Advertisement
gartner access management magic quadrant 2022: Azure Architecture Explained David Rendón, Brett Hargreaves, 2023-09-22 Enhance your career as an Azure architect with cutting-edge tools, expert guidance, and resources from industry leaders Key Features Develop your business case for the cloud with technical guidance from industry experts Address critical business challenges effectively by leveraging proven combinations of Azure services Tackle real-world scenarios by applying practical knowledge of reference architectures Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionAzure is a sophisticated technology that requires a detailed understanding to reap its full potential and employ its advanced features. This book provides you with a clear path to designing optimal cloud-based solutions in Azure, by delving into the platform's intricacies. You’ll begin by understanding the effective and efficient security management and operation techniques in Azure to implement the appropriate configurations in Microsoft Entra ID. Next, you’ll explore how to modernize your applications for the cloud, examining the different computation and storage options, as well as using Azure data solutions to help migrate and monitor workloads. You’ll also find out how to build your solutions, including containers, networking components, security principles, governance, and advanced observability. With practical examples and step-by-step instructions, you’ll be empowered to work on infrastructure-as-code to effectively deploy and manage resources in your environment. By the end of this book, you’ll be well-equipped to navigate the world of cloud computing confidently.What you will learn Implement and monitor cloud ecosystem including, computing, storage, networking, and security Recommend optimal services for performance and scale Provide, monitor, and adjust capacity for optimal results Craft custom Azure solution architectures Design computation, networking, storage, and security aspects in Azure Implement and maintain Azure resources effectively Who this book is forThis book is an indispensable resource for Azure architects looking to develop cloud-based services along with deploying and managing applications within the Microsoft Azure ecosystem. It caters to professionals responsible for crucial IT operations, encompassing budgeting, business continuity, governance, identity management, networking, security, and automation. If you have prior experience in operating systems, virtualization, infrastructure, storage structures, or networking, and aspire to master the implementation of best practices in the Azure cloud, then this book will become your go-to guide. |
gartner access management magic quadrant 2022: Cloud Identity Patterns and Strategies Giuseppe Di Federico, Fabrizio Barcaroli, 2022-12-23 Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key FeaturesLearn all you need to know about different identity patterns and implementing them in real-world scenariosHandle multi-IDP-related common situations no matter how big your organizationGain practical insights into OAuth implementation patterns and flowsBook Description Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this book, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this book, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. What you will learnUnderstand the evolution of identity in the enterpriseDiscover basic to advanced OAuth patterns and implementationsFind out how OAuth standards are usually adopted in the enterpriseExplore proven solutions for modern identity challengesUse Azure AD for implementing identity solutionsComprehend how company structure and strategies influence design decisionsWho this book is for This book is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this book useful. This book covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful. |
gartner access management magic quadrant 2022: Real Business of IT Richard Hunter, George Westerman, 2009-10-20 If you're a general manager or CFO, do you feel you're spending too much on IT or wishing you could get better returns from your IT investments? If so, it's time to examine what's behind this IT-as-cost mind-set. In The Real Business of IT, Richard Hunter and George Westerman reveal that the cost mind-set stems from IT leaders' inability to communicate about the business value they create-so CIOs get stuck discussing budgets rather than their contributions to the organization. The authors explain how IT leaders can combat this mind-set by first using information technology to generate three forms of value important to leaders throughout the organization: -Value for money when your IT department operates efficiently and effectively -An investment in business performance evidenced when IT helps divisions, units, and departments boost profitability -Personal value of CIOs as leaders whose contributions to their enterprise go well beyond their area of specialization The authors show how to communicate about these forms of value with non-IT leaders-so they understand how your firm is benefiting and see IT as the strategic powerhouse it truly is. |
gartner access management magic quadrant 2022: Costidity Vladislav Shapiro, 2016-01-15 This book is about the cost of the human factor in business and measuring trust. We have found a way to quantify trust, and the cost of human interactions as it relates to your money, time, and operations. We are now sharing our methodology and findings to revolutionize the way business is done, policies are made, and save you millions of dollars in the process. |
gartner access management magic quadrant 2022: The New Normal in IT Gregory S. Smith, 2022-02-23 Learn how IT leaders are adapting to the new reality of life during and after COVID-19 COVID-19 has caused fundamental shifts in attitudes around remote and office work. And in The New Normal in IT: How the Global Pandemic Changed Information Technology Forever, internationally renowned IT executive Gregory S. Smith explains how and why companies today are shedding corporate office locations and reducing office footprints. You'll learn about how companies realized the value of information technology and a distributed workforce and what that means for IT professionals going forward. The book offers insightful lessons regarding: How to best take advantage of remote collaboration and hybrid remote/office workforces How to implement updated risk mitigation strategies and disaster recovery planning and testing to shield your organization from worst case scenarios How today's CIOs and CTOs adapt their IT governance frameworks to meet new challenges, including cybersecurity risks The New Normal in IT is an indispensable resource for IT professionals, executives, graduate technology management students, and managers in any industry. It's also a must-read for anyone interested in the impact that COVID-19 had, and continues to have, on the information technology industry. |
gartner access management magic quadrant 2022: AWS for Solutions Architects Saurabh Shrivastava, Neelanjali Srivastav, Alberto Artasanchez, Imtiaz Sayed, Dr. Siddhartha Choubey Ph.D, 2023-04-28 Become a master Solutions Architect with this comprehensive guide, featuring cloud design patterns and real-world solutions for building scalable, secure, and highly available systems Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features Gain expertise in automating, networking, migrating, and adopting cloud technologies using AWS Use streaming analytics, big data, AI/ML, IoT, quantum computing, and blockchain to transform your business Upskill yourself as an AWS solutions architect and explore details of the new AWS certification Book Description Are you excited to harness the power of AWS and unlock endless possibilities for your business? Look no further than the second edition of AWS for Solutions Architects! Packed with all-new content, this book is a must-have guide for anyone looking to build scalable cloud solutions and drive digital transformation using AWS. This updated edition offers in-depth guidance for building cloud solutions using AWS. It provides detailed information on AWS well-architected design pillars and cloud-native design patterns. You'll learn about networking in AWS, big data and streaming data processing, CloudOps, and emerging technologies such as machine learning, IoT, and blockchain. Additionally, the book includes new sections on storage in AWS, containers with ECS and EKS, and data lake patterns, providing you with valuable insights into designing industry-standard AWS architectures that meet your organization's technological and business requirements. Whether you're an experienced solutions architect or just getting started with AWS, this book has everything you need to confidently build cloud-native workloads and enterprise solutions. What you will learn Optimize your Cloud Workload using the AWS Well-Architected Framework Learn methods to migrate your workload using the AWS Cloud Adoption Framework Apply cloud automation at various layers of application workload to increase efficiency Build a landing zone in AWS and hybrid cloud setups with deep networking techniques Select reference architectures for business scenarios, like data lakes, containers, and serverless apps Apply emerging technologies in your architecture, including AI/ML, IoT and blockchain Who this book is for This book is for application and enterprise architects, developers, and operations engineers who want to become well versed with AWS architectural patterns, best practices, and advanced techniques to build scalable, secure, highly available, highly tolerant, and cost-effective solutions in the cloud. Existing AWS users are bound to learn the most, but it will also help those curious about how leveraging AWS can benefit their organization. Prior knowledge of any computing language is not needed, and there's little to no code. Prior experience in software architecture design will prove helpful. |
gartner access management magic quadrant 2022: Privileged Attack Vectors Morey J. Haber, 2020-06-13 See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today’s environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and monitoring strategies to mitigate privilege threats and risk Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journeyDevelop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems |
gartner access management magic quadrant 2022: Information Technology for Management Efraim Turban, Carol Pollard, Gregory R. Wood, 2021 Information Technology for Management provides students with a comprehensive understanding of the latest technological developments in IT and the critical drivers of business performance, growth, and sustainability. Integrating feedback from IT managers and practitioners from top-level organizations worldwide, the International Adaptation of this well-regarded textbook features thoroughly revised content throughout to present students with a realistic, up-to-date view of IT management in the current business environment. This text covers the latest developments in the real world of IT management with the addition of new case studies that are contemporary and more relevant to the global scenario. It offers a flexible, student-friendly presentation of the material through a pedagogy that is designed to help students easily comprehend and retain information. There is new and expanded coverage of Artificial Intelligence, Robotics, Quantum Computing, Blockchain Technology, IP Intelligence, Big Data Analytics, IT Service Management, DevOps, etc. It helps readers learn how IT is leveraged to reshape enterprises, engage and retain customers, optimize systems and processes, manage business relationships and projects, and more. |
gartner access management magic quadrant 2022: Gartner and the Magic Quadrant Shaun Snapp, 2013-10 If you want to get more out of your Gartner research subscription, this book is for you! Whether you are a software buyer, a large or small vendor, or are wondering how Gartner can help you make better investment decisions, this book will give you new insights to Gartner's research. By studying the methodology behind such popular analytical tools as the Magic Quadrant, you will understand how a vendor earned its rating and whether or not the ratings are justified! Starting with the history of Gartner and how it compares to other IT analyst firms, this book gives a realistic assessment of the value of Gartner research to a company and provides ideas about other resources that could complement Gartner's analysis. You will also have the tools to level the playing field between large, medium and small vendors when using Gartner's analysis in selecting software. By reading this book, you will: Evaluate whether or not a Gartner subscription is of value to your company Adjust the Magic Quadrant to get a more realistic assessment of large and small vendors and their products Increase the value of your interactions with Gartner analysts Understand Gartner's biases and how Gartner makes money, and how this impacts its research results Appreciate the effects of cloud computing on Gartner, and why it matters to you Choose consulting services with confidence Assess the value of Gartner's other analytical products to your business |
gartner access management magic quadrant 2022: Data Governance Dimitrios Sargiotis, |
gartner access management magic quadrant 2022: Economic and Social Implications of Information and Communication Technologies Bayar, Yilmaz, Karabetyan, Lina, 2022-12-19 Enormous developments have been made in the field of information and communication technologies (ICT) during the past four decades as ICT has spread rapidly in the world and become a significant part of daily life for economic units. ICT development and penetration are continuing to affect all aspects of societies and have led to significant changes in almost all disciplines such as education, environment, economics, management, energy, health, and medical care. Economic and Social Implications of Information and Communication Technologies explores the economic and social implications of ICT development and penetration from a multidisciplinary perspective. Covering key topics such as sustainability, public health, and economic growth, this reference work is ideal for managers, industry professionals, researchers, scholars, practitioners, academicians, instructors, and students. |
