Users and Vendors Speak Out: Authentication and Biometrics
|
|
- Christal Phelps
- 5 years ago
- Views:
Transcription
1 Market Analysis Users and Vendors Speak Out: Authentication and Biometrics Abstract: Authentication and biometrics play an important part in enterprise security. However, their overuse has spawned a lofty dream of single sign-on, but enterprises find reduced sign-on a more realistic choice. By Elroy Jopling and Bhawani Shankar Strategic Market Statements Single sign-on is a goal that enterprises will not achieve; however, enterprises can achieve reduced sign-on, which provides a positive return in the short term. Identity theft is a growing serious threat; enterprises have a role in ensuring that they are part of the solution rather than part of the problem, so for their customers, enterprises should not use government-assigned numbers (for example, social security numbers). Voice and data convergence on Internet Protocol (IP) networks will create a new level of security requirements of which enterprises must be aware and for which they must plan. Publication Date:4 August 2003
2 2 Users and Vendors Speak Out: Authentication and Biometrics Introduction As security requirements have increased, authentication has expanded to the point that too many passwords, instead of increasing security, have done the opposite. Many businesses will see single sign-on as a solution, but realities will dictate a move to reduced sign-on. Biometrics will have a role to play, but is, in itself, no cure. Authentication has two issues, which will take up our time over the next number of years: authentication from a personal perspective of how much we are willing to give up and for what and voice and data convergence will bring with it a new level of security requirements. (Note: The body of this Perspective reflects the thoughts of users and vendors, not specifically those of Gartner. The users' and vendors' thoughts are from the Gartner IT Security Summit 2003 as part of Sector5 telecommunications and information services users and vendors industry panel discussions.) Authentication and Biometrics Pursuing the "Holy Grail" of Single Sign-On Is single sign-on a realistic goal or an objective never to be reached? Within the enterprise, single sign-on will not be achievable because of the number of legacy systems already out there and the dissimilarities between corporate functional mandates. While single sign-on may be the vision, the reality and the corporate direction should be reduced sign-on a phased program for a steady decrease in the number of user authentications required and a concurrent move toward a harmonized security platform that makes this possible. The result of this should be to reduce the number of places from which enterprises manage user authentication and the number of means with which they authenticate them. The return on investment (ROI) for reduced sign-on is a combination of the benefits of keeping the "bad guys" out and the reduction of operational expenses. The former is effectively not identifiable, while the latter is real and can make a significant difference. The future is now for reduced sign-on. New applications and more passwords have overwhelmed the user, who resort to securitychallenged means of either writing passwords down or putting them on their personal digital assistants (PDAs). Forty percent of all help-desk calls are password- or user-lockoutrelated. Lowering these costs is realizable and tangible. From an operational perspective, the concept of reduced sign-on can pay for itself in eight to nine months. With reduced sign-on, as enterprises roll out Web services and selfservices, every new application efficiently spreads the cost over a greater base while reducing time to market Gartner, Inc. and/or its Affiliates. All Rights Reserved. 4 August 2003
3 A key benefit for the drive to reduced sign-on is the inherent development of a corporate, enhancing identity-management system. A concern of the drive to single or reduced sign-on is that if you crack one code, you crack them all, opening up the entire enterprise system. Enterprises must separate applications into zones: More-sensitive information means more-secure levels of authentication. Enterprises must rationalize their overt need for passwords and the degree of authentication required. Is a password needed for everything? Does booking a conference room need ultra-secure authentication or will a simple password suffice for a number of applications? Security and authentication will always follow the concept of defense in depth, specifically in the layering of authentication. Biometrics Even though biometrics has significant potential, it has remained in the early adopter stage for a long time. Biometrics is not a cure-all. With biometrics, the adage that "technology is nothing and implementation is everything" is extremely applicable. A true-life example is using fingerprints for authentication, but transmitting the digital representation unencrypted over the network. If specific biometrics is compromised, an individual is not able to reset as with a password. Authentication Gets Personal A discussion of single or reduced sign-on in the enterprise is a dollarsand-cents discussion, but when it comes to the enterprise's authentication of the individual, it becomes a personal discussion. What is acceptable and doable for the corporate is different from a personal perspective. An individual's unique identifier is generally accepted as a justifiable goal, but the road to getting there is fraught with numerous problems. One of the greatest problems in the drive to a unique identifier has been the past and present promiscuity of the use of commonly available identifiers such as social insurance numbers. Initially devised as an income tax identifier, it is now overused and definitely not used for its original purpose. For instance, water utilities use social security numbers as a means of authentication even when water is not a taxable item. Drivers' licenses have also followed the same slippery slope of overuse and inappropriate use. Birth certificates are a core identity, but their process of being initiated is fraught with error and they do not provide enough verifiable information Gartner, Inc. and/or its Affiliates. All Rights Reserved. 4 August 2003
