Gartner Magic Quadrant Identity And Access Management

Advertisement



  gartner magic quadrant identity and access management: Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities Ng, Alex Chi Keung, 2018-01-26 Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization’s identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.
  gartner magic quadrant identity and access management: Infonomics Douglas B. Laney, 2017-09-05 Many senior executives talk about information as one of their most important assets, but few behave as if it is. They report to the board on the health of their workforce, their financials, their customers, and their partnerships, but rarely the health of their information assets. Corporations typically exhibit greater discipline in tracking and accounting for their office furniture than their data. Infonomics is the theory, study, and discipline of asserting economic significance to information. It strives to apply both economic and asset management principles and practices to the valuation, handling, and deployment of information assets. This book specifically shows: CEOs and business leaders how to more fully wield information as a corporate asset CIOs how to improve the flow and accessibility of information CFOs how to help their organizations measure the actual and latent value in their information assets. More directly, this book is for the burgeoning force of chief data officers (CDOs) and other information and analytics leaders in their valiant struggle to help their organizations become more infosavvy. Author Douglas Laney has spent years researching and developing Infonomics and advising organizations on the infinite opportunities to monetize, manage, and measure information. This book delivers a set of new ideas, frameworks, evidence, and even approaches adapted from other disciplines on how to administer, wield, and understand the value of information. Infonomics can help organizations not only to better develop, sell, and market their offerings, but to transform their organizations altogether. Doug Laney masterfully weaves together a collection of great examples with a solid framework to guide readers on how to gain competitive advantage through what he labels the unruly asset – data. The framework is comprehensive, the advice practical and the success stories global and across industries and applications. Liz Rowe, Chief Data Officer, State of New Jersey A must read for anybody who wants to survive in a data centric world. Shaun Adams, Head of Data Science, Betterbathrooms.com Phenomenal! An absolute must read for data practitioners, business leaders and technology strategists. Doug's lucid style has a set a new standard in providing intelligible material in the field of information economics. His passion and knowledge on the subject exudes thru his literature and inspires individuals like me. Ruchi Rajasekhar, Principal Data Architect, MISO Energy I highly recommend Infonomics to all aspiring analytics leaders. Doug Laney’s work gives readers a deeper understanding of how and why information should be monetized and managed as an enterprise asset. Laney’s assertion that accounting should recognize information as a capital asset is quite convincing and one I agree with. Infonomics enjoyably echoes that sentiment! Matt Green, independent business analytics consultant, Atlanta area If you care about the digital economy, and you should, read this book. Tanya Shuckhart, Analyst Relations Lead, IRI Worldwide
  gartner magic quadrant identity and access management: Mastering IAM Kris Hermans, In today's interconnected digital landscape, effective Identity and Access Management (IAM) is vital for organizations to secure their systems, protect sensitive data, and enable seamless collaboration. In Mastering IAM, acclaimed author Kris Hermans provides a comprehensive guide that demystifies the complexities of IAM, empowering readers to establish robust identity management practices and optimize access controls. With years of experience in the cybersecurity field, Hermans understands the critical role IAM plays in ensuring the confidentiality, integrity, and availability of digital resources. In this book, he shares his expertise, providing a practical roadmap for implementing and managing IAM solutions that align with business goals and industry best practices. Inside Mastering IAM, you will: 1. Explore the IAM landscape: Gain a deep understanding of the core concepts, components, and frameworks that form the foundation of IAM. From authentication and authorization to identity governance and federation, master the essential building blocks of a successful IAM strategy. 2. Design and implement IAM solutions: Learn how to design an IAM architecture tailored to your organization's needs, considering factors such as scalability, compliance, and user experience. Follow step-by-step guidelines for deploying IAM solutions, including user provisioning, access controls, single sign-on (SSO), and multi-factor authentication (MFA). 3. Enhance security and compliance: Discover strategies for mitigating security risks and ensuring compliance with relevant regulations. Explore identity lifecycle management, privileged access management (PAM), and security incident response to safeguard against threats and unauthorized access. 4. Leverage IAM for business efficiency: Uncover how IAM can streamline business processes, improve productivity, and enhance user experiences. Explore topics such as self-service portals, role-based access control (RBAC), and integration with other systems to optimize IAM functionality. 5. Address emerging challenges: Stay up to date with the latest trends and emerging technologies shaping the IAM landscape. Learn about cloud-based IAM solutions, IoT device management, and the impact of artificial intelligence and machine learning in enhancing IAM capabilities. With real-world examples, practical tips, and insightful case studies, Mastering IAM equips readers with the knowledge and skills needed to effectively implement and manage IAM solutions. Whether you are an IAM professional, IT manager, or security practitioner, this book will guide you toward harnessing the full potential of IAM to protect your organization's assets and drive business success. Don't let identity and access management be a barrier to productivity and security. Unleash the power of IAM with Kris Hermans as your trusted guide.
  gartner magic quadrant identity and access management: The Connector Manager Jaime Roca, Sari Wilde, 2019-09-19 The best managers work smarter, not harder After conducting a unique global study of over 9,000 people, analysts at the world-leading sales research firm Gartner identified four distinct types of manager. Incredibly, they found one type consistently performs far better than the rest, and it wasn’t the one they were expecting. Connector Managers understand that it’s not enough for managers to just encourage and teach employees themselves, and that providing constant coaching to employees can actually be detrimental to their independent development. Instead, by connecting employees to others in the team or organisation, Connector Managers can help their employees develop a range of skills beyond their own areas of expertise. Although the four types of managers are more or less evenly distributed, employees with Connector Managers perform significantly better than others. Employees with Always-on Managers who provide constant feedback and coaching perform significantly worse. Drawing on their ground-breaking data-driven research, as well as in-depth case studies and extensive interviews with thousands of managers, you’ll discover what behaviours define Connector Managers and how you can use them yourself to build brilliant, powerhouse teams.
