Forrester Blogs For Business Technology Professionals
This is a roll-up of all Forrester blogs written for Business Technology Professionals. Role-specific blogs are listed below. Visit Forrester.com to learn how we make Business Technology Professionals successful every day.
I was at Oracle’s Analyst day today, and spent time with the Customer Experience Team drilling into the technology that allows organizations to deliver consistent, cross-channel, cross-touchpoint experiences across what Oracle terms the buying and owning journey – and which parallels Forrester’s viewpoint quite nicely. Here is Oracle's view of this journey:
“Enterprise rights management? What does that even mean?! You’re using security speak!” exclaimed my colleague TJ Keitt.
TJ sits on a research team serving CIOs, and covers collaboration software. We were having a discussion around collaboration software and data security considerations for collaboration. “Security speak” got in the way. It wasn’t the first time, and it will likely not be the last, but it is a good reminder to remember to communicate clearly using non security speak – and not just to fellow S&R pros, but to the rest of the business (in this case – the CIO) – to talk about what we really mean. That’s how collaboration starts.
Collaboration is also not just about S&R pros engaging the rest of the business to bring them into the security-minded fold, but to also listen and be aware of what’s bubbling up in other parts of the organization as it can have implications for security too. One of the more interesting examples that I see today come from the marketing side of the business, specifically those involved with strategies for customer experience and digital marketing. Mobile is huge (no surprise, right?), and is transforming how companies interact with customers. The future of mobile is all about context: 1) situation, 2) preferences, and 3) attitudes.
Every company generates data that would be of significant value to its customers, partners and potential partners; information that could be combined with insights from this ecosystem, public data and other sources to generate significant new discoveries, products and business values. But making our data available, easily consumable and getting payback for sharing it are significant hurdles.
Over many years we have built up an ever-more complex web of security, legal and data management practices that make it nearly impossible to share valuable info between companies in an open marketplace style – which is exactly what is needed to open up this value.
But it doesn’t have to be this way. There is a new approach that leading enterprises and governments are taking today that is significantly simpler, more manageable and empowers companies to share their key data more freely, opening up massive new market opportunities for all. Here's how a few Forrester clients are taking advantage of this new model:
The continued economic viability of software development in India, whether by independent software vendors (ISVs) or “captive” business units, depends less on pure labor arbitrage and more on delivering time-to-market advantage for clients. The pressure of meeting business expectations demands that software firms harness creative capability wherever they can find it. The increased focus on Business Technology innovation and customer experience over mere cost savings presents both a threat and an opportunity to software configuration and development business units (BUs) in India.This is the key finding from my just-published report.
Forrester developed its software innovation assessment workbook to assess software innovation capability of firms. We provided this tool to members of NASSCOM (the industry association for the IT BPO sector in India), comprising both ISVs and captive development BUs in India, and surveyed them to assess the most important process, organizational, cultural, geographical, and staffing practices that promote software innovation. We also interviewed a dozen selected respondents in greater depth to better understand how innovation capability contributes to business success in India. We found evidence of widespread adoption of the practices correlated with software innovation capability, helping to drive a rapidly changing role for Indian business in the global software supply chain.
Innovators in India that were engaged in software development and configuration received high scores for many of the practices that drive effective innovation. They demonstrated strength in:
Listening to the voice of the customer
Making the development process more iterative and responsive
I was very excited to finally get a copy of the much-anticipated 2013 Verizon Data Breach Investigations Report (DBIR.) I have found the report to be valuable year after year. This is the 6th iteration and this year’s report includes 621 confirmed data breaches, as well as over 47,000 reported security incidents. 18 organizations from across the globe contributed to the report this year. The full report is 63 pages, and I have to say that Wade Baker and company did a great job making it an enjoyable read. I enjoyed the tone, and I found myself laughing several times as I read through it (Laughing and infosec aren't commonly said in the same breath.) There are tons of great references as well, ranging from NASCAR, to Biggie Smalls, the Violent Femmes and more. The mantra of this year’s report is “Understand Your Adversary’ is Critical to Effective Defense and Response.” Here are a few observations:
The focus on the adversary answers customer questions. Who is the adversary? This is a frequent question from Forrester clients. The Mandiant APT1 report stirred up much debate on state sponsored actors and Verizon's data and analysis gives us more perspective on this class of threat actor. The first table in the report profiles the threat actors that are targeting organizations. It provides a high level view that I suggest you include in any type of executive engagement activity you participate in. This 3rd party snapshot of the threat actors should resonate with a wide degree of audiences.
I met with a group of clients recently on the evolution of data management and big data. One retailer asked, “Are you seeing the business going to external sources to do Big Data?”
My first reaction was, “NO!” Yet, as I thought about it more and went back to my own roots as an analyst, the answer is most likely, “YES!”
Ignoring nomenclature, the reality is that the business is not only going to external sources for big data, but they have been doing it for years. Think about it; organizations that have considered data a strategic tool have invested heavily in big data going back to when mainframes came into vogue. More recently, banking, retail, consumer packaged goods, and logistics have marquis case studies on what sophisticated data use can do.
Before Hadoop, before massive parallel processing, where did the business turn? Many have had relationships with market research organizations, consultancies, and agencies to get them the sophisticated analysis that they need.
Think about the fact, too, that at the beginning of social media, it was PR agencies that developed the first big data analysis and visualization of Twitter, LinkedIn, and Facebook influence. In a past life, I worked at ComScore Networks, an aggregator and market research firm analyzing and trending online behavior. When I joined, they had the largest and fastest growing private cloud to collect web traffic globally. Now, that was big data.
Today, the data paints a split picture. When surveying IT across various surveys, social media and online analysis is a small percentage of business intelligence and analytics that is supported. However, when we look to the marketing and strategy clients at Forrester, there is a completely opposite picture.
I stated a few months ago that “data is the new currency” and that “the API layer will be the core around which every successful enterprise digital strategy is based.” Fast-forward to today: two moves this week prove that Intel and CA Technologies agree and are betting heavily on this strategy with acquisitions of Mashery and Layer 7. This will not be the end of the acquisition spree in this space; I’m sure we’ll see more API management companies (and a few BaaS companies) get gobbled up soon. If you’re currently implementing or planning a mobile strategy in your enterprise, what does this mean for you?
After RSA's acquisition of SilverTail, things are heating up in mobile application level behavioral detection.
We see fraud management vendors increasingly looking at mobile application behaviors (beyond web fraud management and device fingerprinting) to build out a normal and abnormal behavior profile for the network traffic signatures coming out of the application (similarly to how SilverTail/RSA looks at web traffic signatures). Note that this is clearly a grey area that falls between what device fingerprinting vendors (iovation, 41st Parameter, BlueCava, ThreatMetrix), or risk-based authentication (RBA) vendors (RSA, Entrust, CA/Arcot, etc.) or what traditional back-end, cross-channel transaction monitoring vendors (Actimize, ACI, Detica, SAS, etc.) have been doing. Although device fingerprinting and RBA vendors have long been providing SDKs and APIs for developers to include in their mobile applications, understanding mobile application network traffic and building good and bad behavioral models is becoming something people are increasingly interested in.
Mobile application behavior detection has the benefits of not having to open up application code, not having to define too many security policies or rules. Because of this, mobile application behavior detection and network traffic signature profiling is something we expect to see a lot of vendor interest in the next 9-12 months.
At the OpenStack Summit in Portland last week, the open-source cloud platform got real, to echo Forrester’s cloud team predictions for 2013. At the busy gathering attended by over 2,400, suits mingled effortlessly with hoodies and deep-tech design committee meetings were sandwiched between marquee-name customers sharing success stories. Three core themes drove the show, as outlined by Jonathan Bryce in the opening keynote: the OpenStack technology platform has matured, the ecosystem is vibrant, and the global user footprint now includes enterprise customers doing real business.
The show followed on the heels of the Grizzly release, the 7th release of the OpenStack platform. Along with stronger support for VMware and Microsoft hypervisors, Grizzly widens block storage options and includes 10+ new enterprise storage platform drivers and workload-based scheduling. A wide range of new network plugins expand the platform’s software-defined networking options and a sexier Dashboard to access, provision and automate resources.
I write this week's "Forrester In Your News" from my apartment in Boston. Forrester's Cambridge office just across the Charles River from meis closed today, like many in the area, as events continue to develop from Monday's tragedy at the Boston Marathon. For those of us in the U.S., and especially Boston, it's hard to think about anything else. But if you need to give your mind and emotions a rest, I offer you the following . . .