Request an Advisor
Get Listed

Solution Category Definitions


Advanced Analytics Platforms

Advanced analytics is a category of inquiry which is used to help drive changes and improvements in business practices. Examples of Advanced Analytics subcategories include Predictive Analysis, Data Mining, Big Data Analytics, Location Intelligence and more.

Application Delivery Controllers

Application Delivery Controllers (ADCs) are devices that are typically installed in data centers between the firewall and one or more application servers. ADCs can off-load common repetitive tasks that are usually performed by application servers, lowering costs while increasing speed and improving efficiency.

Application Performance Monitoring

Application Performance Monitoring (APM) solutions continually monitor application availability, accessibility, and end-user application performance across an organization’s network in order to achieve optimal business network efficiency.

Blade Servers

Blade Servers are server computers that fit within a larger server chassis thus resulting in decreased energy usage and physical footprint. Blades are typically hot-swappable and run by a central management system which allows for the addition and removal of blades for increased or decreased processing power.

Business Intelligence and Analytics Platforms

Business Intelligence and Analytics platforms are software applications which compile and analyze a company’s raw data through a system of mining, querying, analytical processing, and reporting. These tools are used primarily to drive business planning and cover several facets of business including Marketing, Sales, Supply and Demand, Financials, Production, and more.

Business Process Management Suites

Business Process Management Suites are enterprise application software that enables an organization to streamline processes and gain organizational efficiency through the modeling, execution and analysis of business processes.

Contact Center Automation

Contact Center Automation (Contact Center Infrastructure) is software designed for call and contact centers to optimize interaction with customers and end users. Features include voice recognition, touch-tone mapping, telemarketing auto-dial solutions, web-based dialing, and integrated dialing solutions.

Corporate Performance Management

Corporate Performance Management is a Business Intelligence solution used specifically to monitor an organization’s performance according to metrics such as, but not limited to; revenue, return on investment, overhead, operational costs, multifactor productivity, and forecasting. Corporate Performance Management software often includes dashboards with graphs and charting so that corporate, team, and individual performance can be tracked.

CRM Customer Engagement Center

CRM Customer Engagement Center (CEC) was first coined by Gartner in 2013 as an evolution from CRM Customer Service Contact Center on the basis of increased importance to engage prospects/customers within new mediums like social media, mobile devices, etc. CRM CEC is a set of functional business applications that provide customer service and customer support, regardless of the engagement channel or platform.

CRM Lead Management

CRM Lead Management is a set of functional business applications that provide complete and closed-loop process of tracking, managing, and reporting sales leads in various stages of the cycle---generation, qualification, nurturing, and conversion into sales. The data generated in this process is used to measure the efficiency and effectiveness of both marketing and sales efforts.

Data Integration Tools

Software solutions (tools) that enable the creation and implementation of data access and delivery infrastructure for a wide array of data integration functional workflows.

Document Management Software

Document management software, otherwise known as a Document Management System (DMS), is a computer system or software package that allows every organization to store, keep track of, manage and control its electronic files—regardless of type, content or format—and images of paper-based information captured through the use of scanning devices.  It incorporates document and content capture, workflow, document repositories, COLD/ERM, output systems, and information retrieval systems. DMS is one of the precursor technologies to content management since it provides basic functionalities for the latter.

As more and more information appears and circulates every second through and from the Web, mobile devices, and other electronic devices, the need for a stable Document Management System is of prime importance, particularly in the way it manages data.

Today, Document Management Systems range in size and scope from small scale to large scale systems, which cater to a global and diverse audience. Many DMS's incorporate into their services electronic filing practices that were once applicable only to physical or hard copy documents.

E-Discovery Software

E-Discovery (or Electronic Discovery) software refers to software used by attorneys to identify intangible records or documents stored electronically. E-Discovery software is typically the first step in identifying any number of documents or items that are relevant to civil litigation. Documents that are found using E-Discovery software are then further analyzed using digital forensics procedures.

Email Security

Email security is any list of measures taken to ensure that email or email accounts within an organization are not accessed - in transit or at rest - by any third party. Email security can be applied in the form of software or appliance as a standalone product or part of a larger suite of products. Features often include encryption and user-authentication.

Enterprise Backup and Recovery

Description for Enterprise Backup and Recovery

Enterprise Content Management

Enterprise Content Management (ECM) is the strategies, methods and tools used to capture, manage, store, preserve, and deliver content and documents related to organizational processes. ECM tools and strategies allow the management of an organization's unstructured information, wherever that information exists. "What is Enterprise Content Management (ECM)?", Association for Information and Image Management (AIIM), accessed May 22, 2014, http://www.aiim.org/what-is-ecm-enterprise-content-management.

Enterprise Network Firewalls

Enterprise Network Firewalls (ENF) are devices that act as barriers to secure perimeter access to a network. They are also capable of providing single point of control at the edge, virtualization, and linear performance/scalability.

Help Desk Software

Help Desk software is an automation tool that facilitates the quick, timely, and subject-focused communication between a customer who purchased products and services and the CSR that represents the seller or provider company. In a broader sense, Help Desk is here to troubleshoot issues raised by a customer and to provide him guidance on his technical or non-technical concerns. Canned responses, auto-ticketing, and call routing are some of the most important mechanisms running behind Help Desk tools which are primarily designed to track and monitor the customer support cycle.

Human Resources Software

A Human Resources Software (HRS) solution facilitates the recruitment, selection, development, employment, deployment, and support of every organization’s most important resources—its people. Also known as a Human Resources Management System (HRMS), this critical management tool is continuously being improved by combining modern software technologies and HR management disciplines. Modern HRS systems support core HR management, workforce management and strategic HR functions. Moreover, HR managers, functional specialists, information systems professionals, and executive managers are all vital to the success of acquiring and implementing the right HRS solution for each organization.

Intrusion Prevention Systems

An Intrusion Prevention System (IPS) is an appliance that actively examines network traffic in order to both detect and prevent the exploitation of network vulnerability. Such attacks are typically malicious inputs to specific applications or attempts to gain control of applications and entire machines.

IT Service Support Management Tools
Learning Management Software

Professionals from different fields of work and study have their own definitions of LMS. A high-level definition of LMS is, at the enterprise level, a server-based software system that is used to manage and deliver learning of various types. The functions of LMS cover the structure, security, registration, delivery, interaction, assessment, tracking, reporting, record keeping, personalization, integration, and administration of systems that deliver and manage learning. Technically, LMS is an automation tool that develops intelligent electronic coursework for learning and for the continuing education of an organization’s workforce. As you begin to explore LMS functionality, you will get to know that this system is generally designed to account for these five basic categories of learning: initial, continued, remedial, upgrade, and transfer learning.

Load Balancer

Load balancer's is a device or hardware or virtual hardware) that acts like a reverse proxy to distribute network and/or application traffic across different servers. A load balancer is used to improve the concurrent user capacity and overall reliability of applications. A load balancer helps to improve these by distributing the workload across multiple servers, decreasing the overall burden placed on each server.

Physical load balancing appliances are similar in appearance to routers. These devices are connected to your network infrastructure in the same manner as a router and/or other servers. In contrast, virtual load balancing hardware is software that emulates the addition of a new hardware load balancing solution. These virtual load balancers work in a manner similar to a virtual server or a virtual computer on the network. It acts as a physical load balancer and distribute requests accordingly, saving you space and offering greater flexibility than many hardware balancers.

Medical EHR/EMR Software

The main difference between EHR and EMR is that Electronic Health Records (EHRs) can do all the things that the Electronic Medical Records (EMRs) can. So for the rest of this article, we will be using “EHR” to refer to the medical system that encompasses all aspects of the electronic records of patients.

Over the years, the definition of EHR has become wider in scope. This is probably because of the existence of different healthcare groups with various medical specialties that are using this system. To the majority of healthcare organizations, EHR is simply a digital version of the paper forms in the doctor’s office. It contains the medical and treatment history of the patients in a single medical practice. But for medical practitioners who have been in their chosen medical profession for quite a number of years, EHR is more than a digital record. Most EHRs today are designed and developed to reach out beyond the healthcare organization. An EHR is a comprehensive collection of patient medical records, which is built to share information across different healthcare settings.

Membership Management Software

Many organizations, especially those that are in the non-profit sector, are using Membership Management Software (MMS) to allow people to subscribe into their organization. People can register either through a paid membership scheme or through a voluntary and free membership system which could later on benefit the organization from donations, grants, and paid events. Professional associations, trade unions, political parties, country clubs, and business associations are among the main users of MMS. They are using MMS to organize events, facilitate fund raising activities, track grant applications, proposals and rewards, automate accounting processes, track member progress in educational programs, and provide customer support.

Mobile Device Management

Mobile Device Management (MDM) includes distribution of applications, data and configuration settings for all types of mobile devices. These include mobile phones, smartphones, laptops, tablets, mobile printers, and mobile POS devices. This typically includes both BYOD (employee-owned) and company owned devices.

Mobile Payments

Mobile payment, which is also known as mobile money, mobile money transfer, and mobile wallet refers to payment services operated under financial regulation and performed from or via a mobile device. In lieu of paying with cash, check, or credit cards, an individual or business can use a mobile phone to pay for a wide range of consumer and business goods.

Network Packet Brokers

Network Packet Brokers (NPBs) are network devices that gather and aggregate network traffic from switch SPAN ports or network TAPs and then manipulate that traffic, or copies of that traffic, to enable the more efficient use of network security and performance tools, both inline and passive.

Network Performance Monitoring

Network Performance Monitoring solutions include both hardware and software solutions that actively investigate network traffic and resource utilization. Excessive network traffic and resource utilization can result in degraded performance of both hardware and software on the network.

Project Management Software

Project management is the response of organizations to the modern society. It is the process of planning, organizing, motivating, and controlling resources, procedures, and protocols in order to achieve the firm’s specific goals. Every project has a life cycle: conception, definition, execution, and operation. Project, at any point of its life cycle, can be measured in terms of time, cost, and performance. Many project management tools today are designed and developed for the purpose of providing the system on every project’s life cycle. PMS core functions include planning projects, managing tasks, sharing and collaborating documents, sharing calendars and contact lists, tracking time, and managing issues. Projects with technical complexity and those that require a diversity of skills are where PMS solutions are also intended for.

Sales Force Automation

Sales Force Automation (SFA) is a set of integrated sales operation processes designed to maximize the efficiency and effectiveness of the repeatable processes a sales person performs. Software is used to streamline and automate business tasks, including: Account Management, Customer Contact Management, Opportunity Management, Sales Funnel Management, Sales Activity Management, Sales Forecasting Reporting & Analytics, and Sales Team Reporting & Analytics.

Security Information and Event Management

Security Information and Event Management (SIEM) solutions identify, monitor, record, and analyze security events or incidences within real-time IT infrastructure. SIEMs provide a holistic and detailed view of security events, provide incident investigation capabilities, as well as compliance reports. SIEM solutions combine security information management (SIM) and security event management (SEM).

Server Monitoring

Server Monitoring is a solution that allows organizations to analyze and capture critical server metrics such as CPU utilization, memory, disk, processes and sometimes also allows for secondary monitoring of network utilization.

Social Business Software

Description for Social Business Software

Storage

Enterprise storage is a centralized data depository requiring highly reliable management, protection, and throughput performance. Examples of storage solutions include – but are not limited to – Storage Area Networks, Direct Attached Storage, Network Attached Storage, as well as both Hybrid and Virtual storage varieties.

Storage (Cloud)

Cloud storage is a service model of networked enterprise storage in which data is maintained and managed in virtual storage, typically hosted by third parties (i.e. cloud storage hosting providers). These providers operate large scale data centers in which physical resources span across multiple servers and locations. The resources are virtualized and based on the consumer’s needs, it is exposed as storage pools in which the consumer can use various services to store files and data objects. The various services include web service APIs, applications that use the API, cloud storage gateway, and/or content management systems.

Unified Communications as a Service

Unified Communication as a Service is a method of outsourcing of communication technologies such as messaging, telephony, presence, and meeting scheduling to a third party source. Services are then delivered to users over the network.

Unified Threat Management

Unified Threat Management (UTM) is a single device or software that handles multiple types of threat management including antivirus, content filtering, intrusion prevention, and spam filtering.

User Authentication

User Authentication is security software designed to protect networks, files, devices, terminals, and locations from fraudulent transmission or access.

WAN Optimization

WAN Optimization is a series of methods for improving data transfer efficiency across Wide Area Networks (WAN). These methods include: De-duplication, Compression, Latency Optimization, Caching/Proxy, Forward Error Correction, Protocol Spoofing, Traffic Shaping, Equalizing/Quality of Service, Connection Limits, and Simple Rate Limits.

Web Conferencing

Description for Web Conferencing

Web Content Management

Web Content Management (WCM) is a suite of tools used to create, develop, design, and publish online content and web pages

Web Fraud Detection

Web Fraud Detection is a security measure used to protect individuals and corporations against various forms of fraudulent attempts to access accounts or data. Examples include account takeover attempts, payment fraud, and identity/device spoofing.

Web Security

Web security is a solution which primarily ensures that corporate web policies are enforced. In doing so, this protects a company’s network from unwanted attacks or malware as a result of user-initiated web searches or attempted access to restricted or infected sites. Further, web security solutions offer the ability to control or restrict the use of third party applications such as IM or Skype.