4 4 Users and Vendors Speak Out: Authentication and Biometrics Biometrics provides the means for a unique identifier, but no one has provided a case pertaining to why we should provide the information. Enterprises will want to use their own authentication information and methodology. Typically, they won't compromise this drive to interwork with another enterprise (for example, your credit card company won't work with your motor vehicle licensing organization). Why should you trust the other guy with your customer's data? As with the enterprise, private individuals won't have a single sign-on or card. For them, even reducing the number of sign-ons or cards is questionable. As information is collected and propagated from database to database, it takes on a life of its own. Identity theft just becomes too easy. Generally, there is no problem with a central depository for an individual's identity, but it must be carefully guarded. A need exists for a Fort Knox for identities. Someday we must have a central depository: World events will precipitate it. The question of what one gives up for what one receives has not been answered. Without an overt government push, individuals simply won't buy in until the question is answered. Who will manage this central depository of identities in an environment where every institution has been compromised at some time or another? A single-identity depository in which the individual has control over how his identity will be propagated will evolve, but we will need new laws and new technologies, and the time frame will be at least 10 to 20 years. Authentication in a Voice- and Data-Converging World The convergence of voice and data has been a long time coming, but as it is becoming a reality, a new level of security and authentication complexity comes with it. Personal identification numbers (PINs) and dual-tone multifrequency (DTMF) signaling passwords are sent over the public networks unencrypted and people still trust them. Even though it would be easy to find this information out, with the volume of traffic comes "security by obscurity." With the move to Voice over Internet Protocol (VoIP), the front door to the network opens. How does the network determine that there isn't a data packet along with all the VoIP packets? Traffic can be examined, but with a real-time voice application one must not have these delays. Real-time media firewalls are essential. Paralleling data security, a new breed of security devices will arise (for example, telecommunications firewalls, telecom intrusion detection systems [IDS] and so on) Gartner, Inc. and/or its Affiliates. All Rights Reserved. 4 August 2003
5 Gartner Dataquest Perspective While the data industry has had its "hackers," the voice industry has had its "freakers," who specialized on hacking voice switches. Voice theft from private branch exchanges (PBXs) is estimated to cost enterprises $50 billion a year. With data and voice convergence, hackers and freakers will converge onthesametarget theenterprise. Even the hacking community has evolved. Rather than simply orchestrating an attack, hackers have moved into publishing the exploit script or tool to their confreres on the Internet, significantly expanding the rapidity and scope of attacks. Align Enterprise, Employee and Customer Perspectives "What are you trying to solve?" was an often-repeated question from users and vendors. Authentication is an obvious requirement for the enterprise and the individual, but technology is only an enabler. We must have adequately addressed what we are trying to solve and the answer must incorporate the rationale from the perspectives of the enterprise, the employee and the consumer. The Degree of Authentication Withadesiretoensuresecurity,theenterprisemayfindsitselfaspartof the problem rather than the solution. For incidental applications (for example, booking conference rooms), do away with passwords or allow the user to use simplistic repeatable passwords. You want the user to be vigilant on the critical applications, rather than being befuddled with a morass of authentication everywhere. Sign-Ons: Not One, But Fewer Within the enterprise, single sign-on is only a vision. The baggage we carry with legacy systems and corporate structures will predicate that enterprises must lower their aspirations. Reality will be reduced sign-on, and although this may not be total fulfillment of the enterprise's goal, its benefits can be real in the reduction of support costs and the combined evolution of the practice of identity management within the enterprise. Are Enterprises Perpetrating Identity Theft? Enterprises must ensure they are not part of the identity theft problem. Enterprises should not use government-assigned numbers especially social security numbers and drivers' licenses as unique personal identifiers for access to their operations. The U.S. Federal Trade Commission, statelevel consumer advocates and many U.S. Congress members are dedicated to stopping indiscriminate use of social insurance numbers for corporate or other identification. They believe that promiscuous use enables identity theft, "economic crimes" such as money laundering, and identity fraud, including use in terrorism and other crimes such as welfare fraud Gartner, Inc. and/or its Affiliates. All Rights Reserved. 4 August 2003
6 6 Users and Vendors Speak Out: Authentication and Biometrics Next-Generation Authentication Voice and data convergence represents a brave new world for security. Hackers and freakers will converge to address it. The security tools for data will be mirrored to address a VoIP network and also to address voice's real-time requirement processing capabilities, which must be greatly accelerated. An often-used expression regarding security is the "layered" approach. With each new technology, a new security technology must be layered on, dampening innovation. The hacker's greatest detriment may not be their immediate attacks, but rather the long-term impact of technology advancement slowing to ensure security is addressed. Key Issue How are network security concerns impacting enterprise communications networks? This document has been published to the following Marketplace codes: TELC-WW-DP-0576 For More Information... In North America and Latin America: In Europe, the Middle East and Africa: In Asia/Pacific: In Japan: Worldwide via gartner.com: Entire contents 2003 Gartner, Inc. and/or its Affiliates. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice
NGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationCentral and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary
Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the
More informationGlobal Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary
Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary Publication Date: 9 April 2003 Author Wm.L.Hahn This document has been published to the following Marketplace codes: TELC-WW-EX-0576
More informationMidsize Business Voice Service Spending Steady for 2003
End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in
More informationSOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary
SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been
More informationNGN: The Evolution of Wireless Networks
NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.
More informationEurope Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary
Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Publication Date: 1 July 2003 Authors Fabrizio Biscotti Alain Dang Van Mien Norma Schroder Chris Pang This document
More informationVertical Market Trends: Western Europe, (Executive Summary) Executive Summary
Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace
More informationIT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary
IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the
More informationFirewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary
Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published
More informationIT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary
IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the
More informationDBMS Software Market Forecast, (Executive Summary) Executive Summary
DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:
More informationSurvey of Mobile Phone Users in Poland and Russia, 2003 (Executive Summary) Executive Summary
Survey of Mobile Phone Users in Poland and Russia, 2003 (Executive Summary) Executive Summary Publication Date: 3 December 2003 Author Sarah Randall This document has been published to the following Marketplace
More informationNGN: Enterprise IP Telephony
NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations
More informationMobile Terminals: Middle East, (Executive Summary) Executive Summary
Mobile Terminals: Middle East, 2001-2007 (Executive Summary) Executive Summary Publication Date: 25 July 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace
More informationWorldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary
Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace
More informationFixed Public Services Trends in CEE and MEA, (Executive Summary) Executive Summary
Fixed Public Trends in CEE and MEA, 2001-2007 (Executive Summary) Executive Summary Publication Date: 4 August 2003 Author William L. Hahn This document has been published to the following Marketplace
More informationTrends in Fixed Public Network Services: Finland, (Executive Summary) Executive Summary
Trends in Fixed Public Network Services: Finland, 2000-2006 (Executive Summary) Executive Summary Publication Date: October 17, 2002 Authors Susan Richardson Maureen Coulter Michal Halama Katja Ruud Lisa
More informationAsia/Pacific: Systems Consolidation, Hype or Reality?
Research Brief Asia/Pacific: Systems Consolidation, Hype or Reality? Abstract: Through 2005, consolidation will be of major concern to IT management in Asia/Pacific as organizations struggle to control
More informationWorldwide Workstation Shipments Rebound in Third Quarter
Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase
More informationIP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary
IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary Publication Date: September 9, 2002 Author Chee Eng To This document has been published to the following Cluster codes: TELC-WW-EX-0423
More informationFICON Drives Fibre Channel Security
FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre
More information4Q02 Update: Disk Storage Forecast Scenarios,
Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than
More informationFinding Pure-Play Midtier ESPs: A Two-Step Process
Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors
More informationLeased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary
Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Publication Date: December 4, 2002 Authors Alayne Wong To Chee Eng Evelyn Goh Kenshi Tazaki Andrew
More informationMobile Terminals: Western Europe, (Executive Summary) Executive Summary
Mobile Terminals: Western Europe, 1998-2007 (Executive Summary) Executive Summary Publication Date: 6 June 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace
More informationAIOs Displace Single-Function Printers in Latin America
` Market Analysis AIOs Displace Single-Function Printers in Latin America Abstract: Stand-alone printer shipments have dropped sharply, while inkjet all-in-one printers continue to gain market share in
More informationPublic Infrastructure: What s in Store for 2003?
