<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/~d/styles/rss2full.xsl"?><?xml-stylesheet type="text/css" media="screen" href="http://feeds.feedburner.com/~d/styles/itemcontent.css"?><rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0" version="2.0">

<channel>
	<title>Enterprise Irregulars</title>
	
	<link>https://www.enterpriseirregulars.com</link>
	<description>Smart Thinking for the Smart Enterprise</description>
	<lastBuildDate>Wed, 19 Aug 2020 15:51:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.15</generator>
	
<site xmlns="com-wordpress:feed-additions:1">10631147</site>	<atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="self" type="application/rss+xml" href="http://feeds.feedburner.com/EIblogs" /><feedburner:info uri="eiblogs" /><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="hub" href="http://pubsubhubbub.appspot.com/" /><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="hub" href="http://www.enterpriseirregulars.com/?pushpress=hub" /><feedburner:emailServiceId>EIblogs</feedburner:emailServiceId><feedburner:feedburnerHostname>https://feedburner.google.com</feedburner:feedburnerHostname><item>
		<title>Answers To Today’s Toughest Endpoint Security Questions In The Enterprise</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/NcaYcrSAZb8/</link>
		<comments>https://www.enterpriseirregulars.com/163180/answers-to-todays-toughest-endpoint-security-questions-in-the-enterprise/#respond</comments>
		<pubDate>Fri, 14 Aug 2020 15:01:16 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[absolute software]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=163180</guid>
		<description><![CDATA[<p>Enterprises who are increasing the average number of endpoint security agents from 9.8 last year to 10.2 today aren&#8217;t achieving the endpoint resilience they need because more software agents create more conflicts, leaving each endpoint exposed to a potential breach. 1 in 3 enterprise devices is being used with a non-compliant VPN, further increasing the [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/163180/answers-to-todays-toughest-endpoint-security-questions-in-the-enterprise/">Answers To Today&#8217;s Toughest Endpoint Security Questions In The Enterprise</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="aligncenter wp-image-163183" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/Answers-To-Todays-Toughest-Endpoint-Security-Questions-In-The-Enterprise-image-600x338.jpg" alt="Answers To Today's Toughest Endpoint Security Questions In The Enterprise" width="640" height="360" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/Answers-To-Todays-Toughest-Endpoint-Security-Questions-In-The-Enterprise-image-600x338.jpg 600w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/Answers-To-Todays-Toughest-Endpoint-Security-Questions-In-The-Enterprise-image-300x169.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/Answers-To-Todays-Toughest-Endpoint-Security-Questions-In-The-Enterprise-image-768x432.jpg 768w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<ul>
<li>Enterprises who are increasing the average number of endpoint security agents from 9.8 last year to 10.2 today aren&#8217;t achieving the endpoint resilience they need because more software agents create more conflicts, leaving each endpoint exposed to a potential breach.</li>
<li>1 in 3 enterprise devices is being used with a non-compliant VPN, further increasing the risk of a breach.</li>
<li>60% of breaches can be linked to a vulnerability where a patch was available, but not applied. Windows 10 devices in enterprises are, on average, 95 days behind on patches.</li>
</ul>
<p>CIOs, CISOs and cybersecurity teams say autonomous endpoint security is the most challenging area they need to strengthen in their cybersecurity strategy today. Software agents degrade faster than expected and conflict with each other, leaving endpoints exposed. <a class="color-link" title="https://www.absolute.com/go/study/2020-endpoint-resilience-report/" href="https://www.absolute.com/go/study/2020-endpoint-resilience-report/" target="_blank" rel="nofollow noopener">Absolute’s 2020 State of Endpoint Resilience Report</a> quantifies the current state of autonomous endpoint security, the scope of challenges CISOs face today and how elusive endpoint resiliency is to achieve with software agents. It’s an insightful read if you’re interested in autonomous endpoint security.</p>
<p><strong>Endpoint Security Leads CISOs’ Priorities In 2020 </strong></p>
<p>With their entire companies working remotely, CIOs and CISOs I’ve spoken with say autonomous endpoint security is now among their top three priorities today. Cutting through the endpoint software clutter and turning autonomous endpoint security into a strength is the goal. CISOs are getting frustrated with spending millions of dollars among themselves only to find out their endpoints are unprotected due to software conflicts and degradation.  Interested in learning more, I spoke with <a class="color-link" title="https://www.linkedin.com/in/steven-spadaccini-79a1825/" href="https://www.linkedin.com/in/steven-spadaccini-79a1825/" target="_blank" rel="nofollow noopener">Steven Spadaccini, Vice President, Sales Engineering</a> at <a class="color-link" title="https://www.absolute.com/" href="https://www.absolute.com/" target="_blank" rel="nofollow noopener">Absolute Software</a> and one of the most knowledgeable autonomous endpoint cybersecurity experts I’ve ever met. Our conversation delved into numerous cybersecurity challenges enterprise CIOs and CISOs are facing today. My interview with him is below:</p>
<p><strong>The Seven Toughest Questions the C-Suite Is Asking About Endpoint Security </strong></p>
<p><strong><em>Louis: Thank you for your time today. I have seven questions from CIOs, CISOs and their teams regarding endpoint security. Let’s get started with their first one. What happens if an endpoint is compromised, how do you recover, encrypt, or delete its data?</em></strong></p>
<p><strong><em>Steven:</em></strong>  It’s a challenge using software agents, both security and/or management, to do this as each agents’ tools and features often conflict with each other, making a comprised endpoints’ condition worse while making it virtually impossible to recover, encrypt, delete and replace data. The most proven approach working for enterprises today is to pursue an endpoint resilience strategy. At the center of this strategy is creating a root of trust in the hardware and re-establishes communication and control of a device through an unbreakable digital tether. I’m defining Endpoint Resilience as an autonomous endpoint security strategy that ensures connectivity, visibility and control are achieved and maintained no matter what is happening at the OS or application level. Taking this approach empowers devices to recover automatically from any state to a secure operational state without user intervention. Trust is at the center of every endpoint discussion today as CIOs, CISOs and their teams want the assurance every endpoint will be able to heal itself and keep functioning</p>
<p><strong><em>Louis: Do endpoint software security solutions fail when you lose access to the endpoint, or is the device still protected at the local level?</em></strong></p>
<p><strong><em>Steven:</em></strong> When they’re only protected by software agents, they fail all the time. What’s important for CISOs to think about today is how they can lead their organizations to excel at automated endpoint hygiene. It’s about achieving a stronger endpoint security posture in the face of growing threats. Losing access to an endpoint doesn’t have to end badly; you can still have options to protect every device. It’s time for enterprises to start taking a more resilient-driven mindset and strategy to protecting every endpoint – focus on eliminating dark endpoints. One of the most proven ways to do that is to have endpoint security embedded to the BIOS level every day. That way, each device is still protected to the local level. Using geolocation, it’s possible to “see” a device when it comes online and promptly brick it if it’s been lost or stolen.</p>
<p><strong><em>Louis: How can our cybersecurity team ensure compliance that all cybersecurity software is active and running on all endpoints? </em></strong></p>
<p><strong>Steven: </strong>Compliance is an area where having an undeletable tether pays off in a big way. Knowing what’s going on from a software configuration and endpoint security agent standpoint – basically the entire software build of a given endpoint – is the most proven way I’ve seen CISOs keep their inventory of devices in compliance. What CISOs and their teams need is the ability to see endpoints in near real-time and predict which ones are most likely to fail at compliance. Using a cloud-based or SaaS console to track compliance down to the BIOS level removes all uncertainty of compliance. Enterprises doing this today stay in compliance with HIPAA, GDPR, PCI, SOX and other compliance requirements at scale. It’s important also to consider how security automation and orchestration kicks on to instantly resolve violations by revising security controls and configurations, restoring anti-malware, or even freezing the device or isolating it from data access. Persistent visibility and control give organizations what they need to be audit-ready at every moment.</p>
<p>Having that level of visibility makes it easy to brick a device. Cybersecurity teams using Absolute’s Persistence platform can lead to humorous results for IT teams, who call the bricking option a “fun button as they watch hackers continually try to reload new images and right after they’re done, re-brick the device again. One CIO told the story of how their laptops had been given to a service provider who was supposed to destroy them to stay in compliance with the <a class="color-link" title="https://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00WhatisHIPAA.aspx" href="https://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00WhatisHIPAA.aspx" target="_blank" rel="nofollow noopener">Health Insurance Portability and Accountability Act (HIPAA)</a> and one had been resold on the black market, ending up in a 3<sup>rd</sup> world nation. As the hacker attempted to rebuild the machine, the security team watched as each new image was loaded at which time they would promptly brick the machine. After 19 tries, the hacker gave up and called the image rebuild “brick me.”</p>
<p><strong><em>Louis: With everyone working remote today, how can we know, with confidence where a given endpoint device is at a moments’ notice? </em></strong></p>
<p><strong>Steven: </strong>That’s another use case where having an undeletable tether pays off in two powerful ways: enabling autonomous endpoint security and real-time asset management. You can know with 100% confidence where a given endpoint device is in real-time so long as the device is connected to a permanent digital tether . Even if the device isn’t reachable by your own corporate network it’s possible to locate it using the technologies and techniques mentioned earlier. CIOs sleep better at night knowing every device is accounted for and if one gets lost or stolen, their teams can brick it in seconds.</p>
<p><strong><em>Louis: How can our IT and cybersecurity teams know all cybersecurity applications are active and protecting the endpoint? </em></strong></p>
<p><strong>Steven: </strong>By taking a more aggressive approach to endpoint hygiene, it’s possible to know every application, system configuration and attributes of user data on the device. It’s important not to grow complacent and assume the gold image IT uses to configure every new or recycled laptop is accurate. One CIO was adamant they had nine software agents on every endpoint, but Absolute’s Resilience platform found 16, saving the enterprise from potential security gaps. The gold image is an enterprise IT team was using had inadvertently captured only a subset of the total number of software endpoints active on their networks. Absolute’s Resilience offering and Persistence technology enabled the CIO to discover gaps in endpoint security the team didn’t know existed before.</p>
<p><strong><em>Louis: How can we restrict the geolocations of every endpoint? </em></strong></p>
<p><strong>Steven: </strong>This is an area that’s innovating quickly in response to the needs enterprises have to track and manage assets across countries and regions. IP tracking alone isn’t as effective as the newer techniques, including GPS tracking, Wi-Fi triangulation, with both integrated into the Google Maps API. Enterprises whose business relies on Personal Identifiable Information (PII) is especially interested in and adopting these technologies today. <a class="color-link" title="https://www.apria.com/" href="https://www.apria.com/" target="_blank" rel="nofollow noopener">Apria Healthcare</a> is currently using geofencing for endpoint security and asset management. They have laptops in use today across Indonesia, the Philippines and India. Given the confidential nature of the data on those devices and compliance with local government data protection laws, each laptop needs to stay in the country they’re assigned to. Geofencing gives Apria the power to freeze any device that gets outside of its region within seconds, averting costly fines and potential breaches.</p>
<p><strong><em>Louis: How can our IT team immediately validate an endpoint for vulnerabilities in software and hardware? </em></strong></p>
<p><strong>Steven: </strong>The quickest way is to design in audit-ready compliance as a core part of any endpoint resilience initiative. Endpoint resilience to the BIOS level makes it possible to audit devices and find vulnerabilities in real-time, enabling self-healing of mission-critical security applications regardless of complexity. The goal of immediately validating endpoints for current security posture needs to be a core part of any automated endpoint hygiene strategy. It’s possible to do this across platforms while being OS-agnostic yet still accessible to over 500M endpoint devices, deployed across Microsoft Windows, macOS via a Mac Agent and Chrome platforms.</p>
<p><strong>Conclusion </strong></p>
<p>Knowing if their autonomous endpoint security and enterprise-wide cybersecurity strategies are working or not is what keeps CIOs up the most at night. One CISO confided to me that 70% of the attempted breaches to his organization are happening in areas he and his team already knew were vulnerable to attack. Bad actors are getting very good at finding the weakest links of an enterprises’ cyber defenses fast. They’re able to look at the configuration of endpoints, see which software agents are installed, research known conflicts and exploit them to gain access to corporate networks. All this is happening 24/7 to enterprises today. Needing greater resilient, persistent connections to every device, CISOs are looking at how they can achieve greater resilience on every endpoint. Capitalizing on an undeletable tether to track the location of the device, ensure the device and the apps on that device have self-healing capabilities and gain valuable asset management data  &#8211; these are a few of the many benefits they’re after.</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/163180/answers-to-todays-toughest-endpoint-security-questions-in-the-enterprise/">Answers To Today&#8217;s Toughest Endpoint Security Questions In The Enterprise</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/NcaYcrSAZb8" height="1" width="1" alt=""/>]]></content:encoded>
			<wfw:commentRss>https://www.enterpriseirregulars.com/163180/answers-to-todays-toughest-endpoint-security-questions-in-the-enterprise/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">163180</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/163180/answers-to-todays-toughest-endpoint-security-questions-in-the-enterprise/</feedburner:origLink></item>
		<item>
		<title>10 Ways AI Is Accelerating DevOps</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/jSuiv3uszY0/</link>
		<comments>https://www.enterpriseirregulars.com/162814/10-ways-ai-is-accelerating-devops/#respond</comments>
		<pubDate>Sun, 09 Aug 2020 14:55:38 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[AI for DevOps]]></category>
		<category><![CDATA[Application Performance Monitoring (APM)]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Atlassian]]></category>
		<category><![CDATA[BMC Autonomous Digital Enterprise framework]]></category>
		<category><![CDATA[Jira Software]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Microsoft Visual Studio Intellicode]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=162814</guid>
		<description><![CDATA[<p>Startups offering AI-powered software development tools raised $704M over 12 months ending September 2019, according to a Deloitte report published earlier this year. IDC predicts the global market for custom application development services is forecast to grow from $47B in 2018 to more than $61B in 2023, attaining a 5.3% Compound Annual Growth Rate (CAGR) [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/162814/10-ways-ai-is-accelerating-devops/">10 Ways AI Is Accelerating DevOps</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-162816 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/10-Ways-AI-Is-Accelerating-DevOps-FINAL.jpg" alt="Developing programmer reading computer codes Development Website design and coding technologies." width="635" height="423" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/10-Ways-AI-Is-Accelerating-DevOps-FINAL.jpg 6000w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/10-Ways-AI-Is-Accelerating-DevOps-FINAL-300x200.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/10-Ways-AI-Is-Accelerating-DevOps-FINAL-768x512.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/10-Ways-AI-Is-Accelerating-DevOps-FINAL-600x400.jpg 600w" sizes="(max-width: 635px) 100vw, 635px" /></p>
<ul>
<li>Startups offering AI-powered software development tools raised $704M over 12 months ending September 2019, according to a <a class="color-link" title="https://www2.deloitte.com/us/en/insights/focus/signals-for-strategists/ai-assisted-software-development.html" href="https://www2.deloitte.com/us/en/insights/focus/signals-for-strategists/ai-assisted-software-development.html" target="_blank" rel="nofollow noopener">Deloitte report published earlier this year</a>.</li>
<li>IDC predicts the global market for custom application development services is forecast to grow from $47B in 2018 to more than $61B in 2023, attaining a 5.3% Compound Annual Growth Rate (CAGR) in five years.</li>
<li>Poor software quality cost US organizations an estimated $319B in 2019, according to the <a class="color-link" title="https://www.it-cisq.org/the-cost-of-poor-quality-software-in-the-us-a-2018-report/The-Cost-of-Poor-Quality-Software-in-the-US-2018-Report.pdf" href="https://www.it-cisq.org/the-cost-of-poor-quality-software-in-the-us-a-2018-report/The-Cost-of-Poor-Quality-Software-in-the-US-2018-Report.pdf" target="_blank" rel="nofollow noopener">Consortium for IT Software Quality&#8217;s report on the cost of poor quality software in the U.S</a>.</li>
<li>40% of DevOps teams will be using application and infrastructure monitoring apps that have integrated artificial intelligence for IT operations (AIOps) platforms by 2023, <a class="color-link" title="https://www.gartner.com/document/3971186" href="https://www.gartner.com/document/3971186" target="_blank" rel="nofollow noopener">according to Gartner</a>.</li>
</ul>
<p>Looking to reduce the delays DevOps teams are challenged with, software development tool providers are accelerating the pace of integrating AI- and Machine Learning technologies into their apps and platforms. Accelerating every phase of the Software Development Lifecycle (SDLC) while increasing software quality is the goal. And the good news is use cases are showing those goals are being accomplished, taking DevOps to a new level of accuracy, quality, and reliability.</p>
<p>What&#8217;s particularly fascinating about the ten ways AI is accelerating DevOps is how effective it is proving to be in assisting developers with the difficult, time-consuming tasks that take away from coding. One of the most time-consuming tasks is managing the many iterations and versions of requirements documents. A leader in using AI to streamline every phase of the SDLC and assist with managing requirements is <a class="color-link" title="https://www.atlassian.com/software/jira" href="https://www.atlassian.com/software/jira" target="_blank" rel="nofollow noopener">Jira Software from Atlassian</a>, widely considered the industry standard in this area of DevOps.</p>
<p>The following are ten ways AI is accelerating DevOps today:</p>
<ol>
<li><strong>Improving DevOps productivity by relying on AL and ML to autosuggest code segments or snippets in real-time to accelerate development. </strong>DevOps teams interviewed for this article from several leading enterprise software companies competing in CRM, Supply Chain Management, and social media markets say this use case of AI is the most productive and has generated the greatest gains in accuracy. Initial efforts at using AI to autocomplete code were hit or miss, according to a DevOps lead at a leading CRM provider. She credits DevOps&#8217; development tools providers&#8217; use of supervised machine learning algorithms with improving how quickly models learn and respond to code requests. Reflecting what the DevOps teams interviewed for this article prioritized as the most valuable AI development in DevOps, <a class="color-link" title="https://marketplace.visualstudio.com/items?itemName=VisualStudioExptTeam.vscodeintellicode" href="https://marketplace.visualstudio.com/items?itemName=VisualStudioExptTeam.vscodeintellicode" target="_blank" rel="nofollow noopener">Microsoft&#8217;s Visual Studio Intellicode has over 6 million installs as of today</a>.</li>
<li><strong>Streamlining Requirements Management using AI is proving effective at improving the accuracy and quality of requirements documents capturing what users need in the next generation of an app or platform.</strong>  AI is delivering solid results streamlining every phase of creating, editing, validating, testing, and managing requirements documents. DevOps team members are using AI- and ML-based requirements management platforms to save time so they can get back to coding and creating software products often on tight deadlines. Getting requirements right the first time helps keep an entire project on the critical path of its project plan. Seeing an opportunity to build a business case of keeping projects on schedule, AI-powered software development tools providers are quickly developing and launching new apps in their area. It&#8217;s fascinating to watch how quickly Natural Language Processing techniques are being adopted into this area of DevOps tools. <a class="color-link" title="https://www2.deloitte.com/us/en/insights/focus/signals-for-strategists/ai-assisted-software-development.html#:~:text=AI%20is%20helping%20to%20make%20better%20software%20Professionals%20are%20using,in%20design%2C%20development%2C%20and%20deployment&amp;text=Artificial%20intelligence%20isn't%20writing,develop%20and%20test%20custom%20software." href="https://www2.deloitte.com/us/en/insights/focus/signals-for-strategists/ai-assisted-software-development.html#:~:text=AI%20is%20helping%20to%20make%20better%20software%20Professionals%20are%20using,in%20design%2C%20development%2C%20and%20deployment&amp;text=Artificial%20intelligence%20isn't%20writing,develop%20and%20test%20custom%20software." target="_blank" rel="nofollow noopener">Enterprises using AI-based tools have been able to reduce requirements review times by over 50%</a>.</li>
<li><strong>AI is proving effective at bug detection and auto-suggestions for improving code.</strong> At Facebook, a bug detection tool predicts defects and suggests remedies that are proving <a class="color-link" title="https://engineering.fb.com/developer-tools/getafix-how-facebook-tools-learn-to-fix-bugs-automatically/" href="https://engineering.fb.com/developer-tools/getafix-how-facebook-tools-learn-to-fix-bugs-automatically/" target="_blank" rel="nofollow noopener">correct 80% of the time with AI tools learning to fix bugs automatically</a>. <a class="color-link" title="https://semmle.com/codeql" href="https://semmle.com/codeql" target="_blank" rel="nofollow noopener">Semmle CodeQL</a> is considered the leading AI-based DevOps tool in this area. DevOps teams using CodeQL can track down vulnerabilities in code and also find logical variants in their entire codebase<a class="color-link" title="https://semmle.com/case-studies/semmle-microsoft-vulnerability-hunting" href="https://semmle.com/case-studies/semmle-microsoft-vulnerability-hunting" target="_blank" rel="nofollow noopener">. Microsoft uses Semmle for vulnerability hunting.</a> Security researchers in Microsoft&#8217;s security response team use Semmle QL to find variants of critical problems, allowing them to identify and respond to serious code problems and prevent incidents.</li>
<li><strong>AI is assisting in prioritizing security testing results and triaging vulnerabilities.  </strong>Interested in learning more about how ML can find code vulnerability in real-time, I spoke with <a class="color-link" title="https://www.linkedin.com/in/matysiman/" href="https://www.linkedin.com/in/matysiman/" target="_blank" rel="nofollow noopener">Maty Siman, CTO Checkmarx</a>, says that &#8220;<em>even organizations with the most mature SDLCs often run into issues with prioritizing and triaging vulnerabilities. ML algorithms that focus on developers&#8217; or AppSec teams&#8217; attention on true positives and vulnerable components that pose a threat are key to navigating this challenge.&#8221;</em> Maty also says that ML algorithms can be taught to understand that one type of vulnerability vs. another has a higher percentage of being a true positive. With this automated &#8220;vetting&#8221; process in place, teams can optimize and accelerate their remediation efforts in a much more informed manner.</li>
<li><strong>Improving software quality assurance by auto-generating and auto-running test cases based on the unique attributes of a given code base is another area where AI is saving DevOps teams valuable time.</strong> This is invaluable for stress-testing new apps and platforms across a wide variety of use cases. Creating and revising test cases is a unique skill set on any DevOps team, with the developers with this skill often being overwhelmed with test updates. AI-based software development tools are eliminating test coverage overlaps, optimizing existing testing efforts with more predictable testing, and accelerating progress from defect detection to defect prevention. AI-based software development platforms can identify the dependencies across complex and interconnected product modules, improving overall product quality in the process. Improving software quality enhances customer experiences, as well.</li>
<li><strong>AI is proving adept at troubleshooting defects in complex software apps and platforms after they&#8217;ve been released and shipped to customers</strong>. Enterprise software companies go to great lengths in their software QA processes to eliminate bugs, logic errors, and unreliable segments of code. Retrofitting releases or, worst case, recalling them is costly and impacts customers&#8217; productivity. AI-based QA tools are proving effective at predicting which areas of an enterprise application will fail before being delivered into complex customer environments. <a class="color-link" title="https://www2.deloitte.com/us/en/insights/focus/signals-for-strategists/ai-assisted-software-development.html#:~:text=AI%20is%20helping%20to%20make%20better%20software%20Professionals%20are%20using,in%20design%2C%20development%2C%20and%20deployment&amp;text=Artificial%20intelligence%20isn't%20writing,develop%20and%20test%20custom%20software." href="https://www2.deloitte.com/us/en/insights/focus/signals-for-strategists/ai-assisted-software-development.html#:~:text=AI%20is%20helping%20to%20make%20better%20software%20Professionals%20are%20using,in%20design%2C%20development%2C%20and%20deployment&amp;text=Artificial%20intelligence%20isn't%20writing,develop%20and%20test%20custom%20software." target="_blank" rel="nofollow noopener">AI is proving effective at root cause analysis</a>, and also has proved effective in accelerating a leading CRM providers&#8217; application delivery and a 72% reduction in time-to-restore in customers&#8217; enterprise environments. Another DevOps team says they are using AI to auto-configure their applications&#8217; settings to optimize performance in customer deployments.</li>
<li><strong>ML-based code vulnerability detection can spot anomalies reliably and alert DevOps teams in real-time.</strong> Maty Siman, CTO Checkmarx told me that<em>, &#8220;assuming that your developers are writing quality, secure code, machine learning can set a baseline of &#8220;normal activity&#8221; and identify and flag anomalies from that baseline.&#8221;</em> He continued, saying that <em>&#8220;ultimately, we live in an IT and security landscape that&#8217;s evolving every minute of every day, requiring systems and tools that learn and adapt at the same, if not a greater, speed. Organizations and developers can&#8217;t do it alone and require solutions that improve the accuracy of threat detection to help them prioritize what matters most.&#8221;</em> Spotting anomalies quickly and taking action on them is integral to building a business case for AI software-based QA and DevOps tools.</li>
<li><strong>Advanced DevOps teams are using AI to analyze and find new insights across all development tools, Application Performance Monitoring (APM), Software QA, and release cycle systems. </strong>DevOps teams at a leading Supply Chain Management (SCM) enterprise software provider are using AI to analyze why certain projects go so well and deliver excellent code while others get caught in perpetual review and code rewrite cycles. Using supervised machine learning algorithms, they&#8217;re able to see patterns and gain insights into their data. Becoming data-driven is quickly becoming part of their DNA, a DevOps lead told me this week on a call.</li>
<li><strong>Improving traceability within each release cycle to find where gaps in DevOps collaboration and data integration workflows can be improved.</strong>  AI is enabling DevOps teams to stay more coordinated with each other, especially across remote geographic locations. AI-driven insights are helping to see how shared requirements and specifications can reflect localization, unique customer requirements, and specific performance benchmarks.</li>