gartner access management magic quadrant 2022: Trailblazer Marc Benioff, Monica Langley, 2019-10-15 NEW YORK TIMES BESTSELLER • The founder and co-CEO of Salesforce delivers an inspiring vision for successful companies of the future—in which changing the world is everyone’s business. “The gold standard on how to use business as a platform for change at this urgent time.”—Ray Dalio, founder of Bridgewater Associates and author of Principles: Life and Work What’s the secret to business growth and innovation and a purpose-driven career in a world that is becoming vastly more complicated by the day? According to Marc Benioff, the answer is embracing a culture in which your values permeate everything you do. In Trailblazer, Benioff gives readers a rare behind-the-scenes look at the inner workings of one of the world’s most admired companies. He reveals how Salesforce’s core values—trust, customer success, innovation, and equality—and commitment to giving back have become the company’s greatest competitive advantage and the most powerful engine of its success. Because no matter what business you’re in, Benioff says, values are the bedrock of a resilient company culture that inspires all employees, at every level, to do the best work of their lives. Along the way, he shares insights and best practices for anyone who wants to cultivate a company culture positioned to thrive in the face of the inevitable disruption ahead. None of us in the business world can afford to sit on the sidelines and ignore what’s going on outside the walls of our workplaces. In the future, profits and progress will no longer be sustainable unless they serve the greater good. Whether you run a company, lead a small team, or have just draped an ID badge around your neck for the first time, Trailblazer reveals how anyone can become an agent of change. Praise for Trailblazer “A guide for what every business and organization must do to thrive in this period of profound political and economic change.”—Jamie Dimon, chairman and CEO of JPMorgan Chase “In Trailblazer, Benioff explores how companies can nurture a values-based culture to become powerful platforms for change.”—Susan Wojcicki, CEO of YouTube |
gartner access management magic quadrant 2022: Crossing the Chasm Geoffrey A. Moore, 2009-03-17 Here is the bestselling guide that created a new game plan for marketing in high-tech industries. Crossing the Chasm has become the bible for bringing cutting-edge products to progressively larger markets. This edition provides new insights into the realities of high-tech marketing, with special emphasis on the Internet. It's essential reading for anyone with a stake in the world's most exciting marketplace. |
gartner access management magic quadrant 2022: The Real Business of Blockchain David Furlonger, Christophe Uzureau, 2019-10-15 Blockchain is transforming business. What's your strategy? Leaders of forward-thinking organizations are exploring how blockchain can transform the way they create and seek value. Whether it's used to streamline multiparty processes, create and trade new assets, or leverage artificial intelligence and the internet of things, blockchain enables entirely new business opportunities. This is just the start. As blockchain becomes more widely adopted, it has the potential to radically change the way companies and societies operate, as transformative a paradigm shift as the launch of the internet. The Real Business of Blockchain is one of the first books on this transformative technology written for business leaders. Authors David Furlonger and Christophe Uzureau--both of Gartner, the world-renowned research and advisory company--will help you: Assess how blockchain will impact your business Explore the value proposition that blockchain offers Make smart near- and midterm investments Position your organization in a new competitive landscape Timely, visionary, and accessible, The Real Business of Blockchain cuts through the hype and helps you unlock the vast capabilities of this powerful and potentially world-changing technology. |
gartner access management magic quadrant 2022: Supply Chain Management For Dummies Daniel Stanton, 2023-01-16 Putting together all the links in the supply chain Supply Chain Management For Dummies gives you the full rundown on what a supply chain is, how it works, how to optimize it, and the best education for a rewarding supply chain career. This new edition is fully updated for changes to the supply chain in a post-Covid world. You’ll learn about the latest supply chain technologies, analytics and data-based optimization, and new strategies for delivering on your organization’s promises. This approachable resource can take your supply chain management skills to the next level with step-by-step explanations, expert tips, and real-life examples. Gain a foundational knowledge of issues in supply chain management Learn about today’s global supply chains, plus trends like reshoring and near-shoring Wrap your mind around how an organization’s moving parts can be coordinated in today’s high-tech world Discover strategies for dealing with disruptions, focusing on diversity, and increasing resilience This For Dummies guide is great for entry-level supply chain professionals and anyone who needs an update on need-to-know concepts and recent changes in supply chain management. |
gartner access management magic quadrant 2022: Azure Arc Systems Management Ramona Maxwell, |
gartner access management magic quadrant 2022: Losing the Cybersecurity War Steve King, 2022-12-07 This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We have taken a deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioral guidelines, where we provide examples of how we got here, what we can do about it, why we got here, and how we can avoid these traps in the future. This is a unique viewpoint that has never been explored – the five battlefields include Economics, Technology, Information, Education, and Leadership – and how each has contributed to our current disadvantage on the global stage. We go on to discuss how Zero Trust can change the game to create an advantage for us going forward. The credibility of Zero Trust stems directly from the father of Zero Trust, John Kindervag, who says, “And now, Steve has written a new book on Zero Trust called Losing the Cybersecurity War: And What We Can Do to Stop It. It is undeniably the best Zero Trust book yet written. While other writers have focused on implementing Zero Trust from their perspectives, Steve focuses on why Zero Trust is so important on the modern cybersecurity battlefield. His concept of the five cyber battlefields is a great insight that will help us win the cyberwar. By weaving Zero Trust principles throughout these five concepts, Steve demonstrates how the ideas and efforts involved in building Zero Trust environments will lead to a profound shift in terrain advantage. No longer will attackers own the high ground. As defenders and protectors, we can leverage modern technology in a Zero Trust way to keep our data and assets safe from infiltration and exploitation.” |
gartner access management magic quadrant 2022: Functional Automation and Digital Transformation Dr. Vipin K Suri, 2022-04-15 Functional Automation and Digital Transformation By: Dr. Vipin K Suri Eliminating the need for manual intervention in complex or repetitive business processes can have a positive impact on operations. By automating certain decisions, organizations can not only accelerate process workflows, but also improve the accuracy and consistency of the results. Digital process automation is fundamental to delivering better customer experiences that fully meet user expectations. Digitization of back-office services, primarily handled by business support functions, is underway. Shared Services organizations manage and deliver business and administrative support services common to business units. These support services are primarily focused on functions such as Finance & Accounting, Human Resources, Purchasing & Supply Chain, and IT. By incorporating digital automation and transformation technologies, such as Business Process Management (BPM), Enterprise Resource Planning (ERP), Robotic Process Automation (RPA), Intelligent Automation (IA) and Blockchain into the operations, organizations can streamline processes and increase operational efficiencies. |
gartner access management magic quadrant 2022: Global Perspectives on Robotics and Autonomous Systems: Development and Applications Habib, Maki K., 2023-08-01 There is an increasing demand to develop intelligent robotics and autonomous systems to deal with dynamically changing and complex, unstructured, and unpredictable environments. Such robots should be able to handle task varieties, environment dynamics and goal variations, and their complexity. This also highlights the need for having intelligent robotics and autonomous systems with capabilities assuring reliable and robust functions resolving real-time complex problems that are associated with many applications across diverse domains. This requires unconventional ways to develop creative and innovative, energy-efficient, and eco- and environmentally friendly solutions that consider new ways of creative thinking while drawing inspiration from nature as a model leading to creating new designs, intelligent systems, intelligent structures/mechanisms, reconfigurability, and more. Global Perspectives on Robotics and Autonomous Systems: Development and Applications describes the evolution of robotics and autonomous systems, their development, their technologies, and their applications. This book discusses the concept of autonomy, requirements, and its role in shaping the behavior of these robots so that they can make their own effective and safe decisions and act on them reliably while assuring real-life requirements. Covering topics such as digital transformation, fused deposition modeling (FDM), and organizational unbundling process, this premier reference source is an essential resource for engineers, computer scientists, industry professionals, manufacturers, smart systems developers, data analysts, students and educators of higher educations, researchers, and academicians. |
gartner access management magic quadrant 2022: Identity Attack Vectors Morey J. Haber, Darran Rolls, 2019-12-17 Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives. As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through privileged attacks and asset vulnerabilities. Identity Attack Vectors details the risks associated with poor identity management practices, the techniques that threat actors and insiders leverage, and the operational best practices that organizations should adopt to protect against identity theft and account compromises, and to develop an effective identity governance program. What You Will Learn Understand the concepts behind an identity and how their associated credentials and accounts can be leveraged as an attack vector Implement an effective Identity Access Management (IAM) program to manage identities and roles, and provide certification for regulatory compliance See where identity management controls play a part of the cyber kill chain and how privileges should be managed as a potential weak link Build upon industry standards to integrate key identity management technologies into a corporate ecosystem Plan for a successful deployment, implementation scope, measurable risk reduction, auditing and discovery, regulatory reporting, and oversight based on real-world strategies to prevent identity attack vectors Who This Book Is For Management and implementers in IT operations, security, and auditing looking to understand and implement an identity access management program and manage privileges in these environments |
gartner access management magic quadrant 2022: Practical IoT Hacking Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods, 2021-03-23 The definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assistants, smart home appliances and more. Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk. The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks. You’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems. You’ll also learn how to: • Write a DICOM service scanner as an NSE module • Hack a microcontroller through the UART and SWD interfaces • Reverse engineer firmware and analyze mobile companion apps • Develop an NFC fuzzer using Proxmark3 • Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill The tools and devices you’ll use are affordable and readily available, so you can easily practice what you learn. Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to hack all the things REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming |
gartner access management magic quadrant 2022: The Social Organization Anthony J. Bradley, Mark P. McDonald, 2011-09-27 As a leader, it's your job to extract maximum talent, energy, knowledge, and innovation from your customers and employees. But how? In The Social Organization, two of Gartner's lead analysts strongly advocate exploiting social technology. The authors share insights from their study of successes and failures at more than four hundred organizations that have used social technologies to foster—and capitalize on—customers’ and employees’ collective efforts. But the new social technology landscape isn’t about the technology. It’s about building communities, fostering new ways of collaborating, and guiding these efforts to achieve a purpose. To that end, the authors identify the core disciplines managers must master to translate community collaboration into otherwise impossible results: • Vision: defining a compelling vision of progress toward a highly collaborative organization. • Strategy: taking community collaboration from risky and random success to measurable business value. • Purpose: rallying people around a clear purpose, not just providing technology. • Launch: creating a collaborative environment and gaining adoption. • Guide: participating in and influencing communities without stifling collaboration. • Adapt: responding creatively to change in order to better support community collaboration. The Social Organization highlights the benefits and challenges of using social technology to tap the power of people, revealing what managers must do to make collaboration a source of enduring competitive advantage. |
gartner access management magic quadrant 2022: Exploring Cyber Criminals and Data Privacy Measures Mateus-Coelho, Nuno, Cruz-Cunha, Manuela, 2023-09-07 In recent years, industries have shifted into the digital domain, as businesses and organizations have used various forms of technology to aid information storage and efficient production methods. Because of these advances, the risk of cybercrime and data security breaches has skyrocketed. Fortunately, cyber security and data privacy research are thriving; however, industry experts must keep themselves updated in this field. Exploring Cyber Criminals and Data Privacy Measures collects cutting-edge research on information security, cybercriminals, and data privacy. It proposes unique strategies for safeguarding and preserving digital information using realistic examples and case studies. Covering key topics such as crime detection, surveillance technologies, and organizational privacy, this major reference work is ideal for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students. |
gartner access management magic quadrant 2022: ServiceNow IT Operations Management Ajaykumar Guggilla, 2017-04-27 Align your business requirements with IT by implementing ServiceNow IT Operations with ease. About This Book Written to the latest specification, it will cover basic to advanced concepts and architecture. Take a service-centric approach to operations management and consolidate all your resource data into a single system IT record. Beat the key challenge of managing multiple business operations (even running globally) over a complex IT infrastructure and see immediate results. Who This Book Is For The book is aimed at System administrators, IT operations and IT managers who plan to implement ServiceNow IT Operations Management for their organization. They have no knowledge of ServiceNow ITOM. What You Will Learn Step by step guide in setting up each features with in ServiceNow ITOM Install and configure the required application or plugin Integrate with other provider services as deemed appropriate Explore Orchestration capabilities and how to analyze the data Learn about the ServiceNow graphical interface Integrate with other applications within ServiceNow Aims to cover the fundamentals concepts to advanced concepts Best practices and advanced features In Detail ServiceNow ITOM enables infrastructure and processes to be managed in a highly automated manner. It contains various segments that ensure its applications and enterprise infrastructures are optimized for high performance and helps in creating a lean and agile organization through service-level visibility and automation. This book will be a comprehensive guide that will be based on Geneva release and will help you discover how IT activities can be connected to your business needs, rather than just focusing on internal IT process. It will take a service-centric approach to operations management and consolidate all your resource data into a single system IT record. You will learn about discovery, orchestration, MID server and cloud management, helping you take full advantage of ServiceNow IT Operations Management to improve the quality of service & increasing the service availability. By the end of the book, you will be able to achieve improved service availability, immediate visibility of vital business services and much more, all from the convenience of your single screen. Style and approach This will be a step by step learning guide helping readers to implement ServiceNow IT Operations Management for their organization. |
gartner access management magic quadrant 2022: Digital to the Core Mark Raskino, Graham Waller, 2016-09-12 There is no simple strategic method for dealing with the multidimensional nature of digital change. Even the sharpest leaders can become disoriented as change builds on change, leaving almost nothing certain. Yet to stand still is to fail. Enterprises and leaders must re-master themselves to succeed. Leaders must identify the key macro forces, then lead their organizations at three distinct levels: industry, enterprise, and self. By doing this they cannot only survive but clean up. Digital to the Core makes the case that all business leaders must understand the impact the digital revolution will continue to play in their industries, companies, and leadership style and practices. Drawing on interviews with over 30 top C-level executives in some of the world's most powerful companies and government organizations, including GE, Ford, Tory Burch, Babolat, McDonalds, Publicis and UK Government Digital Service, this book delivers practical insights from those on the front lines of major digital upheaval. The authors incorporate Gartner's annual CIO and CEO global survey research and also apply the deep knowledge and qualitative insights they have acquired as practitioners, management researchers, and advisors over decades in the business. Above all else, Raskino and Waller want companies and their top leaders to understand the full impact of digital change and integrate it at the core of their businesses. |
gartner access management magic quadrant 2022: Asset Attack Vectors Morey J. Haber, Brad Hibbert, 2018-06-15 Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn’t matter whether an organization uses LAN, WAN, wireless, or even a modern PAN—savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization’s cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You’ll Learn Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls Who This Book Is For New and intermediate security management professionals, auditors, and information technology staff looking to build an effective vulnerability management program and defend against asset based cyberattacks |
gartner access management magic quadrant 2022: Learning Analytics John R Mattox II, Mark Van Buren, Jean Martin, 2016-09-03 Faced with organizations that are more dispersed, a workforce that is more diverse and the pressure to reduce costs, CEOs and CFOs are increasingly asking what the return on investment is from training and development programmes. Learning Analytics provides a framework for understanding how to work with learning analytics at an advanced level. It focuses on the questions that training evaluation is intended to answer: is training effective and how can it be improved? It discusses the field of learning analytics, outlining how and why analytics can be useful, and takes the reader through examples of approaches to answering these questions and looks at the valuable role that technology has to play. Even where technological solutions are employed, the HR or learning and development practitioner needs to understand what questions they should be asking of their data to ensure alignment between training and business needs. Learning Analytics enables both senior L&D and HR professionals as well as CEOs and CFOs to see the transformational power that effective analytics has for building a learning organization, and the impacts that this has on performance, talent management, and competitive advantage. It helps learning and development professionals to make the business case for their activities, demonstrating what is truly adding value and where budgets should be spent, and to deliver a credible service to their business by providing metrics based on which sound business decisions can be made. |
gartner access management magic quadrant 2022: Infonomics Douglas B. Laney, 2017-09-05 Many senior executives talk about information as one of their most important assets, but few behave as if it is. They report to the board on the health of their workforce, their financials, their customers, and their partnerships, but rarely the health of their information assets. Corporations typically exhibit greater discipline in tracking and accounting for their office furniture than their data. Infonomics is the theory, study, and discipline of asserting economic significance to information. It strives to apply both economic and asset management principles and practices to the valuation, handling, and deployment of information assets. This book specifically shows: CEOs and business leaders how to more fully wield information as a corporate asset CIOs how to improve the flow and accessibility of information CFOs how to help their organizations measure the actual and latent value in their information assets. More directly, this book is for the burgeoning force of chief data officers (CDOs) and other information and analytics leaders in their valiant struggle to help their organizations become more infosavvy. Author Douglas Laney has spent years researching and developing Infonomics and advising organizations on the infinite opportunities to monetize, manage, and measure information. This book delivers a set of new ideas, frameworks, evidence, and even approaches adapted from other disciplines on how to administer, wield, and understand the value of information. Infonomics can help organizations not only to better develop, sell, and market their offerings, but to transform their organizations altogether. Doug Laney masterfully weaves together a collection of great examples with a solid framework to guide readers on how to gain competitive advantage through what he labels the unruly asset – data. The framework is comprehensive, the advice practical and the success stories global and across industries and applications. Liz Rowe, Chief Data Officer, State of New Jersey A must read for anybody who wants to survive in a data centric world. Shaun Adams, Head of Data Science, Betterbathrooms.com Phenomenal! An absolute must read for data practitioners, business leaders and technology strategists. Doug's lucid style has a set a new standard in providing intelligible material in the field of information economics. His passion and knowledge on the subject exudes thru his literature and inspires individuals like me. Ruchi Rajasekhar, Principal Data Architect, MISO Energy I highly recommend Infonomics to all aspiring analytics leaders. Doug Laney’s work gives readers a deeper understanding of how and why information should be monetized and managed as an enterprise asset. Laney’s assertion that accounting should recognize information as a capital asset is quite convincing and one I agree with. Infonomics enjoyably echoes that sentiment! Matt Green, independent business analytics consultant, Atlanta area If you care about the digital economy, and you should, read this book. Tanya Shuckhart, Analyst Relations Lead, IRI Worldwide |
