Should You Use Liberty or Passport for Digital Identities?

Size: px
Start display at page:

Download "Should You Use Liberty or Passport for Digital Identities?"

Transcription

1 Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft Passport, will not offer business value until a global service provider routinely issues standards-based identities to all of its customers. Core Topic Security and Privacy: Security Tools, Technologies and Tactics Key Issues Which vendors will emerge as leaders in the information security domain? How will network-based applications become safe for mission-critical businesses during the next five years? Strategic Planning Assumptions Through YE05, the Liberty Alliance will provide a viable set of standards for enterprises that need multivendor support for federated identity services (0.7 probability). By YE05, a major global service provider will issue SAML-based identities to its users, which will force Microsoft to fully support SAML in Windows, or Liberty will be relegated to niche status by year-end 2007 (0.6 probability). By 2H05, Microsoft will support the ability to expose internal Windows authentication actions as SAML assertions and perform Windows authentication based on SAML assertions (0.6 probability). Prior to 2H05, Microsoft Passport and Liberty Alliance identity service specifications will not be mature enough to support cost savings in consolidating identity services (0.7 probability). How do the Liberty Alliance and Microsoft Passport differ? The key differences between the Liberty Alliance and Microsoft Passport are: Liberty is a set of specifications for interoperable identity services. Passport is a centralized identity service controlled by Microsoft. Liberty is based on the SAML draft Organization for the Advancement of Structured Information Systems (OASIS) industry standard, which Microsoft has not formally supported. The Liberty Alliance is a group of 170 companies, including Sun Microsystems, Nokia, American Express and others, that delivers technical specifications and business guidelines for federated identity services across enterprises. Liberty does not produce the applications; vendors such as Sun, Novell, PeopleSoft and Hewlett-Packard develop interoperable applications that support the Liberty standard. The Liberty Alliance specifications will enable different service providers to participate in a federated trust network. However, the set of products that provide identity services based on the Liberty standards is limited. Phase one of Liberty specifications, which were sent to OASIS in April 2003, supports single sign-on across enterprises and applications based on the open SAML standard. Phase two of the standard, which is in draft, will address more-difficult technical and business requirements, such as permission-based attribute-sharing of identity information. Liberty will issue business guidelines that address how to manage liability issues and revocation procedures across participating enterprises. Nokia and Vodaphone Group are developing Liberty-based applications for business-to-consumer (B2C) transactions. Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 American Express, Sun and General Motors are developing a business-to-employee (B2E) application. Three business-tobusiness (B2B) applications are available. Microsoft Passport is a centralized single-sign-on service, as well as a standard supported by Microsoft operating systems and directory services. Its centralized consumer service is implemented and operated by Microsoft for approximately 200 million accounts that use Microsoft mail (Hotmail), Messenger and Internet service provider (ISP) services. In September 2001, Microsoft announced that it would support a federated network service architecture in 2002; however, that did not occur. Passport doesn't play an important role in B2E applications. Internal Windows Kerberos provides single sign-on by extending Windows desktop authentication across other Windows applications within an Active Directory environment. Passport couldbeusedforb2b applications as a Microsoft-hosted service to support single sign-on, or business partners could integrate directly using Kerberos mechanisms. In June 2002, Microsoft announced that it was developing TrustBridge to provide integration with non-windows Kerberos; nothing has been released. How do I choose the best identity services solution for my application? Choosing the best technology for an application depends on the usage scenario and time frame: B2E For enterprises that are investing heavily in Active Directory, Windows XP and Windows 2003 Server, issuing, managing and using digital identities based on Kerberos will be the "path of least resistance" during the next three years. Where interfaces are required from Windows to Unix-based systems, vendors in the extranet access management (EAM) space provide products that bridge the Windows/Unix gap. B2B For heterogeneous B2B environments or ad hoc business connections, Liberty's open standards approach has many advantages compared to a Windows-centric approach. In particular, strong support for SAML is the best way to assure platform independence in the long term. Passport can be used when business partners have homogeneous Windows environments and have committed to issuing and using Passport identities. B2C/government-to-citizen Although most online consumers use Windows-based PCs to connect to the Internet, their digital identities are issued by ISPs or mobile service operators, with which Unix- and Linux-based systems 12 August

3 are common. In addition, Internet access from cellular phones, personal digital assistants (PDAs) and other non- Windows-based platforms is increasing. Thus, a platformindependent approach to digital identities is becoming more important. This argues for using the SAML-based Liberty standard. Will Liberty be viable in five years? There has been much hype about digital identities in general. Enterprises are not using Passport and Liberty for a meaningful amount of Internet commerce. Because Passport will be built into Microsoft's products and services (such as Microsoft Network, Hotmail, WebTV and others), Passport will grow even if there is no demand. If the government of a large country, a large credit card issuer, or a large U.S. ISP or cellular carrier commits to issuing Libertybased identities prior to 2005, then the Liberty standards will be meaningful enough to force Microsoft to interoperate or to at least adopt key aspects of Liberty, such as SAML. Nokia and other Liberty Alliance members are working with mobile operators and the Open Mobile Alliance to embed Liberty standards and protocols into cell-phone-based Internet services by However, operators have made no commitments to issue SAML-based identities. Mobile operators likely will be reluctant to manage their coveted consumer information using open standards because they may perceive this as a loss of control over their customer base. Mobile operators, as well as foreign governments, likely will be even less willing to allow a Microsoft-driven technology to get between them and their customers. Therefore, through YE05, the Liberty Alliance will provide a viable set of standards for enterprises that need multivendor support for federated identity services (0.7 probability). By YE05, a major global service provider will issue SAML-based identities to its users, which will force Microsoft to fully support SAML in Windows, or Liberty will be relegated to niche status by year-end 2007 (0.6 probability). What are the risks in choosing one standard instead of the other? Microsoft Passport has proved to be an insecure system in the past several years, with numerous individuals and hackers finding holes to exploit. For example, in May 2003, an Indian researcher discovered a way to reset Passport account passwords. Had he been a malicious attacker, he could have broken into every Passport holder's account. At that time, Gartner recommended that users wait until November 2003 to interface with or use the Passport service to give Microsoft time 12 August

4 to fix that vulnerability, as well as others that we believed would be (and have been) found. An obvious risk in using Passport capabilities built into Windows is that it can lock enterprises into the Microsoft architecture, making it more difficult to communicate with interenterprise applications that use different technologies. A key benefit of federated identity services is the ability to manage identities from external organizations; an open architecture makes this easier to accomplish. Although Microsoft dominates the desktop, Linux desktop use has increased. Also, there has been strong growth in access from cell phones and PDAs, areas in which Microsoft is less dominant. To address such fears of lock-in, by 2H05, Microsoft will support the ability to expose internal Windows authentication actions as SAML assertions and perform Windows authentication based on SAML assertions (0.6 probability). The Liberty Alliance standards also have a set of risks. Phase one of single sign-on is based on the open SAML standard, which has evolved over several years. However, multiple vendors will have to implement SAML-based applications and ensure that the applications interoperate and are secure. The Liberty federated identity service specifications become much more useful and potentially more "buggy" as they move into phase two, which supports the difficult and more-complex job of managing identity management business rules, such as permission-based release of private information across participating enterprises and heterogeneous applications. Significant phase-two implementations (supported by major organizations with "critical mass" applications) likely will not take place until at least Therefore, an enterprise's phase-two efforts may never bear fruit because application complexity may impede notable progress in the market. This may be reminiscent of the public-key-infrastructure implementations several years ago that were not adopted, despite the good business cases made at that time. What else do I need to know about identity services? Acronym Key B2B business-to-business B2C business-to-consumer B2E business-to-employee EAM extranet access management ISP Internet service provider OASIS Organization for the Advancement of Structured Information Systems PDA personal digital assistant The major advantage to using a federated identity service is the reduction of costs for enterprises that maintain separate identity systems. Prior to 2H05, Microsoft Passport and Liberty Alliance identity services specifications will not be mature enough to support cost savings in consolidating identity services (0.7 probability). If a large government, credit card company or U.S. telecommunications provider does not issue federated identities to all of its users prior to 2005, it will take longer for use of such identities to make business sense in the consumer market. 12 August

5 For deployment decisions that must be made in the interim, internal enterprise projects based on Active Directory should focus on using Windows Kerberos capabilities. All interenterprise efforts should require the use of SAML to support cross-platform interoperability. For most interenterprise use, SAML-based solutions such as those offered by leading EAM vendors will be the most cost-effective choices through They will support the least-disruptive migration path as the standards battles shake out or fade away into irrelevance. 12 August

Predicts 2004: The Future of Windows Server

Predicts 2004: The Future of Windows Server Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially

More information

These patterns include: The use of proprietary software

These patterns include: The use of proprietary software Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal

More information

Can you wait until 2010?

