For full functionality of this site it is necessary to enable JavaScript. Here are the
instructions to enable JavaScript in your web browser
.
Skip to main content
Search
Search tips
Search for products, categories, or vendors.
Try keywords like 'management', 'Microsoft', or 'CRM'
Search for
"
"
by hitting
enter
, or see suggested results.
Cancel
Write a Review
Categories
Compare
About Us
For Vendors
More
Browse Reports
Awards
Research
What We Do
Log in
Log in
Open search
Toggle navigation
Write a Review
Home
>
Research
>
Featured Blueprint
Switching Existing Software Vendors
Overwhelmingly Drives Increased Satisfaction
Download the Blueprint Now
Research By Role
Research By Industry
All Categories
A
Access Control
AIOps
Analytical Data Store
Application Lifecycle Management (ALM)
Application Performance Management - Enterprise (APM)
Application Portfolio Management (APM)
Application Security Testing
B
Backup and Availability
Benefits Administration
Business Continuity Management (BCM)
Business Instant Messaging - Enterprise (IM)
Business Intelligence & Analytics - Midmarket (BI)
Business Intelligence & Analytics – Enterprise (BI)
Business Process Management (BPM)
C
Chatbots
Cloud Access Security Broker (CASB)
Cloud Email Security
Cloud Infrastructure as a Service (Cloud IaaS)
Cloud Management (CM)
Communications Platform as a Service (CPaaS)
Computer-Aided Design & Manufacturing (CAD/CAM)
Contact Center as a Service - Enterprise (CCaaS)
Content Collaboration
Content Marketing
Contract Lifecycle Management (CLM)
Conversational AI
Customer Identity and Access Management (CIAM)
Customer Relationship Management - Midmarket (CRM)
Customer Service - Enterprise (CSM)
Cyber Risk Rating
D
Data Archiving
Data Center Automation (DCA)
Data Integration (DI)
Data Loss Prevention (DLP)
Data Preparation for Analytics
Data Quality (DQ)
Desktop as a Service (DaaS)
Digital Asset Management (DAM)
Digital Workplace
Document Management (DMS)
E
Education Learning Management (ELMS)
Email Backup
Emergency Notification
Employee Engagement
Employee Rewards and Recognition
Endpoint Detection & Response (EDR)
Enterprise Architecture (EA)
Enterprise Mobile Management (EMM)
Enterprise Service Bus (ESB)
Extended Detection & Response (XDR)
F
Financial Risk Management
G
Geographic Information Systems (GIS)
Governance, Risk and Compliance (GRC)
H
Higher Education Student Information
Hotel Revenue Management System (HRMS)
Human Capital Management - Enterprise (HCM)
I
Identity and Access Management (IAM)
Identity Governance and Administration (IGA)
Identity Threat Detection and Response (ITDR)
Identity Verification
Integrated Workplace Management Systems (IWMS)
Investment Management
IT Asset Management - Enterprise (ITAM)
IT Service Management - Enterprise (ITSM)
K
K-12 Student Information
L
Low-Code Business Process Management - Enterprise
M
Machine Learning Platforms (ML)
Managed Detection & Response (MDR)
Master Data Management (MDM)
Metadata Management
Multi-Factor Authentication (MFA)
N
Network Detection and Response (NDR)
Network Monitoring - Enterprise (NM)
Next Generation Firewall (NGFW)
O
Orchestration / Provisioning
Other Communications & Collaboration
P
Password Management
Patch Management
Patient Management
Payroll
Pre-Employment Testing
Privacy Program Management
Privileged Access Management (PAM)
Product Lifecycle Management (PLM)
R
Remote Monitoring and Management (RMM)
Remote Support
Restaurant POS
S
SaaS Security Posture Management
Search Engine Optimization (SEO)
Secure Access Service Edge (SASE)
Secure Email Gateway - Enterprise (SEG)
Secure Email Gateway - Midmarket (SEG)
Security Awareness & Training
Security Information and Event Management (SIEM)
Security Orchestration, Automation, and Response (SOAR)
Social Media Management - Midmarket (SMM)
Software Asset Management (SAM)
Strategic Sourcing
Supply Chain Management
Surveillance Video Management (VMS)
Systems Management
T
Talent Acquisition Suites (TAS)
Talent Management
Telecom Service Assurance
Threat Intelligence Platform
Transaction Data Store (TDS)
Transportation Management
U
Unified Communications as a Service (UCaaS)
Unified Endpoint Management (UEM)
Unified Threat Management (UTM)
V
Voice of the Customer (VOC)
Vulnerability Management
W
Web and Video Conferencing - Enterprise (VC)
Website Analytics
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
R
S
T
U
V
W