array(3) {
["company_details"]=>
array(13) {
["name"]=>
string(13) "Gartner, Inc."
["slug"]=>
string(20) "694c2-us-gartner-inc"
["logo"]=>
string(84) "https://images.businessradar.com/linkedin_logos/830960d8-449e-497f-8e05-f9364ea4b886"
["description"]=>
string(728) "Gartner is a company that delivers actionable, objective insight to executives and their teams. They provide expert guidance and tools to enable faster, smarter decisions and stronger performance on an organization's mission-critical priorities. Gartner has been providing insights and expert guidance to clients' enterprises worldwide for over 40 years. They work with businesses in nearly 90 countries and have over 19,500 associates in approximately 85 offices globally. Gartner offers research and advisory services, conferences, consulting, and more. They also have a commitment to diversity, equity, and inclusion. Gartner's website provides more information about their services, leadership, and corporate responsibility."
["address_street"]=>
string(17) "56 Top Gallant Rd"
["address_place"]=>
string(8) "Stamford"
["address_region"]=>
string(11) "Connecticut"
["founding_date"]=>
string(10) "1979-02-28"
["website_domain"]=>
string(11) "gartner.com"
["website_url"]=>
string(23) "https://www.gartner.com"
["industry_codes"]=>
array(3) {
[0]=>
string(59) "Commercial Economic, Sociological, and Educational Research"
[1]=>
string(19) "Management Services"
[2]=>
string(30) "Management Consulting Services"
}
["employee_count"]=>
int(1314)
["article_count"]=>
int(3459)
}
["articles"]=>
array(9) {
[0]=>
array(7) {
["title_en"]=>
string(50) "13 best data protection software platforms of 2024"
["snippet_en"]=>
string(149) "To keep up with data privacy laws, sophisticated cyberattacks and generative AI's infiltration, learn about this year's top data protection software."
["url"]=>
string(91) "https://www.techtarget.com/searchdatabackup/feature/Best-data-protection-software-platforms"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/4a30197c-5e99-4ccc-a605-5db65d8de4d6"
["source"]=>
string(14) "techtarget.com"
["publication_date"]=>
string(10) "2024-04-15"
["categories"]=>
array(3) {
[0]=>
string(16) "Customer Privacy"
[1]=>
string(10) "Cybercrime"
[2]=>
string(13) "Data Security"
}
}
[1]=>
array(7) {
["title_en"]=>
string(74) "Leveraging Defensive AI to Safeguard Organizations against Data Corruption"
["snippet_en"]=>
string(158) "By Vaibhav Tare Dependency on data has vastly increased in recent years, amidst accelerated digital transformation across sectors. From finance to healthcare"
["url"]=>
string(105) "https://cxotoday.com/specials/leveraging-defensive-ai-to-safeguard-organizations-against-data-corruption/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/54a0235a-a224-427f-a90c-4c847edb06f7"
["source"]=>
string(12) "cxotoday.com"
["publication_date"]=>
string(10) "2024-04-08"
["categories"]=>
array(4) {
[0]=>
string(16) "Customer Privacy"
[1]=>
string(13) "Data Security"
[2]=>
string(5) "Fraud"
[3]=>
string(10) "Misconduct"
}
}
[2]=>
array(7) {
["title_en"]=>
string(131) "Elon Musk's AI chatbot Grok has the weakest security, while Meta's Llama is strong: researchers - Decrypt - Plato Data Intelligence"
["snippet_en"]=>
string(146) "Security researchers placed much-hyped guardrails around the most popular AI models to see how resistant they were to jailbreaking, and tested how"
["url"]=>
string(145) "https://zephyrnet.com/it/elon-musks-grok-ai-chatbot-ha-la-sicurezza-pi%C3%B9-debole-mentre-metas-llama-%C3%A8-forte-e-i-ricercatori-lo-decifrano/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/328fff85-4877-41c2-9a80-315db8912646"
["source"]=>
string(13) "zephyrnet.com"
["publication_date"]=>
string(10) "2024-04-07"
["categories"]=>
array(3) {
[0]=>
string(16) "Customer Privacy"
[1]=>
string(10) "Cybercrime"
[2]=>
string(13) "Data Security"
}
}
[3]=>
array(7) {
["title_en"]=>
string(39) "Data Quality Getting Worse, Report Says"
["snippet_en"]=>
string(154) "For as long as “big data” has been a thing, data quality has been a big question mark. Working with data to make it suitable for analysis was the task"
["url"]=>
string(75) "https://www.datanami.com/2024/04/05/data-quality-getting-worse-report-says/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/98c9aa76-4ea1-4bde-ba3e-8b920dd88f53"
["source"]=>
string(12) "datanami.com"
["publication_date"]=>
string(10) "2024-04-05"
["categories"]=>
array(3) {
[0]=>
string(16) "Customer Privacy"
[1]=>
string(10) "Cybercrime"
[2]=>
string(13) "Data Security"
}
}
[4]=>
array(7) {
["title_en"]=>
string(88) "MY TAKE: Why email security desperately needs retooling in this post-Covid 19, GenAI era"
["snippet_en"]=>
string(238) "It’s a digital swindle as old as the internet itself, and yet, as the data tells us, the vast majority of security incidents are still rooted in the low-tech art of social engineering. Related: AI makes scam email look real... (more...)"
["url"]=>
string(125) "https://securityboulevard.com/2024/04/my-take-why-email-security-desperately-needs-retooling-in-this-post-covid-19-genai-era/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/41d91b19-e445-4f62-92f3-28998c896458"
["source"]=>
string(21) "securityboulevard.com"
["publication_date"]=>
string(10) "2024-04-02"
["categories"]=>
array(2) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(13) "Data Security"
}
}
[5]=>
array(7) {
["title_en"]=>
string(53) "Cybersecurity Mesh: Overcoming Data Security Overload"
["snippet_en"]=>
string(110) "What to consider when assessing vendors that promise to unlock the power of a cybersecurity mesh architecture."
["url"]=>
string(82) "https://www.securityweek.com/cybersecurity-mesh-overcoming-data-security-overload/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/09364283-4df8-4d3a-afec-5579b0a9d48e"
["source"]=>
string(16) "securityweek.com"
["publication_date"]=>
string(10) "2024-03-28"
["categories"]=>
array(4) {
[0]=>
string(18) "General Investment"
[1]=>
string(10) "Cybercrime"
[2]=>
string(13) "Data Security"
[3]=>
string(24) "Systemic Risk Management"
}
}
[6]=>
array(7) {
["title_en"]=>
string(60) "Regulations set to cyber-secure the supply chain - Techerati"
["snippet_en"]=>
string(139) "By 2025, 45% of organisations may face supply chain attacks. Prioritising supply chain security beyond regulations is vital for resilience."
["url"]=>
string(88) "https://www.techerati.com/features-hub/regulations-set-to-cyber-secure-the-supply-chain/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/9e45e5f2-0c99-48b1-a8dd-43c29ecb20b9"
["source"]=>
string(13) "techerati.com"
["publication_date"]=>
string(10) "2024-03-27"
["categories"]=>
array(6) {
[0]=>
string(27) "Supply Chains Vulnerability"
[1]=>
string(23) "Supply Chain Disruption"
[2]=>
string(23) "Supply Chain Management"
[3]=>
string(10) "Cybercrime"
[4]=>
string(13) "Data Security"
[5]=>
string(11) "Regulations"
}
}
[7]=>
array(7) {
["title_en"]=>
string(77) "Nametag, Indian academics, Intercede strengthen MFA with biometrics, passkeys"
["snippet_en"]=>
string(142) "As deepfake threats rise, enterprises are losing faith in the security of identity verification and authentication without further protection."
["url"]=>
string(113) "https://www.biometricupdate.com/202403/nametag-indian-academics-intercede-strengthen-mfa-with-biometrics-passkeys"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/f5c7da72-1a76-416a-8624-34200b36edfc"
["source"]=>
string(19) "biometricupdate.com"
["publication_date"]=>
string(10) "2024-03-26"
["categories"]=>
array(2) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(13) "Data Security"
}
}
[8]=>
array(7) {
["title_en"]=>
string(94) "Gartner says data & analytics leaders must use collective intelligence to drive business value"
["snippet_en"]=>
string(186) "Gartner analysts say Data & Analytics leaders have a central role to play, providing the capabilities that facilitate decision and action, effectively unleashing collective intelligence."
["url"]=>
string(138) "https://ipnews.com.br/gartner-afirma-que-lideres-de-data-analytics-devem-usar-a-inteligencia-coletiva-para-impulsionar-valor-aos-negocios/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/636baf7d-bc75-4d50-8ac5-c2caf3720692"
["source"]=>
string(13) "ipnews.com.br"
["publication_date"]=>
string(10) "2024-03-26"
["categories"]=>
array(1) {
[0]=>
string(13) "Data Security"
}
}
}
["category_annotations"]=>
array(30) {
[0]=>
array(2) {
["name"]=>
string(13) "Data Security"
["count"]=>
int(411)
}
[1]=>
array(2) {
["name"]=>
string(10) "Cybercrime"
["count"]=>
int(198)
}
[2]=>
array(2) {
["name"]=>
string(16) "Customer Privacy"
["count"]=>
int(138)
}
[3]=>
array(2) {
["name"]=>
string(5) "R & D"
["count"]=>
int(137)
}
[4]=>
array(2) {
["name"]=>
string(41) "E-commerce and Technological Developments"
["count"]=>
int(135)
}
[5]=>
array(2) {
["name"]=>
string(23) "Supply Chain Management"
["count"]=>
int(133)
}
[6]=>
array(2) {
["name"]=>
string(25) "Business Model Resilience"
["count"]=>
int(97)
}
[7]=>
array(2) {
["name"]=>
string(24) "Quarterly/Annual Figures"
["count"]=>
int(96)
}
[8]=>
array(2) {
["name"]=>
string(14) "Product Launch"
["count"]=>
int(88)
}
[9]=>
array(2) {
["name"]=>
string(23) "Supply Chain Disruption"
["count"]=>
int(87)
}
[10]=>
array(2) {
["name"]=>
string(20) "Business Development"
["count"]=>
int(64)
}
[11]=>
array(2) {
["name"]=>
string(12) "Stock Market"
["count"]=>
int(63)
}
[12]=>
array(2) {
["name"]=>
string(18) "General Investment"
["count"]=>
int(60)
}
[13]=>
array(2) {
["name"]=>
string(13) "Collaboration"
["count"]=>
int(60)
}
[14]=>
array(2) {
["name"]=>
string(11) "Acquisition"
["count"]=>
int(55)
}
[15]=>
array(2) {
["name"]=>
string(31) "Financial Update/Profit Warning"
["count"]=>
int(53)
}
[16]=>
array(2) {
["name"]=>
string(18) "Expansion & Growth"
["count"]=>
int(53)
}
[17]=>
array(2) {
["name"]=>
string(19) "Economic Conditions"
["count"]=>
int(49)
}
[18]=>
array(2) {
["name"]=>
string(15) "Market Movement"
["count"]=>
int(48)
}
[19]=>
array(2) {
["name"]=>
string(5) "Award"
["count"]=>
int(45)
}
[20]=>
array(2) {
["name"]=>
string(24) "Systemic Risk Management"
["count"]=>
int(44)
}
[21]=>
array(2) {
["name"]=>
string(27) "Supply Chains Vulnerability"
["count"]=>
int(42)
}
[22]=>
array(2) {
["name"]=>
string(12) "Board Change"
["count"]=>
int(42)
}
[23]=>
array(2) {
["name"]=>
string(8) "Epidemic"
["count"]=>
int(40)
}
[24]=>
array(2) {
["name"]=>
string(5) "Legal"
["count"]=>
int(38)
}
[25]=>
array(2) {
["name"]=>
string(5) "Event"
["count"]=>
int(33)
}
[26]=>
array(2) {
["name"]=>
string(15) "Labor Practices"
["count"]=>
int(33)
}
[27]=>
array(2) {
["name"]=>
string(19) "Green & Responsible"
["count"]=>
int(32)
}
[28]=>
array(2) {
["name"]=>
string(12) "Staff hiring"
["count"]=>
int(31)
}
[29]=>
array(2) {
["name"]=>
string(18) "Ecological Impacts"
["count"]=>
int(30)
}
}
}
694c2-us-gartner-inc
Gartner, Inc.
Location
Connecticut
Founded
1979-02-28
Website
https://www.gartner.com
Articles
3459 Articles
Category
Commercial Economic, Sociological, and Educational Research
Management Services
Management Consulting Services
Description
Gartner is a company that delivers actionable, objective insight to executives and their teams. They provide expert guidance and tools to enable faster, smarter decisions and stronger performance on an organization's mission-critical priorities. Gartner has been providing insights and expert guidance to clients' enterprises worldwide for over 40 years. They work with businesses in nearly 90 countries and have over 19,500 associates in approximately 85 offices globally. Gartner offers research and advisory services, conferences, consulting, and more. They also have a commitment to diversity, equity, and inclusion. Gartner's website provides more information about their services, leadership, and corporate responsibility.
By Vaibhav Tare Dependency on data has vastly increased in recent years, amidst accelerated digital transformation across sectors. From finance to healthcare
It’s a digital swindle as old as the internet itself, and yet, as the data tells us, the vast majority of security incidents are still rooted in the low-tech art of social engineering. Related: AI makes scam email look real... (more...)
Gartner analysts say Data & Analytics leaders have a central role to play, providing the capabilities that facilitate decision and action, effectively unleashing collective intelligence.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.