing demand in this area. Reference customers praise Cisco's data virtualization technology for enabling agile development, and using optimization techniques such as pushing processing down to data sources, which minimizes data movement and reduces time-to-value.
  • Expanding product portfolio. Cisco continues to evolve its product portfolio by supporting the logical data warehouse (LDW), integrating streaming data and Internet of Things (IoT) environments, linking with Cisco Tidal Enterprise Scheduler for data integration workflows, and envisaging capability for data preparation. Cisco's expanding product portfolio supports the objective of enabling bimodal IT and digitalization, and of providing an enhanced analytics experience.
  • Customer relationship and market access. Reference customers state that Cisco is extremely responsive to customer needs and that the quality of its customer support is good. Cisco's global reach continues to widen the availability of the data integration tools it acquired from Composite Software.
Cautions
  • Breadth of coverage and market resonance. Organizations seeking providers with a comprehensive range of data delivery capabilities (beyond federated/virtualized styles) often find Cisco's product set to be narrow. Cisco's relatively small customer base in this market limits the availability of relevant skills, which at times poses a barrier to adoption. Cisco needs to increase its market resonance on the basis of its acquired offerings from Composite Software, as Cisco is not an incumbent vendor in the information management technology sector.
  • Synergy with data management capabilities. Although Cisco is working to improve its metadata support, customers are still looking for a seamless way to integrate metadata across diverse data integration use cases. Customers are increasing their expectations for governance support and requiring integrated use of Cisco's data integration capability with comprehensive data quality tools.
  • Deployment and diagnostic guidance. Reference customers identify diagnosis of error messages as challenging, and require better diagnostic support and integrated documentation. Customers also expressed a desire for a more mature user community, for improved access to implementation guidance and practices.

Denodo

Based in Palo Alto, California, U.S., Denodo offers the Denodo Platform. Denodo's customer base for its data integration product is estimated to number 250 companies.
Strengths
  • Capitalization on demand. The Denodo Platform provides data virtualization, with an established basis in the enabling of data abstraction capabilities for joining multistructured data sources from DBMSs, websites, documents and a variety of repositories. Physical data movements are supported via the Denodo Scheduler component, which delivers data from repository to cache, or directly to another repository. Denodo capitalizes on the increasing traction and importance of data virtualization in the overall market for data integration tools.
  • Track record and partner channels. With a recognized track record in data virtualization, Denodo has built a partner network of implementers and joint-marketing vendors, including IBM, Cloudera, Hortonworks, MicroStrategy, Tableau, SAP, MongoDB and Pivotal. A diverse range of software vendors license or bundle Denodo's functionality as part of their products in support of logical abstraction and agility for analytics, big data and operational use cases.
  • Connectivity support and links to related integration capability. The Denodo Platform provides broad connectivity to relational databases, prerelational legacy data, flat files, XML, packaged applications and emergent data types including Hadoop and cloud-based data sources. The Denodo Platform can receive and publish data in a variety of formats and interfaces, including Java Database Connectivity (JDBC), Open Database Connectivity (ODBC), Java Message Service (JMS)-compliant message queues, REST and SOAP Web services, JavaScript Object Notation (JSON), XML, portlets and SharePoint Web parts. It can also support discovery and the use of data services.
Cautions
  • Breadth of coverage. Organizations seeking providers with a breadth of data delivery styles may find Denodo's integrated platform to have limited versatility, relative to competitors with toolsets for diverse data delivery. Customers express a desire for easier administrative manageability and links to related tools for data governance support.
  • Degree of metadata support. Reference customers identify Denodo's metadata management as an area of relative weakness when enabling reusability across a growing range of software tools and use cases. Customers increasingly look for comprehensive functionality and a vision for these requirements, to address the escalating number and variety of datasets and distributed data architectures.
  • Availability of skills and best-practice documentation. Since Denodo has a relatively small customer base, customers express concerns about a lack of adequately skilled implementers in the market. Denodo has addressed this shortcoming with additional system integration partners and training. Reference customers express a desire for improvements in guidance on design architecture and documentation of best practices.

IBM

Based in Armonk, New York, U.S., IBM offers the following data integration products: IBM InfoSphere Information Server Enterprise Edition (including InfoSphere Information Server for Data Integration and InfoSphere Business Information Exchange), InfoSphere Federation Server, InfoSphere Data Replication, InfoSphere Information Server Enterprise Hypervisor Edition and WebSphere Cast Iron Live. IBM's customer base for this product set is estimated to number more than 10,700 organizations.
Strengths
  • Depth and breadth of usage. IBM's data integration tools continue to be deployed for extensive use cases — often those of complex scale, spanning a wide range of projects and involving teams of various sizes.
  • Mind share and capitalization on market demand. IBM continues to gain traction as an enterprise standard for data integration infrastructure, with a strong presence in competitive bids. The linkage of data integration capability with diverse analytics support, and the embedding of IBM DataWorks (for self-service data preparation) in Watson Analytics and in cloud-based data stores such as IBM dashBD, are increasing the synergy of IBM's data integration tools with its broader portfolio.
  • Versatility in enabling information infrastructure and analytics. IBM continues to focus on enabling information infrastructure modernization in its efforts to align data integration with diverse demands for information capabilities (including data quality and governance, support for line-of-business users, big data, integration support in cloud adoptions and MDM). IBM's data integration focus is expanding applicable usage scenarios to business-facing roles by increasing self-service capabilities and deepening the synergies between information infrastructure and analytics use cases, to form integrated toolsets available on a common platform.
Cautions
  • Product support and version upgrades. Customers reported difficulty with version upgrades and migrations. IBM has begun mitigating this through in-place upgrades, where downtime can be avoided, and will continue to mitigate it by converging the timing of various InfoSphere product releases, for better anticipation and alignment of upgrades.
  • Pricing model. Reference customers identify software costs and perceived total cost of ownership (TCO) as barriers to broader adoption. IBM's provision of varied licensing approaches, such as core-, workgroup-, bundle-, subscription- and perpetual-based models, while intended to provide more procurement and pricing choices, has reportedly also confused customers assessing and selecting pricing models.
  • Complexity of integrated use of portfolio. In general, customers expressed difficulty with integrated deployments of IBM's data integration tools alongside other IBM products, such as challenges associated with the integration of IBM InfoSphere DataStage with IBM BigInsights.

Informatica

Based in Redwood City, California, U.S., Informatica offers the following data integration products: Informatica Platform (including PowerCenter, PowerExchange, Data Services, Data Replication, Ultra Messaging, Big Data, B2B Data Exchange and Data Integration Hub), Vibe Data Stream, and Informatica Cloud Integration. Informatica's customer base for this product set is estimated to number more than 5,500 organizations. At the time of writing, Informatica has announced an agreement for it to be acquired and taken into private ownership by a company controlled by the European private equity firm Permira Advisers and the Canada Pension Plan Investment Board. The acquisition awaits regulatory approval and is scheduled to be completed in 3Q15.
Strengths
  • Strength of data integration functionality and synergy with portfolio. Informatica's tools continue to reflect a diverse range of data integration styles, usage scenarios and multiproject deployments. Strong synergies between Informatica's data integration tools and other Informatica technologies encourage usage as an enterprise standard for a data integration infrastructure that links with data quality, MDM, big data, data security and cloud integration technologies. Informatica's emphasis on supporting digital services, the IoT, and related analytics and data security opportunities capitalizes on trends in demand.
  • Broad presence and dedicated focus on, and innovation in, data management and integration. Informatica's mind share in this market is extensive, with the highest frequency of appearances in competitive situations. Informatica's concentration on enabling information capabilities aligns its application- and technology-agnostic offerings with a broad range of established and emerging information infrastructures. Informatica's v10 release, planned for late 2015, advances Informatica's metadata-rich capabilities with Live Data Map, to enable data-driven applications (such as Secure@Souce for tracking and protecting sensitive, private information and Project Sonoma for operationalizing self-service capability).
  • Alignment with evolving trends and business-facing demand. The linking of Informatica's data integration offerings to its self-service data preparation tool facilitates a Microsoft Excel-like interface through which end users can build ETL-type tasks that can be deployed on Informatica Platform. Strong adoption of Informatica's iPaaS aligns well with the growing movement of data integration architectures toward cloud-based and hybrid delivery models. Informatica's v10 release is expected to feature new capabilities that support any type of user, data and mode of deployment.
Cautions
  • Business evolution. The announced acquisition of Informatica generated some uncertainty among prospective and existing customers about the possibility of an impending strategy that could affect Informatica's roadmap and status as a thought-leader. Informatica has told its customers and partners that its commitment to delivering on its roadmap remains unchanged.
  • Cost model. Prospective customers point to difficulty understanding Informatica's licensing and pricing methods. Existing customers often express concerns about high costs relative to alternatives in this market. Informatica has begun to address some of these concerns by introducing simpler product packaging and pricing, by consolidating multiple add-on products.
  • Clarity of product messaging and portfolio architecture. Informatica's portfolio has grown large, and customers often express confusion about overlapping products and functionality. They want more intuitive ways to understand and navigate the offerings that Informatica's data integration tools work with. They also want guidance on how to add new products to existing Informatica deployments, and easier integrated usage of components.

Information Builders

Based in New York, New York, U.S., Information Builders offers the following data integration products: iWay Integration Suite (composed of iWay Service Manager and iWay DataMigrator) and iWay Universal Adapter Suite. Information Builders' customer base for this product set is estimated to number more than 800 organizations.
Strengths
  • Robust functionality and broad usage. Information Builders' data integration tools support a diverse and balanced set of use cases, for which the core functionality remains robust and reliable. The vendor's capabilities in adapters and connectivity, comprehensive data transformation and encapsulating data into real-time message flows are regarded as key strengths in deployments.
  • Synergy of data integration tools with enterprise information capabilities: Information Builders continues to focus on evolving an integrated environment for data integration capability that can operate with enterprise service bus and master data management functions. This aligns well with demand for support of data integration activities, so that competency teams can seamlessly implement integration, process management, data governance and analytics in a synergistic way.
  • Customer relationship. Reference customers report a positive overall experience with Information Builders, both before buying and after implementation. Selection of this vendor's data integration tools is often influenced by an existing relationship and use of other Information Builders products.
Cautions
  • Mind share with business leaders and influencers. Information Builders appeals mainly to technical communities and IT buyers, but it has relatively low mind share with business management and process leaders, who increasingly influence the adoption of information capabilities. This creates a market visibility challenge at a time when major competitors are engaging more with those roles.
  • Adoption scale and learning experience: Implementations of Information Builders' products by enterprises show an increase in departmental-level and narrower deployments. Many customers identify challenges with product complexity, a long learning curve and limited availability of skilled practitioners.
  • Product documentation and time-to-value. Reference customers have stated they want to see more improvements to Information Builders' documentation of products and best practices. Customers seek more extensive documentation of technical components to enable consistency of developer practices and faster time-to-value in implementations.

Microsoft

Based in Redmond, Washington, U.S., Microsoft offers data integration capabilities via SQL Server Integration Services (SSIS), which is included in the SQL Server DBMS license. Vast worldwide deployments of Microsoft SQL Server involve usage of SSIS for data integration, although Microsoft does not report a specific customer count for SSIS.
Strengths
  • Relevant capabilities and TCO. Reference customers cite overall low TCO, speed of implementation, ease of use, and the ability to integrate with other Microsoft SQL Server capabilities as the main reasons for choosing SSIS over alternatives.
  • Alignment with data management and process- and user-oriented integration: SSIS supports connectivity to diverse data types and broad deployment in Microsoft-centric environments. SSIS is often used to put data into SQL Server to enable analytics, data management and end-user data manipulation using Microsoft Office tools, particularly Excel. Using SSIS in conjunction with Microsoft's BizTalk and Azure Data Factory platforms enables delivery of data from business workflows in enterprise applications for user-configured integration flows.
  • Widespread tool presence and usage experience. Broad familiarity with the implementation of Microsoft technologies spurs usage of SSIS. Wide choices in terms of community collaboration, training, and third-party documentation and guidance for deployment practices are reported as key points of value.
Cautions
  • Integration of portfolio. Reference customers cite difficulties with integrated implementation of Microsoft's offerings across its portfolio as they address the growing scale and complexity of deployment scenarios for data integration activities.
  • Platform support. The inability to deploy data integration workloads on non-Windows environments is a limitation for customers wishing to draw on the processing power of diverse hardware and operating system platforms.
  • Linkage to deployments of information infrastructure. Reference customers cited a desire for more extensive big data support when manipulating and delivering data of interest, and for more guidance to enable data quality and governance in relation to data integration activities. These challenges relate to the growing complexity of, and demand for, information capabilities. Microsoft is progressively enhancing its big data support with links to machine learning and streaming analytics, and envisaging capabilities for data hub enablement.

Oracle

Based in Redwood Shores, California, U.S., Oracle offers the following data integration products: Oracle Data Integrator (ODI), Oracle GoldenGate and Oracle Data Service Integrator. Oracle's customer base for this product set is estimated to number more than 10,000 organizations.
Strengths
  • Broad usage and applicability. Oracle's data integration tool deployments reflect a mix of use cases and balanced market traction for ELT capabilities and real-time-oriented CDC and replication support. Oracle has extended its big data support to enable ingestion of streaming data by ODI workflows that can be deployed in Apache Spark and Pig environments. To capitalize further on big data and streaming integration scenarios, Oracle is expanding its product development competencies to focus on machine learning in modeling and design processes.
  • Synergies with portfolio's broad range of technologies. Recognition of Oracle's diverse portfolio for addressing data integration and other data and application-oriented requirements (spanning data quality tools, MDM solutions, ESB, analytic appliances and enterprise applications) continues to fuel its appeal in deployment scenarios.
  • Brand awareness and market presence. Oracle's size and global coverage of applications and analytics solutions enables it to draw on a huge customer base and a wide product distribution model for positioning data integration tools. Broad usage of Oracle's technologies within its customer base has driven wide availability of community support, training and third-party documentation on implementation practices and approaches to problem resolution.
Cautions
  • Functional fulfillment. Although perceptions of Oracle's evolution of its data integration tools are generally positive, product-related customer satisfaction has declined in relation to developers' productivity with newer versions, overall ease of use and time-to-value. Customers want easier deployment of source and target changes, simpler monitoring across platforms, and more control over concurrency and queues.
  • Customer experience. Customers point to challenges in terms of version upgrades, bugs in new releases, responsiveness and the quality of product support. Customers of Oracle's data integration tools identify challenges with the processes for obtaining product support, especially in urgent cases.
  • Pricing. Concerns about prices, target and source-based licensing requirements, and perceived hardware-oriented cost challenges as deployments broaden have generated dissatisfaction among customers.

SAP

Based in Walldorf, Germany, SAP offers the following data integration products: SAP Data Services, SAP Replication Server, SAP Landscape Transformation Replication Server, SAP Process Orchestration, SAP Hana Cloud Integration, SAP Hana Enterprise Information Management (EIM, including SAP Hana Smart Data Integration and SAP Hana Smart Data Quality), SAP Agile Data Preparation and SAP PowerDesigner. SAP's customer base for this product set is estimated to number more than 15,000 organizations.
Strengths
  • Broad usage and functionality. The breadth of functionality available across SAP's portfolio supports a diverse mix of data integration styles and use cases of increasing complexity. Usage supports synergistic deployments with SAP's broad application and information infrastructure offerings. Newly released SAP Hana EIM capabilities in SAP Hana Smart Data Integration and SAP Hana Smart Data Quality include built-in data integration adapters, as well a software development kit, which enhances the construction of data access and integration flows of variable latency involving on-premises and cloud-based data, in-memory data stores, Apache Spark and NoSQL environments.
  • Alignment with business-facing demand. Drawing on the linkage of data integration with information stewardship, alongside delivery of self-service data preparation functionality, SAP is making collaboration easier between business users and data integration practitioners. The launch of SAP Agile Data Preparation, with its user-facing functionality, enables business roles to access data sources, perform data transformations, and model datasets of interest in support of business scenarios.
  • Market presence and links to related disciplines. Capitalizing on its brand recognition, global reach and vast customer base in related disciplines, SAP maintains a high share of the market's data integration tool adoption. Enterprises with an incumbent portfolio of SAP products naturally look to the same vendor to provide their data integration technology.
Cautions
  • Roadmap alignment and market messaging. There are concerns among customers about roadmaps, where the capabilities of SAP's agnostic data integration tools and native Hana products appear to overlap. Concerns about SAP's offerings becoming tightly linked to Hana have given rise to a perception that SAP is placing less emphasis on addressing the needs of non-SAP environments (for timely releases of heterogeneous data connectivity, for example). However, recent product releases and published roadmaps from SAP show continued development of heterogeneous features in its agnostic data integration tools.
  • Support for metadata. Although SAP offers extensive metadata and modeling functionality for data integration activities through SAP PowerDesigner, some reference customers are unaware of these capabilities and require help to address the growing scale and diversity of data integration scenarios that are making metadata management and modeling more complex in information infrastructure environments.
  • Customer support, service experience and skills. Reference customers' feedback indicates concerns about the overall customer experience. They want better guidance and support for best practices to ease the learning curve, wider availability of high-quality professional services, and shorter time-to-value for deployments.

SAS

Based in Cary, North Carolina, U.S., SAS offers the following data integration products: Data Management Platform, Federation Server, SAS/Access, SAS Data Loader for Hadoop and SAS Event Stream Processing. SAS's customer base for this product set is estimated to number 14,000 organizations.
Strengths
  • Broad and integrated portfolio. The breadth and completeness of core functions and the integration of components position SAS to compete with larger and more established vendors in the data integration market. SAS's newly introduced Data Loader for Hadoop provides a guided user interface to facilitate data loading and data preparation (profiling, cleansing and transforming data), one that capitalizes on demand in the market.
  • Customer relationship. Reference customers report that their relationship with SAS, both before purchasing and after implementation, is exceptional. This contributes to longer-term, recurring engagements.
  • Product reliability and stability. Reference customers praised SAS's products for stability, reliability, robustness and effectiveness. These qualities, along with synergistic capabilities across portfolio, establish SAS's data integration technology as dependable and mature.
Cautions
  • Cost and usage. Reference customers expressed concerns about high prices and a licensing model that they perceive as limiting their ability to expand deployments. SAS's data integration tool exhibits a dominant emphasis on analytics scenarios, which reflects narrower versatility compared with leading competitors in this market.
  • Availability of deployment skills. Reference customers expressed a desire for greater availability of resources who possess a deep knowledge of SAS tools outside its own professional services business, to give them wider procurement and cost options.
  • Metadata support and ease of deployment. Some reference customers indicate requirements for more extensive metadata support when using SAS tools for data integration. However, recent enhancements provide capabilities that some customers may not have taken advantage of; these include discovering, integrating and facilitating the reuse of metadata both within and external to SAS technologies. Customers identify difficulties, and display reduced satisfaction, with tool setup and product version upgrades and migrations.

Syncsort

Based in Woodcliff Lake, New Jersey, U.S., Syncsort offers DMX (for Linux, Unix and Windows) and DMX-h (for Hadoop). Syncsort's customer base for this product set is estimated to number 1,500 organizations.
Strengths
  • Performance of core functionality and time-to-value. Syncsort continues to provide high-performance bulk/batch data movement capabilities with faster time-to-value than many competitors. These strengths continue to fulfill requirements for targeted functionality and superior performance and throughput.
  • Capitalization on big data initiatives. Syncsort is widening its data integration focus to work with diverse parts of the Hadoop ecosystem, interact with streaming data, and support external parallelized processing in offloading heavy legacy-infrastructure-related ETL or ELT workloads from data warehouses and mainframes to Hadoop. Using its "Intelligent Execution" framework, Syncsort sets out to insulate users from the underlying complexities of Hadoop, enable flexible deployment to diverse platforms, and support on-premises or cloud-based deployments.
  • Customer relationship and track record. Syncsort offers a high quality of service and support, and many customers identify its technical support and their overall relationship with Syncsort as positives. With an established track record of optimizing ETL processing, a loyal customer base and strategic partners (including Amazon, Cloudera, Cognizant, Dell, Fujitsu, Hortonworks, MapR, Qlik, Splunk, Tableau and Waterline Data), Syncsort has a solid foundation on which to grow its market presence.
Cautions
  • Functional coverage and usage. Implementations of Syncsort's capabilities predominantly center on bulk/batch data movement, which poses challenges in competitive situations that require a broad range of data integration styles. However, links between Syncsort's tools and Apache Kafka and Storm are starting to support message-oriented data delivery.
  • Support for metadata and data quality. While Syncsort is making efforts to extend its metadata capabilities, such as by using Apache HCatalog, reference customers cite metadata management as an area requiring improvements in terms of the discovery of metadata in broad context, ease of access, and reuse in data integration processes. Customers express a desire for linkages to data quality capabilities in synergy with data integration tool usage.
  • Availability of skills and evolving cost model. There is a growing desire for greater availability of resources with a deep knowledge of Syncsort's tools to facilitate wider access to skills and more cost options. Cost-sensitivity is beginning to surface in broadening deployments.

Talend

Based in Redwood City, California, U.S., Talend offers Open Studio for Data Integration, Enterprise Data Integration, Platform for Data Services, Platform for Big Data and Integration Cloud. Talend's paying customer base for this product portfolio is estimated to number more than 3,600 organizations.
Strengths
  • Portfolio relevance and cost model. Reference customers appreciate the solid performance of Talend's functionality, its support of diverse use cases, and the lower TCO of Talend's technology, relative to competitors. Talend's free open-source offering and affordable developer-based pricing for fully featured software appeal to customers and frequently attract usage for augmenting data integration capabilities.
  • Commitment to big data and evolving trends. Talend continues to benefit from an early commitment to big data and Hadoop, with new customer adoption and technology advancements such as in-memory processing (with Apache Spark) and the enabling of real-time scenarios. Momentum to support big data, combined with a new iPaaS offering and plans for self-service data preparation capability (using data virtualization and iPaaS) in 1Q16, position Talend to expand its market reach.
  • Adaptable capabilities in a unified product set. Talend's portfolio, including data quality, MDM, business process management, an ESB, and a recently added metadata management tool, sets out to deepen synergies across information- and application infrastructure-related use cases. Customers value the configurability of Talend's tools, which makes them flexible enough to adapt to the business requirements of data integration processes and the availability of artifacts built by Talend's practitioner community.
Cautions
  • Breadth of experience with all data delivery styles and resourcing. While Talend's capabilities resonate well in bulk/batch-oriented data delivery needs, the company needs to increase awareness of its support for other data integration styles. Perceived limitations in terms of access to skilled resources, integration with incumbent technical environments and standards, and enterprisewide deployments were expressed by prospective customers.
  • Implementation guidance and time-to-value. Increased adoption of Talend's offerings is generating dissatisfaction with regard to the availability of usage references and best-practice implementation guidance. Deployments exhibit a long time-to-value, compared with major alternatives in this market. Customers desire improvements in technical support and documentation to ease version upgrades and migrations, tool usage, monitoring and administration. Talend is making significant investments in this area.
  • Product and market messaging. Some existing and prospective customers, particularly organizations considering putting Talend's portfolio to enterprisewide use, indicate that Talend does not adequately articulate the more evolved capabilities of its products or their synergistic uses.

Vendors Added and Dropped

We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor's appearance in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may be a reflection of a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor.

Added

  • Denodo.

Dropped

  • None, but Cisco (Composite Software) now appears as Cisco.

Inclusion and Exclusion Criteria

To be included in this Magic Quadrant, vendors must possess within their technology portfolio the subset of capabilities identified by Gartner as the most critical from within the overall range of capabilities expected of data integration tools. Specifically, vendors must deliver the following functional requirements:
  • Range of connectivity/adapter support (sources and targets) — Native access to relational DBMS products, plus access to nonrelational legacy data structures, flat files, XML and message queues
  • Mode of connectivity/adapter support (against a range of sources and targets) — Bulk/batch and CDC
  • Data delivery modes support — At least two modes among bulk/batch data movement, federated/virtualized views, message-oriented delivery, and data replication and synchronization
  • Data transformation support — At a minimum, packaged capabilities for basic transformations (such as data type conversions, string manipulations and calculations)
  • Metadata and data modeling support — Automated metadata discovery, lineage and impact analysis reporting, ability to synchronize metadata across multiple instances of the tool, and an open metadata repository, including mechanisms for bidirectional sharing of metadata with other tools
  • Design and development support — Graphical design/development environment and team development capabilities (such as version control and collaboration)
  • Data governance support — Ability to interoperate at a metadata level with data profiling and/or data quality tools
  • Runtime platform support — Windows, Unix or Linux operating systems
  • Service enablement — Ability to deploy functionality as services conforming to SOA principles
In addition, vendors had to satisfy the following quantitative requirements regarding their market penetration and customer base:
  • They must generate at least $20 million of their annual software revenue from data integration tools, or maintain at least 300 maintenance-paying customers for their data integration tools.
  • They must support data integration tool customers in at least two of the major geographic regions (North America, Latin America, Europe, the Middle East and Africa, and Asia/Pacific).
We excluded vendors that focus on only one specific data subject area (for example, the integration of customer data), a single industry, or only their own data models and architectures.
There are many vendors of data integration tools that do not meet the above criteria and are therefore not included in this Magic Quadrant. For example, many vendors provide products to address one very specific style of data delivery (such as data federation/virtualization) and cannot support other styles. Others provide a range of functionality, but operate only in a specific technical environment. Still others operate only in a single region or support only narrow, departmental implementations. Some vendors meet all the functional, deployment and geographic requirements, but are very new to the data integration tool market and therefore have limited revenue and few production customers.