<li><strong>Creating a more integrated DevOps strategy where AI can deliver the most value depends on frameworks that can keep DevOps customer-centric while improving agility and nurturing an analytics-driven DNA to gain insights into operations. </strong>DevOps leaders interviewed for this article say integrating security into development cycles reduces bottlenecks that get in the way of staying on schedule. Several went on to say that frameworks capable of integrating Quality Assurance into the DevOps workflows are key. AI&#8217;s use cases taken together reflect the potential to revolutionize DevOps. Executing on this promise, however, requires a framework that empowers enterprise DevOps teams to deliver a transcendent customer experience, automate customer transactions, and provide support for automation everywhere. One of the leaders in this area is <a href="https://www.bmc.com/corporate/autonomous-digital-enterprise.html" target="_blank" rel="noopener">BMC&#8217;s Autonomous Digital Enterprise framework</a>, which helps businesses harness AI/ML capabilities to run and reinvent in a rapidly transforming world. It&#8217;s helping enterprises innovate faster than their competitors by enabling the agility, customer centricity, and actionable insights integral to driving data-driven business outcomes.</li>
</ol>
<p><strong>Conclusion </strong></p>
<p>Accelerating development cycles while ensuring the highest quality code gets produced is a challenge all DevOps teams face. AI is helping to accelerate every phase of DevOps development cycles by anticipating what developers need before they ask for it. Auto suggesting code segments, improving software quality assurance techniques with automated testing, and streamlining requirements management are core areas where AI is delivering value to DevOps today.</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/162814/10-ways-ai-is-accelerating-devops/">10 Ways AI Is Accelerating DevOps</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/jSuiv3uszY0" height="1" width="1" alt=""/>]]></content:encoded>
			<wfw:commentRss>https://www.enterpriseirregulars.com/162814/10-ways-ai-is-accelerating-devops/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">162814</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/162814/10-ways-ai-is-accelerating-devops/</feedburner:origLink></item>
		<item>
		<title>Improving Online Learning Experiences One Secured Endpoint At A Time</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/QDNheXhWqUY/</link>
		<comments>https://www.enterpriseirregulars.com/161587/improving-online-learning-experiences-one-secured-endpoint-at-a-time/#respond</comments>
		<pubDate>Sun, 02 Aug 2020 18:51:59 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[Absolute Persistence]]></category>
		<category><![CDATA[Absolute Resilience]]></category>
		<category><![CDATA[absolute software]]></category>
		<category><![CDATA[Autonomous Endpoint Security]]></category>
		<category><![CDATA[COVID-19 schools]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity in covid-19]]></category>
		<category><![CDATA[Endpoint Security. Online education]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>
		<category><![CDATA[Online learning]]></category>
		<category><![CDATA[Online schools]]></category>
		<category><![CDATA[Pandemic education]]></category>
		<category><![CDATA[Secured teaching]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=161587</guid>
		<description><![CDATA[<p>Bottom Line: Defining the perfect mix of cloud apps, platforms and secured endpoints to create compelling online learning experiences customizable to students&#8217; learning strengths is how schools are overcoming the challenge of virtual teaching. There are over 56 million students in the U.S. alone who are relying on remote learning apps, platforms and autonomous endpoint [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/161587/improving-online-learning-experiences-one-secured-endpoint-at-a-time/">Improving Online Learning Experiences One Secured Endpoint At A Time</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-161590 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/Improving-Online-Learning-Experiences-One-Secured-Endpoint-At-A-Time.-imagejpg.jpg" alt="Improving Online Learning Experiences One Secured Endpoint At A Time" width="637" height="342" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/Improving-Online-Learning-Experiences-One-Secured-Endpoint-At-A-Time.-imagejpg.jpg 5636w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/Improving-Online-Learning-Experiences-One-Secured-Endpoint-At-A-Time.-imagejpg-300x161.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/Improving-Online-Learning-Experiences-One-Secured-Endpoint-At-A-Time.-imagejpg-768x412.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/08/Improving-Online-Learning-Experiences-One-Secured-Endpoint-At-A-Time.-imagejpg-600x322.jpg 600w" sizes="(max-width: 637px) 100vw, 637px" /></p>
<p><strong>Bottom Line: </strong>Defining the perfect mix of cloud apps, platforms and secured endpoints to create compelling online learning experiences customizable to students&#8217; learning strengths is how schools are overcoming the challenge of virtual teaching.</p>
<p>There are over <a class="color-link" title="https://nces.ed.gov/fastfacts/display.asp?id=372#PK12_enrollment" href="https://nces.ed.gov/fastfacts/display.asp?id=372#PK12_enrollment" target="_blank" rel="nofollow noopener">56 million students in the U.S. alone</a> who are relying on remote learning apps, platforms and autonomous endpoint security to protect them as they pursue their education. School districts, online educators and teachers quickly realized the move to 100% online classes could mean the end to outdated mechanized approaches to teaching. Eager to teach using technologies that tailor individual learning programs to every student&#8217;s unique learning strengths, schools are combining cloud, e-learning and endpoint security with strong results. Combining technologies gives every student regardless of their socioeconomic background a chance to excel. The goal is to provide unique personalized instruction at scale using a teaching technique called scaffolding. Scaffolding stresses creating an individual learning plan for each student complete with reinforcement for each lesson.</p>
<p><strong>Why Cybersecurity Is The Cornerstone Of Online Learning </strong></p>
<p>Tailoring the latest technologies to the diverse needs of online learners is the easy part of creating an online learning program. Far more difficult is choosing the right endpoint security strategies to protect their identities, every one of their video conference sessions with peers and teachers and thwarting breach attempts. Parents, teachers, students and administrators all need to trust an e-learning platform to make it work. The bottom line is an e-learning platform needs to create and grow trust while being adaptive enough to meet students&#8217; unique learning needs.</p>
<p>Interested in learning more about how leading online educators are bringing together the latest cloud and autonomous endpoint security technologies to help students learn online, I recently interviewed <a class="color-link" title="https://www.linkedin.com/in/eric-ramos-62278b72/" href="https://www.linkedin.com/in/eric-ramos-62278b72/" target="_blank" rel="nofollow noopener">Eric Ramos Chief Technology Officer at Duarte Unified School District</a> and <a class="color-link" title="https://www.linkedin.com/in/dean-phillips-19593039/" href="https://www.linkedin.com/in/dean-phillips-19593039/" target="_blank" rel="nofollow noopener">Dean Phillips, Senior Technology Director</a>, <a class="color-link" title="https://www.linkedin.com/in/david-atkins-marketing/" href="https://www.linkedin.com/in/david-atkins-marketing/" target="_blank" rel="nofollow noopener">David Atkins, Director of Marketing and Communications</a> and <a class="color-link" title="https://www.linkedin.com/in/jennifer-shoaf-4b781029/" href="https://www.linkedin.com/in/jennifer-shoaf-4b781029/" target="_blank" rel="nofollow noopener">Jennifer Shoaf, Deputy Chief Academic Officer</a> at <a class="color-link" title="http://www.pacyber.org/" href="http://www.pacyber.org/" target="_blank" rel="nofollow noopener">PA Cyber</a>.  Duarte Unified School District (USD) serves the educational needs of 3,400 scholars at the elementary, K-8 and high school levels. The Pennsylvania Cyber Charter School (PA Cyber) in Midland, PA, is one of the most experienced and successful online K-12 public schools in the nation serving over 12,000 students. Together the group of education professionals provided valuable insights into how educators can combine cloud, collaboration and cybersecurity applications to create more personalized, effective learning experiences for students. David Atkins of PA Cyber says that their approach to e-learning is succeeding because they take a fully holistic view of the student, their family and their situation<em>. &#8220;Our collaboration with the student starts from the very moment that there&#8217;s interest in having some sort of cyber education. And we go from enrollments, all the way through any issues of that students could have, or the students family could have and take them all the way through graduation&#8217; </em>David said<em>. &#8220;We take the time to listen and see the student as a complete person.&#8221;</em></p>
<p>The following are the key insights based on our conversations:</p>
<ul>
<li><strong>Choosing to make cybersecurity the highest priority treats students as customers, protecting their unique online learning experiences while providing excellent access across all socioeconomic levels. </strong>That&#8217;s when online learning experiences excel. What&#8217;s impressive how committed the team of educators I spoke with is about making technology work as a catalyst to help every student achieve their educational goals across all socioeconomic levels. They&#8217;re also the most advanced at tailoring complex technologies to deliver customized online learning experiences with PA Cyber serving 12,000 remote students at once. &#8220;<em>Each of our students is different and they&#8217;re looking to accomplish different things and they learn in different ways. We have a different classroom options that they can choose from. And we have a lot of different scaffolding options in place when it comes to our instructional platform, &#8220;</em>Jennifer Shoaf, Deputy Chief Academic Officer at PA Cyber said. Eric Ramos, CTO at USD says that he and his staff <em>&#8220;reach out to teachers and staff members and provide them with the latest cybersecurity alerts and make sure they are aware of how their autonomous endpoint security platform is securing every laptop and making their job of staying in compliance to security protocols easy.&#8221; </em>Eric continued saying that, <em>&#8220;having an undeletable digital tether gives my staff, senior educators and me peace of mind, especially with summer here and the need to keep track of the Chromebooks out with students and families.&#8221;</em></li>
<li><strong>The more resilient the autonomous endpoint security on the laptop, the easier it is to secure, upgrade and locate each of them if they&#8217;re lost or stolen.</strong> Duarte Unified School District provides Chromebooks to students for use all year long, often also providing an Internet HotSpot as many students&#8217; families don&#8217;t have Internet access. PA Cyber provides students a Dell laptop and an entire technology kit that includes printers and peripherals as well. Having an undeletable digital tether to every laptop makes it possible to keep every system up to date on security and system patches. Dean Phillips, Senior Technology Director at PA Cyber, says that it&#8217;s been very helpful to know each laptop has active autonomous endpoint security running at all times. Dean says that endpoint management is a must-have for PA Cyber &#8220;<em>We&#8217;re using </em><a class="color-link" title="https://www.absolute.com/platform/persistence/application-persistence/" href="https://www.absolute.com/platform/persistence/application-persistence/" target="_blank" rel="nofollow noopener"><em>Absolute&#8217;s Persistence</em></a><em> to </em>ensure an always-on, two-way connection with our IT management solution, Kaseya®, which we use to remotely push out security patches, new applications and scripts.<em> That&#8217;s been great for students&#8217; laptops as we can keep updates current and know where the system is. Without an endpoint management solution on student laptops, it is very difficult to manage endpoints without that agent. So Absolute absolutely helps us with that as well. That&#8217;s been a big plus.&#8221; </em>Eric Ramos, CTO, says that <em>&#8220;</em><a class="color-link" title="https://www.absolute.com/media/1406/solution-sheet-education-absolute-software.pdf" href="https://www.absolute.com/media/1406/solution-sheet-education-absolute-software.pdf" target="_blank" rel="nofollow noopener"><em>Absolute</em></a><em> has been great, especially when student calls in and says they can&#8217;t find their laptop. I don&#8217;t know where it is. It&#8217;s lost or maybe stolen. We&#8217;re able to pull that up, figure out the last time it got pinged and we can locate that usually. Nine times out of 10, the student finds it by next day by just having that information. So that&#8217;s been crucial. It&#8217;s always been something we love having.&#8221;</em></li>
<li><strong>Standardize on a secure cloud platform that is flexible enough to support scaffolding or individualized learning yet hardened enough to protect every laptop connected to it via an undeletable digital tether.</strong> A major challenge both online schools face is keeping their cloud platforms adaptive enough to support students&#8217; varying skills yet also secure enough to protect every student online.  Dean Phillips, Senior Technology Director at PA Cyber, says that it&#8217;s best to <em>&#8220;keep technology as simple as possible for the students and families. Standardization is key, I think, with everything you do from a technology standpoint. Making sure that you build from the inside out from the core. Your applications and networks and making sure that that&#8217;s consistent all the way to the endpoint, I think that&#8217;s extremely important.&#8221;</em> PA Cyber&#8217;s lessons learned creating a secure and adaptive e-learning platform makes the goal of providing personalized instruction for every student achievable at scale.  Jennifer Shoaf, Deputy Chief Academic Officer at PA Cyber, explains how the school personalizes online instruction for every student. <em>&#8220;It all starts when the student first comes to PA Cyber and we try to get an understanding of where they are and where they should be and where they want to see themselves, whether it&#8217;s in a month or in a couple years, or when they graduate from our school. So one of the things that we pride ourselves on here at this school is allowing for multiple modes of instruction for our students,&#8221; </em>Jennifer said.</li>
<li><strong>Capitalizing on the excellent asset management reporting autonomous endpoint security solutions have, CTOs and senior IT directors are gaining new insights into how to improve learning effectiveness</strong>. Having resilient, persistent connections to every endpoint with an undeletable digital tether also provides invaluable asset management data. Eric Ramos of Duarte USD and Dean Phillips of PA Cyber are leaders in this area of e-learning today. Eric Ramos says that asset management and activity reports made possible by the autonomous endpoint platform he is using from <a class="color-link" title="https://www.path.absolute.com/education/duarte-unified-school-district" href="https://www.path.absolute.com/education/duarte-unified-school-district" target="_blank" rel="nofollow noopener">Absolute</a> makes getting prepared for senior management meetings easy.<em> &#8220;During principal meetings, I&#8217;m able to pull up these reports and say, look, these were the goals at the beginning of the year to use these four products at this amount of time. And here&#8217;s where you&#8217;re at on a small window. Or you can look at it over time and saying, this has been an increase here, this is a decrease here, these sites are doing really well with it, these sites may be not. But let&#8217;s now talk about what&#8217;s working for you. What are your teachers liking about the particular program? Or, program aside, how are your results coming about?</em>&#8221; Eric Ramos, CTO said.</li>
</ul>
<p><strong>Conclusion </strong></p>
<p>Delivering an excellent online learning experience needs to start with a cybersecurity strategy that includes autonomous endpoint security. Duarte USD and PA Cyber are leaders in this field, being among the first to see how combining core technologies while having an undeletable digital tether to every laptop is a must-have. Earning and growing the trust of parents, students, teachers and school administrators start with an endpoint security strategy that can adapt and grow as an e-learning program does.</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/161587/improving-online-learning-experiences-one-secured-endpoint-at-a-time/">Improving Online Learning Experiences One Secured Endpoint At A Time</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/QDNheXhWqUY" height="1" width="1" alt=""/>]]></content:encoded>
			<wfw:commentRss>https://www.enterpriseirregulars.com/161587/improving-online-learning-experiences-one-secured-endpoint-at-a-time/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">161587</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/161587/improving-online-learning-experiences-one-secured-endpoint-at-a-time/</feedburner:origLink></item>
		<item>
		<title>Why Security Needs To Be Integral To DevOps</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/Oi_R2FDG_-8/</link>
		<comments>https://www.enterpriseirregulars.com/161279/why-security-needs-to-be-integral-to-devops/#respond</comments>
		<pubDate>Mon, 27 Jul 2020 14:53:46 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[Application Security Testing (AST)]]></category>
		<category><![CDATA[BMC ADE]]></category>
		<category><![CDATA[CheckMarx]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[dev/ops]]></category>
		<category><![CDATA[DevSecOps Global Skills survey]]></category>
		<category><![CDATA[engineering]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>
		<category><![CDATA[Software Development Lifecycle (SDLC)]]></category>
		<category><![CDATA[Zero Trust Security]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=161279</guid>
		<description><![CDATA[<p>Bottom Line: DevOps and security teams need to leave one-time gating inspections in the past and pursue a more collaborative real-time framework to achieve their shared compliance, security and time-to-market goals. Shorter product lifecycles the need to out-innovate competitors and exceed customer expectations with each new release are a few of the many reasons why [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/161279/why-security-needs-to-be-integral-to-devops/">Why Security Needs To Be Integral To DevOps</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-161280 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Security-Needs-To-Be-Integral-To-DevOps-image.jpg" alt="Why Security Needs To Be Integral To DevOps" width="626" height="451" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Security-Needs-To-Be-Integral-To-DevOps-image.jpg 959w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Security-Needs-To-Be-Integral-To-DevOps-image-300x216.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Security-Needs-To-Be-Integral-To-DevOps-image-768x553.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Security-Needs-To-Be-Integral-To-DevOps-image-600x432.jpg 600w" sizes="(max-width: 626px) 100vw, 626px" /></p>
<p><strong>Bottom Line:</strong> DevOps and security teams need to leave one-time gating inspections in the past and pursue a more collaborative real-time framework to achieve their shared compliance, security and time-to-market goals.</p>
<p>Shorter product lifecycles the need to out-innovate competitors and exceed customer expectations with each new release are a few of the many reasons why DevOps is so popular today. Traditional approaches to DevOps teams collaborating with security aren’t working today and product releases are falling behind or being rushed to-market leading to security gaps as a result.</p>
<p>Based on conversations with DevOps team leaders and my own experience being on a DevOps team the following are factors driving the urgency to integrate security into DevOps workflows:</p>
<ul>
<li>Engineering, DevOps and security teams each have their lexicon and way of communicating reinforced by siloed systems.</li>
<li>Time-to-market and launch delays are common when engineering, DevOps and security don’t have a unified system to use that includes automation tools to help scale tasks and updates.</li>
<li>Developers are doing Application Security Testing (AST) with tools that aren’t integrated into their daily development environments, making the process time-consuming and challenging to get done.</li>
<li>Limiting security to the testing and deployment phases of the Software Development Lifecycle (SDLC) is a bottleneck that jeopardizes the critical path, launch date and compliance of any new project.</li>
<li>70% of DevOps team members have not been trained on how to secure software adequately according to a <a class="color-link" title="https://www.computerweekly.com/news/450424614/Developers-lack-skills-needed-for-secure-DevOps-survey-shows" href="https://www.computerweekly.com/news/450424614/Developers-lack-skills-needed-for-secure-DevOps-survey-shows" target="_blank" rel="nofollow noopener">DevSecOps Global Skills survey</a>.</li>
</ul>
<p>Adding to the urgency is the volume of builds DevOps teams produce in software companies and enterprises daily and the need for having security integrated into DevOps becomes clear. Consider the fact that Facebook on Android alone does 50,000 to 60,000 builds a day <a class="color-link" title="https://engineering.fb.com/web/rapid-release-at-massive-scale/" href="https://engineering.fb.com/web/rapid-release-at-massive-scale/" target="_blank" rel="nofollow noopener">according to research cited</a> from <a class="color-link" title="https://www.checkmarx.com/" href="https://www.checkmarx.com/" target="_blank" rel="nofollow noopener">Checkmarx</a> who is taking on the challenge of integrating DevOps and security into a unified workflow. Their Software Security Platform unifies DevOps with security and provides static and interactive application security testing, newly launched software composition analysis and developer AppSec awareness and training programs to reduce and remediate risk from software vulnerabilities.</p>
<p><strong>Synchronizing Security Into DevOps Delivers Much Needed Speed &amp; Scale </strong></p>
<p>DevOps teams thrive in organizations built for speed, continuous integration, delivery and improvement. Contrast the high-speed always-on nature of DevOps teams with the one-time gating inspections security teams use to verify regulatory, industry and internal security and compliance standards and it’s clear security’s role in DevOps needs to change. Integrating security into DevOps is proving to be very effective at breaking through the roadblocks that stand in the way of getting projects done on time and launched into the market.  Getting the security and DevOps team onto the same development platform is needed to close the gaps between the two teams and accelerate development. Of the many approaches available for accomplishing this Checkmarx’s approach to integrating Application Security Testing into DevOps shown below is among the most comprehensive:</p>
<p><img class="  wp-image-161283 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Checkmarx.jpg" alt="Why Security Needs To Be Integral To DevOps" width="639" height="268" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Checkmarx.jpg 1090w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Checkmarx-300x126.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Checkmarx-768x321.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Checkmarx-600x251.jpg 600w" sizes="(max-width: 639px) 100vw, 639px" /></p>
<p><strong>Making DevOps A Core Strength Of An Organization</strong></p>
<p>By 2025 nearly two-thirds of enterprises will be prolific software producers with code deployed daily to meet constant demand and over 90% of new apps will be cloud-native, enabling agility and responsiveness according to <a class="color-link" title="https://www.idc.com/getdoc.jsp?containerId=US45599219" href="https://www.idc.com/getdoc.jsp?containerId=US45599219" target="_blank" rel="nofollow noopener">IDC FutureScape: Worldwide IT Industry 2020 Predictions.</a> IDC also predicts there will be 1.6 times more developers than now, all working in collaborative systems to enable innovation. The bottom line is that every company will be a technology company in the next five years according to IDC’s predictions.</p>
<p>To capitalize on the pace of change happening today driven by DevOps, organizations need frameworks that deliver the following:</p>
<ul>
<li><strong>Greater agility and market responsiveness</strong> – Organizations need to create operating models that integrate business, operations and technology into stand-alone businesses-within-the-business domains.</li>
<li><strong>Customer Centricity at the core of business models</strong> – The best organizations leverage a connected economy to ensure that they can meet and exceed customer expectations.  By creating an ecosystem that caters to every touchpoint of the customer journey using technology, these organizations seem to anticipate their customer needs and deliver the goods and services needed at the right time via the customer’s preferred channel.  As a result, successful organizations see growth from their existing customer base while they acquire new ones.</li>
<li><strong>Have a DNA the delivers a wealth of actionable Insights</strong> – Organizations well-positioned to turn data into insights that drive actions to serve and anticipate customer needs are ahead of competitors today regarding time-to-market.  These organizations know how to pull all the relevant information, capabilities and people together so they can act quickly and efficiently in making the right decisions. They are the companies that will know the outcome of their actions before they take them and they will be able to anticipate their success.</li>
</ul>
<p>BMC’s Autonomous Digital Enterprise framework, shown below highlights how companies that have an innovation mindset and the three common traits of agility, customer centricity and actionable insights at their foundation have greater consistency and technology maturity in their business model characteristics compared to competitors. They also can flex and support fundamental operating model characteristics and key technology-enabled tenets. These tenets include delivering a transcendent customer experience, automating customer transactions and providing automation everywhere seeing enterprise DevOps as a natural evolution of DevOps, enabling a business to be more data-driven and achieving more adaptive cybersecurity in a Zero-Trust framework.</p>
<p><img class="  wp-image-161281 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/BMC-image.jpg" alt="BMC image" width="378" height="345" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/BMC-image.jpg 656w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/BMC-image-300x274.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/BMC-image-600x548.jpg 600w" sizes="(max-width: 378px) 100vw, 378px" /></p>
<p><strong>Conclusion </strong></p>
<p>Meeting the challenge of integrating security in DevOps provides every organization with an opportunity to gain greater agility and market responsiveness, become more customer-centric and develop the DNA to be more data-driven. These three goals are achievable when organizations look to how they can build on their existing strengths and reinvent themselves for the future. As DevOps success goes so goes the success of any organization. Checkmarx’s approach to putting security at the center of DevOps is helping to break down the silos that exist between engineering, DevOps and security. To attain greater customer-centricity, become more data-driven and out-innovate competitors, organizations are adopting frameworks including BMC’s Autonomous Digital Enterprise to reinvent themselves and be ready to compete in the future now.</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/161279/why-security-needs-to-be-integral-to-devops/">Why Security Needs To Be Integral To DevOps</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/Oi_R2FDG_-8" height="1" width="1" alt=""/>]]></content:encoded>
			<wfw:commentRss>https://www.enterpriseirregulars.com/161279/why-security-needs-to-be-integral-to-devops/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">161279</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/161279/why-security-needs-to-be-integral-to-devops/</feedburner:origLink></item>
		<item>
		<title>Dissecting The Twitter Hack With A Cybersecurity Evangelist</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/YMqHVdWBWRo/</link>
		<comments>https://www.enterpriseirregulars.com/161273/dissecting-the-twitter-hack-with-a-cybersecurity-evangelist/#respond</comments>
		<pubDate>Sun, 26 Jul 2020 22:24:16 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Artificial Intelligence Cybersecurity]]></category>
		<category><![CDATA[Centrify]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Louis Columbus]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Machine learning cybersecurity]]></category>
		<category><![CDATA[Privileged Access Management]]></category>
		<category><![CDATA[SIM Swapping]]></category>
		<category><![CDATA[twitter hack]]></category>
		<category><![CDATA[Uber]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=161273</guid>
		<description><![CDATA[<p>Bottom Line: Shattering the false sense of security in tech, the recent Twitter hack blended altruism, fame, greed, social engineering via SIM swapping and insider threats to steal $120,000 from victims when the economic and political damage could have been far worse. Targeting the most influential celebrities on Twitter, hackers orchestrated a social engineering-based attack [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/161273/dissecting-the-twitter-hack-with-a-cybersecurity-evangelist/">Dissecting The Twitter Hack With A Cybersecurity Evangelist</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-161274 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Dissecting-The-Twitter-Hack-With-A-Cybersecurity-Evangelist-final.jpg" alt="Dissecting The Twitter Hack With A Cybersecurity Evangelist" width="639" height="359" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Dissecting-The-Twitter-Hack-With-A-Cybersecurity-Evangelist-final.jpg 1240w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Dissecting-The-Twitter-Hack-With-A-Cybersecurity-Evangelist-final-300x168.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Dissecting-The-Twitter-Hack-With-A-Cybersecurity-Evangelist-final-768x431.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Dissecting-The-Twitter-Hack-With-A-Cybersecurity-Evangelist-final-600x337.jpg 600w" sizes="(max-width: 639px) 100vw, 639px" /></p>
