Verity Listed in Leader Quadrant in the 2003 Search Engine Magic Quadrant
'Ability to Execute' Evaluated in Annual IT Research Study
SUNNYVALE, Calif - 2003-04-28 - A just-released report from Gartner, Inc. (NYSE: IT), an independent research and advisory firm, lists Verity, Inc. (NASDAQ: VRTY), a leading provider of enterprise software that helps organizations maximize the return on their intellectual capital investment, in the leader quadrant in "Ability to Execute" in the Gartner 2003 Search Engine Magic Quadrant.
In this latest annual analysis of the search engine marketplace, Verity's ability to execute was evaluated. To determine the positions in the Magic Quadrant, Gartner used a set of criteria to measure a vendor's ability to serve an organization's search needs, including its financial strength, prior success in the enterprise arena, pricing flexibility and appeal, as well as service leverage.
"The challenging economic environment in which organizations in the private and public sectors are now operating means the capability to deliver measurable return-on-investment is critical. For that reason, we are especially pleased to be cited once again by Gartner in the ‘Leader' quadrant in its Search Engine Magic Quadrant," said Anthony J. Bettencourt, Verity's president and CEO. "This 2003 study shows that Verity has extended its ‘ability to execute' over last year, a powerful testimony to the company's commitment to provide intellectual capital management solutions that yield higher employee productivity and greater browser-to-buyer conversion rates for customers world-wide."
According to Gartner, "Leader" quadrant vendors serve an enterprise's needs today and can also anticipate future needs. A key requirement of this is that "Leaders" must also have the resources and viability to respond to those anticipated needs. The Magic Quadrant analysis places specific vendors within one of four segments: "Leaders," "Visionaries," "Challengers," or "Niche Players." The 2003 Search Engine Magic Quadrant evaluated 21 companies, including Verity.
About Verity
Headquartered in Sunnyvale, Calif., Verity provides software solutions that help organizations maximize the return on their intellectual capital investment by utilizing Verity's industry-leading enterprise search, classification and personalization technologies. Verity software is used for sharing information within and between enterprises; for facilitating e-commerce sales; and for B2B activities on Web-based market exchanges. In addition, Verity technology serves as a core component of many leading e-business applications.
Verity products are used by more than 3,500 organizations in the private and public sectors. Customers include Adobe Systems, AT&T, Bristol-Myers Squibb, Cisco, Cap Gemini Ernst & Young, Documentum, Dow Jones, EDGAR Online, Financial Times, H-P, Home Depot, Lotus, META Group, SAP, Siemens, Stellent, Sybase, Time New Media and Timex.
The Magic Quadrant is copyrighted April 2003 by Gartner Inc. and is reused with permission, which permission should not be deemed to be an endorsement of any company or product depicted in the quadrant. The Magic Quadrant is Gartner Inc.'s opinion and is an analytical representation of a marketplace at and for a specific time period. It measures vendors against Gartner defined criteria for a marketplace. The positioning of vendors within a Magic Quadrant is based on the complex interplay of many factors. Gartner does not advise enterprises to select only those firms in the "Leaders" quadrant. In some situations, firms in the Visionary, Challenger, or Niche Player quadrants may be the right matches for an enterprise's requirements. Well-informed vendor selection decisions should rely on more than a Magic Quadrant. Gartner research is intended to be one of many information sources including other published information and direct analyst interaction. Gartner Inc. expressly disclaims all warranties, express or implied, of fitness of this research for a particular purpose.
For more information, contact Verity at info@verity.com or at World Wide Web site http://www.verity.com or call 408-541-1500.
Verity and the Verity logo are registered trademarks or trademarks of Verity, Inc.
Summary: ...by client and matter number, which helped a lot,” says Bhagat. Already understanding the value of the matter-centric model, OF&P used this criterion for evaluating the available document management solutions. “We wanted a system that handled matter-centric the right way,” explains Bhagat. “The...
Summary: ...intranet. Oates says, “We’ve learned a great deal while working with Autonomy and we’re keen to start on the intranet. We will use TeamSite again for our intranet, so staff in regional offices will not need to learn another system which should help deliver further efficiencies.” About Autonomy...
Summary: ...involved in its management, while reducing risk by preventing access by anyone else,” says Beuque. Some third party fnancial institutions post documents to IntraLinks, a virtual data room platform. Again working with SPECTRA IT Associates, Clearwater Capital Partners now has relevant documents from...
Summary: ...Clearwater Capital Partners Maximizes Leverage of Global Information Assets with Autonomy - Case Study. Again working with SPECTRA IT Associates, Clearwater Capital Partners now has relevant documents from IntraLinks automatically downloaded and filed into WorkSite in a timely manner upon receipt of email...
Summary: ...GSA Advantage Case Study - Government Procurement Portal. Case Study GSA Advantage! is the premier online procurement source for U.S. government employees in North America, Europe and Asia. Called the “Mother of All Digital Marketplaces” by Forbes Magazine in 2000, GSA Advantage! sells everything...
Summary: ...larger law frm. “The newness of our frm meant that we weren’t tied down by legacy systems and practices, while our small size gave us ample IT agility. This meant we could start from scratch with the latest technologies and best practices,” says attorney Stephen P. Ellingson. As they worked to establish...
Summary: ...Osborne Clark Case Study. After thorough consideration, Osborne Clarke decided to put a business case together for the upgrade of the intranet, which now incorporates Microsoft SharePoint. This included a set of criteria based on what the people within the company needed and what features they wanted....
Summary: ...Moody's KMV Case Study. Case Study Industry Corporate Legal Challenges ■ Existing customer contracts were diffi cult to find, risking lost revenue and delaying the close of add-on business ■ Attorneys and internal clients couldn’t reliably access or collaborate on work in progress, especially from...
Summary: ...Every file inventoried via the Autonomy solution automatically has the right retention criteria applied to it, eliminating the need for manual calculations.” Retention, archive and disposal dates are updated on a dynamic basis, so if, for example, an inactive patient record becomes live again, the Autonomy...
Summary: ...20121001_RL_CS_HP_UKcabinet_web. However when choosing the system it was recognized that a number of criteria had to be met: • It should be approved against the National Archives (TNA) standards for Record Management Systems • It had to easily integrate with the Cabinet Office’s existing IT Infrastructure...
Summary: ...Wolf Block Case Study. Industries Legal Geography Northwest Challenges n Inability to easily store e-mailed documents alongside other electronic documents in a single matter file n Lack of true collaboration with clients around documents n Non-scalable DM systems hindered document search execution Benefts...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...engine allows non-technical users to define business logic without compromising its flexibility to support powerful rules and expressions for handling trade or time-based events. Authorized users can modify the business logic in a production system, establishing their own criteria for STP routing. Accountability...
Summary: ...The Scrittura workflow engine allows non-technical users to define business logic without compromising its flexibility to support powerful rules and expressions for handling trade or time-based events. Authorized users can modify the business logic in a production system, establishing their own criteria...
Summary: ...HR systems. Unique to Aungate Legal Hold is the ability to return a suggested set of custodians to be included in the legal hold process by automatically matching the criteria against the organization’s operational systems, while also continuously monitoring for changes or modifications that could affect...
Summary: ...data extraction requirements (i.e. European vs. U.S.) will vary as well. Validation - With Cardiff Intelligent Documents, in-process data is automatically validated against a number of critera, in real-time, prior to final commit to any and all line of business systems. This step in the processes is critical,...
Summary: ...Oracle, Sybase and TIBCO. The company has offices worldwide. Please visit www.autonomy.com to find out more. “The Top Player in the hosted archiving market, today, is Autonomy ZANTAZ ” —Hosted Email Archiving – Market Quadrant 2008, The Radicati Group, Inc. June 2008
...
Summary: ...present in any data, Command and Control allows security teams to understand the potential signifi cance of seemingly disparate pieces of intelligence and take preventative measures to protect against risk. Digital and Network Video Recording (DVR and NVR) Virage provides a full range of digital and network...
Summary: ...means the department responsible for managing the order of newly captured documents is able to select the documents and execute the storing for subsequent entry transaction within SAP. It also ensures that data can be reused at a later date with the ability to access them off-line or re-load them into...