Evaluation Criteria

Ability to Execute

Gartner analysts evaluate technology providers on the quality and efficacy of the processes, systems, methods or procedures that enable IT providers' performance to be competitive, efficient and effective, and to positively affect revenue, retention and reputation. Ultimately, technology providers are judged on their ability to capitalize on their vision and their success in doing so.
We evaluate vendors' Ability to Execute in the data integration tool market using the following criteria:
  • Product/Service. How well the vendor supports the range of distinguishing data integration functionalities required by the market, the manner (architecture) in which this functionality is delivered, support for established and emerging deployment models, and the overall usability and consumption of the tools. Product capabilities are critical to the success of data integration tool deployments and, therefore, receive a high weighting.
  • Overall Viability. The magnitude of the vendor's financial resources and the continuity of its people and technology, which affect the practical success of the business unit or organization in generating business results.
  • Sales Execution/Pricing. The effectiveness of the vendor's pricing model in light of current customer demand trends and spending patterns, and the effectiveness of its direct and indirect sales channels. This criterion is weighted high to reflect the major emphasis of buyers on cost models and ROI, and the criticality of consistent sales execution in order to drive a vendor's growth and customer retention.
  • Market Responsiveness/Record. The degree to which the vendor has demonstrated the ability to respond successfully to market demand for data integration capabilities over an extended period, and how well the vendor has acted on the vision of prior years.
  • Marketing Execution. The overall effectiveness of the vendor's marketing efforts, which impacts its mind share, market share and account penetration. The ability of the vendor to adapt to changing demands in the market by aligning its product message with new trends and end-user interests.
  • Customer Experience. The level of satisfaction expressed by customers with the vendor's product support and professional services; their overall relationship with the vendor; and their perceptions of the value of the vendor's data integration tools relative to costs and expectations. This criterion retains a weighting of "high" to reflect buyers' scrutiny of these considerations as they seek to derive optimal value from their investments. Analysis and rating of vendors against this criterion are driven directly by the results of a customer survey executed as part of the Magic Quadrant process.
Table 1. Ability to Execute Evaluation Criteria
Evaluation Criteria
Weighting
Product/Service
High
Overall Viability
Medium
Sales Execution/Pricing
High
Market Responsiveness/Record
Medium
Marketing Execution
Medium
Customer Experience
High
Operations
Not Rated
Source: Gartner (July 2015)

Completeness of Vision

Gartner analysts evaluate technology providers on their ability to convincingly articulate logical statements about current and future market direction, innovation, customer needs and competitive forces, as well as how they map to Gartner's position. Ultimately, technology providers are assessed on their understanding of the ways that market forces can be exploited to create opportunities.
We assess vendors' Completeness of Vision for the data integration tool market using the following criteria:
  • Market Understanding. The degree to which the vendor leads the market in recognizing opportunities represented by trends and new directions (technology, product, services or otherwise), and its ability to adapt to significant market inertia and disruption, including the degree to which the vendor is aligned with the significant trend for synergy with data management and application integration technologies. Given the dynamic nature of this market, this item receives a weighting of "high."
  • Marketing Strategy. The degree to which the vendor's marketing approach aligns with and/or exploits emerging trends and the overall direction of the market.
  • Sales Strategy. The alignment of the vendor's sales model with the ways in which customers' preferred buying approaches will evolve over time.
  • Offering (Product) Strategy. The degree to which the vendor's product roadmap reflects demand trends in the market, fills current gaps or weaknesses, and includes developments that create competitive differentiation and increased value for customers. In addition, given the requirement for data integration tools to support diverse environments for data, delivery models, and platform mix, we assess vendors on the degree of openness of their technology and product strategy. Given the intense evolution of both technology and deployment models in this market, this criterion receives a weighting of "high."
  • Business Model. The overall approach the vendor takes to execute its strategy for the data integration tool market, including diversity of delivery models, packaging and pricing options, and partnership.
  • Vertical/Industry Strategy. The degree of emphasis the vendor places on vertical solutions, and the vendor's depth of vertical-market expertise.
  • Innovation. The degree to which the vendor demonstrates creative energy by enhancing its practices and product capabilities, as well as introducing thought-leading and differentiating ideas and product plans that have the potential to significantly extend or reshape the market in a way that adds real value for customers. Given the pace of expansion of data integration requirements and the highly competitive nature of the market, this criterion receives a weighting of "high."
  • Geographic Strategy. The vendor's strategy for expanding its reach into markets beyond its home region/country, and its approach to achieving a global presence (for example, its direct local presence and use of resellers and distributors).
Table 2. Completeness of Vision Evaluation Criteria
Evaluation Criteria
Weighting
Market Understanding
High
Marketing Strategy
Medium
Sales Strategy
Medium
Offering (Product) Strategy
High
Business Model
Medium
Vertical/Industry Strategy
Low
Innovation
High
Geographic Strategy
Medium
Source: Gartner (July 2015)

Quadrant Descriptions

Leaders

Leaders in the data integration tool market are front-runners in the convergence of single-purpose tools into an offering that supports a full range of data delivery styles. They exhibit a clear understanding and vision of where the market is headed, and are strong in establishing data integration infrastructure as an enterprise standard and as a critical component of modern information infrastructure. They support both traditional and new data integration patterns to capitalize on market demand. Leaders have significant mind share in the market, and resources skilled in their tools are readily available. These vendors establish market trends (to a large degree) by providing new functional capabilities in their products, and by identifying new types of business problem to which data integration tools can bring significant value. Examples of deployments that span multiple projects and types of use case are common among Leaders' customers. Leaders have an established market presence, significant size and a multinational presence (directly or through a parent company).

Challengers

Challengers are well-positioned in light of the key trends in the data integration tool market, such as the need to support multiple styles of data delivery. However, they may not provide comprehensive breadth of functionality, or may be limited to specific technical environments or application domains. In addition, their vision may be hampered by a lack of coordinated strategy across the various products in their data integration tool portfolio. Challengers generally have substantial customer bases, an established presence, credibility and viability, although implementations may be of a single-project nature, or reflect multiple projects of a single type (for example, predominantly ETL-oriented use cases).

Visionaries

Visionaries demonstrate a strong understanding of emerging technology and business trends, or a position well-aligned with current demand, but they lack market awareness or credibility beyond their customer base or a single application domain. Visionaries may also fail to provide a comprehensive set of product capabilities. They may be new entrants lacking the installed base and global presence of larger vendors, although they could also be large, established players in related markets that have only recently placed an emphasis on data integration tools. The growing emphasis on aligning data integration tools with the market's demand for interoperability of delivery styles, integrated deployment of related offerings (such as data integration and data quality tools), metadata modeling, support for emerging information and application infrastructures, and deployment models (among other things), is creating challenges for which vendors must demonstrate vision.

Niche Players

Niche Players have gaps in both their Completeness of Vision and Ability to Execute. They often lack key aspects of product functionality and/or exhibit a narrow focus on their own architectures and installed bases. Niche Players may have good functional breadth but a limited presence and mind share in this market. With a small customer base and limited resources, they are not recognized as proven providers of comprehensive data integration tools for enterprise-class deployments. Many Niche Players have very strong offerings for a specific range of data integration problems (for example, a particular set of technical environments or application domains) and deliver substantial value for their customers in the associated segment.

Context

Data integration is central to enterprises' information infrastructure. Enterprises pursuing frictionless sharing of data are increasingly favoring tools that are flexible in regard to time-to-value demands, integration patterns, optimization for cost and delivery models, and synergies with information and application infrastructures.
Digital business will intensify data integration challenges. Use cases for generating more business value from an enterprise's information will accelerate the need to connect information across distributed data sources in far more diverse ways than has been the case with the traditional movement of bulk data. New types of data are emerging with the rise of digital businesses, and integration leaders now have to factor these into their data integration strategies. Enabling an integrated, digital business will add further complexity to an organization's data integration strategy by requiring a mix of latencies and patterns, as well as hybrid deployments using on-premises and cloud-based models.
Pressures grow in this market as vendors are challenged to address demand trends for innovation with the ability to enhance traditional practices and introduce new models and practices.
Business imperatives to confront new information challenges are driving the need for a realignment of technology vision in this market. Demand trends in 2015 require vendors to increase their flexibility in approaching comprehensive data integration needs, and to demonstrate a balanced alignment to time-to-value, breadth of data integration functionality, diverse use cases, and quality customer experience. Buyers increasingly favor tool characteristics that exhibit end-user relevance, flexibility in cost and delivery models, and synergy with information and application infrastructure initiatives.

Market Overview

Enterprises' need to improve the flexibility of their information infrastructure is intensifying their focus on data integration activities. More information and application managers are realizing that data integration is a critical aspect of their overall enterprise information management (EIM) strategy and information infrastructure. They understand that they need to employ data integration capabilities to share data across all organizational and system boundaries.
Gartner estimates that the data integration tool market was worth approximately $2.4 billion in constant currency at the end of 2014, an increase of 6.9% from 2013. The growth rate is above the average for the enterprise software market as a whole, as data integration capability continues to be considered of critical importance for addressing the diversity of problems and emerging requirements. A projected five-year compound annual growth rate of approximately 7.7% will bring the total to more than $3.4 billion by 2019 (see "Forecast: Enterprise Software Markets, Worldwide, 2012-2019, 2Q15 Update").
Vendors' pursuit of a more comprehensive offering strategy — to support a broad range of use cases and capitalize on new demand — continues to shape this market's competitive landscape. Offerings that help equip enterprises with data integration capability, independent of applications, processes or technology platforms, do well in this market. Competitive pressures are intensifying the focus on technologies that support varying styles of data integration beyond bulk/batch, tightened links to data quality tools, and progression toward a model-driven approach that uses common metadata across the tool portfolio. Evolving their relevance and competitive positioning requires vendors to extend their vision, deepen their capabilities and broaden the applicability of their data integration offerings. This is in line with buyers' expectations for optimal functionality, performance and scalability in data integration tools, to ensure they work well with the same vendor's technology stack and, increasingly, interoperate across related information and application infrastructures.
The following trends reflect a shift in demand from buyers, as well as areas of opportunity for technology providers to provide thought leadership and innovation to extend this market's boundaries:
  • Growing interest in business moments and recognition of the required speed of digital business. In the context of digital business, "business moments"— opportunities of short duration or a point in time that sets in motion a series of events involving people, business and things — are increasingly attracting the attention of enterprises. They want to harness data to seize these moments, which will require data integration support. Data integration functionality provided in a "sandbox" to support analytics is of growing interest; this approach enables data to be delivered and manipulated in a physical or virtual manner, for ingestion regardless of where it resides; it also encourages experimentation with, and the building of, new models with which to use data of interest. As pressures for real-time data integration grow, organizations will need to manage a range of data latencies to make data available for use within acceptable service levels and to match the required speed of business.
  • Intensifying pressure for enterprises to modernize and enlarge their data integration strategy. Data integration architecture that predominantly uses a single style and form — for example, batch-oriented, bulk data extract and delivery (accomplished via ETL techniques) — falls short in enterprises that face overwhelming pressure to support real-time operations and those that require flexible latencies. Data integration tool deployments are emphasizing the need to support multiple modes of data delivery, including traditional batch/bulk-oriented data movement, creation of in-memory federated views of data, and low-latency capture and propagation of events and changed data. Organizations are increasingly driven to position data integration as a strategic discipline at the heart of their information infrastructure — to ensure it is equipped for comprehensive data capture and delivery, linked to metadata management and data governance support, and applicable to diverse use cases. In addition, implementations need to support multiple types of user experience via tool interfaces that appeal not only to technical practitioners but also to people in business-facing roles, such as business analysts and end users. Offerings that promote collaboration between business and IT participants are becoming important as organizations seek adaptive approaches to achieving data integration capabilities.
  • Requirements to balance cost-effectiveness, incremental functionality, time-to-value and growing interest in self-service. Organizations' continued scrutiny of their investments and optimization of costs is resulting in aggressive behavior on the part of buyers when negotiating prices with vendors. More organizations are looking for solid basic capabilities that are "good enough," that can be deployed rapidly and that are offered at attractive prices. Some buyers, furthermore, are taking a targeted approach by acquiring only what they need now, while planning for future data integration needs — they don't procure all the capabilities they want at once. Nor are buyers necessarily looking for a single product or a single vendor-specific platform to accomplish everything. Vendors have responded to this development in various ways, such as by varying their pricing structures and deployment options (open-source, cloud and hybrid models), and extending support for end-user functions so that they work with targeted data of interest, especially when requirements aren't well-defined. Demand from business-facing buyers is also prompting vendors to add functionality that supports self-service data integration.
  • Expectations for high-quality customer support and services. Faced with a need to optimize staffing and budgets, as well as mounting pressure for faster and higher-quality delivery of solutions, buyers are demanding superior customer service and support from technology providers. In addition to highly responsive and high-quality technical support for products, they want direct and frequent interactions with sales teams and executives. Buyers also want wide availability of relevant skills — both within a provider's installed base and among system integrator partners — and forums where they can share experiences, lessons and solutions with their peers.
  • Increasing traction of extensive use cases. Usage of data integration tools continues to expand beyond analytics-related scenarios, as many others are now also driving demand. The need to support operational data consistency, data migration and cloud-related integration is prompting more data integration initiatives than before. The architectural approach of the LDW optimizes the repository styles that employ data federation/virtualization capabilities to enable data services and assimilate data involving a variety of integrated datasets. Big-data-related initiatives require the use of opportunistic analytics and the exploration of answers to less-well-formed or unexpected business questions. The distribution of required computing workloads to parallelized processes in Hadoop and alternative NoSQL repositories will continue to advance the ability of data integration tools to interact with big data sources and to deliver data to, and execute integration tasks in, platforms associated with big data environments.
  • Extension of integration architectures through a combination of cloud and on-premises deployments. A hybrid approach to data integration is growing in popularity because it provides the ability to execute data integration in both cloud and on-premises environments, as appropriate. It enables enterprises to interchange, reuse and deploy artifacts as needed across both environments. Adoption of this approach is increasing in the wake of the "cloud first" focus of some digital business strategies, which emphasizes the use of "lightweight" technologies that are user-oriented and adaptable to change. Customers are looking to gain business agility by, for example, using iPaaS as an extension of their data integration infrastructure to manage cloud-related data delivery and address the growing need for data sharing in cloud scenarios.
  • Need for alignment with application and information infrastructure. More organizations are selecting data integration tools that provide tight links to data quality tools, to support critical information management and governance initiatives. As MDM programs increase in number and scope, so organizations seek to apply their investments in data integration technology to those initiatives, to enable the movement, transformation and federation of master data. In addition, many organizations are beginning to pursue data integration and application integration in a synergistic way, to exploit the intersection of the two disciplines. Aligned application integration and data integration infrastructure, deployed for the full spectrum of customer-facing interactions and a broad range of operational flows, gradually optimizes costs and shared competencies, as compared with the pursuit of disparate approaches to similar or common use cases (see "Five Reasons to Begin Converging Application and Data Integration"). The expansion of vendors' capabilities into application integration provides opportunities to use tools that exploit common areas of both technologies to deliver shared benefits, such as use of CDC tooling that publishes captured changes into message queues.

PRTG digunakan untuk monitoring MSP (Manage Service Provider)

$
0
0


PRTG Network Monitor's MSP Advantages at a Glance

  • Remote probes enable you to monitor multiple distributed customer networks with one license of PRTG
  • PRTG is MSP-ready, no special licenses or partnership required
  • Personalize the webinterface your customers see or add your own extensions
  • Included roles and rights based user management for a credential based customer access.
  • Cost efficient and attractive ”Pay as you grow” business model
  • Offer your customers monitoring as an additional service to increase your revenue
  • Ease of use for you and your customer
  • Increase your customer retention and be the expert for their entire network
msp-partner.png

FAQ

I want to use PRTG as an MSP solution. What do I need to do?

Is there a special MSP license needed?
Each license of PRTG Network Monitor (exception: Terms Section B §3 1d) comes with the entire functionality for use as MSP solution. PRTG is MSP-ready - 'out-of-the-box'.
Do you have a MSP partner program and do we have to sign a special agreement?
No, we do not have a special MSP partner program but in order to use PRTG as your managed service solution please make sure to place the PRTG Network Monitor MSP logo on your website.
(please contact partners@paessler.com)
How can I offer the service?
PRTG Network Monitor can be run as a credential-based system. Depending on your customer's needs you can define different access rights: either give them full access to their sensors and groups so they can manage their monitoring on their own or you just give them read-only access so that they can see their own monitoring data but not change any settings. Another option is to publish the monitoring results in a map on a website (e.g. in the customer's intranet).

What MSP licenses are available and what options do I have?

Each license of PRTG Network Monitor comes with the entire functionality for the use as MSP solution. You are free to use all licenses up to PRTG 5000 for offering Monitoring services to your customers without any additional costs. Only the Unlimited and Corporate licenses are not allowed for MSP usage.

How can I monitor my customers’ networks?

There are two possible scenarios:
First scenario: You install the core server at your site. In this case the license has to be registered to your company name, the customer's sites are monitored via remote probes. This allows you to monitor different customers at the same time with one single license/core server installation of PRTG.
Second scenario: You install the core server at your customer's site. However, the license has to be registered to the customer and only this customer can be monitored with this PRTG license.
Either way, you can specify different access rights. Please find some more useful background information below:
Remote probes
So called remote probes enable you to monitor locally distributed customer networks with one central installation of PRTG Network Monitor. The probes gather monitoring data from your customer's network and transfer these data to the core installation at your server.
Notifications
If anything occurs in your customer's networks, you can be notified via various alarm methods (e.g. SMS, Email, Pager) to react quickly. This alert can be sent to your customer, too. Also, escalation levels can be defined such as an email alert to your customer as a first step and then a SMS to you/your staff if the problem has not been solved within a certain amount of time. For detailed information please see this link.
Reports
You can also create regular reports for your customers, containing statistics of events, outages, uptime etc. Please see the reporting section for further information.

How can I customize PRTG?

You may want to use your own logos and/or colors for the web interface of your PRTG installation to fit better into your company's corporate design. Rebranding the web interface and adding custom CSS, HTML or javascript code is supported by the PRTG API which can be found in your PRTG installation ("Website Styling" tab in "Setup | PRTG API")
For detailed information have a look at our knowledge base:

Are there any special MSP terms I have to consider?

The PRTG Network Monitor Unlimited and Corporate licenses may not be used for MSP purposes. See details at our terms and conditions, §3, 1d.
All other licenses up to PRTG 5000 can be used as a MSP solution.

Kemampuan Analitik ServiceDesk Plus dengan Zoho Reports

$
0
0


ManageEngine ServiceDesk Plus Advanced Analytics Add-on


Introduction

The Zoho Reports Advanced Analytics Add-on for ManageEngine ServiceDesk Plus enables you to easily analyze your ServiceDesk Plus (SDP) data. Its intuitive drag-and-drop interface allows you to quickly create insightful reports and dashboards. ITIL/ITSM managers can 'slice and dice' their service desk data the way they want, analyze key service metrics and take informed business decisions to optimize their business operation.

General

1. What is Zoho Reports?
2. What is the Zoho Reports Advanced Analytics/Reporting add-on for SDP and how does it work?
3. Who can setup/subscribe to this Zoho Reports add-on?
4. What do I get / What is the value add I get, when I subscribe to this add-on?
5. How does the Zoho Reports add-on for SDP work?
6. What are the default reports & dashboards created by Zoho Reports, on setting up this add-on?
7. How secure is Zoho Reports to store my SDP Data?
8. Will sensitive information from SDP uploaded into Zoho Reports?

Pricing

1. How much does this add-on cost?
2. Do you provide trial evaluation for this add-on?
3. What do you mean by 'Users' in the (add-on) pricing plan?
4. What do you mean by 'Rows' and how is it calculated in the pricing plan?
5. How do I purchase a paid plan in Zoho Reports?

​Setup

1. How do I setup the Zoho Reports Add-on in my SDP account?
2. I have setup the Advanced Analytics add-on but not seeing my SDP data in my Zoho Reports account. What's happening? [or] How long should I wait for my SDP data to initially appear in Zoho Reports?
3. I got this email which said 'Setup Process Failed'/'Synchronization Process Failed'. What should I do?
4. What are the default fields that will be synchronized in Zoho Reports reporting database?
5. Can I add custom columns or new fields?
6. Can I edit the SDP-Zoho Reports synchronization setting?
7. Can I synchronize the SDP-Zoho Reports data instantly?
8. How do I access the reports created in Zoho Reports?
9. How to create my own reports with this add-on?
10. Who has access to the reports I create?
11. What are the modules in SDP on which I could create reports using this add-on?
12. Will other modules in SDP be supported, for report creation through this add-on & When?
13. On whose account will the Zoho Reports add-on be setup?
14. Can I transfer my Zoho Reports add-on to another admin account?​

Reporting Features

1. What are the report types supported by Zoho Reports?
2. What are the default reports & dashboards created by Zoho Reports, on setting up this add-on?
3. Can I modify the default reports that have been created by the Zoho Reports add-on? If so, how?
4. How do I create reports using Zoho Reports with this add-on? [or] What are the reports that I can possibly make using this add-on?
5. How do I create reports using fields/columns across different tables (example Requests & Tasks etc)?
6. What are 'Formulas' in reports?
7. What are the default formulas added by Zoho Reports, on setting up this add-on?
8. How do I create my own custom formulas in Zoho Reports?
9. Can I add/modify SDP data from within Zoho Reports?
10. Can I add new columns to the SDP tables data in Zoho Reports?
11. Can I add new data tables in this reporting database to create reports & dashboards? [or] Can I combine data from other sources with the data from SDP to create reports and dashboards?
12. What are Query Tables?​
13. Can I join data from multiple tables to create reports?
14. How do I generate a bookmark URL or permalink for a report or dashboard?

Users, Sharing & Collaboration

1. How do I share the reports in Zoho Reports with my colleagues?
2. Why are other members in my organization not able to access the reports created?
3. How can other members in my organization create reports?
4. What are the user roles available in Zoho Reports?
5. Why can't other users edit the reports that I have shared to them?
6. Can I share the same report created to multiple users with different criteria associated, so that they see different data?
7. How can I print the reports & dashboards created in Zoho Reports?
8. How can I email reports & dashboards created in Zoho Reports in a scheduled manner?
9. Into what file formats can I export the reports & dashboards created in Zoho Reports and how?
10. How do I embed my reports in my intranet, blog or presentation?


Help & Support

1. How do I get technical support on Zoho Reports add-on?
2. Can I have someone from Zoho do a demo of this add-on for me?

General

1. What is Zoho Reports?

Zoho Reports is an on-demand reporting and business intelligence solution that helps you get new insights on your business information through its powerful and flexible online business intelligence engine. You get powerful reports in minutes, with no IT help. It offers the following important capabilities.
  • Complete Online Reporting & Business Intelligence service accessible anytime and anywhere!
  • Easy to adopt 'Spreadsheet-like' interface for data analysis and report creation
  • Powerful drag & drop based reporting features for quick report creation and publishing.
  • Visual Analysis capability for in-depth analysis and to slice & dice your data.
  • Supports Dashboards, Charts, Pivot Tables, Summary and simple Tabular reports
  • Supports data import from variety of file formats including Excel, Open Office, CSV, TSV, HTML, XML and JSON. Data can also be imported from Cloud Storage/Drives (Google Drive, Zoho Docs, Dropbox, Box and OneDrive) and Web URLs. Also supports periodic scheduling of import.
  • Push data from traditional in-house applications, SQL  & NoSQL databases with batch tools or API (application programming interface)
  • Integrated with ManageEngine ServiceDesk Plus (SDP) to provide advanced analytics on data collected from SDP. Similar integrations available for popular business applications like Zoho CRM, Salesforce, Zoho Projects, Zoho Recruit, Zoho BugTracker etc.
  • Supports reports creation by joining data across related data sets. 
  • SQL (Structured Query Language) driven querying is also supported for powerful report creation. 
  • Real-time collaboration by sharing data, reports & dashboards in read or read-write modes with your colleagues. You could also notify reports via email.
  • Email, Export and Print Reports in variety of formats. You can also setup scheduled emailing of reports. 
  • Embed reports within your Websites, Web Applications and Blogs
  • Highly secure through user login with support for HTTPS (SSL connection). All your data and reports are hosted in highly secure datacenters.
  • Web APIs (HTTP based & Zoho CloudSQL) to tightly integrate and interact with your business applications
  • Zero maintenance cost & low cost
Also check out the Video on Zoho Reports Overview 

2. What is the Zoho Reports Advanced Analytics add-on for ManageEngine ServiceDesk Plus (SDP) and how does it work?

The Zoho Reports Advanced Analytics add-on for SDP brings in all the capabilities of Zoho Reports described above, to SDP. It comes with the following features/benefits.
  • A full-featured business intelligence (BI) and reporting tool that can slice & dice your SDP data to create any report/dashboard you require
  • Pre-packaged set of 80+ reports and dashboards that anyone using SDP will find great value in
  • Create your own reports and dashboards based on not only your SDP data but also from any other data source (eg., Excel spreadsheets etc) that you would wish to combine with your SDP data
  • Drag & Drop based reporting & analysis that could be used by any business user. No technical knowledge required. No Scripting/Querying required.  
  • Collaboratively work with your colleagues when creating new reports/dashboards on your SDP data. Easily share & embed the reports you create. 
  • Schedule and email your reports whenever your want
  • Export your reports as PDF, Excel, CSV, JPG etc files to your desktop and print them for offline consumption

3. Who can setup/subscribe to the Zoho Reports add-on?

Customers using any edition of SDP can set up this add-on. Also, you can choose any of the available plans in Zoho Reports, including the Free plan.
This add-on can be set up in ServiceDesk Plus 9.0 build #9028 and above. SDP customers on builds prior to this have to migrate to 9028 by installing the required service pack(s).
For configuring this add-on in your SDP account, you should be the SDP administrator.

4. What do I get / What is the value add I get, when I set up/subscribe to this add-on?

As a SDP user, subscribing to this add-on brings you immense benefits. You get to look at your data in SDP in ways you haven't looked at before. Using this Zoho Reports add-on enables you to do powerful analysis of your SDP data and create insightful reports & dashboards. Like say constructing requests flow  distribution, measure SLA compliance, knowing your requests closing rate, knowing your Top 5 / Bottom 5 technician, predicting how your support load in different regions is going to be in the following months and quarters, and do much more.
Zoho Reports' drag-and-drop based reporting is so easy to use that you could create any report or dashboard on your SDP data with basic technical knowledge and share them to your colleagues. No Scripting or Querying required. 

5. How does the Zoho Reports add-on for SDP work?​

The Zoho Reports Advanced Analytics Add-on for SDP works as below.
  • The SDP 'Administrator' chooses to configure the Zoho Reports add-on from the 'Admin' tab of SDP
  • The SDP Administrator creates an account in Zoho Reports.
  • The SDP administrator maps the Zoho Reports account in SDP (through the Zoho email address and the Zoho AT key), and initializes the sync process
  • The data from SDP will be imported into his/her corresponding Zoho Reports account automatically. Depending on the amount of data in SDP, the initial import can take a few minutes to a few hours
  • Then on, the data will be continuously synched between SDP & Zoho Reports, at times that the administrator has configured
  • Along with the data from SDP, 80+ insightful & hand-picked reports and dashboards are provided by default
  • The SDP administrator can share the reports to other SDP users
  • New ad hoc reports can be created by the users of the add-on
  • Refer to this slide show to know more about how to setup the Zoho Reports add-on.
     

6. What are the default reports & dashboards created by Zoho Reports, on setting up this add-on?

When you setup/configure the Zoho Reports add-on, 80+ default reports/dashboards are automatically created. These hand-picked reports will be pretty useful in analyzing your SDP data effectively. For example, SLA reports, technician reports etc.
You can quickly review the default reports that would be created from the sample reporting database listed below:
https://reports.zoho.com/ZDBDataSheetView.cc?DBID=779360000002755434
For more details about the reports supported for Zoho Reports Advanced Analytics Add-on for SDP, refer to Reporting Features section.

7. How secure is Zoho Reports to store my SDP Data?

In Zoho we give utmost importance to ensure our customers' data is both SAFE and SECURE. We have very stringent processes and systems in place to ensure the same. To know more about this, we recommend you to go through the following policy documents:
Zoho Security Practices & Policies:http://www.zoho.com/security.html
Zoho Security Practices An Overview:http://blogs.zoho.com/general/security-practices
Zoho Privacy Policy:http://www.zoho.com/privacy.html
Zoho Terms of Service:http://www.zoho.com/terms.html

In case you have any further questions or concerns, please write to us at support@zohoreports.com

8. Will sensitive information from SDP uploaded into Zoho Reports?

Only the data that is required for analysis is uploaded from SDP to Zoho Reports. For example, the mail content of the request/ticket is NOT uploaded. To know what data is uploaded from SDP, refer to the Default fields synchronized from SDP to Zoho Reports question.

Pricing & Trial

1. How much does this add-on cost?

To use the Zoho Reports Advanced Analytics Add-on for SDP, you can choose any of the available plans in Zoho Reports, including the Free Plan (Refer to the Zoho Reports pricing page). This add-on can be setup in all editions of SDP. You can subscribe to any plans in Zoho Reports as follows (after you setupthe add-on):
  1. Log in to your SDP account as an 'administrator'
  2. Click the 'Reports' tab of SDP and click the Zoho Reports link at the top. You will be taken to your Zoho Reports account in a new browser tab.
  3. Click the Subscription link at the top right.
  4. In the Upgrade tab/page, choose the plan you want to subscribe to in Zoho Reports. 
Note 1: Ensure that you subscribe to the Zoho Reports paid plan, only from the account of the administrator, whose email / Zoho AT key is used to setup the SDP - Zoho Reports Add-on.
Note 2: In case you want to subscribe to Zoho Reports through a purchase order, please mailsales@manageengine.com. The add-on is also available in the ManageEngine ServiceDesk Plus store.