  gartner magic quadrant identity and access management: Cloud Identity Patterns and Strategies Giuseppe Di Federico, Fabrizio Barcaroli, 2022-12-23 Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key FeaturesLearn all you need to know about different identity patterns and implementing them in real-world scenariosHandle multi-IDP-related common situations no matter how big your organizationGain practical insights into OAuth implementation patterns and flowsBook Description Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this book, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this book, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. What you will learnUnderstand the evolution of identity in the enterpriseDiscover basic to advanced OAuth patterns and implementationsFind out how OAuth standards are usually adopted in the enterpriseExplore proven solutions for modern identity challengesUse Azure AD for implementing identity solutionsComprehend how company structure and strategies influence design decisionsWho this book is for This book is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this book useful. This book covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful.
  gartner magic quadrant identity and access management: Real Business of IT Richard Hunter, George Westerman, 2009-10-20 If you're a general manager or CFO, do you feel you're spending too much on IT or wishing you could get better returns from your IT investments? If so, it's time to examine what's behind this IT-as-cost mind-set. In The Real Business of IT, Richard Hunter and George Westerman reveal that the cost mind-set stems from IT leaders' inability to communicate about the business value they create-so CIOs get stuck discussing budgets rather than their contributions to the organization. The authors explain how IT leaders can combat this mind-set by first using information technology to generate three forms of value important to leaders throughout the organization: -Value for money when your IT department operates efficiently and effectively -An investment in business performance evidenced when IT helps divisions, units, and departments boost profitability -Personal value of CIOs as leaders whose contributions to their enterprise go well beyond their area of specialization The authors show how to communicate about these forms of value with non-IT leaders-so they understand how your firm is benefiting and see IT as the strategic powerhouse it truly is.
  gartner magic quadrant identity and access management: Identity Attack Vectors Morey J. Haber, Darran Rolls, 2019-12-17 Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives. As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through privileged attacks and asset vulnerabilities. Identity Attack Vectors details the risks associated with poor identity management practices, the techniques that threat actors and insiders leverage, and the operational best practices that organizations should adopt to protect against identity theft and account compromises, and to develop an effective identity governance program. What You Will Learn Understand the concepts behind an identity and how their associated credentials and accounts can be leveraged as an attack vector Implement an effective Identity Access Management (IAM) program to manage identities and roles, and provide certification for regulatory compliance See where identity management controls play a part of the cyber kill chain and how privileges should be managed as a potential weak link Build upon industry standards to integrate key identity management technologies into a corporate ecosystem Plan for a successful deployment, implementation scope, measurable risk reduction, auditing and discovery, regulatory reporting, and oversight based on real-world strategies to prevent identity attack vectors Who This Book Is For Management and implementers in IT operations, security, and auditing looking to understand and implement an identity access management program and manage privileges in these environments
  gartner magic quadrant identity and access management: Handbook of Research on Big Data Storage and Visualization Techniques Segall, Richard S., Cook, Jeffrey S., 2018-01-05 The digital age has presented an exponential growth in the amount of data available to individuals looking to draw conclusions based on given or collected information across industries. Challenges associated with the analysis, security, sharing, storage, and visualization of large and complex data sets continue to plague data scientists and analysts alike as traditional data processing applications struggle to adequately manage big data. The Handbook of Research on Big Data Storage and Visualization Techniques is a critical scholarly resource that explores big data analytics and technologies and their role in developing a broad understanding of issues pertaining to the use of big data in multidisciplinary fields. Featuring coverage on a broad range of topics, such as architecture patterns, programing systems, and computational energy, this publication is geared towards professionals, researchers, and students seeking current research and application topics on the subject.
  gartner magic quadrant identity and access management: Engineering and Management of Data Centers Jorge Marx Gómez, Manuel Mora, Mahesh S. Raisinghani, Wolfgang Nebel, Rory V. O'Connor, 2017-11-10 This edited volume covers essential and recent development in the engineering and management of data centers. Data centers are complex systems requiring ongoing support, and their high value for keeping business continuity operations is crucial. The book presents core topics on the planning, design, implementation, operation and control, and sustainability of a data center from a didactical and practitioner viewpoint. Chapters include: · Foundations of data centers: Key Concepts and Taxonomies · ITSDM: A Methodology for IT Services Design · Managing Risks on Data Centers through Dashboards · Risk Analysis in Data Center Disaster Recovery Plans · Best practices in Data Center Management Case: KIO Networks · QoS in NaaS (Network as a Service) using Software Defined Networking · Optimization of Data Center Fault-Tolerance Design · Energetic Data Centre Design Considering Energy Efficiency Improvements During Operation · Demand-side Flexibility and Supply-side Management: The Use Case of Data Centers and Energy Utilities · DevOps: Foundations and its Utilization in Data Centers · Sustainable and Resilient Network Infrastructure Design for Cloud Data Centres · Application Software in Cloud-Ready Data Centers This book bridges the gap between academia and the industry, offering essential reading for practitioners in data centers, researchers in the area, and faculty teaching related courses on data centers. The book can be used as a complementary text for traditional courses on Computer Networks, as well as innovative courses on IT Architecture, IT Service Management, IT Operations, and Data Centers.
