This IDC study uses the IDC TechScape model to provide an assessment of both industry-specific and industry-agnostic technology adoptions supporting the payer market. It includes an evaluation model based on a comprehensive framework and a set of parameters that assess a technology's adoption progress relative to one another and to those factors expected to be the most conducive to success in a given market over both the short term and long term. By dividing technologies into three major adoption categories — transformational, incremental, and opportunistic — the IDC TechScape aspires to provide IT buyers with an industry snapshot as to where specific technologies lie.
"Payers in 2016 will use a combination of industry-agnostic, industry-specific workflow and cloud software. Payers will attempt to squeeze incremental productivity while breaking through with transformative technology to stay afloat and competitive in the new normal of health insurance," states Jeff Rivkin, research director of Payer IT Strategies at IDC Health Insights.
Cognizant Technology Solutions Corporation, Salesforce.com, Inc., TIBCO Software Inc., ClearData Communications Inc, SugarCRM Inc., ViaWest, Inc., McKesson Corporation, Google Inc., Benefitfocus, Inc., HIGHROADS INC, HP Inc., Amazon.com, Inc., Aldera Holdings, Inc., HEALTHEDGE SOFTWARE, INC., Casenet, LLC, ALTRUISTA HEALTH, INC., Cloudera, Inc., ZeOmega Inc., Microsoft Corporation, DST Health Solutions, Inc., Oracle Corporation, MDLIVE, INC., Dell Inc., Hitachi, Ltd., General Electric Company, LinkedHealth Solutions, LLC., Teladoc, Inc., Armor Defense Inc., American Well Corporation, Healthaxis Group, LLC, Logicworks Corp., IBM, Appian Corp., PLEXIS Healthcare Systems, Inc., eHealth, Inc., JBOSS DEUTSCHLAND GMBH, Pegasystems Inc., ikaSystems Corporation, ExlService Holdings, Inc., Bluelock, LLC
Analytic applications, Big data analytics and discovery, Customer relationship management applications, Encryption toolkits, Endpoint security, IT operations and implementation, Identity and access management, Information protection and control, Infrastructure and platform clouds, Messaging security, Mobile security, Network security, Security management, Software as a service, Technology buyer