2. Do you provide trial evaluation for this add-on?

Yes, we do provide a 30-day free trial for this add-on from the date of setup. The free trial will enable you to try the add-on in the "Standard" plan of Zoho Reports (Refer to the Zoho Reports pricing page). You can continue to use the add-on even after the trial period, in the "Free" plan of Zoho Reports. 

3. What do you mean by 'Users' in the (add-on) pricing plan?

Anyone to whom you privately share your databases, tables (data), reports and dashboards, created in Zoho Reports, for collaboration is considered a "User" in Zoho Reports. A user is identified by his/her unique email address, with which their Zoho Reports account was created/registered.
Suppose you subscribe to the Zoho Reports Standard plan, you can privately share the data/reports in your account and collaborate with 4 other persons. Now your Zoho Reports account is said to have 5 users (including yourself).

4. What do you mean by 'Rows' and how is it calculated in the pricing plan?

In Zoho Reports, a row or record is defined in the same context as in a database (or spreadsheet). In simple terms, a table consists of rows (records) and columns (fields). Each row in a table represents a set of related data and has the same structure. For example, in a table that represents "Requests", each row would represent a single request record. The number of rows calculated for pricing, is the sum of all rows/records stored across all your database tables in your Zoho Reports account.

5. How do I purchase a paid plan in Zoho Reports?

The Zoho Reports add-on is available for the users of all editions of SDP. This add-on can be setup in all editions of Zoho Reports including the Free plan. In case you would like to subscribe to any of the paid plans in Zoho Reports, please follow the below steps:
  1. Log in to SDP as the administrator
  2. Click 'Reports' -> 'Zoho Reports'. You will be taken to your Zoho Reports account in a new browser tab. You need to log into Zoho Reports, if you are not logged already. 
  3. Click the Subscription link at the top right
  4. In the Upgrade tab/page, choose Standard Edition or above and subscribe
Note 1: Ensure that you subscribe to the Zoho Reports paid plan only from the Zoho account of the administrator who set up the SDP Analytics Add-on.
Note 2: In case you want to subscribe to Zoho Reports through a purchase order, please mailsales@manageengine.com. The add-on is also available in the ManageEngine ServiceDesk Plus store.

Setup

1. How do I setup the Zoho Reports Add-on in my SDP account?

Setting up the Zoho Reports add-on is easy. Please follow the below steps:
  1. Login to SDP as administrator. (Zoho Reports add-on can be setup in all editions of SDP)
  2. Configure the Zoho Reports add-on trial by clicking 'Admin' -> 'Zoho Reports Integration'
  3. Sign up for a Zoho Reports account using the 'Sign Up' link provided. This will setup a free 30-day trial account in Zoho Reports Standard edition
  4. Confirm your Zoho account by clicking the confirmation link received via email from Zoho
  5. Get the Zoho AT key (Authtoken) by visiting this page.
  6. Use the email address of the Zoho Reports account and the Zoho AT key, to configure the SDP - Zoho Reports setup. 
Note: This add-on can be set up in ServiceDesk Plus 9.0 build #9028 and above. SDP customers on builds prior to this have to migrate to 9028 by installing the required service pack(s).
You will be configured for a 30-day free trial of Zoho Reports Standard edition. You will receive an email after the first batch of data from SDP gets imported into Zoho Reports. Once this initial data from SDP gets imported into Zoho Reports, subsequent changes made in SDP will automatically get synchronized into Zoho Reports at the scheduled synchronization time.
Refer to the below slide show for setting up the add-on, with step-by-step instructions.



By default when you setup/configure this add-on (as described above), your Zoho Reports account will be automatically setup & subscribed to a 30-day free trial of the Standard plan, to enable you evaluate the integration features. After the trial period is over, you can choose to upgrade your Zoho Reports account to a paid plan or use this integration add-on in the 'Free" plan of Zoho Reports. You can subscribe to any paid plan as follows:

  1. Click the 'Reports' tab of SDP and click the Zoho Reports button at the top. You will be taken to your Zoho Reports account in a new browser tab.
  2. Click on Subscription link at the top right.
  3. In the Upgrade tab/page, choose the appropriate plan and subscribe.

2. I have setup the Advanced Analytics add-on but not seeing my SDP data in my Zoho Reports account. What's happening? [or] How long should I wait for my SDP data to initially appear in Zoho Reports?

After configuring the Advanced Analytics in your SDP account, wait for at least a couple of hours for all your SDP data to be imported into Zoho Reports. You will receive an email when the import/sync is complete and is ready for creating reports over the same.
Once the initial data synchronization is done, subsequent changes you make to your data in SDP (add, modify, delete records) will automatically be synchronized into Zoho Reports at the scheduled times you have specified during setup.

3. I got this email which said 'Setup Process Failed'/'Synchronization Process Failed'. What should I do?

The import/sync process of your SDP data can fail sometimes, due to a variety of reasons. And hence you may receive such mails occasionally. No worries. Please mail to the ServiceDesk Plus's support team (servicedeskplus-support@manageengine.com). They will look into it immediately and get back to you taking the required corrective action.
Setup Process Failed mail will come when there is a failure during the initial SDP - Zoho Reports add-on setup.
Synchronization Failed mail will come if there is any failure during the data synchronization process between SDP and Zoho Reports, after the initial setup & import is completed successfully.

4. What are the default fields that will be synchronized from SDP into Zoho Reports Reporting Database?

SDP data from the following fields will be synchronized by default into Zoho Reports. 
SDP ModuleFields (Columns)
RequestRequestID
Subject
Requester
Technician
Created Time
DueBy Time
Site
Request Type
Department
Group
Priority
Level
Workstation
Mode
SLA
Impact
Urgency
Assigned Time
Responded Time
Resolved Time
Completed Time
Category
Service Category
Overdue Status
IsEscalated
ReOpened
Request Pending Status
Service Request
Last Updated Time
TasksTaskID
RequestID
Title
Percentage of Completion
Created Date
Scheduled Start Time
Scheduled End Time
Actual Start Time
Actual End Time
Additional Cost
Module
Site
Created By
Owner
Prioirity
Task Status
Task Type
Group
WorkLogChargeID
RequestID
Description
Created Time
Starttime
Endtime
Executed By
Total Charge
Other Charge
Tech Charge
Created By

5. Can I add custom columns or new fields?

No, you can't add custom columns or new fields to the SDP database tables in Zoho Reports, as of now. We plan to support custom fields/columns in a future update.

6. Can I edit the SDP - Zoho Reports synchronization setting?

Yes, you can edit the synchronization setting by following the steps below:
  1. Login to SDP as Administrator
  2. Click Admin > Zoho Reports Integration
  3. Modify the Initial/Additional Setup settings as required, and then click Save

7. Can I synchronize the SDP - Zoho Reports data instantly?

Yes, you can synchronize the SDP - Zoho Reports data instantly when needed. You can do this as follow.
  1. Login to SDP as Administrator
  2. Click Admin tab > Zoho Reports Integration
  3. Click Instant Sync link. SDP data will be instantly synchronized.
Note: This option can be used up to 7 times per day.

8. How do I access the reports created in Zoho Reports?

Once the initial data import/synchronization between SDP and Zoho Reports is completed successfully, you can start accessing the reports created in Zoho Reports and also create your own reports & dashboards, as described below. 
If you are the SDP administrator who configured the Zoho Reports add-on,
  1. Click Reports tab Zoho Reports
  2. Zoho Reports, with 'ME ServiceDesk Plus Analytics' reporting database will open in a new browser tab. You will be prompted for login, incase you are not already logged into Zoho Reports. 
  3. This reporting database has all your SDP data and the default reports & dashboards.
SDP users with permission to view the Reports tab, can see the Zoho Reports button in the Reportstab. Oher than this, your SDP administrator has to enable sharing to your account in the Zoho Reports add-on. (Refer How to Share Reports & Dashboards question).
Refer How to Share Reports & Dashboards to know about how to share reports and dashboards to other users in this add-on.

9. How do I create my own reports with this add-on?

You can easily create your own reports using the Zoho Reports add-on by dragging and dropping the appropriate columns from the data tables (that contain SDP data) that have been shared with you. You can refer to the below presentation to know how to create your own reports & dashboards using Zoho Reports.


Also refer to the following video demos:
Note: For creating your own reports using this add-on, you can do it only if your administrator who has setup this add-on, has shared the tables (that contains the SDP data) in Zoho Reports to your account. Refer How to Share Reports & Dashboards question.

10. Who has access to the reports I create?

By default, the reports you create are accessible only to you. However, you can share the reports with your colleagues using the Sharing options available in Zoho Reports. Refer to the How to Share Reports & Dashboards question.

11. What are the modules on which I could create reports using this add-on?

Data from the following 3 modules of SDP get synced with Zoho Reports.
  • Request
  • Tasks
  • WorkLog
Each of the above modules data is stored as a 'Table' in Zoho Reports. Default reports are based out of the above 3 modules (tables). You can create your own reports & dashboards over the above modules.
We plan to support synchronization from other SDP data (like survey data, custom fields etc) too in the near future.

12. Will other data from SDP be supported, for report creation through this add-on. When?

We plan to support synchronization of more SDP data (like survey data, custom fields etc) in the near future. Support for other data will also be prioritized based on user demand.

13. On whose account will the Zoho Reports add-on be setup?

It will be setup in the Zoho Reports account that the SDP Administrator creates and uses as part of thesetup process of this add-on. It is this account which will serve as the master admin account of Zoho Reports.

 14. Can I transfer my Zoho Reports Advanced Analytics setup to another admin account?​

At present, we do not provide this option. Please do mail to support@zohoreports.com. We will understand your needs and assist you on this. 

Reporting Features

1. What are the report types supported by Zoho Reports?

Zoho Reports supports a wide variety of reports.
  • Charts
    • Pie
    • Bar
    • Stacked bar
    • Line
    • Scatter
    • Area
    • Stacked Area
    • Web
    • Funnel
    • Doughnut
    • Combination Chart
  • Pivot tables (Matrix Views)
  • Summary view
  • Tabular view
  • Dashboards (multiple reports arranged in the same page)

2. What are the default reports & dashboards created by Zoho Reports, on setting up this add-on?

When you setup/configure the Zoho Reports add-on, 80+ default reports/dashboards are automatically created. These hand-picked reports will be pretty useful in analyzing your service desk performance effectively. For example, SLA compliance reports, Top 5 / Bottom technician report, Requests flow trend, Average Response time, Requests Closing Rate etc.  
You can quickly review the default reports that would be created, from the sample database listed below:
https://reports.zoho.com/ZDBDataSheetView.cc?DBID=779360000002755434
For more details about the reports supported for Zoho Reports Advanced Analytics Add-on for SDP, refer to Reporting Features section.

3. Can I modify the default reports that have been created by the Zoho Reports add-on? If so, how?

Yes, you can modify the default reports. If you are the SDP administrator who set up the Zoho Reports add-on, or a 'Database Owner' (Refer Managing Users in Zoho Reports), click the 'Edit Design' button in a report's toolbar and you will be able to make the changes.

If you are just a user who's been shared the report, click 'Save' -> 'Save As' and save the report as a new report. You can edit this copied report now.
4. How do I create reports using Zoho Reports with this add-on? [or] What are the reports that I can possibly make using this add-on?
You can create any type of report with this Zoho Reports add-on. All you have to do is open the appropriate module table(s) over which a report is to be created, click 'New' and choose any type of report you would want to create.
Use the intuitive drag-and-drop based designer of Zoho Reports to create the report required. To know more, view this slide show on "How to Create Reports?". You can also quickly view the type of reports & dashboards that are created by default, from the sample given below.
https://reports.zoho.com/ZDBDataSheetView.cc?DBID=779360000002755434

5. How to create reports using fields/columns across different tables (example Request & Tasks)?

Columns from across different tables can be dragged and dropped to create a report. Refer this slide show on How to Create Reports?

6. What are Formulas in Zoho Reports?

Formulas, as the name indicates are calculations (metrics) that you could define in Zoho Reports to help you create the required reports. Zoho Reports provides a powerful formula engine to create any type of calculations required, to enable creating the required reports. You can create formulas as easy as you would create a formula in a Spreadsheet like Excel.  Refer Adding Formulas in Zoho Reports to know more.

7. What are the default formulas added in the 'ME ServiceDesk Plus Analytics' database, on setting up this add-on?

The below table lists all the default formulas that will be created in the 'ME ServiceDesk Plus Analytics' database by default. You will find these formulas pretty useful, in creating reports & dashboards in Zoho Reports. Also these formulas are used in the reports created by default in your database. You can view them by selecting the corresponding table and click "Add -> Edit Formulas" in the toolbar. 
The below table lists all the default formulas that are created in the WorkLog table:
Formula NameFormula TypeFormulaDescription
Time Spent in HrsCustom"Time Spent" / (1000 * 60 * 60)Provides the time spent on a request (work item) in hours.

The below table lists all the default formulas that are be created in the Request table:
Formula NameFormula TypeFormulaDescription
Time Elapsed in HrsCustom"Time Elapsed"/(1000 * 60*60)Time elapsed in hours for closed and resolved requests, as given by SDP. This excludes holidays, weekends etc.
Time to Respond in HrsCustomif(isnull("Responded Time") = 0 , (unix_timestamp("Responded Time")-unix_timestamp("Created Time"))/ (60 * 60 ),NULL)Total time taken in hours to respond since the ticket got created. 
Completion Age TierCustomif(isnull("Time Elapsed in Hrs"),'Not Resolved',if("Time Elapsed in Hrs"<= 2 , '0 - 2 Hours', if("Time Elapsed in Hrs"> 2 and "Time Elapsed in Hrs"<= 5, '2 - 5 Hours', if("Time Elapsed in Hrs"> 5 and "Time Elapsed in Hrs"<= 10, '5 - 10 Hours','Above 10 Hours'))))Different age tiers, of when requests get closed/resolved.
Days Since Last ChangeCustomif(isnull("Last Updated Time")=0,datediff(now(),"Last Updated Time"),datediff(now(),"Created Time"))The number of days between when a request got last updated and now.
Last Activity Request Age TierCustom    if( "Days Since Last Change">=0 and "Days Since Last Change"<=30  , '0 - 30 Days',if( "Days Since Last Change">30 and "Days Since Last Change"<=45 , '31 - 45 Days',if( "Days Since Last Change">45 and "Days Since Last Change"<=60 , '46 - 60 Days',if("Days Since Last Change">60, 'Over 60 Days','Invalid Age'))))Different age tiers, of when requests were last updated.
Days Since CreatedCustomdatediff(curdate(),"Created Time")The number of days between now (today) and the date when the request got created 
Open Request Age TierCustomif( "Days Since Created">=0 and "Days Since Created"<=30  , ' 0 - 30 Days',if( "Days Since Created">30 and "Days Since Created"<=45 , '31 - 45 Days',if( "Days Since Created">45 and "Days Since Created"<=60 , '46 - 60 Days',if("Days Since Created">60, 'Over 60 Days','Invalid Age'))))Different age tiers (in number of days), for open requests
Open Request CountAggregatecountif("Request"."Request Status"='Open')The total number of all requests whose status is 'Open'
Closed Requests CountAggregatecountif("Request"."Request Pending Status"=0)The total number of all requests whose 'Request Pending Status' is 0 (a 'Request Pending Status' of 0 means it's a closed request)
Backlog Requests CountAggregatecountif("Request"."Request Pending Status"=1)The total number of all requests whose 'Request Pending Status' is 1 (a 'Request Pending Status' of 1 means it's a backlog request - the request is still pending)
Requests Within SLAAggregatecountif("Request"."Overdue Status"=0)The total number of all requests whose 'Overdue Status' is 0 (an 'Overdue Status' of 0 means the request falls within the SLA)
% of Requests within SLAAggregate("Request"."Requests within SLA"/count("Request"."RequestID"))*100The % of requests which fall within the SLA.
SLA Violated RequestsAggregatecountif("Request"."Overdue Status"=1)The total number of all requests whose 'Overdue Status' is 1 (an 'Overdue Status' of 1 means the request has violated the SLA)
% of SLA ViolatedAggregate("Request"."SLA Violated Requests"/count("Request"."RequestID"))*100The % of requests which violated the SLA.
Requests within SLA - Closed RequestsAggregatecountif("Request"."Request Pending Status"=0 and "Request"."Overdue Status"=0)The total number of closed requests which fall within the SLA.
SLA Requests Violated - Closed RequestsAggregatecountif("Request"."Request Pending Status"=0 and "Request"."Overdue Status"=1)The total number of closed requests which violate the SLA.
Escalated Requests Count Aggregatecountif("Request"."IsEscalated"=1)The total number of escalated requests (the requests whose 'IsEscalated' value is 1)
% Escalated Requests            Aggregate("Request"."Escalated Requests Count"/count("Request"."RequestID"))*100The % of requests which got escalated.
% Reopen RequestsAggregate(countif("Request"."ReOpened"=1)/countif("Request"."ReOpened"=1 or "Request"."Request Pending Status"=0))*100The % of requests which got reopened.
Reopen Requests CountAggregatecountif("Request"."ReOpened"=1)The total number of requests that got reopened.

8. How do I create my own custom formulas in Zoho Reports?

Refer to the Adding Formulas in Zoho Reports help page. 

9. Can I add/modify data to the SDP tables from within Zoho Reports?

No, you cannot. Data from SDP gets automatically synched into Zoho Reports in the 3 different tables. You cannot edit any of this data or add new data records from within Zoho Reports.

10. Can I add new columns to the SDP tables from within Zoho Reports?

No, you cannot add new columns. But you can add Formula Columns and Aggregate Formulas (i.e. calculated fields) to these tables to help you create powerful reports. Refer Adding Formulas in Zoho Reports to know more.

11. Can I add new data tables in this reporting database to create reports & dashboards? [or] Can I combine data from other sources with the data from SDP to create reports and dashboards?

Yes, you can add new data tables. Click New > New Table and you can add new tables to the existing SDP reporting database.
With this feature, you can import new data or add them manually into your reporting database to analyze and create reports combining this with the SDP data. You can import data from files & feeds like Excel, HTML, CSV, JSON, XML, Google Drive, Zoho Docs, Dropbox, Box and Web URLs. You can also import data from Local SQL & NoSQL databases like Oracle, SQL Server, DB2, MySQL, PostgreSQL, MS Access, Hadoop, Cassandra etc,. The databases can also be in the cloud.
Refer:

12. What are Query Tables?​

Zoho Reports allow you to pull the data required by writing standard SQL SELET Queries. This feature is called Query Tables. With Query Tables you can also combine data from different tables and create reports from the same. View this demo video to know about how to create Query Tables in Zoho Reports. 
If you are just looking to join tables to create reports, you can use easy to use auto-join feature in Zoho Reports, instead of Query Tables.  Refer to Joining Tables in Zoho Reports for detailed help on this.

 13. Can I join data from multiple tables to create reports?

Yes, you can join data from multiple tables to create the reports. Refer to Joining Tables in Zoho Reports for detailed help on this.

 14. How do I generate a bookmark URL or permalink for a report or dashboard?

Zoho Reports allows you to have a (semi-) private link for any report or dashboard. Click the Publish icon -> URL / Permalink for this view.


To bookmark the URL for the report/dashboard, get the URL for the 'without login' option.


The report link has a unique privatelink key as a part of it.


You can bookmark the above URL for accessing the report/dashboard any time. 
Note: If you want a more secure link, use the 'with login' option. This will ask for the users to log into their Zoho Reports account and will be accessible only if you had shared the report to them. 
To know more, refer to the Creating URL/Permalink to Views help doc page.

Users, Sharing & Collaboration

1. How do I share the reports in Zoho Reports with my colleagues?

You can share the default reports provided in the Zoho Reports add-on and also the reports you create, with your organization employees/colleagues. Refer to Sharing and Collaboration help page for more.
Once you privately share a report to your colleagues they will be able to access the same as you do, following the steps below:
  1. User logs in to SDP
  2. Select the Reports tab > Zoho Reports
  3. Clicking the link will open the ME ServiceDesk Plus Analytics reporting database in a new browser tab. They will be prompted to log into their Zoho Reports account, incase they are not already logged-in.
  4. Users will be able access the reports & data shared to them.
Note:
1. If you share the data tables in the SDP reporting database to users, they will be able to create their own reports over the same.
2. If you add a user as a Database Owner in the SDP reporting database created in Zoho Reports (ReferManaging Users in Zoho Reports, to know how to add Database Owners), the user will be able access all the data & reports, create new reports and do any operation that you could do on the reporting database.

2. Why are other members in my organization not able to access the reports created?

When the  SDP Administrator configures the SDP - Zoho Reports add-on, the tables and reports will be available only to him/her, by default. The Administrator has to share the 'ME ServiceDesk Plus Analytics' database with other members of the organization. Only then will the default reports be accessible by those members. 
There could be a another case where say the Administrator has shared the database with other members in the organization. And the member creates his/her own reports. Those reports will be available only to him/her alone, unless he/she shares them with others.
To know more, refer to Sharing and Collaboration help page.

3. How can other members in my organization create reports?

The SDP Administrator who setup the add-on should share the tables present in ME ServiceDesk Plus Analytics database with other members of the organization. Once this is done, the shared users can create reports based on those tables.
To know more, refer to Sharing and Collaboration help page.
Note: If you add a user as a Database Owner in the SDP reporting database created in Zoho Reports (Refer Managing Users in Zoho Reports, to know how to add Database Owners), the user will be able access all the data & reports, create new reports and do any operation that you could do on the reporting database

4. What are the user roles available in Zoho Reports?

Zoho Reports supports fine-grained access control. The following are are user roles that are supported in Zoho Reports:
1. Administrator (Master Admin): The User account in Zoho Reports who had setup the add-on will be the administrator of the Zoho Reports account
2. Database Owner: The Administrator can designate one or more users as Database Owners. A Database Owner has all permissions to add, delete, modify reports, table rows and even tables. A Database Owner can share the database tables/reports with other users. A Database Owner cannot delete or rename a database.
3. User: A user has the least privilege in the hierarchy. He/She can access the reports, dashboards & tables which are shared to them by the Administrator/Database Owner. Users can access the shared information only by log-in into his/her account in Zoho Reports.  Unless the Administrator or a Database Owner shares a table with a User, the user cannot create any reports on his/her own. Also, an Administrator/Database Owner can decide to set specific permissions when sharing a report (Read Only, Export Data, View Underlying Data, Share with Others) or a table (Read Data, Export Data, Add/Delete/Modify Rows, Share View / Child Reports).
Refer to Managing Users in Zoho Reports, to know more about different user roles in Zoho Reports. Also refer to Sharing and Collaboration help page.

5. Why can't other users edit the reports that I have shared to them?

This is the expected behavior. If the user being shared to is a database owner, he/she can edit the reports. If a normal user wants to edit report, what he/she can do is to use 'Save As' to save the report in a different name in his account. This report can then be edited.

6. Can I share the same report created, to multiple users with different criteria associated so that they see different data?​

Yes, you can. Refer to this help documentation section to know how this can be done.

7. How can I print the reports & dashboards created in Zoho Reports?

To print a report/dashboard, please follow the below steps.
  1. Open the report or dashboard that you want to print
  2. Click the 'Export' button.
  3. You will see options to save the report/dashboard in a variety of file formats like PDF, Excel, CSV, JPG etc.
  4. Choose the format you want and save the file to your desktop. For printing PDF is the recommended format. 
  5. Open the file and print it
Note: If you are a user to whom a report has been shared and you want to take a print, ensure you have been provided the Export permission by the Administrator to the report, only then you will be able to print the report.

8. How can I email reports & dashboards created in Zoho Reports in a scheduled manner?

If you are the Administrator of the Zoho Reports add-on or a 'Database Owner', you can schedule reports and dashboards to be emailed automatically. You can do this is as follows:
  1. Select the Report/Dashboard to be emailed in Zoho Reports
  2. Select "Export -> Email this View" from the toolbar
  3. Follow the instructions in the screen and provide the required input to setup a email schedule

9. Into what file formats can I export the reports & dashboards created in Zoho Reports and how?

Reports and dashboards can be exported in a variety of file formats.
  • Charts
    • CSV/Excel
    • PDF
    • HTML
    • PNG/JPEG
  • Pivot/Tabular views
    • CSV/Excel
    • PDF
    • HTML
  • Dashboards
    • PDF
    • HTML
You can export a report/dashboard in Zoho Reports as follows
  1. Select the Report/Dashboard to be exported in Zoho Reports
  2. Select "Export -> Export this View" from the toolbar
  3. Follow the instructions in the screen and provide the required input to export the report(s) selected

10. How do I embed my reports in my website, intranet, blog or presentation?

You can easily embed the reports & dashboards created in Zoho Reports in your website, intranet, web application or blog. Follow the steps below to achieve the same:
  • Select the report or dashboard that you would like to embed into your Website or Blog.
  • Select the "Publish -> Embed in Website/Blog.."option
  • By default, when you embed the report into your website, intranet, web application or blog, it would prompt for users to log into Zoho Reports to view the embedded view. Also, users to whom you have shared the view (using the 'Share' option) would only be able to access the view embedded, on successful login.
  • If you would like the embedded view to be accessible by anyone without login, then click on the linkTo access this view/table without login, Click here...
  • Copy and paste the code snippet provided in the text area below into your webpage or blog html content to embed this view.
On embedding, you will see the corresponding report within your web page, application or blog. ReferEmbedding in Web Pages/Blogs to know more about this.

Check list data center Anda

$
0
0


Data Center Checklist for Infrastructure Best Practices

POSTED BY HADLEY JONES

Jun 25, 2015 4:52:00 PM

inShare93

Expectations of data centers are focused on the five 'pillars' of availability, cost-effectiveness, flexibility, manageability, and security. In turn, these pillars let us make a data center checklist of best practices for the DC infrastructure.

Availability

Data centers have to stay up and running. Outages can be expensive in both financial and reputational terms. Data centers need to be organized to prevent such problems or at least to detect them at the earliest possible moment, including:

Resilient data center design with fire barriers and robust building architectureMultiple connections to power providers,preferably entering the data center at different pointsUninterruptible power supply with battery backup andgenerators in case of power cutsRedundant servers and storage with failover provisions at hardware and software levelsMultiple high-speed network linksentering and exiting at different pointsSufficient air conditioning for all of the equipment being operated in the data centerSmoke, fire, humidity and flood detection, including underneath data center raised floors

Cost-Effectiveness

Data center andcolocation service providers need to be profitable. Customers expect cost-savings. Data center operations, therefore, need to be high-quality, yet also be efficient and avoid unnecessarily high levels of expenditure. What's expected?

Tiered data storageaccording to needs for every day, occasional, or archival useVirtualization to maximize physical server productivity via virtual machines (VMs)Automation of systems administration routinesPower and cooling analysis to prevent excessively hot or cold spots from formingErgonomic shipping and installation facilities, including weather-proof receiving docksProximity to access routes and fuel storage, while avoiding hazards like airports and oil refineries

Flexibility

Even if data center buildings seldom scale physically, their internal organization must facilitate scaling in power and storage capacity with new systems, as well as handling peak user demands. This includes:

Ability of the data center to accommodate new technology with different power and cooling needsEase of switching to new operational procedures or ways to meet new safety requirementsModularity in floor layout, electrical and mechanical design to adapt to market requirementsManagement of requests for very popular information via overflow servers

Manageability

'Lights-out' operations may be possible, but at the very least, data center teams and customers must be kept appraised of performance and possible problems via:

Service level agreements withcustomers, including service response time and escalation pathsOverall and specific (per customer for multi-customer DCs) monitoring of service levelsSpeedy registration and resolution of support requests,trouble tickets, and alarmsCoordinated computing equipment refresh process with roadmap for customersStandards compliance and certification now and into the future (e.g. PCI, TIA-942, SAS 70)

Security

Both in terms of staff and site safety, and customer data confidentiality, security looms large in the data center checklist for infrastructure best practices including:

Full compliance with safety regulations including fire exitsPhysical securitywith protection of power and networking links, and cable vaultsVideo surveillanceand motion detectors, badges, 'mantrap' entrances, data center guardsData encryption, SSL certificates, firewalls and also virtual firewalls (for VMs)Locked cages with ceilings for customer systems, locked cabinets as an optionIntrusion detection and prevention systems, behavioral analysis, and alerts to staffProtected and tested data backupand disaster recovery proceduresReliable and complete data destruction procedures (old hard drives, contract terminations)

This data center checklist is naturally a general one. Do youhave an additional best practice for your own data center? Tell us about it in the Comments section below.