gartner access management magic quadrant 2022: 10x Marketing Formula Garrett Moon, 2018-03-26 The dream of content marketing is that it's going to be a magical funnel that drips money into your bank account. Its lure is that it will create an inbound sales machine. But what should you do when it doesn't work like that? Or even at all? Garrett Moon presents the formula he used to grow his startup CoSchedule from zeroes across the board to 1.3M+ monthly pageviews, 250k+ email subscribers, and thousands of customers in 100 countries in just 4 years. Learn to overcome a lack of time, struggling to produce content, an inability to engage your audience, and so many more marketing roadblocks. |
gartner access management magic quadrant 2022: Oauth 2.0 Simplified Aaron Parecki, 2017-08-14 The OAuth 2.0 authorization framework has become the industry standard in providing secure access to web APIs. It allows users to grant external applications access to their data, such as profile data, photos, and email, without compromising security. OAuth 2.0 Simplified is a guide to building an OAuth 2.0 server. Through high-level overviews, step-by-step instructions, and real-world examples, you will learn how to take advantage of the OAuth 2.0 framework while building a secure API. |
gartner access management magic quadrant 2022: Enterprise Cloud Strategy Barry Briggs, Eduardo Kassner, 2016-01-07 How do you start? How should you build a plan for cloud migration for your entire portfolio? How will your organization be affected by these changes? This book, based on real-world cloud experiences by enterprise IT teams, seeks to provide the answers to these questions. Here, you’ll see what makes the cloud so compelling to enterprises; with which applications you should start your cloud journey; how your organization will change, and how skill sets will evolve; how to measure progress; how to think about security, compliance, and business buy-in; and how to exploit the ever-growing feature set that the cloud offers to gain strategic and competitive advantage. |
gartner access management magic quadrant 2022: Search-Based Applications Gregory Grefenstette, Laura Wilber, 2022-05-31 We are poised at a major turning point in the history of information management via computers. Recent evolutions in computing, communications, and commerce are fundamentally reshaping the ways in which we humans interact with information, and generating enormous volumes of electronic data along the way. As a result of these forces, what will data management technologies, and their supporting software and system architectures, look like in ten years? It is difficult to say, but we can see the future taking shape now in a new generation of information access platforms that combine strategies and structures of two familiar -- and previously quite distinct -- technologies, search engines and databases, and in a new model for software applications, the Search-Based Application (SBA), which offers a pragmatic way to solve both well-known and emerging information management challenges as of now. Search engines are the world's most familiar and widely deployed information access tool, used by hundreds of millions of people every day to locate information on the Web, but few are aware they can now also be used to provide precise, multidimensional information access and analysis that is hard to distinguish from current database applications, yet endowed with the usability and massive scalability of Web search. In this book, we hope to introduce Search Based Applications to a wider audience, using real case studies to show how this flexible technology can be used to intelligently aggregate large volumes of unstructured data (like Web pages) and structured data (like database content), and to make that data available in a highly contextual, quasi real-time manner to a wide base of users for a varied range of purposes. We also hope to shed light on the general convergences underway in search and database disciplines, convergences that make SBAs possible, and which serve as harbingers of information management paradigms and technologies to come. Table of Contents: Search Based Applications / Evolving Business Information Access Needs / Origins and Histories / Data Models and Storage / Data Collection/Population / Data Processing / Data Retrieval / Data Security, Usability, Performance, Cost / Summary Evolutions and Convergences / SBA Platforms / SBA Uses and Preconditions / Anatomy of a Search Based Application / Case Study: GEFCO / Case Study: Urbanizer / Case Study: National Postal Agency / Future Directions |
gartner access management magic quadrant 2022: Building the Data Lakehouse Bill Inmon, Ranjeet Srivastava, Mary Levins, 2021-10 The data lakehouse is the next generation of the data warehouse and data lake, designed to meet today's complex and ever-changing analytics, machine learning, and data science requirements. Learn about the features and architecture of the data lakehouse, along with its powerful analytical infrastructure. Appreciate how the universal common connector blends structured, textual, analog, and IoT data. Maintain the lakehouse for future generations through Data Lakehouse Housekeeping and Data Future-proofing. Know how to incorporate the lakehouse into an existing data governance strategy. Incorporate data catalogs, data lineage tools, and open source software into your architecture to ensure your data scientists, analysts, and end users live happily ever after. |
gartner access management magic quadrant 2022: Wolf in Cio's Clothing Tina Nunno, 2016-09-19 Machiavellians are few in number in IT. The massive pressure on CIOs continues to increase as the opportunities to use technology in business become more prevalent and more competitive. As CIOs often find themselves at the center of business conflict, they must not only familiarize themselves with Machiavellian tactics as a defensive weapon, but also learn to use them as an offensive weapon in extreme situations so that they can increase IT's contribution to their enterprises. As Italian political philosopher Niccolo Machiavelli implied, you're either predator or prey, and the animal you most resemble determines your position on the food chain. In The Wolf in CIO's Clothing Gartner analyst and author Tina Nunno expands on Machiavelli's metaphor, examining seven animal types and the leadership attributes of each. Nunno posits the wolf -- a social animal with strong predatory instincts -- as the ideal example of how a leader can adapt and thrive. Technology may be black and white, but successful leadership demands an ability to exist in the grey. Drawing on her experience with hundreds of CIOs, Nunno charts a viable way to master the Machiavellian principles of power, manipulation, love, and war. Through compelling case studies, her approach demonstrates how CIOs and IT leaders can adjust their leadership styles in extreme situations for their own success and that of their teams. |