Forecast Analysis Public Infrastructure: What s in Store for 2003? Abstract: The markets for public infrastructure equipment will remain weak until 2004 because of scaled-back carrier capital spending,
More informationWireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary
Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Publication Date: October 14, 2002 Authors To Chee Eng Evelyn Goh Kobita Desai This document has been published to the following
More informationTrends in Fixed Public Network Services: Austria, (Executive Summary) Executive Summary
Trends in Fixed Public Network Services: Austria, 2000-2006 (Executive Summary) Executive Summary Publication Date: September 25, 2002 Authors Michal Halama Maureen Coulter Katja Ruud Susan Richardson
More informationCurrent and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary
Current and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary Publication Date: 25 August 2003 Authors Hyun-Sook Lee Sumit Malik John Calvert This document
More informationPush-to-Talk Brings Voice-Based Instant Messaging to Europe
Research Brief Push-to-Talk Brings Voice-Based Instant Messaging to Europe Abstract: Push-to-talk services will soon let Europe s mobile phone users send voice messages via IP, boosting data revenue. Young
More informationSemiconductor Market for Data Processing: Asia/Pacific, 3Q03
Research Brief Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Abstract: Semiconductor market conditions have improved since the second quarter of 2003, and the industry's recovery is continuing.
More informationTrends in Fixed Public Network Services: Germany, (Executive Summary) Executive Summary
Trends in Fixed Public Network Services: Germany, 2000-2006 (Executive Summary) Executive Summary Publication Date: October 18, 2002 Authors Michal Halama Katja Ruud Maureen Coulter Susan Richardson Lisa
More informationHardware Decisions for Embedded Systems Design in Asia/Pacific
End-User Analysis Hardware Decisions for Embedded Systems Design in Asia/Pacific Abstract: Over 900 embedded systems designers in Asia/Pacific responded to our survey of hardware decisions. Currently,
More informationChina: User Perceptions and Plans for PCs and PDAs in 2003
End-User Analysis China: User Perceptions and Plans for PCs and PDAs in 2003 Abstract: The majority of the Chinese organizations' IT strategies and budget planning issues remain immature. It would not
More informationHuawei: China's Leading Equipment Vendor Returns to Growth
Research Brief Huawei: China's Leading Equipment Vendor Returns to Growth Abstract: Huawei has turned in a strong performance during the first half of 2003. The second half of the year could be even better.
More informationMobile Java: A New Opportunity for Data Services (Executive Summary) Executive Summary
Mobile Java: A New Opportunity for Data Services (Executive Summary) Executive Summary Publication Date: November 1, 2002 Authors Ben Wood Alan Brown Ann Liang Nahoko Mitsuyama Delia MacMillan Sauk-Hun
More informationFinal 2002 Asia/Pacific Semiconductor Market Share by Geographical Area (Executive Summary) Executive Summary
Final Asia/Pacific Semiconductor Share by Geographical Area (Executive Summary) Executive Summary Publication Date: 22 May 2003 Authors Hee-Chan Lee Adriana Blanco Ada Cheng Jeremey Donovan Tamara Grant
More informationHDD Head and Media Markets Show Variable Growth and Decline, (Executive Summary) Executive Summary
HDD Head and Media Markets Show Variable Growth and Decline, 1998-2002 (Executive Summary) Executive Summary Publication Date: 12 March 2003 Author John Monroe This document has been published to the following
More informationExternal RAID-Based Storage System Analysis by Form Factor
Research Brief External RAID-Based Storage System Analysis by Form Factor Abstract: Gartner Dataquest forecasts factory revenue for modular external RAID controllerbased storage systems will grow at a
More informationShould You Use Liberty or Passport for Digital Identities?
Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft
More informationLittle Smart, Big Plans: PHS Storms Ahead in China
Research Brief Little Smart, Big Plans: PHS Storms Ahead in China Abstract: Based on personal handyphone system technology, Little Smart has emerged as one of the fastest-growing services in the telecom
More informationChoices Multiply in Midrange and High-End Color Printing
Research Brief Choices Multiply in Midrange and High-End Color Printing Abstract: Color speed is no longer an oxymoron. Color copiers and printers with speeds between 30 and 50 pages per minute are commonly
More informationMobile Phones, Poor Economy to Dampen PDA Market to 2007
Forecast Analysis Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Abstract: A stagnant economy and growing competition from mobile phones have reduced our expectations for PDA market growth. Worldwide
More informationSizzles and Fizzles in the Server Forecast
Sizzles and Fizzles in the Server Forecast Forecast Analysis Abstract: Intel Architecture 64-bit-based-server revenue will grow at more than 90 percent per year through 2008, surpassing $7 billion worldwide.
More informationSpending on Service Provider Routers Begins to Grow in EMEA
Research Brief Spending on Service Provider Routers Begins to Grow in EMEA Abstract: 2Q03 brought the first rise in end-user spending on service provider routers in Europe, Middle East and Africa for a
More information4Q03 Update: Global Semiconductor Forecast Scenarios
Forecast Analysis 4Q03 Update: Global Semiconductor Forecast Scenarios Abstract Semiconductor revenue growth in 2003 is certain to exceed 11 percent. As the industry recovery gains pace in the coming quarters,
More informationAsia/Pacific and Japan: Optical Network Equipment Market, (Executive Summary) Executive Summary
Asia/Pacific and Japan: Optical Network Equipment Market, 1998-2007 (Executive Summary) Executive Summary Publication Date: 30 June 2003 Authors Sumit Malik John Mazur This document has been published
More informationFour Partial Solutions for Remote Network Access
Decision Framework, E. Paulak Research Note 29 August 2003 Four Partial Solutions for Remote Network Access Four different solutions can help to meet your remoteaccess needs. Managed-service providers
More informationCOM I. Keene, B. Hafner
I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.
More informationEricsson Rolls Out BT Next-Generation Switching Network
Market Analysis Ericsson Rolls Out BT Next-Generation Switching Network Abstract: The upgrade of BT's trunking network represents one of the largest next-generation switching deployments. Ericsson's ENGINE
More information2002 Semiconductor Equipment Market Share Analysis (Executive Summary) Executive Summary
2002 Semiconductor Equipment Market Share Analysis (Executive Summary) Executive Summary Publication Date: 2 May 2003 Authors Mark Stromberg Klaus Rinnen Jim Walker Robert Johnson Dean Freeman Takashi
More informationCOM F. Troni, L. Fiering
F. Troni, L. Fiering Research Note 8 September 2003 Commentary Notebook TCO Comparison: Day Extenders vs. Traveling s Notebooks used by traveling workers, who are out of the office more often and work
More information2018 Trends in Hosting & Cloud Managed Services
PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior
More informationAsia/Pacific: Embedded Systems Design, Software Decisions
Market Analysis Asia/Pacific: Embedded Systems Design, Software Decisions Abstract: An in-depth look at embedded systems designers in Asia/Pacific shows usage patterns for real-time OSs and embedded software
More information4Q03 Update: Wireless Communications Semiconductor Forecast,
Forecast Analysis 4Q03 Update: Wireless Communications Semiconductor Forecast, 2003-2005 Abstract: Mobile communications semiconductor revenue was strong in the third quarter. 2003 is on a path for 16
More informationLeveraging China's Memory Market Opportunity
Research Brief Leveraging China's Memory Market Opportunity Abstract: The Chinese memory market offers growth opportunities for local and global semiconductor companies alike. Investments in Chinese manufacturing
More informationSybase Executes on Its Partnership Strategy
Event Summary Sybase Executes on Its Partnership Strategy Abstract: Sybase has implemented a corporate partnership with a vertical market focus that it believes will develop into profitable channels. By
More informationGet Ready for the Revival of Large Data Centers
Research Publication Date: 4 August 2006 ID Number: G00142079 Get Ready for the Revival of Large Centers Rakesh Kumar Although large data centers declined in importance in recent years, they will return
More informationApple Computer Unveils New Hybrid X Server Operating System
Research Brief Apple Computer Unveils New Hybrid X Server Operating System Abstract: Apple Computer recently unveiled the Apple OS Xserve operating system on its X Serve one-unit rack platforms. Apple's
More informationDRAM Forecast Outlook, 3Q03: Price Rises Force Forecast Up
Forecast Analysis DRAM Forecast Outlook, 3Q03: Price Rises Force Forecast Up Abstract: Reduced supply of dynamic random-access memory has caused prices to rise sooner than expected. Now that the industry
More informationTCPN-WW-CV-0102 Frank Fabricius
Frank Fabricius Cluster Research Catalog 30 December 2003 Public Network Infrastructure Worldwide Cluster Research Archive The Cluster Research Archive is a listing of deliverables for the Public Network
More informationProduction Surge Boosts Automotive Semiconductor Market
Market Analysis Production Surge Boosts Automotive Semiconductor Market Abstract: Demand for automotive semiconductors revived in 2002, as car makers stepped up production. Consumer fears may stifle growth
More informationCIO Update: Security Platforms Will Transform the Network Security Arena
IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will
More informationSouth Korea Ponders Its High-Speed Future
Research Brief South Korea Ponders Its High-Speed Future Abstract: The South Korean government may detail a radical proposal to create a new integrated high-speed network covering most of South Korea in
More informationSpam Filtering Works Better With a Management Policy
Select Q&A, M. Grey, A. Hallawell Research Note 22 September 2003 Spam Filtering Works Better With a Management Policy A deployment of spam-filtering technology that does not consider business issues will
More informationGetting Off Windows XP Is More Important Than Windows Vista vs. Windows 7
Research Publication Date: 12 March 2009 ID Number: G00165756 Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7 Michael A. Silver, Stephen Kleynhans For most organizations, skipping
More informationManagement Update: Information Security Risk Best Practices
IGG-07022003-01 R. Witty Article 2 July 2003 Management Update: Information Security Risk Best Practices The growing focus on managing information security risk is challenging most enterprises to determine
More informationMarket Scope. Magic Quadrant Methodology
Markets, J. Enck, A. Powell Research Note 12 May 2003 Global IA High-Volume Server Magic Quadrant, 1H03 Gartner's Magic Quadrant for Intel Architecture in 1H03 indicates that Dell Computer, Hewlett-Packard
More informationMidsize Businesses Slowly Warm Up to Storage Services
Research Brief Midsize Businesses Slowly Warm Up to Storage Services Abstract: A recent study reveals only lukewarm demand for new storage services among midsize businesses. Assessment tools and peer references
More informationThe Business Communications Landscape Is Ripe for Massive Disruption
THOUGHT LEADERSHIP The Business Communications Landscape Is Ripe for Massive Disruption MAY 2017 Raul Castanon-Martinez, Senior Analyst, Workforce Collaboration and Communications Business communications
More informationManagement Update: Wireless LAN Predictions for 2004
IGG-11192003-03 K. Dulaney, R. Ahlawat Article 19 November 2003 Management Update: Wireless LAN Predictions for 2004 Wireless LAN (WLAN) technology and use continue to evolve at a rapid pace. WLANs will
More informationPC Manufacturing Is Surviving SARS-Induced Market Fears in China
Research Brief PC Manufacturing Is Surviving SARS-Induced Market Fears in China Abstract: The PC manufacturing market in China has grown significantly in the past decade. The driving momentum will continue,
More information4Q03 Update: Wired Communications Semiconductor Forecast,
Forecast Analysis 4Q03 Update: Wired Communications Semiconductor Forecast, 2003-2005 Abstract: On the strength of application-specific semiconductor revenue, the revised wired communications semiconductor
More informationNEXT-GENERATION DATACENTER MANAGEMENT
NEXT-GENERATION DATACENTER MANAGEMENT From DCIM to DCSO Sometimes described as the operating or ERP system for the datacenter, datacenter infrastructure management (DCIM) is a technology that helps operators
More informationNetIQ's VoIP Management Products
Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.
More informationU.S. Telecom Market's Future Depends on Carrier Capex
AV-16-2652 U.S. Telecom Market's Future Depends on Carrier Capex Published: 8 May 2002 Analyst(s): Tim Smith Capital expenditure (capex) plans announced by major U.S. carriers indicate that 2002 and 2003
More informationGovernments Can Bring Moore's Law to Broadband Access
Research Brief Governments Can Bring Moore's Law to Broadband Access Abstract: A strategy to promote the building of fiber networks shows how governments can greatly improve the availability, speed and
More informationPending U.S. Anti-spam Legislation: A Marketer's Guide
Tactical Guidelines, W. Janowski Research Note 14 August 2003 Pending U.S. Anti-spam Legislation: A Marketer's Guide Nine anti-spam proposals are before the 108th U.S. Congress. Marketers must understand
More informationUser Survey Analysis: Next Steps for Server Virtualization in the Midmarket
User Survey Analysis: Next Steps for Server Virtualization in the Midmarket Gartner RAS Core Research Note G00207375, James A. Browning, Alan Dayley, 21 October 2010, RV2A411012011 Approximately 30% of
More informationContinuing Weakness in Public Infrastructure Markets
Research Brief Continuing Weakness in Public Infrastructure Markets Abstract: The markets for public infrastructure equipment will remain weak until 2004 because of scaled-back carrier capital spending,
More informationCOLOCATION AND THE ART OF RAPID-EXECUTION TRADING. Examining Low Latency, Colocation and Proximity Hosting
COLOCATION AND THE ART OF RAPID-EXECUTION TRADING Examining Low Latency, Colocation and Proximity Hosting This fourth report in our low-latency series goes beyond the technology that underpins trading.