Can you wait until 2010? Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their

More information

CIO Update: Security Platforms Will Transform the Network Security Arena

CIO Update: Security Platforms Will Transform the Network Security Arena IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will

More information

Web Services Take Root in Banks and With Asset Managers

Web Services Take Root in Banks and With Asset Managers Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations

More information

ISV Support Is Key When Choosing a Server Operating System

ISV Support Is Key When Choosing a Server Operating System Markets, A. Butler Research Note 17 September 2003 ISV Support Is Key When Choosing a Server Operating System It's the support independent software vendors offer that determines the life span of a server

More information

COM I. Keene, B. Hafner

COM I. Keene, B. Hafner I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.

More information

Market Scope. Magic Quadrant Methodology

Market Scope. Magic Quadrant Methodology Markets, J. Enck, A. Powell Research Note 12 May 2003 Global IA High-Volume Server Magic Quadrant, 1H03 Gartner's Magic Quadrant for Intel Architecture in 1H03 indicates that Dell Computer, Hewlett-Packard

More information

Building Better Interfaces: HL7 Conformance Profiles

Building Better Interfaces: HL7 Conformance Profiles Tutorials, W. Rishel Research Note 26 November 2002 Building Better Interfaces: HL7 Conformance Profiles The new Health Level Seven conformance technology allows individual healthcare organizations and

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

Worldwide Workstation Shipments Rebound in Third Quarter

Worldwide Workstation Shipments Rebound in Third Quarter Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase

More information

CIO Update: Gartner s Storage Services Magic Quadrant

CIO Update: Gartner s Storage Services Magic Quadrant IGG-04302003-04 A. Couture, R. Passmore Article 30 April 2003 CIO Update: Gartner s Storage Services Magic Quadrant Gartner has developed its first North American Storage Services Magic Quadrant. Storage

More information

Best Practices for Deploying Web Services via Integration

Best Practices for Deploying Web Services via Integration Tactical Guidelines, M. Pezzini Research Note 23 September 2002 Best Practices for Deploying Web Services via Integration Web services can assemble application logic into coarsegrained business services.

More information

Mesh Networking Principles

Mesh Networking Principles Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,

More information

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace

More information

FICON Drives Fibre Channel Security

FICON Drives Fibre Channel Security FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre

More information

2018 Trends in Hosting & Cloud Managed Services

2018 Trends in Hosting & Cloud Managed Services PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior

More information

Database Design Tool Magic Quadrant 2H02

Database Design Tool Magic Quadrant 2H02 Markets, J. Duggan Research Note 27 August 2002 Database Design Tool Magic Quadrant 2H02 Despite rapid growth in Unified Modeling Language, objectoriented and business process modeling tools, database

More information

Spam Filtering Works Better With a Management Policy

Spam Filtering Works Better With a Management Policy Select Q&A, M. Grey, A. Hallawell Research Note 22 September 2003 Spam Filtering Works Better With a Management Policy A deployment of spam-filtering technology that does not consider business issues will

More information

Asia/Pacific: Systems Consolidation, Hype or Reality?

Asia/Pacific: Systems Consolidation, Hype or Reality? Research Brief Asia/Pacific: Systems Consolidation, Hype or Reality? Abstract: Through 2005, consolidation will be of major concern to IT management in Asia/Pacific as organizations struggle to control

More information

Survey/Overview: Australian IT Service Provider Market

Survey/Overview: Australian IT Service Provider Market Markets, J. Longwood, M. Chon, R. Jester Research Note 15 April 2003 Survey/Overview: Australian IT Service Provider Market Market scans are used in sourcing strategy development and fast-track processes

More information

Case study: Database integration by Hokuriku Coca-Cola using a database appliance

Case study: Database integration by Hokuriku Coca-Cola using a database appliance H.Horiuchi Research Note June 25, 2010 Case study: Database integration by Hokuriku Coca-Cola using a database appliance Hokuriku Coca-Cola Bottling (Hokuriku Coca-Cola) integrated data used in3types of

More information

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published

More information

Dallas EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST JUL Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters

Dallas EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST JUL Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters MARKET FORECAST JUL 2016 Dallas Multi-Tenant Datacenter Market Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters This report provides an overview of the competitive dynamics in the Dallas

More information

Controlled Medical Vocabulary in the CPR Generations

Controlled Medical Vocabulary in the CPR Generations Tutorials, B. Hieb, M.D. Research Note 5 November 2003 Controlled Medical Vocabulary in the CPR Generations A CMV capability becomes progressively more important as computer-based patient record systems

More information

Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary

Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary Publication Date: 9 April 2003 Author Wm.L.Hahn This document has been published to the following Marketplace codes: TELC-WW-EX-0576

More information

4Q02 Update: Disk Storage Forecast Scenarios,

4Q02 Update: Disk Storage Forecast Scenarios, Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than

More information

Prediction: Multimodal transaction processing will emerge

Prediction: Multimodal transaction processing will emerge Strategic Planning, M. Pezzini Research Note 19 December 2003 Predicts 2004: Prepare for Multimodal Transaction Processing Online transaction processing will have to support Web services, mobile channels

More information

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

Dialog (interactive) data input. Reporting. Printing processing

Dialog (interactive) data input. Reporting. Printing processing Tutorials, D. Prior Research Note 24 February 2003 Who Sets the Pace in the SAP Performance 'Olympics'? SAP and its hardware vendors use many different application performance benchmarks. But records for

More information

NetIQ's VoIP Management Products

NetIQ's VoIP Management Products Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue

More information

IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary

IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary Publication Date: September 9, 2002 Author Chee Eng To This document has been published to the following Cluster codes: TELC-WW-EX-0423

More information

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER DISRUPTIVE TECHNOLOGIES IN THE DATACENTER Ten Technologies Driving a Wave of Change Are there new technologies out there that could disrupt the economics and infrastructure of the modern datacenter and

More information

Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7

Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 Page 1 of 8 Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 7 June 2010 Michael A. Silver Gartner RAS Core Research Note G00200542 Respondents to

More information

Ending the Confusion About Software- Defined Networking: A Taxonomy

Ending the Confusion About Software- Defined Networking: A Taxonomy Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server

More information

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the

More information

Four Partial Solutions for Remote Network Access

Four Partial Solutions for Remote Network Access Decision Framework, E. Paulak Research Note 29 August 2003 Four Partial Solutions for Remote Network Access Four different solutions can help to meet your remoteaccess needs. Managed-service providers

More information

Trends in Fixed Public Network Services: Finland, (Executive Summary) Executive Summary

Trends in Fixed Public Network Services: Finland, (Executive Summary) Executive Summary Trends in Fixed Public Network Services: Finland, 2000-2006 (Executive Summary) Executive Summary Publication Date: October 17, 2002 Authors Susan Richardson Maureen Coulter Michal Halama Katja Ruud Lisa

More information

Password-Handling Guidelines

Password-Handling Guidelines Tutorials, A. Allan, R. Witty Research Note 22 December 2003 Best Practices for Managing Passwords: Usage Guidelines Good password-handling rules limit opportunities for attackers to discover passwords.

More information

Events Will Transform Application Servers

Events Will Transform Application Servers Technology, Y. Natis Research Note 8 July 2003 Events Will Transform Application Servers Today's application servers can act as simple "event servers." To handle complex events, application servers will

More information

Unified Communications Magic Quadrant 1H03

Unified Communications Magic Quadrant 1H03 Markets, B. Elliot Research Note 3 February 2003 Unified Communications Magic Quadrant 1H03 Unified communications is emerging as an enabler for business process improvement. Vendor offerings remain fragmented,

More information

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace

More information

Action Recommendation for 2004

Action Recommendation for 2004 Strategic Planning, P. Redman, T. Hart, W. Clark, J. Chapman, P. Dittner, R. Simpson, K. Foong, N. Ingelbrecht Research Note 20 November 2003 Changes in Store for Wireless WAN During 2004 The hottest growth

More information

Optimize Your Broadband WAN

Optimize Your Broadband WAN Technology, G. Johnson Research Note 15 September 2003 Optimize Your Broadband WAN When migrating from narrowband to broadband WANs, be aware that TCP's limitations can severely affect network performance,

More information

TCPN-WW-CV-0102 Frank Fabricius

TCPN-WW-CV-0102 Frank Fabricius Frank Fabricius Cluster Research Catalog 30 December 2003 Public Network Infrastructure Worldwide Cluster Research Archive The Cluster Research Archive is a listing of deliverables for the Public Network

More information

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been

More information

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Publication Date: 1 July 2003 Authors Fabrizio Biscotti Alain Dang Van Mien Norma Schroder Chris Pang This document

More information

DBMS Software Market Forecast, (Executive Summary) Executive Summary

DBMS Software Market Forecast, (Executive Summary) Executive Summary DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:

More information

AIOs Displace Single-Function Printers in Latin America

AIOs Displace Single-Function Printers in Latin America ` Market Analysis AIOs Displace Single-Function Printers in Latin America Abstract: Stand-alone printer shipments have dropped sharply, while inkjet all-in-one printers continue to gain market share in

More information

NEXT-GENERATION DATACENTER MANAGEMENT

NEXT-GENERATION DATACENTER MANAGEMENT NEXT-GENERATION DATACENTER MANAGEMENT From DCIM to DCSO Sometimes described as the operating or ERP system for the datacenter, datacenter infrastructure management (DCIM) is a technology that helps operators

More information

Computing as a Service

Computing as a Service IBM System & Technology Group Computing as a Service General Session Thursday, June 19, 2008 1:00 p.m. - 2:15 p.m. Conrad Room B/C (2nd Floor) Dave Gimpl, gimpl@us.ibm.com June 19, 08 Computing as a Service

More information

Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary

Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Publication Date: December 4, 2002 Authors Alayne Wong To Chee Eng Evelyn Goh Kenshi Tazaki Andrew

More information

Get Ready for the Revival of Large Data Centers

Get Ready for the Revival of Large Data Centers Research Publication Date: 4 August 2006 ID Number: G00142079 Get Ready for the Revival of Large Centers Rakesh Kumar Although large data centers declined in importance in recent years, they will return

More information

Management Update: Storage Management TCO Considerations

Management Update: Storage Management TCO Considerations IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total

More information

Mobile Terminals: Western Europe, (Executive Summary) Executive Summary

Mobile Terminals: Western Europe, (Executive Summary) Executive Summary Mobile Terminals: Western Europe, 1998-2007 (Executive Summary) Executive Summary Publication Date: 6 June 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace

More information

Datacenter Cooling Market Map 2016

Datacenter Cooling Market Map 2016 MARKET MAP Datacenter Cooling Market Map 2016 MAY 2016 Andrew Donoghue, European Research Manager This report provides an overview of the datacenter cooling market, focusing on suppliers of particularly

More information

External RAID-Based Storage System Analysis by Form Factor

External RAID-Based Storage System Analysis by Form Factor Research Brief External RAID-Based Storage System Analysis by Form Factor Abstract: Gartner Dataquest forecasts factory revenue for modular external RAID controllerbased storage systems will grow at a

More information

Enterprise Data Architecture: Why, What and How

Enterprise Data Architecture: Why, What and How Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented

More information

The Clinical Data Repository Provides CPR's Foundation

The Clinical Data Repository Provides CPR's Foundation Tutorials, T.Handler,M.D.,W.Rishel Research Note 6 November 2003 The Clinical Data Repository Provides CPR's Foundation The core of any computer-based patient record system is a permanent data store. The

More information

NGN: Enterprise IP Telephony

NGN: Enterprise IP Telephony NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations

More information

Select Q&A, QA A. Hallawell, M. Grey. Anti-spam Architecture Choices. Firewall. Appliance or Licensed Software. SMTP Relay

Select Q&A, QA A. Hallawell, M. Grey. Anti-spam Architecture Choices. Firewall. Appliance or Licensed Software. SMTP Relay Select Q&A, A. Hallawell, M. Grey Research Note 22 September 2003 How to Select Spam-Filtering Products and Services Choose a spam-filtering solution by evaluating anti-spam providers' management, research

More information

IBM Data Center Networking in Support of Dynamic Infrastructure

IBM Data Center Networking in Support of Dynamic Infrastructure Dynamic Infrastructure : Helping build a Smarter Planet IBM Data Center Networking in Support of Dynamic Infrastructure Pierre-Jean BOCHARD Data Center Networking Platform Leader IBM STG - Central Eastern

More information

Integration With the Business Modeler

Integration With the Business Modeler Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design

More information

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Ramnish Singh IT Advisor Microsoft Corporation Session Code: Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing

More information

Heavy Vehicle Cyber Security Bulletin

Heavy Vehicle Cyber Security Bulletin Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin

More information

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Publication Date: October 14, 2002 Authors To Chee Eng Evelyn Goh Kobita Desai This document has been published to the following

More information

StorageTek Linear Tape File System, Library Edition

StorageTek Linear Tape File System, Library Edition StorageTek Linear Tape File System, Library Edition Security Guide Release 1 E38511-02 July 2016 StorageTek Linear Tape File System, Library Edition Security Guide, Release 1 E38511-02 Copyright 2013,

More information

Super-Peer Architectures for Distributed Computing

Super-Peer Architectures for Distributed Computing Whitepaper Super-Peer Architectures for Distributed Computing Fiorano Software, Inc. 718 University Avenue, Suite 212 Los Gatos, CA 95032 U.S.A. +1.408.354.3210 email info@fiorano.com www.fiorano.com Entire

More information

Mobile Phones, Poor Economy to Dampen PDA Market to 2007

Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Forecast Analysis Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Abstract: A stagnant economy and growing competition from mobile phones have reduced our expectations for PDA market growth. Worldwide

More information

COM F. Troni, L. Fiering

COM F. Troni, L. Fiering F. Troni, L. Fiering Research Note 8 September 2003 Commentary Notebook TCO Comparison: Day Extenders vs. Traveling s Notebooks used by traveling workers, who are out of the office more often and work

More information

Nortel Networks Optivity Policy Services

Nortel Networks Optivity Policy Services Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access

More information

IBM's Regatta Still Lags NCR Teradata in Data Warehousing

IBM's Regatta Still Lags NCR Teradata in Data Warehousing Decision Framework, A. Butler, K. Strange Research Note 17 September 2002 's Regatta Still Lags NCR Teradata in Data Warehousing 's new Regatta server is maturing fast in the online transaction processing

More information

Huawei: China's Leading Equipment Vendor Returns to Growth

Huawei: China's Leading Equipment Vendor Returns to Growth Research Brief Huawei: China's Leading Equipment Vendor Returns to Growth Abstract: Huawei has turned in a strong performance during the first half of 2003. The second half of the year could be even better.

More information

Trends in Fixed Public Network Services: Germany, (Executive Summary) Executive Summary

Trends in Fixed Public Network Services: Germany, (Executive Summary) Executive Summary Trends in Fixed Public Network Services: Germany, 2000-2006 (Executive Summary) Executive Summary Publication Date: October 18, 2002 Authors Michal Halama Katja Ruud Maureen Coulter Susan Richardson Lisa

More information

Fixed Public Services Trends in CEE and MEA, (Executive Summary) Executive Summary

Fixed Public Services Trends in CEE and MEA, (Executive Summary) Executive Summary Fixed Public Trends in CEE and MEA, 2001-2007 (Executive Summary) Executive Summary Publication Date: 4 August 2003 Author William L. Hahn This document has been published to the following Marketplace

More information

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime

More information

2017 Trends in Datacenter and Critical Infrastructure

2017 Trends in Datacenter and Critical Infrastructure PREVIEW 2017 Trends in Datacenter and Critical Infrastructure DEC 2016 Rhonda Ascierto, Research Director, Datacenter Technologies & Eco-Efficient IT Andy Lawrence, Research Vice President - Datacenter

More information

OATH : An Initiative for Open AuTHentication

OATH : An Initiative for Open AuTHentication OATH : An Initiative for Open AuTHentication Who Are You Really Doing Business With? 2 Oath Proprietary Confidential The New York Magazine, July 5, 1993, Peter Steiner, The Economic Promise of e-business

More information

The Business Communications Landscape Is Ripe for Massive Disruption

The Business Communications Landscape Is Ripe for Massive Disruption THOUGHT LEADERSHIP The Business Communications Landscape Is Ripe for Massive Disruption MAY 2017 Raul Castanon-Martinez, Senior Analyst, Workforce Collaboration and Communications Business communications

More information

IBM's WebSphere Integration Offer Signals Long-Term Plan

IBM's WebSphere Integration Offer Signals Long-Term Plan Products, M. Pezzini, J. Thompson Research Note 8 April 2003 IBM's WebSphere Integration Offer Signals Long-Term Plan Version 4.2 of WebSphere Business Integration bundles more products into one package.

More information

Executive Summary...1 Chapter 1: Introduction...1

Executive Summary...1 Chapter 1: Introduction...1 Table of Contents Executive Summary...1 Chapter 1: Introduction...1 SSA Organization... 1 IRM Strategic Plan Purpose... 3 IRM Strategic Plan Objectives... 4 Relationship to Other Strategic Planning Documents...

More information

Completeness of Vision

Completeness of Vision Markets, S. Zaffos, N. Allen, J. Krischer, R. Passmore, R. W Cox Research Note 7 October 2002 External Modular Disk Magic Quadrant: 2H02 Update Vendor consolidation and changes in vendor offerings have

More information

Hype Cycle for Data Warehousing, 2003

Hype Cycle for Data Warehousing, 2003 K. Strange, T. Friedman Strategic Analysis Report 30 May 2003 Hype Cycle for Data Warehousing, 2003 Data warehousing concepts and approaches have become fairly mature during a decade of refinement. However,

More information

COM W. Clark. Nokia has not been idle in addressing the business market. It has sold the following to enterprises:

COM W. Clark. Nokia has not been idle in addressing the business market. It has sold the following to enterprises: W. Clark Research Note 4 April 2003 Commentary Nokia Needs Partners to Compete as an Enterprise Supplier Nokia is far from being a strategic enterprise supplier of mobile devices worldwide. Businesses

More information

Business White Paper IDENTITY AND SECURITY. Access Manager. Novell. Comprehensive Access Management for the Enterprise

Business White Paper IDENTITY AND SECURITY.  Access Manager. Novell. Comprehensive Access Management for the Enterprise Business White Paper IDENTITY AND SECURITY Novell Access Manager Comprehensive Access Management for the Enterprise Simple, Secure Access to Network Resources Business Driver 1: Cost Novell Access Manager

More information

Current and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary

Current and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary Current and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary Publication Date: 25 August 2003 Authors Hyun-Sook Lee Sumit Malik John Calvert This document

More information

The Honest Advantage

The Honest Advantage The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents

More information

Open Source Cloud Platforms: OpenStack

Open Source Cloud Platforms: OpenStack Open Source Cloud Platforms: OpenStack This Market Monitor overview report on the OpenStack marketplace provides updated vendor estimates through Q3 2016. OpenStack, the open source cloud project, was

More information

FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies

FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies FIDO AND PAYMENTS AUTHENTICATION Philip Andreae Vice President Oberthur Technologies The Problem The Solution The Alliance Updates Data Breaches 781 data breaches in 2015 170 million records in 2015 (up

More information

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

Hype Cycle for Mobile and Wireless Networking, 2003

Hype Cycle for Mobile and Wireless Networking, 2003 P. Redman, K. Dulaney, W. Clark Strategic Analysis Report 30 May 2003 Hype Cycle for Mobile and Wireless Networking, 2003 A wireless networking technology assessment for personal-, local- and wide-area

More information

Mobile Terminals: Middle East, (Executive Summary) Executive Summary

Mobile Terminals: Middle East, (Executive Summary) Executive Summary Mobile Terminals: Middle East, 2001-2007 (Executive Summary) Executive Summary Publication Date: 25 July 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace

More information

Finding Pure-Play Midtier ESPs: A Two-Step Process

Finding Pure-Play Midtier ESPs: A Two-Step Process Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors

More information

Vendor Ratings, VDR Kevin Strange, Andrew Butler, Gareth Herschel

Vendor Ratings, VDR Kevin Strange, Andrew Butler, Gareth Herschel Vendor Ratings, Kevin Strange, Andrew Butler, Gareth Herschel Research Note 27 January 2003 Vendor Rating: Focus on NCR s Teradata Division NCR s Teradata division is performing well, despite the tough

More information

Trends in Fixed Public Network Services: Austria, (Executive Summary) Executive Summary

Trends in Fixed Public Network Services: Austria, (Executive Summary) Executive Summary Trends in Fixed Public Network Services: Austria, 2000-2006 (Executive Summary) Executive Summary Publication Date: September 25, 2002 Authors Michal Halama Maureen Coulter Katja Ruud Susan Richardson

More information

BUILDING the VIRtUAL enterprise

BUILDING the VIRtUAL enterprise BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,

More information

Sizzles and Fizzles in the Server Forecast

Sizzles and Fizzles in the Server Forecast Sizzles and Fizzles in the Server Forecast Forecast Analysis Abstract: Intel Architecture 64-bit-based-server revenue will grow at more than 90 percent per year through 2008, surpassing $7 billion worldwide.

More information