  gartner magic quadrant identity and access management: Azure Architecture Explained David Rendón, Brett Hargreaves, 2023-09-22 Enhance your career as an Azure architect with cutting-edge tools, expert guidance, and resources from industry leaders Key Features Develop your business case for the cloud with technical guidance from industry experts Address critical business challenges effectively by leveraging proven combinations of Azure services Tackle real-world scenarios by applying practical knowledge of reference architectures Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionAzure is a sophisticated technology that requires a detailed understanding to reap its full potential and employ its advanced features. This book provides you with a clear path to designing optimal cloud-based solutions in Azure, by delving into the platform's intricacies. You’ll begin by understanding the effective and efficient security management and operation techniques in Azure to implement the appropriate configurations in Microsoft Entra ID. Next, you’ll explore how to modernize your applications for the cloud, examining the different computation and storage options, as well as using Azure data solutions to help migrate and monitor workloads. You’ll also find out how to build your solutions, including containers, networking components, security principles, governance, and advanced observability. With practical examples and step-by-step instructions, you’ll be empowered to work on infrastructure-as-code to effectively deploy and manage resources in your environment. By the end of this book, you’ll be well-equipped to navigate the world of cloud computing confidently.What you will learn Implement and monitor cloud ecosystem including, computing, storage, networking, and security Recommend optimal services for performance and scale Provide, monitor, and adjust capacity for optimal results Craft custom Azure solution architectures Design computation, networking, storage, and security aspects in Azure Implement and maintain Azure resources effectively Who this book is forThis book is an indispensable resource for Azure architects looking to develop cloud-based services along with deploying and managing applications within the Microsoft Azure ecosystem. It caters to professionals responsible for crucial IT operations, encompassing budgeting, business continuity, governance, identity management, networking, security, and automation. If you have prior experience in operating systems, virtualization, infrastructure, storage structures, or networking, and aspire to master the implementation of best practices in the Azure cloud, then this book will become your go-to guide.
  gartner magic quadrant identity and access management: Digital to the Core Mark Raskino, Graham Waller, 2016-09-12 There is no simple strategic method for dealing with the multidimensional nature of digital change. Even the sharpest leaders can become disoriented as change builds on change, leaving almost nothing certain. Yet to stand still is to fail. Enterprises and leaders must re-master themselves to succeed. Leaders must identify the key macro forces, then lead their organizations at three distinct levels: industry, enterprise, and self. By doing this they cannot only survive but clean up. Digital to the Core makes the case that all business leaders must understand the impact the digital revolution will continue to play in their industries, companies, and leadership style and practices. Drawing on interviews with over 30 top C-level executives in some of the world's most powerful companies and government organizations, including GE, Ford, Tory Burch, Babolat, McDonalds, Publicis and UK Government Digital Service, this book delivers practical insights from those on the front lines of major digital upheaval. The authors incorporate Gartner's annual CIO and CEO global survey research and also apply the deep knowledge and qualitative insights they have acquired as practitioners, management researchers, and advisors over decades in the business. Above all else, Raskino and Waller want companies and their top leaders to understand the full impact of digital change and integrate it at the core of their businesses.
  gartner magic quadrant identity and access management: Privileged Attack Vectors Morey J. Haber, 2020-06-13 See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today’s environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and monitoring strategies to mitigate privilege threats and risk Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journeyDevelop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems
  gartner magic quadrant identity and access management: The Effortless Experience Matthew Dixon, Nick Toman, Rick DeLisi, 2013-09-12 Everyone knows that the best way to create customer loyalty is with service so good, so over the top, that it surprises and delights. But what if everyone is wrong? In their acclaimed bestseller The Challenger Sale, Matthew Dixon and his colleagues at CEB busted many longstanding myths about sales. Now they’ve turned their research and analysis to a new vital business subject—customer loyalty—with a new book that turns the conventional wisdom on its head. The idea that companies must delight customers by exceeding service expectations is so entrenched that managers rarely even question it. They devote untold time, energy, and resources to trying to dazzle people and inspire their undying loyalty. Yet CEB’s careful research over five years and tens of thousands of respondents proves that the “dazzle factor” is wildly overrated—it simply doesn’t predict repeat sales, share of wallet, or positive wordof-mouth. The reality: Loyalty is driven by how well a company delivers on its basic promises and solves day-to-day problems, not on how spectacular its service experience might be. Most customers don’t want to be “wowed”; they want an effortless experience. And they are far more likely to punish you for bad service than to reward you for good service. If you put on your customer hat rather than your manager or marketer hat, this makes a lot of sense. What do you really want from your cable company, a free month of HBO when it screws up or a fast, painless restoration of your connection? What about your bank—do you want free cookies and a cheerful smile, even a personal relationship with your teller? Or just a quick in-and-out transaction and an easy way to get a refund when it accidentally overcharges on fees? The Effortless Experience takes readers on a fascinating journey deep inside the customer experience to reveal what really makes customers loyal—and disloyal. The authors lay out the four key pillars of a low-effort customer experience, along the way delivering robust data, shocking insights and profiles of companies that are already using the principles revealed by CEB’s research, with great results. And they include many tools and templates you can start applying right away to improve service, reduce costs, decrease customer churn, and ultimately generate the elusive loyalty that the “dazzle factor” fails to deliver. The rewards are there for the taking, and the pathway to achieving them is now clearly marked.
  gartner magic quadrant identity and access management: Wolf in Cio's Clothing Tina Nunno, 2016-09-19 Machiavellians are few in number in IT. The massive pressure on CIOs continues to increase as the opportunities to use technology in business become more prevalent and more competitive. As CIOs often find themselves at the center of business conflict, they must not only familiarize themselves with Machiavellian tactics as a defensive weapon, but also learn to use them as an offensive weapon in extreme situations so that they can increase IT's contribution to their enterprises. As Italian political philosopher Niccolo Machiavelli implied, you're either predator or prey, and the animal you most resemble determines your position on the food chain. In The Wolf in CIO's Clothing Gartner analyst and author Tina Nunno expands on Machiavelli's metaphor, examining seven animal types and the leadership attributes of each. Nunno posits the wolf -- a social animal with strong predatory instincts -- as the ideal example of how a leader can adapt and thrive. Technology may be black and white, but successful leadership demands an ability to exist in the grey. Drawing on her experience with hundreds of CIOs, Nunno charts a viable way to master the Machiavellian principles of power, manipulation, love, and war. Through compelling case studies, her approach demonstrates how CIOs and IT leaders can adjust their leadership styles in extreme situations for their own success and that of their teams.
  gartner magic quadrant identity and access management: The Real Business of Blockchain David Furlonger, Christophe Uzureau, 2019-10-15 Blockchain is transforming business. What's your strategy? Leaders of forward-thinking organizations are exploring how blockchain can transform the way they create and seek value. Whether it's used to streamline multiparty processes, create and trade new assets, or leverage artificial intelligence and the internet of things, blockchain enables entirely new business opportunities. This is just the start. As blockchain becomes more widely adopted, it has the potential to radically change the way companies and societies operate, as transformative a paradigm shift as the launch of the internet. The Real Business of Blockchain is one of the first books on this transformative technology written for business leaders. Authors David Furlonger and Christophe Uzureau--both of Gartner, the world-renowned research and advisory company--will help you: Assess how blockchain will impact your business Explore the value proposition that blockchain offers Make smart near- and midterm investments Position your organization in a new competitive landscape Timely, visionary, and accessible, The Real Business of Blockchain cuts through the hype and helps you unlock the vast capabilities of this powerful and potentially world-changing technology.
  gartner magic quadrant identity and access management: Costidity Vladislav Shapiro, 2016-01-15 This book is about the cost of the human factor in business and measuring trust. We have found a way to quantify trust, and the cost of human interactions as it relates to your money, time, and operations. We are now sharing our methodology and findings to revolutionize the way business is done, policies are made, and save you millions of dollars in the process.
  gartner magic quadrant identity and access management: Integrating a Usable Security Protocol into User Authentication Services Design Process Christina Braz, Ahmed Seffah, Bilal Naqvi, 2018-11-08 There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.
  gartner magic quadrant identity and access management: Communications Writing and Design John DiMarco, 2017-03-14 Communications Writing and Design is an integrated, project-based introduction to effective writing and design across the persuasive domains of communication. Build a strong foundation of core writing and design skills using professionally-designed examples that illustrate and reinforce key principles Readers learn and analyze techniques by creating 15 projects in marketing, advertising, PR, and social media with the help of strategy suggestions, practical tips, and professional production techniques Written by an experienced professional and teacher, with a focus on the cross-disciplinary nature of contemporary communication work Learning is reinforced through a variety of pedagogical features: learning objectives, helpful mnemonics, real-life projects and applications, chapter references for further study, and end-of-chapter summaries and exercises A companion website with multimedia slides, exam questions, learning videos, and design guides provides additional learning tools for students and instructors
  gartner magic quadrant identity and access management: The Challenger Sale Matthew Dixon, Brent Adamson, 2011-11-10 What's the secret to sales success? If you're like most business leaders, you'd say it's fundamentally about relationships-and you'd be wrong. The best salespeople don't just build relationships with customers. They challenge them. The need to understand what top-performing reps are doing that their average performing colleagues are not drove Matthew Dixon, Brent Adamson, and their colleagues at Corporate Executive Board to investigate the skills, behaviors, knowledge, and attitudes that matter most for high performance. And what they discovered may be the biggest shock to conventional sales wisdom in decades. Based on an exhaustive study of thousands of sales reps across multiple industries and geographies, The Challenger Sale argues that classic relationship building is a losing approach, especially when it comes to selling complex, large-scale business-to-business solutions. The authors' study found that every sales rep in the world falls into one of five distinct profiles, and while all of these types of reps can deliver average sales performance, only one-the Challenger- delivers consistently high performance. Instead of bludgeoning customers with endless facts and features about their company and products, Challengers approach customers with unique insights about how they can save or make money. They tailor their sales message to the customer's specific needs and objectives. Rather than acquiescing to the customer's every demand or objection, they are assertive, pushing back when necessary and taking control of the sale. The things that make Challengers unique are replicable and teachable to the average sales rep. Once you understand how to identify the Challengers in your organization, you can model their approach and embed it throughout your sales force. The authors explain how almost any average-performing rep, once equipped with the right tools, can successfully reframe customers' expectations and deliver a distinctive purchase experience that drives higher levels of customer loyalty and, ultimately, greater growth.
  gartner magic quadrant identity and access management: Cybersecurity Blue Team Strategies Kunal Sehgal, Nikolaos Thymianis, 2023-02-28 Build a blue team for efficient cyber threat management in your organization Key FeaturesExplore blue team operations and understand how to detect, prevent, and respond to threatsDive deep into the intricacies of risk assessment and threat managementLearn about governance, compliance, regulations, and other best practices for blue team implementationBook Description We've reached a point where all organizational data is connected through some network. With advancements and connectivity comes ever-evolving cyber threats - compromising sensitive data and access to vulnerable systems. Cybersecurity Blue Team Strategies is a comprehensive guide that will help you extend your cybersecurity knowledge and teach you to implement blue teams in your organization from scratch. Through the course of this book, you'll learn defensive cybersecurity measures while thinking from an attacker's perspective. With this book, you'll be able to test and assess the effectiveness of your organization's cybersecurity posture. No matter the medium your organization has chosen- cloud, on-premises, or hybrid, this book will provide an in-depth understanding of how cyber attackers can penetrate your systems and gain access to sensitive information. Beginning with a brief overview of the importance of a blue team, you'll learn important techniques and best practices a cybersecurity operator or a blue team practitioner should be aware of. By understanding tools, processes, and operations, you'll be equipped with evolving solutions and strategies to overcome cybersecurity challenges and successfully manage cyber threats to avoid adversaries. By the end of this book, you'll have enough exposure to blue team operations and be able to successfully set up a blue team in your organization. What you will learnUnderstand blue team operations and its role in safeguarding businessesExplore everyday blue team functions and tools used by themBecome acquainted with risk assessment and management from a blue team perspectiveDiscover the making of effective defense strategies and their operationsFind out what makes a good governance programBecome familiar with preventive and detective controls for minimizing riskWho this book is for This book is for cybersecurity professionals involved in defending an organization's systems and assets against attacks. Penetration testers, cybersecurity analysts, security leaders, security strategists, and blue team members will find this book helpful. Chief Information Security Officers (CISOs) looking at securing their organizations from adversaries will also benefit from this book. To get the most out of this book, basic knowledge of IT security is recommended.