<p><strong>Bottom Line:</strong> Shattering the false sense of security in tech, the recent Twitter hack blended altruism, fame, greed, social engineering via SIM swapping and insider threats to steal $120,000 from victims when the economic and political damage could have been far worse.</p>
<p>Targeting the most influential celebrities on Twitter, hackers orchestrated a social engineering-based attack Wednesday promoting a cryptocurrency scam. Business leaders, celebrities, politicians and billionaires&#8217; accounts were hacked using Twitter&#8217;s administrative tools. Personal Twitter accounts hacked include those of Amazon CEO Jeff Bezos, Joe Biden, Tesla CEO Elon Musk, President Barack Obama, Bill Gates, Warren Buffet and others. Apple and Uber&#8217;s Twitter accounts were also hacked.</p>
<p>Using SIM swapping, in which threat actors trick, coerce or bribe employees of their victims to gain access to privileged account credentials and administrative tools, hackers were able first to change the email address of each targeted account. Next, two-factor authentication was turned off so when an alert was sent of the account change it went to the hacker&#8217;s email address. With the targeted accounts under their control, hackers began promoting their cryptocurrency scam. While not all details of the attack have surfaced <a class="color-link" title="https://www.vice.com/en_us/article/jgxd3d/twitter-insider-access-panel-account-hacks-biden-uber-bezos" href="https://www.vice.com/en_us/article/jgxd3d/twitter-insider-access-panel-account-hacks-biden-uber-bezos" target="_blank" rel="nofollow noopener">Motherboard&#8217;s story of how hackers convinced a Twitter employee to help them the hijack accounts</a> makes for fascinating reading.</p>
<p><strong>Dissecting The Hack </strong></p>
<p>Interested in dissecting the hack from a cybersecurity standpoint, I contacted <a class="color-link" title="https://www.linkedin.com/in/torstengeorge/" href="https://www.linkedin.com/in/torstengeorge/" target="_blank" rel="nofollow noopener">Dr. Torsten George</a>, Cybersecurity Evangelist and industry expert from Centrify. Torsten is also a leading authority on privileged access management and how to thwart breaches involving privileged access credentials.</p>
<p><strong>Louis: </strong> What was your initial impression upon breaking news of the hack and what did you believe would cause such a massive hack of celebrity and leading political figures accounts this past week?</p>
<p><strong>Torsten:</strong> When the news broke, the media probably polled other security experts and the first initial reaction was, &#8216;Oh, that&#8217;s a massive attack, most likely a credential-based attack,&#8217; because 80% of today&#8217;s data breaches go back to privilege access abuse. They are typically first triggered by phishing attacks, the precursor to many attacks where the attackers tried to capture these credentials and then leverage them to attack their victim&#8217;s organizations.</p>
<p>So, the breaking news indicated that most likely, somebody was able to leverage a compromised credential to enter into the Twitter environment and take over accounts. However, more and more information became available, with screenshots being shared of internal Twitter tools. For me, that raised a red flag, because in a typical attack pattern we&#8217;re seeing three distinct phases in the cyber-attack lifecycle: the compromise, the exploration phase and the exfiltration of sensitive data, which includes covering up tracks and potentially creating a backdoor for future attacks.</p>
<p>When performing reconnaissance, hackers commonly try to identify regular IT schedules, security measures, network traffic flows and scan the entire IT environment to gain an accurate picture of the network resources, privileged accounts and services. Domain controllers, Active Directory and servers are prime reconnaissance targets to hunt for additional privileged credentials and privileged access.</p>
<p>They wouldn&#8217;t necessarily look for administrative tools that could be leveraged for their attack unless they have intimate knowledge that those tools exist in the victim&#8217;s environment — be it by having worked for the company in the past or representing an insider threat.</p>
<p><strong>Louis:</strong> What&#8217;s the anatomy of an insider attack, based on your experience?</p>
<p><strong>Torsten</strong>: As was later confirmed by Twitter, it became very apparent that this is a case of insider threats, where you have an insider that has been leveraged for this attack. The most common insider threats can be defined by the intent and motivation of the individuals involved. The 2019 Verizon Insider Threat Report defines five distinct insider threats based on data breach scenarios and they all have excellent, accurate names: the Careless Worker, the Inside (often recruited) Agent, the Disgruntled Employee, the Malicious Insider and the Feckless Third-Party.</p>
<p>Considering the global environment we&#8217;re facing right now, with Covid-19 and other related economic hardships, the risk of insider threats is exacerbated, as pending furloughs or pay cuts may tempt employees to exfiltrate data to secure a new job or make up for income losses.</p>
<p>So a privileged administrator might be more open to people that approach them and say, &#8216;Would you be willing to share with us your access credentials, or would you do something on our behalf to exfiltrate data or to manipulate data?&#8217; That risk has increased dramatically across all industries.</p>
<p>So it turned out the first suspicion was phishing attacks, followed by compromised credentials. It turns out to be an insider threat. Organizations need to be prepared for that.</p>
<p><strong>Louis:</strong> What can companies do to reduce the likelihood a malicious insider will hack them?</p>
<p><strong>Torsten:</strong> It becomes a little bit trickier when you deal with a malicious insider because they most likely know your environment, they might know your defense mechanisms and they might know the security tools that your likely using. So they can bypass these security controls and try to gain the control of data that they can then profit from.</p>
<p>Organizations have to rethink the way that they&#8217;ve structured their defense controls and truly take an approach of an in-depth strategy with a different layer of defenses. The first layer that comes to mind in this particular case is multi-factor authentication (MFA) which is still low-hanging fruit. There are still many organizations out there that are not taking advantage of implementing MFA.</p>
<p>While MFA is highly recommended, it isn&#8217;t as effective against insider threats because they have that second factor of authentication and can pass those challenges. Organizations need to go beyond MFA if they want to have a layered security strategy.</p>
<p><strong>Louis:</strong> What are some of the ways they can go beyond MFA to avoid being the victim of an insider threat?</p>
<p><strong>Torsten:</strong> A very important component of your defense strategy should be the approach of zero standing privileges, which is something Gartner recommends to its clients. That means that I have normal privileges and entitlements to do my job, like answering emails and using the Internet, but that&#8217;s probably all I need. If I need more access, I&#8217;ll have to elevate my privilege for the time needed to do that particular task but then rescind that privilege once it&#8217;s done.</p>
<p>If I have zero standing privileges – even if somebody compromises my credential, even if I&#8217;m an insider – I don&#8217;t have immediate access to the keys to the kingdoms to do whatever I want.</p>
<p>And before privilege elevation, organizations should require context through a formal request. For example, require the user to submit a ticket through ServiceNow or any other IT Service Management platform to detail what they need to access, for how long and to do what. That way, there is an auditing trail and an approval process. If the threat actor – whether insider or not – doesn&#8217;t do this they don&#8217;t get privileged access to that target system.</p>
<p><strong>Louis:</strong> Besides those perhaps expected controls, what other controls might have helped in this particular scenario?</p>
<p><strong>Torsten:</strong> Organizations should also take advantage of modern tools to leverage machine learning technology, so that looks at user behavior and risk factors to also get a hold of these insider attacks. All the other security controls are more tailored towards external preparation at first. Still, once you implement machine learning technology and user behavior analytics that&#8217;s where you also can capture insider threats.</p>
<p>Machine learning can look for suspicious activity, such as a target being accessed outside of a typical maintenance window, or is the administrator logging in from a different location or device than usual. It can then trigger an MFA request and also issue a real-time alert, regardless of whether the MFA challenge is successfully resolved.</p>
<p>Furthermore, in the case of Twitter, there are privacy and regulatory concerns that could also be additional triggers for real-time alerts and to shut down this activity automatically. Regulations like the CCPA (California Consumer Privacy Act) and GDPR (General Data Protection Regulation) mean that platforms like Twitter have to be very careful with any access to or manipulation of a customer&#8217;s feed. That could – and should have – instantly triggered a real-time alert when an administrator was posting on behalf of a user.</p>
<p><strong>Louis:</strong> Do you think this is going to be the start of an entirely new era of hacks where hackers will pay off internal employees for promotional messages?</p>
<p><strong>Torsten:</strong> Quite frankly, we have seen an uptick since the start of the Covid-19 pandemic. And I believe now that this Twitter attack has been covered in the press so much, you will have copycats that will try to do the same. Some of them will also target social media platforms, but others that might be a little bit smarter because social media is easily detectable if something goes wrong. An industry like healthcare could be a prime target and there is already news that Russian hackers are attacking healthcare providers and research labs to try to gain access to vaccine research.</p>
<p><strong>Louis:</strong> Given how significant this hack is in terms of the progression or the growing sophistication of threats, what are the top three predictions you have for the rest of 2020?</p>
<p><strong>Torsten:</strong> Ransomware is an example of a technique that has changed quite significantly in two ways. First, they are no longer only delivered via an email, but also via social media platforms, SMS messages and more. Second, ransomware is no longer only focused on shutting down business operations. The most recent example with EDP Renewables North American, a subsidiary of an European-based electric utilities company, showed that hackers leveraged ransomware to exfiltrate data. Not to lock it down, but to exfiltrate data and then ask for ransom from their victim to not publish the data on the Dark Web.</p>
<p>Second, as I&#8217;ve already covered, the current economic hardships of the pandemic will cause more people to jump on the bandwagon and become cybercriminals. And these aren&#8217;t the people you see in movies – dark characters in hoodies using sophisticated hacking techniques to breach the government. These are your neighbors, the little boys next door. For them it&#8217;s not a big deal to become a cyber-criminal.</p>
<p>Third, as you&#8217;d expect, the number of cyber-attacks will increase as a result and they will continue to find new and innovative ways to find the easiest way in. The Twitter incident taught us that there was no technology &#8220;breach&#8221; required. It was just finding the right person with the right privileges and paying them to do 25 Tweets. That&#8217;s an easy payday.</p>
<p>I think this whole crisis that we&#8217;re going through will see a major uptick in attacks from the traditional cyber hackers, but also from a whole bunch of newbies and greenhorns that will try out their luck and see if they can make a buck. Either by ransomware attacks, phishing attacks, social engineering or any combination thereof.</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/161273/dissecting-the-twitter-hack-with-a-cybersecurity-evangelist/">Dissecting The Twitter Hack With A Cybersecurity Evangelist</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/YMqHVdWBWRo" height="1" width="1" alt=""/>]]></content:encoded>
			<wfw:commentRss>https://www.enterpriseirregulars.com/161273/dissecting-the-twitter-hack-with-a-cybersecurity-evangelist/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">161273</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/161273/dissecting-the-twitter-hack-with-a-cybersecurity-evangelist/</feedburner:origLink></item>
		<item>
		<title>10 Ways AI Is Improving New Product Development</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/aQ8RhOTYwJI/</link>
		<comments>https://www.enterpriseirregulars.com/161206/10-ways-ai-is-improving-new-product-development/#respond</comments>
		<pubDate>Sat, 25 Jul 2020 16:41:57 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[BMC]]></category>
		<category><![CDATA[BMC Autonomous Digital Enterprise]]></category>
		<category><![CDATA[Capgemini]]></category>
		<category><![CDATA[dev/ops]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Nissan]]></category>
		<category><![CDATA[product development]]></category>
		<category><![CDATA[startups]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=161206</guid>
		<description><![CDATA[<p>Startups&#8217; ambitious AI-based new product development is driving AI-related investment with $16.5B raised in 2019, driven by 695 deals according to PwC/CB Insights MoneyTree Report, Q1 2020. AI expertise is a skill product development teams are ramping up their recruitment efforts to find, with over 7,800 open positions on Monster, over 3,400 on LinkedIn and [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/161206/10-ways-ai-is-improving-new-product-development/">10 Ways AI Is Improving New Product Development</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-161207 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/10-ways-AI-Is-Improving-New-Product-Development.jpg" alt="10 ways AI Is Improving New Product Development" width="639" height="368" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/10-ways-AI-Is-Improving-New-Product-Development.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/10-ways-AI-Is-Improving-New-Product-Development-300x173.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/10-ways-AI-Is-Improving-New-Product-Development-768x442.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/10-ways-AI-Is-Improving-New-Product-Development-600x346.jpg 600w" sizes="(max-width: 639px) 100vw, 639px" /></p>
<ul>
<li>Startups&#8217; ambitious AI-based new product development is driving AI-related investment with $16.5B raised in 2019, driven by 695 deals according to PwC/CB Insights MoneyTree Report, Q1 2020.</li>
<li>AI expertise is a skill product development teams are ramping up their recruitment efforts to find, with over 7,800 open positions on Monster, over 3,400 on LinkedIn and over 4,200 on Indeed as of today.</li>
<li>One in ten enterprises now uses ten or more AI applications, expanding the Total Available Market for new apps and related products, including chatbots, process optimization and fraud analysis, according to MMC Ventures.</li>
</ul>
<p>From startups to enterprises racing to get new products launched, AI and machine learning (ML) are making solid contributions to accelerating new product development. There are 15,400 job positions for DevOps and product development engineers with AI and machine learning today on Indeed, LinkedIn and Monster combined. <a class="color-link" title="https://www.capgemini.com/wp-content/uploads/2018/06/Digital-Engineering-Report_Digital1.pdf" href="https://www.capgemini.com/wp-content/uploads/2018/06/Digital-Engineering-Report_Digital1.pdf" target="_blank" rel="nofollow noopener">Capgemini predicts the size of the connected products market will range between $519B to $685B this year</a> with AI and ML-enabled services revenue models becoming commonplace.</p>
<p>Rapid advances in AI-based apps, products and services will also force the consolidation of the IoT platform market. The IoT platform providers concentrating on business challenges in vertical markets stand the best chance of surviving the coming IoT platform shakeout. As AI and ML get more ingrained in new product development, the IoT platforms and ecosystems supporting smarter, more connected products need to make plans now how they&#8217;re going to keep up. Relying on technology alone, like many IoT platforms are today, isn&#8217;t going to be enough to keep up with the pace of change coming.   The following are 10 ways AI is improving new product development today:</p>
<ul>
<li><strong>14% of enterprises who are the most advanced using AI and ML for new product development earn more than 30% of their revenues from fully digital products or services and lead their peers is successfully using nine key technologies and tools.</strong> PwC found that Digital Champions are significantly ahead in generating revenue from new products and services and more than a fifth of champions (29%) earn more than 30% of revenues from new products within two years of information. Digital Champions have high expectations for gaining greater benefits from personalization as well. The following graphic from <a class="color-link" title="https://www.pwc.de/de/digitale-transformation/pwc-studie-digital-product-development-2025.pdf" href="https://www.pwc.de/de/digitale-transformation/pwc-studie-digital-product-development-2025.pdf" target="_blank" rel="nofollow noopener">Digital Product Development 2025: Agile, Collaborative, AI-Driven and Customer Centric,</a> PwC, 2020 (PDF, 45 pp.) compares Digital Champions&#8217; success with AI and ML-based new product development tools versus their peers:</li>
</ul>
<p><img class="  wp-image-161209 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-1-10-ways-AI-Is-Improving-New-Product-Development.jpg" alt="10 Ways AI Is Improving New Product Development" width="636" height="374" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-1-10-ways-AI-Is-Improving-New-Product-Development.jpg 963w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-1-10-ways-AI-Is-Improving-New-Product-Development-300x176.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-1-10-ways-AI-Is-Improving-New-Product-Development-768x451.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-1-10-ways-AI-Is-Improving-New-Product-Development-600x353.jpg 600w" sizes="(max-width: 636px) 100vw, 636px" /></p>
<ul>
<li><strong>61% of enterprises who are the most advanced using AI and ML (Digital Champions) use fully integrated Product Lifecycle Management (PLM) systems compared to just 12% of organizations not using AI/ML today (Digital Novices).</strong> Product Development teams the most advanced in their use of AL &amp; ML achieve greater economies of scale, efficiency and speed gains across the three core areas of development shown below. Digital Champions concentrate on gaining time-to-market and speed advantages in the areas of Digital Prototyping, PLM, co-creation of new products with customers, Product Portfolio Management and Data Analytics and AI adoption:</li>
</ul>
<p><img class="  wp-image-161211 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-2-10-ways-AI-Is-Improving-New-Product-Development-1.jpg" alt="" width="635" height="610" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-2-10-ways-AI-Is-Improving-New-Product-Development-1.jpg 743w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-2-10-ways-AI-Is-Improving-New-Product-Development-1-300x287.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-2-10-ways-AI-Is-Improving-New-Product-Development-1-600x575.jpg 600w" sizes="(max-width: 635px) 100vw, 635px" /></p>
<ul>
<li><strong>AI is actively being used in the planning, implementation and fine-tuning of interlocking railway equipment product lines and systems. </strong> Engineer-to-order product strategies introduce an exponential number of product, service and network options. Optimizing product configurations require an AI-based logic solver that can factor in all constraints and create a Knowledge Graph to guide deployment. Siemens&#8217; approach to using AI to find the optimal configuration out of 10<sup>90</sup> possible combinations provides insights into how AI can help with new product development on a large scale. Source: Siemens, <a class="color-link" title="https://assets.new.siemens.com/siemens/assets/public.1559011182.cb8f9288-6f4a-4568-b8fe-7a1c03deef5b.15-22-may-en-ai-presentation-sid-2019-dr--michael-may-en-final-0.pdf" href="https://assets.new.siemens.com/siemens/assets/public.1559011182.cb8f9288-6f4a-4568-b8fe-7a1c03deef5b.15-22-may-en-ai-presentation-sid-2019-dr--michael-may-en-final-0.pdf" target="_blank" rel="nofollow noopener">Next Level AI – Powered by Knowledge Graphs and Data Thinking, Siemens China Innovation Day, Michael May</a>, Chengdu, May 15, 2019.</li>
</ul>
<p><img class="  wp-image-161213 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-3-10-ways-AI-Is-Improving-New-Product-Development.jpg" alt="10 Ways AI Is Improving New Product Development" width="636" height="383" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-3-10-ways-AI-Is-Improving-New-Product-Development.jpg 773w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-3-10-ways-AI-Is-Improving-New-Product-Development-300x180.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-3-10-ways-AI-Is-Improving-New-Product-Development-768x462.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-3-10-ways-AI-Is-Improving-New-Product-Development-600x361.jpg 600w" sizes="(max-width: 636px) 100vw, 636px" /></p>
<ul>
<li><strong>Eliminating the roadblocks to getting new products launched starts with using AI to improve demand forecast accuracy. </strong>Honeywell is using AI to reduce energy costs and negative price variance by tracking and analyzing price elasticity and price sensitivity as well. Honeywell is integrating AI and machine-learning algorithms into procurement, strategic sourcing and cost management getting solid returns across the new product development process. Source: <a class="color-link" title="https://www.honeywellprocess.com/library/news-and-events/presentations/2017-HUG-Honeywell-Connected-Plant-Analytics-and-Beyond.pdf" href="https://www.honeywellprocess.com/library/news-and-events/presentations/2017-HUG-Honeywell-Connected-Plant-Analytics-and-Beyond.pdf" target="_blank" rel="nofollow noopener">Honeywell Connected Plant: Analytics and Beyond</a>. (23 pp., PDF, no opt-in) 2017 Honeywell User&#8217;s Group.</li>
</ul>
<p><img class="  wp-image-161214 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-4-10-ways-AI-Is-Improving-New-Product-Development.jpg" alt="10 Ways AI Is Improving New Product Development" width="637" height="379" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-4-10-ways-AI-Is-Improving-New-Product-Development.jpg 762w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-4-10-ways-AI-Is-Improving-New-Product-Development-300x179.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-4-10-ways-AI-Is-Improving-New-Product-Development-600x357.jpg 600w" sizes="(max-width: 637px) 100vw, 637px" /></p>
<ul>
<li><strong>Relying on AI-based techniques to create and fine-tune propensity models that define product line extensions and add-on products that deliver the most profitable cross-sell and up-sell opportunities by product line, customer segment and persona. </strong>It&#8217;s common to find data-driven new product development and product management teams using propensity models to define the products and services with the highest probability of being purchased. Too often, propensity models are based on imported data, built-in Microsoft Excel, making their ongoing use time-consuming. AI is streamlining creation, fine-tuning and revenue contributions of up-sell and cross-sell strategies by automating the entire progress. The screen below is an example of a propensity model created in Microsoft Power BI.</li>
</ul>
<p><img class="  wp-image-161215 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-5-10-ways-AI-Is-Improving-New-Product-Development.jpg" alt="10 Ways AI Is Improving New Product Development" width="638" height="335" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-5-10-ways-AI-Is-Improving-New-Product-Development.jpg 767w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-5-10-ways-AI-Is-Improving-New-Product-Development-300x157.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-5-10-ways-AI-Is-Improving-New-Product-Development-600x314.jpg 600w" sizes="(max-width: 638px) 100vw, 638px" /></p>
<ul>
<li><strong>AI is enabling the next generation of frameworks that reduce time-to-market while improving product quality and flexibility in meeting unique customization requirements on every customer order</strong>. AI is making it possible to synchronize better suppliers, engineering, DevOps, product management, marketing, pricing, sales and service to ensure a higher probability of a new product succeeding in the market. Leaders in this area include <a class="color-link" title="https://www.bmc.com/corporate/autonomous-digital-enterprise.html" href="https://www.bmc.com/corporate/autonomous-digital-enterprise.html" target="_blank" rel="nofollow noopener">BMC&#8217;s Autonomous Digital Enterprise</a> (ADE). BMC&#8217;s ADE framework shows the potential to deliver next-generation business models for growth-minded organizations looking to run and reinvent their businesses with AI/ML capabilities and deliver value with competitive differentiation enabled by agility, customer centricity and actionable insights. The ADE framework is capable of flexing and responding more quickly to customer requirements than competitive frameworks due to the following five factors: proven ability to deliver a transcendent customer experience; automated customer interactions and operations across distributed organizations; seeing enterprise DevOps as natural evolution of software DevOps; creating the foundation for a data-driven business that operates with a data mindset and analytical capabilities to enable new revenue streams; and a platform well-suited for adaptive cybersecurity. Taken together, BMC&#8217;s ADE framework is what the future of digitally-driven business frameworks look like that can scale to support AI-driven new product development. The following graphic compares the BMC ADE framework (left) and the eight factors driving digital product development as defined by PwC (right) through their extensive research. For more information on <a class="color-link" title="https://www.bmc.com/corporate/autonomous-digital-enterprise.html?vu=ade" href="https://www.bmc.com/corporate/autonomous-digital-enterprise.html?vu=ade" target="_blank" rel="nofollow noopener">BMC&#8217;s ADE framework, please see BMC&#8217;s Autonomous Digital Enterprise site.</a> For additional information on PwC&#8217;s research, please see the document <a class="color-link" title="https://www.pwc.de/de/digitale-transformation/pwc-studie-digital-product-development-2025.pdf" href="https://www.pwc.de/de/digitale-transformation/pwc-studie-digital-product-development-2025.pdf" target="_blank" rel="nofollow noopener">Digital Product Development 2025: Agile, Collaborative, AI-Driven and Customer Centric,</a> PwC, 2020 (PDF, 45 pp.).</li>
</ul>
<p><img class="  wp-image-161217 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-6-10-ways-AI-Is-Improving-New-Product-Development.jpg" alt="10 Ways AI Is Improving New Product Development" width="639" height="267" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-6-10-ways-AI-Is-Improving-New-Product-Development.jpg 965w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-6-10-ways-AI-Is-Improving-New-Product-Development-300x125.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-6-10-ways-AI-Is-Improving-New-Product-Development-768x320.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/figure-6-10-ways-AI-Is-Improving-New-Product-Development-600x250.jpg 600w" sizes="(max-width: 639px) 100vw, 639px" /></p>
<ul>
<li><strong>Using AI to analyze and provide recommendations on how product usability can be improved continuously. </strong>It&#8217;s common for DevOps, engineering and product management to run A/B tests and multivariate tests to identify the usability features, workflows and app &amp; service responses customers prefer. Based on personal experience, one of the most challenging aspects of new product development is designing an effective, engaging and intuitive user experience that turns usability into a strength for the product. When AI techniques are part of the core new product development cycle, including usability, delivering enjoyable customer experiences, becomes possible. Instead of a new app, service, or device is a chore to use, AI can provide insights to make the experience intuitive and even fun.</li>
<li><strong>Forecasting demand for new products, including the causal factors that most drive new sales is an area AI is being applied to today with strong results.</strong> From the pragmatic approaches of asking channel partners, indirect and direct sales teams, how many of a new product they will sell to using advanced statistical models, there is a wide variation in how companies forecast demand for a next-generation product. AI and ML are proving to be valuable at taking into account causal factors that influence demand yet had not been known of before.</li>
<li><strong>Designing the next generation of Nissan vehicles using AI is streamlining new product development, trimming weeks off new vehicle development schedules.</strong> Nissan&#8217;s pilot program for using AI to fast-track new vehicle designs is called DriveSpark. It was launched in 2016 as an experimental program and has since proven valuable for accelerating new vehicle development while ensuring compliance and regulatory requirements are met. They&#8217;ve also used AI to extend the lifecycles of existing models as well. For more information, see the article, <a class="color-link" title="https://www.drivespark.com/four-wheelers/2016/nissan-build-artificial-intelligence-017266.html" href="https://www.drivespark.com/four-wheelers/2016/nissan-build-artificial-intelligence-017266.html" target="_blank" rel="nofollow noopener">DriveSpark, &#8220;Nissan&#8217;s Idea: Let An Artificial Intelligence Design Our Cars,&#8221; September 2016.</a></li>
