Forrester Blogs For Business Technology Professionals
This is a roll-up of all Forrester blogs written for Business Technology Professionals. Role-specific blogs are listed below. Visit Forrester.com to learn how we make Business Technology Professionals successful every day.
There is a shift underway with master data management (MDM) that can't be ignored. It is no longer good enough to master domains in a silo and think of MDM as an integration tool. First-generation implementations have provided success to companies seeking to manage duplication, establishing a master definition, and consolidating data into a data warehouse. All good things. However, as organizations embrace federated environments and put big data architectures into wider use, these built-for-purpose MDM implementations are too narrowly focused and at times as rigid as the traditional data management platforms they support.
Yet, it doesn't have to be that way. By nature, MDM is meant to provide flexibility and elasticity to managing both single and multiple master domains. First, MDM has to be redefined from a data integration tool to a data modeling tool. Then, MDM is better aligned to business patterns and information needs, as it is designed by business context.
Enter The Golden Profile
When the business wants to put master data to use it is about how to have a view of a domain. The business doesn't think in terms of records, it thinks about using the data to improve customer relationships, grow the business, improve processes, or any host of other business tasks and objectives. A golden profile fits this need by providing the definition and framework that flexes to deliver master data based on context. It can do so because it is driven by data relationships.
If IBM is thinking about exiting the server business, why should you in enterprise IT stay in it? If BYOD accelerates browser diversity, how will you develop and support corporate apps differently? And how will the globalization of eCommerce impact your business?
These are just a few of the questions you might be asking yourself based on the headlines from this week. If you're looking for answers, hopefully this third installment of "Forrester In Your News" for IT Infrastructure and Operations (I&O) professionals will help.
“If you are in the tech business, you need to be willing and able to change”
This statement was made by Michael P Gregoire, CA Technologies’ (CA) new CEO and it pretty much summed up the vibe at CA World 13 this week. I have to admit, as I sat with my fellow Forrester colleagues, Eveline Oehrlich, Courtney Bartlett, Peter O’Neill and Glenn O’Donnell, waiting for the opening keynote I had thoughts in my head of the CA of old. These were formed during my time as an enterprise management consultant in which I saw CA make numerous, good acquisitions but struggle to keep their promises of integration and simplicity – two key ingredients for good enterprise management solutions. To be fair, this has not just been a problem for CA though, as many of the other large solution providers in this space have tripped over the same hurdles.
But, times are changing and the IT Management market is experiencing a renaissance with innovative new solutions that aim to accelerate I&O professionals adoption of Business Service Management (BSM). BSM until now has been a utopian dream but with the increased complexity of IT, from a people, process and technology perspective, means that this now has to become a reality for enterprise IT organizations. Encouragingly, some solution providers in this space are rising to the challenge and judging by the vision and energy portrayed by CA execs over the course of CA World 13 – CA could end up being one of the front-runners of the pack.
Let’s put it this way: social media and security don’t work together very well today. Marketing professionals who see social media as a vital communication channel view security as a nuisance, whereas Security pros view services like Facebook and Twitter as trivial pastimes that expose the business to enormous risk. The problem is, when it comes to social media, these two facets of the organization need to come to terms with each other – and this was clearly on display Tuesday when the Dow Jones briefly plummeted over 100 points due to false Tweets from AP’s hacked Twitter accounts that indicated President Obama had been injured by explosions at the White House.
This recent breach signifies two things: 1) the potentially damaging impact of social media is real and growing, and 2) companies today aren’t doing enough to mitigate the risks.
As social media becomes a legitimate source of news and information, the implications for inaccurate or inappropriate behavior continue to grow. Damaging or disparaging comments on Twitter (whether intended or not), can have a real impact on your business and the way customers view your company and brand. Companies need to do more to protect their organization from social media risk because:
No one would claim that the US tech market is booming. With Europe still mired in recession and debt problems, US economic growth looking soft, and business and consumer worries about the US government raising tax rates and cutting Federal spending, it is not surprising that businesses and governments are being cautious in their purchases of technology goods and services. But we think the fear is overblown. Forrester's forecast for the US tech market in 2013 and 2014 -- published today as "US Tech Market Outlook For 2013 And 2014: Better Times Ahead" -- projects a 6.2% rise in 2013 and a 6.8% growth in 2014 in US business and government purchases of computer equipment, communications equipment, software, IT consulting and systems integration services, and IT outsourcing. Adding in slow growing telecommunications services pulls growth down to 5.7% in 2013 and 6.1% in 2014. That may not be a boom, but it is certainly not a bust.
While CIOs are cautious in their tech buying -- and in the case of the Federal government, actually cutting back -- that caution has and will show up mostly in reduced spending on computer and communications equipment (with the exception of tablets). CIOs will be most aggressive in software, especially for SaaS apps, analytics, and mobile apps. IT outsourcing will see good growth in 2013 as the result of 2012 selection decisions, while IT consulting and systems integration will come on strong in 2014. Business and government purchases of telecommunications services will continue to grow at a slower rate than the overall tech market.
Well, we just saw Samsung launch its latest ubergizmo with tons of interesting features, like pause video playback at the blink of the eye. However, there is an important hardware feature of the Samsung Galaxy S4 to note here: finally a Near Field Communications (NFC) chip is embedded in the device (something that Apple left out of the iPhone 5), making it useful for mobile payments, building access control, and lots of other security uses. Issuers, payment services providers and trusted services managers have long been dreaming of mobile phones with NFC chips: not having to send plastic credit cards with EMV chips (or magstripes in the US) but being able to personalize the credit card right on the phone reduces card management costs, improves end user satisfaction. There is nothing new here. But here's where NFC finally in a mainstream mobile phone can revolutionize fraud management:
1) GPS verification. So if you use it to make a card present transaction by touching your phone NFC credit card to a PayPass or other proximity based credit card reader, the payment authorization platform can immediately know where you are, correlate it with the riskiness of the location (country) and use your location to build a risk score.
2) More factors and better capabilities for payment authentication. Instead or in addition to asking for a PIN code for transaction authentication, the payment processor can contact your registered phone and - based on risk - can ask for a PIN code signature, or secondary authentication like facial recognition or biometric retina vein recognition to authorize a higher value transaction.
3) Linking the NFC chip to an eWallet. This will be easier than ever before. If the NFC chip is initialized to be a credit card, the eWallet application can check for the presence of it and maybe even use it in a card present transaction.
The InfoWorld/Forrester Enterprise Architecture Awards recognize excellent EA programs — ones that due to their business focus, and strategic yet pragmatic orientation, provide sustained value to their business. I caught up with two of our 2012 winners to find out what they have been doing in the year since their award submission. I was specifically interested in hearing:
Have there been changes to business strategy or IT strategy since one year ago that they’ve had to respond to?
What would they say has been their greatest accomplishment over the past year?
The priorities for their EA programs today — changes in the scope, mission, or organization?
What would they say is a key learning of their EA program, or the larger IT organization about making EA effective?
In China, mobile commerce has become one of the top priorities for organizations in retail, hospitality, transportation and other services industries, given the dramatic growth of smartphone adoption and the exploding e-commerce spending. Alipay, the leading third-party online payment platform in China and sister company of the country’s largest C2C website Taobao.com, claims 60 million mobile payment users and estimates 10% of its 2012 transactions were from mobile devices.
In terms of mobile payment, mobile proximity payments and mobile remote commerce have gained momentum through early industry implementations and government support. Starting 2011, the variety of technologies and platforms available in the market has grown significantly.
Under such circumstance, many IT organizations are interested to understand more about the landscape of the mobile payment space. They are also seeking information about the multiple platforms that will be enabling them for their corporate mobile commerce strategies, especially considering that the mobile payment market landscape in China is dramatically different from other parts of the world.
With apologies to the late great President Ronald Reagan, "trust but verify" is outmoded advice when it comes to computer network security. So, why do so many information security professionals still think trusted and untrusted networks zones are still best practice? Most think that people are trusted or untrusted. The problem with that thinking is you never know who can or cannot be trusted. Remember wikileaks? It was an inside job.
The solution: Zero Trust - Verify Then Trust
Meet John Kindervag, Forrester Principal Analyst and a leading expert in network and information security. He says that firms must take a Zero Trust approach to network security that means "verify then trust". In this episode of Forrester TechnoPolitics, John describes the what, why, and how of the Zero Trust approach to network and information security.
Podcast: Zero Trust - Your Only Hope For A Secure Network (8 mins)