This list celebrates changemakers creating meaningful impact through leadership, innovation, fresh perspectives, transformative mindsets, and lessons that resonate far beyond the workplace.
Digital asset management (DAM) enables organizations to manage, catalog, deliver, analyze, orchestrate, and renew all forms of digital content across an ever-expanding array of channels. In the new age of digital-first experience, DAM must extend beyond traditional marketing and creative walls to serve the entirety of customer experience’s front lines—delivering assets to sales and customer service engagement and automation solutions.
Application Security Testing (AST) has become a critical control as software development accelerates and applications grow more complex, distributed, and automated. Modern development pipelines rely heavily on open-source components, APIs, cloud-native services, and increasingly, AI-assisted code generation. These shifts have expanded the attack surface and introduced new classes of vulnerabilities that require continuous and integrated security testing throughout the software development lifecycle.
Cloud-Native Application Protection Platforms (CNAPPs) have emerged as a unifying approach to securing modern, highly dynamic, distributed, and application-centric cloud environments. As organizations adopt containers, serverless architectures, and managed cloud services, traditional security tools struggle to provide consistent visibility and control. CNAPP addresses this challenge by bringing together cloud security posture management, workload protection, and identity-aware risk analysis into a more cohesive platform.
Cloud providers have been rapidly adding data center locations around the globe, making it easier for enterprises to meet statutory and regulatory data residency requirements. Recently, though, demand for sovereign cloud services has been on the rise, requiring data centers that are fully contained within the country and (ideally) operated only by nationals of the country where the data center is located.
Cloud providers have been rapidly adding data center locations around the globe, making it easier for enterprises to meet statutory and regulatory data residency requirements. Recently, though, demand for sovereign cloud services has been on the rise, requiring data centers that are fully contained within the country and (ideally) operated only by nationals of the country where the data center is located.
Endpoint Protection Platforms (EPPs) remain a foundational layer of enterprise cybersecurity, as endpoints remain primary targets for malware, ransomware, and identity-based attacks. Laptops, servers, and mobile devices operate across corporate networks, cloud environments, and remote locations, making consistent protection and visibility critical. While attack techniques continue to evolve, the endpoint remains one of the most effective entry points for adversaries.
Every enterprise wants and needs to build AI-powered Next-Generation Applications. For that, these enterprises need frameworks that make it easier for them to build these applications. Frameworks come from all kinds of vendors and need to do two key things: Be mastered quickly and deliver AI automation quickly. A large trained user base is always helpful.
Threshold Criteria
Constellation considers the following criteria for these solutions:
Contact center solutions have largely stayed the course in terms of functionality, enabling organizations to route, address, and resolve inbound customer interactions and engagements. Contact center as a service (CCaaS) shifted this critical frontline of customer experience (CX) to the cloud, with the promise of scalable infrastructure and a flexible toolset to modernize a contact center that has become more complex. But in the age of AI, experienced teams expect more: more engagement, more channels, more connections, and more cost savings to materially impact the bottom line.
Digital experience (DX) platforms are intended to develop, coordinate, manage, and optimize the volume and complexity of customer interactions across digital touchpoints. They provide a means of managing web, mobile, and digital content, can evaluate customer behaviors, predict customer journeys, and personalize and contextualize content and communications. Adding to the complexity of this loosely defined category is the ever-evolving toolset that increasingly includes generative and agentic AI capabilities to create, iterate and personalize digital engagement.
Microsegmentation has become a critical security control as enterprises adopt hybrid, multi-cloud, and application-centric architectures. Traditional perimeter-based defenses and coarse network segmentation are no longer sufficient to prevent lateral movement once attackers gain an initial foothold. Microsegmentation addresses this gap by enforcing granular, workload-level access controls that limit communication to only what is explicitly required.
Agents are how AI is delivered in the enterprise; there is a veritable competition among platform providers to be the agentic platform provider of choice. Most members of the shortlist are on V1. x of their offerings, with the expectation of rapid functional capability progression in 2026.
Threshold Criteria
Constellation considers the following criteria for these solutions:
Quantum computing is an approach to computing that uses quantum-mechanical phenomena such as entanglement and superposition. The goal is to apply a probabilistic model to solve problems more quickly. Quantum computing is such a radical new way of computing that it needs software to be rewritten to take advantage of the platform.
Privileged Access Management (PAM) has become a foundational security control as identity-driven attacks continue to rise across enterprise environments. Attackers increasingly target privileged credentials to bypass controls, move laterally, and gain persistent access to critical systems and data. The growing use of automation and AI by attackers further increases the speed and scale at which privileged access can be exploited once initial compromise occurs.
Quantum computing is an approach to computing that uses quantum-mechanical phenomena such as entanglement and superposition. The goal is to apply a probabilistic model to solve problems more quickly.
When CxOs choose platforms to build next-generation applications for their organizations, they can choose between packaged platform-as-a-service (PaaS) tool suites that provide separate, atomic offerings with separate versions, or PaaS suites that allow installation/product/service and offering bundles on a single version.
Infrastructure as a service (IaaS) is a key enabler for next-generation applications that inherently have indeterminate computing resource needs. IaaS vendors—with their elastic offerings of compute, storage, and networking—offer the only generally viable deployment option for next-generation applications. IaaS vendors are also driving the push ahead toward Infinite Computing platforms. For more, see here.
As enterprises face uncertainty about business best practices due to Infinite Computing, they need to build software in-house. They create next-generation applications, typically on cloud-based platforms, where, for the first time in computing history, they don’t have direct access to the physical infrastructure. These higher and better levels of validating and testing new software assets, as well, in short, the new software assets need to have the right quality, the quality needs to be assured (hence Quality Assurance, QA).
Security Information and Event Management (SIEM) remains a foundational capability for security operations, providing centralized collection, correlation, and analysis of security events across increasingly complex environments. As organizations adopt cloud services, SaaS applications, and identity-centric architectures, SIEM platforms play a critical role in helping security teams investigate incidents, understand attack paths, and maintain operational visibility.
The era of Infinite Computing has cast a spell over business best practices, creating uncertainty about what the best practices of the 21st century are. Architecturally unlimited compute and storage, coupled with cheap networking and the ubiquity of smartphones, create the realm for new strategies on how enterprises manage their value chains. The answer cannot be the best practices of the past, stemming from the finite computing era and being baked into today’s standard software.
This Constellation ShortList™ presents No Code/Low Code for SAP Systems offerings relevant to early adopters pursuing digital transformation. Offerings included in this document meet the threshold criteria for this category as determined by Constellation Research.
The Constellation ShortList presents vendors across market categories relevant to early adopters. In addition, products included in this document meet the threshold criteria for this category as determined by Constellation Research. This Constellation ShortList of vendors for a market category is compiled through conversations with early-adopter clients, independent analysis, and briefings with vendors and partners.
In ConstellationTV episode 124, CR analyst co-hosts Holger Mueller and Liz Miller deliver a dynamic mix of humor, insightful analysis, and actionable takeaways for anyone navigating the complex world of enterprise technology and SaaS markets. Whether you're an enterprise executive assessing software solutions, an IT strategist exploring AI frameworks, or simply curious about SaaS trends, this episode provides valuable perspectives.
Master data management (MDM) is both a technology and a methodology for linking, centralizing, and maintaining enterprise data to a singular point of reference. MDM programs typically include a methodology to support data governance and ensure data quality across the enterprise. This requires a common definition of terms and entities across an organization, as well as a consistent data quality approach for classifying, transforming, augmenting, mastering, securing, delivering, and refreshing enterprise data. Increasingly common is the support for multidomain models across multicloud architectures. As migrations to the cloud accelerate, it’s increasingly important to consider the availability of software-as-a-service options, cloud-native deployments, integrations, and partnerships.
This ShortList presents Constellation’s selection of hybrid and multicloud analytical data platforms delivered both as deployable software for on-premises and private-cloud environments and as managed database services across multiple public clouds. These deployment options enable enterprises to balance performance, cost, sovereignty, and resilience requirements while maintaining architectural consistency and avoiding vendor lock-in.