Fanky Christian
Director
PT DAYA CIPTA MANDIRI SOLUSI
mobile: 62-8121057533
www.dayaciptamandiri.com

Fitur baru di PHPRUNNER, MAP dan heat map

$
0
0



New mapping features

If you're new here, you may want to subscribe to my RSS feed. Thanks for visiting!
The latest version of Runner family products comes with several improvements in mapping area like support of Bing and OpenStreet maps, maps in dashboards, custom map markers etc. In this article I want to show a couple more mapping features that you can use in your apps, heat maps and clustered maps.
Both those features can help you visualize large amounts of mapping data. It gives your users a better insight on your data. For instance, those maps tell you that if you are a taxi driver in NYC, your chances to pickup a passenger are higher if you are nearby Trump Tower. 
There are some limitations that you need to bear in mind:
  • This functionality only works with Google maps
  • This functionality only works with lat/lon pairs as opposed to addresses
  • This will only work with map added to the List page via 'Insert map' function (won't work in dashboard)
  • Heat maps and clustered maps will always use all the data returned by query (as opposed to only data from the current page)
These are sample pages built-in of anonymized Uber taxi service trip data. This app uses 10,000 passenger pickup data points collected in New York City (a full dataset if you need it). Click on image to see the live app.

Heat map


Clustered map


Code

Insert a map into any list page that has lat/lon values and modify the code adding the following line at the end of map code.

PHP

  1. // Clustering  
  2. $mapSettings['clustering'] = true;  
  1. // Heat map  
  2. $mapSettings['heatMap'] = true;  

ASP

  1. ' Clustering  
  2. mapSettings("clustering") = true  
  1. ' Heat map  
  2. mapSettings("heatMap") = true  

C#

  1. // Clustering  
  2. mapSettings["clustering"]=true;  
  1. // Heat map  
  2. mapSettings["heatMap"]=true;  

S T.R.E.S

$
0
0

STRES menjadi hal akrab dalam kehidupan kita. Mungkin bisa dari pasangan kita, anak, orangtua, mertua, pekerjaan hingga pelayanan.

Beragam cara juga dilakukan orang untuk menangani stres ini. Mulai dari curhat, curhat kepada pasangan, orang terdekat hingga ke sosial media. Ada lagi yang melarikan diri, dengan berbagai kesibukan, berbagai kegiatan, pekerjaan, hingga larut malam dan akhirnya kelelahan tidur. Ada yang menghabiskan waktu dengan termenung, merokok bahkan minum minuman keras. Semua dengan satu tujuan, menghilangkan tekanan atau stres yang dirasakannya

Yang menarik, tidak semua orang memikirkan cara untuk menghilangkan tekanan dengan termenung dahulu mengambil waktu berdiskusi dengan Tuhan. Meskipun Dia tak kelihatan mata, tapi kehadiranNya ada di setiap saat kita, bahkan waktu kita tertekan sekalipun. Berdiskusi dengan Tuhan ini menjadi hal yang menarik dan bisa membosankan. Menarik karena sebenarnya kita tahu, bahwa Dia maha tahu dan mungkin tahu juga cara agar kita mengatasi tekanan kita. Membosankan karena seolah kita bicara, berpikir, dengan diri kita sendiri. Sebelum akhirnya kita akan menerima, menemukan, dan menjalani hal yang akan kita lakukan untuk mengatasi tekanan kita.

Inilah siklus tekanan, siklus stres manusia. Awalnya berontak, tidak menerima, kemudian bertanya, dan kemudian menerima, hingga akhirnya menemukan sendiri hal terbaik untuknya. Tapi ini tidak bisa manusia sendirian melakukannya, kadang dia perlu orang lain, selain sangat memerlukan Tuhan.

Atasilah tekanan kita, dengan selalu mengingat, dan bersyukur atas segala hal yang kita rasakan. Oleh sebab itu, Dalam tekanan, saya merubah nya menjadi istilah baru, Sejahtera Tuhan Rasanya Enak Sekali.

Rasakan dan nikmati tekanan kita masing-masing dengan penuh rasa syukur.

Layout baru di PHPRUNNER

$
0
0


a couple of weeks ago we have sent out a newsletter looking for ways to improve the appearance of applications our Runner software builds. We have received some very insightful and elaborate feedback which is greatly appreciated.

Today we want to show you some examples of new layouts we have been working on. These are just prototypes and not working pages but they can show you where we are headed. Click images below to see the corresponding demo page.

Use theme switcher at the top of each demo page to see how it looks with different settings.

This is work in progress and far from being completed. We'll announce release date as soon as we have it. 
Let us know what you think!

Solusi ManageEngine untuk IT Asset Management

$
0
0
Semakin banyak perusahaan sadar akan pentingnya IT Asset Management (ITAM), kami menggunakan AssetExplorer untuk membantu perusahaan.


Membangun Data Recovery Center / Disaster Recovery Center

Tim aplikasi dan network saling menyalahkan ? gunakan OpManager

$
0
0
Masih sering ketemu tim aplikasi dan tim network saling menyalahkan?
Yang satu merasa aplikasinya tidak ada masalah, lainnya juga merasa networknya aman. Lalu bagaimana? Jangan sampai meruncing, gunakan tools yang bisa digunakan untuk melakukan korelasi antara aplikasi dan jaringan.

Salah satunya dengan produk OpManager dengan tambahan AppManager.




Magic Quadrant untuk WAN Optimization - 2015

$
0
0


Magic Quadrant for WAN Optimization

17 March 2015 ID:G00263597
Analyst(s): Bjarne MunchNeil Rickard

VIEW SUMMARY

WAN optimization increasingly resembles a mature market with increasing feature standardization. Vendor innovation is focused on supporting new application types and deployment options, with WAN optimization migrating toward more diverse platforms or to a WAN cloud.

Market Definition/Description

WAN optimization provides a range of features to: (1) improve the performance of applications running across the WAN; and (2) reduce the cost of the WAN. The range and scope of features supported by WAN optimization solutions continue to evolve, typically in support of three high-level needs:
  • Improve the response times as experienced by users of business-critical applications over WAN links or mobile connections, often addressing application performance problems caused by bandwidth constraints, latency or protocol limitations.
  • Assist in maximizing the ROI for WAN bandwidth, and delay costly bandwidth upgrades.
  • Optimize data-center-to-data-center (DC-to-DC) traffic for faster replication and synchronization.
In support of these needs, WAN optimization includes some or all of the following functionality:
  • Generic protocol- and application-protocol specific optimization to minimize the effects of network latency
  • Compression, deduplication or content caching to reduce the bandwidth required to transfer WAN traffic, as well as to improve user access times
  • Traffic identification, prioritization, policing and shaping to ensure acceptable access for mission-critical applications during periods of high traffic load
  • Traffic monitoring and reporting to aid in troubleshooting and network planning
  • WAN path control, WAN virtualization or link load balancing to control traffic forwarding across multiple networks, such as Internet and Multiprotocol Label Switching Transport Profile (MPLS-TP) for resilience and to optimize utilization
  • Direct Internet access via the ability to forward traffic to public cloud services, while still controlling traffic forwarding to privately deployed applications
WAN optimization is typically deployed in-house via physical appliances in a symmetrical solution — that is, the devices are deployed at each end of the network connection, such as in the branch office and the data center. These appliances can also be deployed as virtual appliances or as a cloud resident service. For mobile or remote users, WAN optimization can be deployed as a soft client that runs on individual user devices. Some features, such as HTTP optimization and bandwidth management, can operate in an asymmetrical fashion, allowing deployment at either the branch or data center end of the network (see "Use New WAN Optimization Models to Increase Flexibility and Reduce Costs").
When WAN access bandwidth is adequate, WAN optimization can also be delivered as a network-based "WAN optimization as a service" (WOaaS), such as those from Aryaka and NTT Communications. WOaaS services are delivered from service delivery points embedded in carrier service infrastructure and enable enterprises to avoid the need to deploy on-premises physical appliances.

Magic Quadrant

Figure 1. Magic Quadrant for WAN Optimization
Figure 1.Magic Quadrant for WAN Optimization
Source: Gartner (March 2015)

Vendor Strengths and Cautions

Array Networks

Array is particularly strong in Asia/Pacific with its main presence in China and India. Array's WAN optimization portfolio is the result of its integration with the assets of Certeon, acquired in 2013, which complement Array's existing solutions in application delivery control and secure access gateways. Array offers a good range of physical appliances from 10 Mbps to 1 Gbps throughput, as well as its software-based WAN optimization products (aCelera Virtual Appliance, aCelera for Windows Server and aCelera Mobile). These appliances support common WAN optimization functionality, such as compression, deduplication, HTTP, TCP, Common Internet File System (CIFS), Messaging API (MAPI) optimization, Citrix Independent Computing Architecture (ICA), traffic shaping and quality of service (QoS). Consider Array when a single supplier for application delivery controllers (ADCs), Secure Sockets Layer (SSL) virtual private network (VPN) and WAN optimization controllers (WOCs) is a priority. Also consider Array when price is a primary decision factor, especially for deployments in India and China.
Strengths
  • Array Networks offers a full range of physical and virtual appliances with good performance and features at prices that are typically lower than those of the leading WAN optimization vendors.
  • The aCelera Virtual Appliance is available on VMware ESX/ESXi, Microsoft Hyper-V, Citrix XenServer and Windows Server 2008 R2, and as a small-footprint mobile client for Windows XP and Windows 7.
  • Array offers up to 100GB local cache storage in its branch office device as well as a centrally located networkwide image of all caching, thus improving the scalability of its solution.
  • Array Networks provides a storage backup/replication solution that supports a broad range of storage vendors, including Dell EqualLogic and Compellent, EMC, and NetApp, and bundles with Hitachi Data Systems for a strong solution targeted at the Indian market.
Cautions
  • Array Networks' distribution is limited outside India, China, Japan and North America, although it is expanding. In addition, Gartner inquiries show enterprise awareness of Array Networks remains limited.
  • Array lacks specific application protocol optimization, User Datagram Protocol (UDP), video content and asymmetric Web browser optimization.
  • Visibility and reporting, although improved, are not yet on par with leading vendors.
  • Array does not offer WAN path control, local link load balancing capabilities or direct Internet access.

Aryaka

Aryaka is one of the primary innovators, embedding WAN optimization within its WAN infrastructure to offer WAN optimization as a service. Aryaka does this via 25 points of presence (POPs) distributed across North America, South America, Europe, Africa and Asia/Pacific. These POPs create Aryaka's core WAN network that is used for global connectivity. These POPs also offer a range of services, such as WAN optimization, a content delivery network (CDN), Internet and public cloud connectivity, remote access services, and visibility and reporting. As such, traffic is optimized between Aryaka's globally distributed core POPs without the use of on-site appliances or mobile software-based WOCs (SoftWOCs). The Aryaka offering does not include an on-site managed router service, and enterprises must source and manage all WAN access services connecting into Aryaka's network. In situations in which the core WAN optimization is insufficient for the chosen last-mile connection, Aryaka provides its own WOC appliance without additional fees. Consider Aryaka for globally distributed networks where in-house router management is required and where the flexibility of cloud-based WAN optimization is desired.
Strengths
  • Aryaka offers a simplified deployment model that eliminates the need for on-premises WAN optimization appliances and replaces its customers' capital expense with an ongoing monthly fee.
  • For locations in which local loop performance is unacceptable, Aryaka provides an on-premises appliance.
  • The network-based solution offers broad and well-rounded service capabilities, such as WAN optimization, visibility and custom reporting, CDN, remote access with IPsec termination, and Internet access.
  • The Aryaka model delivers good network-level performance and visibility, but is not on par with leading vendors.
Cautions
  • Compared with managed WAN services that include WAN optimization, Aryaka can be often as much as 30% more expensive when all additional costs are included, such as access services and WAN routers. Aryaka does not provide specific application optimization features or dedicated data-center-to-data-center storage replication that compares to that of leading vendors in this report, although it supports standard network-based optimization.
  • Enterprises must ensure that their branch offices have low-latency (25 milliseconds [ms] or less) connectivity to an Aryaka POP in order to get the best application performance, although Aryaka continues to roll out more POPs.
  • The Aryaka on-site appliance has limited functional capabilities and does not support WAN path control functions, although it supports basic optimization, link bonding, failover and limited visibility.

Blue Coat Systems

Blue Coat Systems' WOC solution consists of three separate appliances: the MACH5 for WAN optimization, compression and caching; the PacketShaper for reporting, traffic control and compression; and CacheFlow, which is dedicated to high-end service provider caching needs. Both the MACH5 and PacketShaper products comprise a broad range of physical and virtual appliances and a SoftWOC ProxyClient. MACH5 runs on the vendor's range of ProxySG appliances, which can also support Blue Coat's secure Web gateway (SWG) software. The PacketShaper platforms have now been completely refreshed and use the new Blue Coat common operating environment. Blue Coat has also refreshed MACH5 using the same new hardware platforms (that is, the S200, S400 and S500). Riverbed has been acquired by Thoma Bravo, the same private equity firm that took Blue Coat private in 2012. Riverbed and Blue Coat have different Boards of Directors, and the businesses should follow independent strategies. Additionally, Blue Coat is currently in the process of being acquired by Bain Capital with the aim of going public. Consider Blue Coat for all branch-office-to-data-center optimization, particularly when direct Internet access to software as a service (SaaS) providers, video delivery, and detailed visibility and traffic management are priorities.
Strengths
  • Blue Coat provides a strong feature set for cloud-based applications via its local link load balancing and direct-to-Internet capabilities combined with its cloud-based SWG service and asymmetric caching.
  • The company's portfolio provides one of the industry's broadest ranges of WAN optimization techniques, especially for video (where it supports stream splitting and caching of many streaming protocols, although these features are spread across multiple platforms).
  • Blue Coat PacketShaper offers some of the most detailed application traffic visibility and traffic control solutions of any optimization vendor, and via integration with WebPulse (Blue Coat's Web intelligence cloud service), PacketShaper also provides granular visibility and control of Web content and URL categorization.
  • Blue Coat has a good vision around integration of WAN optimization, security and cloud-based applications.
Cautions
  • Blue Coat's marketing is dominated by security, which, together with its multiple WAN optimization product lines, leads to market confusion around the company's commitment and focus on WAN optimization. This has also led to a decline in 2013 to 2014 WOC revenue.
  • Feature support of the mobile client — Blue Coat ProxyClient — is still limited.
  • Blue Coat's MACH5 has limited support for application-protocol-specific optimization and no specific storage protocol optimization, making it less suitable for DC-to-DC storage replication than competitors.
  • Blue Coat does not support any WAN path control features or IPsec VPN capability, although it does support link load balancing for Internet traffic.

Circadence

Circadence's MVO product range consists of preintegrated server-based appliances and the Virtual MVO product, which is available on a range of hypervisors, as well as Circadence MVO for Windows and Linux and Circadence MVO for Mobile for Android, Apple iOS and Microsoft Windows Mobile. The MVO appliances support a good range of commonly used WAN optimization features, such as caching, TCP and HTTP optimization, and WAN path control. Circadence is focused on optimization for mobile connections and has developed extensive capabilities to optimize mobile traffic (3G and 4G), reduce loss, manage QoS and improve link utilization. Consider Circadence when mobile application performance is critical to your business and when support for a broad array of client devices is required. Also evaluate Circadence for branch-to-data-center optimization, especially when link quality is problematic.
Strengths
  • Circadence has one of the strongest SoftWOCs on the market, with support for a wide variety of optimizations across a wide range of OSs.
  • Circadence continues to innovate on the mobility front, particularly with enhanced congestion control, dynamic network recognition (circuit versus packet) and Wi-Fi/cellular handoff.
  • Circadence Link Resilience maintains application session persistence for unreliable wireless connectivity — that is, when connectivity is re-established, the session picks up where it left off.
  • Circadence has shown scalability in very large deployments.
Cautions
  • Circadence lacks data-center-to-data-center-specific capabilities, although it now supports higher-bandwidth connections on its physical and virtual appliances.
  • Circadence has limited dedicated video optimization and application-specific acceleration capabilities.
  • Circadence has limited support of visibility and reporting and does not support as extensive traffic discovery and traffic control capabilities as leading vendors.
  • The company has limited brand awareness in the general market, especially outside of the U.S., although efforts are underway to improve this situation. Enterprises should verify local support capabilities outside of the U.S.

Cisco

Cisco has one of the widest portfolios of platforms, including Cisco Wide Area Application Services (WAAS) appliances, the Cisco ISR G2 and Cisco 4000 Series Integrated Service Router with Application Experience (ISR-AX) limited-function WAAS embedded in ISR G2 IOS, an OEM SoftWOC and the Cloud Services Router (CSR) 1000v with WAAS. This range also includes a high capacity WAAS appliance suitable for DC-to-DC traffic. Cisco's strategy is strongly based on the router as a cornerstone in its architecture where the Cisco 4000 Series ISR is positioned as a "network server" that hosts all network functionality. The combination of the ISR and WAAS in the new Cisco Intelligent WAN (IWAN) architecture has created a more complete solution that is becoming easier to manage, although enterprises still need to navigate the complexity of combining multiple functions such as Performance Routing (PfR) path selection and Next-Generation Network-Based Application Recognition (NBAR2) QoS. This may drive the need to use management tools like Cisco Prime Infrastructure or third-party solutions such as Glue Networks. Consider Cisco WAAS for all WAN optimization deployments when the branch office routers need a refresh, particularly where price and Cisco router integration are primary criteria.
Strengths
  • Cisco's broad WAN product portfolio, addition of embedded Akamai Web caching, aggressive pricing and global distribution make WAAS a compelling option for Cisco-oriented network teams.
  • Cisco provides a strong advanced service arm to design and implement WOC optimization services.
  • Enterprises with a preference for Cisco solutions will appreciate the ability to deploy the full solution set on one physical platform via the ISR-AX bundle, especially since it is often licensed at extremely competitive prices.
  • Cisco's broader IWAN offering provides support for cloud-based applications via Performance Routing version 3 (PfRv3), local forwarding selection and direct-to-Internet capabilities, combined with Cisco Cloud Web Security (CWS).
Cautions
  • Cisco WAAS does not support application-protocol-specific optimization beyond common capabilities such as Server Message Block (SMB), Exchange, Citrix ICA or SharePoint.
  • The Cisco WAAS appliance does not natively support any application discovery or visibility and reporting capabilities. These capabilities remain supported only via AX bundling on the ISR router. For AVC reporting, Flexible NetFlow data needs to be exported to Cisco Prime or to third-party systems such as LiveAction, CA, InfoVista or Plixer International.
  • Cisco's WAAS Mobile product is an independent product, although integration into its AnyConnect VPN client is under development.
  • Data-center-to-data-center optimization does not support storage-protocol-specific optimization; however, WAAS storage has been increased, and WAAS can scale to 10 Gbps of optimized throughput by pooling WAAS resources using AppNav.

Citrix

Citrix continues to evolve its focus on the broader branch office needs and is expanding solution and sales focus beyond its XenDesktop customer base. Citrix's CloudBridge WOC offering comprises seven physical appliances from small branch office to large data centers, a wide range of virtual appliances, and a SoftWOC client for Windows laptops and desktops. Select appliances also support hosting of Windows services. Citrix is particularly focused on evolving product capabilities in the areas of WAN virtualization and video control and has enhanced its link-bonding capability with WAN path control as well as direct Internet access capabilities. To improve both network and application visibility, CloudBridge has now been integrated with Insight Center. Consider Citrix for data-center-to-data-center, branch-office-to-data-center or cloud optimization, particularly when optimization of Citrix applications is important.
Strengths
  • Citrix supports broad WAN optimization capabilities, as well as good application classification and traffic control capabilities.
  • Citrix has a strong cloud-focused offering with support of Layer 2 bridging, especially with cloud bridging work with Amazon.
  • Citrix has a strong offering for session-based ICA acceleration, hosted virtual desktop (HVD) application visibility.
  • Citrix offers one of the best video optimization solutions of the evaluated vendors, including video stream splitting, video caching of multiple formats, content prepositioning into cache and playback format optimized to the capabilities of the device.
Cautions
  • Citrix's direct and indirect sales force is not always focused on the WAN optimization products.
  • The offering for data-center-to-data-center storage replications is more limited than leading competitors' offerings, but it does support Layer 2 bridging and specific optimizations for NetApp and Hitachi Data Systems storage.
  • Citrix has no carrier partner for managed services; however, Citrix WAN optimization is available as part of NTT's network-based service, and it also partners with Inmarsat.
  • Citrix's visibility and reporting is not on par with leading vendors, although enhancements are planned for 2Q15.

Exinda

Exinda now has a wide range of physical appliances, as well as a virtual appliance and a separate mobile solution. While Exinda continues to add enterprise-specific performance enhancements to its portfolio, it also has added specific capabilities for its managed service provider partners. Exinda delivers a strong platform that combines solid WAN optimization capabilities with leading application and user characterization, including Active Directory integration for user-specific policies. This allows for granular and user-specific content and bandwidth control and reporting into a single platform. Exinda's technology vision is to create a WAN orchestration solution that can assist enterprises in operating increasingly diverse and complex networks. Exinda has added analytics capabilities with a Predictive Recommendation Engine that provides proactive recommendations for problem resolution, policy adjustment and optimization. Exinda also refreshed and enhanced its user interface for support of network analytics. Exinda specifically targets the midmarket enterprise and has also carved out a strong position within the education segment due to its content and bandwidth control abilities. Consider Exinda for branch-office-to-data-center optimization, particularly when detailed visibility, bandwidth and traffic management are priorities.
Strengths
  • Exinda offers one of the industry's strongest and most detailed application traffic visibility and traffic control solutions. It is able to link user identity (via Active Directory integration) to application identification and policy, allowing personalized acceleration and content access decisions, as well as user-based application reporting.
  • Exinda offers enhanced reporting with customized and purpose-built reporting capabilities, with a traffic pattern and trend analysis function for real-time policy and configuration adjustment recommendations.
  • Exinda provides video bandwidth optimization capabilities in the form of video stream splitting and extensive local caching support for both HTTPS and video, with a specific focus on YouTube and Vimeo.
  • Exinda has strong relationships with both network service providers and a growing number of cloud providers, providing additional sourcing options for its products.
Cautions
  • Although Exinda supports a 10 Gbps interface, it does not support solid-state drive (SSD)-based storage, and it does not support storage protocol optimization, making it less suitable than segment-leading vendors for DC-to-DC storage replication with fast connectivity. Exinda's WAN Memory provides reasonable reduction for replication solutions such as NetApp's SnapMirror in moderate bandwidth scenarios.
  • Exinda does not offer WAN path control functionality, local link load balancing or IP VPN for direct Internet access.
  • Exinda's cloud solution is not as evolved as leading providers' solutions, and it needs enhancements, such as tunnel support for cloud-based deployments.
  • Exinda is a relatively small company by both revenue and market share, and enterprises should ensure they have adequate local support from Exinda and an experienced local channel that can also provide service.

FatPipe Networks

FatPipe Networks offers a range of physical WAN acceleration appliances as well as a virtual appliance, with three functional license options: FatPipe IPVPN with WAN optimization add-on, FatPipe Multipath VPN with WAN optimization add-on, and the stand-alone WAN acceleration appliance, which is a common hardware platform. FatPipe originally specialized in WAN link bonding, load balancing and path selection, and it offers one of the market's most advanced WAN path controllers. FatPipe has a good range of commonly used WAN optimization features, such as TCP, UDP, SMB, CIFS, ICA and HTTP, as well as compression and substantial storage for caching. FatPipe also partners with managed service providers, such as AT&T, Windstream and Inmarsat. Consider FatPipe for WAN optimization when it is beneficial to combine basic WAN optimization features with good WAN path control capabilities.
Strengths
  • FatPipe is one of the leading vendors for WAN link load balancing and has very good WAN path control capabilities.
  • FatPipe supports comprehensive application identification, classification and control capabilities.
  • FatPipe offers detailed network visibility and reporting capabilities.
  • The FatPipe solution is relatively simple to operate because all functions are integrated onto one platform and managed with a single high-level user interface.
Cautions
  • Although they do support all of the most common features, FatPipe's WAN optimization features are more limited than those of the leading providers — for example, no MAPI, no storage-protocol-specific optimization, limited video streaming optimization and no application-protocol-specific optimization.
  • FatPipe neither supports video delivery optimization nor provides a soft client.
  • FatPipe's support for cloud services is more basic than that of leading providers, lacking in features such as asymmetric optimization.
  • FatPipe has relatively small numbers of sales and support worldwide, but is currently expanding and is planning to have close to 200 sales and support staff by mid-2015. However, it partners with around 200 resellers internationally and 700 in U.S.

Ipanema Technologies

Ipanema's WOC capabilities are delivered through the vendor's wide range of nano|engine and ip|engine appliances, which are available as both physical and virtual appliances and can operate in symmetrical and asymmetrical configurations. Ipanema also has introduced the tele|engine monitoring and application control agent, the nano|engine appliances for very small branch offices, and a SoftWOC. Ipanema has a strong vision and strategy toward application performance control in a hybrid WAN with highly distributed endpoints, such as internal data centers, branch offices, external cloud services, and remote and mobile users. Ipanema integrates per-connection dynamic path selection support for hybrid WANs, as well as single-ended asymmetric link load balancing for Internet access, and Ipanema has partnered with Zscaler for secure Web gateway services. Consider Ipanema for all branch-office-to-data-center or cloud/SaaS WAN optimization, particularly when sophisticated application-based point-to-multipoint or any-to-any QoS-based (for example, unified communications and collaboration) and Internet/VPN hybrid WANs are important.
Strengths
  • Ipanema supports a unique policy-driven solution based on application performance, SLA configuration and enforcement, integrating application visibility and reporting, dynamic per-flow or per-packet control, WAN path selection, direct access to Internet and WAN optimization in a single, centrally managed system.
  • Ipanema products are available as managed services from many leading network service providers, such as BT and Orange Business Services, and for direct enterprise purchase via system integrators.
  • Ipanema has introduced application traffic classification and control for all types of unified communications and collaboration (UCC) flows (signaling, chat and presence, screen and document sharing, voice, and video) for several vendors, including Microsoft Lync and Polycom.
  • The Salsa management platform has proven scalability and robustness in very large single-tenant and multitenant managed service deployments.
Cautions
  • The product does not yet support stream splitting for live video or caching/streaming for video on demand.
  • Ipanema does not support application-protocol-specific optimization, except for UCC and CIFS traffic.
  • Ipanema's two entry-level branch office devices, nano|2 and nano|5, are targeted at visibility, traffic control and WAN path selection, and they do not support WAN optimization functionality.
  • Ipanema currently has no support for IPsec tunneling to secure paths and direct to Internet for cloud services connectivity, although this is planned for 3Q15.
  • Ipanema's sales and support coverage of the U.S. market is weaker than that of leading vendors in this report; however, it will double its head count in the U.S. during 2015.

