Gartner: CRM software top priority for IT spending in 2013-14
- 05 March, 2013 19:04
CRM (customer relationship management) software will be the top priority for additional spending on enterprise applications around the world this year and next, according to newly released data from analyst firm Gartner.
The category edged out ERP (enterprise resource planning), which took up the second-highest spot, with office suites coming in third, according to Gartner.
Organizations are most interested in increasing spending on CRM software now because they are "focused on customer retention/satisfaction and attracting new customers," Gartner said. "Mobile and social technology requirements are also driving CRM spending, with mobile devices forcing change even faster than social networks."
Salesforce.com, the industry's largest independent CRM vendor, recently began retooling its marketing approach around the theme of "customer companies," pushing new technologies meant to help its clients develop a more meaningful ongoing relationship with their customers, rather than merely track ongoing sales leads and run marketing campaigns.
Meanwhile, ERP took the top spot for planned IT spending in Eastern Europe and the Asia-Pacific region, driven by an increase in new users as well as the fact that ERP is closely associated with manufacturing, a key part of those areas' economies, Gartner said.
Users in areas with more mature IT environments, including Europe and the U.S., reported they expect either flat or lower IT budgets in 2014, while emerging markets are anticipating significant rises, according to Gartner.
Some 60 percent of North American respondents said they would increase spending on public cloud services and SaaS (software as a service) over the next couple of years, while other regions expressed more preference for single-tenant hosting.
Gartner surveyed 1,523 people in 13 countries, including Australia, Brazil, China, Colombia, Germany, India, Indonesia, Mexico, Russia, Singapore, South Korea, the UK and the U.S. Organizations had at least 500 employees and covered a wide variety of industries, excluding government entities.
Chris Kanaracus covers enterprise software and general technology breaking news for The IDG News Service. Chris' email address is Chris_Kanaracus@idg.com
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- HTC unveils new Butterfly s phone that packs more battery life
- Google Glass apps for enterprises coming by early 2014
- iPad 5 rumour rollup for the week ending June 18
- Say 'cheese', Earthlings! Spacecraft to snap home planet pic from deep space
- Social media adds spice to financial services, say banks
Solving the skills conundrum – part 1
Samsung Galaxy S4 vs. HTC One: 5 Reasons to Choose the GS4
High school students still see ICT as ‘sitting at a computer all day’: survey
Does encryption really shield you from government's prying eyes?
Solving the skills conundrum – part 1
McAfee Complete Endpoint Protection - Business
McAfee makes endpoint security painless for users and easy and efficient for IT. Built for strength, speed, and simplicity, McAfee Complete Endpoint Protection - Business suite helps growing organisations get Internet security right, from turnkey installation to rapid response. Find out more.
Agentless Security for Virtual Environments
Virtualised datacentres, desktops, and cloud computing should be secured by the same strong protection technologies as physical machines. However, traditional agent-based solutions that are not architected for virtualisation can result in a number of significant operational security issues. Find out more about the first agentless security platform solution.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.