Research Services

TechVision Research provides early perspectives on key technology trends to help our clients stay ahead of the most difficult technology challenges they’ll face. Our research agenda uncovers key technology inflection points and defines their impact on organizations.  

show more

Our current portfolio includes:

  • the changing shape of business data architecture
  • leveraging distributed ledgers, blockchain, and encryption technologies
  • the increasingly connected business, the Internet of things (IoT)
  • the complexity of context-based Identity
  • service virtualization and it’s impact on the IT organization,
  • the board-level impacts of privacy and security

We take these inflection points and apply rigorous analysis leveraging technical depth, pragmatic business, industry and analytical skills. We augment this with experiential data collected from our advisory engagements.

Unlike other research firms, TechVision makes specific recommendations, takes clear positions and offers specific advice. Our experience helps us to make the judgment calls our clients expect. We are dedicated to digging deep, discovering trends, technology choices and recommendations that others don’t see. It all starts with a world-class team of consulting analysts with deep experience and subject matter expertise. It is supported by analytic tools and proven best practices.

Core technologies we cover include:

  • Identity and access management
  • Security and risk management
  • Data architecture and data strategies
  • Privacy policies and regulation
  • Internet of Things
  • Semantic data interchange
  • Distributed ledgers (blockchain)

These issues are complex and cross IT and business unit boundaries, therefore everyone in the enterprise needs to have access to rich research and expert advice. It seems like an obvious concept but not one that our competitors follow. We provide annual subscriptions at an enterprise-level, so no more worrying about sorting out the have and have nots when it comes to availability of research. The simple truth is most enterprise-wide technology initiatives involve many people in many organizations and limiting access to research or other tools is suboptimal.

show less

Cloud-based Identity Management

Cloud-based Identity Management

Banking on Identity

Banking on Identity

Identity Governance Administration

Identity Governance Administration

Why Large Technical Projects Fail and How Yours Can Succeed

Why Large Technical Projects Fail and How Yours Can Succeed

Organizational Transformation is the Key to Digital Transformation

Organizational Transformation is the Key to Digital Transformation

Machine Learning and Artificial Intelligence on Big Data for Cybersecurity

Machine Learning and Artificial Intelligence on Big Data for Cybersecurity

The Rise of Machine Learning in the Enterprise:  Managing the Opportunities, Handling the Threats

The Rise of Machine Learning in the Enterprise: Managing the Opportunities, Handling the Threats

Emergence of CIAM

Emergence of CIAM

Enterprise Innovation Acceleration

Enterprise Innovation Acceleration

Blockchain Call-to-Action for Bankers

Blockchain Call-to-Action for Bankers

Enterprise Privacy Guidelines in a Changing Regulatory Environment

Enterprise Privacy Guidelines in a Changing Regulatory Environment

The Future of Information Sharing

The Future of Information Sharing

Blockchain Identity

Blockchain Identity

Privacy Beyond Compliance

Privacy Beyond Compliance

Why Large Technical Programs Fail

Why Large Technical Programs Fail

End of EA and IT as We Know IT

End of EA and IT as We Know IT

Fixing the Fundamentals – Data Asset Management

Fixing the Fundamentals – Data Asset Management

Fixing the Fundamentals – Data Strategy

Fixing the Fundamentals – Data Strategy

Context Based Identity Management

Context Based Identity Management

Unlocking the IoT Value to The Enterprise

Unlocking the IoT Value to The Enterprise

TechVision Crosstalk Report – Identity Management and Data

TechVision Crosstalk Report – Identity Management and Data

Blockchain Level Set

Blockchain Level Set

Internet of Things Reality Check

Internet of Things Reality Check

Enterprise Information Protection

Enterprise Information Protection

Data: The Fundamentals are Broken

Data: The Fundamentals are Broken

The Future of Identity Management

The Future of Identity Management

IoT as Security Risk Amplifier and Mitigation Strategies

IoT as Security Risk Amplifier and Mitigation Strategies

Fixing the Fundamentals – The Business Blueprint

Fixing the Fundamentals – The Business Blueprint

New European Privacy & Data Protection Regulations Compliance or Consequences

New European Privacy & Data Protection Regulations Compliance or Consequences

Opportunities in Europe with Electronic Identification and Trust Services

Opportunities in Europe with Electronic Identification and Trust Services

 

 

© 2017 All Rights Reserved

We can help

If you want to find out more detail, we're happy to help. Just give us your email so that we can start a conversation.

Thanks, we'll be in touch!