New Gartner Magic Quadrant for data integration tools released
By: Informatica View more from Informatica >>
Download this next:
Infographic: 5 considerations before buying data center backup software
By: TechTarget ComputerWeekly.com
Type: eBook
Trying to cross-correlate how one vendor implements a product feature and comparing it to another vendor's features can be a daunting task. Backup and recovery software moves data through almost the entire data center infrastructure, so implementing it, training staff and obtaining support for it is no small feat. Download our exclusive infographic and find out more about what to consider to ensure the organization has a viable, long-term data protection strategy.
These are also closely related to: "New Gartner Magic Quadrant for data integration tools released"
-
It Leaders Are Considering A New Support And Services Model
By: Rimini Street Oracle Database
Type: Research Content
Rimini Street's report reveals CIOs and CTOs' struggles with current IT support models. Surveying 608 IT leaders, it finds the vendor-based model ineffective, citing unaccountability, scant expertise, and poor support. Multiple providers mean higher costs and complexity.
Security is a pressing issue, with IT heads battling numerous vulnerabilities. Leaders seek a new model with integrated, high-quality support and expert guidance, with 61% of respondents favoring consolidating support services with one provider.
Access the full report to learn more and discover how to combat these challenges, as well as the criteria for choosing the right IT support partner.
-
Evaluate Gartner's latest augmented data quality vendor rankings
By: Informatica
Type: Gartner Magic Quadrant
Gartner's 2025 Magic Quadrant for Augmented Data Quality Solutions evaluates 12 vendors enhancing data quality with AI, ML, and metadata analytics. The report identifies four Leaders (Ataccama, Informatica, Qlik, DQLabs), four Challengers (Ab Initio, Experian, IBM, Precisely), one Visionary (DQLabs), and four Niche Players (Anomalo, CluedIn, Irion, SAS).
Key trends include:
• AI adoption for automating data quality
• Focus on data quality for AI
• Convergence with metadata, integration, and observability tools
• Support for unstructured dataOrganizations should evaluate these solutions based on specific needs. Read the full Magic Quadrant for insights into vendor strengths and cautions.
Find more content like what you just read:
-
Explore the latest trends in file and object storage platforms
By: Nutanix
Type: Gartner Research Report
This Gartner research report examines the evolving file and object storage market, highlighting key vendor capabilities like unified platforms, hybrid cloud support, and cyber resilience. Download the full report to understand the market landscape and evaluate leading vendors.
-
B2B marketing automation tools evolve with AI in Gartner comparison
By: Adobe
Type: Gartner Magic Quadrant
B2B Marketing Automation Platforms assist in capturing leads, engaging customers, and measuring performance. In Gartner's 2024 Magic Quadrant, Leaders are Adobe, Microsoft, Salesforce, Oracle, and Creatio. Vendors are adding AI to improve journey orchestration. Read the full Magic Quadrant to find the right platform for your marketing needs.
-
Market Guide for Cloud Management Tooling
By: Morpheus Data
Type: Analyst Report
Dive into this analyst report to explore the many domains within the cloud management tooling market, how vendors will create strategies and offerings to support hybrid and/or multi-cloud management, and the direction of this evolving market.
-
2024 Magic Quadrant for cloud application platforms
By: Red Hat
Type: Analyst Report
Gartner's Magic Quadrant for Cloud Application Platforms assesses vendors with managed runtime environments and app lifecycle management. The report identifies leaders, challengers, visionaries, and niche players in this growing market. Read the full report to learn key vendor strengths and cautions when choosing a cloud application platform.
-
Understanding the Realities of Vendor Loyalty in 2024
By: Informa TechTarget
Type: Webcast
To unravel the intricate tapestry of vendor loyalty, customer satisfaction and differentiation in 2024, tune into this webcast featuring two subject-matter experts from TechTarget.
-
Single-Vendor SASE market report & vendor comparison
By: Palo Alto Networks
Type: Gartner Research Report
This Gartner Research Report evaluates 9 leading single-vendor SASE offerings, examining vendor strengths, cautions, and market trends. Download this Gartner Magic Quadrant for Single-Vendor SASE to make an informed SASE selection for your organization.
-
Vendor Comparison: Supplier Value Management Platforms, Q3 2024
By: Coupa
Type: Forrester Research Report
This Forrester Wave™ evaluates the top supplier value management (SVM) platform providers. It highlights Leaders, Strong Performers, Contenders, and Challengers, and provides insights to help procurement professionals select the right SVM vendor. Read the full Forrester Research Report.