More informationPrepare for Your Windows 7 Migration Crunch
Research Publication Date: 24 June 2010 ID Number: G00200733 Prepare for Your Windows 7 Migration Crunch Charles Smulders, Stephen Kleynhans The necessity to migrate off Microsoft Windows XP and Windows
More informationMany Challenges Remain for Mobile Communications
Market Analysis Many Challenges Remain for Mobile Communications Abstract: The marketplace for mobile services, terminals and infrastructure has been affected by the economic slowdown and the high cost
More informationHP Reveals Details About New Copier Lineup
Gartner Dataquest Alert HP Reveals Details About New Copier Lineup Product Details Last August, HP announced that it had forged a strategic alliance with Konica to market the latter's copier engines, but
More informationIndustry Research. Government in the Clouds
Industry Research Publication Date: 20 May 2010 ID Number: G00200519 Government in the Clouds Andrea Di Maio, Massimiliano Claps Over the last year or so, "cloud computing" has become one of the most hyped
More informationEnterprise Data Architecture: Why, What and How
Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented
More informationNetwork-Attached Storage Market Shows Weakness
Market Analysis Network-Attached Storage Market Shows Weakness Abstract: Despite Dell's strong growth in revenue, most other network-attached storage vendors experienced weaker performance in the first
More informationSoftware-Defined WAN Does Not Grow on WAN Alone
MARKET FORECAST Software-Defined WAN Does Not Grow on WAN Alone OCT 2017 Jim Duffy, Senior Analyst, Networking Software-defined WAN is expected to undergo robust growth over the next few years, fueled
More informationHost-Bus RAID Controller Worldwide Market Share, 2002 (Executive Summary) Executive Summary
Host-Bus RAID Controller Worldwide Market Share, 2002 (Executive Summary) Executive Summary Publication Date: 23 July 2003 Author Roger W. Cox This document has been published to the following Marketplace
More informationPassword-Handling Guidelines
Tutorials, A. Allan, R. Witty Research Note 22 December 2003 Best Practices for Managing Passwords: Usage Guidelines Good password-handling rules limit opportunities for attackers to discover passwords.
More information14th Edition. Global Macrocell Radio Transceiver (TRx) Unit Market Analysis and Forecast, April 2018
Market Analysis Earl J. Lum +1-650-430-2221 elum@ejlwireless.com 14th Edition Global Macrocell Radio Transceiver (TRx) Unit Market Analysis and Forecast, 2018-2022 April 2018 Entire contents. Reproduction
More informationIT Services in Malaysia in a State of Transition, (Executive Summary) Executive Summary
IT Services in Malaysia in a State of Transition, 2002-2003 (Executive Summary) Executive Summary Publication Date: 12 December 2003 Authors Jacqueline Heng Rolf Jester Jim Longwood Twiggy Lo This document
More information2017 Trends in Datacenter and Critical Infrastructure
PREVIEW 2017 Trends in Datacenter and Critical Infrastructure DEC 2016 Rhonda Ascierto, Research Director, Datacenter Technologies & Eco-Efficient IT Andy Lawrence, Research Vice President - Datacenter
More informationPredicts 2004: The Future of Windows Server
Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially
More informationThese patterns include: The use of proprietary software
Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal
More informationKeep the Door Open for Users and Closed to Hackers
Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According
More informationCan you wait until 2010?
Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their
More informationSONET Links Extend Fibre Channel SANs
SONET Links Extend Fibre Channel SANs Research Brief Abstract: Emerging product that support the transport of storage commands and data over Synchronous Optical Network or Synchronous Digital Hierarchy
More information