  gartner magic quadrant identity and access management: CSO , 2009-07 The business to business trade publication for information and physical Security professionals.
  gartner magic quadrant identity and access management: Pro Azure Governance and Security Peter De Tender, David Rendon, Samuel Erskine, 2019-06-19 Any IT professional can tell you that managing security is a top priority and even more so when working in the cloud. Access to accurate and timely security information is critical, but governance and control must first be enabled. This guide shows you how to take advantage of Azure's vast and powerful built-in security tools and capabilities for your application workloads. Pro Azure Governance and Security offers a comprehensive look at the governance features available with Microsoft Azure and demonstrates how to integrate them with your hybrid and Azure environments, drawing on the author's experiences from years in the field. Learn about the array of controls implemented within Microsoft Azure from two valuable perspectives: the customer and Microsoft operations. Beginning with the top-level subscription hierarchy, learn about the most important built-in Azure security services and features, as well as how to use Azure Policies and Blueprints as a means for security and governance. A series of hands-on exercises teaches you the concepts of Azure Governance: how to enable and deploy Azure Security Center, integrate RBAC (role-based access control), and set up Azure Operations and Monitoring. Get introduced to the new Azure Sentinel solution that offers SIEM as a service for security incident management and proactive hunting. What You'll Learn Understand different architectural designs for implementing Azure Security Operate and monitor an Azure environmentDeploy Azure Governance, Policies, and BlueprintsDiscover key Azure features that enhance securityImplement and confidently access Azure Security CenterGet to know Azure Sentinel Who This Book Is For Technical engineers, consultants, solution and cloud architects, IT managers, and SecOps teams who need to understand how to integrate governance, security, and compliance in hybrid and Azure environments. A basic understanding of Azure or other public cloud platforms is beneficial, but not required.
  gartner magic quadrant identity and access management: Asset Attack Vectors Morey J. Haber, Brad Hibbert, 2018-06-15 Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn’t matter whether an organization uses LAN, WAN, wireless, or even a modern PAN—savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization’s cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You’ll Learn Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls Who This Book Is For New and intermediate security management professionals, auditors, and information technology staff looking to build an effective vulnerability management program and defend against asset based cyberattacks
  gartner magic quadrant identity and access management: The Social Organization Anthony J. Bradley, Mark P. McDonald, 2011-09-27 As a leader, it's your job to extract maximum talent, energy, knowledge, and innovation from your customers and employees. But how? In The Social Organization, two of Gartner's lead analysts strongly advocate exploiting social technology. The authors share insights from their study of successes and failures at more than four hundred organizations that have used social technologies to foster—and capitalize on—customers’ and employees’ collective efforts. But the new social technology landscape isn’t about the technology. It’s about building communities, fostering new ways of collaborating, and guiding these efforts to achieve a purpose. To that end, the authors identify the core disciplines managers must master to translate community collaboration into otherwise impossible results: • Vision: defining a compelling vision of progress toward a highly collaborative organization. • Strategy: taking community collaboration from risky and random success to measurable business value. • Purpose: rallying people around a clear purpose, not just providing technology. • Launch: creating a collaborative environment and gaining adoption. • Guide: participating in and influencing communities without stifling collaboration. • Adapt: responding creatively to change in order to better support community collaboration. The Social Organization highlights the benefits and challenges of using social technology to tap the power of people, revealing what managers must do to make collaboration a source of enduring competitive advantage.
  gartner magic quadrant identity and access management: Gamify Biran Burke, 2016-10-14 Organizations are facing an engagement crisis. Regardless if they are customers, employees, patients, students, citizens, stakeholders, organizations struggle to meaningfully engage their key constituent groups who have a precious and limited resource: their time. Not surprisingly, these stakeholders have developed deflector shields to protect themselves. Only a privileged few organizations are allowed to penetrate the shield, and even less will meaningfully engage. To penetrate the shield, and engage the audience, organizations need an edge. Gamification has emerged as a way to gain that edge and organizations are beginning to see it as a key tool in their digital engagement strategy. While gamification has tremendous potential to break through, most companies will get it wrong. Gartner predicts that by 2014, 80% of current gamified applications will fail to meet business objectives primarily due to poor design. As a trend, gamification is at the peak of the hype cycle; it has been oversold and it is broadly misunderstood. We are heading for the inevitable fall. Too many organizations have been led to believe that gamification is a magic elixir for indoctrinating the masses and manipulating them to do their bidding. These organizations are mistaking people for puppets, and these transparently cynical efforts are doomed to fail. This book goes beyond the hype and focuses on the 20% that are getting it right. We have spoken to hundreds of leaders in organizations around the world about their gamification strategies and we have seen some spectacular successes. The book examines some of these successes and identifies the common characteristics of these initiatives to define the solution space for success. It is a guide written for leaders of gamification initiatives to help them avoid the pitfalls and employ the best practices, to ensure they join the 20% that gets it right. Gamify shows gamification in action: as a powerful approach to engaging and motivating people to achieving their goals, while at the same time achieving organizational objectives. It can be used to motivate people to change behaviors, develop skills, and drive innovation. The sweet spot for gamification objectives is the space where the business objectives and player objectives are aligned. Like two sides of the same coin, player and business goals may outwardly appear different, but they are often the same thing, expressed different ways. The key to gamification success is to engage people on an emotional level and motivating them to achieve their goals.
