The Magic Quadrant: Social Software In The Workplace

The Magic Quadrant: Social Software In The Workplace

With the increasing interest in social software during the last years, there are some top vendors that get the buyers’ attention. According to this trend, Gartner has released its 2012 Magic Quadrant for Social Software in the Workplace.

The Magic Quadrant covers vendors whose software products are used mainly within enterprises, especially by employees but also by external customers, suppliers and partners, to support work teams, communities and social networking.

The evaluation criteria definitions that were considered when analyzing the quadrant are:

  • Ability to execute: product/service; overall viability; sales execution/pricing; market responsiveness and track record; marketing execution; customer experience; operations.
  • Completeness of vision: market understanding; marketing strategy; sales strategy; offering (product) strategy.
  • Business model: vertical/ industry strategy; innovation; geographic strategy.

The products that compete in this market help users form teams, communities or informal groups in order to work together on the same objects, discuss and comment on their work, discover people with common interests, learn from others’ experience and so
on.

Specific uses of products in this market include:

Sharing team information and coordinating project-related activities.
Empowering communities of experts and interested parties.

Facilitating social interaction by helping people establish and strengthen personal relationships and accelerate the business processes in which people engage.

• Accessing relevant knowledge and expertise that can be used to formulate a plan of action when decisions need to be made.

The Magic Quadrant for Social Software in the Workplace covers a broad set of products, vendors and use cases. The main directions used for the analysis were the ability to execute and completeness of vision.

Four main categories were identified:

challengers (Tibco Software, Vmware), leaders (Microsoft, IBM, Yammer), niche players (Igloo, blueKiwi, OpenText) and visionaries (Cisco, Acquia).

The Quadrant describes the main strengths and weaknesses for the products included.

For example, Igloo is in the Niche Players quadrant. It offers a SaaS solution that bridges internal and external collaboration and networking.

This top is important mainly for organizations trying to engage directly with their employees which should be aware of the most prominent vendors. Given the differing backgrounds of many of the vendors, the differences in their strategies, and the increased consolidation activity, the market’s volatility should remain high.

By Rick Blaisdell / Ricks Cloud

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

What Technology Can Displace The Password?

What Technology Can Displace The Password?

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some people might say that multi-factor authentications or ID federations will do it. It is not…

Immune Systems: Information Security And Risk In 2016

Immune Systems: Information Security And Risk In 2016

Information Security And Risk C-suite executives have woken up to the threat posed by data theft, denial-of-service attacks and vulnerable systems. In 2015, for example, a series of high-profile cases illustrated the degree to which such attacks can damage a company’s reputation, brand and, ultimately, profits. Where businesses once undervalued cybersecurity, considering it the domain of CIOs and…

Drones: Unlimited Possibilities Await Us – Good And Bad

Drones: Unlimited Possibilities Await Us – Good And Bad

Drones: Unlimited Possibilities I have written two recent posts here on CloudTweaks about drones. The first, ‘The Pizza Delivery Drone’, was a somewhat comical look at what possibly is to come with future drones. The second was a look at the more immediately possible concept of a modular drone.  Modular drones are capable of supporting…

Small Technology Providers (STPs) — VARs, ISVs, Integrators, And SME Consultants

Small Technology Providers (STPs) — VARs, ISVs, Integrators, And SME Consultants

Small Technology Providers (STPs) Continuation from last weeks article. See the article here  Here’s the opportunity for little / middle guy.  It’s funny, I’m a big networker and I can’t tell you how many conversations I’ve had with IT folk across all these specialty functions and everyone says the same thing:   They all felt like…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising