array(3) { ["company_details"]=> array(13) { ["name"]=> string(13) "Gartner, Inc." ["slug"]=> string(20) "694c2-us-gartner-inc" ["logo"]=> string(84) "https://images.businessradar.com/linkedin_logos/830960d8-449e-497f-8e05-f9364ea4b886" ["description"]=> string(728) "Gartner is a company that delivers actionable, objective insight to executives and their teams. They provide expert guidance and tools to enable faster, smarter decisions and stronger performance on an organization's mission-critical priorities. Gartner has been providing insights and expert guidance to clients' enterprises worldwide for over 40 years. They work with businesses in nearly 90 countries and have over 19,500 associates in approximately 85 offices globally. Gartner offers research and advisory services, conferences, consulting, and more. They also have a commitment to diversity, equity, and inclusion. Gartner's website provides more information about their services, leadership, and corporate responsibility." ["address_street"]=> string(17) "56 Top Gallant Rd" ["address_place"]=> string(8) "Stamford" ["address_region"]=> string(11) "Connecticut" ["founding_date"]=> string(10) "1979-02-28" ["website_domain"]=> string(11) "gartner.com" ["website_url"]=> string(23) "https://www.gartner.com" ["industry_codes"]=> array(3) { [0]=> string(59) "Commercial Economic, Sociological, and Educational Research" [1]=> string(19) "Management Services" [2]=> string(30) "Management Consulting Services" } ["employee_count"]=> int(1314) ["article_count"]=> int(3459) } ["articles"]=> array(9) { [0]=> array(7) { ["title_en"]=> string(50) "13 best data protection software platforms of 2024" ["snippet_en"]=> string(149) "To keep up with data privacy laws, sophisticated cyberattacks and generative AI's infiltration, learn about this year's top data protection software." ["url"]=> string(91) "https://www.techtarget.com/searchdatabackup/feature/Best-data-protection-software-platforms" ["image_url"]=> string(78) "https://images.businessradar.com/articles/4a30197c-5e99-4ccc-a605-5db65d8de4d6" ["source"]=> string(14) "techtarget.com" ["publication_date"]=> string(10) "2024-04-15" ["categories"]=> array(3) { [0]=> string(16) "Customer Privacy" [1]=> string(10) "Cybercrime" [2]=> string(13) "Data Security" } } [1]=> array(7) { ["title_en"]=> string(74) "Leveraging Defensive AI to Safeguard Organizations against Data Corruption" ["snippet_en"]=> string(158) "By Vaibhav Tare Dependency on data has vastly increased in recent years, amidst accelerated digital transformation across sectors. From finance to healthcare" ["url"]=> string(105) "https://cxotoday.com/specials/leveraging-defensive-ai-to-safeguard-organizations-against-data-corruption/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/54a0235a-a224-427f-a90c-4c847edb06f7" ["source"]=> string(12) "cxotoday.com" ["publication_date"]=> string(10) "2024-04-08" ["categories"]=> array(4) { [0]=> string(16) "Customer Privacy" [1]=> string(13) "Data Security" [2]=> string(5) "Fraud" [3]=> string(10) "Misconduct" } } [2]=> array(7) { ["title_en"]=> string(131) "Elon Musk's AI chatbot Grok has the weakest security, while Meta's Llama is strong: researchers - Decrypt - Plato Data Intelligence" ["snippet_en"]=> string(146) "Security researchers placed much-hyped guardrails around the most popular AI models to see how resistant they were to jailbreaking, and tested how" ["url"]=> string(145) "https://zephyrnet.com/it/elon-musks-grok-ai-chatbot-ha-la-sicurezza-pi%C3%B9-debole-mentre-metas-llama-%C3%A8-forte-e-i-ricercatori-lo-decifrano/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/328fff85-4877-41c2-9a80-315db8912646" ["source"]=> string(13) "zephyrnet.com" ["publication_date"]=> string(10) "2024-04-07" ["categories"]=> array(3) { [0]=> string(16) "Customer Privacy" [1]=> string(10) "Cybercrime" [2]=> string(13) "Data Security" } } [3]=> array(7) { ["title_en"]=> string(39) "Data Quality Getting Worse, Report Says" ["snippet_en"]=> string(154) "For as long as “big data” has been a thing, data quality has been a big question mark. Working with data to make it suitable for analysis was the task" ["url"]=> string(75) "https://www.datanami.com/2024/04/05/data-quality-getting-worse-report-says/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/98c9aa76-4ea1-4bde-ba3e-8b920dd88f53" ["source"]=> string(12) "datanami.com" ["publication_date"]=> string(10) "2024-04-05" ["categories"]=> array(3) { [0]=> string(16) "Customer Privacy" [1]=> string(10) "Cybercrime" [2]=> string(13) "Data Security" } } [4]=> array(7) { ["title_en"]=> string(88) "MY TAKE: Why email security desperately needs retooling in this post-Covid 19, GenAI era" ["snippet_en"]=> string(238) "It’s a digital swindle as old as the internet itself, and yet, as the data tells us, the vast majority of security incidents are still rooted in the low-tech art of social engineering. Related: AI makes scam email look real... (more...)" ["url"]=> string(125) "https://securityboulevard.com/2024/04/my-take-why-email-security-desperately-needs-retooling-in-this-post-covid-19-genai-era/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/41d91b19-e445-4f62-92f3-28998c896458" ["source"]=> string(21) "securityboulevard.com" ["publication_date"]=> string(10) "2024-04-02" ["categories"]=> array(2) { [0]=> string(10) "Cybercrime" [1]=> string(13) "Data Security" } } [5]=> array(7) { ["title_en"]=> string(53) "Cybersecurity Mesh: Overcoming Data Security Overload" ["snippet_en"]=> string(110) "What to consider when assessing vendors that promise to unlock the power of a cybersecurity mesh architecture." ["url"]=> string(82) "https://www.securityweek.com/cybersecurity-mesh-overcoming-data-security-overload/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/09364283-4df8-4d3a-afec-5579b0a9d48e" ["source"]=> string(16) "securityweek.com" ["publication_date"]=> string(10) "2024-03-28" ["categories"]=> array(4) { [0]=> string(18) "General Investment" [1]=> string(10) "Cybercrime" [2]=> string(13) "Data Security" [3]=> string(24) "Systemic Risk Management" } } [6]=> array(7) { ["title_en"]=> string(60) "Regulations set to cyber-secure the supply chain - Techerati" ["snippet_en"]=> string(139) "By 2025, 45% of organisations may face supply chain attacks. Prioritising supply chain security beyond regulations is vital for resilience." ["url"]=> string(88) "https://www.techerati.com/features-hub/regulations-set-to-cyber-secure-the-supply-chain/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/9e45e5f2-0c99-48b1-a8dd-43c29ecb20b9" ["source"]=> string(13) "techerati.com" ["publication_date"]=> string(10) "2024-03-27" ["categories"]=> array(6) { [0]=> string(27) "Supply Chains Vulnerability" [1]=> string(23) "Supply Chain Disruption" [2]=> string(23) "Supply Chain Management" [3]=> string(10) "Cybercrime" [4]=> string(13) "Data Security" [5]=> string(11) "Regulations" } } [7]=> array(7) { ["title_en"]=> string(77) "Nametag, Indian academics, Intercede strengthen MFA with biometrics, passkeys" ["snippet_en"]=> string(142) "As deepfake threats rise, enterprises are losing faith in the security of identity verification and authentication without further protection." ["url"]=> string(113) "https://www.biometricupdate.com/202403/nametag-indian-academics-intercede-strengthen-mfa-with-biometrics-passkeys" ["image_url"]=> string(78) "https://images.businessradar.com/articles/f5c7da72-1a76-416a-8624-34200b36edfc" ["source"]=> string(19) "biometricupdate.com" ["publication_date"]=> string(10) "2024-03-26" ["categories"]=> array(2) { [0]=> string(10) "Cybercrime" [1]=> string(13) "Data Security" } } [8]=> array(7) { ["title_en"]=> string(94) "Gartner says data & analytics leaders must use collective intelligence to drive business value" ["snippet_en"]=> string(186) "Gartner analysts say Data & Analytics leaders have a central role to play, providing the capabilities that facilitate decision and action, effectively unleashing collective intelligence." ["url"]=> string(138) "https://ipnews.com.br/gartner-afirma-que-lideres-de-data-analytics-devem-usar-a-inteligencia-coletiva-para-impulsionar-valor-aos-negocios/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/636baf7d-bc75-4d50-8ac5-c2caf3720692" ["source"]=> string(13) "ipnews.com.br" ["publication_date"]=> string(10) "2024-03-26" ["categories"]=> array(1) { [0]=> string(13) "Data Security" } } } ["category_annotations"]=> array(30) { [0]=> array(2) { ["name"]=> string(13) "Data Security" ["count"]=> int(411) } [1]=> array(2) { ["name"]=> string(10) "Cybercrime" ["count"]=> int(198) } [2]=> array(2) { ["name"]=> string(16) "Customer Privacy" ["count"]=> int(138) } [3]=> array(2) { ["name"]=> string(5) "R & D" ["count"]=> int(137) } [4]=> array(2) { ["name"]=> string(41) "E-commerce and Technological Developments" ["count"]=> int(135) } [5]=> array(2) { ["name"]=> string(23) "Supply Chain Management" ["count"]=> int(133) } [6]=> array(2) { ["name"]=> string(25) "Business Model Resilience" ["count"]=> int(97) } [7]=> array(2) { ["name"]=> string(24) "Quarterly/Annual Figures" ["count"]=> int(96) } [8]=> array(2) { ["name"]=> string(14) "Product Launch" ["count"]=> int(88) } [9]=> array(2) { ["name"]=> string(23) "Supply Chain Disruption" ["count"]=> int(87) } [10]=> array(2) { ["name"]=> string(20) "Business Development" ["count"]=> int(64) } [11]=> array(2) { ["name"]=> string(12) "Stock Market" ["count"]=> int(63) } [12]=> array(2) { ["name"]=> string(18) "General Investment" ["count"]=> int(60) } [13]=> array(2) { ["name"]=> string(13) "Collaboration" ["count"]=> int(60) } [14]=> array(2) { ["name"]=> string(11) "Acquisition" ["count"]=> int(55) } [15]=> array(2) { ["name"]=> string(31) "Financial Update/Profit Warning" ["count"]=> int(53) } [16]=> array(2) { ["name"]=> string(18) "Expansion & Growth" ["count"]=> int(53) } [17]=> array(2) { ["name"]=> string(19) "Economic Conditions" ["count"]=> int(49) } [18]=> array(2) { ["name"]=> string(15) "Market Movement" ["count"]=> int(48) } [19]=> array(2) { ["name"]=> string(5) "Award" ["count"]=> int(45) } [20]=> array(2) { ["name"]=> string(24) "Systemic Risk Management" ["count"]=> int(44) } [21]=> array(2) { ["name"]=> string(27) "Supply Chains Vulnerability" ["count"]=> int(42) } [22]=> array(2) { ["name"]=> string(12) "Board Change" ["count"]=> int(42) } [23]=> array(2) { ["name"]=> string(8) "Epidemic" ["count"]=> int(40) } [24]=> array(2) { ["name"]=> string(5) "Legal" ["count"]=> int(38) } [25]=> array(2) { ["name"]=> string(5) "Event" ["count"]=> int(33) } [26]=> array(2) { ["name"]=> string(15) "Labor Practices" ["count"]=> int(33) } [27]=> array(2) { ["name"]=> string(19) "Green & Responsible" ["count"]=> int(32) } [28]=> array(2) { ["name"]=> string(12) "Staff hiring" ["count"]=> int(31) } [29]=> array(2) { ["name"]=> string(18) "Ecological Impacts" ["count"]=> int(30) } } } 694c2-us-gartner-inc

Gartner, Inc.

Location

Connecticut

Founded

1979-02-28

Website

https://www.gartner.com

Articles

3459 Articles

Category

Commercial Economic, Sociological, and Educational Research

Management Services

Management Consulting Services

Description

Gartner is a company that delivers actionable, objective insight to executives and their teams. They provide expert guidance and tools to enable faster, smarter decisions and stronger performance on an organization's mission-critical priorities. Gartner has been providing insights and expert guidance to clients' enterprises worldwide for over 40 years. They work with businesses in nearly 90 countries and have over 19,500 associates in approximately 85 offices globally. Gartner offers research and advisory services, conferences, consulting, and more. They also have a commitment to diversity, equity, and inclusion. Gartner's website provides more information about their services, leadership, and corporate responsibility.

Articles

13 best data protection software platforms of 2024

2024-04-15 (techtarget.com)

13 best data protection software platforms of 2024

To keep up with data privacy laws, sophisticated cyberattacks and generative AI's infiltration, learn about this year's top data protection software.

Read more
Leveraging Defensive AI to Safeguard Organizations against Data Corruption

2024-04-08 (cxotoday.com)

Leveraging Defensive AI to Safeguard Organizations against Data Corruption

By Vaibhav Tare Dependency on data has vastly increased in recent years, amidst accelerated digital transformation across sectors. From finance to healthcare

Read more
Elon Musk's AI chatbot Grok has the weakest security, while Meta's Llama is strong: researchers - Decrypt - Plato Data Intelligence

2024-04-07 (zephyrnet.com)

Elon Musk's AI chatbot Grok has the weakest security, while Meta's Llama is strong: researchers - Decrypt - Plato Data Intelligence

Security researchers placed much-hyped guardrails around the most popular AI models to see how resistant they were to jailbreaking, and tested how

Read more
Data Quality Getting Worse, Report Says

2024-04-05 (datanami.com)

Data Quality Getting Worse, Report Says

For as long as “big data” has been a thing, data quality has been a big question mark. Working with data to make it suitable for analysis was the task

Read more
MY TAKE: Why email security desperately needs retooling in this post-Covid 19, GenAI era

2024-04-02 (securityboulevard.com)

MY TAKE: Why email security desperately needs retooling in this post-Covid 19, GenAI era

It’s a digital swindle as old as the internet itself, and yet, as the data tells us, the vast majority of security incidents are still rooted in the low-tech art of social engineering. Related: AI makes scam email look real... (more...)

Read more
Cybersecurity Mesh: Overcoming Data Security Overload

2024-03-28 (securityweek.com)

Cybersecurity Mesh: Overcoming Data Security Overload

What to consider when assessing vendors that promise to unlock the power of a cybersecurity mesh architecture.

Read more
Regulations set to cyber-secure the supply chain - Techerati

2024-03-27 (techerati.com)

Regulations set to cyber-secure the supply chain - Techerati

By 2025, 45% of organisations may face supply chain attacks. Prioritising supply chain security beyond regulations is vital for resilience.

Read more
Nametag, Indian academics, Intercede strengthen MFA with biometrics, passkeys

2024-03-26 (biometricupdate.com)

Nametag, Indian academics, Intercede strengthen MFA with biometrics, passkeys

As deepfake threats rise, enterprises are losing faith in the security of identity verification and authentication without further protection.

Read more
Gartner says data & analytics leaders must use collective intelligence to drive business value

2024-03-26 (ipnews.com.br)

Gartner says data & analytics leaders must use collective intelligence to drive business value

Gartner analysts say Data & Analytics leaders have a central role to play, providing the capabilities that facilitate decision and action, effectively unleashing collective intelligence.

Read more

Newsletter subscription