NTT Communications

Having completed the integration of Virtela into the NTT global network, NTT is one of the first network service providers to provide a range of virtualized services from within its network, such as firewalls, IP VPN, intrusion prevention system (IPS), URL filtering and WAN optimization. This is based on a network function virtualization (NFV) solution deployed in 50-plus globally distributed local cloud networking centers. NTT has a good vision for its service and plans to expand to over 100 local cloud networking centers, including penetrating into emerging markets like China and India. An orchestration platform enables service activation in near real time and via self-service (enabling pay-as-you-go WAN optimization on demand in the cloud). As a managed service provider, NTT extends cloud-based WAN optimization with on-site deployed appliances when needed. Consider NTT when you want to outsource your entire WAN, including the upper-layer services such as WAN optimization, with the flexibility of both on-site and in-the-network delivered services.
Strengths
  • NTT offers a fully managed end-to-end WAN service with in-the-cloud services, as well as an on-premises managed service. The on-premises service includes dedicated appliances and virtual appliances that run on standard servers or virtual machines or are integrated into routers.
  • Enterprises have a choice of several WAN optimization vendors integrated on the NTT platform for both cloud-based optimization and managed services.
  • The NTT's Cloud Software Defined Networking (SDN) orchestration platform has been integrated with the Universal One portal. This enables enterprises to create and instantly activate new functions — such as firewall, intrusion prevention, URL filtering, IPsec gateway and WAN optimization — for a specific branch office.
  • The cloud-based service is fully on-demand with no long-term contracts and a flexible pricing with hourly, weekly or monthly price options available.
Cautions
  • In order to get best application performance optimization, enterprises must ensure that their branch offices have low latency (25 ms or less) connectivity to the nearest NTT POP or consider using NTT's customer premises equipment (CPE)-based service offering.
  • NTT partners with WOC vendors for significant parts of its road map and product development.
  • The NTT Universal One portal reporting function is not as granular or application-specific as those of leading vendors.
  • In order to use NTT's in-the-cloud services, such as WAN optimization as a service, enterprises must also subscribe to NTT's managed WAN services.

Riverbed

Riverbed continues to lead the WOC market with the broadest capabilities in WAN optimization, network and application performance monitoring, protocol analysis, remote server restoration, and remote storage acceleration. In December 2014, Riverbed was acquired by Thoma Bravo, the same private equity firm that took Blue Coat private in 2012. Riverbed and Blue Coat have different boards of directors, and the businesses should follow independent strategies. However, enterprises should seek confirmation of product road map details to ensure new features that are critical to their deployments are included. Riverbed supports a broad range of physical and virtual appliances, a subscription-based appliance, a mobile client and a high-capacity appliance for DC-to-DC. Since 2013, Riverbed's strategic goal has been to provide a closed-loop system for optimization, visibility and control across the entire enterprise, leading to an evolutionary approach to product enhancements and fewer new and innovative enhancements. Enhancements in 2014 included integration across all products into the Riverbed Application Performance Platform, which now combines SteelHead for WAN optimization, SteelFusion for branch office converged infrastructure, SteelCentral for performance monitoring and SteelScript for open APIs. Consider Riverbed for all enterprise WAN optimization projects.
Strengths
  • Riverbed offers the broadest set of capabilities in the industry, including features for large branch office networks, data center replication and storage networking protocols, and single remote users.
  • Riverbed's SteelFusion appliance offers unique capabilities, allowing applications to remain distributed while storage is centralized.
  • The combination of SteelHead and SteelCentral AppResponse provides very good visibility and reporting capabilities for drill-down reporting across networks, servers, applications, Web apps, pages, objects, sites and users (including end-user experience).
  • The new Secure Transport feature supports an IPsec-encrypted overlay mesh network, and a partnership with Zscaler provides the ability to scan optimized traffic for security purposes before going to the cloud.
Cautions
  • Riverbed's price can be significantly higher than its leading competitors, and although it does respond when competitively challenged, its discount policies can be inflexible and inconsistent.
  • Riverbed's portfolio has become extensive, with six product ranges and multiple products within each range, which can make it difficult to understand how to meet functional needs in a cost-efficient manner.
  • Riverbed has been slow to embrace hybrid WANs, and its WAN path selection capabilities are rudimentary; they lack link quality assessment and performance-based forwarding capabilities, although these capabilities are planned for 4Q15.
  • Gartner clients have reported that the solution can be difficult to manage in complex application environments, which can lead to misconfiguration and degraded application performance. However, Riverbed is adding autoconfiguration capabilities, and support is generally very responsive and highly rated by Gartner clients.

Sangfor

Sangfor's appliance range continues to expand and now supports appliances from a small 4 Mbps branch office appliance to a 2.5 Gbps throughput appliance, as well as a full-featured virtual appliance. However, Sangfor has a more limited market vision than leading vendors. Its key market focus and product evolution is based on the needs of the Chinese market. The Sangfor WANO range supports functionality, such as compression and caching, as well as TCP, UDP, HTTP/HTTPS, MAPI/encrypted MAPI (EMAPI), CIFS, ICA support for proxy optimization on Oracle TNS, Microsoft Exchange Server synchronization, Outlook Anywhere, and QoS features. Sangfor is gradually increasing its presence outside of China and establishing offices in several Asian countries, where it is taking advantage of its established security channel partners. The Sangfor WANO is a good choice for price-sensitive enterprises in Asia seeking branch-office-to-data-center or cloud WAN optimization.
Strengths
  • Sangfor WANO supports a broad range of commonly used WAN optimization features.
  • The Sangfor WANO supports local Web and file caching, firewall functionality, good application and URL classification and control, IP VPN termination, and link load balancing, making it an ideal "all in one box" solution for branch offices that use direct Internet access, particularly connecting to cloud services.
  • Sangfor is a strong and well-established vendor in the Chinese market.
Cautions
  • There is limited application-protocol-specific optimization, and there is no support for dedicated video caching or video stream splitting.
  • Only a small percentage of Sangfor's revenue currently comes from sales outside of China, and enterprises should be cautious about experience and capabilities outside of China. However, Sangfor is expanding presence in the U.S. with its own support staff and partners.
  • Sangfor does not support a mobile client and does not support WAN path control.
  • Sangfor currently only partners with a few Chinese service providers.

Silver Peak

Silver Peak has aggressively championed virtual-appliance-based solutions in both the data center and branch office, with a wide range of virtual appliance configurations for flexible deployment models. However, Silver Peak also offers a wide range of physical appliances, from a small branch office appliance to a high-capacity data center appliance. Silver Peak is maintaining its leadership position in the data-center-to-data-center segment, but continues to expand a comprehensive solution for the branch-office-to-data-center WOC segment. Its WAN path control solution now offers a comprehensive hybrid WAN (SD-WAN) that includes meshed tunneling overlay with path conditioning, multipath WAN control, and optimization for both external SaaS and internal enterprise applications via the Unity fabric and distributed WAN edge devices. The new Unity solution includes the innovative Cloud Intelligence and Advanced Exterior WAN routing, which optimizes external SaaS applications and monitors and maintains performance metrics for more than 30 SaaS services. Consider Silver Peak for all mainstream branch office optimization needs and, in particular, for all data center replication projects.
Strengths
  • Silver Peak offers a very strong solution for optimizing data center storage replication, with segment-leading products and good strategic alliances with data center infrastructure companies, such as VMware, EMC, Hitachi and Dell.
  • Silver Peak has combined products, price, packaging and tailored deployment models to allow storage administrators to deploy WAN optimization specifically for remote replication workloads without a requirement to reconfigure the routed network.
  • The company has a large portfolio of appliances, with flexibility in deployment options (hardware and virtual appliances) and pricing (subscription, perpetual and pay as you grow) with options to convert licenses for free.
  • Silver Peak's dual-ended path selection features link quality assessment and remediation as well as topology awareness. It supports single-ended link load balancing for direct Internet access from branch offices, including IPsec tunneling.
Cautions
  • Silver Peak support of traffic identification, classification and visibility is less granular than segment-leading vendors.
  • Silver Peak still lacks SoftWOC capabilities for mobile users, but its strategy is to use WAN optimization distributed in the WAN via its Unity fabric to address this requirement.
  • The company's video-on-demand support does not provide specific video format caching or support of remote streaming to offload the origin server, although it does incorporate stream splitting and remote office format-independent file caching to offload the network.
  • As it continues to focus on its network-based application optimization approach, Silver Peak offers fewer application-protocol-specific optimizations than other leading vendors.
  • Silver Peak does not have any service provider partners, but a new organization has been created with the aim of establishing service provider partnerships.

Vendors Added and Dropped

We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor's appearance in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may be a reflection of a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor.

Added

NTT Communications has been added because it acquired Virtela.

Dropped

Virtela has been dropped because it was acquired and integrated by NTT.

Inclusion and Exclusion Criteria

Inclusion criteria are used to determine which vendors will be covered in this research. To qualify for inclusion in Gartner's "Magic Quadrant for WAN Optimization," vendors must meet all of the following criteria:
  • Have WAN optimization products or services in general availability and actively sold.
  • Deliver WAN optimization solutions to the enterprise market in at least three regions out of North America, South America, Europe, Asia/Pacific and Africa.
  • Achieve a minimum of $10 million in WAN optimization product revenue or $3 million revenue in ongoing WAN optimization service fees during the past four quarters.
  • Must offer more than just managed on-premises WAN optimization based on another vendor's technology. However, the service may include network-based WAN optimization capabilities that use technology supplied by third parties.

Evaluation Criteria

Ability to Execute

Gartner analysts evaluate providers on the quality and efficacy of the processes, systems, methods or procedures that enable IT provider performance to be competitive, efficient and effective, and to positively impact revenue, retention and reputation. Ultimately, providers are judged on their ability and success in capitalizing on their vision.
Product/Service: This criterion evaluates the vendor's execution on its product road map and product enhancements. This includes evaluating the comprehensiveness of the overall WAN optimization portfolio, including the ability to deliver capabilities in each of four broad categories:
  • Bandwidth reduction capabilities, including compression, caching and/or data deduplication
  • Generic protocol acceleration (for TCP or HTTP, for example)
  • Application-protocol-specific optimization features, such as acceleration of the CIFS file-sharing protocol
  • Network traffic management capabilities, such as prioritization, classification, policy enforcement, traffic shaping, monitoring and reporting, hybrid WAN, WAN virtualization, link load balancing, and direct Internet access
Gartner also evaluated each provider's ability to support a range of deployment scenarios, such as data center to data center, small to large branch offices, virtualized solutions, cloud delivery, mobile solutions and evolving symmetric solutions from "hub and spoke" to "meshed" topologies.
Overall Viability (Business Unit, Financial, Strategy, Organization): This criterion looks at a vendor's investments in the WAN optimization market, the vendor's financial investments and capabilities, and its long-term viability.
Sales Execution/Pricing: This includes capabilities in all presales activities and the structure that supports them. This includes deal management, prices and negotiation, presales support, and the overall effectiveness of the sales channel. For the WAN optimization market, the sales execution subcriterion is more highly rated than the pricing subcriterion.
Marketing Execution: This criterion is defined as the clarity, quality, creativity and efficacy of programs designed to deliver the organization's message in order to influence the market, promote the brand and business, increase awareness of products, and establish a positive positioning of the vendor's solutions. For example, is the WAN optimization vendor perceived as being strong only in a specific solution, such as data center to data center or traffic management and reporting, or is the vendor perceived as viable across the complete solution spectrum?
Customer Experience: This includes relationships, products and services/programs that enable clients to be successful with the WAN optimization products they purchase. Specifically, this includes the ways customers receive technical support and account support, and in particular, we consider the WAN optimization vendor's global installation and global support capabilities. This extends to considerations such as the WAN optimization product's ease of use, ancillary tools, customer support programs (and their quality) and availability of user groups. We place emphasis on the vendor's customer references and Gartner clients' experience with the vendor.
The following evaluation criteria have not been used:
  • Market Responsiveness and Track Record are evaluated under Marketing Execution.
  • Operations are evaluated under Overall Viability.
Table 1. Ability to Execute Evaluation Criteria
Evaluation Criteria
Weighting
Product or Service
High
Overall Viability
Medium
Sales Execution/Pricing
Medium
Market Responsiveness/Record
Not Rated
Marketing Execution
High
Customer Experience
High
Operations
Not Rated
Source: Gartner (March 2015)

Completeness of Vision

Gartner analysts evaluate technology suppliers on their ability to convincingly articulate logical statements about current and future market direction, innovation, customer needs and competitive forces and how well they map to Gartner's position. Ultimately, we rate Magic Quadrant participants on their understanding of how market forces can be exploited to create opportunity for the provider.
Market Understanding: This criterion is defined as the ability to understand buyers' needs and to translate those needs into products and services. We evaluate how the WAN optimization vendors respond to changing customer needs around cloud services, mobile solutions, small branch office solutions, emerging application architectures and evolving charging options. We also expect to see a consistent track record of feature enhancements together with a sound product road map.
Marketing Strategy: Marketing strategy involves a clear, differentiated set of messages consistently communicated throughout the organization and externalized through the website, advertising, customer programs and positioning statements. For example, is the WAN optimization vendor focusing on a specific solution, such as data center to data center or traffic management and reporting, or is the vendor focusing on the complete solution spectrum?
Sales Strategy: This criterion entails the strategy for selling products that uses the appropriate network of direct and indirect sales, marketing, service, and communications affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. We will evaluate WAN optimization vendors' global distribution strategies, and we expect each vendor's vision to address the increasing importance of managed WAN optimization services.
Business Model: The soundness and logic of a technology provider's underlying business proposition.
Innovation: Innovation describes direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or pre-emptive purposes. WAN optimization vendors with a track record of responding to market needs with early introduction of new features and capabilities will be highly rated. As well as feature innovation, we expect to see innovation in the scope of product offering (for instance, breadth of product range, including data center, branch and remote access products), in high-availability options, and in manageability and maintainability.
Geographic Strategy: This criterion entails the technology provider's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries, as appropriate for that geography and market. For the WAN optimization market, we expect to see a sales and support strategy that recognizes the global nature of many user organizations' WAN optimization needs.
The following evaluation criteria have not been used:
  • Offering (Product) Strategy is covered under Market Understanding and Innovation.
  • Vertical/Industry Strategy
Table 2. Completeness of Vision Evaluation Criteria
Evaluation Criteria
Weighting
Market Understanding
High
Marketing Strategy
Medium
Sales Strategy
Medium
Offering (Product) Strategy
No Rating
Business Model
Medium
Vertical/Industry Strategy
No Rating
Innovation
High
Geographic Strategy
Medium
Source: Gartner (March 2015)

Quadrant Descriptions

Leaders

Leaders exhibit an ability to shape the market by introducing additional capabilities in their product offerings and by raising awareness of the importance of these features. We expect a Leader to grow the market as a whole and to have solutions that resonate with an increasing number of enterprises. Leaders in the WOC market must have a broad feature set, including QoS, generic compression, protocol acceleration and file system acceleration, with the majority of features proved in substantial real-world implementations. They also must offer sales and support on a global basis.

Challengers

A Challenger in this market is a follower from a product or innovation perspective, but it has demonstrated the ability to take its products into the market and to show its relevance to a wide audience. Challengers may have less complete feature sets than Leaders, or they may have new products that are as yet unproved in substantial real-world implementations.

Visionaries

Visionaries need to address the whole market and must exhibit strong market understanding and innovation. They can be pointers to the market's future. However, they currently lack the ability to influence a large portion of the market and have yet to expand their sales and support capabilities globally. In addition, they may have new products that are as yet unproved in substantial real-world implementations, or they may lack the funds to execute with the same capabilities as a vendor in the Leaders quadrant.

Niche Players

Niche Players provide a more limited set of capabilities, and they have not demonstrated enough vision or focused execution to warrant a stronger position in our analysis. They may be indicative of emerging requirements and features. Niche Players may have yet to expand their sales and support capabilities globally. Additionally, they may have new products that are as yet unproved in substantial real-world implementations, or they may lack the funds to execute with the same capabilities as a vendor in the Leaders quadrant.

Context

The WAN optimization market remains dynamic, gradually integrating other functionality, such as WAN path controllers (WPCs), while itself transforming so that WAN optimization can be delivered as a cloud service. New solutions are arising to support cloud services, including SaaS and infrastructure as a service (IaaS) deployments, and allow broader support for virtual WAN optimization. As their application environments become more distributed, enterprises should look beyond traditional appliance models as their application environments become more distributed. We still observe a highly differentiated range of capabilities and optimization effectiveness, so enterprises should continue to do proofs of concept on real-world traffic to test the effectiveness of possible solutions. Because the WAN optimization market continues to expand and evolve, Gartner expects further consolidation over the next 24 months.

Market Overview

WAN optimization is about improving the performance of business applications over WAN connections. This means matching the allocation of WAN resources to business needs and deploying the optimization techniques that deliver measurable business benefits.
WAN optimization is a $1.1 billion market, and we estimate a revenue compound annual growth rate (CAGR) of 2% and unit shipment growth of 12% through 2018 (see "Forecast: Enterprise Network Equipment by Market Segment, Worldwide, 2011-2018, 4Q14 Update"). Unit shipment is growing in several areas: virtual WOCs, integrated solutions, data center to data center and mobile SoftWOCs. Riverbed is the revenue leader with 50% market share, and Cisco is No. 2 with 16% (see "Market Share: Enterprise Network Equipment by Market Segment, Worldwide, 3Q14"). Beyond that, there is a degree of fragmentation because no single vendor accounts for more than 10% and there are multiple vendors that account for 4% to 10% of share. Thus, we anticipate further market consolidation within the next 24 months.
Most networks carry a variety of application traffic types of differing characteristics and importance. Many organizations are striving to manage this traffic to optimize the response times of critical applications and to reduce costs, given that bandwidth continues to represent a significant proportion of operating expenditure for wide-area data networks. Different types of traffic and IT architecture present both difficulties and opportunities for improving the response times of essential applications. For example:
  • Traffic that isn't response-time sensitive (such as email, data backup and personal Web access) can swamp WAN links, leading to slow response times for business-critical applications.
  • Applications that make extensive use of dynamic content, such as Microsoft SharePoint, can swamp WAN links, while delivering poor application response times.
  • Global centralization of branch office servers and data centers can expose latency-sensitive protocols, again leading to slow response times.
  • Public cloud services often introduce additional latency, which degrades application response times.
  • File transfers, OS patch distribution and similar applications, such as the delivery of training videos, can quickly saturate WANs.
  • Repeated transmissions of the same, or similar, files, objects or data patterns can create opportunities for data compression and caching.
  • Growing use of live or on-demand video streaming has become a concern for most enterprises, where significant volumes of video traffic saturate local access links.
  • Dynamic multipoint unified communications and collaboration video sessions can saturate edge network nodes without passing through the data center, making visibility and control very difficult to achieve.
Because enterprises continue to demand improved performance of their applications, WAN optimization solutions keep evolving with improved and increasingly granular application optimization and visibility capabilities. This Magic Quadrant reviews vendors that address the common need to make more efficient and effective use of wide-area connections, regardless of the type of traffic or application.
Although the predominant need still is to optimize the connection between users (both in remote branch locations and single remote users) and centralized IT resources, we also see the continued need to optimize data replication between data centers, and we are seeing early signs of the need to optimize traffic to mobile devices, including tablets and smartphones, and to access externally hosted applications (in the cloud).
The development of the application acceleration market has been driven by customer demand for highly integrated solutions that employ a wide range of techniques to optimize network traffic and that offer scalability and fault tolerance. Vendors in this space initially addressed either the traffic shaping/QoS market or the compression/caching market. These two segments have now largely merged, with most products supporting both sets of capabilities. Increasingly, the combination of application visibility/QoS and latency mitigation is required to achieve acceptable application performance. We therefore see a need for application identification/control and both generic and application-specific optimizations to mitigate the impact of network latency on remote application performance.
While the traditional deployment model has involved internally installed appliances managed by the enterprise IT staff, we are seeing significant changes in the deployment models made available from vendors and providers, as well as new WAN architectures:
  • In branch offices, the capabilities of WOCs now support serverless branch operations, also described as branch office boxes (BOBs). Customers often need to maintain one or two key applications in the branch. BOBs are now leveraging hypervisor or OS capabilities to host one or more applications on the BOB hardware.
  • An alternative offered by most vendors is to install a virtualized WOC in a server at the branch. That server can then run the virtualized WOC along with other virtualized appliances. An advantage is the availability of a standard virtualization environment at the branch and easier replacement of the hardware if there's a failure. However, integration of the branch server can be complex, and hardware bypass network interface cards (NICs) for a fail-to-wire operation may not be available for a particular hypervisor.
  • Virtual WOCs are also being loaded into clouds and used to accelerate cloud-based applications. These deployment models will evolve significantly under the influence of software-defined networking (SDN) and NFV.
  • There is increasing interest in SoftWOC clients for mobile devices, such as smartphones and tablets, but adoption is still limited.
  • Optimization of SaaS applications, such as Office 365, is a key trend that is moving WAN optimization into external data centers or into services from providers such as Aryaka, NTT or Akamai.
  • Access to cloud-based applications increasingly makes use of direct access to the Internet from the branch office to reduce latency. This approach often integrates a cloud-based SWG service.
  • We have seen leading network service providers incorporating WOC appliances — especially from Cisco, Ipanema and Riverbed — in their managed network service portfolio. We are also seeing network service providers expand these solutions to include router-based WAN optimization and WAN-embedded WAN optimization. Alternative delivery models, such as cloud-based solutions or cloud/premises-based hybrid solutions, are generating interest in managed service providers such as Aryaka and NTT and in the Riverbed/Akamai or Cisco/Akamai joint offering.
  • There remains a focus on security — including the acceleration of encrypted protocols such as HTTPS and the security of data stored on WOC systems — as well as secure access to off-premises applications. Ensure that your vendor provides timely support for new versions of applications and protocols and that data in flight and at rest in the appliance is protected by strong encryption. Some vendors can decrypt HVD traffic to provide QoS for interactive versus print and file transfer traffic. In some cases, cross-session compression/deduplication and caching are performed. Other vendors provide QoS only for the encrypted streams, in some cases with guaranteed in-order delivery of packets.
  • As basic acceleration capabilities mature, we see a resurgence of enterprise client interest in visibility and control, both as a means to assure WOC effectiveness and as a bandwidth/response-time planning tool. Providing advanced traffic management capabilities for application and user performance measurement and SLA reporting are key emerging requirements for WOC equipment.
  • As WAN optimization appliances increasingly include WAN path control and local link load balancing capabilities, these products are morphing into SD-WAN solutions.

Magic Quadrant untuk Network Performance Monitoring and Diagnostic

$
0
0


Magic Quadrant for Network Performance Monitoring and Diagnostics

10 February 2015 ID:G00263101
Analyst(s): Vivek BhallaColin FletcherGary Spivak

VIEW SUMMARY

Network professionals support an increasing number of technologies and services. With adoption of SDN and network function virtualization, troubleshooting becomes more complex. Identify the right NPMD tools to detect application issues, identify root causes and perform capacity planning.

Market Definition/Description

This document was revised on 23 February 2015. The document you are viewing is the corrected version. For more information, see the Corrections page on gartner.com.
Network performance monitoring and diagnostics (NPMD) enable network professionals to understand the impact of network behavior on application and infrastructure performance, and conversely, via network instrumentation. Other users and use cases exist, especially because these tools provide insight into the quality of the end-user experience. The goal of NPMD products is not only to monitor network components to facilitate outage and degradation resolution, but also to identify performance optimization opportunities. This is conducted via diagnostics, analytics and debugging capabilities to complement additional monitoring of today's complex IT environments. At an estimated $1.1 billion, the NPMD market is a fast-growing segment of the larger network management space ($1.9 billion in 2013), and overlaps slightly with aspects of the application performance monitoring (APM) space ($2.4 billion in 2013).

Magic Quadrant

Figure 1. Magic Quadrant for Network Performance Monitoring and Diagnostics
Figure 1.Magic Quadrant for Network Performance Monitoring and Diagnostics
Source: Gartner (February 2015)

Vendor Strengths and Cautions

AppNeta

Founded in 2011, Boston-based AppNeta focuses on application performance monitoring. It acquired significant intellectual property and an installed base from the now-defunct Apparent Networks. Much of the heritage of the company comes from NPMD. AppNeta is focused on easy-to-deploy, inexpensive SaaS-based solutions. Its NPMD technologies have changed during the past 12 months, and AppNeta is now more focused on application visibility.
AppNeta's core NPMD features come from its AppView product (for synthetic application availability monitoring), enhanced with SaaS-specific monitoring for Salesforce, ServiceNow, Microsoft Dynamics and Office 365, Google Docs, NetSuite and athenahealth. FlowView provides traffic analysis including both deep packet inspection and flow analysis. The unique component of the offering is PathView, which provides deep path analysis along with patented capacity measurement.
Most of AppNeta's improvements to date have been focused on application measurement, and the efforts are largely seen in the TraceView product, which provides APM for modern Web applications. While the deployment characteristics of each solution component vary between little (small physical or software appliances) to no footprint, the core analysis is done via a SaaS-delivered portal. AppNeta does support on-premises deployments for core NPMD features as well.
AppNeta's NPMD revenue is between $5 million and $10 million per year. AppNeta did not respond to requests for supplemental information and/or to review the draft contents of this document. Gartner's analysis for this vendor is therefore based on other credible sources, including previous vendor briefings and interactions, the vendor's own marketing collateral, public information and discussions with more than 200 end users who either have evaluated or deployed each NPMD product.
Strengths
  • Its full-featured offering, including APM and NPMD within lightweight SaaS delivery, appeals to those wishing to experiment with technologies without large capital investment.
  • PathView's capabilities, including multiple appliance form factors and hardware/software deployment options, appeal to those wishing to measure distributed networks and branch offices.
  • AppNeta has benefited from the growth in SaaS use among enterprises; this differentiates it from offerings that focus on packet or network buyers only.
Cautions
  • Management changes across several executive areas have resulted in a decreasing focus on NPMD.
  • AppNeta is shifting its product and marketing focus away from network monitoring buyers who represent a significant (if slower growing) portion of its current customer base.
  • The modules within AppNeta's offering are linked together, but they do not share a common user interface or back-end data store, creating some fragmentation and inconsistency within the offering.

Automic (Orsyp)

Automic acquired Orsyp in May 2014. Automic has U.S. headquarters in Bellevue, Washington, with global headquarters in Austria. While the company is focused on workload automation, application release automation and automated service orchestration, the acquisition of Orsyp provided the means to build a dedicated business unit focused on NPMD. Orsyp's NPMD tool, while originally rooted in quality of service (QoS)-oriented deep packet inspection capabilities developed internally, is focused on the Sysload and Streamcore products. Orsyp's Sysload 5.80 provides performance and endpoint monitoring capabilities, as well as capacity planning. Streamcore 6.2 adds WAN optimization and network performance monitoring capabilities. Recent feature inclusions are enhanced NetFlow collections (NetFlow v.9 collection capabilities on the central management console), 10 Gbps support and a renovated service-oriented scorecard dashboard. Streamcore probes can manage up to 10 Gbps of traffic for classification and QoS, and probes can be stacked to manage up to 40 Gbps in monitoring only. The improved scorecard dashboard provides the ability to consolidate large numbers of sites and dozens of applications with drill-down capabilities through site, application, flow and packets.
Automic (Orsyp) NPMD revenue is between $11 million and $20 million per year.
Strengths
  • Complementary technologies have been consolidated to provide a well-rounded overall solution, including the ability not only to monitor, but also to depict the QoS and application delivery.
  • The visually compelling user interface captures typical operator workflows well, including troubleshooting and optimization use cases, and demonstrates an innovative approach to present multiple dimensions of status easily.
  • As part of Automic, the NPMD solution is now part of a larger company (combined revenue is roughly triple that of Orsyp alone) with greater resources, and which boasts a solid network of partners (35 channel partners outside of the Americas).
Cautions
  • The former Orsyp solutions are now part of a larger organization that has its primary focus on other technologies, making NPMD an even smaller focus within Automic than it was under Orsyp.
  • While Automic (Orsyp) conducts business globally, it has not yet broadly expanded its NPMD installed base outside of EMEA.
  • Resources devoted to NPMD are limited for this midsize organization.