<li><strong>Using generative design algorithms that rely on machine learning techniques to factor in design constraints and provide an optimized product design. </strong>Having constraint-optimizing logic within a CAD design environment helps GM attain the goal of rapid prototyping. Designers provide definitions of the functional requirements, materials, manufacturing methods and other constraints. In May 2018, General Motors adopted Autodesk generative design software to optimize for weight and other key product criteria essential for the parts being designed to succeed with additive manufacturing. The solution was recently tested with the prototyping of a seatbelt bracket part, which resulted in a single-piece design that is 40% lighter and 20% stronger than the original eight component design. Please see the Harvard Business School case analysis, <a class="color-link" title="https://digital.hbs.edu/platform-rctom/submission/project-dreamcatcher-can-generative-design-accelerate-additive-manufacturing/" href="https://digital.hbs.edu/platform-rctom/submission/project-dreamcatcher-can-generative-design-accelerate-additive-manufacturing/" target="_blank" rel="nofollow noopener">Project Dreamcatcher: Can Generative Design Accelerate Additive Manufacturing? for additional information</a>.</li>
</ul>
<p><strong><u>Additional reading:</u></strong></p>
<p><a class="color-link" title="https://www.pwc.com/us/en/services/consulting/library/artificial-intelligence-predictions-2020.html" href="https://www.pwc.com/us/en/services/consulting/library/artificial-intelligence-predictions-2020.html" target="_blank" rel="nofollow noopener">2020 AI Predictions, Five ways to go from reality check to real-world payoff,</a> PwC Consulting</p>
<p>Accenture, <a class="color-link" title="https://www.accenture.com/t20180327t080053z__w__/us-en/_acnmedia/pdf-74/accenture-pov-manufacturing-digital-final.pdf#zoom=50" href="https://www.accenture.com/t20180327t080053z__w__/us-en/_acnmedia/pdf-74/accenture-pov-manufacturing-digital-final.pdf#zoom=50" target="_blank" rel="nofollow noopener">Manufacturing The Future, Artificial intelligence will fuel the next wave of growth for industrial equipment companies</a> (PDF, 20 pp., no opt-in)</p>
<p><a class="color-link" title="https://image.s50.sfmc-content.com/lib/fe31117075640475701c74/m/1/0e4bc8df-abeb-4462-b868-186509bc5143.pdf" href="https://image.s50.sfmc-content.com/lib/fe31117075640475701c74/m/1/0e4bc8df-abeb-4462-b868-186509bc5143.pdf" target="_blank" rel="nofollow noopener">AI Priorities February 2020 5 ways to go from reality check to real-world pay off,</a> PwC, February, 2020 (PDF, 16 pp.)</p>
<p>Anderson, M. (2019). Machine learning in manufacturing.<em> Automotive Design &amp; Production, 131</em>(4), 30-32.</p>
<p>Bruno, J. (2019). How the IIoT can change business models.<em> Manufacturing Engineering, 163</em>(1), 12.</p>
<p><a class="color-link" title="https://www.pwc.de/de/digitale-transformation/digital-factories-2020-shaping-the-future-of-manufacturing.pdf" href="https://www.pwc.de/de/digitale-transformation/digital-factories-2020-shaping-the-future-of-manufacturing.pdf" target="_blank" rel="nofollow noopener">Digital Factories 2020: Shaping The Future Of Manufacturing</a>, PwC DE., 2017 (PDF, 48 pp.)</p>
<p><a class="color-link" title="https://www.pwc.de/de/digitale-transformation/pwc-studie-digital-product-development-2025.pdf" href="https://www.pwc.de/de/digitale-transformation/pwc-studie-digital-product-development-2025.pdf" target="_blank" rel="nofollow noopener">Digital Product Development 2025: Agile, Collaborative, AI Driven and Customer Centric,</a> PwC, 2020 (PDF, 45 pp.)</p>
<p><a class="color-link" title="https://www.mckinsey.com/business-functions/operations/our-insights/enabling-a-digital-and-analytics-transformation-in-heavy-industry-manufacturing" href="https://www.mckinsey.com/business-functions/operations/our-insights/enabling-a-digital-and-analytics-transformation-in-heavy-industry-manufacturing" target="_blank" rel="nofollow noopener">Enabling a digital and analytics transformation in heavy-industry manufacturing</a>, McKinsey &amp; Company, December 19, 2019</p>
<p><a class="color-link" title="https://www.strategyand.pwc.com/gx/en/insights/industry4-0.html" href="https://www.strategyand.pwc.com/gx/en/insights/industry4-0.html" target="_blank" rel="nofollow noopener">Global Digital Operations 2018 Survey, Strategy&amp;,</a> PwC, 2018</p>
<p><em>Governance and Management Economics, 7</em>(2), 31-36.</p>
<p>Greenfield, D. (2019). Advice on scaling IIoT projects.<em> ProFood World </em></p>
<p>Hayhoe, T., Podhorska, I., Siekelova, A., &amp; Stehel, V. (2019). Sustainable manufacturing in industry 4.0: Cross-sector networks of multiple supply chains, cyber-physical production systems and AI-driven decision-making.<em> Journal of Self-</em></p>
<p><a class="color-link" title="https://www.mckinsey.com/business-functions/operations/our-insights/industrys-fast-mover-advantage-enterprise-value-from-digital-factories" href="https://www.mckinsey.com/business-functions/operations/our-insights/industrys-fast-mover-advantage-enterprise-value-from-digital-factories" target="_blank" rel="nofollow noopener">Industry&#8217;s fast-mover advantage: Enterprise value from digital factories</a>, McKinsey &amp; Company, January 10, 2020</p>
<p>Kazuyuki, M. (2019). <em>Digitalization of manufacturing process and open innovation: Survey results of small and medium-sized firms in japan</em>. St. Louis: Federal Reserve Bank of St Louis.</p>
<p><a class="color-link" title="https://www.mckinsey.com/business-functions/operations/our-insights/lighthouse-manufacturers-lead-the-way" href="https://www.mckinsey.com/business-functions/operations/our-insights/lighthouse-manufacturers-lead-the-way" target="_blank" rel="nofollow noopener">&#8216;Lighthouse&#8217; manufacturers lead the way—can the rest of the world keep up? </a> McKinsey &amp; Company, January 7, 2019</p>
<p><a class="color-link" title="https://emerj.com/ai-sector-overviews/machine-learning-in-manufacturing/" href="https://emerj.com/ai-sector-overviews/machine-learning-in-manufacturing/" target="_blank" rel="nofollow noopener">Machine Learning in Manufacturing – Present and Future Use-Cases</a>, Emerj Artificial Intelligence Research, last updated May 20, 2019, published by Jon Walker</p>
<p>Machine learning, AI are most impactful supply chain technologies. (2019). <em>Material Handling &amp; Logistics</em></p>
<p>MAPI Foundation, <a class="color-link" title="https://mapifoundation.org/manufacturing-evolution" href="https://mapifoundation.org/manufacturing-evolution" target="_blank" rel="nofollow noopener">The Manufacturing Evolution: How AI Will Transform Manufacturing &amp; the Workforce of the Future</a> by Robert D. Atkinson, Stephen Ezell, Information Technology and Innovation Foundation (PDF, 56 pp., opt-in)</p>
<p><a class="color-link" title="https://www.mckinsey.com/business-functions/operations/our-insights/mapping-heavy-industrys-digital-manufacturing-opportunities" href="https://www.mckinsey.com/business-functions/operations/our-insights/mapping-heavy-industrys-digital-manufacturing-opportunities" target="_blank" rel="nofollow noopener">Mapping heavy industry&#8217;s digital-manufacturing opportunities</a>, McKinsey &amp; Company, September 24, 2018</p>
<p>McKinsey, <a class="color-link" title="https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/ai-in-production-a-game-changer-for-manufacturers-with-heavy-assets" href="https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/ai-in-production-a-game-changer-for-manufacturers-with-heavy-assets" target="_blank" rel="nofollow noopener">AI in production: A game changer for manufacturers with heavy assets</a>, by Eleftherios Charalambous, Robert Feldmann, Gérard Richter and Christoph Schmitz</p>
<p>McKinsey, <a class="color-link" title="https://www.mckinsey.com/~/media/mckinsey/business%20functions/operations/our%20insights/how%20digital%20manufacturing%20can%20escape%20pilot%20purgatory/digital-manufacturing-escaping-pilot-purgatory.ashx" href="https://www.mckinsey.com/~/media/mckinsey/business%20functions/operations/our%20insights/how%20digital%20manufacturing%20can%20escape%20pilot%20purgatory/digital-manufacturing-escaping-pilot-purgatory.ashx" target="_blank" rel="nofollow noopener">Digital Manufacturing – escaping pilot purgatory</a> (PDF, 24 pp., no opt-in)</p>
<p>McKinsey, <a class="color-link" title="https://www.mckinsey.com/~/media/McKinsey/Business%20Functions/McKinsey%20Digital/Our%20Insights/Driving%20impact%20at%20scale%20from%20automation%20and%20AI/Driving-impact-at-scale-from-automation-and-AI.ashx" href="https://www.mckinsey.com/~/media/McKinsey/Business%20Functions/McKinsey%20Digital/Our%20Insights/Driving%20impact%20at%20scale%20from%20automation%20and%20AI/Driving-impact-at-scale-from-automation-and-AI.ashx" target="_blank" rel="nofollow noopener">Driving Impact and Scale from Automation and AI</a>, February 2019 (PDF, 100 pp., no opt-in).</p>
<p>McKinsey<a class="color-link" title="https://www.mckinsey.com/business-functions/operations/our-insights/lighthouse-manufacturers-lead-the-way" href="https://www.mckinsey.com/business-functions/operations/our-insights/lighthouse-manufacturers-lead-the-way" target="_blank" rel="nofollow noopener">, &#8216;Lighthouse&#8217; manufacturers, lead the way—can the rest of the world keep up?,</a>by Enno de Boer, Helena Leurent and Adrian Widmer; January, 2019.</p>
<p>McKinsey, <a class="color-link" title="https://www.mckinsey.com/business-functions/operations/our-insights/manufacturing-analytics-unleashes-productivity-and-profitability" href="https://www.mckinsey.com/business-functions/operations/our-insights/manufacturing-analytics-unleashes-productivity-and-profitability" target="_blank" rel="nofollow noopener">Manufacturing: Analytics unleashes productivity and profitability</a>, by Valerio Dilda, Lapo Mori, Olivier Noterdaeme and Christoph Schmitz, March, 2019</p>
<p>McKinsey/Harvard Business Review, <a class="color-link" title="https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/most-of-ais-business-uses-will-be-in-two-areas" href="https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/most-of-ais-business-uses-will-be-in-two-areas" target="_blank" rel="nofollow noopener">Most of AI&#8217;s business uses will be in two areas,</a></p>
<p>Morey, B. (2019). Manufacturing and AI: Promises and pitfalls.<em> Manufacturing Engineering, 163</em>(1), 10.</p>
<p><a class="color-link" title="https://www.mckinsey.com/business-functions/operations/our-insights/preparing-for-the-next-normal-via-digital-manufacturings-scaling-potential" href="https://www.mckinsey.com/business-functions/operations/our-insights/preparing-for-the-next-normal-via-digital-manufacturings-scaling-potential" target="_blank" rel="nofollow noopener">Preparing for the next normal via digital manufacturing&#8217;s scaling potential</a>, McKinsey &amp; Company, April 10, 2020</p>
<p>Reducing the barriers to entry in advanced analytics. (2019). <em>Manufacturing.Net, </em></p>
<p><a class="color-link" title="https://www.capgemini.com/research/scaling-ai-in-manufacturing-operations/" href="https://www.capgemini.com/research/scaling-ai-in-manufacturing-operations/" target="_blank" rel="nofollow noopener">Scaling AI in Manufacturing Operations: A Practitioners Perspective</a>, Capgemini, January, 2020</p>
<p>Seven ways real-time monitoring is driving smart manufacturing. (2019). <em>Manufacturing.Net,</em></p>
<p>Siemens, <a class="color-link" title="https://assets.new.siemens.com/siemens/assets/public.1559011182.cb8f9288-6f4a-4568-b8fe-7a1c03deef5b.15-22-may-en-ai-presentation-sid-2019-dr--michael-may-en-final-0.pdf" href="https://assets.new.siemens.com/siemens/assets/public.1559011182.cb8f9288-6f4a-4568-b8fe-7a1c03deef5b.15-22-may-en-ai-presentation-sid-2019-dr--michael-may-en-final-0.pdf" target="_blank" rel="nofollow noopener">Next Level AI – Powered by Knowledge Graphs and Data Thinking, Siemens China Innovation Day, Michael May</a>, Chengdu, May 15, 2019</p>
<p><a class="color-link" title="https://manufacturingpolicy.indiana.edu/doc/Smart%20Factories.pdf" href="https://manufacturingpolicy.indiana.edu/doc/Smart%20Factories.pdf" target="_blank" rel="nofollow noopener">Smart Factories: Issues of Information Governance Manufacturing Policy Initiative School of Public and Environmental Affairs Indiana University, March 2019</a> (PDF, 68 pp., no opt-in)</p>
<p><a class="color-link" title="https://www.mckinsey.de/files/170419_mckinsey_ki_final_m.pdf" href="https://www.mckinsey.de/files/170419_mckinsey_ki_final_m.pdf" target="_blank" rel="nofollow noopener">Smartening up with Artificial Intelligence (AI) &#8211; What&#8217;s in it for Germany and its Industrial Sector?</a> (52 pp., PDF, no opt-in) McKinsey &amp; Company.</p>
<p>Team predicts the useful life of batteries with data and AI. (2019, March 28). <em>R &amp; D. </em></p>
<p><a class="color-link" title="https://www.capgemini.com/us-en/research/the-ai-powered-enterprise/" href="https://www.capgemini.com/us-en/research/the-ai-powered-enterprise/" target="_blank" rel="nofollow noopener">The AI-powered enterprise: Unlocking the potential of AI at scale</a>, Capgemini Research, July 2020</p>
<p><a class="color-link" title="https://3er1viui9wo30pkxh1v2nh4w-wpengine.netdna-ssl.com/wp-content/uploads/prod/sites/393/2019/06/Microsoft_TheFutureComputed_AI_MFG_Final_Online.pdf" href="https://3er1viui9wo30pkxh1v2nh4w-wpengine.netdna-ssl.com/wp-content/uploads/prod/sites/393/2019/06/Microsoft_TheFutureComputed_AI_MFG_Final_Online.pdf" target="_blank" rel="nofollow noopener">The Future of AI and Manufacturing</a>, Microsoft, Greg Shaw (PDF, 73 pp., PDF, no opt-in).</p>
<p><a class="color-link" title="https://www.bcg.com/publications/2020/business-applications-artificial-intelligence-post-covid.aspx" href="https://www.bcg.com/publications/2020/business-applications-artificial-intelligence-post-covid.aspx" target="_blank" rel="nofollow noopener">The Rise of the AI-Powered Company in the Postcrisis World</a>, Boston Consulting Group, April 2, 2020</p>
<p><a class="color-link" title="https://medium.com/activewizards-machine-learning-company/top-8-data-science-use-cases-in-manufacturing-749256b8f1ee" href="https://medium.com/activewizards-machine-learning-company/top-8-data-science-use-cases-in-manufacturing-749256b8f1ee" target="_blank" rel="nofollow noopener">Top 8 Data Science Use Cases in Manufacturing</a>, ActiveWizards: A Machine Learning Company Igor Bobriakov, March 12, 2019</p>
<p>Walker, M. E. (2019). Armed with analytics: Manufacturing as a martial art.<em> Industry Week </em></p>
<p>Wang, J., Ma, Y., Zhang, L., Gao, R. X., &amp; Wu, D. (2018). Deep learning for smart manufacturing: Methods and applications. Journal of Manufacturing Systems, 48, 144–156.</p>
<p>Zulick, J. (2019). How machine learning is transforming industrial production.<em> Machine Design</em></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/161206/10-ways-ai-is-improving-new-product-development/">10 Ways AI Is Improving New Product Development</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/aQ8RhOTYwJI" height="1" width="1" alt=""/>]]></content:encoded>
			<wfw:commentRss>https://www.enterpriseirregulars.com/161206/10-ways-ai-is-improving-new-product-development/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">161206</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/161206/10-ways-ai-is-improving-new-product-development/</feedburner:origLink></item>
		<item>
		<title>5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/vYvRjwLFbYw/</link>
		<pubDate>Sun, 12 Jul 2020 15:13:15 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[Centrify]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>
		<category><![CDATA[Machine Learning in Cybersecurity]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Multifactor authentication]]></category>
		<category><![CDATA[Privileged Access Management]]></category>
		<category><![CDATA[Zero Trust Security]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=160790</guid>
		<description><![CDATA[<p>Bottom line: With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritizing spending that delivers the greatest ROI while avoiding the top five mistakes that threaten their infrastructures. In a rush to reduce budgets and spending, cybersecurity teams and the CISOs that lead them need to avoid the mistakes [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160790/5-mistakes-that-threaten-infrastructure-cybersecurity-and-resilience/">5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-160791 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/5-Mistakes-That-Threaten-Infrastructure-Cybersecurity-And-Resilience-FIGURE-1.jpg" alt="5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience" width="637" height="356" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/5-Mistakes-That-Threaten-Infrastructure-Cybersecurity-And-Resilience-FIGURE-1.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/5-Mistakes-That-Threaten-Infrastructure-Cybersecurity-And-Resilience-FIGURE-1-300x168.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/5-Mistakes-That-Threaten-Infrastructure-Cybersecurity-And-Resilience-FIGURE-1-768x430.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/5-Mistakes-That-Threaten-Infrastructure-Cybersecurity-And-Resilience-FIGURE-1-600x336.jpg 600w" sizes="(max-width: 637px) 100vw, 637px" /></p>
<p><strong>Bottom line:</strong> With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritizing spending that delivers the greatest ROI while avoiding the top five mistakes that threaten their infrastructures.</p>
<p>In a rush to reduce budgets and spending, cybersecurity teams and the CISOs that lead them need to avoid the mistakes that can thwart cybersecurity strategies and impede infrastructure performance. Cutting budgets too deep and too fast can turn into an epic fail from a cybersecurity standpoint. What I’ve found is that CIOs are making decisions based on budget requirements, while CISOs are looking out for the security of the company.</p>
<p>Based on their ongoing interviews with CIOs, <a class="color-link" title="https://www.gartner.com/en/newsroom/press-releases/2020-05-13-gartner-says-global-it-spending-to-decline-8-percent-in-2020-due-to-impact-of-covid19" href="https://www.gartner.com/en/newsroom/press-releases/2020-05-13-gartner-says-global-it-spending-to-decline-8-percent-in-2020-due-to-impact-of-covid19" target="_blank" rel="nofollow noopener">Gartner is predicting an 8% decline in worldwide IT spending this year</a>. Cybersecurity projects that don’t deliver a solid ROI are already out of IT budgets. Prioritizing and trimming projects to achieve tighter cost optimization is how CIOs and their teams are reshaping their budgets today. CIOs say the goal is to keep the business running as secure as possible, not attain perfect cybersecurity.</p>
<p>Despite the unsettling, rapid rise of cyber-attacks<a class="color-link" title="https://www.capgemini.com/wp-content/uploads/2020/04/Cybersecurity_2020403_V05.pdf" href="https://www.capgemini.com/wp-content/uploads/2020/04/Cybersecurity_2020403_V05.pdf" target="_blank" rel="nofollow noopener">, including a 667% increase in spear-fishing email attacks related to Covid-19</a> since February alone, CIOs often trim IT budgets starting with cybersecurity first. The current economic downturn is making it clear that cybersecurity is more of a business strategy than an IT one, as spending gets prioritized by the best-to-worst business case.</p>
<p><strong>Five Mistakes No CISO Wants To Make </strong></p>
<p>One of the hardest parts of a CISO’s job is deciding which projects will continue to be funded and who will be responsible for leading them, so they deliver value. It gets challenging fast when budgets are shrinking and competitors actively recruit the most talented team members. Those factors taken together create the perfect conditions for the five mistakes that threaten the infrastructure cybersecurity and resilience of any business.</p>
<p>The five mistakes no CISO wants to make include the following:</p>
<p><strong>1.   No accountability for the crown jewels for the company.</strong> Privileged access credentials continue to be the primary target for cyber-attackers. However, many companies just went through a challenging sprint to make sure all employees have secure remote access to enable Covid-19 work-from-home policies. <a class="color-link" title="https://www.centrify.com/about-us/news/press-releases/2020/nearly-half-uk-businesses-admit-current-cyber-security-policies/" href="https://www.centrify.com/about-us/news/press-releases/2020/nearly-half-uk-businesses-admit-current-cyber-security-policies/" target="_blank" rel="nofollow noopener">Research by Centrify</a> reveals that 41% of UK businesses aren’t treating outsourced IT and other third parties likely to have some form of privileged access as an equal security concern.</p>
<p>And while a password vault helps rotate credentials, it still relies on shared passwords and doesn’t provide any accountability to know who is doing what with them. That accountability can be introduced by moving to an identity-centric approach where privileged users log in as themselves and are authenticated using existing identity infrastructures (such as Microsoft Active Directory) to federate access with <a class="color-link" title="https://www.centrify.com/about-us/news/press-releases/2019/centrify-achieves-fedramp-authorization/" href="https://www.centrify.com/about-us/news/press-releases/2019/centrify-achieves-fedramp-authorization/" target="_blank" rel="nofollow noopener">Centrify’s Privileged Access Service.</a></p>
<p>CISOs and their teams also continue to discount or underestimate the importance of privileged non-human identities that far outweigh human users as a cybersecurity risk in today’s business world. What’s needed is an enterprise-wide approach enabling machines to protect themselves across any network or infrastructure configuration.</p>
<p><strong>2.   Cybersecurity budgets aren’t revised for current threatscapes. </strong>Even though many organizations are still in the midst of extensive digital transformation, their budgets often reflect the threatscape from years ago. This gives hackers the green light to get past antiquated legacy security systems to access and leverage modern infrastructures, such as cloud and DevOps. IT security leaders make this even more challenging by not listening to the front-line cybersecurity teams and security analysts who can see the patterns of breach attempts in data they review every day. In dysfunctional organizations, the analyst teams are ignored and cybersecurity suffers.</p>
<p><strong>3. Conflicts of interest when CISOs report to CIOs and the IT budget wins.  </strong>This happens in organizations that get hacked because the cybersecurity teams aren’t getting the tools and support they need to do their jobs. With IT budgets facing the greatest scrutiny they’ve seen in a decade, CISOs need to have their budget to defend. Otherwise, too many cybersecurity projects will be cut without thinking of the business implications of each. The bottom line is CISOs need to report to the CEO and have the autonomy to plan, direct, evaluate and course-correct their strategies with their teams.</p>
<p><strong>4. The mistake of thinking cloud platforms’ Identity and Access Management (IAM) tools can secure an enterprise on their own. </strong>Cloud providers offer a baseline level of IAM support that might be able to secure workloads in their clouds adequately but is insufficient to protect a multi-cloud, hybrid enterprise. IT leaders need to consider how they can better protect the complex areas of IAM and Privileged Access Management (PAM) with these significant expansions of the enterprise IT estate.</p>
<p>Native IAM capabilities offered by AWS, Microsoft Azure, Google Cloud and other vendors provide enough functionality to help an organization get up and running to control access in their respective homogeneous cloud environments. However, often they lack the scale to fully address the more challenging, complex areas of IAM and PAM in hybrid or multi-cloud environments. Please see the post, <a class="color-link" title="https://www.forbes.com/sites/louiscolumbus/2019/08/18/the-truth-about-privileged-access-security-on-aws-and-other-public-clouds/#8c741272611b" href="https://www.forbes.com/sites/louiscolumbus/2019/08/18/the-truth-about-privileged-access-security-on-aws-and-other-public-clouds/#8c741272611b" target="_blank" rel="noopener">The Truth About Privileged Access Security On AWS and Other Public Clouds</a>, for additional information.</p>
<p><strong>5. Exposing their organizations to a greater risk of breach and privileged access credential abuse by staying with legacy password vaults too long. </strong>Given the severity, speed and scale of breach attempts, IT leaders need to re-think their vault strategy and make them more identity-centric. Just as organizations have spent the past 5 &#8211; 10 years modernizing their infrastructure, they must also consider how to modernize how they secure access to it. More modern solutions can enforce a least privilege approach based on Zero Trust principles that grant just enough, just-in-time access to reduce risk. Forward-thinking organizations will be more difficult to breach by reorienting PAM from being vault-centric to identity-centric.</p>
<p><strong>Conclusion </strong></p>
<p>Decisions about what stays or goes in cybersecurity budgets this year could easily make or break careers for CISOs and CIOs alike. Consider the five mistakes mentioned here and the leading cause of breaches &#8211; privileged access abuse. Prioritizing privileged access management for human and machine identities addresses the most vulnerable threat vector for any business. Taking a more modern approach that is aligned to digital transformation priorities can often allow organizations to leverage their existing solutions to reduce risk and costs at the same time.</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160790/5-mistakes-that-threaten-infrastructure-cybersecurity-and-resilience/">5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/vYvRjwLFbYw" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">160790</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/160790/5-mistakes-that-threaten-infrastructure-cybersecurity-and-resilience/</feedburner:origLink></item>
		<item>
		<title>Why Cybersecurity Is Really A Business Problem</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/_Dn7QDk5nfc/</link>
		<pubDate>Sat, 04 Jul 2020 14:55:12 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[absolute software]]></category>
		<category><![CDATA[Absolute’s 2020 State of Endpoint Resilience Report]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Endpoint resilience]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=160532</guid>
		<description><![CDATA[<p>Bottom Line: Absolute’s 2020 Endpoint Resilience Report illustrates why the purpose of any cybersecurity program needs to be attaining a balance between protecting an organization and the need to keep the business running, starting with secured endpoints. Enterprises who’ve taken a blank-check approach in the past to spending on cybersecurity are facing the stark reality [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160532/why-cybersecurity-is-really-a-business-problem/">Why Cybersecurity Is Really A Business Problem</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-160533 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-1-master.jpg" alt="Why Cybersecurity Is Really A Business Problem" width="639" height="340" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-1-master.jpg 1597w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-1-master-300x160.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-1-master-768x409.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-1-master-600x319.jpg 600w" sizes="(max-width: 639px) 100vw, 639px" /></p>
<p><strong>Bottom Line:</strong> Absolute’s 2020 Endpoint Resilience Report illustrates why the purpose of any cybersecurity program needs to be attaining a balance between protecting an organization and the need to keep the business running, starting with secured endpoints.</p>
<p>Enterprises who’ve taken a blank-check approach in the past to spending on cybersecurity are facing the stark reality that all that spending may have made them more vulnerable to attacks. While cybersecurity spending grew at a Compound Annual Growth Rate (CAGR) of 12% in 2018, <a class="color-link" title="https://www.gartner.com/document/3980891" href="https://www.gartner.com/document/3980891" target="_blank" rel="nofollow noopener">Gartner’s latest projections</a> are predicting a decline to only 7% CAGR through 2023. Nearly every CISO I’ve spoken with in the last three months say prioritizing cybersecurity programs by their ROI and contribution to the business is how funding gets done today.</p>
<p><strong>Cybersecurity Has Always Been A Business Decision </strong></p>
<p>Overcoming the paradox of keeping a business secure while fueling its growth is the essence of why cybersecurity is a business decision. Securing an entire enterprise is an unrealistic goal; balancing security and ongoing operations is. CISOs speak of this paradox often and the need to better measure the effectiveness of their decisions.</p>
<p>This is why the findings from Absolute’s <a class="color-link" title="https://www.absolute.com/go/study/2020-endpoint-resilience-report/" href="https://www.absolute.com/go/study/2020-endpoint-resilience-report/" target="_blank" rel="nofollow noopener">2020 State of Endpoint Resilience Report​ </a> are so timely given the shift to more spending accountability on cybersecurity programs. The report’s methodology is based on anonymized data from enterprise-specific subsets of nearly 8.5 million Absolute-enabled devices active across 12,000+ customer organizations in North America and Europe. Please see the last page of the study for additional details regarding the methodology.</p>
<p>Key insights from the study include the following:</p>
<ul>
<li><strong>More than one of every three enterprise devices had an Endpoint Protection (EP), client management or VPN application out of compliance, further exposing entire organizations to potential threats.</strong> More than 5% of enterprise devices were missing one or more of these critical controls altogether. Endpoints, encryption, VPN and Client Management are more, not less fragile, despite millions of dollars being spent to protect them before the downturn. The following graphic illustrates how fragile endpoints are by noting average compliances rate alongside installation rates:</li>
</ul>
<p><img class="  wp-image-160534 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-2.jpg" alt="Why Cybersecurity Is Really A Business Problem" width="638" height="380" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-2.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-2-300x179.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-2-768x458.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-2-600x358.jpg 600w" sizes="(max-width: 638px) 100vw, 638px" /></p>