gartner access management magic quadrant 2022: The Lean Approach to Digital Transformation Yves Caseau, 2022-05-01 The Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users, whether they are customers or future customers. This ability combines observation, dialogue, and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach, according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly customer-centric, from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative -- the era of abundance, usages rate of change, complexity of experiences, and shift of power towards communities -- are easier, using digital tools and digital communities. 2. Developing an information system (IS) that is the backbone of the digital transformation – called “exponential information system” to designate an open IS (in particular on its borders), capable of interfacing and combining with external services, positioned as a player in software ecosystems and built for processing scalable and dynamic data flows. The exponential information system is constantly changing and it continuously absorbs the best of information processing technology, such as Artificial Intelligence and Machine Learning. 3. Building software “micro-factories” that produce service platforms, which are called “Lean software factories.” This “software factory” concept covers the integration of agile methods, tooling and continuous integration and deployment practices, a customer-oriented product approach, and a platform approach based on modularity, as well as API-based architecture and openness to external stakeholders. This software micro-factory is the foundation that continuously produces and provides constantly evolving services. These three capabilities are not unique or specific to this book, they are linked to other concepts such as agile methods, product development according to lean principles, software production approaches such as CICD (continuous integration and deployment) or DevOps. This book weaves a common frame of reference for all these approaches to derive more value from the digital transformation and to facilitate its implementation. The title of the book refers to the “lean approach to digital transformation” because the two underlying frameworks, Lean Startup and Lean Software Factory, are directly inspired by Lean, in the sense of the Toyota Way. The Lean approach is present from the beginning to the end of this book -- it provides the framework for customer orientation and the love of a job well done, which are the conditions for the success of a digital transformation. |
gartner access management magic quadrant 2022: Rational Cybersecurity for Business Dan Blum, 2020-06-27 Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your business |
gartner access management magic quadrant 2022: Applied Data Science Martin Braschler, Thilo Stadelmann, Kurt Stockinger, 2019-06-13 This book has two main goals: to define data science through the work of data scientists and their results, namely data products, while simultaneously providing the reader with relevant lessons learned from applied data science projects at the intersection of academia and industry. As such, it is not a replacement for a classical textbook (i.e., it does not elaborate on fundamentals of methods and principles described elsewhere), but systematically highlights the connection between theory, on the one hand, and its application in specific use cases, on the other. With these goals in mind, the book is divided into three parts: Part I pays tribute to the interdisciplinary nature of data science and provides a common understanding of data science terminology for readers with different backgrounds. These six chapters are geared towards drawing a consistent picture of data science and were predominantly written by the editors themselves. Part II then broadens the spectrum by presenting views and insights from diverse authors – some from academia and some from industry, ranging from financial to health and from manufacturing to e-commerce. Each of these chapters describes a fundamental principle, method or tool in data science by analyzing specific use cases and drawing concrete conclusions from them. The case studies presented, and the methods and tools applied, represent the nuts and bolts of data science. Finally, Part III was again written from the perspective of the editors and summarizes the lessons learned that have been distilled from the case studies in Part II. The section can be viewed as a meta-study on data science across a broad range of domains, viewpoints and fields. Moreover, it provides answers to the question of what the mission-critical factors for success in different data science undertakings are. The book targets professionals as well as students of data science: first, practicing data scientists in industry and academia who want to broaden their scope and expand their knowledge by drawing on the authors’ combined experience. Second, decision makers in businesses who face the challenge of creating or implementing a data-driven strategy and who want to learn from success stories spanning a range of industries. Third, students of data science who want to understand both the theoretical and practical aspects of data science, vetted by real-world case studies at the intersection of academia and industry. |
gartner access management magic quadrant 2022: Gamify Biran Burke, 2016-10-14 Organizations are facing an engagement crisis. Regardless if they are customers, employees, patients, students, citizens, stakeholders, organizations struggle to meaningfully engage their key constituent groups who have a precious and limited resource: their time. Not surprisingly, these stakeholders have developed deflector shields to protect themselves. Only a privileged few organizations are allowed to penetrate the shield, and even less will meaningfully engage. To penetrate the shield, and engage the audience, organizations need an edge. Gamification has emerged as a way to gain that edge and organizations are beginning to see it as a key tool in their digital engagement strategy. While gamification has tremendous potential to break through, most companies will get it wrong. Gartner predicts that by 2014, 80% of current gamified applications will fail to meet business objectives primarily due to poor design. As a trend, gamification is at the peak of the hype cycle; it has been oversold and it is broadly misunderstood. We are heading for the inevitable fall. Too many organizations have been led to believe that gamification is a magic elixir for indoctrinating the masses and manipulating them to do their bidding. These organizations are mistaking people for puppets, and these transparently cynical efforts are doomed to fail. This book goes beyond the hype and focuses on the 20% that are getting it right. We have spoken to hundreds of leaders in organizations around the world about their gamification strategies and we have seen some spectacular successes. The book examines some of these successes and identifies the common characteristics of these initiatives to define the solution space for success. It is a guide written for leaders of gamification initiatives to help them avoid the pitfalls and employ the best practices, to ensure they join the 20% that gets it right. Gamify shows gamification in action: as a powerful approach to engaging and motivating people to achieving their goals, while at the same time achieving organizational objectives. It can be used to motivate people to change behaviors, develop skills, and drive innovation. The sweet spot for gamification objectives is the space where the business objectives and player objectives are aligned. Like two sides of the same coin, player and business goals may outwardly appear different, but they are often the same thing, expressed different ways. The key to gamification success is to engage people on an emotional level and motivating them to achieve their goals. |