CA Technologies

CA's extensive history and product set for NPMD was built over many years of acquisitions and organic development. Founded in 1976 and based in Islandia, New York, CA's R&D centers span multiple locations, but are centralized in Fort Collins, Colorado, for core NPMD functions. CA has the largest focused revenue within the IT operations management (ITOM) area, including an extensive product portfolio. CA has been undergoing rapid change, including shifts in strategy around long-term plans.
CA's offerings for this Magic Quadrant are based on the CA Performance Management solution, and completed with other offerings including CA Network Flow Analysis, CA Unified Communications Monitor, and CA Application Delivery Analysis (ADA), which is focused on packet-level inspection. If additional depth is needed, CA has a referral relationship and integration with Network Instruments' Observer GigaStor product for packet storage and analysis. CA has other products for physical and virtual systems and operating system monitoring. Data from the CA components is rolled into CA Performance Management, which provides a single user interface and reporting system across the components. When depth is needed, there are drill-downs into the specific products.
CA's NPMD revenue is between $151 million and $300 million per year.
Strengths
  • CA's broad portfolio includes many functional areas, with a strong partner and internal service capability to implement and maintain the solutions.
  • CA changed its development organization during the past two years in order to become more agile to increase release velocity, providing point releases with fixes and new functionality every three to four months.
  • CA's financial viability, and the fact that the company is public, shows there is limited risk to business stability involved in doing business with the company. New leadership with a proven track record of innovation is a departure from previous leadership.
Cautions
  • Complexity and size of the CA product portfolio continues to be an issue.
  • Scalability of packet analysis and management of the ADA probes are common user complaints; the product doesn't have the same scale issues when dealing with SNMP or flow data.
  • The product is currently designed and used by customers primarily for reporting and dashboard purposes versus guided diagnostic troubleshooting.

Cisco

Cisco's large hardware installed base across network environments gives it a large addressable set of customers across verticals. With extensive software, Cisco provides what customers need to manage a Cisco-centric environment. Founded in 1984, with headquarters in San Francisco, California, Cisco is focused on moving from a network-hardware-centric company to include unified communications, server hardware (Unified Computing System [UCS]), management software and extensive SaaS capabilities for collaboration.
Cisco's offerings include Cisco Prime Infrastructure (PI) for SNMP and flow monitoring, configuration management, and provisioning Cisco hardware devices. Cisco Prime Network Analysis Module (NAM) is an appliance-based solution (physical server, physical module within a device, virtual machine) for packet analysis. The data can be analyzed via PI, and the NAM devices can be managed centrally. Cisco Prime Collaboration (PC) provides monitoring, configuration management and provisioning of Cisco's unified communications solutions. Cisco provides workflows for troubleshooting, and focuses on integration with Cisco technologies along with identity and access management.
Cisco's NPMD revenue is between $51 million and $150 million per year.
Strengths
  • Cisco is in a unique position to support its pervasive networking installed base. Its NPMD solution goes very deep within Cisco technologies and has industry-leading support for Day 1 releases of Cisco hardware and software within the management technologies.
  • Flow generation by Cisco devices (such as Next Generation Network-Based Application Recognition [NBAR2] included in Application and Visibility Control [AVC] 2.0) are among the best and most useful implementations in the industry, supporting recognition and basic performance monitoring of thousands of application types. This is supported in both the devices and the NPMD tools, which leverage NBAR2.
  • The uniform UI across the Prime products makes navigation consistent across modules and implementations.
Cautions
  • Central packet analysis is limited in Cisco solutions, since data is summarized off the NAM devices. This prevents the capability for historical, distributed or deep packet analysis after packets have been processed. The limited capability in this space is done via a dated user interface off a specific NAM instance.
  • Cisco Prime product sets are often included in deals, and used for point solution management; unfortunately, the support for non-Cisco devices is minimal today, requiring buyers to purchase other management tools for availability and performance monitoring, including NPMD.
  • Analytics capabilities are limited; most of the product is based on reporting and presenting large reports of metric data.

Corvil

Corvil's focus has historically been on the need for short-time-scale network monitoring, such as in the high-frequency trading market. Founded in 2000, Corvil is privately held and headquartered in Dublin, Ireland. It recently refocused on improving its streaming analytics platform for IT operations, which brought some initial activity from customers outside of the financial markets for the first time. The company and product transition began in the summer of 2014, with the release of the Corvil streaming analytics platform, called Giga (aka CorvilNet 8.2), in what is planned to be a 12- to 18-month transition. The company is also focused on go-to-market expansion via the indirect sales channel to include two-tier distribution, system integrators and service providers (for example, Dimension Data, BT, CenturyLink, IBM and CSC). The platform includes several new capabilities, including autodiscovery of data sessions on the network, plug-ins to analyze applications and protocols, support for big data platforms and the ability to publish analytic streams to big data and business intelligence (BI) systems. However, Corvil still lacks 40G support.
Corvil's NPMD revenue is between $21 million and $50 million per year.
Strengths
  • The offering can monitor large amounts of data at rapid speeds. This will appeal to companies beyond Corvil's high-speed trading installed base, as concepts such as the Internet of Things (IoT) are adopted into the mainstream.
  • Corvil's NPMD solution excels in terms of multisegment analysis and accuracy of packet analysis.
  • Increased capabilities on analytics and integration with BI systems are a differentiator and unique selling point.
Cautions
  • The user interface is geared to the highly technical network engineer supporting high-speed data environments, limiting the speed of adoption and appeal to those less technically proficient.
  • There are few "greenfield" opportunities in the company's financial vertical core. This will invariably inhibit growth.
  • The company is still relatively small, but has fairly large typical deal sizes, making it somewhat dependent on large deals as it moves to expand to a broader audience.

Fluke Networks

Fluke Networks emerged from Fluke Corp.'s network testing equipment for diagnostics capability in 2000. Fluke Corp. and Fluke Networks are wholly owned subsidiaries of the Danaher Corp. since 1998, but this will change given Danaher's October 2014 announcement of the proposed sale of its communications business (including Fluke Networks) to NetScout Systems, scheduled to conclude in 1H15. The first Fluke Networks product was the OptiView NetFlow Tracker, a network troubleshooting tool. Fluke Networks' offerings have expanded beyond this initial focus, upselling new capabilities to its large footprint of existing OptiView users. Acquisitions, such as Visual Networks in 2006 and ClearSight Networks in 2009, expanded its NPMD portfolio, forming its core solution, Visual TruView 9.5, which features distributed voice over IP (VoIP) and video monitoring support, and advanced path analysis. TruView is designed to serve the needs of large enterprises and carrier-grade service providers. Network Time Machine 9.1 (a scale-out leveraging TruView) and OptiView XG 12.1 (a handheld application and network diagnostic tool) complete the NPMD portfolio. TruView's broad data source support includes packet analysis, flow analysis and SNMP polling. Applications, such as Microsoft Lync and Citrix environments, are also supported. TruView appliances are sized based on network storage and processing requirements. OptiView XG provides endpoint and additional data to TruView to enable centralized troubleshooting analysis. In 2014, Fluke Networks launched the beta version of TruView Live, a SaaS-based delivery solution with monthly and yearly subscription options.
Fluke Networks' NPMD revenue is between $51 million and $100 million per year.
Strengths
  • Strong contextual drill-down capabilities help simplify diagnostic and troubleshooting workflows.
  • Fluke has a well-defined global sales organization demonstrating success via direct sales (in the U.S.) and channel partners (in EMEA and Asia/Pacific).
  • TruView is a single modular appliance-based product offering that allows the customer to repurpose and use each appliance for multiple types of data acquisition.
Cautions
  • Fluke Networks' NPMD strategic road map remains unclear in light of the impending merger of Danaher's communications business with NetScout.
  • Questions surround the extent to which Danaher has achieved technology sharing among the acquired companies that form its communications business (VSS Monitoring, Arbor Networks, Tektronix and Fluke Networks), translating to risks of resource inefficiencies and capability overlap.
  • While the vendor continues to innovate, its ability to demonstrate product enhancements and overall capabilities has regressed.

Genie Networks

Founded in 2000, Genie Networks targets its solutions for the communications service provider (CSP) industry. Based in Taiwan, the company looks to provide scalable yet competitively priced solutions.
Building from a competency in traditional SNMP-based network fault and performance monitoring capabilities, Genie Networks also incorporates deep packet inspection and flow analysis into its current offering, GenieATM 6.3.1. The latest features include support for MPLS VPN networks and extended traffic analysis reports.
Reporting templates for several CSP-oriented use cases are packaged with the default product, and these were augmented in the past year to include greater forensic and BGP routing analysis. The product has also been developed to appeal to security buying centers with the inclusion of spoofed IP detection and other anomaly mitigation features.
Genie Networks' NPMD revenue is between $11 million and $20 million per year.
Strengths
  • Prebuilt reporting templates support key CSP customer support and operations use cases out of the box.
  • Attractive pricing and carrier-grade scalability should continue to stimulate enterprise customer interest.
  • An appliance-based product form factor simplifies implementation, particularly in highly distributed environments.
Cautions
  • Committed CSP and Asia/Pacific prioritization compromises adoption beyond these vertical and geographical focal points, although the EMEA client base has almost doubled in the past 12 months.
  • The product's user interface, while demonstrating some new features, remains perfunctory compared to the most sophisticated examples in the market space.
  • Analytics capabilities are basic, centered on automated baselining to support anomaly detection and on security-focused use cases.

HP

One of the first vendors to offer enterprise network monitoring tools, HP has a long history of investment in this market, and a substantial portfolio and customer base, particularly in network fault management. Even as HP continues to maintain a strong market position, its customers continue to express concern to Gartner regarding HP's focus, strategy and execution. HP's recently announced split will likely result in little to no direct impact on NPMD strategy and execution. HP's NPMD product packaging and pricing has been radically simplified over the past year. A key component of HP's Business Service Management (BSM) offering, the NPMD solution is joined by APM, event correlation and analysis, and other HP technologies to support availability and performance monitoring. HP's NPMD solution is composed of the Network Node Manager i (NNMi) v.10.0, available in Community, Premium and Ultimate editions, with each edition differentiated by the number of types of included Smart Plug-ins, as well as HP Real User Monitor (RUM) v.9.24 (also available in Premium and Ultimate editions) for deep packet inspection.
HP's NPMD revenue is between $151 million and $300 million per year.
Strengths
  • HP's vision for the increasing role of IT operations analytics (ITOA) technologies in NPMD is strong.
  • Data interchange, modeling and process-level integration with other HP solutions is robust.
  • The vendor offers a broad portfolio of complementary availability and performance monitoring products.
Cautions
  • Usability is hindered by multiple, varied and dated user interfaces across the NPMD solution.
  • Customers report difficulty in implementation and management of the complex solution.
  • Implementation and integration of ITOA capabilities is not pervasive, both within NPMD solution components and across the HP BSM portfolio.

InfoVista

InfoVista's history as a carrier-grade and large-enterprise-focused NPMD provider began in 1995, based in Les Ulis, France, with a heavy physical presence in France. Offerings span NPMD, wireless network design and planning, mobile network optimization, and configuration assurance. Product offerings focused on NPMD include VistaInsight for Networks (which includes the Vista360 UI) for visualization across the components in the solution. Those components are 5View Service Data Manager (for data aggregation and analysis of the raw metric data, before feeding up to VistaInsight for Networks); 5View Netflow (appliances that provide flow collection, supporting NetFlow, sFlow, JFlow and Internet Protocol Flow Information Export [IPFIX] data sources); 5View Applications (appliances that provide deep packet inspection capabilities); and the final module, 5View Mediation (for collection of data from appliances doing packet and flow analysis for reporting purposes). InfoVista is active within carrier-specific marketing activities, and contributes to standards bodies for carrier services, such as carrier-Ethernet-focused Metro Ethernet Forum (MEF), in addition to TeleManagement Forum (TMF) and next-generation mobile network (NGMN). It focuses on the service assurance component of the TMF framework, and integration with operations support system (OSS) architectures.
InfoVista's NPMD revenue is between $51 million and $150 million per year.
Strengths
  • InfoVista remains focused on solution scalability, meeting the needs of some of the largest carrier and large-enterprise networks.
  • InfoVista does carrier focus well, expanding offerings specific to those buyers, and increasing support and capability of the products.
  • Flexibility of the InfoVista solution allows it to meet sophisticated use cases, which many other vendors cannot meet.
Cautions
  • Complexity within the InfoVista product line may result in long lead times in implementation, difficulty with product usability, and typically high levels of required consulting — often driven by the need to meet customer-specific use cases.
  • Growth has been slow, since most customers are carriers and large enterprises, although InfoVista has been introducing new offerings to complement existing product lines.
  • InfoVista has a heavy reliance on customers in EMEA, which make up 60% of its installed base.

JDSU (Network Instruments)

In 2014, we have witnessed the completion of JDSU's acquisition of Network Instruments, its subsequent integration into JDSU's Network and Service Enablement business segment, the recent release of updates to its NPMD offering, and announced plans to separate JDSU into two entities in 2015. While this action could provide additional efficiencies and focus in the future, the preceding business integration and sales enablement efforts are only now beginning to bear fruit and will have to shift once more in response to the coming changes. The Network Instruments unit has followed a well-established, vertically integrated technology development strategy, designing and manufacturing most of its product components and software. An OEM relationship with CA Technologies, which had Network Instruments providing its GigaStor products to CA customers, devolved into a referral relationship, but no meaningful challenges have been voiced by Gartner clients as a result of this. Two key parts of the NPMD solution have new product names (Observer Apex and Observer Management Server) and a new, modern UI that is a significant improvement. Network Instruments' current NPMD solution set is now part of the Observer Performance Management Platform 17, and includes Observer Apex, Observer Analyzer, Observer Management Server, Observer GigaStor, Observer Probes and Observer Infrastructure (v.4.2).
JDSU's (Network Instruments) NPMD revenue is between $51 million and $150 million per year.
Strengths
  • Data- and process-level integration workflows are well-thought-out across the solution's component products.
  • Network Instruments' recent addition of a network packet broker product (Observer Matrix) to its offerings may appeal to small-scale enterprises looking for NPMD and NPB capabilities from the same vendor.
  • Packet capture and inspection capability (via GigaStor) is well-regarded by clients.
Cautions
  • While significant business integration activities have not, to date, had a perceptible impact on support or development productivity, this process is ongoing and now part of a larger business separation action that could result in challenges in the near future.
  • The NPMD solution requires multiple components with differing user interfaces that are not consistent across products.
  • The solution is focused on physical appliances, with limited options beyond proprietary hardware.

NetScout Systems

Founded in 1984 and headquartered in Westford, Massachusetts, NetScout Systems focuses almost exclusively on providing network performance monitoring solutions to customers in enterprise, service provider and public-sector markets. Thanks to NPMD market growth, lengthy market tenure and acquisition execution, NetScout maintains a sizable market share. NetScout is no stranger to chasing growth and reactively extending its capabilities via acquisition (acquisitions include Network General, Simena, Fox Replay, Psytechnics and Accanto Systems), of particular interest is its recent announcement of its intention to acquire Danaher Corp.'s sizeable communications business (which includes NPMD competitor Fluke Networks) in exchange for $2.6 billion of NetScout stock. Upon completion, the acquisition will increase NetScout's NPMD market share, but at the expense of significant, potentially lengthy portfolio rationalization efforts due to substantial technology overlap, complexity and the size of the overall acquisition. These efforts will join ongoing and, to date, successful consolidation of acquired adjacent and developed capabilities into NetScout's nGeniusONE v. 5.3 NPMD solution. The products comprising the NPMD solution include nGeniusONE, the nGenius Service Assurance Solution (composed of nGenius Performance Manager, nGenius Service Delivery Manager, nGenius Enterprise Intelligence, nGenius Forensic Intelligence, nGenius Trading Intelligence, nGenius Voice/Video Manager and the Sniffer Analysis suite), and nGenius Intelligent Data Sources (including both hardware InfiniStream Appliances and Virtual Probes for data collection).
NetScout's NPMD revenue is between $301 million and $500 million per year. NetScout did not respond to requests for supplemental information and/or to engage in Gartner's standard procedures to address the contents of this document. Gartner's analysis for this vendor is therefore based on other credible sources, including previous vendor briefings and interactions, the vendor's own marketing collateral, public information and discussions with end users who either have evaluated or deployed each NPMD product. NetScout has sued Gartner over the content of the 2014 NPMD Magic Quadrant, and that lawsuit is pending. In addition, as noted above, NetScout has refused Gartner's invitation to engage in Gartner's standard procedures to address the content of this Magic Quadrant.
Strengths
  • NetScout has a large and loyal customer base.
  • Once third-party market innovators have proven market demand, NetScout has successfully acquired and integrated such complementary technologies.
  • NetScout's patented Adaptive Session Intelligence technology provides technical differentiation in support of growing scalability requirements.
Cautions
  • NetScout's planned, large acquisition of significantly overlapping technologies may result in road map delays, changes in market and product strategy, and leadership churn that impacts customer value in the near and long term, as evidenced by other acquisitions.
  • NetScout's ability to derive and use application context from network data should not be confused with full APM capabilities.
  • The hardware-dependent solution is priced at a premium, with limited upgrade paths.

Niksun

Founded in 1997, headquartered in Princeton, New Jersey, Niksun offers both network performance and security products. Products exist under the broad umbrella of the recently announced Alpine 4.5, which is designed specifically for large-scale network monitoring. While offering appliances and architectures to suit network infrastructures of all sizes, the vendor's NetVCR Alpine appliance supports high-fidelity data capture and analytics at speeds exceeding 100 Gbps. Other products include Virtual NetVCR (NetVCR for virtual environments), NetTradeWatch (which offers visibility into the trading network environment), NetVoice Alpine (for VoIP oversight and administration), IntelliNetVCR (portable NetVCR for field professionals), FlowAggregator Alpine (a flow traffic collector) and NetBlackBox Pro (a scaled-down version of the appliance that is designed for high-performance data capture and simple analytics).
Niksun has primarily focused on global service providers and other highly network-dependent industries, including large financial institutions and defense and intelligence communities. The vendor's current NPMD solution consists of the NetVCR family of products (for line-rate packet capture and analytics).
Niksun's NPMD revenue is between $21 million and $50 million per year. Niksun did not respond to requests for supplemental information and/or to review the draft contents of this document. Gartner's analysis for this vendor is therefore based on other credible sources, including previous vendor briefings and interactions, the vendor's own marketing collateral, public information and discussions with more than 200 end users who either have evaluated or deployed each NPMD product.
Strengths
  • Packet capture in excess of 100G and broad analysis support in recent releases allow Niksun to maintain a leading position at high speeds.
  • Niksun provides interfaces to a broad array of large IT vendors including Microsoft, Cisco, IBM Tivoli, HP ArcSight, Juniper Networks, Gigamon, VMware and Intel (McAfee), providing customers with flexibility when using complementary solutions.
  • The vendor has a long history and remains an innovator at the high end of the market by introducing new features before competitors.
Cautions
  • Niksun is not positioned as a pure-play NPMD vendor despite innovation in the space. Its marketing collateral leads first with security solutions, then with its NPMD solutions.
  • Market presence and messaging are limited, inhibiting growth potential.
  • Niksun's focus on the premium high end inhibits its ability to aggressively expand its installed base.

Riverbed

Riverbed, founded in 2002 and headquartered in San Francisco, California, focuses on application delivery, acceleration and performance monitoring. During the past five years, Riverbed has assembled a broad set of performance monitoring capabilities primarily through acquisition. The acquired technologies (from Mazu Networks, Cace Technologies and Opnet Technologies, now all branded as SteelCentral products) have seen recent brand and product name updates to better indicate support of both NPMD and APM, as well as relationships to each other. Further integration and consolidation remains incremental and focused largely on the data interchange and analysis dimensions, as the solution still comprises nine individual core products of varying delivery methods; however, the solution continues to provide more than competitive technical depth and breadth. The Riverbed NPMD solution includes SteelCentral Dashboards (previously RPM Dashboards) v.2.3, SteelCentral NetProfiler (previously Cascade Profiler) v.10.7, SteelCentral NetShark (previously Cascade Shark) v.10.7, SteelCentral Packet Analyzer (previously Cascade Pilot) v.10.7, SteelCentral AppResponse v.9.5, SteelCentral Transaction Analyzer (previously Opnet AppTransaction Xpert) v.17.0, SteelCentral NetSensor (previously Opnet AppSensor Xpert) v.2.0, SteelCentral Web Analyzer (previously Opnet AppResponse Xpert BrowserMetrix) v.2.2, and SteelCentral UCExpert (previously Opnet Unified Communication Xpert) v.5.0.
Riverbed's NPMD revenue is between $151 million and $300 million per year. The pending acquisition of Riverbed by Thoma Bravo and Teachers' Private Capital was not factored into this Magic Quadrant evaluation, as it occurred after the assessment cutoff.
Strengths
  • Riverbed's technical breadth and depth is often cited as a key positive differentiator in competitive evaluations.
  • A focus on application delivery quality across all solution components is evident and useful, particularly for those invested in other Riverbed offerings.
  • Multiple ITOA capabilities are utilized across solution components.
Cautions
  • Riverbed's NPMD solution is a visibly complicated combination of several unique and complex hardware and software technologies.
  • Continued activist investor involvement negatively impacts corporate stability and ability to execute.
  • Product line and naming changes continue to create confusion.

SevOne

Founded in 2005 and headquartered in Wilmington, Delaware, by a serial entrepreneur and a technologist, SevOne has maintained rapid growth to date. SevOne's NPMD solution consists of the SevOne Performance Appliance Solution (SevOne PAS) and Performance Log Appliance (PLA). The $150 million venture capital funding from Bain Capital in January 2013 remains the largest in the history of the NPMD market. The SevOne PAS has gained a reputation in the market for its scalability and flexible distributed architecture. Monitoring of Citrix infrastructure through the ingestion of AppFlow records is another notable capability, although Microsoft Lync support is limited.
In April 2014, SevOne acquired RapidEngines, a provider of log analytics solutions. SevOne recognized the opportunity that such technology presented to network domain specialists, and, in June 2014, brought to market its PLA product that enabled a single-click metric-to-log correlation view. Other feature improvements include enhanced WLAN traffic analysis reporting, which provides sound logical representation through an intuitive UI.
SevOne's NPMD revenue is between $51 million and $150 million per year.
Strengths
  • Integration of PLA has been rapidly executed upon, successfully adding value to the portfolio.
  • The patented distributed peer-to-peer architecture is highly scalable and facilitates a buy-as-you-grow deployment approach.
  • A rapid flow analysis engine enables the highest reported flows and polling instances on a single appliance.
Cautions
  • Rapidly expanding reseller agreements will dilute focus of resources dedicated to supporting each channel partner, which, in turn, may affect the end users they serve. SevOne has demonstrated an evolved channel strategy in anticipation of this impact.
  • While support for software-defined networking (SDN) is a strategic goal, no current capabilities exist to support the SDN controller or SDN environments.
  • Depth into packet data is comparatively limited due to this component being an OEM offering of third-party technology and based on flow analysis.

Vendors Added and Dropped

We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor's appearance in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may be a reflection of a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor.

Added

Cisco — Inclusion criteria concerning flow-based technology support have changed this year, which now qualifies Cisco for this Magic Quadrant.

Dropped

Lancope — This vendor has reduced its focus on IT operations and is increasingly aligned more closely with security-oriented use cases and scenarios.
Paessler — This vendor does not meet the scalability criterion of a single instance of the tool supporting 10G environments at full line rate.
Please Note: While Ixia's Spyke product does support NPMD, the company announced in October 2014 that it would no longer be selling it. Therefore, it does not qualify for inclusion in this Magic Quadrant.

Inclusion and Exclusion Criteria

Product-Related Criteria

Vendors were required to meet the following criteria to be considered for the 2015 NPMD Magic Quadrant:
  • Offer the ability to monitor, diagnose and generate alerts for:
    • Network endpoints — Servers, virtual machines, storage systems or anything with an IP address, by measuring these components directly in combination with a network perspective.
    • Network components — Routers, switches and other network devices. This includes SDN and network function virtualization (NFV) components.
    • Network links — Connectivity between network-attached infrastructure.
  • Offer the ability to monitor, diagnose and generate alerts for dynamic end-to-end network service delivery as it relates to:
    • End-user experience — The capture of data about how end-to-end application availability, latency and quality appear to the end user from a network perspective. This is limited to network traffic visibility and not within components, such as what APM is able to accomplish.
    • Business service delivery — The speed and overall quality of network service and/or application delivery to the user in support of key business activities, as defined by the operator of the NPMD product. These definitions may overlap as services and applications are recombined into new applications.
    • Infrastructure component interactions — The focus on infrastructure components as they interact via the network, as well as the network delivery of services or applications.
  • Provide support for analysis of:
    • Real-time performance and behaviors — Essential for troubleshooting in the current state of the environment. Analysis of data must be done within three minutes under normal network loads and conditions.
    • Historical performance and behaviors — To help understand what occurred or what is trending over time.
    • Predictive behaviors by leveraging IT operations analytics technologies — The ability to distill and create actionable advice from the large dataset collected (see the data sources listed below).
  • Leverage the following data sources:
    • Network-device-generated data, including flow-based data sources inclusive of NetFlow and IPFIX.
    • Network device information collected via SNMP.
    • Network packet analysis to identify application types and performance characteristics.
  • Demonstrate the ability to support the following scalability and performance requirements:
    • Real-time monitoring of 10GbE networks at full line rate via a single instance of the product.
    • Ingest sampled flow records at a rate of 75,000 flows per second via a single instance of the product.

Non-Product-Related Criteria

  • A minimum of 10 NPMD customer references must be included at the time of survey submission.
  • Customer references must exclude security-oriented use cases and scenarios.
  • Customer references must be located in at least two of the following geographic regions: North America, South America, EMEA and/or the Asia/Pacific region/Japan.
  • Total revenue (including new licenses, updates, maintenance, subscriptions, SaaS, hosting and technical support) must have exceeded $7.5 million in 2013, excluding revenue derived from security-related buying centers.
  • The vendor should have at least 75 customers that use its NPMD product actively in a production environment.
  • The product and specific version submitted for evaluation must have been shipping to end-user clients for production deployment and designated with general availability by 31 October 2014.

Evaluation Criteria

Ability to Execute

Product/Service: Gartner makes judgments from a variety of inputs in order to evaluate the capabilities, quality, usability, integration and feature set of the solution, including the following functions:
  • Data source support, including application and network device log data
  • Behavioral analysis
  • Diagnostic workflows
  • Real-time monitoring
  • Day-to-day maintenance of the product
  • Ease and management of deployment and configuration
  • Ease of use and richness of functions within the product
  • Product deployment options and usability
Overall Viability (Business Unit, Financial, Strategy and Organization): We consider the vendor's company size, market share and financial performance (such as revenue growth and profitability). We also investigate any investments and ownership, and any other data related to the health of the corporate entity. Our analysis reflects the vendor's capability to ensure the continued vitality of its NPMD offering.
Sales Execution/Pricing: We evaluate the vendor's capability to provide global sales support that aligns with its marketing messages; its market presence in terms of installed base, new customers and partnerships; and flexibility and pricing within licensing model options, including packaging.
Market Responsiveness and Track Record: We evaluate the execution in delivering and upgrading products consistently, in a timely fashion, and meeting road map timelines. We also evaluate the vendor's agility in terms of meeting new market demands, and how well the vendor receives customer feedback and quickly builds it into the product.
Marketing Execution: This is a measure of brand and mind share through client, reference and channel partner feedback. We evaluate the degree to which customers and partners have positive identification with the product, and whether the vendor has credibility in this market.
Customer Experience: We evaluate the vendor's reputation in the market, based on customers' feedback regarding their experiences working with the vendor, whether they were glad they chose the vendor's product and whether they planned to continue working with the vendor. Additionally, we look at the various ways in which the vendor can be engaged, including social media, message boards and other support avenues.
Table 1. Ability to Execute Evaluation Criteria
Evaluation Criteria
Weighting
Product or Service
High
Overall Viability
Medium
Sales Execution/Pricing
High
Market Responsiveness/Record
High
Marketing Execution
Medium
Customer Experience
Medium
Operations
Not Rated
Source: Gartner (February 2015)

Completeness of Vision

Market Understanding: This criterion evaluates vendor capabilities against future market requirements. The market requirements map to the market overview discussion and look for the following functionality:
  • Data source support, including application and network device log data
  • Behavioral analysis
  • Diagnostic workflows
  • Real-time monitoring
  • Virtualization (NFV and SDN)
Marketing Strategy: We evaluate the vendor's capability to deliver a clear and differentiated message that maps to current and future market demands, and, most importantly, the vendor's marketing effectiveness to the NPMD market through its website, advertising programs, social media, collaborative message boards, tradeshows, training and positioning statements.
Sales Strategy: We evaluate the vendor's approach to selling NPMD in the appropriate distribution channels, including channel sales, inside sales and outside sales.
Offering (Product) Strategy: We evaluate product scalability, usability, functionality, and delivery model innovation. We also evaluate the innovation related to the delivery of products and services.
Business Model: This is our evaluation of whether the vendor continuously manages a well-balanced business case that demonstrates appropriate funding and alignment of staffing resources to succeed in this market. Delivery methods will also be evaluated as business model decisions, including the strength and coherence of on-premises and SaaS solutions.
Vertical/Industry Strategy: We evaluate the targeted approaches in marketing and selling into specific vertical industries.
Innovation: This criterion includes product leadership and the ability to deliver NPMD features and functions that distinguish the vendor from its competitors. Specific considerations include resources available for R&D and the innovation process.
Geographic Strategy: This is our evaluation of the vendor's ability to meet the sales and support requirements of IT organizations worldwide. In this way, we assess the vendor's strategy to penetrate emerging markets.
Table 2. Completeness of Vision Evaluation Criteria
Evaluation Criteria
Weighting
Market Understanding
High
Marketing Strategy
Medium
Sales Strategy
Medium
Offering (Product) Strategy
High
Business Model
Low
Vertical/Industry Strategy
Low
Innovation
High
Geographic Strategy
Low
Source: Gartner (February 2015)

Quadrant Descriptions

Leaders

The Leaders quadrant represents those vendors that are pushing the NPMD market forward, including those with comprehensive portfolios and the ability to handle multiple application and technology types. They offer a choice of hardware or software appliances for optimum flexibility. Additionally, the use of SaaS delivery methods within portfolios gives enterprise IT teams more choices, while making formerly premium priced NPMD solutions attainable by midsize organizations. All Leaders offer a high degree of application-aware insight and visibility.

Challengers

Challengers consist of those vendors with high market reach and large deployments. Once leaders in the network performance monitoring market, they are currently struggling to deal with new technical demands and rising expectations. These established NPMD vendors bring a substantial installed base, but also architectures, feature sets and pricing structures that require modernization (often in progress) to better compete with those in the Leaders quadrant.

Visionaries

Visionaries have built a compelling plan to competitively address current and future NPMD customer demands. The Visionaries are combining elements of APM, infrastructure performance monitoring (IPM) and NPMD in ways that provide deeper visibility than is currently available from other vendors. Presently, execution is limited either by insufficient market reach or by the extent of existing tools and technology capabilities that are not initially designed, or able, to meet these needs.

Niche Players

Niche Players are those vendors with solutions catering to specific audiences or with limited use-case support today. They have often been unable to address the needs of larger enterprises or have only done so within specific verticals or market segments. Each of these vendors is working to appeal to the broader NPMD buying community, versus the targeted use cases they serve today. With the right changes to their product plans, positioning and/or business execution strategies, any of these vendors could successfully shift their differentiated technologies to address use cases in ways that today's Leaders might have a hard time matching.

Context

NPMD solutions should be considered as part of a larger network management initiative, that is, part of an overall availability and performance monitoring strategy. Utilizing these additional points of reference will yield further unique criteria (such as existing investments, investment plans, vendor relationships) that, when combined with Gartner analysis, can prove critical to proper solution selection.
In the course of this research, several key observations emerged that should be carefully considered during NPMD strategy formulation and solution selection, including:
  • Products have been mostly stagnant. The use of IT operations analytics has not fully materialized to date.
  • The potential for market disruption via alternative delivery models and innovation is high.
  • Ease of use remains an area that needs improvement and varies significantly both across vendors and within solutions.
  • Virtualization and SDN support is minimal in most NPMD solutions.
  • Flow protocol support and actual flow data utilization vary significantly across vendors.
  • Pricing and product/capability packaging vary significantly across vendors.
  • On-premises appliances are the dominant delivery model, but software and SaaS offerings are available (see Note 1).
  • Integrations with other ITOM solutions (even other availability and performance solutions) are an afterthought for most, thus encouraging the use of these tools within the network silo.
  • Many NPMD solutions are assembled from multiple products, which can enable modular adoption of NPMD capabilities, but also can add significant complexity to procurement and ongoing maintenance.
It remains imperative that organizations purchase tools that closely match their current maturity levels. It is now a reality that many network monitoring teams have yet to successfully make the leap from basic, reactive network availability management to proactive performance management. While tool investment can play a part in this maturation, it is clear that simply investing in NPMD tooling without similar investments in training, integration and processes will yield limited results at best. Gartner recommends that network teams assess their current state of maturity on a regular basis, both individually and at the organizational level, to provide this perspective. To help, teams can utilize Gartner's ITScore for infrastructure and operations (ITSIO; see "How to Improve I&O Maturity by Using the ITScore").
Organizations should not utilize the Leaders quadrant as a shortlist of appropriate vendors, but instead should build a list of criteria that describe their current and future needs, and then select from vendors that best meet those requirements. Organizations should select a vendor that has both a history of and future plans for focusing on this market. Careful consideration should be given to required skills, training, process and deployment investments, because these factors will have a much greater impact on the overall value realized from an NPMD investment than any specific functional capability found in a given tool.

Market Overview

NPMD: A Mature Market Evolves Rapidly in Response to New Demands

For decades, the well-established practice of network management has enjoyed no shortage of available monitoring technologies, tools and vendors; however, the vast majority of those solutions, both acquired and implemented over the years, have been designed to support isolated, reactive resolution of availability issues by network specialists. There have also been many investments in tools and skills, with the specific goal of monitoring the performance of network infrastructure in addition to its availability; however, these efforts have typically been hampered by technology limitations and isolated implementation. This approach, while delivering moderately satisfactory results for many years, has proven inadequate in the face of several key shifts, including:
  • Increasing recognition that network traffic is a critical source of information about the behavior of the holistic IT stack
  • Rising demand for network services and end-user expectations of their quality
  • Growing appreciation of the network as a critical component of IT services and as an agnostic, trusted source of cross-domain availability and performance data
  • Exponential growth in application and infrastructure dynamism and complexity
Each of these shifts has pressured network teams to rethink their tooling strategy, so that they can get the visibility they need to truly monitor and troubleshoot the performance of their network resources in the context of the applications and services they support. A subset of the overall network performance monitoring market, NPMD has emerged as a unique market designed to address these very needs in today's increasingly complex environments. A fast-growing subsegment, the NPMD tool market is currently estimated by Gartner to be approximately $1.1 billion in size.
NPMD tools provide this required breadth and depth of visibility in both real-time and historical perspectives by uniquely analyzing data from all three of the following sources. Previous approaches that only take into account one or two of the following data sources have proven to be inadequate, so all three must be supported for a tool to be considered an NPMD solution (see Note 2).

SNMP Polling

Period polling is one method that looks to quantify network usage of network elements to gauge the requirements of the infrastructure. Each network device has embedded agents that "speak SNMP." These agents can then be interrogated with a polling-based approach, returning metrics from the embedded agent. These collected metrics can be stored, reported on, analyzed for troubleshooting or used for capacity planning. SNMP polling can also be used to gather information about hardware or software errors (faults) and capacity data (for example, triggering an alert when a hardware fault occurs, the device CPU is above a threshold or the interface capacity is abnormal when compared to a baseline). Based on the metrics gathered, the network team can estimate the delta between existing and required bandwidth needs on a per-location basis. A limitation with this method is the minimal granularity it offers, which matches the frequency of the polling. In most NPMD technologies, SNMP is used during troubleshooting to collect additional data, whereas in availability monitoring, it's used more regularly to understand the health of the network devices.

Flow-Based Technology

Summarized data is generated by the network devices, including characteristics of the IP conversation between two network nodes, and these characteristics are embedded within flows. Flow data is exported from the network devices to the NPMD technologies, which then collect and process this data stream to provide insight into which devices and applications are consuming bandwidth, how long the conversations are lasting, and who is participating in them. Since the data is summarized, a degree of detail is removed to simplify processing and extract meaning from the actual network data. Flow-based data does not provide details down to a specific set of network packets going between the source and destination, and can have a performance impact on the devices exporting flow data.
There are several flow collection standards, such as Cisco's NetFlow (v.5/v.9), Juniper's JFlow, Huawei's NetStream, Citrix's AppFlow, Riverbed's Cascade Flow, the Internet Engineering Task Force's (IETF's) IPFIX (which is based off NetFlow v.9) and sFlow from the sFlow.org consortium. Vendor-derived standards are predominant, which hinders integration and comparisons. Flow data collection is a function embedded in the network devices themselves. The device analyzes the network traffic traversing from one interface to another, with the primary purpose of assessing bandwidth consumption, and the level of data being sent and received between various source and destination ports across the network. That data is then summarized into a stream-of-flow record that is sent to the monitoring tools that collect and assess the flow records.
Additionally, the quality and granularity of flow information are always evolving. Many vendors embed additional data within their flows, especially those implementing flexible record types, such as Cisco's IOS Flexible NetFlow, which allows the user to configure the exported data format. Example data embedded in flows contains wireless protocols, link aggregation, URLs, latency information, and other application or infrastructure monitoring data. With such open standards in flow technologies, the architecture varies between network equipment vendors, but most tools collect and process the data regardless of the network equipment implementation.

Packet-Based Technology

Examining the current infrastructure in detail on a per-packet basis provides the necessary real-time and historical visibility into volatile traffic behavior from "bursty" modern application types, like today's chatty Web applications, unified communications services (such as voice and video delivery), and the growing footprint of hosted virtual desktop (HVD) and virtual desktop infrastructure (VDI) technologies. Because only raw, unmanipulated packet data is being collected, a vendor-agnostic view of performance can be preserved throughout the analysis. This approach affords far greater insight and precision, but it comes with potentially costly (and for some, impossibly costly) appliance or "probe" implementation requirements.
The modern packet analysis technologies were pioneered more than 20 years ago with Network General's packet Sniffer in 1986. Sniffer was designed to help troubleshoot network issues after they occurred. This technology was acquired several times, and now finds its home with NetScout as of 2007. Through the years, these high-end proprietary packet analysis technologies have commoditized and moved into open source with entrants such as Wireshark, tcpdump and libpcap providing the underpinnings of this technique. These particular open-source technologies have, in turn, been incorporated into countless numbers of other critical open-source projects, such as Snort (intrusion detection system), Nmap (port scanning) and ngrep. These technologies continue to evolve, most recently into enabling real-time visibility and, in many cases, supporting the archiving of packet data for forensics and debugging without requiring the issue to be reproduced for diagnosis.
As the NPMD market continues to grow and develop, Gartner expects that future tool enhancements will center on usability, advanced IT operations analytics and virtualization/SDN support (see "Introducing the Network Performance Monitoring and Diagnostics Market"). Additional vendors are expected to enter the NPMD market, as well as over 30 vendors participating in the larger network performance monitoring market, but they did not meet the criteria specific to the 2015 NPMD Magic Quadrant.

Adjacent and Overlapping Markets

NPMD is, and will likely continue to be, frequently confused with adjacent and component technologies, as it is both a reasonably recent addition to the dynamic availability and performance monitoring market and a superset of multiple network performance monitoring technologies. Because vendors will both intentionally and unintentionally exacerbate this confusion to their benefit, IT leaders are advised to utilize the following definitions to add clarity to their evaluation efforts.

Application-Aware Network Performance Monitoring

A wholly contained subset of NPMD, application-aware network performance monitoring (AA NPM) is a necessary maturation step that adds some degree of application visibility accomplished via packet-based monitoring, which can provide varying degrees of application context to monitored network traffic.

APM

APM tracks the end-user performance of application components, and provides granular troubleshooting tools for the application and its components. It provides this insight by monitoring on five main functional dimensions: end-user experience (EUE) monitoring, application topology discovery and visualization, user-defined transaction profiling, application component deep dive, and IT operations analytics. APM differs from NPMD primarily in its focus on monitoring the quality of the end-user's experience via application interactions across all application and infrastructure tiers, including, but not limited to, the network perspective. See "Magic Quadrant for Application Performance Monitoring" for further details.

IPM

IPM tools focus on the infrastructure topology as defined by storage, server and virtualization professionals and IT generalists who leverage the network to deliver applications to IT end users. The difference between these tools and APM products is that they look at server-level metrics and processes, while also looking at the way servers interact with one another, versus living within the application logic and seeing the code execute. Unlike NPMD products, which cater to network professional use cases and speak in protocols and packet data that those buyers best understand, IPM products focus on IT operations generalists. These generalists need to determine which part of the infrastructure is contributing to poor performance, as well as understand the application's topology from an infrastructure perspective. As agent-based NPMD solutions evolve, they will clash with IPM technologies and how these IPM tools can better enable distributed troubleshooting use cases for network professionals.

NPBs

NPBs assist with traffic aggregation, visibility and overall management of the data being sent to monitoring tools. Vendors in the NPB space often partner and collaborate with NPMD and security vendors as a go-to-market strategy, resulting in marketing messages that can make it difficult to determine which tool is actually performing the monitoring (network performance monitoring or security) and which is facilitating the monitoring by managing the data to be monitored (network packet brokering). We have also seen an increasing number of acquisitions in this space. NetScout and Network Instruments, both of which are in this Magic Quadrant, pair NPBs and NPMD tools together in deals. Other popular NPB vendors include Gigamon, VSS Monitoring, JDSU (Network Instruments), Interface Masters Technologies, Apcon, Datacom, and switch provider Arista Networks. See "Market Guide for Network Packet Brokers" for further details.

Network Fault Monitoring

Network fault monitoring tools indicate the status of network components, such as routers and switches. These tools isolate, aggregate, deduplicate, filter, prioritize and resolve faults/alerts on the network. In some cases, the tools discover and visualize the topology of physical and logical relationships and dependencies among network elements. This helps depict the up/down status of those elements in a contextual map, provide basic root cause analysis (RCA), and enhance error deduplication and suppression capabilities. These tools have been widely deployed, primarily to address the reactive nature of network monitoring in IT operations. They provide network teams with a single location to monitor, alert and coordinate diagnosis of all network-related fault and availability information. These events are useful to help ensure that critical network devices remain available to support the business applications and services that rely on them.

Unified Monitoring

Unified monitoring is a subset of infrastructure monitoring that relies on primarily agentless and API-integration-based data collection methods to monitor the availability of servers, networks, storage and virtualization layers. These tools also do minimal discovery, and acquire physical, virtual and logical topologies and the relationships between them for the purposes of monitoring. They monitor common application instances on OSs, perform synthetic transactions for checking Web application availability, support service and infrastructure grouping, and are multitenant by design. Unified monitoring differs from NPMD primarily in its pure focus on infrastructure availability versus NPMD's focus on performance. Unified monitoring should be supplemented by log analytics, NPMD and APM tooling to support complex troubleshooting and performance monitoring.

Memilih Software Monitoring Tools

$
0
0
Kami kebetulan menangani beberapa produk untuk Network Monitoring dan System Monitoring saat ini, dan salah satu konsumen yang kami temui adalah perusahaan BUMN atau Kementrian.
Nah, mereka mulai windows-shopping dengan melihat-lihat beberapa pilihan untuk menentukan produk dan solusi mana yang paling sesuai dengan keinginan mereka.
Ada konsumen yang memiliki tim IT yang kuat, dan mampu mengoperasikan Linux, maka pilihannya akan jatuh ke produk Nagios XI atau ManageEngine. Karena kedua produk ini memiliki installer yang berbasis Linux.
Kemudian, apabila memiliki tim IT yang kuat di basis Windows, maka produk unggulannya ke ManageEngine dan PRTG. ManageEngine memiliki kekhususan karena banyak tersedia produk pin-point, produk yang sesuai dengan kebutuhannya. Contoh bila hanya untuk network monitoring, maka akan jatuh ke pilihan OpManager. Untuk aplikasi, akan memilih produk AppManager, dan seterusnya. 
Berikutnya yang menarik adalah PRTG. PRTG banyak digunakan karena pilihannya juga banyak digunakan untuk monitoring network, aplikasi dan custom. PRTG dan Nagios memiliki banyak kemampuan untuk monitoring di luar network. Dan kedua produk ini juga memiliki opsi Unlimited. Perbedaannya, Nagios - ManageEngine menghitung berdasarkan IP Device, sedangkan PRTG berdasarkan Sensor. Pengertian sensor ini sangat berbeda juga dengan pengertian Elemen dalam produk Solarwinds. Sensor ini secara default banyak disediakan oleh PRTG, tetapi kita bisa juga menambahkan custom sensor.
PRTG seringkali menjadi pilihan, terutama baik perusahaan penyedia jasa , atau perusahaan dengan remote yang banyak karena kemampuannya. Untuk penyedia jasa, maksimal 5000 sensor per Core Server, kalau dirata-rata hingga 2000 IP Device dengan asumsi 2-3 sensor per device. PRTG jenis ini untuk Service Provider atau Managed Service Provider. Sedangkan untuk perusahaan dengan remote yang banyak, umumnya memilih Unlimited Sensors.
PRTG juga sangat mudah digunakan , dan bahkan tersedia free untuk 100 sensors. Maka tentu banyak menjadi pilihan juga untuk perusahaan kecil yang ingin memonitor jaringan dan server mereka dengan tool yang mudah. 
Salah satu kendala dengan PRTG adalah reportingnya. Kemampuan reportingnya memang sangat baik, tetapi tidak menggunakan sistem database, melainkan raw file, sehingga mampu menampung data yang sangat banyak. Oleh karena itu, dalam banyak implementasi, API PRTG digunakan agar data bisa di-dump ke sistem database lain untuk keperluan analisa dan lainnya.
Tetap saja PRTG menjadi pilihan banyak perusahaan, terutama kemampuan monitor terdistribusi dengan menggunakan Remote Probe. Dengan remote probe, maka proses monitoring lokal dapat dilakukan cukup dengan remote probe, dan hasilnya dikirimkan ke Core Server. 
Khusus untuk perusahaan BUMN, Kementrian, dimana kendala yang sering ditemui adalah ketersediaan hardware yang memadai, ketersediaan SDM yang menggunakan produk dan report yang dihasilkan, dan ini hanya bisa dijawab baik oleh 2 produk, yaitu ManageEngine dan PRTG. Kedua produk mudah digunakan, mudah diinstall (karena berbasis Windows), dan mudah dibaca reportnya.
Silahkan coba dan gunakan PRTG, dengan mendownloadnya di link berikut ini.

7-Eleven Gunakan PRTG

$
0
0

As a leading franchiser of the home of the Big Gulp, Garb-Ko, Inc. operates around 100 7-Eleven® convenient stores throughout Indiana, Michigan and Ohio. Between gas pump controllers, point of sale cash registers, credit and pre-paid phone card interfaces, ATMs, money order kiosks and state-operated supplemental nutrition program terminals, the company's rapidly expanding IT network was due for a major upgrade to standardize connectivity and security and ensure more reliable network availability.
As part of the extensive upgrade program, Garb-Ko installed PRTG Network Monitor by Paessler AG to provide round-the-clock monitoring of all network components and deliver instant alerts anytime network problems arise. With its exceptional ease of deployment, simple network management and unparalleled capacity for keeping tabs on the network, PRTG has helped Garb-Ko reduce troubleshooting time by more than 50 percent, prevent lost revenues and generate a positive return on investment in just the first two weeks.

From Dialup to Advanced Monitoring in Just 24 Months

Charged with planning, budgeting and executing the network upgrade, systems and security administrator Jason Lee set out to not only improve data connectivity and establish remote access from headquarters to each franchise location, but also streamline troubleshooting by actively monitoring each store's multiple connections with a simple, easy to use solution that didn't break the bank.
"When we began, all locations were using dial-up connections and we had no remote access to anything," Lee recalls. "When there was a problem, it not only took us a while to discover it, but our average response time was about 45 minutes-and that's just to troubleshoot the issue, not actually solve the problem."
Depending on the time of the outage, at some of Garb-Ko's busier locations, the store could lose $200 in sales in as little as 20 minutes of downtime. Multiplied over 100 locations and multiple non-integrated systems, a significant connectivity glitch could result in major losses.
With high-speed data connectivity and remote access established across all locations, Lee began looking for a way to integrate real-time monitoring to help him and his small staff keep tabs on the myriad terminals and systems in place at each store-including those provided by outside vendors, like Western Union and pre-paid phone card vendors. Firewall protection in place, Lee put his background in programming to work to build a monitoring program from scratch that would provide visibility across the network to enhance reliability and speed response time.
Despite his programming prowess, "It quickly became obvious that the task was overwhelming," Lee says. "Scalability and reporting were major issues. It was just too much to bring together starting from scratch."

PRTG: The Perfect Fit

Like many other savvy IT specialists, Lee consulted the obvious source to find a solution to meet his needs: Google. A quick search for "network monitoring software" led him to test several solutions, including Numara (he was already using their helpdesk and SLA logging solutions), SpiceWorks and GFI Network Server Monitor.
When these failed to meet his expectations for scalability, reliability, ease of use and cost, Lee chose PRTG Network Monitor for enterprise-wide deployment. He installed a free trial version in one store, and the very next day purchased a 100-sensor license. Within three days, Garb-Ko had eagerly upgraded to the enterprise license with unlimited sensors-a rapid scalability that was virtually impossible with other solutions. Thanks to PRTG's unmatched affordability, Lee says the software generated a positive return on investment, essentially paying for itself, in just the first two weeks in operation.

Reduced Downtime, Greater Efficiency Leads to Fast ROI

Since initial installation, the Garb-Ko team has realized impressive gains in troubleshooting efficiency and improved uptime across the network. PRTG's instant notification system provides automatic alerts when an unusual or out-of-compliance network stat is detected to help IT staff quickly respond to problems as they occur. The system even supports automatic alert routing based on customizable thresholds: certain events are configured to route directly to Level 1 helpdesk support, and after 30 minutes, the trouble ticket automatically escalates to engineering support.
With proactive, ongoing monitoring across all networked assets, PRTG allows the team to review historic usage statistics, traffic patterns and other network operations to spot potential precipitating events leading up to an outage and ferret out possible memory leaks, firmware corruption and other anomalies across the entire landscape-including staff problems and user errors.
PRTG's web-based interface and iPRTG mobile app provides access to the entire network monitoring environment from anywhere, anytime-a particular advantage for Lee and his team of two who must meet the IT needs of some 100 different locations.
"PRTG definitely reduces the stress level and allows us to do a lot with few people," he reports. "Not only is it reassuring that the network is being watched, but it also cuts our troubleshooting time by a good 50-60 percent and helps us to be more proactive in finding and solving problems."

Metrics:

  • Reduced helpdesk response time by approx 70% for computers, networking equipment, servers.
  • Reduced ticket resolution time for internet, vpn, and firewall problems by approx 45%.
  • Gained the famous five 9's of uptime (about 30% of our locations have gained 99.999% uptime status), and about 50% have gained an uptime of 98% or better in the last 12 months.

Savings:

  • Saved about 15% off of our ISP costs due to the bandwidth analyzing, with projected savings of about $30,000 over the next 12 months.
  • We have dropped about 20% in server upgrade costs due to the fact we took advantage of the unusual detection analysis to see where we were over or under utilized, and appropriated migrated from there.

Network Visibility Improves Long-term Planning and Success

Now with more than 400 sensors deployed and managed remotely across its franchise network, Garb-Ko is able to not only ensure the continued flow of data to support revenue growth, but also better plan for IT upgrades when needed. By continuously monitoring its servers, bandwidth, routers and other gear, the company can now see definitive evidence for investing in upgrades or perhaps revising its utilization to make better, more efficient use of its existing resource capacity.
To ensure consistent performance of all network activities, custom sensors also monitor batch file processes. Lee even created 20 sensors to monitor the backup service on the Garb-Ko servers to provide peace-of-mind assurance that backups were being performed consistently and correctly.
"Having PRTG to keep watch over the network has even spoiled the franchisees a bit," Lee says. "Now when something goes wrong, they expect an immediate response, even if it's a vendor problem completely outside of our control. But, we can even use data from PRTG to help vendors troubleshoot problems with their equipment, which helps get our systems back up and keep them running at peak performance to ensure reliable service to the customer."

DEKSTOP CENTRAL kembali ada di MAGIC QUADRANT

$
0
0


Magic Quadrant for Client Management Tools

11 June 2015 ID:G00264801
Analyst(s): Kevin KnoxTerrence Cosgrove

VIEW SUMMARY

Despite being a relatively mature technology, new product capabilities and diverging vendor strategies make selecting a client management tool vendor as challenging as ever for end-user computing and support managers.

Market Definition/Description

End-user computing and support organizations use client management tools (CMTs) to automate system administration and support functions that would otherwise be handled manually. CMT image client systems, track inventory, deploy configuration changes (such as software or patches), enforce configuration standards and assist with troubleshooting. Windows PCs are the primary object of management, but organizations often extend these products to manage Macs and even servers. Enterprise mobility management (EMM) is still a separate market, but organizations increasingly look for a single vendor and management platform to support PCs, Macs and mobile devices.

Magic Quadrant

Figure 1. Magic Quadrant for Client Management Tools
Figure 1.Magic Quadrant for Client Management Tools
Source: Gartner (June 2015)

Vendor Strengths and Cautions

Absolute Software

Absolute Software's Absolute Manage is a leading product for managing mixed Windows and Macintosh environments. The interfaces, functionality and processes used for management remain consistent, regardless of the type of system being managed. A unique feature of Absolute Manage is its use of Persistence technology, which is embedded in the firmware of most PCs and automatically reinstalls the software agent if it is removed. Absolute Manage does not provide the depth or breadth of management functionality that most large enterprises require, but its ease of use, user interface and price point are well-aligned for small and midsize organizations, particularly educational accounts, where Absolute Manage has enjoyed its greatest success. Absolute Manage is a good choice for small and midsize organizations looking for consistent management capabilities across Windows and Mac at an aggressive price point.
Strengths
  • Absolute Manage provides consistent management capabilities and tight functional interoperability across Mac and Windows platforms.
  • Persistence technology provides strong agent health and hardware inventory management capabilities.
Cautions
  • Absolute Software has been slow in providing some client management capabilities that organizations are increasingly requiring, such as the availability of a software title database.
  • Relative to other vendors, Absolute Software's customer base is small, and awareness for Absolute Manage is relatively low, particularly for Windows. The vendor also lacks a strong online community and user groups.

Accelerite

Client Automation, which Accelerite acquired through a licensing agreement with HP, is an enterprise-class product that offers deep levels of management functionality, scalability and strong capabilities for managing remote locations. An ongoing focus for Accelerite is to provide a unified solution incorporating different management offerings within its expanding portfolio of products. Accelerite's goal with Client Automation is to protect and expand its installed base of large enterprises, while at the same time penetrating the midmarket. This will prove to be extremely challenging, given the vendor's limited sales, marketing and support resources. Client Automation is a good fit for organizations experienced in client management that do not require high levels of service and support.
Strengths
  • Accelerite Client Automation has a highly scalable underlying architecture that is particularly strong at managing remote locations.
  • Accelerite is one of the few vendors in this Magic Quadrant that can deliver a consistent set of a client management functionality on-premises, as a SaaS-based cloud offering or through a managed service provider relationship.
Cautions
  • Accelerite is a small vendor with limited sales and marketing capacity that must quickly grow share in the midmarket, while preserving its enterprise business.
  • The feature set of Accelerite Client Automation is more geared toward larger enterprise requirements, and midsize organizations may not be able to exploit its full capabilities (e.g., scalability and remote-office management).

BMC Software

BMC Software offers one of the broadest portfolios of operations and management tools in the market. BMC Client Management (BCM), its CMT targeted at midsize businesses, is sold mostly as an add-on module to other BMC products, most frequently its small and midsize business (SMB)-focused IT service management solutions. BCM offers a good set of basic client management functionality, an intuitive and easy-to-use interface, and strong integration with other BMC Software products. BMC Software is one of the few CMT vendors without a mobile management offering of its own, and invests only minimally in promoting BCM. This raises concerns about the strategic nature of client management as a stand-alone business. BCM is a good choice for users of other BMC Software management products, such as the vendor's IT service management offerings, and especially for those looking for tightly integrated solutions.
Strengths
  • BCM uses a simple user interface, making it accessible to IT staff that lack substantial desktop administration expertise.
  • BCM has tight integration with BMC FootPrints Service Core and BMC Remedyforce Service Desk, at a console, data and process level.
Cautions
  • The absence of an established mobile management offering product will hinder the vendor's ability to provide a unified endpoint management solution.
  • As a stand-alone offering, compared with other products in its portfolio, client management is not highly strategic to the overall success of BMC Software, and receives minimal sales and marketing focus, resulting in low market penetration and a weak community of users.

CA Technologies

CA's Client Automation CMT is noted by its users for its stability and code quality. CA's client management focus in recent years has been on providing management capabilities for desktop virtualization technologies, as well as providing an integrated EMM tool. CA's visibility in this market continues to decline, with few Gartner clients considering Client Automation. Nevertheless, Client Automation is a good fit for organizations looking to manage hosted virtual desktop environments and physical desktops in a single tool, especially for customers of other related CA products, such as IT Asset Manager and Service Desk Manager.
Strengths
  • Client Automation allows administrators to manage physical and virtual desktops similarly with features such as the ability to maintain application assignments for dynamically assembled desktops for VMware View and Citrix XenDesktop.
  • The product has strong software inventory management, providing multiple ways to identify software, including a unique capability called Intellisigs, which allows administrators to identify software more accurately than heuristics or signature-based methods.
Cautions
  • Relative to other vendors, Client Automation has low visibility in the market, and is usually not considered unless part of a larger CA bundle or as an add-on module.
  • Client Automation lacks a strong online community and user groups.

Dell Kace

The Dell Kace OS deployment (K2000) and life cycle management (K1000) appliances offer a strong breadth of management functionality, highlighted by ease of use and setup. Dell released version 6.3 of K1000 earlier this year, which added several targeted features (such as Chromebook support). The vendor has successfully been leveraging its large, global sales organization to increase exposure of Kace within new and existing opportunities, and is making available a free, scaled-down version of the agent for all Dell and non-Dell business laptops and PCs. Dell also discontinued the mobile management (K3000) appliance, and is now focused on integrating mobility management into the K1000. Mobility management is an area in which Dell continues to lag behind other management vendors. Kace is a good fit for organizations that want a product that is easy to deploy and easy to use, and it is particularly well-suited for midmarket, educational institutions and enterprises that may not have the resources or expertise in client management.
Strengths
  • The Dell sales force, which is actively promoting Kace and offering access to the technology integrated with other Dell hardware, gives it a unique sales channel with broad and geographically diverse capabilities.
  • Kace appliances are easy to deploy, maintain and upgrade, which are among the major challenges of CMTs in the midmarket.
Cautions
  • Kace has lagged behind other market-leading CMTs in enabling new functionality and capabilities, particularly in addressing the requirements of larger organizations.
  • Kace is now part of Dell's rapidly expanding software portfolio, and must share focus and investment with other high-profile, high-margin offerings.

Heat Software (formerly FrontRange)

FrontRange was sold to private equity firm Clearlake Capital in February 2015, where it was combined with Lumension, a security and patch vendor, to create a new entity called Heat Software. Heat Desktop & Server Management (DSM) is an easy-to-use client management product regularly bundled with other FrontRange solutions. The majority of Heat DSM's revenue is generated by European customers today; Gartner has yet to see broad-based adoption of the product in North America or Asia. A goal of joining with Lumension is to allow Heat Software to expand its customer base globally over time. Heat DSM offers a good balance of easy-of-use, wizard-driven functionality for less experienced users, and more advanced functionality, such as scripting, for users more experienced with client management. Heat DSM is a good fit for midsize organizations, especially those looking for a bundled set of management offerings.
Strengths
  • Package building has long been a differentiator for Heat DSM. Many client management offerings require third-party products for advanced application packaging, but DSM includes strong native capabilities to help customers build packages.
  • A combined FrontRange and Lumension will allow Heat Software to improve on patch management and overall security capabilities within Heat DSM.
Cautions
  • Heat Software's visibility and presence in the CMT space is low. Organizations may have difficulty finding online peer support, as well as administrators and consultants with Heat DSM experience.
  • Heat DSM's console must be enhanced to improve overall performance and breadth of native management functionality.

IBM

IBM BigFix (formerly IBM Endpoint Manager) excels in patch management, multiplatform support and overall scalability. Organizations also frequently use it to manage servers, particularly midsize organizations that prefer a single tool to manage PCs and servers. During the past year, IBM has been heavily focused on more deeply integrating its enterprise mobility solution and lightweight PC management platform, MaaS360, with BigFix, and enhancing its cloud-based device management capabilities. BigFix is a good choice for organizations that are heavily focused on security configuration management (including patching), and those that require strong multiplatform server management in addition to client management, or scalability to support tens of thousands of endpoints. It is not as good a choice for organizations that require simple usability or that lack strong management tool resources.
Strengths
  • The product's endpoint-oriented intelligence and control, along with its relay server architecture, results in a relatively small server footprint to support highly distributed environments.
  • IBM BigFix provides comprehensive out-of-the-box configuration policies and templates.
Cautions
  • Uptake of OS deployment (OSD) remains low, and IBM's track record of supporting it at large scale is unproven.
  • IBM's customers frequently express challenges with support. Client feedback suggests that support for non-Windows management functionality is not as strong as support for Windows-management functions.

Landesk

Landesk Management Suite (LDMS) is one of the most complete CMTs in the market, but the additional capabilities can also make it complex to use. To address this challenge, Landesk is incorporating Workspaces into LDMS. Workspaces are redesigned consoles optimized for ease of use and functionality specific to a user role (e.g., IT analyst, service desk analyst, asset manager and security administrator). A main goal is to allow Landesk to more deeply penetrate markets other than enterprise, where it does the majority of business today. Landesk also continues to focus heavily on promoting its Total User Management Suite, which makes up only a small portion of the vendor's sales today; however, momentum for user-based management and licensing is growing. LDMS is a good fit for organizations that require multiplatform support, robust management and flexibility to customize management tools.
Strengths
  • Landesk offers one of the most robust sets of management functionality among all client management vendors, with strong cross-device and cross-platform support for Windows, OS X and mobile.
  • The LDMS Targeted Multicast with the peer download option enables administrators to distribute applications using a peer-to-peer model at subnets. Landesk customers have fewer remote package servers than customers using competitive products.
Cautions
  • LDMS can be complex to use, and generally requires experience with and a strong understanding of client management to fully exploit all of its capabilities.
  • Landesk's EMM capabilities are less mature than its PC management capabilities, and integration with LDMS needs to be tighter.

ManageEngine

ManageEngine Desktop Central is an easy-to-use, cost-effective client management product aimed primarily at small and midsize organizations that are heavily standardized on Microsoft Windows. The majority of Desktop Central's revenue is generated from subscription licenses delivered to organizations with fewer than 500 users. Desktop Central's functionality is intuitive, offers a wide breadth of basic management capabilities and is one of the most aggressively priced products available in this solution market. ManageEngine made improvements to Desktop Central during the past year, but the product still lacks depth of functionality in several areas (e.g., effectively managing non-Windows platforms, security and vulnerability scanning), and does not scale effectively to meet the requirements of large enterprises. ManageEngine is a good fit for small and midsize organizations seeking basic functionality for managing Windows environments at lower price points.
Strengths
  • Initial setup and configuration of Desktop Central is straightforward. The interface is intuitive and easy to navigate, and it does not require high levels of client management experience.
  • Desktop Central is one of the most aggressively priced products in the client management space.
Cautions
  • Desktop Central offers basic management functionality, but trails the market in several key areas, including self-service, enterprise scalability and OS deployment.
  • ManageEngine is still small and not as well-known as many of the leading CMT vendors; as such, it has a limited following and limited online community resources.

Matrix42

Matrix42's strategy is to provide workspace management, combining client management, SaaS application provisioning IT service, license management and EMM capabilities (through the recent acquisition of Silverback). Matrix42 has always had a strong focus on emerging and future client management requirements. The vendor's challenge is primarily its lack of a presence outside of Europe, where it still does the vast majority of its business. One of the reasons for acquiring Silverback, located in Australia, was to give Matrix42 a foothold in the Australian market and to expand across the Asia/Pacific region. However, given its limited global presence today and the maturity of the client management market, it will be challenging for Matrix42 to grow its client management business outside Europe. Matrix42 Physical is a good choice for European and potentially Australian organizations that manage complex endpoint environments composed of physical PCs, virtual desktops and mobile devices.
Strengths
  • The vendor provides packaging and scripting capabilities as a cloud service that include more than 1,200 prepackaged software packages.
  • The product has a comprehensive end-user self-service interface, which is independent of the Matrix42 service desk.
Cautions
  • OS deployment capabilities need to be extended. Matrix42 Physical does not currently support multicast OS deployment, and reference feedback indicates challenges with driver management in some environments.
  • Mac management capabilities are incomplete, currently lacking OS deployment, software usage and patch management.

Microsoft

Microsoft continues to maintain the largest market share in the CMT market by a wide margin. Microsoft's licensing strategy of offering System Center Configuration Manager (Configuration Manager) as a part of the Core and Enterprise Client Access Licenses is the main driving force behind this. Microsoft also continues to enable a robust and growing ecosystem of certified third-party modules and snap-ins, which integrate with the Configuration Manager console, allowing Microsoft to present a more complete set of capabilities in competitive situations. Over the past several months, Microsoft has generated a substantial amount of interest in its Enterprise Mobility Suite (EMS), due, in large part, to its integration with Configuration Manager. Microsoft also plans to release a major new version of Configuration Manager in the fourth quarter of 2015. Configuration Manager is a good choice for organizations with strong client management skills, especially those running predominantly Microsoft software.
Strengths
  • Configuration Manager's scalability has been proven through many large customers.
  • Microsoft has a large ecosystem of software vendors and service providers that support Configuration Manager, due to its large market share.
Cautions
  • Support for non-Windows PCs is weak. Configuration Manager lacks patch content for most non-Microsoft desktop applications. Organizations must patch most non-Microsoft applications through traditional software distribution or third-party patch management tools.
  • Remote control is frequently supplemented by third-party products, as it lacks advanced security and auditing capabilities offered by third-party remote control tools.

Novell

Novell ZENworks Configuration Management (ZCM) capabilities are competitive. Its software distribution is strong, offering advanced capabilities for managing application package dependencies and deploying applications to users (rather than merely machines). However, Novell's presence in the CMT market continues to decline. Novell has recently shifted its focus away from selling ZCM as a stand-alone tool for client management and is now offering it primarily as part of its ZENworks Suite, which includes asset management, application virtualization, service desk, and security and disk encryption. ZENworks is a good product, and organizations that are experienced and satisfied with it should have no compelling reason to switch.
Strengths
  • ZENworks allows desktop applications to be managed dynamically. Applications can be launched taking into account user identity, location, time and other factors, without the need to develop scripts or a separate profile management tool.
  • ZCM has comprehensive software distribution capabilities; complex software distribution jobs can be managed more easily in ZCM than in many competitive products, which may require more scripting or manual effort.
Cautions
  • Novell does not have a strong brand in this market, and we continue to see few organizations considering ZENworks beyond legacy Novell customers upgrading from an old version of ZENworks to ZCM.
  • ZENworks does not provide vulnerability assessment or out-of-the-box security configuration assessment capabilities.

Symantec

The Symantec Client Management Suite (CMS) is a comprehensive client management product with deep enterprise functionality and flexibility, and a large installed base of customers. However, challenges prior to the October 2013 release of CMS 7.5 have left customers deciding whether to invest further in the CMS platform or to migrate to an alternative product. While the response from customers that have upgraded to CMS 7.5 has generally been positive, others choose to evaluate alternative offerings. This is due, in part, to past product, stability and support issues. CMS is a viable client management alternative today, but organizations should work with Symantec to understand its long-term focus on and investments in stand-alone client and mobile management tools. CMS is a good fit for organizations with strong client management skills looking for advanced management functionality and flexibility to customize.
Strengths
  • CMS offers great flexibility in managing endpoints; there are many ways to execute the various functions, allowing administrators to tailor the product to processes.
  • Symantec has a large installed base of customers, with one of the largest and most active communities of user groups and online forums.
Cautions
  • CMS 7.5 can be complex to use and may be challenging for users without strong client management experience to exploit its full capabilities.
  • A weak position in mobile management will make it more challenging for Symantec to succeed with a future unified endpoint management product.

Vendors Added and Dropped

We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor's appearance in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may be a reflection of a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor.

Added

No vendors were added to the Magic Quadrant.

Dropped

Kaseya was dropped from the Magic Quadrant. Kaseya Virtual System Administrator (VSA) is a broad IT operations management platform targeted primarily at small and midsize managed service providers, as well as serving midsize end-user accounts. Earlier this year, Kaseya dropped support for operating system deployment and, as a result, no longer meets the inclusion criteria for this Magic Quadrant. However, it remains a good choice for organizations that do not require operating system deployment functionality, and those that value a single solution for client and mobile management, endpoint security, and service desk through the same console.

Other Vendors

There are other vendors in the market that Gartner believes provide strong client management capabilities, but that may not be able to meet all of the Magic Quadrant criteria because of segment, product or market focus.
Jamf Software is one such vendor. Jamf's Casper Suite client management product is designed specifically for managing Apple Macintosh computers. This sole focus allows the vendor to provide leading functionality specific to managing Mac systems. Jamf may be a good choice for organizations with large populations of Macs or those looking to complement existing capabilities with comprehensive Mac management.
Tanium emerged in the last two years, targeting large organizations with globally distributed networks, and challenging many incumbent vendors. Tanium brings real-time endpoint visibility and remediation, which has become increasingly important in today's age of targeted attacks. Tanium is a good choice for organizations that require real-time endpoint visibility and remediation, and are willing to replace or augment desktop engineering processes and tools, which are usually well-entrenched.

Inclusion and Exclusion Criteria

  • $15 million in annual CMT revenue
  • 1,000 active end-user organizations utilizing the CMT
  • 1 million desktops and notebooks actively under management by the CMT
  • Core CMT functionality for Windows PC systems, including:
    • Hardware and software inventory
    • OS deployment
    • Patch management
    • Software distribution
  • 10 new, named customers that have deployed at least 2,500 CMT licenses in the last year
  • At least four new, named customers outside the vendor's primary geography with at least 500 CMT licenses deployed in the last year (in the Americas, EMEA and the Asia/Pacific region)
  • At least four new, named customers in three different vertical markets with at least 1,000 CMT licenses deployed in the last year

Evaluation Criteria

Ability to Execute

The Ability to Execute axis measures the CMT provider on the quality and efficacy of the processes, systems, methods and procedures that enable its performance to be competitive, efficient and effective, and to positively impact revenue, retention and reputation. Ultimately, CMT providers are judged on their ability and success in capitalizing on their vision.
Product/Service: Core features of client management include:
  • Software distribution
  • Hardware and software inventory, including software usage monitoring
  • OS deployment
  • Patch management
Other client management functions, such as remote control, security configuration management and software packaging, are included, but receive less emphasis than the core features listed above. Cross-platform and mobile support, workflow capabilities to automate client management processes, and self-service capabilities are also included. Product scalability, usability and administration are also evaluated, as they relate to being able to meet buyers' current needs.
Overall Viability: This criterion covers the organization's overall financial health, the financial and practical success of the CMT business unit, and the likelihood that the business unit will continue to offer and invest in the CMT, and will advance the organization's portfolio of products.
Sales Execution/Pricing: This assesses the capabilities in all sales activities, the success of the organization in achieving sales goals and objectives, and the structure that supports them. The frequency of appearance on CMT buyer shortlists and the structure, competitiveness and approach to pricing are also considered.
Market Responsiveness/Record: This criterion covers the execution in delivering CMTs and updates consistently and in a timely fashion, the agility to quickly meet new market demands and requirements, and how well the vendor receives and utilizes customer feedback.
Marketing Execution: This assesses the effectiveness of marketing campaigns and programs for the CMT to influence the market; promote the company, brand and business; increase awareness of the CMT; and establish a positive identification with the product/brand and organization in the minds of buyers and partners.
Customer Experience: This criterion covers the relationships, products and programs that enable clients to be successful with the use of the CMT; customer feedback regarding experience working with the vendor, plans to continue working with the vendor, availability and vibrancy of user communities and online forums, general online presence of the vendor, and overall reputation.
Operations: This assesses the ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure dedicated to the CMT, including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis.
Table 1. Ability to Execute Evaluation Criteria
Evaluation Criteria
Weighting
Product/Service
High
Overall Viability
High
Sales Execution/Pricing
High
Market Responsiveness/Record
Medium
Marketing Execution
Medium
Customer Experience
High
Operations
Low
Source: Gartner (June 2015)

Completeness of Vision

The Completeness of Vision axis evaluates CMT providers on their ability to convincingly articulate logical statements about current and future market direction, innovation, customer needs, and competitive forces, as well as how well they map to Gartner positions. Completeness of Vision provides an aggregate measure of the vendors' likelihood of future success in the CMT market.
Market Understanding: This criterion covers the ability of the vendor to understand the wants and needs of CMT buyers, and to translate those into their products and services. Vendors that show the highest degree of vision listen to and understand buyers' wants and needs, and have demonstrated timely inclusion of these capabilities into their endpoint management roadmap.
Marketing Strategy: This assesses the overall marketing vision for the vendor's CMT, including messaging, positioning, target markets, portfolio management and roadmap for endpoint management convergence, and how it is communicated throughout the organization and externalized online, through advertising, customer programs and positioning statements.
Sales Strategy: This criterion covers the strategy for selling products that optimizes routes to market (e.g., direct versus indirect sales, end-user versus service provider), the strength and bundling of additional offerings (e.g., endpoint security, service desk, asset management), and the pricing and delivery models and how they map to customer requirements.
Offering (Product) Strategy: This assesses the approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature set as they map to current and future requirements. Including, but not limited to, mobile device management, unified endpoint management, self-service capabilities, Mac management, server management, virtualization support, integration and security.
Business Model: This criterion covers the strategic nature of the vendor's CMT business, how important it is to the vendor's overall success, and whether its CMT business is structured, staffed and funded adequately to succeed.
Geographic Strategy: This assesses the vendor's strategy to direct CMT resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries, as appropriate for that geography and market.
Table 2. Completeness of Vision Evaluation Criteria
Evaluation Criteria
Weighting
Market Understanding
High
Marketing Strategy
Medium
Sales Strategy
Medium
Offering (Product) Strategy
High
Business Model
Medium
Vertical/Industry Strategy
No Rating
Innovation
Low
Geographic Strategy
Medium
Source: Gartner (June 2015)

Quadrant Descriptions

Leaders

Positioning in the Leaders quadrant is the result of successfully addressing the Completeness of Vision and Ability to Execute criteria. These vendors have succeeded in all the following areas:
  • They understand future organizational demands for client and user management.
  • They have the ability to meet a diverse set of organizational requirements, especially those of large and mature enterprises.
  • There is consistent positive feedback from clients regarding the value of their products and the overall service and support experiences.
  • They have sustainable market share and financial health.
  • They demonstrate ongoing visibility and deal success in the client management market (Gartner tracks how often vendors are being considered by organizations as a measure of visibility).
  • They have the ability to service global clients, or have demonstrated the ability to deliver and support solutions to customers in North America, Europe and Asia.
The vendors in the Leaders quadrant have unique characteristics that position them favorably for future market success.

Challengers

Challengers are defined by keen capabilities related to the Ability to Execute criteria; however, when compared with competitors, they lag behind in delivering new and evolving capabilities, they are slow to market with new functionality or lack complete functionality, or they have comparatively few visionary features, particularly around emerging requirements to manage beyond traditional Windows PCs. This, along with the ability to support new management paradigms, is viewed as necessary to shape the future of the market. Their ability to execute will be proved by solid market share and overall strong functionality. These capabilities are bolstered by overall industry-leading fiscal health and broad geographic presence.

Visionaries

Visionaries are defined by keen capabilities related to the Completeness of Vision criteria. Visionaries have scores that reflect feature-complete products, and show technology leadership in providing differentiated or unique management functions that users have begun requesting, or that will have an impact during the next few years. A Visionary has a strong vision for unified endpoint management and may have particular strengths in certain emerging areas, but may lack a fully mature life cycle management solution, global market presence, brand recognition and/or large enterprise capabilities.

Niche Players

Niche Players can be good choices. They may have strengths in particular areas, but don't have the resources to invest in all the requirements we evaluate for the Completeness of Vision criteria or have chosen to narrow the scope of their offering to better serve core constituencies. Organizations looking for products with specific strengths, or looking for only a subset of capabilities, may find that Niche Players offer sufficient capabilities and support. Niche Players often target specific segments or geographies, are new to the market, or sell their CMTs into their own installed base, rather than consistently as stand-alone solutions.

Context

CMTs perform the same set of core functions — inventory, OS deployment and patch management software distribution. The right tool for any organization depends on a large number of factors, including, but not limited to:
  • Skills level and number of IT staff
  • Scalability and architecture
  • Ease of use
  • Cost to purchase and operate
  • Support for non-Windows PCs (e.g., Mac, virtual machines, servers)
  • Integration with EMM products
  • Integration and inclusion with other IT management tools (e.g., service desk)
  • Remote-office or home-user management requirements
  • Endpoint security requirements
  • Cloud delivery options
Organizations should not merely choose from vendors in the Leaders quadrant; they should create a list of criteria that describes their needs, and select from vendors that best meet those requirements. Organizations should use a vendor that can meet their specific needs for at least the next three years. Strong focus should be placed on skills, training, process and proper product implementation, because these factors will influence an organization's product experience more than the specific functional capabilities.

Market Overview

CMTs are widely used in both midsize and large enterprises, although there is great variability in the extent to which their capabilities are being utilized. For many organizations, they remain the primary means to reduce cost of ownership, improve user productivity, increase IT efficiency and help enable a secure client computing environment. Despite being a highly mature technology market, changes in the mobile and endpoint computing landscape are forcing CMT vendors to continually innovate and evolve their products to address new requirements. A new generation of user requires IT to deliver and manage services in new ways. Bring your own device (BYOD), mobility, user personal cloud and digital workplace programs continue to grow in popularity, and are forcing CMTs to evolve to support these initiatives.
CMTs continue to improve in performing core management tasks, while new capabilities are being added to extend their usefulness in supporting a more diverse set of management requirements. Major areas of vendor focus and product enhancement include:
  • Self-service — The ability of CMTs to deliver self-service capabilities continues to grow in importance as organizations look to enhance the management experience for the user, improve the efficiency with which software and services are delivered, increase user productivity and satisfaction, and lower total cost of ownership. Most CMTs offer some form of basic self-service capabilities, but only a handful provide workflow and automation capabilities out of the box — most require additional modules or service desk tools. Self-service capabilities are increasingly becoming a leading area of differentiation.
  • Patch management — Security and compliance remains a critical focus for most organizations, increasing the need for strong patch management. All CMTs provide patch management capabilities, but there is great variability from one tool to another. Some offer only basic functionality for patching the operating system, while others are more sophisticated in both the breadth of operating systems and applications that they patch, as well as the level of functionality, automation and reporting they provide. Patching is commonly the initial use case for CMTs, and often the primary justification for selecting one tool over another.
  • Unified endpoint management — Organizations are struggling to manage a growing number of smartphones, tablets and BYOD devices connecting to their networks. Even though CMTs are beginning to offer basic functionality to manage these devices, most organizations continue to utilize separate EMM products, often from different vendors. We are toward approaching the beginning of Wave 2 of unified endpoint management (see "Managing PCs, Smartphones and Tablets and the Future Ahead"), where a single product initially using separate processes will manage both traditional clients and mobile devices. As such, it is critical that organizations understand their CMT vendor's ability to manage mobile devices today and their plans for convergence.
  • Security and compliance — Rapidly changing security and compliance requirements being put in place by organizations are forcing CMTs to continually evolve their capabilities beyond just patch management. IT managers are increasingly looking for CMTs to help in automating the creation and enforcement of security standards on policies. This includes the use of security templates and compliance baselines, proactive notification of noncompliance and threats, and automatic remediation and advanced reporting of systems out of compliance. Security and compliance enhancements will continue to be a major area of focus of innovation for all CMT vendors.
The way CMTs are sold varies across vendors. Here's how and why:
  • Client management is sometimes sold as an add-on module to another more strategic product (e.g., service desk). In this case, the CMT may not be as feature-rich as other stand-alone offerings in the market, but it does provide tight integration into other products in the vendor's portfolio. Client management is not usually strategic to the vendor's success.
  • Client management functionality may also be delivered as part of a bundled offering where it acts as core function within a larger overall management suite. These offerings are typically targeted at the midmarket and designed for ease of use. Client management functionality is optimized to work specifically with other components of the same suite.
  • Most often, CMTs are sold as stand-alone offerings and are a primary focus and investment area of the vendor, and strategic to its overall success. CMTs that are sold stand-alone are generally the most robust in breadth and depth of functionality, and provide strong integration capabilities with other products in the market.
Understanding why a vendor competes in the market provides insight into the strategic nature of CMTs within a broader product set, the level of potential investments the vendor will make and how best to approach negotiations with that vendor.
Vendors will claim to be able to address all segments of the market, but that is not the case. CMTs are almost always designed and optimized for a specific set of user requirements. There are always trade-offs that need to be made when designing a product or adding new features that will help in one segment, but negatively impact another. For example, providing deep functionality to manage a large number of devices — an enterprise requirement — almost always comes at the expense of ease of use — an SMB requirement. No CMT today can meet the general user requirements of all organizations.
Service and support, presales and postsales activities, and go to market should also be aligned with the target market of the product. An enterprise-class product delivered from a vendor with SMB capabilities, or vice versa, usually results in misaligned expectations and a poor overall experience.
Client management is a mature market. Switching CMT vendors occurs rather infrequently, especially at large enterprises. This is because there are usually limited meaningful technical benefits in doing so, switching can be a significant effort and the migrations can be time-consuming. This is particularly true where processes have been developed around specific tools. The main reasons we find organizations moving from one vendor to another are because of dissatisfaction with the incumbent provider or to get better pricing. In the midmarket, switching vendors is more common and there are still many organizations with no CMTs in place, which makes it a focus area for all vendors and a highly competitive market.
Viewing all 2781 articles
Browse latest View live




Latest Images