  gartner magic quadrant identity and access management: Learning Analytics John R Mattox II, Mark Van Buren, Jean Martin, 2016-09-03 Faced with organizations that are more dispersed, a workforce that is more diverse and the pressure to reduce costs, CEOs and CFOs are increasingly asking what the return on investment is from training and development programmes. Learning Analytics provides a framework for understanding how to work with learning analytics at an advanced level. It focuses on the questions that training evaluation is intended to answer: is training effective and how can it be improved? It discusses the field of learning analytics, outlining how and why analytics can be useful, and takes the reader through examples of approaches to answering these questions and looks at the valuable role that technology has to play. Even where technological solutions are employed, the HR or learning and development practitioner needs to understand what questions they should be asking of their data to ensure alignment between training and business needs. Learning Analytics enables both senior L&D and HR professionals as well as CEOs and CFOs to see the transformational power that effective analytics has for building a learning organization, and the impacts that this has on performance, talent management, and competitive advantage. It helps learning and development professionals to make the business case for their activities, demonstrating what is truly adding value and where budgets should be spent, and to deliver a credible service to their business by providing metrics based on which sound business decisions can be made.
  gartner magic quadrant identity and access management: Security and Auditing of Smart Devices Sajay Rai, Philip Chukwuma, Richard Cozart, 2016-11-17 Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.
  gartner magic quadrant identity and access management: Pro PowerShell for Amazon Web Services Brian Beach, 2014-03-05 Pro PowerShell for Amazon Web Services is written specifically for Windows professionals who already know PowerShell and want to learn to host Windows workloads in the Amazon Elastic Cloud Compute (EC2) cloud service. The cloud offers information technology workers significant cost savings and agility unimaginable even just a few years ago. Tasks that traditionally took weeks of work, costing thousands of dollars, can be completed in minutes for a fraction of a penny. This book is a resource for using Microsoft's powerful scripting language, PowerShell, to create, host, manage, and administer workloads using a service widely recognized as the industry leader in cloud computing. Inside, find scripts to create and manage virtual machines, provision storage, configure networks with agility, and more--all using your preferred Windows scripting language. Use your PowerShell knowledge to harness the power of Amazon EC2 today!
  gartner magic quadrant identity and access management: Management Information Systems Kenneth C. Laudon, Jane Price Laudon, 2004 Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases.
  gartner magic quadrant identity and access management: System Center 2012 R2 Configuration Manager Unleashed Kerrie Meyler, Jason Sandys, Greg Ramsey, Dan Andersen, Kenneth van Surksum, Panu Saukko, 2014-09-01 Since Microsoft introduced System Center 2012 Configuration Manager, it has released two sets of important changes and improvements: Service Pack 1 and R2. This comprehensive reference and technical guide focuses specifically on those enhancements. It offers 300+ pages of all-new “in the trenches” guidance for applying Configuration Manager 2012’s newest features to improve user and IT productivity across all corporate, consumer, and mobile devices. An authoring team of world-class System Center consultants thoroughly cover System Center integration with Microsoft Intune and its mobile device management capabilities. They fully address Microsoft’s increased support for cross-platform devices, enhanced profiles, changes to application management, operating system deployment, as well as improvements to performance, security, usability, and mobile device management. The essential follow-up to System Center 2012 R2 Configuration Manager Unleashed, this new supplement joins Sams’ market-leading series of books on Microsoft System Center. • Use ConfigMgr 2012 R2 with Windows Intune to deliver people-centric management to any user, any device, anywhere • Simplify BYOD registration and enrollment, and enable consistent access to corporate resources • Integrate new mobile device management capabilities into the Configuration Manager console without service packs, hot fixes, or major releases • Provision authentication certificates for managed devices via certificate profiles • Automate repetitive software- and device-related tasks with PowerShell cmdlets • Centrally control roaming profiles, certificates, Wi-Fi profiles, and VPN configuration • Configure User Data and Profiles to manage folder redirection, offline files/folders, and roaming profiles for Windows 8.x users • Enable users to access data in Virtual Desktop Infrastructure (VDI) environments • Manage devices running OS X, UNIX, Linux, Windows Phone 8, WinRT, iOS, and Android • Understand the new cross-platform agent introduced in ConfigMgr 2012 R2 • Automate Windows setup with OSD • Prepare for, configure, install, and verify successful installation of the Windows Intune connector role • Respond to emerging challenges in mobile device management
  gartner magic quadrant identity and access management: Learning Amazon Web Services (AWS) Mark Wilkins, 2019-07-02 The Practical, Foundational Technical Introduction to the World’s #1 Cloud Platform Includes access to several hours of online training video: Mark Wilkins’ expert training video library guides you through setting up core services and prepares you to deploy your own apps and resources. Learning Amazon Web Services (AWS) is the perfect foundational resource for all administrators, developers, project managers, and other IT professionals who want to plan and deploy AWS services and/or earn AWS certification. Top cloud trainer and evangelist Mark Wilkins teaches best practices that align with Amazon’s Well-Architected Framework, introduces key concepts in the context of a running case study, carefully explains how core AWS services operate and integrate, and offers extensively tested tips for maximizing flexibility, security, and value. Companion online videos guide you step-by-step through setting AWS compute, storage, networking, scale, security, automation, and more. Balance cost, compliance, and latency in your service designs Choose the right networking options for your virtual private cloud (VPC) Build, host, launch, manage, and budget for EC2 compute services Plan for scale and resiliency, and make informed decisions about AWS storage Enforce strict security, and automate to improve operational efficiency This book with companion training videos is a valuable learning tool for anyone seeking to demonstrate expertise through formal certification. WEB EDITION: All buyers of the book or ebook can register your book for access to a free online Web Edition of this title, which included videos embedded within the text, plus updates as they become available.
  gartner magic quadrant identity and access management: Access Control and Identity Management Mike Chapple, 2020-10-01 Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs.
  gartner magic quadrant identity and access management: Cyber Security Innovation for the Digital Economy Petrenko, Sergei, 2018-12-07 Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and computational cognitivism, involving a number of existing models and methods. In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time. This book contains four chapters devoted to the following subjects: Relevance of the given scientific-technical problems in the cybersecurity of Digital EconomyDetermination of the limiting capabilitiesPossible scientific and technical solutionsOrganization of perspective research studies in the area of Digital Economy cyber security in Russia.
  gartner magic quadrant identity and access management: Digital Identity Phillip J. Windley, 2005-08 Some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. This book explains how to go about it. It details an important concept known as identity management architecture (IMA): a method to provide ample protection.
  gartner magic quadrant identity and access management: Losing the Cybersecurity War Steve King, 2022-12-07 This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We have taken a deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioral guidelines, where we provide examples of how we got here, what we can do about it, why we got here, and how we can avoid these traps in the future. This is a unique viewpoint that has never been explored – the five battlefields include Economics, Technology, Information, Education, and Leadership – and how each has contributed to our current disadvantage on the global stage. We go on to discuss how Zero Trust can change the game to create an advantage for us going forward. The credibility of Zero Trust stems directly from the father of Zero Trust, John Kindervag, who says, “And now, Steve has written a new book on Zero Trust called Losing the Cybersecurity War: And What We Can Do to Stop It. It is undeniably the best Zero Trust book yet written. While other writers have focused on implementing Zero Trust from their perspectives, Steve focuses on why Zero Trust is so important on the modern cybersecurity battlefield. His concept of the five cyber battlefields is a great insight that will help us win the cyberwar. By weaving Zero Trust principles throughout these five concepts, Steve demonstrates how the ideas and efforts involved in building Zero Trust environments will lead to a profound shift in terrain advantage. No longer will attackers own the high ground. As defenders and protectors, we can leverage modern technology in a Zero Trust way to keep our data and assets safe from infiltration and exploitation.”
  gartner magic quadrant identity and access management: Identity and Access Management Ertem Osmanoglu, 2013-11-19 Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML. Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirements, design, and development to implementation Presents a proven, step-by-step method for deploying IAM that has been successfully used in over 200 cases Includes companion website with source code examples in Java, XML, and SPML as well as reusable templates
  gartner magic quadrant identity and access management: Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing Yang, Xiaoyu, 2013-01-31 Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in scientific communities. Although advancements such as computational power, storage, networking, and infrastructure have aided in making major progress in the implementation and realization of cloud-based systems, there are still significant concerns that need to be taken into account. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing aims to present insight into Cloud principles, examine associated methods and technologies, and investigate the use of service-oriented computing technologies. In addressing supporting infrastructure of the Cloud, including associated challenges and pressing issues, this reference source aims to present researchers, engineers, and IT professionals with various approaches in Cloud computing.
  gartner magic quadrant identity and access management: Rising Above the Gathering Storm Institute of Medicine, National Academy of Engineering, National Academy of Sciences, Committee on Science, Engineering, and Public Policy, Committee on Prospering in the Global Economy of the 21st Century: An Agenda for American Science and Technology, 2007-03-08 In a world where advanced knowledge is widespread and low-cost labor is readily available, U.S. advantages in the marketplace and in science and technology have begun to erode. A comprehensive and coordinated federal effort is urgently needed to bolster U.S. competitiveness and pre-eminence in these areas. This congressionally requested report by a pre-eminent committee makes four recommendations along with 20 implementation actions that federal policy-makers should take to create high-quality jobs and focus new science and technology efforts on meeting the nation's needs, especially in the area of clean, affordable energy: 1) Increase America's talent pool by vastly improving K-12 mathematics and science education; 2) Sustain and strengthen the nation's commitment to long-term basic research; 3) Develop, recruit, and retain top students, scientists, and engineers from both the U.S. and abroad; and 4) Ensure that the United States is the premier place in the world for innovation. Some actions will involve changing existing laws, while others will require financial support that would come from reallocating existing budgets or increasing them. Rising Above the Gathering Storm will be of great interest to federal and state government agencies, educators and schools, public decision makers, research sponsors, regulatory analysts, and scholars.
  gartner magic quadrant identity and access management: The Economics of Urban Transportation Kenneth A. Small, Erik T. Verhoef, Robin Lindsey, 2024-06-10 This new edition of the seminal textbook The Economics of Urban Transportation incorporates the latest research affecting the design, implementation, pricing, and control of transport systems in towns and cities. The book offers an economic framework for understanding the societal impacts and policy implications of many factors including congestion, traffic safety, climate change, air quality, COVID-19, and newly important developments such as ride-hailing services, electric vehicles, and autonomous vehicles. Rigorous in approach and making use of real-world data and econometric techniques, the third edition features a new chapter on the special challenges of managing the energy that powers transportation systems. It provides fully updated coverage of well-known topics and a rigorous treatment of new ones. All of the basic topics needed to apply economics to urban transportation are included: Forecasting demand for transportation services under various conditions Measuring costs, including those incurred by users and incorporating two new tools to describe congestion in dense urban areas Setting prices under practical constraints Evaluating infrastructure investments Understanding how private and public sectors interact to provide services Written by three of the field’s leading researchers, The Economics of Urban Transportation is essential reading for students, researchers, and practicing professionals in transportation economics, planning, engineering, or related disciplines. With a focus on workable models that can be adapted to future needs, it provides tools for a rapidly changing world.
  gartner magic quadrant identity and access management: Border Management Modernization Gerard McLinden, Enrique Fanta, David Widdowson, Tom Doyle, 2010-11-30 Border clearance processes by customs and other agencies are among the most important and problematic links in the global supply chain. Delays and costs at the border undermine a country’s competitiveness, either by taxing imported inputs with deadweight inefficiencies or by adding costs and reducing the competitiveness of exports. This book provides a practical guide to assist policy makers, administrators, and border management professionals with information and advice on how to improve border management systems, procedures, and institutions.
Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业 …

Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔 …

如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。

普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …

IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商 …

为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎

如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响应) …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原 …

EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据 …

如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的 …

什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …

Gartner是一个什么样的机构? - 知乎
Gartner(高德纳)成立于1979年,是全球最具权威的IT研究公司,其名头在顾问研究领域,可以说是无人不知无人不晓,在鼓公司拥有 1,200多位世界级分析专家。在全球的IT产业 …

Gartner魔力象限为什么会受到重视? - 知乎
Gartner由Gartner研究与咨询服务、Gartner顾问、Gartner评测、Gartner社区四部分组成,在此我们不做过多阐述。 二维模型阐释公司实力四个象限评判企业差异 最为大家熟知的“Gartner魔 …

如何获取Gartner报告,付费账号怎么申请,年费多少? - 知乎
其实也能找到一些渠道可以低价获取报告,之前试过以几百块的价格买过Gartner报告(比如技术成熟度曲线等),亲测过,如果需要可以私信我,我有空的情况下尽量传授经验。

普及一下什么是大数据技术? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …

IDC研究方向,报告与Gartner 的主要区别是什么? - 知乎
Gartner数据这块比较弱,分析师团队基本都Base在北美,没有数据相关的常规报告,中国分析师团队规模较小,常规报告都是全球的,基本不划分区域,不接地气。但是技术趋势分析和厂商 …

为人熟知的世界权威市场数据调查机构都有哪些? - 知乎
为人熟知的世界权威市场数据调查机构都有哪些? - 知乎

如何评价Gartner 刚发布的2020年 《NDR(网络威胁检测及响应) …
问题一、Gartner为什么把原来的《NTA全球市场指南》调整成了《NDR全球市场指南》? NDR可以看作是NTA的进化版,都属于流量威胁检测设备。 Gartner把原来的NTA调整成NDR的原 …

EDR(终端检测与响应)和传统杀毒软件有什么区别? - 知乎
EDR,是端点检测与响应(Endpoint Detection & Response,EDR)的缩写,Gartner 于 2013 年定义了这一术语,被认为是一种面向未来的终端解决方案,以端点为基础,结合终端安全大数据 …

如何获得Gartner、iSuppli、IDC之类的原报告? - 知乎
我有过两种免费获得Gartner报告的经历: 1. 用大学邮箱注册,@unimelb.edu.au 我们学校有部分订阅。(母校威武)你们可以用所在组织邮箱注册一下,说不定订阅了。 2. 去领导者象限的 …

什么是BI,当前国内外BI的现状,BI的应用状况? - 知乎
知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …