Верхнее

Gartner Hype Cycles


Hype Cycle for Application Security

28.07.2017 ID:G00314199
Hype Cycle for Application Security 2017 (G00314199)Application security is a central component of enterprise security. Organizations continue to struggle with adapting application security to trends like mobility and cloud, while applications remain one of the last control points for imposing the organization’s security policy.

Hype Cycle for Artificial Intelligence

24.07.2018 ID:G00357478
Hype Cycle for Artificial Intelligence 2018 (G00357478)AI is almost a definition of hype. Yet, it is still early: New ideas will surface and some current ideas will not live up to expectations. This Hype Cycle will help CIOs and IT leaders trace essential trends and innovations to determine scope, state, value and risk in their AI plans.
24.07.2017 ID:G00314732
Hype Cycle for Artificial Intelligence 2017 (G00314732)A «virtuous cycle» for a new generation of artificial intelligence builds along several critical market dimensions. The risk of ignoring potentially transformational AI exceeds the mitigated risk of fast, early failure.

Hype Cycle for Business Continuity Management and IT Resilience

02.08.2017 ID:G00315161
Hype Cycle for Business Continuity Management and IT Resilience 2017 (G00315161)Cyberattacks and digital business are the main drivers of the organizational move toward business/operational resilience. Business continuity management, risk management and IT professionals can use this Hype Cycle to target solutions that fulfill their recovery, availability and resilience needs.

Hype Cycle for Cloud Security

19.07.2018 ID:G00338508
Hype Cycle for Cloud Security 2018 (G00338508)This Hype Cycle encompasses technologies and standards that improve the security, governance and reliability of private and public cloud computing.

Hype Cycle for Data Security

24.07.2018 ID:G00340334
Hype Cycle for Data Security 2018 (G00340334)Data is a pervasive asset that crosses traditional boundaries on-premises and into cloud services. Every business needs a data-centric security strategy to prioritize datasets for mitigation of growing business risks caused by data protection and privacy laws, hacking, fraud, and ransomware.
28.07.2017 ID:G00314204
Hype Cycle for Data Security 2017 (G00314204)Data is a pervasive critical asset that crosses traditional silo boundaries on-premises and in public clouds. This requires a data-centric security strategy that prioritizes datasets and mitigates evolving business risks such as regulatory compliance and threats from hacking, fraud and ransomware.

Hype Cycle for Data Science and Machine Learning

23.07.2018 ID:G00340329
Hype Cycle for Data Science and Machine Learning 2018 (G00340329)The hype around data science and machine learning continues to defy gravity and soar to ever-higher levels. Data and analytics leaders should use this Hype Cycle to understand technologies generating excitement and inflated expectations, as well as significant movements in adoption and maturity.
28.07.2017 ID:G00325005
Hype Cycle for Data Science and Machine Learning 2017 (G00325005)The hype around data science and machine learning has increased from already high levels in the past year. Data and analytics leaders should use this Hype Cycle to understand technologies generating excitement and inflated expectations, as well as significant movements in adoption and maturity.

Hype Cycle for Enterprise Networking and Communications

13.07.2018 ID:G00338722
Hype Cycle for Enterprise Networking and Communications 2018 (G00338722)I&O leaders must evolve their networks to support functional and strategic business requirements by continually evaluating new technologies that support digital business initiatives and new business models while also providing flexible, resilient, and scalable connectivity.

Hype Cycle for ICT in Russia

07.08.2017 ID:G00314967
Hype Cycle for ICT in Russia 2017 (G00314967)This Hype Cycle provides IT leaders at companies operating in Russia with a better understanding of what technologies and services are most relevant to their current operations, as well as those that may become transformational for local businesses in the future.

Hype Cycle for Identity and Access Management Technologies

13.07.2018 ID:G00337774
Hype Cycle for Identity and Access Management Technologies 2018 (G00337774)We celebrate IGA finally making it to the plateau. OAuth 2 and IDaaS adoption increased dramatically. UEBA headed toward the trough, and SIEM backslid to meet UEBA as analytics capabilities evolve.
05.07.2017 ID:G00313858
Hype Cycle for Identity and Access Management Technologies 2017 (G00313858)FIDO authentication protocols and multiparty computing make their debuts. IDaaS and IGA have advanced in adoption and maturity. UEBA is at the peak. Mobile SSO is in the trough, and identity federation, IAM professional services and electronic signature have matured off the Hype Cycle.

Hype Cycle for the Internet of Things

17.07.2018 ID:G00340237
Hype Cycle for the Internet of Things 2018 (G00340237)The Internet of Things is helping to blend the physical and digital world, and it will transform industries and the way we live and work. This Hype Cycle helps enterprises assess the critical building blocks and the levels of maturity and hype associated with IoT.
24.07.2017 ID:G00314298
Hype Cycle for the Internet of Things 2017 (G00314298)The Internet of Things is helping to blur the physical and digital world, as well as transform industries and the way we live and work. This Hype Cycle helps enterprises assess the critical technology building blocks and the levels of maturity and hype associated with this transformative trend.

Hype Cycle for Mobile Security

20.07.2017 ID:G00314295
Hype Cycle for Mobile Security 2017 (G00314295)This Hype Cycle focuses on technologies that protect enterprise data, while enabling mobility. Security and risk management leaders must define their mobile security strategies now, focusing on effectiveness and usability, and avoiding unviable technologies.

Hype Cycle for Mobile Device Technologies

21.07.2017 ID:G00314103
Hype Cycle for Mobile Device Technologies 2017 (G00314103)Mobility’s evolution will rely on leveraging key parts of the intelligent digital mesh to bring together the endpoints with the associated information and services. Technology strategic planners responsible for tech roadmaps must evaluate these technologies as part of their mobility strategy.

Hype Cycle for Privacy

17.07.2018 ID:G00338717
Hype Cycle for Privacy 2018 (G00338717)Security and risk management leaders with a focus on privacy have to take into account both regulatory and technological evolutions. Privacy laws and relevant techniques that aid in compliance are both covered in this research, allowing the prioritization of relevant requirements and investments.
20.07.2017 ID:G00314626
Hype Cycle for Privacy 2017 (G00314626)As privacy laws follow a Hype Cycle of their own, security and risk management leaders with a focus on privacy have to take into account both regulatory and technological evolutions. Both are covered in this research, allowing the prioritization of relevant requirements and investments.

Hype Cycle for Risk Management

13.07.2018 ID:G00338659
Hype Cycle for Risk Management 2018 (G00338659)Digital business risks and cybersecurity challenges are increasing. Security and risk management leaders must understand evolving innovations to help organizations mature by simplifying, automating and integrating strategic, operational and IT risk management processes and data.
19.07.2017 ID:G00313840
Hype Cycle for Risk Management 2017 (G00313840)Risk management is rapidly maturing as a discipline to harness the benefits of digital business innovation in a safe and secure way. Risk management and security leaders should use this Hype Cycle to mature their risk management programs.

Hype Cycle for Threat-Facing Technologies

13.07.2018 ID:G00338539
Hype Cycle for Threat-Facing Technologies 2018 (G00338539)Threat-facing technologies aim to prevent and protect IT systems and applications from attack, enabling fast and effective response. Technologies included meet the security needs of end users who utilize cloud and enterprise infrastructure that is threatened by the evolving threat landscape.
Comments are closed.