Tag: IT

Tech Spending in Americas, Europe to See a Recovery from Q3 of CY24: Global Tech Analysts | In the News

Tech spending in both the Americas and Europe is expected to get stronger and there are signs that tech providers may be nearing the bottom of the market, indicating a recovery in tech and tech services spending in the third quarter of calendar 2024, according to global tech analysts.

‘‘As we look at this year, we believe that the first two quarters of 2024 will continue to be difficult, however, we are seeing some signs that we may be near the bottom of the market and that we could start to see a recovery in tech and tech services spending in the third quarter,’‘ said Peter Bendor-Samuel, Founder and Chief Executive Officer of Everest Group.

Read more in The Hindu.

Mainframe Services PEAK Matrix® Assessment 2024

Mainframe Services

Mainframe services remain a cornerstone of enterprise IT infrastructure due to their unparalleled capacity to handle massive processing requirements. Known for their robust performance and reliability stemming from their distinct computing architecture, mainframe systems continue to play vital roles in various industries. However, the rapid pace of cloud transformation initiatives has prompted enterprises to reassess their mainframe setups, prioritizing integration and modernization efforts. The scarcity of skilled resources further drives this evaluation process. Enterprises actively seek innovative solutions from partners to facilitate swift application migration, intelligent optimization, and seamless integration into modern hybrid environments. In response, providers are evolving their offerings to meet these demands and provide value-added solutions.

Mainframe Services

What is in this PEAK Matrix® Report

In this report, we assess 17 mainframe Service Providers (SPs) featured on Mainframe Services PEAK Matrix® Assessment 2024 and categorize them as Leaders, Major Contenders, and Aspirants based on their capabilities and offerings.


Contents: 

In this report, we:

  • Examine the market impact, vision, and capabilities of 17 SPs focused on mainframe services
  • Study providers’ key strengths and limitations
  • Evaluate enterprise sourcing considerations

Scope:

  • All industries and geographies
  • The assessment is based on Everest Group’s RFI process for the calendar year 2024, interactions with leading mainframe SPs, client reference checks, and an ongoing analysis of the mainframe services market

Related PEAK Matrix® Assessments

Sustainability Enablement Technology Services
PEAK Matrix®

Sustainability Enablement Technology Services PEAK Matrix® Assessment 2024

Mainframe Services
PEAK Matrix®

Mainframe Services PEAK Matrix® Assessment 2024

Lending IT Services
PEAK Matrix®

Lending IT Services PEAK Matrix® Assessment 2023

Cloud Security Services
PEAK Matrix®

Cloud Security Services PEAK Matrix® Assessment 2023

Our Latest Thinking

India IT services
Blog

Everest Group Talent Demand Growth Index

GettyImages 530281555
Blog

Services Industry Growth is Bottoming Out, but How Much Does It Matter?

GettyImages 1570735722
Blog

Broadcom’s Acquisition of VMware: Navigating the Impact on Pricing

GettyImages 653836738
Blog

Boosting Project Readiness in Technology Talent: A Comprehensive Framework for Developing Project-Ready Workforce

What is the PEAK Matrix®?

The PEAK Matrix® provides an objective, data-driven assessment of service and technology providers based on their overall capability and market impact across different global services markets, classifying them into three categories: Leaders, Major Contenders, and Aspirants.

LEARN MORE ABOUT Top Service Providers

Enterprise Immersive Experience Services PEAK Matrix® Assessment 2024

Enterprise Immersive Experience Services

As the immersive experience landscape evolves from its initial stages to a fully realized state, it promises to transform both consumer and enterprise digital experiences. Despite its early development, enterprises are increasingly recognizing its value and are poised to increase investments in this field. This market is driven by the surging consumer demand for immersive and captivating experiences, presenting numerous opportunities for enterprises across various sectors. The potential applications of immersive technology span diverse areas, such as immersive marketing, enhanced customer experiences, improved employee training, and the facilitation of live virtual events and digital asset trading.

Advances in Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR) technologies are propelling this growth, offering users and enterprises immersive content experiences. The integration of immersive technologies across sectors such as Banking, Financial Services, and Insurance, manufacturing, retail, education, gaming, healthcare, hi-tech, and entertainment is reshaping consumer behaviors and creating new opportunities for engaging experiences. The expanding market is further fueled by rising investment in immersive technology and Web 3.0, indicating a promising future for immersive experience services across industries.