Summary: ...and management. This way, an organization’s content can benefit from an Information Lifecycle Management (ILM) strategy that links content to its usage over time to optimize storage usage and cost. Gartner Group reports that “60% of companies are using records management, but only 22% of these are...
Summary: ...Autonomy Retina Overview. Natural language queries allow users to find results without having to be familiar with search algorithms or syntax Users can combine Boolean and Proximity operators to form simple or complex Boolean expressions Parametric search Users can search for items by certain field values....
Summary: ...Autonomy Consolidated Archive - Autonomy Product Brief. POWER PROMOTE PROTECT Highlights • Autonomy Consolidated Archive (ACA) is a proven, scalable archiving solution, managing over 31 PB of information. • Autonomy is the market leader with 24% share in the email archiving market, according to Gartner's...
Summary: ...business logic without compromising its flexibility to support powerful rules and expressions for handling trade or time-based events. Authorized users can modify the business logic in a production system, establishing their own criteria for STP routing. Accountability - Business-level exceptions can...
Summary: ...Expertise Assignment: users can combine a conceptual search for experts with location-based information such as geographic location, department and availability. • Virtual Libraries: not all the data within the organization’s information assets will play a significant role in key business decisions....
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...their own security plug-ins. “[Autonomy’s] vision and execution status is founded on sound financials, a strong and growing customer list, and a vigorous vision for the burgeoning role of information access.” Magic Quadrant for Information Access, Gartner 2006 Enterprise Search: Addressing Security...
Summary: ...4 Collette, Stacy, Five Steps to Evaluating Business Continuity Services, CSO Online, December 04, 2007. How to Categorize Endpoint Data Protection and Recovery Providers for Better Decision Making 5 Category 2: Niche Developers and Service Providers Service providers in this category tend to be smaller...
Summary: ...taxonomy generation, clustering, eduction, profiling, alerting and retrieval. 3 “The Truth About Computer Assisted Review”: Concept Clusters Workfow Example, Thomson ARMA CLE, June 26, 2012. 4 Gartner in Magic Quadrant for E-Discovery Software, 24 May 2012, also reports, “In 2011, increased emphasis...
Summary: ...using multiple interfaces against formidable competition – an ideal application for technological automation. Big Data, Big Problems Advertisers now have unprecedented analytical data on the performance of their advertising efforts. For each ad, advertisers can now measure:
...
Summary: ...inherent in keyword and phoneme matching approaches. Autonomy uniquely supports conceptual matching, so if the audio contained the phrase “University of Cambridge,” the search would include the term “Cambridge University.” Again, legacy phonetic search would fail in this scenario. Autonomy also...
Summary: ...IT infrastructure for custodian identification, including Active Directory and HR systems. Autonomy can return a suggested set of custodians to be included in the legal process after automatically matching the criteria against the organization’s operational systems.
...
Summary: ...that matters most to them. This will always be what comes first when organizing results. Metrics influence results When trying to measure something, the first step is to create a yardstick against which it can be evaluated. When doing this, items that score higher on that metric are privileged over others...
Summary: ...Legal Technology: Enhancing profitability through an economic crisis. S P E C I A L F O C U S S U P P L E M E N T In association with Enhancing profitability through an economic crisis LEGAL TECHNOLOGY: Editor Richard Brent rbrent@ark-group.com Head of editorial Kate Clifton kclifton@ark-group.com Production...
Summary: ...approach requires the responder to fit their opinions into the limiting construct of the survey questions and underlying database. If the actual opinion is not anticipated in the response options, you don’t get the complete story. The structured data is valuable, but because it’s inherently constrained,...
Summary: ...or receive casual e-mails that fall well outside necessary retention guidelines. The Opinion notes, however, that many lawyers retain emails and other electronic documents beyond those required under the ethics rules because their retention will serve as a “measure to protect against a malpractice claim.”...
Summary: ...of Integration 3 Security 4 Conclusion 5 About Autonomy 5 About HP 5 HP TRIM and Microsoft SharePoint 1 Executive Summary Government enterprises and especially defense agencies need to facilitate information sharing among many other agencies and external service providers in order to execute their responsibilities...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.