<ul>
<li><strong>When cybersecurity spending isn’t being driven by a business case, endpoints become more complex, chaotic and nearly impossible to protect.</strong> Absolute’s survey reflects what happens when cybersecurity spending isn’t based on a solid business decision, often leading to multiple endpoint security agents. The survey found the typical organization has 10.2 endpoint agents on average, up from 9.8 last year. One of the most insightful series of findings in the study and well worth a read is the section on measuring Application Resilience. The study found that the resiliency of an application varies significantly based on what else it is paired with. It’s interesting to see that same-vendor pairings don’t necessarily do better or show higher average compliance rates than pairings from different vendors. The bottom line is that there’s no guarantee that any agent, whether sourced from a single vendor or even the most innovative vendors, will work seamlessly together and make an organization more secure. The following graphic explains this point:</li>
</ul>
<p><img class="  wp-image-160535 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-3.jpg" alt="Why Cybersecurity Is Really A Business Problem" width="638" height="440" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-3.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-3-300x207.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-3-768x530.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-3-600x414.jpg 600w" sizes="(max-width: 638px) 100vw, 638px" /></p>
<ul>
<li> <a class="color-link" title="https://www.helpnetsecurity.com/2019/10/30/unapplied-security-patches/" href="https://www.helpnetsecurity.com/2019/10/30/unapplied-security-patches/" target="_blank" rel="nofollow noopener"><strong>60% of breaches</strong></a><strong> can be linked to a vulnerability where a patch was available, but not applied.</strong> When there’s a compelling business case to keep all machines current, patches get distributed and installed. When there isn’t, operating system patches are, on average, 95 days late. Counting up the total number of vulnerabilities addressed on Patch Tuesday in February through May 2020 alone, it shows that the average Windows 10 enterprise device has hundreds of potential vulnerabilities without a fix applied – including four zero-day vulnerabilities. Absolute’s data shows that Post-Covid-19, the average patch age has gone down slightly, driven by the business case of supporting an entirely remote workforce.</li>
</ul>
<p><img class="  wp-image-160536 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-4.jpg" alt="Why Cybersecurity Is Really A Business Problem" width="488" height="377" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-4.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-4-300x232.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-4-768x593.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-4-600x463.jpg 600w" sizes="(max-width: 488px) 100vw, 488px" /></p>
<ul>
<li><strong>Organizations that had defined business cases for their cybersecurity programs are able to adapt better and secure vulnerable endpoint devices, along with the sensitive data piling up on those devices, being used at home by employees.</strong> Absolute’s study showed that the amount of sensitive data – like Personal Identifiable Information (PII), Protected Health Information (PHI) and Personal Financial Information (PFI) data – identified on endpoints soared as the Covid-19 outbreak spread and devices went home to work remotely. Without autonomous endpoints that have an unbreakable digital tether to ensure the health and security of the device, the greater the chance of this kind of data being exposed, the greater the potential for damages, compliance violations and more.</li>
</ul>
<p><img class="  wp-image-160537 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-5.jpg" alt="Why Cybersecurity Is Really A Business Problem" width="637" height="269" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-5.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-5-300x127.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-5-768x324.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/Why-Cybersecurity-Is-Really-A-Business-Problem-figure-5-600x253.jpg 600w" sizes="(max-width: 637px) 100vw, 637px" /></p>
<p><strong>Conclusion </strong></p>
<p>Absolute’s latest study on the state of endpoints amplifies what many CISOs and their teams are doing today. They’re prioritizing cybersecurity endpoint projects on ROI, looking to quantify agent effectiveness and moving beyond the myth that greater compliance is going to get them better security. The bottom line is that increasing cybersecurity spending is not going to make any business more secure, knowing the effectiveness of cybersecurity spending will, however. Being able to capable of tracking how resilient and persistent every autonomous endpoint is in an organization makes defining the ROI of endpoint investments possible, which is what every CISO I’ve spoken with is focusing on this year.</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160532/why-cybersecurity-is-really-a-business-problem/">Why Cybersecurity Is Really A Business Problem</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/_Dn7QDk5nfc" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">160532</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/160532/why-cybersecurity-is-really-a-business-problem/</feedburner:origLink></item>
		<item>
		<title>How To Improve Channel Sales With AI-Based Knowledge Sharing Networks</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/pAn0Wo6Orz8/</link>
		<pubDate>Fri, 03 Jul 2020 18:24:32 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Adoption in Enterprises]]></category>
		<category><![CDATA[Amazon Alexa]]></category>
		<category><![CDATA[Amazon Web Services]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[BMC ADE]]></category>
		<category><![CDATA[BMC Automated mainframe intelligence (AMI)]]></category>
		<category><![CDATA[Capgemini]]></category>
		<category><![CDATA[Google Voice]]></category>
		<category><![CDATA[Knowledge-sharing networks]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=160496</guid>
		<description><![CDATA[<p>Bottom Line: Knowledge-sharing networks have been improving supply chain collaboration for decades; it&#8217;s time to enhance them with AI and extend them to resellers to revolutionize channel selling with more insights. The greater the accuracy and speed of supply chain-based data integration and knowledge, the greater the accuracy of custom product orders. Add to that [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160496/how-to-improve-channel-sales-with-ai-based-knowledge-sharing-networks/">How To Improve Channel Sales With AI-Based Knowledge Sharing Networks</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-160497 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-1.jpg" alt="" width="635" height="383" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-1.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-1-300x181.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-1-768x462.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-1-600x361.jpg 600w" sizes="(max-width: 635px) 100vw, 635px" /></p>
<p><strong>Bottom Line:</strong> Knowledge-sharing networks have been improving supply chain collaboration for decades; it&#8217;s time to enhance them with AI and extend them to resellers to revolutionize channel selling with more insights.</p>
<p>The greater the accuracy and speed of supply chain-based data integration and knowledge, the greater the accuracy of custom product orders. Add to that the complexity of selling CPQ and product configurations through channels, and the value of using AI to improve knowledge sharing networks becomes a compelling business case.</p>
<p><strong>Why Channels Need AI-Based Knowledge Sharing Networks Now </strong></p>
<p>Automotive, consumer electronics, high tech, and industrial products manufacturers are combining IoT sensors, microcontrollers, and modular designs to sell channel-configurable smart vehicles and products. AI-based knowledge-sharing networks are crucial to the success of their next-generation products. Likewise, to sell to any of these manufacturers, suppliers need to be pursuing the same strategy. AI-based services, including Amazon Alexa, Microsoft Cortana, and Google Voice and others, rely on knowledge-sharing networks to collaborate with automotive supply chains and strengthen OEM partnerships. The following graphic reflects how successful Amazon&#8217;s Alexa Automotive OEM sales team is at using knowledge-sharing networks to gain design wins across their industry.</p>
<p><img class="  wp-image-160498 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-2.jpg" alt="" width="634" height="415" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-2.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-2-300x196.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-2-768x502.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-2-600x393.jpg 600w" sizes="(max-width: 634px) 100vw, 634px" /></p>
<p>The following are a few of the many reasons why creating and continually fine-tuning an AI-based knowledge-sharing network is an evolving strategy worth paying attention to:</p>
<ul>
<li><strong>Supply chains are the primary source of knowledge that must permeate an organization&#8217;s structure and channels for the company to stay synchronized to broader market demands.</strong> For CPQ channel selling strategies to thrive, they need real-time pricing, availability, available-to-promise, and capable-to-promise data to create accurate, competitive quotes that win deals. The better the supplier collaboration across supply chains and with channel partners, the higher the probability of selling more. A landmark study of the Toyota Production System by Professors Jeffrey H Dyer &amp; Kentaro Nobeoka found that Toyota suppliers value shared data more than cash, making knowledge sharing systems invaluable to them (Dyer, Nobeoka, 2000).</li>
<li><strong>Smart manufacturing metrics also need to be contributing real-time data to knowledge sharing systems channel partners use, relying on AI to create quotes for products that can be built the fastest and are the most attractive to each customer. </strong>Combining manufacturing&#8217;s real-time monitoring data stream of ongoing order progress and production availability with supply chain pricing, availability, and quality data all integrated to a cloud-based CPQ platform gives channel partners what they need to close deals now. AI-based knowledge-sharing networks will link supply chains, manufacturing plants, and channel partners to create smart factories that drive more sales. According to a recent Capgemini study, manufacturers are planning to launch 40% more smart factories in the next five years, increasing their annual investments by 1.7 times compared to the previous three years, according to their recent <a class="color-link" title="https://www.capgemini.com/research/smart-factories-at-scale/?utm_source=pr&amp;utm_medium=referral&amp;utm_content=digman_none_none_pressrelease_none&amp;utm_campaign=digitalmanufacturing_cri_smartfactories" href="https://www.capgemini.com/research/smart-factories-at-scale/?utm_source=pr&amp;utm_medium=referral&amp;utm_content=digman_none_none_pressrelease_none&amp;utm_campaign=digitalmanufacturing_cri_smartfactories" target="_blank" rel="nofollow noopener">Smart factories @ scale Capgemini survey</a>. The following graphic illustrates the percentage growth of smart factories across key geographic regions, a key prerequisite for enabling AI-based knowledge-sharing networks with real-time production data:</li>
</ul>
<p><img class="  wp-image-160499 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-3.jpg" alt="How To Improve Channel Sales With AI-Based Knowledge Sharing Networks" width="633" height="502" /></p>
<ul>
<li><strong>By closing the data gaps between suppliers, manufacturing, and channels, AI-based knowledge-sharing networks give resellers the information they need to sell with greater insight.</strong> Amazon&#8217;s Alexa OEM marketing teams succeeded in getting the majority of design-in wins with automotive manufacturers designing their next-generation of vehicles with advanced electronics and AI features. The following graphic from Dr. Dyer&#8217;s and Nobeoka&#8217;s study defines the foundations of a knowledge-sharing network. Applying AI to a mature knowledge-sharing network creates a strong network effect where every new member of the network adds greater value.</li>
</ul>
<p><img class="  wp-image-160500 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-4.jpg" alt="How To Improve Channel Sales With AI-Based Knowledge Sharing Networks" width="634" height="491" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-4.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-4-300x232.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-4-768x594.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-4-600x464.jpg 600w" sizes="(max-width: 634px) 100vw, 634px" /></p>
<ul>
<li><strong>Setting the foundation for an effective knowledge sharing network needs to start with platforms that have AI and machine learning designed in with structure that can flex for unique channel needs.</strong> There are several platforms capable of supporting AI-based knowledge-sharing networks available, each with its strengths and approach to adapting to supply chain, manufacturing, and channel needs. One of the more interesting frameworks not only uses AI and machine learning across its technology pillars but also takes into consideration that a company&#8217;s operating model needs to adjust to leverage a connected economy to adapt to changing customer needs. <a class="color-link" title="https://www.bmc.com/corporate/autonomous-digital-enterprise.html?vu=ade" href="https://www.bmc.com/corporate/autonomous-digital-enterprise.html?vu=ade" target="_blank" rel="nofollow noopener">BMC&#8217;s Autonomous Digital Enterprise (ADE)</a> is differentiated from many others in how it is designed to capitalize on AI and Machine Learning&#8217;s core strengths to create innovation ecosystems in a knowledge-sharing network. Knowledge-sharing networks thrive on continuous learning. It&#8217;s good to see major providers using adaptive and machine learning to strengthen their platforms, with BMC&#8217;s Automated Mainframe Intelligence (AMI) emerging as a leader. Their approach to using adaptive learning to maintain data quality during system state changes and link exceptions with machine learning to deliver root cause analysis is prescient of where continuous learning needs to go.  The following graphic explains the ADE&#8217;s structure.</li>
</ul>
<p><img class="  wp-image-160501 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-5.jpg" alt="How To Improve Channel Sales With AI-Based Knowledge Sharing Networks" width="638" height="467" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-5.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-5-300x220.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-5-768x562.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/07/How-To-Improve-Channel-Sales-With-AI-Based-Knowledge-Sharing-Networks-figure-5-600x439.jpg 600w" sizes="(max-width: 638px) 100vw, 638px" /></p>
<p><strong>Conclusion </strong></p>
<p>Knowledge-sharing networks have proven very effective in improving supply chain collaboration, supplier quality, and removing barriers to better inventory management. The next step that&#8217;s needed is to extend knowledge-sharing networks to resellers and enable knowledge sharing applications that use AI to tailor product and service recommendations for every customer being quoted and sold to. Imagine resellers being able to create quotes based on the most buildable products that could be delivered in days to buying customers. That&#8217;s possible using a knowledge-sharing network. Amazon&#8217;s success with Alexa design wins shows how their use of knowledge-sharing systems helped to provide insights needed across automotive OEMs wanted to add voice-activated AI technology to their next-generation vehicles.</p>
<p><strong><u>References</u></strong></p>
<p>BMC, <a class="color-link" title="https://www.bmc.com/forms/hybrid-it-with-holistic-monitoring-aiops-white-paper.html" href="https://www.bmc.com/forms/hybrid-it-with-holistic-monitoring-aiops-white-paper.html" target="_blank" rel="nofollow noopener">Maximizing the Value of Hybrid IT with Holistic Monitoring and AIOps</a> (10 pp., PDF).</p>
<p>BMC Blogs, <a class="color-link" title="https://www.bmc.com/blogs/gartner-aiops-market-guide/" href="https://www.bmc.com/blogs/gartner-aiops-market-guide/" target="_blank" rel="nofollow noopener">2019 Gartner Market Guide for AIOps Platforms,</a> December 2, 2019</p>
<p>Cai, S., Goh, M., De Souza, R., &amp; Li, G. (2013). Knowledge sharing in collaborative supply chains: twin effects of trust and power. <em>International journal of production Research</em>, <em>51</em>(7), 2060-2076.</p>
<p>Capgemini Research Institute, <a class="color-link" title="https://www.capgemini.com/research/smart-factories-at-scale/?utm_source=pr&amp;utm_medium=referral&amp;utm_content=digman_none_none_pressrelease_none&amp;utm_campaign=digitalmanufacturing_cri_smartfactories" href="https://www.capgemini.com/research/smart-factories-at-scale/?utm_source=pr&amp;utm_medium=referral&amp;utm_content=digman_none_none_pressrelease_none&amp;utm_campaign=digitalmanufacturing_cri_smartfactories" target="_blank" rel="nofollow noopener">Smart factories @ scale: Seizing the trillion-dollar prize through efficiency by design and closed-loop operations</a>, 2019.</p>
<p>Columbus, L, <a class="color-link" title="https://www.forbes.com/sites/louiscolumbus/2019/11/20/the-10-most-valuable-metrics-in-smart-manufacturing/#6e691b752e05" href="https://www.forbes.com/sites/louiscolumbus/2019/11/20/the-10-most-valuable-metrics-in-smart-manufacturing/#6e691b752e05" target="_blank" rel="noopener">The 10 Most Valuable Metrics in Smart Manufacturing</a>, Forbes, November 20, 2020</p>
<p>Jeffrey H Dyer, &amp; Kentaro Nobeoka. (2000). Creating and managing a high-performance knowledge-sharing network: The Toyota case. Strategic Management Journal: Special Issue: Strategic Networks, 21(3), 345-367.</p>
<p>Myers, M. B., &amp; Cheung, M. S. (2008). Sharing global supply chain knowledge. <em>MIT Sloan Management Review</em>, <em>49</em>(4), 67.</p>
<p>Wang, C., &amp; Hu, Q. (2020). Knowledge sharing in supply chain networks: Effects of collaborative innovation activities and capability on innovation performance. <em>Technovation</em>, <em>94</em>, 102010.</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160496/how-to-improve-channel-sales-with-ai-based-knowledge-sharing-networks/">How To Improve Channel Sales With AI-Based Knowledge Sharing Networks</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/pAn0Wo6Orz8" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">160496</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/160496/how-to-improve-channel-sales-with-ai-based-knowledge-sharing-networks/</feedburner:origLink></item>
		<item>
		<title>Why Securing Endpoints Is The Future Of Cybersecurity</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/ViFgWK1Nk_8/</link>
		<pubDate>Sun, 28 Jun 2020 21:06:31 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[Absolute Endpoint Security]]></category>
		<category><![CDATA[Absolute Remote Work and Distance Learning Insights Center]]></category>
		<category><![CDATA[absolute software]]></category>
		<category><![CDATA[AI in cybersecurity]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Endpoint resilience]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>
		<category><![CDATA[Machine Learning in Cybersecurity]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=160316</guid>
		<description><![CDATA[<p>86% of all breaches are financially motivated, where threat actors are after company financial data, intellectual property, health records, and customer identities that can be sold fast on the Dark Web. 70% of breaches are perpetrated by external actors, making endpoint security a high priority in any cybersecurity strategy.  55% of breaches originate from organized [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160316/why-securing-endpoints-is-the-future-of-cybersecurity/">Why Securing Endpoints Is The Future Of Cybersecurity</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-160317 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Why-Securing-Endpoints-Is-The-Future-Of-Cybersecurity-master-image-1.jpg" alt="Why Securing Endpoints Is The Future Of Cybersecurity" width="635" height="366" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Why-Securing-Endpoints-Is-The-Future-Of-Cybersecurity-master-image-1.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Why-Securing-Endpoints-Is-The-Future-Of-Cybersecurity-master-image-1-300x173.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Why-Securing-Endpoints-Is-The-Future-Of-Cybersecurity-master-image-1-768x443.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Why-Securing-Endpoints-Is-The-Future-Of-Cybersecurity-master-image-1-600x346.jpg 600w" sizes="(max-width: 635px) 100vw, 635px" /></p>
<ul>
<li>86% of all breaches are financially motivated, where threat actors are after company financial data, intellectual property, health records, and customer identities that can be sold fast on the Dark Web.</li>
<li>70% of breaches are perpetrated by external actors, making endpoint security a high priority in any cybersecurity strategy.</li>
<li> 55% of breaches originate from organized crime groups.</li>
<li>Attacks on Web apps accessed from endpoints were part of 43% of breaches, more than double the results from last year.</li>
</ul>
<p>These and many other insights are from <a class="color-link" title="https://enterprise.verizon.com/resources/reports/dbir/" href="https://enterprise.verizon.com/resources/reports/dbir/" target="_blank" rel="nofollow noopener">Verizon’s 2020 Data Breach Investigations Report (DBIR)</a>, <a class="color-link" title="https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf" href="https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf" target="_blank" rel="nofollow noopener">downloadable here</a> (PDF, 119 pp. free, opt-in). One of the most-read and referenced data breach reports in cybersecurity, Verizon’s DBIR, is considered the definitive source of annual cybercrime statistics. Verizon expanded the scope of the report to include 16 industries this year, also providing break-outs for Asia-Pacific (APAC); Europe, Middle East and Africa (EMEA); Latin America and the Caribbean (LAC); and North America, Canada, and Bermuda, which Verizon says is experiencing more breaches (NA).</p>
<p>The study’s methodology is based on an analysis of a record total of 157,525 incidents. Of those, 32,002 met Verizon’s quality standards, and 3,950 were confirmed data breaches. The report is based on an analysis of those findings. Please see Appendix A for the methodology.</p>
<p>Key insights include the following:</p>
<ul>
<li><strong>Verizon’s DBIR reflects the stark reality that organized crime-funded cybercriminals are relentless in searching out unprotected endpoints and exploiting them for financial gain, which is why autonomous endpoints are a must-have today. </strong>After reading the 2020 Verizon DBIR, it’s clear that if organizations had more autonomous endpoints, many of the most costly breaches could be averted. Autonomous endpoints that can enforce compliance, control, automatically regenerating, and patching cybersecurity software while providing control and visibility is the cornerstone of cybersecurity’s future. For endpoint security to scale across every threat surface, the new hybrid remote workplace is creating an undeletable tether to every device as a must-have for achieving enterprise scale.</li>
<li><strong>The lack of diligence around Asset Management is creating new threat surfaces as organizations often don’t know the current health, configurations, or locations of their systems and devices. </strong>Asset Management is a black hole in many organizations leading to partial at best efforts to protect every threat surface they have. What’s needed is more insightful data on the health of every device. There are several dashboards available, and one of the most insightful is from Absolute, called the <a class="color-link" title="https://www.absolute.com/company/in-the-news/coronavirus-response/dashboard/" href="https://www.absolute.com/company/in-the-news/coronavirus-response/dashboard/" target="_blank" rel="nofollow noopener">Remote Work and Distance Learning Insights Center</a>. An example of the dashboard shown below:</li>
</ul>
<p><img class="  wp-image-160320 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Why-Securing-Endpoints-Is-The-Future-Of-Cybersecurity-master-image-2.jpg" alt="Why Securing Endpoints Is The Future Of Cybersecurity" width="636" height="597" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Why-Securing-Endpoints-Is-The-Future-Of-Cybersecurity-master-image-2.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Why-Securing-Endpoints-Is-The-Future-Of-Cybersecurity-master-image-2-300x282.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Why-Securing-Endpoints-Is-The-Future-Of-Cybersecurity-master-image-2-768x721.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Why-Securing-Endpoints-Is-The-Future-Of-Cybersecurity-master-image-2-600x563.jpg 600w" sizes="(max-width: 636px) 100vw, 636px" /></p>
<ul>
<li><strong>85% of victims and subjects were in the same country, 56% were in the same state, and 35% were even in the same city based on FBI Internet Crime Complaint Center (IC3) data.</strong> Cybercriminals are very opportunistic when it comes to attacking high-profile targets in their regions of the world. Concerted efforts of cybercriminals funded by organized crime look for the weakest threat surfaces to launch an attack on, and unprotected endpoints are their favorite target. What’s needed is more of a true endpoint resilience approach that is based on a real-time, unbreakable digital tether that ensures the security of every device and the apps and data it contains.</li>
<li><strong>Cloud assets were involved in about 24% of breaches this year, while on-premises assets are still 70%.</strong> Ask any CISO what the most valuable lesson they learned from the pandemic has been so far, and chances are they’ll say they didn’t move to the cloud quickly enough. Cloud platforms enable CIOs and CISOs to provide a greater scale of applications for their workforces who are entirely remote and a higher security level. Digging deeper into this, cloud-based Security Information and Event Management (SIEM) provides invaluable real-time analysis, alerts, and deterrence of potential breaches. Today it’s the exceptional rather than the rule that CISOs prefer on-premise over cloud-based SIEM and endpoint security applications. Cloud-based endpoint platforms and the apps they support are the future of cybersecurity as all organizations now are either considering or adopting cloud-based cybersecurity strategies.</li>
<li><strong>Over 80% of breaches within hacking involve brute force or the use of lost or stolen credentials. </strong>One of the most valuable insights from the Verizon DBIR is how high of a priority cybercriminals are placing on stealing personal and privileged access credentials. Shutting down potential breach attempts from stolen passwords involves keeping every endpoint completely up to date on software updates, monitoring aberrant activity, and knowing if anyone is attempting to change the configuration of a system as an administrator. By having an unbreakable digital tether to every device, greater control and real-time response to breach attempts are possible.</li>
</ul>
<p><strong>Conclusion </strong></p>
<p>Autonomous endpoints that can self-heal and regenerate operating systems and configurations are the future of cybersecurity, a point that can be inferred from Verizon’s DBIR this year. While CIOs are more budget-focused than ever, CISOs are focused on how to anticipate and protect their enterprises from new, emerging threats. Closing the asset management gaps while securing every endpoint is a must-have to secure any business today. There are several cybersecurity companies offering endpoint security today. Based on customer interviews I&#8217;ve done, one of the clear leaders in endpoint resilience is <a class="color-link" title="https://www.absolute.com/" href="https://www.absolute.com/" target="_blank" rel="nofollow noopener">Absolute Software</a>, whose persistent-firmware technology allows them to self-heal their own agent, as well as any endpoint security control and productivity tool on any protected device such as their <a class="color-link" title="https://www.absolute.com/platform/editions/resilience/" href="https://www.absolute.com/platform/editions/resilience/" target="_blank" rel="nofollow noopener">Resilience suite of applications</a>.</p>
<p>&nbsp;</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160316/why-securing-endpoints-is-the-future-of-cybersecurity/">Why Securing Endpoints Is The Future Of Cybersecurity</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/ViFgWK1Nk_8" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">160316</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/160316/why-securing-endpoints-is-the-future-of-cybersecurity/</feedburner:origLink></item>
		<item>
		<title>How Barclays Is Preventing Fraud With AI</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/dykYvKBUtf8/</link>
		<pubDate>Sun, 28 Jun 2020 00:26:59 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Fraud prevention]]></category>
		<category><![CDATA[AI-based fraud detection]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Artificial intelligence fraud detection]]></category>
		<category><![CDATA[Barclays]]></category>
		<category><![CDATA[Fraud prevention]]></category>
		<category><![CDATA[Kount]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Machine learning fraud prevention]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=160285</guid>
		<description><![CDATA[<p>Bottom Line: Barclays&#8217; and Kount&#8217;s co-developed new product, Barclays Transact reflects the future of how companies will innovate together to apply AI-based fraud prevention to the many payment challenges merchants face today. Merchant payment providers have seen the severity, scope, and speed of fraud attacks increase exponentially this year. Account takeovers, card-not-present fraud, SMS spoofing, [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160285/how-barclays-is-preventing-fraud-with-ai/">How Barclays Is Preventing Fraud With AI</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-160286 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-1.jpg" alt="How Barclays Is Preventing Fraud With AI" width="611" height="394" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-1.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-1-300x193.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-1-768x495.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-1-600x387.jpg 600w" sizes="(max-width: 611px) 100vw, 611px" /></p>
<p><strong>Bottom Line:</strong> Barclays&#8217; and Kount&#8217;s co-developed new product, Barclays Transact reflects the future of how companies will innovate together to apply AI-based fraud prevention to the many payment challenges merchants face today.</p>
<p>Merchant payment providers have seen the severity, scope, and speed of fraud attacks increase exponentially this year. Account takeovers, card-not-present fraud, SMS spoofing, and phishing are just a few of the many techniques cybercriminals are using to defraud merchants out of millions of dollars. One in three merchants, 32%, prioritize payment providers&#8217; fraud and security strengths over customer support and trust according to a recent <a class="color-link" title="https://today.yougov.com/" href="https://today.yougov.com/" target="_blank" rel="nofollow noopener">YouGov</a> survey.  But it doesn’t have to be a choice between security and a frictionless transaction.</p>
<p>Frustrated by the limitations of existing fraud prevention systems, many payment providers are working as fast as they can to pilot AI- and machine-learning-based applications and platforms. Barclays Payment Solutions&#8217; decision to work with AI-based solution <a class="color-link" title="https://kount.com/" href="https://kount.com/" target="_blank" rel="nofollow noopener">Kount</a> is what the future of AI-based fraud prevention for payment providers looks like.</p>
<p><strong>How AI Helps Thwart Fraud And Increase Sales at Barclays   </strong></p>
<p>Barclays Payment Services handles 40% of all merchant payments in the UK. They&#8217;ve been protecting merchants and their customers&#8217; data for over 50 years, and their fraud and security teams have won industry awards. For Barclays, excelling at merchant and payment security is the only option.</p>
<p>In order to offer an AI-based suite of tools to help merchants make their online transactions both simpler and safer, Barclays chose to partner with Kount. Their model of innovating together enables Barclays to strengthen their merchant payment business with AI-based fraud prevention and gain access to Kount&#8217;s Identity Trust Global Network, the largest network of trust and fraud-related signals. Kount gains knowledge into how they can fine-tune their AI and machine learning technologies to excel at payment services. Best of all, Barclays’ merchant customers will be able to sell more by streamlining the payment experience for their customers. The following is an overview of the Barclays Transact suite for merchants.</p>
<p><img class="  wp-image-160288 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-2.jpg" alt="How Barclays Is Preventing Fraud With AI" width="638" height="351" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-2.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-2-300x165.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-2-768x422.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-2-600x329.jpg 600w" sizes="(max-width: 638px) 100vw, 638px" /></p>
<p>Barclays and Kount defined objectives for Barclay Transact: protect against increasingly sophisticated eCommerce fraud attempts, improve their merchants&#8217; customer experiences during purchases, prepare for UK-mandated Strong Customer Authentication (SCA) by allowing businesses to take advantage of Transaction Risk Analysis (TRA) exemptions, optimize payment acceptance workflows and capitalize on Kount&#8217;s Identity Trust Global Network.</p>
<p>Adding urgency to the co-creation of Barclays Transact are <a class="color-link" title="https://kount.com/solution/psd2-regulation/" href="https://kount.com/solution/psd2-regulation/" target="_blank" rel="nofollow noopener">UK regulatory requirements</a>. To help provide clarity and support to merchants and the market from the impact of Covid-19 the Financial Conduct Authority (FCA) have agreed to delay the enforcement of a Strong Customer Authentication (SCA) until 14 September 2021 in the UK. The European Economic Area (EEA) deadline remains 31 December, 2020. Kount&#8217;s AI- and machine learning algorithms designed into Barclay Transact, tested at beta sites and fine-tuned for the first release, are effective in meeting UK government mandates.</p>
<p><strong>How AI Is Turning Trust Into A Sales Accelerator At Barclays </strong></p>
<p>The Barclays Payment Solutions and Kount teams believe that the more ambitious the goals for Barclays Transact to deliver value to merchants, the stronger the suite will be. Here are examples of goals businesses can achieve with this partnership:</p>
<ol>
<li>Achieve as few false positives as possible by making real-time updates to machine learning algorithms and fine-tuning merchant responses.</li>
<li>Reduce the number of manual reviews for fraud analysts consistently by applying <a class="color-link" title="https://kount.com/ai-digital-fraud-prevention/" href="https://kount.com/ai-digital-fraud-prevention/" target="_blank" rel="nofollow noopener">AI and machine learning</a> to provide early warning of anomalies.</li>
<li>Minimize the number of chargebacks to merchant partners.</li>
<li>Reduce the friction and challenges merchants experience with legacy fraud prevention systems by streamlining the purchasing experience.</li>
<li>Enable compliance to UK-mandated regulatory requirements while streamlining merchants and their customers&#8217; buying experiences.</li>
</ol>
<p>Barclays Transact analyzes every transaction in real-time using Kount&#8217;s AI-based fraud analysis technology, scoring each on a spectrum of low to high risk. Each Barclays merchant&#8217;s gateway then uses this score to identify the transactions which qualify for TRA exemptions. This results in a more frictionless payment and checkout experience for customers, resulting in lower levels of shopping cart abandonment and increased sales. Higher-risk transactions requiring further inspection will still go through two-factor authentication, or be immediately declined, per the regulation and customer risk appetite. The following is an example of the workflow Barclays and Kount were able to accomplish by innovating together:</p>
<p><img class="  wp-image-160289 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-3.jpg" alt="How Barclays Is Preventing Fraud With AI" width="639" height="359" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-3.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-3-300x168.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-3-768x431.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-Barclays-Is-Preventing-Fraud-With-AI-figure-3-600x337.jpg 600w" sizes="(max-width: 639px) 100vw, 639px" /></p>
<p><strong>Conclusion </strong></p>
<p>Improving buying experiences and keeping them more secure on a trusted platform is an ambitious design goal for any suite of online tools. Barclays and Kount&#8217;s successful development and launch of a co-developed product is prescient and points the way forward for payment providers who need AI expertise to battle fraud now. A bonus is how the partnership is going to enrich the Kount Identity Trust Global Network, the largest network of trust and risk signals, which is comprised of 32 billion annual interactions from more than 6,500 customers across 75+ industries. &#8220;We are excited to be partnering with Kount, because they share our goal of collaborative innovation, and a drive to deliver best-in-class shopper experiences. Thanks to Kount&#8217;s award-winning fraud detection software, the new module will not only help customers to fight fraud and prevent unwanted chargebacks, but it will also help them to maximize sales, improve customer experience, and better prepare for the introduction of SCA,&#8221; David Jeffrey, Director of Product, Barclaycard Payments said.</p>
<p>&nbsp;</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160285/how-barclays-is-preventing-fraud-with-ai/">How Barclays Is Preventing Fraud With AI</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/dykYvKBUtf8" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">160285</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/160285/how-barclays-is-preventing-fraud-with-ai/</feedburner:origLink></item>
		<item>
		<title>Debunking The Myth That Greater Compliance Makes IT More Secure</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/dBI9_GhvpaQ/</link>
		<pubDate>Mon, 22 Jun 2020 16:29:26 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[Amazon Web Services]]></category>
		<category><![CDATA[Amazon Web Services Security]]></category>
		<category><![CDATA[Centrify]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[Identity-Centric PAM]]></category>
		<category><![CDATA[Identity-Centric Privileged Access Management]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[Palo Alto Networks]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=160048</guid>
		<description><![CDATA[<p>Bottom Line:  Excelling at compliance doesn&#8217;t protect any business from being hacked, yet pursuing a continuous risk management strategy helps. With a few exceptions (such as spearphishing), cyberattacks are, by nature, brutally opportunistic and random. They are driven to disrupt operations at best and steal funds, records, and privileged access credentials at worst. Conversely, the [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160048/debunking-the-myth-that-greater-compliance-makes-it-more-secure/">Debunking The Myth That Greater Compliance Makes IT More Secure</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-160049 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Debunking-The-Myth-That-Greater-Compliance-Makes-IT-More-Secure-final.jpg" alt="Debunking The Myth That Greater Compliance Makes IT More Secure" width="632" height="367" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Debunking-The-Myth-That-Greater-Compliance-Makes-IT-More-Secure-final.jpg 1539w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Debunking-The-Myth-That-Greater-Compliance-Makes-IT-More-Secure-final-300x174.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Debunking-The-Myth-That-Greater-Compliance-Makes-IT-More-Secure-final-768x446.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Debunking-The-Myth-That-Greater-Compliance-Makes-IT-More-Secure-final-600x348.jpg 600w" sizes="(max-width: 632px) 100vw, 632px" /></p>
<p><strong>Bottom Line:</strong>  Excelling at compliance doesn&#8217;t protect any business from being hacked, yet pursuing a continuous risk management strategy helps.</p>
<p>With a few exceptions (such as spearphishing), cyberattacks are, by nature, brutally opportunistic and random. They are driven to disrupt operations at best and steal funds, records, and privileged access credentials at worst. Conversely, the most important compliance event of all, audits, are planned for, often months in advance. Governance, Risk, and Compliance (GRC) teams go to Herculean efforts to meet and exceed audit prep timelines working evenings and weekends.</p>
<p>Wanting to learn more about the relationship between GRC and cybersecurity strategy, I searched for webinars on the topic. I found <a class="color-link" title="https://www.centrify.com/lp/webinar-improve-your-compliance-posture/" href="https://www.centrify.com/lp/webinar-improve-your-compliance-posture/" target="_blank" rel="nofollow noopener">Improve Your Compliance Posture with Identity-Centric PAM</a>, a recent webinar-on-demand offered by <a class="color-link" title="https://www.centrify.com/" href="https://www.centrify.com/" target="_blank" rel="nofollow noopener">Centrify</a>. The webinar brought up several interesting insights, including shared pains companies experience with compliance and cybersecurity, yet require drastically different approaches to solving them.</p>
<p><strong>Rationalizing Compliance Spending with Cybersecurity </strong></p>
<p>The truth is organizations are attempting to rationalize the high costs of compliance by looking for how GRC spend can also improve cybersecurity. This is a dangerous assumption, as Marriott&#8217;s third breach indicates. Marriott is an excellently managed business and sets standards in compliance. Unfortunately, that hasn&#8217;t thwarted three breaches they&#8217;ve experienced.</p>
<p>Why are organizations assuming GRC spending will improve cybersecurity? It&#8217;s because both areas share a common series of pains that require different solutions, according to the webinar. These pains include:</p>
<ul>
<li><strong>Updates to regulations are exponentially increasing today, averaging 200 or more per day from approximately 900 oversight agencies worldwide, leading to a quickly changing, heterogeneous landscape.</strong> Dr. Torsten George, Cybersecurity Evangelist at Centrify, said that when he worked in the GRC space, the midsize clients he worked with had to deal with 17 different regulations. Larger organizations that operate on a global basis are dealing with, on average, 70 or more regulations they need to stay in compliance with. Dr. George provided an overview of the compliance landscape, differentiating between the levels compliance requirements every organization needs to abide by, which is shown below:</li>
</ul>
<p><img class="  wp-image-160052 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/The-Compliance-Landscape.jpg" alt="Debunking The Myth That Greater Compliance Makes IT More Secure" width="638" height="355" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/The-Compliance-Landscape.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/The-Compliance-Landscape-300x167.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/The-Compliance-Landscape-768x427.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/The-Compliance-Landscape-600x334.jpg 600w" sizes="(max-width: 638px) 100vw, 638px" /></p>
<ul>
<li><strong>Compliance is, by nature, reactive to a known event (audit), while cybersecurity is also entirely reactive to random events (cyberattacks).</strong> GRC teams need to ramp up their staff and equip them with the apps and tools they need at least six months before an audit. For cybersecurity, the threat is random and will most likely be more severe in terms of financial loss. Preparing for each takes entirely different strategies.</li>
<li><strong>The lack of continuous risk monitoring by GRC teams and identity management by IT cybersecurity leads to systemic failures in achieving compliance and securing an organization.</strong> The webinar makes an excellent point that for compliance to succeed, it needs to be based on continuous risk management, not just checking off the boxes or categories of a given GRC approach. The same holds for cybersecurity. Identity-Centric Privileged Access Management (PAM) provides GRC and IT professionals mutual benefits when it comes to achieving the mission of being and staying compliant, and shows how securing enterprises drive better compliance, not vice versa.</li>
<li><strong>Manually updating compliance mapping tables showing the interrelationships of requirements by industry is not scaling – and leaving gaps in GRC coverage.</strong> The more regulated a business is, for example manufacturing medical products, the more important it is to automate every aspect of compliance. A great place to start is automating the process of creating mapping tables. Taking a manual approach to creating mapping tables comparing standards often leads to errors and gaps. And in highly regulated industries like medical products manufacturing, the accuracy, speed, and scale of staying compliant can be turned into a competitive advantage, leading to more sales.</li>
</ul>
<p><strong>How To Resolve The Conflict Between GRC and Cybersecurity Spending</strong></p>
<p>According to the webinar, 80% of today&#8217;s data breaches are caused by default, weak, stolen, or otherwise compromised credentials. GRC and cybersecurity strategies&#8217; best efforts need to be put on securing privileged access first. The webinar makes a strong argument for prioritizing privileged access security as the initiative that can unify GRC and cybersecurity strategies.</p>
<p>Key insights from the webinar include the following:</p>
<ul>
<li>Industry standards and government regulations are calling for identity and access management as a requirement, with several specifically naming privilege access controls.</li>
<li>Identity-Centric Privileged Access Management (PAM) approaches help meet compliance mandates, while at the same time hardening cybersecurity to the threat surface level.</li>
<li>Attaining greater compliance by taking an Identity-Centric PAM approach ensures machines have secured identities as well, and the use of anonymous access accounts is limited to break-glass scenarios only, while organizations should otherwise be leveraging enterprise directory identities for the authentication and authorization process.</li>
<li>Improving accountability and segmentation by establishing granular security controls and auditing everything helps bridge the gap between GRC and cybersecurity initiatives.</li>
</ul>
<p><img class="  wp-image-160053 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Mission-Possible.jpg" alt="" width="631" height="345" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Mission-Possible.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Mission-Possible-300x164.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Mission-Possible-768x420.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/Mission-Possible-600x328.jpg 600w" sizes="(max-width: 631px) 100vw, 631px" /></p>
<p><strong>Conclusion </strong></p>
<p>Continuous risk management is key to excelling at compliance, just as securing privileged access credentials is foundational to an effective cybersecurity strategy. Dr. Torsten George ended the webinar saying, <em>&#8220;In the long term, I believe that the current situation that we&#8217;re dealing with and its associated spike of cyber-attacks will lead to even stricter compliance mandates; especially when it comes to secure remote access by key IT stakeholders and outsourced IT.</em>&#8221; The bottom line is that compliance and cybersecurity must share the common goal of protecting their organizations&#8217; privileged access credentials using adaptive approaches and technologies if both are going to succeed.</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160048/debunking-the-myth-that-greater-compliance-makes-it-more-secure/">Debunking The Myth That Greater Compliance Makes IT More Secure</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/dBI9_GhvpaQ" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">160048</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/160048/debunking-the-myth-that-greater-compliance-makes-it-more-secure/</feedburner:origLink></item>
		<item>
		<title>10 Ways Enterprises Are Getting Results From AI Strategies</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/8bE47YKpSs8/</link>
		<pubDate>Sun, 21 Jun 2020 15:51:05 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Adoption in Enterprises]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[BMC]]></category>
		<category><![CDATA[BMC's Autonomous Digital Enterprise (ADE)]]></category>
		<category><![CDATA[Eightfold]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[McKinsey & Company]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=160028</guid>
		<description><![CDATA[<p>One in 10 enterprises now use 10 or more AI applications; chatbots, process optimization, and fraud analysis lead a recent survey&#8217;s top use cases according to MMC Ventures. 83% of IT leaders say AI &#38; ML is transforming customer engagement, and 69% say it is transforming their business according to Salesforce Research. IDC predicts spending [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160028/10-ways-enterprises-are-getting-results-from-ai-strategies/">10 Ways Enterprises Are Getting Results From AI Strategies</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-160029 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-final.jpg" alt="10 Ways Enterprises Are Getting Results From AI Strategies final" width="633" height="333" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-final.jpg 1700w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-final-300x158.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-final-768x404.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-final-600x316.jpg 600w" sizes="(max-width: 633px) 100vw, 633px" /></p>
<ul>
<li>One in 10 enterprises now use 10 or more AI applications; chatbots, process optimization, and fraud analysis lead a recent survey&#8217;s top use cases according to <a class="color-link" title="https://www.mmcventures.com/wp-content/uploads/2019/02/The-State-of-AI-2019-Divergence.pdf" href="https://www.mmcventures.com/wp-content/uploads/2019/02/The-State-of-AI-2019-Divergence.pdf" target="_blank" rel="nofollow noopener">MMC Ventures</a>.</li>
<li>83% of IT leaders say AI &amp; ML is transforming customer engagement, and 69% say it is transforming their business according to <a class="color-link" title="https://www.salesforce.com/research/market/" href="https://www.salesforce.com/research/market/" target="_blank" rel="nofollow noopener">Salesforce Research</a>.</li>
<li><a class="color-link" title="https://www.idc.com/getdoc.jsp?containerId=prUS45481219" href="https://www.idc.com/getdoc.jsp?containerId=prUS45481219" target="_blank" rel="nofollow noopener">IDC</a> predicts spending on AI systems will reach $97.9B in 2023.</li>
</ul>
<p>AI pilots are progressing into production based on their combined contributions to improving customer experience, stabilizing and increasing revenues, and reducing costs. The most successful AI use cases contribute to all three areas and deliver measurable results. Of the many use cases where AI is delivering proven value in enterprises today, the ten areas discussed below are notable for the measurable results they are providing.</p>
<p>What each of these ten use cases has in common is the accuracy and efficiency they can analyze and recommend actions based on real-time monitoring of customer interactions, production, and service processes. Enterprises who get AI right the first time build the underlying data structures and frameworks to support the advanced analytics, machine learning, and AI techniques that show the best potential to deliver value. There are various frameworks available, with <a class="color-link" title="https://www.bmc.com/corporate/autonomous-digital-enterprise.html?vu=ade" href="https://www.bmc.com/corporate/autonomous-digital-enterprise.html?vu=ade" target="_blank" rel="nofollow noopener">BMC&#8217;s Autonomous Digital Enterprise (ADE)</a> encapsulating what enterprises need to scale out their AI pilots into production. What&#8217;s unique about BMC&#8217;s approach is its focus on delivering transcendent customer experiences by creating an ecosystem that uses technology to cater to every touchpoint on a customer’s journey, across any channel a customer chooses to interact with an enterprise on.</p>
<p><strong>10 Areas Where AI Is Delivering Proven Value Today </strong></p>
<p>Having progressed from pilot to production across many of the world&#8217;s leading enterprises, they&#8217;re great examples of where AI is delivering value today. The following are 10 areas where AI is delivering proven value in enterprises today</p>
<ul>
<li><strong>Customer feedback systems lead all implementations of AI-based self-service platforms. </strong>That&#8217;s consistent with the discussions I&#8217;ve had with manufacturing CEOs who are committed to Voice of the Customer (VoC) programs that also fuel their new product development plans. The best-run manufacturers are using AI to gain customer feedback better also to improve their configure-to-order product customization strategies as well. Mining contact center data while improving customer response times are working on AI platforms today. Source: Forrester study, AI-Infused Contact Centers Optimize Customer Experience Develop A Road Map Now For A Cognitive Contact Center.</li>
</ul>
<p><img class="  wp-image-160033 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-1.jpg" alt="10 Ways Enterprises Are Getting Results From AI Strategies figure 1" width="637" height="404" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-1.jpg 857w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-1-300x190.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-1-768x487.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-1-600x380.jpg 600w" sizes="(max-width: 637px) 100vw, 637px" /></p>
<ul>
<li><strong>McKinsey finds that AI is improving demand forecasting by reducing forecasting errors by 50% and reduce lost sales by 65% with better product availability.</strong> Supply chains are the lifeblood of any manufacturing business. McKinsey&#8217;s initial use case analysis is finding that AI can reduce costs related to transport and warehousing and supply chain administration by 5% to 10% and 25% to 40%, respectively. With AI, overall inventory reductions of 20% to 50% are possible. Source: <a class="color-link" title="https://www.mckinsey.de/files/170419_mckinsey_ki_final_m.pdf" href="https://www.mckinsey.de/files/170419_mckinsey_ki_final_m.pdf" target="_blank" rel="nofollow noopener">Smartening up with Artificial Intelligence (AI) &#8211; What&#8217;s in it for Germany and its Industrial Sector?</a> McKinsey &amp; Company.</li>
</ul>
<p><img class="  wp-image-160034 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-2.jpg" alt="10 Ways Enterprises Are Getting Results From AI Strategies figure 2" width="634" height="672" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-2.jpg 848w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-2-283x300.jpg 283w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-2-768x814.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-2-600x636.jpg 600w" sizes="(max-width: 634px) 100vw, 634px" /></p>
<ul>
<li><strong>The majority of CEOs and Chief Human Resource Officers (CHROs) globally plan to use more AI within three years, with the U.S. leading all other nations at 73%.</strong> Over 63% of all CEOs and CHROs interviewed say that new technologies have a positive impact overall on their operations. CEOs and CHROs introducing AI into their enterprises are doing an effective job at change management, as the majority of employees, 54%, are less concerned about AI now that they see its benefits. C-level executives who are upskilling their employees by enabling them to have stronger digital dexterity skills stand a better chance of winning the war for talent. Source: Harris Interactive, in collaboration with Eightfold Talent Intelligence And Management Report 2019-2020 Report.</li>
</ul>
<p><img class="  wp-image-160035 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-3.jpg" alt="10 Ways Enterprises Are Getting Results From AI Strategies figure 3" width="633" height="377" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-3.jpg 1098w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-3-300x179.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-3-768x457.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-3-600x357.jpg 600w" sizes="(max-width: 633px) 100vw, 633px" /></p>
<ul>
<li><strong>AI is the foundation of the next generation of logistics technologies, with the most significant gains being made with advanced resource scheduling systems.</strong> AI-based techniques are the foundation of a broad spectrum of next-generation logistics and supply chain technologies now under development. The most significant gains are being made where AI can contribute to solving complex constraints, cost, and delivery problems manufacturers are facing today. For example, AI is providing insights into where automation can deliver the most significant scale advantages. Source: McKinsey &amp; Company, <a class="color-link" title="https://www.mckinsey.com/industries/travel-transport-and-logistics/our-insights/automation-in-logistics-big-opportunity-bigger-uncertainty" href="https://www.mckinsey.com/industries/travel-transport-and-logistics/our-insights/automation-in-logistics-big-opportunity-bigger-uncertainty" target="_blank" rel="nofollow noopener">Automation in logistics: Big opportunity, bigger uncertainty</a>, April 2019. By Ashutosh Dekhne, Greg Hastings, John Murnane, and Florian Neuhaus.</li>
</ul>
<p><img class="  wp-image-160036 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-4.jpg" alt="10 Ways Enterprises Are Getting Results From AI Strategies figure 4" width="637" height="449" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-4.jpg 815w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-4-300x211.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-4-768x541.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-4-600x423.jpg 600w" sizes="(max-width: 637px) 100vw, 637px" /></p>
<ul>
<li><strong>AI sees the most significant adoption by marketers working in $500M to $1B companies, with conversational AI for customer service as the most dominant. </strong>Businesses with between $500M to $1B lead all other revenue categories in the number and depth of AI adoption use cases. Just over 52% of small businesses with sales of $25M or less are using AI for predictive analytics for customer insights. It&#8217;s interesting to note that small companies are the leaders in AI spending, at 38.1%, to improve marketing ROI by optimizing marketing content and timing. Source: <a class="color-link" title="https://cmosurvey.org/wp-content/uploads/sites/15/2019/02/The_CMO_Survey-Highlights-and_Insights_Report-Feb-2019.pdf" href="https://cmosurvey.org/wp-content/uploads/sites/15/2019/02/The_CMO_Survey-Highlights-and_Insights_Report-Feb-2019.pdf" target="_blank" rel="nofollow noopener">The CMO Survey: Highlights and Insights Report, February 2019.</a> Duke University, Deloitte, and American Marketing Association. (71 pp., PDF, free, no opt-in).</li>
</ul>
<p><img class="  wp-image-160037 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-5.jpg" alt="10 Ways Enterprises Are Getting Results From AI Strategies figure 5" width="638" height="352" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-5.jpg 1108w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-5-300x166.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-5-768x424.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-5-600x331.jpg 600w" sizes="(max-width: 638px) 100vw, 638px" /></p>
<ul>
<li><strong>A semiconductor manufacturer is combining smart, connected machines with AI to improve yield rates by 30% or more, while also optimizing fab operations and streamlining the entire production process.</strong> They&#8217;ve also been able to reduce supply chain forecasting errors by 50% and lost sales by 65% by having more accurate product availability, both attributable to insights gained from AI. They&#8217;re also automating quality testing using machine learning, increasing defect detection rates up to 90%. These are the kind of measurable results manufacturers look for when deciding if a new technology is going to deliver results or not. These and many other findings from the semiconductor&#8217;s interviews with McKinsey are in the study, <a class="color-link" title="https://www.mckinsey.com/~/media/McKinsey/Industries/Semiconductors/Our%20Insights/Smartening%20up%20with%20artificial%20intelligence/Smartening-up-with-artificial-intelligence.ashx" href="https://www.mckinsey.com/~/media/McKinsey/Industries/Semiconductors/Our%20Insights/Smartening%20up%20with%20artificial%20intelligence/Smartening-up-with-artificial-intelligence.ashx" target="_blank" rel="nofollow noopener">Smartening up with Artificial Intelligence (AI) &#8211; What&#8217;s in it for Germany and its Industrial Sector? </a>. The following graphic from the study illustrates the many ways AI and machine learning are improving semiconductor manufacturing.</li>
</ul>
<p><img class="  wp-image-160038 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-6.jpg" alt="10 Ways Enterprises Are Getting Results From AI Strategies figure 6" width="637" height="337" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-6.jpg 918w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-6-300x159.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-6-768x407.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-6-600x318.jpg 600w" sizes="(max-width: 637px) 100vw, 637px" /></p>
<ul>
<li><strong>AI is making it possible to create propensity models by persona, and they are invaluable for predicting which customers will act on a bundling or pricing offer.</strong> By definition, <a class="color-link" title="https://www.oreilly.com/library/view/predictive-analytics-with/9781484212004/9781484212011_Ch07.xhtml" href="https://www.oreilly.com/library/view/predictive-analytics-with/9781484212004/9781484212011_Ch07.xhtml" target="_blank" rel="nofollow noopener">propensity models</a> rely on predictive analytics including machine learning to predict the probability a given customer will act on a bundling or pricing offer, e-mail campaign or other call-to-action leading to a purchase, upsell or cross-sell. Propensity models have proven to be very effective at increasing customer retention and reducing churn. Every business excelling at omnichannel today rely on propensity models to better predict how customers&#8217; preferences and past behavior will lead to future purchases. The following is a dashboard that shows how propensity models work. Source: customer propensities dashboard is from <a class="color-link" title="https://community.tibco.com/wiki/tibco-cpg-retail-solutions" href="https://community.tibco.com/wiki/tibco-cpg-retail-solutions" target="_blank" rel="nofollow noopener">TIBCO</a>.</li>
</ul>
<p><img class="  wp-image-160039 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-7.jpg" alt="10 Ways Enterprises Are Getting Results From AI Strategies figure 7" width="633" height="312" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-7.jpg 903w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-7-300x148.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-7-768x378.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-7-600x296.jpg 600w" sizes="(max-width: 633px) 100vw, 633px" /></p>
<ul>
<li><strong>AI is reducing logistics costs by finding patterns in track-and-trace data captured using IoT-enabled sensors, contributing to $6M in annual savings.</strong> BCG recently looked at how a decentralized supply chain using track-and-trace applications could improve performance and reduce costs. They found that in a 30-node configuration, when blockchain is used to share data in real-time across a supplier network, combined with better analytics insight, cost savings of $6M a year is achievable. Source: Boston Consulting Group, <a class="color-link" title="https://www.bcg.com/publications/2018/pairing-blockchain-with-iot-to-cut-supply-chain-costs.aspx" href="https://www.bcg.com/publications/2018/pairing-blockchain-with-iot-to-cut-supply-chain-costs.aspx" target="_blank" rel="nofollow noopener">Pairing Blockchain with IoT to Cut Supply Chain Costs</a>, December 18, 2018, by Zia Yusuf, Akash Bhatia, Usama Gill, Maciej Kranz, Michelle Fleury, and Anoop Nannra.</li>
</ul>
<p><img class="  wp-image-160040 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-8.jpg" alt="10 Ways Enterprises Are Getting Results From AI Strategies figure 8" width="638" height="350" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-8.jpg 915w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-8-300x165.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-8-768x421.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-8-600x329.jpg 600w" sizes="(max-width: 638px) 100vw, 638px" /></p>
<ul>
<li><strong>Detecting and acting on inconsistent supplier quality levels and deliveries using AI-based applications is reducing the cost of bad quality across electronic, high-tech, and discrete manufacturing.</strong> Based on conversations with North American-based mid-tier manufacturers, the second most significant growth barrier they&#8217;re facing today is suppliers&#8217; lack of consistent quality and delivery performance. Using AI, manufacturers can discover quickly who their best and worst suppliers are, and which production centers are most accurate in catching errors. Manufacturers are using dashboards much like the one below for applying machine learning to supplier quality, delivery, and consistency challenges. Source: Microsoft, <a class="color-link" title="https://docs.microsoft.com/en-us/power-bi/sample-supplier-quality" href="https://docs.microsoft.com/en-us/power-bi/sample-supplier-quality" target="_blank" rel="nofollow noopener">Supplier Quality Analysis sample for Power BI: Take a tour</a>.</li>
</ul>
<p><img class="  wp-image-160041 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-9.jpg" alt="10 Ways Enterprises Are Getting Results From AI Strategies figure 9" width="638" height="578" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-9.jpg 650w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-9-300x272.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-9-600x544.jpg 600w" sizes="(max-width: 638px) 100vw, 638px" /></p>
<ul>
<li><strong>Optimizing Shop Floor Operations with Real-Time Monitoring and AI is in production at Hitachi today. </strong>Combining real-time monitoring and AI to optimize shop floor operations, providing insights into machine-level loads and production schedule performance, is now in production at Hitachi. Knowing in real-time how each machine&#8217;s load level impacts overall production schedule performance leads to better decisions managing each production run. Optimizing the best possible set of machines for a given production run is now possible using AI.  Source: <a class="color-link" title="http://www.hitachinext.com/pdfs/factories-of-future.pdf" href="http://www.hitachinext.com/pdfs/factories-of-future.pdf" target="_blank" rel="nofollow noopener">Factories of the Future: How Symbiotic Production Systems, Real-Time Production Monitoring, Edge Analytics, and AI Are Making Factories Intelligent and Agile,</a> Youichi Nonaka, Senior Chief Researcher, Hitachi R&amp;D Group and Sudhanshu Gaur Director, Global Center for Social Innovation Hitachi America R&amp;D.</li>
</ul>
<p><img class="  wp-image-160042 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-10.jpg" alt="10 Ways Enterprises Are Getting Results From AI Strategies figure 10" width="639" height="357" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-10.jpg 1196w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-10-300x168.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-10-768x430.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/10-Ways-Enterprises-Are-Getting-Results-From-AI-Strategies-figure-10-600x336.jpg 600w" sizes="(max-width: 639px) 100vw, 639px" /></p>
<p>Additional reading:</p>
<p><a class="color-link" title="https://econsultancy.com/15-examples-of-artificial-intelligence-in-marketing/" href="https://econsultancy.com/15-examples-of-artificial-intelligence-in-marketing/" target="_blank" rel="nofollow noopener">15 examples of artificial intelligence in marketing</a>, eConsultancy, February 28, 2019</p>
<p><a class="color-link" title="https://www.statista.com/chart/17222/artificial-intelligence-marketing/" href="https://www.statista.com/chart/17222/artificial-intelligence-marketing/" target="_blank" rel="nofollow noopener">4 Positive Effects of AI Use in Email Marketing</a>, Statista, March 1, 2019</p>
<p><a class="color-link" title="https://www.forbes.com/sites/kateharrison/2019/01/20/5-ways-artificial-intelligence-can-improve-your-marketing-plus-10-provider-suggestions/#760696655697" href="https://www.forbes.com/sites/kateharrison/2019/01/20/5-ways-artificial-intelligence-can-improve-your-marketing-plus-10-provider-suggestions/#760696655697" target="_blank" rel="noopener">4 Ways Artificial Intelligence Can Improve Your Marketing (Plus 10 Provider Suggestions),</a> Forbes, Kate Harrison, January 20, 2019</p>
<p><a class="color-link" title="https://www.mckinsey.com/~/media/McKinsey/Industries/Advanced%20Electronics/Our%20Insights/How%20artificial%20intelligence%20can%20deliver%20real%20value%20to%20companies/MGI-Artificial-Intelligence-Discussion-paper.ashx" href="https://www.mckinsey.com/~/media/McKinsey/Industries/Advanced%20Electronics/Our%20Insights/How%20artificial%20intelligence%20can%20deliver%20real%20value%20to%20companies/MGI-Artificial-Intelligence-Discussion-paper.ashx" target="_blank" rel="nofollow noopener">Artificial Intelligence: The Next Frontier?</a> McKinsey Global Institute (PDF, 80 pp., no opt-in)</p>
<p><a class="color-link" title="http://www.woodsidecap.com/wp-content/uploads/2017/01/Artificial-Intelligence-Report.pdf" href="http://www.woodsidecap.com/wp-content/uploads/2017/01/Artificial-Intelligence-Report.pdf" target="_blank" rel="nofollow noopener">Artificial Intelligence: The Ultimate Technological Disruption Ascends</a>, Woodside Capital Partners. (PDF,</p>
<p>DHL Trend Research, <a class="color-link" title="https://www.logistics.dhl/content/dam/dhl/global/core/documents/pdf/glo-core-trend-radar-widescreen.pdf" href="https://www.logistics.dhl/content/dam/dhl/global/core/documents/pdf/glo-core-trend-radar-widescreen.pdf" target="_blank" rel="nofollow noopener">Logistics Trend Radar, Version 2018/2019</a> (PDF, 55 pp., no opt-in)</p>
<p>2018 (43 pp., PDF, free, no opt-in).</p>
<p>Digital/McKinsey, <a class="color-link" title="https://www.mckinsey.com/~/media/McKinsey/Industries/Semiconductors/Our%20Insights/Smartening%20up%20with%20artificial%20intelligence/Smartening-up-with-artificial-intelligence.ashx" href="https://www.mckinsey.com/~/media/McKinsey/Industries/Semiconductors/Our%20Insights/Smartening%20up%20with%20artificial%20intelligence/Smartening-up-with-artificial-intelligence.ashx" target="_blank" rel="nofollow noopener">Smartening up with Artificial Intelligence (AI) &#8211; What&#8217;s in it for Germany and its Industrial Sector?</a> (PDF, 52 pp., no opt-in)</p>
<p><a class="color-link" title="https://www.mckinsey.com/~/media/mckinsey/industries/automotive%20and%20assembly/our%20insights/winning%20tomorrows%20car%20buyers%20using%20artificial%20intelligence%20in%20marketing%20and%20sales/how-to-win-tomorrows-car-buyers-artificial-intelligence-in-marketing-and-sales-final.ashx" href="https://www.mckinsey.com/~/media/mckinsey/industries/automotive%20and%20assembly/our%20insights/winning%20tomorrows%20car%20buyers%20using%20artificial%20intelligence%20in%20marketing%20and%20sales/how-to-win-tomorrows-car-buyers-artificial-intelligence-in-marketing-and-sales-final.ashx" target="_blank" rel="nofollow noopener">How To Win Tomorrow&#8217;s Car Buyers – Artificial Intelligence in Marketing &amp; Sales, McKinsey Center for Future Mobility</a>, McKinsey &amp; Company. February 2019. (44 pp., PDF, free, no opt-in)</p>
<p><a class="color-link" title="https://www.salesforce.com/form/events/webinars/form-rss/1470357?d=7010M000000u7Sc" href="https://www.salesforce.com/form/events/webinars/form-rss/1470357?d=7010M000000u7Sc" target="_blank" rel="nofollow noopener">How Top Marketers Use Artificial Intelligence On-Demand Webinar</a> with Vala Afshar, Chief Digital Evangelist, Salesforce and Meghann York, Director, Product Marketing, Salesforce</p>
<p><a class="color-link" title="https://www.statista.com/study/50485/artificial-intelligence/" href="https://www.statista.com/study/50485/artificial-intelligence/" target="_blank" rel="nofollow noopener">In-depth: Artificial Intelligence 2019, Statista Digital Market Outlook, February 2019</a> (client access reqd).</p>
<p>bes Insights and Quantcast Study (17 pp., PDF, free, opt-in),</p>
<p><a class="color-link" title="https://www.mckinsey.com/~/media/McKinsey/Business%20Functions/Marketing%20and%20Sales/Our%20Insights/EBook%20Big%20data%20analytics%20and%20the%20future%20of%20marketing%20sales/Big-Data-eBook.ashx" href="https://www.mckinsey.com/~/media/McKinsey/Business%20Functions/Marketing%20and%20Sales/Our%20Insights/EBook%20Big%20data%20analytics%20and%20the%20future%20of%20marketing%20sales/Big-Data-eBook.ashx" target="_blank" rel="nofollow noopener">Marketing &amp; Sales Big Data, Analytics, and the Future of Marketing &amp; Sales,</a> (PDF, 60 pp., no opt-in), McKinsey &amp; Company.</p>
<p>McKinsey &amp; Company, <a class="color-link" title="https://www.mckinsey.com/industries/travel-transport-and-logistics/our-insights/automation-in-logistics-big-opportunity-bigger-uncertainty" href="https://www.mckinsey.com/industries/travel-transport-and-logistics/our-insights/automation-in-logistics-big-opportunity-bigger-uncertainty" target="_blank" rel="nofollow noopener">Automation in logistics: Big opportunity, bigger uncertainty</a>, April 2019. By Ashutosh Dekhne, Greg Hastings, John Murnane, and Florian Neuhaus</p>
<p>McKinsey &amp; Company, <a class="color-link" title="https://www.mckinsey.com/featured-insights/artificial-intelligence/notes-from-the-ai-frontier-modeling-the-impact-of-ai-on-the-world-economy" href="https://www.mckinsey.com/featured-insights/artificial-intelligence/notes-from-the-ai-frontier-modeling-the-impact-of-ai-on-the-world-economy" target="_blank" rel="nofollow noopener">Notes from the AI frontier: Modeling the impact of AI on the world economy</a>, September 2018 By Jacques Bughin, Jeongmin Seong, James Manyika, Michael Chui, and Raoul Joshi</p>
<p>Papadopoulos, T., Gunasekaran, A., Dubey, R., &amp; Fosso Wamba, S. (2017). Big data and analytics in operations and supply chain management: managerial aspects and practical challenges. <em>Production Planning &amp; Control</em>, <em>28</em>(11/12), 873-876.</p>
<p><a class="color-link" title="https://www.mckinsey.com/industries/retail/our-insights/powerful-pricing-the-next-frontier-in-apparel-and-fashion-advanced-analytics" href="https://www.mckinsey.com/industries/retail/our-insights/powerful-pricing-the-next-frontier-in-apparel-and-fashion-advanced-analytics" target="_blank" rel="nofollow noopener">Powerful pricing: The next frontier in apparel and fashion advanced analytics</a>, McKinsey &amp; Company, December 2018</p>
<p><a class="color-link" title="https://www.mckinsey.com/industries/automotive-and-assembly/our-insights/winning-tomorrows-car-buyers-using-artificial-intelligence-in-marketing-and-sales" href="https://www.mckinsey.com/industries/automotive-and-assembly/our-insights/winning-tomorrows-car-buyers-using-artificial-intelligence-in-marketing-and-sales" target="_blank" rel="nofollow noopener">Winning tomorrow&#8217;s car buyers using artificial intelligence in marketing and sales,</a> McKinsey &amp; Company, February 2019</p>
<p>World Economic Forum, <a class="color-link" title="http://www3.weforum.org/docs/WEF_Impact_of_the_Fourth_Industrial_Revolution_on_Supply_Chains_.pdf" href="http://www3.weforum.org/docs/WEF_Impact_of_the_Fourth_Industrial_Revolution_on_Supply_Chains_.pdf" target="_blank" rel="nofollow noopener">Impact of the Fourth Industrial Revolution on Supply Chains</a> (PDF, 22 pgs., no opt-in)</p>
<p>World Economic Forum, <a class="color-link" title="http://www3.weforum.org/docs/WEF_Supply_Chain_4.0_2019_Report.pdf" href="http://www3.weforum.org/docs/WEF_Supply_Chain_4.0_2019_Report.pdf" target="_blank" rel="nofollow noopener">Supply Chain 4.0 Global Practices, and Lessons Learned for Latin America and the Caribbean</a> (PDF, 44 pp., no opt-in)</p>
<p><a class="color-link" title="https://www.idc.com/getdoc.jsp?containerId=prUS44911419" href="https://www.idc.com/getdoc.jsp?containerId=prUS44911419" target="_blank" rel="nofollow noopener">Worldwide Spending on Artificial Intelligence Systems Will Grow to Nearly $35.8 Billion in 2019, According to New IDC Spending Guide, IDC</a>; March 11, 2019</p>
<p>&nbsp;</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/160028/10-ways-enterprises-are-getting-results-from-ai-strategies/">10 Ways Enterprises Are Getting Results From AI Strategies</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/8bE47YKpSs8" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">160028</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/160028/10-ways-enterprises-are-getting-results-from-ai-strategies/</feedburner:origLink></item>
		<item>
		<title>How To Build A Business Case For Endpoint Security</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/B-0s_A6gtYQ/</link>
		<pubDate>Sat, 06 Jun 2020 21:21:50 +0000</pubDate>
		<dc:creator><![CDATA[Louis Columbus]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[absolute software]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Gartner cybersecurity]]></category>
		<category><![CDATA[Gartner ISM]]></category>
		<category><![CDATA[Kount]]></category>
		<category><![CDATA[Louis Columbus' blog]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[pandemic]]></category>
		<category><![CDATA[RSA Conference 2020]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Zero Trust Security]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=158959</guid>
		<description><![CDATA[<p>Bottom Line:  Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach. Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/158959/how-to-build-a-business-case-for-endpoint-security/">How To Build A Business Case For Endpoint Security</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="  wp-image-158961 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image.jpg" alt="" width="455" height="379" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image.jpg 3600w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-300x250.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-768x640.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-600x500.jpg 600w" sizes="(max-width: 455px) 100vw, 455px" /></p>
<p><strong>Bottom Line: </strong> Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach.</p>
<p>Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to provide access. For these reasons and more, endpoints are now the popular choice for hacking attempts. <a href="https://engage.morphisec.com/2020-endpoint-security-risk-study">Ponemon Institute&#8217;s Third Annual Study on the State of Endpoint Security Risk</a> published in January of this year found that 68% of organizations were victims of successful endpoint attacks in 2019 that compromised data assets and IT infrastructure. Since 2017, successful endpoint attacks have spiked by 26 percent. The Ponemon study also found that it takes the typical organization 97 days to test and deploy patches to each endpoint. When the average endpoint is three months behind on updates, it&#8217;s understandable why breaches are increasing. In 2019 the average endpoint breach inflicted $8.94M in losses. The following graphic compares the escalating number of breaches and economic losses for the last three years:</p>
<p><img class="  wp-image-158964 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-figure-1-1.jpg" alt="How To Build A Business Case For Endpoint Security image figure 1" width="626" height="704" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-figure-1-1.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-figure-1-1-267x300.jpg 267w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-figure-1-1-768x863.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-figure-1-1-600x674.jpg 600w" sizes="(max-width: 626px) 100vw, 626px" /></p>
<p><strong>Exploring Endpoint Security&#8217;s Many Benefits </strong></p>
<p>Think of building a business case for endpoint security as the checkup every company needs to examine and identify and every threat surface that can be improved. Just as all efforts to preserve every person&#8217;s health is priceless today, organizations can&#8217;t let their guard down when it comes to keeping endpoint security strong.</p>
<p>The economic fallout of COVID-19 is hitting IT budgets hard. That&#8217;s why now is the time to build a business case for endpoint security. CIOs and CISOs have to make budget cuts due to revenue shortfalls. One area no one wants to compromise on, however, is allowing endpoint agents to degrade over time. <a href="https://www.absolute.com/">Absolute Software&#8217;s</a> <a href="https://www.absolute.com/go/study/2019-endpoint-security-trends/"> Endpoint Security Trends Report</a> found that the more complex and layered the endpoint protection, the greater the risk of a breach. Overloading every endpoint with multiple agents is counterproductive and leaves endpoints less secure than if fewer agents were installed.  Additionally, Absolute just launched a <a href="https://www.absolute.com/company/in-the-news/coronavirus-response/dashboard/">Remote Work and Distance Learning Insights Center</a>, providing insights into the impact of COVID-19 on IT and security controls. An example of the dashboard shown below:</p>
<p><img class="  wp-image-158965 aligncenter" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-figure-2.jpg" alt="How To Build A Business Case For Endpoint Security image figure 2" width="636" height="569" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-figure-2.jpg 960w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-figure-2-300x268.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-figure-2-768x686.jpg 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/How-To-Build-A-Business-Case-For-Endpoint-Security-image-figure-2-600x536.jpg 600w" sizes="(max-width: 636px) 100vw, 636px" /></p>
<p><em>Business Case Benefits Need To Apply To  IT and Operations</em></p>
<p>Absolute and Ponemon&#8217;s studies suggest that autonomous endpoints are the future of endpoint security. Activating security at the endpoint and having an undeletable tether to every device solves many of the challenges every business&#8217;s IT and Operations teams face. And with the urgency to make IT and Operations as virtual as possible with budgets impacted by COVID-19&#8217;s economic fallout, team leaders in each area are focusing on the following shared challenges. COVID-19&#8217;s quarantine requirements make hybrid workforces instantly appear and make the budgets needed to support them vanish at the same time.  The following are the shared benefits for IT and Operations that need to anchor any endpoint security business case:</p>
<ul>
<li><strong>The most urgent need is for greater IT Help Desk efficiency.</strong> While this is primarily an IT metric, the lack of real-time availability of resources is slowing down remote Operations teams from getting their work done.</li>
<li><strong>Both IT and Operations share asset utilization, loss reduction, and lifecycle optimization ownership in many organizations today. </strong>Having a persistent, undeletable tether to every device at the hardware level is proving to be an effective approach IT, and Operations teams are relying on to track and improve these metrics. The Absolute and Ponemon studies suggest that the more resilient the endpoint, the better the asset efficiency and lifecycle optimization. Autonomous endpoints can self-heal and regenerate themselves, further improving shared metric performance for IT and Operations.</li>
<li><strong>The more autonomous endpoints an organization has, the quicker Operations and IT can work together to pivot into new business models that require virtual operations.</strong> Education, Healthcare, Financial Services, Government, and Professional Services are all moving to hybrid remote workplaces and virtual operations as fast as they can. Using the business case for endpoint security as a roadmap to see where threat surfaces need to be improved for new growth is key.</li>
</ul>
<p><em>Endpoint Security Benefits  </em></p>
<p>The following are the benefits that need to be included in creating a business case for endpoint security:</p>
<ul>
<li><strong>Reduce and eventually eliminate IT Help Desk backlogs by keeping endpoints up-to-date.</strong> Reducing the call volume on IT Help Desks can potentially save over $45K a year, assuming a typical call takes 10 minutes and the cumulative time savings in 1,260 hours saved by the IT help desk annually.</li>
<li><strong>Reduce Security Operations staff interruptions and emergency security projects that require IT&#8217;s time to run analytics reports and analyses</strong>. Solving complex endpoint security problems burns thousands of dollars and hours over a year between Security, IT, and Operations. Having a persistent, unbreakable connection to every endpoint provides the device visibility teams need to troubleshoot problems. Assuming the 2,520 hours IT Security teams alone spend on emergency endpoint security problems could be reduced, organizations could save approximately $130K a year.</li>
<li><strong>Autonomous endpoints with an undeletable tether improve compliance, control, and visibility and is a must-have in the new hybrid remote workplace.</strong> For endpoint security to scale across every threat surface, having an undeletable tether to every device is a must-have for scalable remote work and hybrid remote work programs in the enterprise. They also contribute to lowering compliance costs and improve every aspect of asset management from keeping applications current to ensuring autonomous endpoints can continue to self-heal.</li>
<li><strong>Reducing IT asset loss, knowing asset utilization, and system-level software installed by every device can save a typical organization over $300K a year. </strong>Autonomous endpoints that can heal themselves and provide a constant hardware connection deliver the data in real-time to have accurate IT asset management and security data teams need to keep software configurations up to date. It&#8217;s invaluable for IT teams to have this level of data, as it averts having endpoint patches conflict with one another and leave an endpoint vulnerable to breach.</li>
<li><strong>Accurate asset lifecycle planning based on solid data from every device becomes possible. </strong>Having autonomous endpoints based on a hardware connection delivers the data needed to increase the accuracy of asset life cycle planning and resource allocation, giving IT and Operations the visibility they need to the device level. IT and Operations teams look to see how they can extend the lifecycle of every device in the field. Cost savings vary by the number of devices in the field and their specific software configurations. The time savings alone is approximately $140K per year in a mid-size financial services firm.</li>
<li><strong>The more autonomous and connected an endpoint is, the more automated audit and compliance reporting can become.</strong> A key part of staying in compliance is automating the audit process to save valuable time. The Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR), and the Payment Card Industry Data Security Standard (PCI DSS) all require ongoing audits. The time and cost savings of automating audits by organizations vary significantly. It&#8217;s a reasonable assumption to budget at least a $67K savings per year in audit preparation costs alone.</li>
</ul>
<p><strong>Evaluating Endpoint Security Costs </strong></p>
<p>The following are the endpoint security costs that need to be included in the business case:</p>
<ul>
<li><strong>Annual, often multi-year endpoint security licensing costs. </strong>Endpoint security providers vary significantly in their pricing models, costs, and fees. Autonomous endpoint security platforms can range in licensing costs from $750K to over $1,2M, depending on the size of the organization and the number of devices.</li>
<li><strong>Change management, implementation, and integration costs increase with the complexity of IT security, Operations, and IT Service Management (ITSM) integration. </strong>Expect to see an average price of between $40K to over $100K to integrate endpoint security platforms with existing ITSM and security information and event management (SIEM) systems.<strong style="color: var(--color-text); font-size: 1rem;"> </strong></li>
</ul>
<p><strong>Creating A Compelling Business Case For Endpoint Security </strong></p>
<p>The best endpoint security business cases provide a 360-degree view of costs, benefits, and why taking action now is needed.</p>
<p>Knowing the initial software and services costs to acquire and integrate endpoint security across your organization, training and change management costs, and ongoing support costs are essential. Many include the following equation in their business cases to provide an ROI estimate. The Return on Investment (ROI) for endpoint security initiative is calculated as follows:</p>
<p><em>ROI on Endpoint Security (ES) = (ES Initiative Benefits – ES Initiative Costs)/ES Initiative Costs x 100. </em></p>
<p>A financial services company recently calculated their annual benefits of ES initiative will be $475,000, and the costs, $65,000, will yield a net return of $6.30 for every $1 invested.</p>
<p>Additional factors to keep in mind when building a business case for endpoint security:</p>
<ul>
<li><strong>The penalties for non-compliance to industry-specific laws can be quite steep, with repeated offenses leading to $1M or more in fines and long-term loss of customer trust and revenue.</strong> Building a business case for endpoint security needs to factor in the potential non-compliance fees, and penalties companies face for not having autonomous endpoint security. The Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR), Payment Card Industry Data Security Standard (PCI DSS), California Consumer Privacy Act (CCPA), and other laws require audit reporting based on accurate endpoint security data.</li>
<li><strong>Endpoint Security ROI estimates fluctuate, and it&#8217;s best to get started with a pilot to capture live data with budgets available at the end of a quarter</strong>. Typically organizations will allocate the remaining amounts of IT security budgets at the end of a quarter to endpoint security initiatives.</li>
<li><strong>Succinctly define the benefits and costs and gain C-level support to streamline the funding process.</strong> It&#8217;s often the CISOs who are the most driven to achieve greater endpoint security the quickest they can. Today with every business having their entire workforces virtual, there&#8217;s added urgency to get endpoint security accomplished.</li>