-
Why CISOs need a better approach to security than "good enough"
By: Exabeam
Type: White Paper
This white paper explains why CISOs should prioritize best-of-breed SIEM solutions over "good enough" enterprise platform security. Single-vendor approaches risk blind spots, single points of failure, and limited log ingestion—compromising security. Read to understand why specialized solutions offer superior threat detection and response.
-
Finding the Right CDP for Your Business
By:
Type: Replay
The CDP industry is evolving fast and the market is literally bursting with new entries. That's why now more than ever, understanding the different flavors and options of CDPs is critical to find one that fits your business needs. Join CMSWire, contributor Brian Carlson and Director of Product Strategy from Arm Treasure Data for a live, hour-long webinar to examine the attributes of CDPs, as well as where vendors are positioned to support particular industries and applications. They'll also share their insight into the many differences in the growing number of CDPs on the market and how and why vendor alignment matters. This webinar on-demand covers: The attributes of CDPs overall How CDPs are specializing for industries and applications CDP vendor and product capabilities Highlight data from the recently updated CDP Buyer's Guide
-
The Strategic Importance of Linux From Edge to Cloud
By: Wind River
Type: ESG Research Report
This research paper examines Linux's strategic role from edge to cloud, emphasizing its support for technologies like Kubernetes and AI. It details how organizations can enhance Linux for security, performance, and innovation in various settings. Read the full paper to discover how Linux can propel your business success.
-
2024 market report & vendor comparison for SIEM
By: Splunk
Type: Gartner Magic Quadrant
Splunk is proud to be named a leader for Security Information and Event Management (SIEM). This report defines SIEM as a configurable security system of record that aggregates and analyzes security event data from on-premises and cloud environments. Read this report to learn more.
-
Leveraging Gartner's document management market analysis for 2024
By: AWS
Type: Gartner Magic Quadrant
Gartner's Magic Quadrant for Document Management evaluates vendors for content-centric activities in digital workplaces, collaboration, and operations. It highlights leading solutions for managing unstructured information and key trends in AI, deployment models, and user experiences. Read the full report for informed document management decisions.
-
Infographic: Comparing the leading SD-WAN vendors
By: TechTarget ComputerWeekly.com
Type: eGuide
This SD-WAN vendor comparison chart is a useful starting point to get information about SD-WAN deployment options, pricing, cloud connectivity options and more.
-
Five Ways HR Leaders Can Make the Most of Their Technology Investments
By:
Type: Talk
As HR leaders work to manage remote work, they are increasingly investing in tech that enables them to do more. PwC has proof that HR tech is delivering, with particularly big benefits from the cloud. However, HR leaders can still do better to encourage tech adoption, choosing the right vendor and gaining leadership buy-in for cutting-edge tech. Summit attendees will learn how HR leaders can better encourage tech adoptions and how tech can enable your HR functions to achieve its full value. In this talk, Dan will explore the notions of tracking employees' productivity and performance and how likely organizations are to switch HR technology vendors at the end of subscription terms. The themes covered will stem from PwC's recent HR Technology survey findings, which we fielded to understand trends in HR tech and transformation, surveying US HR professionals such as middle managers and above, working in HR or in an IT department supporting HR.
-
See where your SIEM solution ranks in the latest analyst assessment
By: Google Cloud
Type: Analyst Report
The IDC MarketScape Worldwide SIEM for Enterprise 2024 Vendor Assessment evaluates security providers in an evolving threat landscape. As security needs shift with expanding network perimeters, organizations require comprehensive visibility and protection. Read this report to see how leading SIEM solutions compare in today's security market.
-
Unpacking the Analyst Vendor Comparisons for Single-Vendor SASE and SSE
By: Netskope
Type: Webcast
Gain insights from former Gartner Analyst, Joe Skorupa and the Netskope leaders to unpack the Gartner Magic Quadrants for Single Vendor SASE and Security Service Edge. Join now to discover more.
-
Analyst report: Key trends in the SD-WAN market
By: Fortinet, Inc.
Type: Gartner Magic Quadrant
This Gartner Magic Quadrant report examines the software-defined wide-area network (SD-WAN) market, which has matured but still shows vendor differentiation. Read the full report now to identify the SD-WAN vendors best aligned with your branch connectivity and security needs.
-
Privileged Access Management
By: One Identity
Type: Analyst Report
Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
-
Free EDI RFP template to cover all your bases
By: Corsica Technologies
Type: Buyer's Guide
Streamline your EDI procurement process with this free RFP template. Cover all your requirements, from trading partner details to billing models, to find the right EDI solution and services partner. Download the template to get started.
-
Simplify Your Workflows with Vendor Consolidation
By:
Type: Talk
Product suites or point solutions? It’s an age-old question for IT leaders - and with so many options available on the market, it can be difficult to decipher what works best for your organisation. Do you really need specific, standalone solutions, or are you better suited to a single, trusted vendor, who provides overall value? One thing is certain, vendor consolidation means one login, simplification of the admin experience, a one stop shop for product support, and a single bill to pay. When you consolidate your vendors, costs are consolidated too. Ultimately, what it comes down to is trust. Trust is the single most important factor to consider, and the prime benefit of vendor consolidation is that it means only one relationship to build, and only one technology partner to trust. Join us in this session as we discuss: - The benefits of vendor consolidation - Choosing the right solution for your business - Creating an IT provider checklist - what should you be looking for? - How to simplify your workflows - And much more!
-
Application security testing: Peer reviews and ratings of top offerings
By: Contrast Security
Type: Gartner Research Report
This Gartner Peer Insights report provides insights on application security testing tools based on user reviews. Explore vendor ratings, willingness to recommend, and segment views to inform your buying decision. Read the full report for a comprehensive voice of the customer perspective.
-
AST market entering 2025: Customer perspectives of top vendors
By: Contrast Security
Type: Gartner Magic Quadrant
This Gartner Peer Insights report provides insights on application security testing tools based on user reviews. Explore vendor ratings, willingness to recommend, and segment views to inform your buying decision. Read the full report for a comprehensive voice of the customer perspective.
-
The CISO's Role in Technology Decisions
By:
Type: Replay
Every security leader runs into this challenge at multiple points in their career. How can you support your team and their technology needs, while ensuring alignment with the business and not overreaching to make vendor selections? This issue can easily put security leaders at odds with their teams charged with engineering and operating the technology that manages risk and enables the protection of company data and systems. Join Rapid7’s Scott King for an interactive webcast where he will share his personal experiences as the security leader for one of America’s largest energy companies and how he navigated these potentially treacherous waters.
-
Key considerations for modernizing your mainframe
By: LzLabs
Type: Research Content
A recent ISG survey sought to explore the state of mainframe modernization and cloud migration. This report reveals challenges like skills gaps, cultural resistance, and complexity, as well as best practices for a successful mainframe exit strategy. Access the full research content now to learn more.
-
Private/hybrid cloud: Analyst reviews top platforms & differentiators
By: Morpheus Data
Type: Analyst Report
The report analyzes the evolving private/hybrid cloud management and resiliency platform markets, highlighting key trends like AI/ML integration and cloud cost optimization. It provides insights into leading vendors and their capabilities to help enterprises make informed decisions. Read the full report to learn more.
-
Single Vendor SASE: Current Trends Driving Vendor Consolidation
By:
Type: Video
Gartner’s recent extended detection and response (XDR) and SASE trends survey data indicates a clear customer preference to consolidate their security vendors, with 92% of enterprises actively pursuing a vendor consolidation strategy this year. Supporting this trend is the reality that, in today’s uncertain macroeconomic conditions, consolidating security vendors can reduce both risk and costs to your business. In this episode of #TheSASEShow, we identify key questions to ask when evaluating Single-Vendor SASE providers and analyze the practical guidance around consolidating networking and security in the Gartner® Market Guide for Single-Vendor SASE report. Download the Market Guide for Single-Vendor SASE: https://bit.ly/3U1OF22
-
Single Vendor SASE: Current Trends Driving Vendor Consolidation
By:
Type: Replay
Gartner’s recent extended detection and response (XDR) and SASE trends survey data indicates a clear customer preference to consolidate their security vendors, with 92% of enterprises actively pursuing a vendor consolidation strategy this year. Supporting this trend is the reality that, in today’s uncertain macroeconomic conditions, consolidating security vendors can reduce both risk and costs to your business. In this episode of #TheSASEShow, we identify key questions to ask when evaluating Single-Vendor SASE providers and analyze the practical guidance around consolidating networking and security in the Gartner® Market Guide for Single-Vendor SASE report. Download the Market Guide for Single-Vendor SASE: https://bit.ly/3U1OF22
-
Key Digital Experience Analytics trends shaping the market.
By:
Type: Video
An exclusive look into the latest findings, trends and key considerations in the Digital Experience Analytics (DXA) space for 2024. Including a discussion on why Quantum Metric was named a strategic leader in their 2024 Vendor Selection Matrix™ and what it means for your business.
-
From Legacy DAG Solutions to Modern DSPM Tools: How to Select the Right DSPM Vendor
By:
Type: Talk
Join us for a focused 45-minute webinar as we delve into the transition from legacy Data Access Governance (DAG) solutions to modern Data Security Posture Management (DSPM) tools. Many organizations are finding their current DAG solutions no longer meet the evolving demands of today's complex data environments and stringent regulatory requirements. In this session, we'll explore the pain points associated with legacy systems and guide you through the critical factors for selecting a DSPM vendor that truly aligns with your organization's security needs. We'll cover the latest trends in the DSPM landscape, highlight the key features and capabilities to seek out, and provide actionable insights for evaluating vendors. Whether you're replacing an outdated system or implementing a DSPM solution for the first time, this webinar will empower you to make a strategic choice that supports both your immediate and long-term data security goals.
-
How to Utilize Security Ratings in Third-Party Risk Management
By:
Type: Talk
In an interconnected, ever- changing digital world, how well your data is secured across your supply chain is a matter of great importance. Failing to adequately screen vendor security risks can lead to data breaches, which can shut down operations, damage customer trust, and incur hefty regulatory penalties. Security ratings can help you grade your security performance, as well as that of your third- party vendors, by analyzing how well information is protected from external threats and breaches. Attend this webinar to learn how to use security ratings in TPRM, including how to: - Grade your security performance and understand risk across your supply chain, including your vendors and business partners, - Add context to your inherent risk tiers and gain visibility into the health of your vendor ecosystem, - Increase accuracy across vendor risk assessments and continuous monitoring processes, Speed up response and remediation efforts with real- time alerts on cybersecurity findings.
-
Shine Light on Blind Spots in your Third Party Risk Postures
By:
Type: Talk
Your third-party vendors are great at what they do. That’s why you hired them; you didn’t hire them for their stellar cybersecurity. But that is why you can’t ignore cyber risk among your third parties. SecureLink reports 65% of organizations have not identified the third parties with access to the most sensitive data of the organization. From your software vendors to air conditioning repair, who has access to your data or networks may surprise you. Gaining insight into where your data is exposed along its journey gives your company the power to protect it anywhere along its journey. There are several tools for protecting yourself and your third parties. During this webinar Nate Alden, will share three easy steps to gain visibility into third party risk postures. From vendor security ratings, vendor access control, and digital risk protection tools. During this webinar you will learn: How to conduct third party risk assessments How to minimize and control vendor access How external risk protection tools give you advanced warning of data leaks, credential exposure, and finds unsecured assets.
-
Shine Light on Blind Spots in your Third-party Risk Postures
By:
Type: Replay
Your third-party vendors are great at what they do. That’s why you hired them; you didn’t hire them for their stellar cybersecurity. But that is why you can’t ignore cyber risk among your third parties. SecureLink reports 65% of organizations have not identified the third parties with access to the most sensitive data of the organization. From your software vendors to air conditioning repair, who has access to your data or networks may surprise you. Gaining insight into where your data is exposed along its journey gives your company the power to protect it anywhere along its journey. There are several tools for protecting yourself and your third parties. During this webinar Nate Alden, will share three easy steps to gain visibility into third party risk postures. From vendor security ratings, vendor access control, and digital risk protection tools. During this webinar you will learn: How to conduct third party risk assessments How to minimize and control vendor access How external risk protection tools give you advanced warning of data leaks, credential exposure, and finds unsecured assets.
-
Shine Light on Blind Spots in your Third Party Risk Posture
By:
Type: Replay
Your third-party vendors are great at what they do. That’s why you hired them; you didn’t hire them for their stellar cybersecurity. But that is why you can’t ignore cyber risk among your third parties. SecureLink reports 65% of organizations have not identified the third parties with access to the most sensitive data of the organization. From your software vendors to air conditioning repair, who has access to your data or networks may surprise you. Gaining insight into where your data is exposed along its journey gives your company the power to protect it anywhere along its journey. There are several tools for protecting yourself and your third parties. During this webinar Nate Alden, will share three easy steps to gain visibility into third party risk postures. From vendor security ratings, vendor access control, and digital risk protection tools. During this webinar you will learn: How to conduct third party risk assessments How to minimize and control vendor access How external risk protection tools give you advanced warning of data leaks, credential exposure, and finds unsecured assets.
-
Which sales & marketing strategies are winning for cloud vendors?
By:
Type: Video
If anything, 2020 was a big year for Cloud vendors. But how did the cloud proposition evolve in 2020 and what do enterprises care about going into 2021? Watch this 30-minute discussion with special guest Paul Wooding, Senior Sales Leader at Cloudera to find out.
-
5 Must-Have Metrics for Executing an Optimal Mainframe CBP Negotiation
By:
Type: Replay
It’s no secret that Z Shops are facing a rapid decline of in-house technology expertise, but what may not be so obvious is the impact this has on sourcing and vendor management leaders. Without a mainframe team either taking the lead or providing important requirements to procurement to optimally negotiate consumption-based pricing (CBP) models, many organizations are finding themselves with substantial cost and financial risk. Rocket Software gets it. With growing interest and adoption of Tailored Fit Pricing (TFP) and the trends of some mainframe software and outsourcing vendors introducing alternative licensing models, vendor management leaders need a simple, easy way to gather key metrics to negotiate with understanding - from a position of power. Watch Mark Perillo, as he walks through five metrics that are critical to have BEFORE entering into mainframe software and services contract negotiations.
-
5 Must-Have Metrics for Executing an Optimal Mainframe CBP Negotiation
By:
Type: Replay
It’s no secret that Z Shops are facing a rapid decline of in-house technology expertise, but what may not be so obvious is the impact this has on sourcing and vendor management leaders. Without a mainframe team either taking the lead or providing important requirements to procurement to optimally negotiate consumption-based pricing (CBP) models, many organizations are finding themselves with substantial cost and financial risk. Rocket Software gets it. With growing interest and adoption of Tailored Fit Pricing (TFP) and the trends of some mainframe software and outsourcing vendors introducing alternative licensing models, vendor management leaders need a simple, easy way to gather key metrics to negotiate with understanding - from a position of power. Watch Mark Perillo, as he walks through five metrics that are critical to have BEFORE entering into mainframe software and services contract negotiations.
-
5 Must-Have Metrics for Executing an Optimal Mainframe CBP Negotiation
By:
Type: Replay
It’s no secret that Z Shops are facing a rapid decline of in-house technology expertise, but what may not be so obvious is the impact this has on sourcing and vendor management leaders. Without a mainframe team either taking the lead or providing important requirements to procurement to optimally negotiate consumption-based pricing (CBP) models, many organizations are finding themselves with substantial cost and financial risk. Rocket Software gets it. With growing interest and adoption of Tailored Fit Pricing (TFP) and the trends of some mainframe software and outsourcing vendors introducing alternative licensing models, vendor management leaders need a simple, easy way to gather key metrics to negotiate with understanding - from a position of power. Watch Mark Perillo, as he walks through five metrics that are critical to have BEFORE entering into mainframe software and services contract negotiations.
-
5 Must-Have Metrics for Executing an Optimal Mainframe CBP Negotiation
By:
Type: Replay
It’s no secret that Z Shops are facing a rapid decline of in-house technology expertise, but what may not be so obvious is the impact this has on sourcing and vendor management leaders. Without a mainframe team either taking the lead or providing important requirements to procurement to optimally negotiate consumption-based pricing (CBP) models, many organizations are finding themselves with substantial cost and financial risk. Rocket Software gets it. With growing interest and adoption of Tailored Fit Pricing (TFP) and the trends of some mainframe software and outsourcing vendors introducing alternative licensing models, vendor management leaders need a simple, easy way to gather key metrics to negotiate with understanding - from a position of power. Watch Mark Perillo, as he walks through five metrics that are critical to have BEFORE entering into mainframe software and services contract negotiations.
-
5 Must-Have Metrics for Executing an Optimal Mainframe CBP Negotiation
By:
Type: Replay
It’s no secret that Z Shops are facing a rapid decline of in-house technology expertise, but what may not be so obvious is the impact this has on sourcing and vendor management leaders. Without a mainframe team either taking the lead or providing important requirements to procurement to optimally negotiate consumption-based pricing (CBP) models, many organizations are finding themselves with substantial cost and financial risk. Rocket Software gets it. With growing interest and adoption of Tailored Fit Pricing (TFP) and the trends of some mainframe software and outsourcing vendors introducing alternative licensing models, vendor management leaders need a simple, easy way to gather key metrics to negotiate with understanding - from a position of power. Watch Mark Perillo, as he walks through five metrics that are critical to have BEFORE entering into mainframe software and services contract negotiations.
-
5 Must-Have Metrics for Executing an Optimal Mainframe CBP Negotiation
By:
Type: Replay
It’s no secret that Z Shops are facing a rapid decline of in-house technology expertise, but what may not be so obvious is the impact this has on sourcing and vendor management leaders. Without a mainframe team either taking the lead or providing important requirements to procurement to optimally negotiate consumption-based pricing (CBP) models, many organizations are finding themselves with substantial cost and financial risk. Rocket Software gets it. With growing interest and adoption of Tailored Fit Pricing (TFP) and the trends of some mainframe software and outsourcing vendors introducing alternative licensing models, vendor management leaders need a simple, easy way to gather key metrics to negotiate with understanding - from a position of power. Watch Mark Perillo, as he walks through five metrics that are critical to have BEFORE entering into mainframe software and services contract negotiations.
-
Discover the evolving distributed hybrid infrastructure market
By: Nutanix
Type: Gartner Research Report
Gartner analyzes the distributed hybrid infrastructure market, highlighting key vendors and their capabilities. Learn how to evaluate solutions that deliver cloud-native attributes across on-premises, public cloud, and edge environments. Read the full Gartner Research Report.
-
Episode 5: Foundations Support
By:
Type: Video
Season 1: Migration to the Cloud. Episode 5 No one can do this alone. AWS Partners have helped thousands of ISVs (Independent Software Vendors) just like you evolve into the cloud. In this episode, we reveal how you can find the support you need, fast, as well as exploring support plans that continue to offer you guidance as you scale. Duration: 10mins
-
2020 Media Consumption Series - When
By: TechTarget ComputerWeekly.com
Type: eGuide
In this inforgraphic, we show the results of our 2020 Media Consumption Survey. Find out what to do when IT buyer's are ready to talk to vendors, and how to prepare for the first meeting.
-
Microsoft Enterprise Support / Unified Support
By: US Cloud
Type: Buyer's Guide
This Microsoft support vendor evaluation checklist covers key criteria for assessing providers, including technical support, service levels, proactive resources, and cost savings. Read the full checklist to ensure you select the right Microsoft support partner for your organization.
-
6 Reasons Why Businesses Adopt UCaaS
By: Vodafone
Type: White Paper
To unlock a 14-page leader’s guide to unified communications as a service (UCaaS), tap into this white paper.
-
Insights from Forrester's latest attack surface management report
By: Palo Alto Networks
Type: Forrester Research Report
Forrester Wave evaluates 11 leading attack surface management (ASM) providers, highlighting their strengths and weaknesses. Discover how vendors like CrowdStrike, Palo Alto Networks, and Trend Micro stack up in this comprehensive report.
-
There's more to third-party patching than SCCM 1806
By:
Type: Video
Given the new Third-Party Updates feature in Microsoft SCCM 1806, our Ivanti security experts are excited to share with you how Ivanti Patch for SCCM will continue to enhance your SCCM solution. With our plug-in, you can more easily patch third-party apps from the SCCM console with no additional infrastructure or training. For example: -SCCM 1806 requires that you subscribe to each catalog from each vendor. If there are any issues, you must go back to that vendor for support. Patch for SCCM consolidates all supported vendors and gives you one point of contact for automated patching information. -SCCM 1806 has a limited number of vendor catalogs, and each vendor must create its catalog specifically for 1806. Patch for SCCM makes available catalogs from a large number of vendors, and Ivanti adds additional vendors to address customer feedback and market demand. Our new Patch for SCCM release, due out this month, can read in vulnerability scan results from any vendor, view the identified Common Vulnerabilities and Exposures (CVEs) and associated patches, and publish any missing patches to the update server for deployment.