Enterprise Immersive Experience Services

What is in this PEAK Matrix® Report

In this report, we assess 16 immersive experience service providers featured on the Enterprise Immersive Experience Services PEAK Matrix® Assessment 2024 and categorize them as Leaders, Major Contenders, and Aspirants based on their capabilities and offerings.


Contents: 

In this report, we:

  • Evaluate 16 leading immersive experience service providers on Everest Group’s PEAK Matrix® evaluation framework
  • Share the characteristics of Leaders, Major Contenders, and Aspirants in the market
  • Assess providers’ key strengths and limitations

Scope:

  • All industries and geographies
  • The study is based on Everest Group’s annual RFI process for the calendar year 2024, interactions with leading technology providers, client reference checks, and an ongoing analysis of the immersive experience services market

Related PEAK Matrix® Assessments

Sustainability Enablement Technology Services
PEAK Matrix®

Sustainability Enablement Technology Services PEAK Matrix® Assessment 2024

Lending IT Services
PEAK Matrix®

Lending IT Services PEAK Matrix® Assessment 2023

Digital Twin Services
PEAK Matrix®

Digital Twin Services PEAK Matrix® Assessment 2023

Manufacturing Services
PEAK Matrix®

Life Sciences Smart Manufacturing Services PEAK Matrix® Assessment 2023

Our Latest Thinking

India IT services
Blog

Everest Group Talent Demand Growth Index

GettyImages 530281555
Blog

Services Industry Growth is Bottoming Out, but How Much Does It Matter?

GettyImages 653836738
Blog

Boosting Project Readiness in Technology Talent: A Comprehensive Framework for Developing Project-Ready Workforce

GettyImages 1443890653
Blog

Exploring the Importance of Post-quantum Cryptography: An Unbreakable Vault to Protect Enterprises Against Advanced Cyberattacks, Part 2

What is the PEAK Matrix®?

The PEAK Matrix® provides an objective, data-driven assessment of service and technology providers based on their overall capability and market impact across different global services markets, classifying them into three categories: Leaders, Major Contenders, and Aspirants.

LEARN MORE ABOUT Top Service Providers

Outgoing Wipro CEO Delaporte “Found It Tough to Win Hearts and Minds of Traditional Indian IT Firm” | In the News

Thierry Delaporte was announced as the CEO and MD of Wipro in July 2020. Since 2020, the value of the company’s stock and market capitalization grew by 2.5X. But the Frenchman could not complete his five-year tenure.

Peter Bendor-Samuel, CEO of Everest Group, puts it, “As a European, it was difficult to win the hearts and minds of a traditional Indian IT services firm and this undoubtedly also contributed to flagging morale.”

Read more in The Indian Express.

Why Wipro Is Returning to Its Roots with New CEO Srinivas Pallia | In the News

Wipro has a new CEO. Srinivas (Srini) Pallia was named chief executive and managing director with immediate effect on April 6, according to a press release from India’s fourth-biggest IT services company.

Pallia will replace Thierry Delaporte, ending Wipro’s four-year experiment with a foreign CEO. “It is very hard for a non-Indian to run a large Indian firm,” Peter Bendor-Samuel, CEO of Everest Group, says. And the macroeconomic conditions that he had no control over made Delaporte’s job that much harder.

Read more in Forbes India.

Exploring the Importance of Post-quantum Cryptography: An Unbreakable Vault to Protect Enterprises Against Advanced Cyberattacks, Part 2 | Blog

Post-quantum cryptography (PQC) has become essential for enterprises to protect against future quantum-enabled attacks and secure digital assets and sensitive data. Read on to discover providers’ crucial role in preparing enterprises for PQC. Reach out to explore this topic further.

As discussed in our previous blog, the emergence of quantum computing poses a significant threat to current public key cryptographic methods. When run on quantum computers – or more specifically, Cryptographically Relevant Quantum Computers (CRQCs) – some algorithms such as Shor’s can potentially break widely used methods like RSA, DSA, ECDSA, EdDSA, and DHKE, among others.

The advancement of quantum computers can seriously threaten data security and privacy for various enterprises, affecting fundamental principles such as confidentiality, integrity, and authentication. This makes it essential to reassess the security of these cryptographic methods.

The early and widespread use of quantum computers could wreak havoc, enabling new advanced cyberattacks that are impossible using classical computers. Post-quantum cryptography (PQC) is the solution to this problem. Let’s explore this further.

What is post-quantum cryptography?

In the quantum computing era, PQC is vital in ensuring the long-term security of digital communication and data protection. PQC focuses on researching and adopting cryptographic algorithms that are ready for this era.

These algorithms are designed to be secure against both quantum and classical computers. Furthermore, they are expected to be deployable and integrable without significant modifications to current protocols and networks.

With extensive ongoing research in this field, researchers have proposed several mathematical schemes that meet the requirements for being potential candidates for quantum-safe cryptographic algorithms. These include lattice-based, multivariate polynomial, code-based, hash-based, and isogeny-based cryptography.

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) launched a program in 2016 to create standardized quantum-safe cryptographic algorithms.

After a rigorous six-year evaluation involving global experts, it announced four finalists for quantum-safe cryptographic standards. The following algorithms selected by NIST address general encryption and digital signatures that are crucial for securing data exchanges and identity authentication:

PQC algorithm Cryptographic scheme Purpose
CRYSTALS-Kyber Lattice-based cryptography Key encapsulation method (KEM)
CRYSTALS-Dilithium Lattice-based cryptography Digital signature
FALCON Lattice-based cryptography Small digital signature
SPHINCS+ Hash-based cryptography Digital signature

Several other developments related to PQC have occurred recently. The notable ones are highlighted below:

Timeline final

Common cryptographic pitfalls

The complexity of cryptographic fields makes it difficult for enterprises to navigate data security. With numerous algorithms, protocols, and standards, enterprises often struggle to understand and implement robust cryptographic solutions.

Enterprises may encounter several common cryptographic pitfalls, including:

  • Lack of awareness about cryptographic algorithms used for data protection
  • Dependency on long-life data secured by cryptographic schemes not suitable for the quantum computing era
  • High costs and efforts required to update cryptography across systems and applications manually
  • Use of outdated cryptographic algorithms
  • Challenges in ensuring interoperability between different cryptographic systems and protocols, especially in hybrid IT environments
  • Limited resources, including security budget and expertise, hindering effective cryptography implementation and management
  • Risk of vulnerabilities and security breaches due to incorrect implementation of cryptographic protocols or algorithms

Enterprise considerations for embracing PQC

Considering the current challenges with cryptography, enterprises would face far more significant difficulties if they do not strategically plan for PQC. To prevent this, cybersecurity leaders globally must proactively prepare and initiate early plans to migrate to post-quantum cryptographic standards.

Taking a proactive stance is crucial since transitioning to new quantum-safe algorithms will be discontinuous, considering the inherent disparities in key size, error-handling properties, and other complexities.

Hence, enterprises should give themselves enough time to start small, experiment, learn from positive impacts and challenges, and explore ways to reduce technology transition costs.

Steps to establishing a quantum readiness roadmap

Staying abreast of advancements in quantum computing and quantum-safe solutions is paramount. Enterprises must establish a comprehensive quantum readiness roadmap following these five steps:

  • Inventory quantum-vulnerable systems: To kickstart readiness efforts, enterprises should conduct a thorough inventory of quantum-vulnerable systems across both information technology (IT) and operational technology (OT) environments, covering all cryptographic assets, including keys, certificates, protocols, libraries, and algorithms. Understanding cryptographic assets and algorithms, locations, and purposes is a fundamental best practice, especially when preparing for post-quantum cryptography. It is also crucial to identify where long-life data resides, comprehend data flows, and understand the types of cryptography used to protect it.
  • Conduct an internal risk assessment: This can help identify and prioritize assets most impacted by a quantum computer cryptographically, thus exposing the organization to greater risk. Chief Information Security Officers (CISOs) and Chief Revenue Officers (CROs) must ensure that quantum risk mitigation is integrated into existing risk management strategies.
  • Engage with technology vendors: Partner with supply chain providers to understand their quantum readiness roadmaps and migration strategies to facilitate a smooth transition that aligns with enterprise goals and timelines.

Streamline the current cryptographic infrastructure: Enterprises can initiate modernization efforts by streamlining their current cryptographic infrastructure, including consolidating or replacing vendors to enable a managed migration process. The CFO should collaborate with other executives to prioritize PQC investments based on the risk appetite and strategic objectives and adopt a fully crypto-agile approach. Establishing a governance structure with clearly defined roles and responsibilities to adopt PQC effectively is also recommended.

  • Adopt PQC algorithms: Enterprises eventually should integrate PQC algorithms into browsers, applications, public key infrastructure (PKI), files, and data systems, wherever quantum-vulnerable cryptography is employed. CIOs must collaborate closely with CISOs and other stakeholders to assess the compatibility of current systems with PQC solutions.

There is an ongoing debate over some adversaries already gathering encrypted foreign communications, anticipating the future ability of quantum computers to decrypt such systems, and aiming to extract valuable secrets from the data collected. This threat, known as “harvest now, decrypt later,” highlights the urgency of making cryptographic changes rather than waiting.

How can service providers help enterprises navigate the PQC era effectively and efficiently?

As quantum computing advances, the demand for comprehensive quantum-resistant cryptographic solutions will only increase, favoring a ripe market for cybersecurity service providers to capitalize on.

PQC offers a significant opportunity for providers to position themselves as vital partners in ensuring the security and resilience of enterprises’ digital assets against the evolving quantum computing threats.

Leaders may need help understanding the advanced mathematical concepts and algorithms involved in PQC. The complexity of these cryptographic methods may need to be clarified for enterprises trying to grasp the intricacies of quantum-resistant solutions.

With all the latest discussions about quantum computers, service providers should take this time to develop a perspective on how PQC would impact enterprises from various industry verticals.

Providers should play an educational role, creating awareness about the risks posed by quantum computing and guiding enterprises on the importance of proactively transitioning to quantum-resistant solutions.

Service providers should develop strategies to hire, train, and upskill talent in PQC and quantum computing concepts. Additionally, they can invest in R&D initiatives to explore new approaches and solutions in the PQC field. By collaborating with relevant technology vendors, research institutions, and other organizations paving the way for PQC, service providers can foster innovation and help their clients stay at the forefront of technological advancements.

Cybersecurity service providers can offer specialized consultation and assessment services to help enterprises evaluate and inventory their current cryptographic infrastructure, prioritize components based on risk, identify vulnerabilities to quantum attacks, and recommend appropriate post-quantum cryptographic solutions.

Moreover, they can engage with enterprises on initial levels to develop comprehensive strategies for implementing and managing these solutions effectively, ensuring seamless integration with existing security frameworks and compatibility with legacy systems.

Unlocking potential: Exploring use cases with PQC

Service providers should prioritize PQC to address the threat quantum computing poses to traditional cryptographic systems. By embracing PQC, service providers can safeguard their clients’ data and infrastructure against potential quantum attacks.

Additionally, they can explore new use cases for PQC to unlock innovative solutions and stay ahead of the curve in the rapidly evolving quantum landscape. These new use cases may include:

  • Quantum-safe communication (use cases for cloud computing, data centers, 5G networks, secure private communication links, )
  • Security in the banking sector, securing ATM and online credit card transactions, as well as customer data stored in bank data centers
  • Quantum-safe VPN and SD-WAN
  • Quantum-safe cybersecurity for automotive systems
  • PQC in Internet of Things (IoT) and Mobile Edge Computing (MEC) domains for protection of data transmitted between connected devices and central data processor/edge servers
  • Quantum-safe blockchain
  • Safeguarding the storage, transmission, and processing of sensitive patient data in healthcare (including that collected by biosensors in wearable devices)
  • Quantum-safe PKI for OT environments
  • PQC in Zero Trust Architecture (ZTA)

Envisioning the future

PQC is no longer a theoretical concept but a reality. Multiple applications of PQC have emerged. In their latest release, OpenSSL has fully enabled PQC for digital signatures and fundamental establishment mechanisms. The Signal Protocol, an essential constituent of Signal, Google RCS, and WhatsApp messengers, has also announced support for the PQXDH protocol, becoming the first to introduce PQC for the initial key establishment. Apple has introduced a fresh encryption protocol named PQ3 for iMessage, offering advanced post-quantum security measures for instant messaging.

PQC is rapidly gaining traction for quantum-safe digital signatures, encryption, and fundamental exchange mechanisms. Its widespread adoption seems inevitable as the risks of quantum supremacy proliferate.

The standardized algorithms aren’t battle-tested yet, and exploitable weaknesses could be uncovered, leading to adjustments in their functioning or the development of entirely new algorithms.

We anticipate PQC becoming the cornerstone of cybersecurity strategies in the coming years. Moreover, the security standards are expected to recommend or mandate PQC.

PQC has become a crucial element of enterprise security, safeguarding against quantum-enabled attacks and ensuring the integrity and confidentiality of sensitive data.

Enterprises must start planning to migrate from a secure lock to an unbreakable vault: post-quantum cryptography! Service providers play a crucial role in guiding and supporting enterprises every step of the way.

To discuss post-quantum cryptography further, please contact Prabhjyot Kaur, Kumar Avijit, and Ronak Doshi.

IT Services Set for Gradual Recovery in 2024, Says Everest Group | In the News

Everest Group’s latest Forces & Foresight research revealed that the IT services industry is on the brink of a gradual recovery in 2024 after enduring the impacts of the 2008 global financial crisis and the COVID-19 pandemic.

According to Everest Group Vice President Prashant Shukla, the path to recovery this time around is expected to be more measured — unlike the sharp rebounds observed after previous downturns — and influenced by a mix of stabilizing factors and emerging demand in specific sectors.

Read more in Outsource Accelerator.

Application Transformation Services PEAK Matrix® Assessment 2024 – Europe

Application Transformation Services – Europe

As customers’ needs evolve and businesses strive for greater efficiency, the importance of application transformation has substantially increased for enterprises. Enterprises are actively embracing transformation efforts to fully leverage emerging technologies and transition from outdated legacy systems. Amid ongoing macroeconomic uncertainty, European enterprises are prioritizing application transformation initiatives to unlock business value at every stage of their transformation. Furthermore, there is a persistent emphasis on sustainability, compliance, and regulatory adherence.

In response, service providers are enhancing their offerings through strategic partnerships with technology and platform providers and developing IPs to maximize RoI and gain enterprise confidence. Additionally, they are making substantial investments to expand their regional delivery centers in Europe to strengthen local service delivery and ensure better proximity to customers.

Application Transformation Services

What is in this PEAK Matrix® Report

 In this report, we examine the dynamics of the European application transformation service provider landscape and assess 26 application transformation service providers featured on Everest Group’s Application Transformation Services PEAK Matrix® – Europe. The study will enable buyers to choose the best-fit provider based on their sourcing considerations, while providers will be able to benchmark their performance against each other. 


Contents: 

In this report, we examine:

  • Everest Group’s services PEAK Matrix® evaluation of 26 application transformation service providers
  • The characteristics of Leaders, Major Contenders, and Aspirants in the provider landscape
  • Providers’ key strengths and limitations

Scope:

  • All industries
  • Geography: Europe
  • The assessment is based on Everest Group’s annual RFI process for the calendar year 2023, interactions with leading application transformation service providers, client reference checks, and an ongoing analysis of the application transformation services market

Related PEAK Matrix® Assessments

Sustainability Enablement Technology Services
PEAK Matrix®

Sustainability Enablement Technology Services PEAK Matrix® Assessment 2024

Lending IT Services
PEAK Matrix®

Lending IT Services PEAK Matrix® Assessment 2023

Digital Twin Services
PEAK Matrix®

Digital Twin Services PEAK Matrix® Assessment 2023

Manufacturing Services
PEAK Matrix®

Life Sciences Smart Manufacturing Services PEAK Matrix® Assessment 2023

Our Latest Thinking

Application Services Category Strategy-Definition and Characteristics
Market Insights™

Application Services Category Strategy: Definition and Characteristics

The Benefits of Performance and Security Engineering Across the Application Lifecycle
Market Insights™

The Benefits of Performance and Security Engineering Across the Application Lifecycle

Evolve the App Services Talent Model to Address the Demand-Supply Gap
Market Insights™

Evolve the App Services Talent Model to Address the Demand-Supply Gap

What is the PEAK Matrix®?

The PEAK Matrix® provides an objective, data-driven assessment of service and technology providers based on their overall capability and market impact across different global services markets, classifying them into three categories: Leaders, Major Contenders, and Aspirants.

LEARN MORE ABOUT Top Service Providers

How can we engage?

Please let us know how we can help you on your journey.

Contact Us

"*" indicates required fields

Please review our Privacy Notice and check the box below to consent to the use of Personal Data that you provide.