Critical Capabilities for the Enterprise with New Data Introduction - Cover Page - Overview
Total Page:16
File Type:pdf, Size:1020Kb
Critical Capabilities for the Enterprise with New Data Introduction - Cover page - Overview Critical Capabilities for Deploying Enterprise Analytics and Mobility Applications Report generated on October 2, 2017 This information represents the opinions of MicroStrategy based on its assessment of the products listed. 1 / 167 Critical Capabilities for the Enterprise with New Data Introduction - Why MicroStrategy - Overview Why MicroStrategy Technical Critical Critical Capability Tableau Qlik IBM SAP MSFT Oracle MSTR Solution Capability Description Why MicroStrategy Score Sense Cognos BO PowerBI Score Score Score Score Score Score Enterprise Object An object-oriented MicroStrategy offers a centralized metadata repository that is built with and Platform Oriented architecture catalogs contains objects, as defined by developers, and can be reused across the Reusability every aspect of the BI project. Objects can be combined to create higher level objects (e.g., business. Data assets, attributes and metrics make up a report; reports, filters, and prompts make KPIs, dimensions, up a document; documents, and other reports can be embedded into a users, reports, and document - all of which are stored as "metadata objects"), and this dashboards are all together delivers a single BI project or a data model. stored in a central • The reusable model enables objects across the BI deployment to be location as unique securely reused hundreds of times by users across the enterprise, without logical objects to any duplication of effort. support reusability. • The model not only includes dimensions and metrics, but also covers filters, reports, prompts, custom groups, reports, dashboards, and documents - making it possible to flexibly reuse all of these objects multiple times across any application and BI project. • Changes or modifications made to any object in the metadata automatically proliferates to all other dependent objects. This eliminates the need to manually update the changes across the deployment, which is particularly helpful for larger BI projects. • The reusable model helps ensure faster development times, increased platform scalability, efficient management, and also maintains a single version of the truth. Data Unique definitions to The MicroStrategy metadata model makes it possible for anyone with the Governance every dimension and right privileges to promote new and external content to the Server and tie it metric bound together to a certified data model, all with easy workflows. by strict rules that are • It is possible to map the metadata at the dimension level, as well as the defined by a logical cube level, giving users the flexibility to control the data that is published to model, thus ensuring a the model. single version of the • The platform supports governance for data from disparate sources, even truth external non-certified sources, that helps build a system of record that users can trust--while also delivering flexibility to end users. • Beyond the ability to govern external data sources, the platform offers granular security features that allow project owners and data stewards to grant permissions and privileges to the right people. This delivers data security and also personalizes reports and dashboards to end users. • Workflows available with the MicroStrategy platform to promote external data into the system of record, combined with the flexibility of the system to deliver self-service access to business teams will increase the overall adoption of the BI platform. User Security Roles and privileges The security model within the MicroStrategy platform is built around users that assign restrictions and user groups, which are represented as logical metadata objects. This to users and groups ensures that data is secured at the most granular levels. ensure that end users • Security filters based on dimension values help ensure that users are only see personalized restricted to only see data that is relevant to them. This eliminates the and relevant content need to build multiple copies of the same application, and makes it and are only able to possible to optimally scale. perform authorized • With MicroStrategy's tools, administrators can apply Access Control Lists actions. (ACLs) to large user groups, restricting the range of data objects they can access or actions they can perform, and specifying the scope of their privileges in the environment. • With Usher, it is possible to provide secure digital authentication options, including geo-fencing and time-fencing capabilities, making it possible to restrict user access based on location and time. Scalability Deliver analytics to MicroStrategy is optimized in its design for enterprise scale and speed; as everyone across the such, the platform can support the analytical reporting needs of 100s of enterprise, and beyond. thousands of users across the enterprise. Allow 1000s of users to • The platform can be clustered with up to 8 nodes with work- and user- 2 / 167 Critical Capabilities for the Enterprise with New Data Introduction - Why MicroStrategy - Why MicroStrategy Technical Critical Critical Capability Tableau Qlik IBM SAP MSFT Oracle MSTR Solution Capability Description Why MicroStrategy Score Sense Cognos BO PowerBI Score Score Score Score Score Score Enterprise Object An object-oriented MicroStrategy offers a centralized metadata repository that is built with and Platform Oriented architecture catalogs contains objects, as defined by developers, and can be reused across the Reusability every aspect of the BI project. Objects can be combined to create higher level objects (e.g., business. Data assets, attributes and metrics make up a report; reports, filters, and prompts make KPIs, dimensions, up a document; documents, and other reports can be embedded into a users, reports, and document - all of which are stored as "metadata objects"), and this dashboards are all together delivers a single BI project or a data model. stored in a central • The reusable model enables objects across the BI deployment to be location as unique securely reused hundreds of times by users across the enterprise, without logical objects to any duplication of effort. support reusability. • The model not only includes dimensions and metrics, but also covers filters, reports, prompts, custom groups, reports, dashboards, and documents - making it possible to flexibly reuse all of these objects multiple times across any application and BI project. • Changes or modifications made to any object in the metadata automatically proliferates to all other dependent objects. This eliminates the need to manually update the changes across the deployment, which is particularly helpful for larger BI projects. • The reusable model helps ensure faster development times, increased platform scalability, efficient management, and also maintains a single version of the truth. Data Unique definitions to The MicroStrategy metadata model makes it possible for anyone with the Governance every dimension and right privileges to promote new and external content to the Server and tie it metric bound together to a certified data model, all with easy workflows. by strict rules that are • It is possible to map the metadata at the dimension level, as well as the defined by a logical cube level, giving users the flexibility to control the data that is published to model, thus ensuring a the model. single version of the • The platform supports governance for data from disparate sources, even truth external non-certified sources, that helps build a system of record that users can trust--while also delivering flexibility to end users. • Beyond the ability to govern external data sources, the platform offers granular security features that allow project owners and data stewards to grant permissions and privileges to the right people. This delivers data security and also personalizes reports and dashboards to end users. • Workflows available with the MicroStrategy platform to promote external data into the system of record, combined with the flexibility of the system to deliver self-service access to business teams will increase the overall adoption of the BI platform. User Security Roles and privileges The security model within the MicroStrategy platform is built around users that assign restrictions and user groups, which are represented as logical metadata objects. This to users and groups ensures that data is secured at the most granular levels. ensure that end users • Security filters based on dimension values help ensure that users are only see personalized restricted to only see data that is relevant to them. This eliminates the and relevant content need to build multiple copies of the same application, and makes it and are only able to possible to optimally scale. perform authorized • With MicroStrategy's tools, administrators can apply Access Control Lists actions. (ACLs) to large user groups, restricting the range of data objects they can access or actions they can perform, and specifying the scope of their privileges in the environment. • With Usher, it is possible to provide secure digital authentication options, including geo-fencing and time-fencing capabilities, making it possible to restrict user access based on location and time. 3 / 167 Critical Capabilities for the Enterprise with New Data Introduction - Why MicroStrategy - Why MicroStrategy Technical Critical Critical Capability Tableau Qlik IBM SAP MSFT Oracle MSTR Solution Capability Description Why MicroStrategy Score Sense Cognos BO PowerBI Score