gartner access management magic quadrant 2022: Implementing Oracle Integration Cloud Service Robert van Molken, Phil Wilkins, 2017-01-20 Understand everything you need to know about Oracle's Integration Cloud Service and how to utilize it optimally for your business About This Book The only guide to Integration Cloud Service in the market Focused on practical action to deliver business value A professional's guide to an expensive product, providing comprehensive training, and showing how to extract real business value from the product Who This Book Is For This book is ideal for any IT professional working with ICS, any Oracle application or cloud solution developer or analyst who wants to work with ICS to deliver business value. What You Will Learn Use ICS to integrate different systems together without needing to be a developer Gain understanding of what a number of technologies and standards provide – without needing to understand the fine details of those standards and technologies Understand the use of connectors that Oracle provide from technology based connections such as file and database connections to SaaS solutions ranging from Salesforce to Twitter Enrich data and extend SaaS integration to route to different instances Utilize a number of tools to help develop and check that your integrations work before connecting to live systems Introduce and explain integration concepts so that the integrations created are maintainable and sustainable for the longer term Provide details on how to keep up to date with the features that Oracle and partners provide in the future Get special connections developed to work with ICS In Detail Businesses are built on data, and applications that access that data. In modern businesses the same cloud-based data stores and applications might be accessed by hundreds of different applications from thousands of different devices via APIs. To make this happen, APIs must be wired together i.e. integrated. Oracle Integration Cloud Service provides a complete method for integrating enterprise applications in the cloud. Integration Cloud Service (ICS) provides a cloud hosted means to integrate systems together using a graphical means to define and represent integrations. This book will be a comprehensive, hands-on guide to building successful, high-availability integrations on ICS. This book sets out to demonstrate how ICS can be used to effectively implement integrations that work both in the cloud and on premise. It starts with a fast, practical introduction to what ICS can do for your business and then shows how ICS allows you to develop integrations not only quickly but in a way that means they are maintainable and extensible. Gradually it moves into more advanced integrations, showing how to achieve sophisticated results with ICS and work with external applications. Finally the book shows you how to monitor cloud apps and go beyond ICS to build even more powerful integrated applications. By the end of the book, you will the knowledge on how to use ICS to solve your own integration needs and harness the technologies in a maintainable and sustainable manner. Style and approach This book will take a pragmatic approach and will be a business-focused guide to delivering business value with ICS. |
gartner access management magic quadrant 2022: Managing Indirect Spend Joe Payne, William R. Dorn, David Pastore, Jennifer Ulrich, 2021-05-12 Managing corporate spend is far more complex than conducting RFPs. Learn how the most efficient and effective procurement departments operate, control costs, enforce compliance, and manage indirect spend. Managing Indirect Spend provides executives and procurement professionals with the knowledge and tools necessary to successfully reduce costs with a strong focus on the often-overlooked area of indirect spend. It also offers great value to those procurement and purchasing professionals aspiring to be leaders in the profession, regardless of the spend they manage. It includes an overview of the challenges faced when sourcing indirect spend categories, a detailed dive into the strategic sourcing process, tools that can help drive savings, technologies that drive efficiencies and compliance, and examples of success based on real-world experience. It is a how-to guide that clearly covers sourcing engagements of any complexity and provides the details needed to source effectively. The book is structured into sections covering the sourcing and procurement process, the tools and technologies, examples from the field, walkthroughs of specific sourcing engagements, guidance on building an effective sourcing team, and the information needed to become a best-in-class sourcing organization. Since the initial publication of this book, the procurement profession and the discipline of Strategic Sourcing have matured. Markets have changed, processes developed, trends have come and gone, and technology has experienced leaps and bounds, posing new and interesting challenges for procurement professionals. In addition to covering tried-and-true practices for strategic sourcing, this Second Edition discusses how strategic sourcing has evolved and provides an update on the techniques, tools, and resources available to purchasing groups. This book: Includes updated coverage of everything you need to know to source more effectively Covers the latest trends in procurement and sourcing, including technology, process improvements and organizational design Presents guidance for reducing costs through strategic sourcing, no matter what the economic climate or level of maturity of the existing procurement organization Shows how effectively managing indirect costs can provide a huge impact on bott m line growth Introduces Market Intelligence (MI), including techniques, tools, and resources available to procurement and supply chain management groups With tools, real-world examples, and practical strategies, Managing Indirect Spend provides insider guidance for big bottom-line growth through effective management of indirect costs. |
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业 …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔 …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商 …
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响应) …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原 …
EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据 …
如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的 …
什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业 …
Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔 …
如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。
普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …
IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商 …
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响应) …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原 …
EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据 …
如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的 …
什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …