Posted tagged ‘iig’

Productivity and Trust, No Longer Mutually Exclusive

June 18, 2012

In the Post-PC era, organizations are increasing facing the pressure to choose between serving the needs of the user to be productive, versus IT’s need to ensure overall safety of information. Productivity and safety have fundamentally been at odds for a very long time.  However, if organizations are able to achieve the right balance of catering to the needs of the user and IT, great transformations occur.  These transformations occur not only in business and IT, but also in individuals to drive great outcomes.

Additionally, user work patterns and expectations are changing very dramatically.  Today’s user expects instant access to any information regardless of where they are, or which device they are using.  They also have little tolerance for poor user experiences.  They want to be able to share the information with others within and across firewalls.  Organizations are becoming artificial boundaries.

Lastly, it is far too expensive for IT to move content from different repositories into yet another centralized repository when a new way to work comes about via a technology innovation.  Instead, information is expected to have a distributed characteristic, but access patterns, governance, management and policy enforcement should evolve based on new work patterns.

The question we as a business community are faced with is whether we should accept the imperfect world where such an artificial choice is forced upon us, or reject the status quo of mutual exclusivity between two very significant necessities for a business to be successful.  When we look closer at the key defining traits important for productivity and safety in a trusted enterprise, a few aspects are amplified.  Let’s consider each of the two dimensions more carefully.

Productivity for the user typically considers aspects such as:

  1. Mobility:  Ensure users have freedom to choose their devices, and access the right information from anywhere, at any time on any device.
  2. Delighting The New User:   Deliver a user experience that is completely intuitive, frictionless, efficient and just works the way one would expect it to!
  3. Ensuring Collaboration and Transparency Across Boundaries:  Whether it be geographical boundaries, device boundaries, infrastructure boundaries or organizational boundaries, people should have the option of full transparency and engagement to get their job done in the most effective ways.
  4. Matching the Home Computing Experience in the Workplace:  The most common question that gets asked by users is why is it so much easier for them to get stuff done at home versus getting work done in the workplace.  This includes simple and rapid provisioning  of technology that is as effortless as using Facebook
  5. Policy Automation:  Conventional wisdom has taught us that security, governance, compliance, rights management, etc. are restrictions that hamper user experience.  However, if implemented correctly, user experience can be materially enhanced by effective implementation of policy (e.g. don’t allow a sales person to open an older version of the price sheet by implementing an information rights management)

On the other hand, a trusted enterprise worries about capabilities such as:

  1. Security:  It isn’t just who has access to what information, but also having access to the right information at the right location in the right context.
  2. Governance and Compliance:  It isn’t just keeping your organization secure, but also ensuring the right governance and compliance of the information regardless of where the information lives.  Policy must follow content rather than being tied to a physical repository.
  3. Control: Sensitive and business critical information should be owned by corporations, not individuals.  If a device is lost, information on that device must be controlled by the corporation.  If a user decides to pursue other career options they should not be able to walk away with company sensitive information.
  4. Manageability:  IT should be able to make it easier for provisioning users, accounts, and customer experiences.
  5. Rights Management:  When information is shared outside corporate boundaries, organizations sharing the information shouldn’t lose control over the information.  Furthermore, at any point in time, information shared with others outside the organization should have the ability to disable information based on a set of criteria.

As we move into the new world where the user has taken control while IT is required to `keep the organization safe, compliant and secure, a new breed of solutions will emerge.  These will be solutions that deliver superior user experiences while not ignoring the risk, safety, compliance and manageability aspects that IT so rightfully cares about.  This will be a race where many will claim that they cater to this duality of needs, but only a few will be able to deliver on this promise at scale to enterprises.  The challenge is harder than it sounds, but results are far greater than they seem on the surface.  This is truly the new era of the content and collaboration market.  Like any discontinuous innovation, the success of this will be over-estimated in the short-term but grossly under-estimated in the long term.  The intersection where productivity meets trust will truly be a sea change for the content and collaboration work patterns within the enterprise.  Finally, organizations won’t be forced to make a choice between two very important needs of a business – keep my users productive while keeping my organization safe.

Rules to Compete in the Enterprise Software Game

April 30, 2012

Guest Blogger: Rohit Ghai

Rohit Ghai, Head of Products, IIG Division

Are you worthy?

To play in the enterprise you must be worthy…. So it is with enterprise software as well. In addition to enterprise worthy support, enterprise worthy services one has to build enterprise worthy product in order to even be in the consideration set.

Before I get to the traits of enterprise software lets look at the typical traits of a corporation that we deem to be an “enterprise”:

  • Some things are really BIG. These organizations are giants – think really really BIG footprints. A big digital footprint (think vast quantities of data produced and consumed), a big carbon footprint (think big data centers, big factories, big operations, reams and reams of paper pervading thousands of business processes), a big geographical footprint (think a global organization with offices and people all across the world) and finally a big customer footprint (think thousands of customers across different segments and geographies using the company’s products or services).
  • Some things are really small. These organizations have extremely small tolerance for brand or reputation degradation (think floors full of lawyers and compliance maniacs even in unregulated industries), miniscule tolerance for downtime or business discontinuity (think people obsessing over the next flood in Thailand), very little patience in terms of time to value (think constant flux and a breakneck pace of change), a pretty small shared context (think thousands of people touching different parts of the elephant but no one sees the elephant) and finally a very small degree of homogeneity (think people of all ages, cultures, backgrounds and preferences).

So its pretty straight forward: to be enterprise worthy – you have to be able to handle (more…)

Next Generation Enterprise Support

April 23, 2012
Michael Montoya, Head of Support, EMC IIG

Michael Montoya, Head of Support, EMC IIG

Guest Blogger: Michael Montoya

I have spent the past 20 years of my career working in several technical support capacities, in roles ranging from supporting enterprise IT environments to customer product support. Over that time, I have witnessed and taken part in the transformation of support teams as the application, use and user dependency upon technology have transformed. These changes have been primarily driven by the dynamics of a more sophisticated user and a shift in delivery toward the Cloud. Throughout these changes, the defining aspect of excellent technical support has remained the same: great people capable of helping customers. The operative words here are (more…)

More Insider Tips from Momentum Berlin

October 25, 2011

We’re less than a week away from the start of the conference, so I checked in with a few other familiar faces on strategies to consider for maximizing your time at momentum…

David LeStrat – @dlestrat

  • Attend other peer customers sessions and interact with your peers. You will bring back the best practices that will help you deliver the most value to your business
  • Talk to IIG executives and product leads and bring back a wealth of insider information to help with your internal technology roadmap and planning
  • Visit the demo pavilions, attend the hands-on labs. Get hands on experience with IIG products
  • Leverage the social events, they are (more…)

Follow

Get every new post delivered to your Inbox.

Join 1,651 other followers

%d bloggers like this: