Gartner Blog Network

"Tell Us About Your Technology" and More Analyst Briefing Tips

by Anton Chuvakin  |  February 16, 2018

After the epic post with vendor tips for analyst briefings, I had a lot of feedback and comments [and praise – mostly praise, naturally :-)]. One thing came up though:...

Read more »

ERP is Sexy!

by Debbie Wilson  |  February 16, 2018

I love the regular chuckles and chiding I get over my Gartner email signature tagline: “ERP is sexy!”  As you might expect, I make this statement precisely to be provocative...

Read more »

Bridging the Insight to Action Gap with a Dashboard

by Benjamin Bloom  |  February 16, 2018

For nearly two years I ran my marketing team using a dashboard - how I got there is the story of moving from an avalanche of reports to a single...

Read more »

Enterprise Collaboration: Still Wandering in the Desert

by Craig Roth  |  February 15, 2018

Information workers may sit in a sea of fuzzy cubes, spread across windowless floors lit by fluorescent lights, but when it comes time to collaborate they are often wandering the...

Read more »

Decentralized Identity - The Hard Work Begins

by Homan Farahmand  |  February 15, 2018

Gartner introduced the decentralized identity (DID) conceptual architecture in "Blockchain: The Dawn of Decentralized Identity [1]," which was published in September 2016. In a decentralized identity model, users generate and manage their own...

Read more »

Why is Everything a "Platform"?

by Bill Swanton  |  February 15, 2018

Last week, I wrote about the Digital Business Technology Platform.  A quick perusal of recent Gartner research you will quickly find references to Platform as a Service (PaaS), Endpoint Protect...

Read more »

BAS and Red Teams Will Kill The Pentest

by Augusto Barros  |  February 14, 2018

With our research on testing security methods and Breach and Attack Simulation tools (BAS), we ended up with an interesting discussion about the role of the pentest. I think we...

Read more »

IoT Security | NISTIR 8200 in Draft - Act NOW!

by Erik Heidt  |  February 14, 2018

We knew this was coming, and this is a big day in IoT security and risk management. Let's explore why it is important for your organization to take action now,...

Read more »

Our Team Is Hiring Again: A New Position Open - Threat/Vulnerability/Detection in US/North America

by Anton Chuvakin  |  February 14, 2018

This new open position on our team is really exciting!!! Think of this as “joining the triumvirate of Augusto Barros and myself in our technology coverage” since this is an...

Read more »

GRC vs. IRM Solutions – What’s the Difference?

by John Wheeler  |  February 13, 2018

One of the most common questions I receive from software vendors has to be "what's the difference between GRC and IRM solutions?" Gartner has been publishing research about integrated risk management...

Read more »