<li><strong>Define and measure endpoint security initiatives&#8217; progress using a digitally-enabled dashboard that can be shared across any device, anytime.</strong> Enabling everyone supporting and involved in endpoint security initiatives needs to know what success looks like. Having a digitally-enabled dashboard that clearly shows each goal or objective and the company&#8217;s progress toward them is critical to success.</li>
</ul>
<p><strong>Conclusion </strong></p>
<p>The hard economic reset COVID-19 created has put many IT budgets into freefall at a time when CIOs and CISOs need more funding to protect proliferating hybrid remote workforces. Endpoint security business cases need to factor in how they can create an undeletable resilient defense for every device across their global fleets. And just as every nation on the planet isn&#8217;t letting its guard down against the COVID-19 virus, every IT and cybersecurity team can&#8217;t let theirs down either when it comes to protecting every endpoint.</p>
<p>Autonomous endpoints that can self-heal and regenerate operating systems and configurations are the future of endpoint security management. The race to be an entirely virtual enterprise is on, and the most autonomous endpoints can be, the more cost-effective and valuable they are. The best business cases bridge the gap between IT and Operations needs. CIOs need endpoint security solutions to be low-cost, low maintenance, reliable yet agile. Operations want an endpoint solution that has a low cost of support, minimal if any impact of IT Service Help Desks, and always-on monitoring. Building a business case for endpoint security gives IT and Operations the insights they need to protect the constantly changing parameters of their businesses.</p>
<p>&nbsp;</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/158959/how-to-build-a-business-case-for-endpoint-security/">How To Build A Business Case For Endpoint Security</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/louis-columbus/">Louis Columbus</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/B-0s_A6gtYQ" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">158959</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/158959/how-to-build-a-business-case-for-endpoint-security/</feedburner:origLink></item>
		<item>
		<title>News Analysis: Apple Brings New Post Pandemic Solutions To Remote Learning</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/jpOfKSPXx6w/</link>
		<pubDate>Wed, 03 Jun 2020 16:15:38 +0000</pubDate>
		<dc:creator><![CDATA[R "Ray" Wang]]></dc:creator>
				<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Technology / Software]]></category>
		<category><![CDATA[#PostPandemic]]></category>
		<category><![CDATA[#PostPandemicPlaybook]]></category>
		<category><![CDATA[2020]]></category>
		<category><![CDATA[ambient experiences]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[Apple Education]]></category>
		<category><![CDATA[Apple Schoolwork]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[best practices]]></category>
		<category><![CDATA[big tech]]></category>
		<category><![CDATA[CDO]]></category>
		<category><![CDATA[CEO]]></category>
		<category><![CDATA[change agents]]></category>
		<category><![CDATA[Chief Digital Officer]]></category>
		<category><![CDATA[Chief executive officer]]></category>
		<category><![CDATA[Chief information officer]]></category>
		<category><![CDATA[Chief Information Security Officer]]></category>
		<category><![CDATA[Chief Innovation Officer]]></category>
		<category><![CDATA[Chief Technology Officer]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[CMO]]></category>
		<category><![CDATA[Constellation Research]]></category>
		<category><![CDATA[COO]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Crowdsourcing]]></category>
		<category><![CDATA[CTO]]></category>
		<category><![CDATA[Customer Experience]]></category>
		<category><![CDATA[digital]]></category>
		<category><![CDATA[Digital acceleration]]></category>
		<category><![CDATA[Digital Business]]></category>
		<category><![CDATA[Digital Transformation]]></category>
		<category><![CDATA[Digitize channels]]></category>
		<category><![CDATA[disruptive business models]]></category>
		<category><![CDATA[enterprise software]]></category>
		<category><![CDATA[Future of 2020]]></category>
		<category><![CDATA[global pandemic]]></category>
		<category><![CDATA[Health and Safety]]></category>
		<category><![CDATA[K-12 education]]></category>
		<category><![CDATA[Mental health support]]></category>
		<category><![CDATA[News Analysis]]></category>
		<category><![CDATA[personalization]]></category>
		<category><![CDATA[personalization at scale]]></category>
		<category><![CDATA[Post Pandemic Playbook]]></category>
		<category><![CDATA[public health]]></category>
		<category><![CDATA[R "Ray" Wang;]]></category>
		<category><![CDATA[remote learning]]></category>
		<category><![CDATA[Reskilling and retraining]]></category>
		<category><![CDATA[rwang0]]></category>
		<category><![CDATA[Social injustice]]></category>
		<category><![CDATA[Software Insider]]></category>
		<category><![CDATA[SoftwareInsider]]></category>
		<category><![CDATA[vendor strategy]]></category>
		<category><![CDATA[work from home]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=158336</guid>
		<description><![CDATA[<p>K-12 Education Market Faces New Requirements The latest CDC guidelines highlight the major challenges administrators and educators have for reopening schools.   The general principle – the more interactions, the longer interactions, the higher the risk of #COVID-19 spread. The CDC states that the risk of COVID-19 spread increases in school settings as follows: Lowest Risk: [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/158336/news-analysis-apple-brings-new-post-pandemic-solutions-to-remote-learning/">News Analysis: Apple Brings New Post Pandemic Solutions To Remote Learning</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/r-ray-wang/">R &quot;Ray&quot; Wang</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<figure></figure>
<h2></h2>
<div class="reader-article-content" dir="ltr">
<h1>K-12 Education Market Faces New Requirements</h1>
<p>The latest <a href="https://www.cdc.gov/coronavirus/2019-ncov/community/schools-childcare/schools.html">CDC guidelines</a> highlight the major challenges administrators and educators have for reopening schools.   The general principle – the more interactions, the longer interactions, the higher the risk of #COVID-19 spread.</p>
<blockquote><p>The CDC states that the risk of COVID-19 spread increases in school settings as follows:</p>
<p><strong>Lowest Risk:</strong> Students and teachers engage in virtual-only classes, activities, and events.</p>
<p><strong>More Risk:</strong> Small, in-person classes, activities, and events. Groups of students stay together and with the same teacher throughout/across school days and groups do not mix. Students remain at least 6 feet apart and do not share objects (e.g., hybrid virtual and in-person class structures, or staggered/rotated scheduling to accommodate smaller class sizes).</p>
<p><strong>Highest Risk:</strong> Full sized, in-person classes, activities, and events. Students are not spaced apart, share classroom materials or supplies, and mix between classes and activities.</p></blockquote>
</div>
<p>As a result, the following five trends are expected in the classroom and will require different tools, approaches, and cultural shifts:</p>
<div class="reader-article-content" dir="ltr">
<ol>
<li><strong>Support hybrid learning models.</strong>  From remote learning to in classroom, educators expect to seamlessly move between teaching modalities should further outbreaks occur.  Flexibility requires both educators and students to be able to access curriculum and assignments regardless of modality.  Expect more days in the classroom to make up for lost time.</li>
<li><strong>Improve student engagement.  </strong>As with workers facing death by video call, students seek new ways for engagement.  Endless video calls create learning burnout. New engagement models such as augmented reality and virtual reality will gain adoption.   In addition, students will need additional means to continue in person socialization when in remote learning modes as part of a more holistic education.</li>
<li><strong>Deliver more teacher tools.  </strong>From sharing class materials, to creating curriculum, to assigning activities, educators need more tools to augment and automate teacher workflows.  The new remote learning requirements in hybrid learning modalities require the ability to keep a consistent experience in teacher tools.</li>
<li><strong>Improve velocity of curriculum creation.  </strong>Teachers and educators seek tools that improve curriculum creation.  Teachers want the ability to share content and classroom materials with other teachers through templates and an open source type of community on teaching materials.</li>
<li><strong>Addressing mental health.  </strong>With kids and teachers in remote learning environments, expect many diagnoses of mental health issues to be hidden.  Administrators and parents will need to be more vigilant in identifying and treating mental health issues earlier.</li>
</ol>
</div>
<div class="reader-article-content" dir="ltr">
<h1>Apple’s Spring 2020 Education Updates Address Post Pandemic Learning</h1>
<p>Apple’s provided a broad base of educator tools over the years through the new Schoolwork 2.0, Collaboration, Shared iPad, Assessment Mode, and Classroom (see Figure 1)</p>
<p><strong>Figure 1. Apple Provides a Broad Base of Educator Tools for K-12<br />
</strong></p>
<p><img class="alignnone wp-image-17551" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-K-12-tools-1440x737.png" sizes="(max-width: 597px) 100vw, 597px" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-K-12-tools-1440x737.png 1440w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-K-12-tools-600x307.png 600w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-K-12-tools-768x393.png 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-K-12-tools-1536x786.png 1536w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-K-12-tools.png 1746w" alt="" width="597" height="305" /></p>
<p><strong>Source: Apple, Inc.</strong></p>
<p>The latest updates to its Spring 2020 Education line up include:</p>
<h2>Schoolwork 2.0 Augments Key Teacher Workflows</h2>
<p><img class="alignnone wp-image-17560" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-Schoolwork-logo.png" sizes="(max-width: 150px) 100vw, 150px" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-Schoolwork-logo.png 264w, https://blog.softwareinsider.org/wp-content/uploads/2020/05/@rwang0-@apple-Schoolwork-logo-150x150.png 150w" alt="" width="150" height="149" /></p>
<p>Schoolwork is an iPad app that gives teachers and students the ability to support remote learning and classroom environments (see Figure 2).  Released May 2020, the latest <a href="https://apps.apple.com/us/app/schoolwork/id1355112526">version of Schoolwork 2.0</a> improve the ability to share content with students, put key apps to use, track student progress, personalize coursework and instruction to student needs, and deliver instant feedback and collaboration tools.   Students can check assignments on their iPad devices by class and due date.  Teachers can check in to see how students are doing.  Coursework, handouts, and assignments can be managed.  Teacher workflows can be optimized.</p>
</div>
<div dir="ltr">
<div class="section">
<div class="layoutArea">
<div class="column">
<p>Schoolwork is pretty intuitive as educators can see their classes, students, and handouts.  Teachers start with the creation of handouts.  Students will see Handouts for all their classes in the dashboard and can track by class and due date. Files are automatically organized in iCloud Drive for the teacher and student.</p>
<p>One feature that stands out is the collaboration capability with Apple’s apps: Pages, Keynote, Numbers.  Teachers in real-time can view, edit, add comments, record audio when students are working in a collaborative file.  The result – coaching, real-time feedback, and interactive learning.</p>
</div>
</div>
</div>
</div>
<div class="reader-article-content" dir="ltr">
<p><strong>Figure 2. Inside Apple’s New Schoolwork</strong></p>
<p><img class="alignnone wp-image-17547" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@Rwang0-@apple-schoolkit-1261x900.png" sizes="(max-width: 597px) 100vw, 597px" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@Rwang0-@apple-schoolkit-1261x900.png 1261w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@Rwang0-@apple-schoolkit-600x428.png 600w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@Rwang0-@apple-schoolkit-768x548.png 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@Rwang0-@apple-schoolkit-1536x1096.png 1536w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@Rwang0-@apple-schoolkit.png 1670w" alt="" width="597" height="426" /></p>
<p><strong>Source: Apple, Inc.</strong></p>
</div>
<div class="page" title="Page 11">
<div class="section">
<div class="layoutArea">
<div class="column">
<p>Inside Schoolwork, Apple School Manager gives teachers the ability to assess class and student progress (see Figure 3).  Teacher’s can see time  spent on the activity, percentage completed, quiz scores, hints used, or  points earned on a handout and activity.  Apps that support student progress automatically send information about   how students are doing after they complete the activity.This gives teachers the quantitative metrics needed to determine personalization requirements in the classroom.  Teachers can tailor assignments to help.  Many apps also support automatic student progress updates.</p>
<p><strong>Figure 3. Tracking Progress Inside School Manager</strong></p>
<p><img class="alignnone wp-image-17564" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-schoolwork-manager2-1-1281x900.png" sizes="(max-width: 601px) 100vw, 601px" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-schoolwork-manager2-1-1281x900.png 1281w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-schoolwork-manager2-1-600x422.png 600w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-schoolwork-manager2-1-768x540.png 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-schoolwork-manager2-1.png 1426w" alt="" width="601" height="422" /></p>
<p><strong>Source: Apple, Inc.</strong></p>
</div>
</div>
</div>
</div>
<div class="reader-article-content" dir="ltr">
<div class="column large-5 large-offset-1 small-12 small-offset-0">
<h2>Classroom Updates</h2>
<p><img class="alignnone wp-image-17567" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-classroom-logo.png" alt="" width="149" height="147" /></p>
<div class="page" title="Page 2">
<div class="section">
<div class="layoutArea">
<div class="column">
<p>The <a href="ttps://apps.apple.com/us/app/classroom/id1085319084">Apple Classroom app</a> for iPad and Mac enable teachers to manage the class room, share activities and work, manage student devices, and monitor progress. Using one-to-one or shared environments, educators have the ability to augment their daily classroom workflows (see Figure 4).</p>
</div>
<p>Teacher start by creating a class.  If the school is using mobile device management (MDM), the classes may be configured automatically. Once student are invited, teachers can manage how their iPad’s are managed and what apps they have access to. Teachers can organize their classroom by creating break out groups or one-on-one experiences.  From launching and lcoking apps, to navigating to speicfic content, to sharing documents, and receiving documents, teachers have full control curriculum and content management for the classrom.</p>
<p>Educators monitor progress and can view a student’s screen, check in on pgoress, mute the sound and lock the screen, share work onto an AppleTV.  Apple Classroom enables device management where teachers can mute the sound, lock the screen, and even reset student passwords.   Classroom with MDM supports shared iPads.  Once a class ends, a summary is provided to share activity on student time, work completed, and overall student activity.</p>
</div>
</div>
</div>
</div>
</div>
<div></div>
<div><strong>Figure 4. Classroom Provides Real Time Views<br />
</strong></div>
<div></div>
<div><img class="alignnone wp-image-17568" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-classroom-app-642x900.png" sizes="(max-width: 601px) 100vw, 601px" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-classroom-app-642x900.png 642w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-classroom-app-357x500.png 357w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-classroom-app-768x1077.png 768w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-classroom-app.png 850w" alt="" width="601" height="843" /></div>
<div><strong>Source: Apple, Inc.</strong></div>
<div>
<h2>Additional Offerings Augment and Enhance K-12 Requirements</h2>
</div>
<div>In addition, Apple has had a number of tools to improve student engagement such as:</div>
<ul>
<li><strong>iCloud enhancements.  </strong>New capabilities include iCloud Drive folder sharing, sharing auto-accept, and global sharing permissions.  This enables seamless sharing in the classroom</li>
<li><strong>iWork updates.  </strong>Track pad support, new template, offline editing, and drop caps, make it easier to create content.</li>
<li><strong>New Assessment mode.  </strong>Educators can provide testing and assessment capabilites.  These new features meet secur testing requirements and are available on the iPad and Mac.  Assessment mode restrict sfeatures, locks into a single app, and doesn’t require mobile device management.</li>
<li><strong>Teacher resources and community.  </strong>Apple has built a strong community among educators with the Apple Education Learning Series, a set of ongoing programs for educators in K-12.  The Professional Learning Coaching sessions share best practices and provide coaches.  The Apple Teacher Learning Center shares ideas, curriculum, and techniques.  Apple also has a community of distinguished educators its developed over the years.</li>
<li><strong>iPad for AR in Learning.  </strong>Augmented reality (AR), enables teachers to bring visual experiences, overlay information, and provide contextual insights to the learning environment.  Sample lesson ideas include: History – Civilizations AR, Math – Measure, Literacy and Literature – AR Makr, Science – Froggipedia (see Figure 4), Science – WWF Free Rivers, and Math – GeoGebra Augmented Reality</li>
<li><strong>Privacy support for the learning environment. </strong>Apple’s security approach ensures that student work and personal information remain secure.  Using managed Apple IDs, administrators can control how information is shared, which apps are enabled or disabled, and what services such as FaceTime, iMessage, and Schoolwork are deployed.  Apple also has ISO <a href="https://www.bsigroup.com/en-GB/our-services/certification/certificate-and-client-directory/search-results/?searchkey=company=apple&amp;licencenumber=IS+649475" rel="nofollow">27001</a> and <a href="https://www.bsigroup.com/en-GB/our-services/certification/certificate-and-client-directory/search-results/?searchkey=company=Apple&amp;licencenumber=PII%20673269" rel="nofollow">27018</a> certifications for protecting PII in the cloud.   Further, Apple is a signatory for the <a href="https://studentprivacypledge.org/privacy-pledge/" rel="nofollow">Student Privacy Pledge</a></li>
</ul>
<p><strong>Figure 5. Froggipedia – Using AR to Study A Frog’s Anatomy</strong></p>
<p><img class="alignnone wp-image-17546" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-ARKit-Froggipedia.png" sizes="(max-width: 601px) 100vw, 601px" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-ARKit-Froggipedia.png 1090w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-ARKit-Froggipedia-600x441-1.png 600w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/@rwang0-@apple-ARKit-Froggipedia-768x565-1.png 768w" alt="" width="601" height="442" /></p>
<div class="ember-view">
<div class="reader-article-content" dir="ltr">
<p><strong>Source: Apple, Inc.<br />
</strong></p>
</div>
</div>
<h1><strong>The Bottom Line: Improvements Augment Educators Needed For Improved Tools<br />
</strong></h1>
<div class="ember-view">
<div class="reader-article-content" dir="ltr">
<p>The post pandemic learning environment can benefit from new tools and techniques to help educators in the classroom.  Apple’s latest offerings bring the ease of use and user experience Apple’s known for with the much needed technology to improve the creation of curriculum, management of teacher workflows, and student engagement required in hybrid classroom modalities.  The push to remote learning and the need to switch modalities require key technology tools and a community network to share ideas.   Constellation recommends that K-12 educators, administrators, and technology teams consider Apple’s offering in vendor selection short lists.</p>
</div>
<div>
<h1><strong>Your POV</strong></h1>
<p>Are you an educator working on remote learning?  Are you using Apple’s K-12 capabilitieas?  Will you be ready to handle the coronavirus and other pandemics?  Ready to build your post pandemic playbook?  Let me know, we can help! Add your comments to the blog or reach me via email: <a href="mailto:R@ConstellationR.com">R (at) ConstellationR (dot) com</a> or<a href="mailto:R@softwareinsider.org"> R (at) SoftwareInsider (dot) org.</a></p>
<p>&nbsp;</p>
</div>
</div>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/158336/news-analysis-apple-brings-new-post-pandemic-solutions-to-remote-learning/">News Analysis: Apple Brings New Post Pandemic Solutions To Remote Learning</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/r-ray-wang/">R &quot;Ray&quot; Wang</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/jpOfKSPXx6w" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">158336</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/158336/news-analysis-apple-brings-new-post-pandemic-solutions-to-remote-learning/</feedburner:origLink></item>
		<item>
		<title>Emotions at Work</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/dE884z-bRcI/</link>
		<pubDate>Wed, 03 Jun 2020 16:10:38 +0000</pubDate>
		<dc:creator><![CDATA[Vijay Vijayasankar]]></dc:creator>
				<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=158649</guid>
		<description><![CDATA[<p>Very interesting question early in the morning today from a younger colleague – “How do you keep away emotions from work ?” . I thought it is worth expanding on the point of view I explained to her on the phone. Photo by Burst on Pexels.com I have often been told that we should not [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/158649/emotions-at-work/">Emotions at Work</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/vijay/">Vijay Vijayasankar</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p>Very interesting question early in the morning today from a younger colleague – <strong><em>“How do you keep away emotions from work ?” .</em></strong> I thought it is worth expanding on the point of view I explained to her on the phone.</p>
<figure class="wp-block-image size-large"><img class="wp-image-5902" src="https://andvijaysays.files.wordpress.com/2020/06/pexels-photo-373914.jpeg?w=750" alt="" /><figcaption>Photo by Burst on <a href="https://www.pexels.com/photo/man-sitting-on-a-concrete-bench-373914/" rel="nofollow">Pexels.com</a></figcaption></figure>
<p>I have often been told that we should not be emotional and instead we should be objective at work. That is rarely possible in real life in most scenarios – at least for me. So the closest to a good option in my mind is to manage these emotions as a “portfolio” so that I can survive and thrive without unnatural tactics. Before you ask me (since my colleague asked me today morning) – I will tell you that I do not practice breathing exercises or Yoga or chanting . Those are all probably good things to do – just that I have no first hand thoughts to offer.</p>
<p>So here we go .</p>
<p><strong>Fear ,Anger</strong> <strong>and Courage</strong> are the ones that we need to confront the most given the consequences can be terrible. I feel both at times – and the way I control it is by thinking of the worst case. Am I going to lose a deal ? Lose a talented colleague from my team ? Can I fix this now or later? etc. Almost every single time I realize that the worst case is something I can mitigate. That is how I channelize these two emotions – I often convert them to courage to act.</p>
<p><strong>Sadness and Joy </strong>– I do not hide Joy. When I am happy people know it. When I am sad – which is not often – people close to me can read it. On work, I feel sad most often when someone who should know better does a less than stellar job. I feel sad more often than I feel angry. And generally when the person realizes it – it helps them course correct.</p>
<p><strong>Disgust , Surprise and Anticipation</strong> – Thankfully there are only two or three incidents in my entire career where I was truly disgusted. It just taught me to not work with certain kind of people. Surprise is actually a beautiful feeling in personal life – but unfortunately I am wired in a way that I do everything to avoid surprises at work. I try hard to not surprise anyone myself. I am not sure if this is good or bad – but the dislike for surprises is something I have to live with. I do a lot of anticipation – in the form of plan A/B/C . It is an intellectual pursuit that makes me feel good most of the time.</p>
<p><strong>Trust and Respect</strong> – This is the ideal state of operation in my mind. Being liked at work or being feared at work are both long term problems for a leader. Obviously between the two – being liked is the pleasant and easier alternative . The world of business is not fair and often involves decisions that are hard on the people taking those and communicating it to others. If your objective is to be liked – you will be miserable when a hard decision needs to be taken, and others will feel a big let down. If you operate with fear as primary tactic – you will never have a motivated team. So the only real option is to aim for trust and respect as your operating parameters and help everyone get to a frame of mind that you will be fair in all cases.</p>
<p><strong>Kindness and cruelty </strong>– This is pretty black and white . I heavily favor kindness. But there is a certain difficulty in how you execute on it. For example – let us say there is a colleague who cannot seem to operate at the next level to earn his promotion. The kind thing to do is to give him a chance to improve and then if he does not – tell him where he stands including the potential of leaving your team. The cruel thing is to tell him he is doing well and then fire him arbitrarily. Telling him that he is doing well when he is not – that falls under cruelty and not kindness in most cases. It is a thin line for a leader to traverse. I cannot say I have mastered it fully.</p>
<p><strong>Shame, Pity and Envy</strong> – I do feel shame especially when I make mistakes repeatedly when I should learn and do better. I used to pity myself and feel envy for others – for a long time. That stopped after I got a better perspective from my mentors. There are always going to be some people who are better than you , were luckier than you etc and you are never going to be totally honest about evaluating yourself objectively. Once you make peace with that – Pity and Envy vanishes. It took me a long time to get there and I have had a few lapses – but generally I think I know when to catch myself these days and reorient my thinking.</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/158649/emotions-at-work/">Emotions at Work</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/vijay/">Vijay Vijayasankar</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/dE884z-bRcI" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">158649</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/158649/emotions-at-work/</feedburner:origLink></item>
		<item>
		<title>Diversity &amp; The Future of Work — We Can No Longer Sit on the Sidelines!</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/8F2r8k-ekkQ/</link>
		<pubDate>Wed, 03 Jun 2020 16:10:11 +0000</pubDate>
		<dc:creator><![CDATA[Jason Corsello]]></dc:creator>
				<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[Trends & Concepts]]></category>
		<category><![CDATA[diversity]]></category>
		<category><![CDATA[diversity-and-inclusion]]></category>
		<category><![CDATA[future of work]]></category>
		<category><![CDATA[HR]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=158397</guid>
		<description><![CDATA[<p>Over the last 48 hours, I have watched technology CEOs, industry executives, and leading VC firms voice their outrage by the killing of George Floyd and decry racism in America. Many of their companies have made official statements and even provided financial support towards nonprofits supporting racial injustice. I admire their efforts but frankly I [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/158397/diversity-the-future-of-work%e2%80%8a-%e2%80%8awe-can-no-longer-sit-on-the-sidelines/">Diversity &amp; The Future of Work — We Can No Longer Sit on the Sidelines!</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/jason-corsello/">Jason Corsello</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<figure><img src="https://cdn-images-1.medium.com/max/1024/1*MBGj8waKpedcpg58VSzNew.png" alt="" /></figure>
<p>Over the last 48 hours, I have watched technology CEOs, industry executives, and leading VC firms voice their outrage by the <a href="https://en.wikipedia.org/wiki/Killing_of_George_Floyd">killing of George Floyd</a> and decry racism in America. Many of their companies have made official statements and even <a href="https://www.cnbc.com/2020/06/02/tech-companies-donate-over-20-million-after-death-of-george-floyd.html">provided financial support</a> towards nonprofits supporting racial injustice.</p>
<p><strong>I admire their efforts but frankly I think they can, and should, be doing even more to go beyond the platitudes and philanthropic donations to create more impactful change.</strong> As leaders of people and organizations, those same executives can stand up to racism by the examples they create in their own companies. I’m encourage by CEOs like <a href="https://www.cnbc.com/2020/06/01/merck-ceo-george-floyd-could-be-me.html?campaign_id=4&amp;emc=edit_dk_20200602&amp;instance_id=19014&amp;nl=dealbook&amp;regi_id=112211017&amp;segment_id=29856&amp;te=1&amp;user_id=5421ff67f38ace917923e5d1be58acba">Ken Frazier, Merck CEO, who spoke eloquently</a> yesterday on CNBC about equality and companies opportunity to create change. He leads by example!</p>
<p>As someone who has worked with HR leaders for nearly 2 decades, I encourage all companies to make a stand through your actions. <strong>Here is a small list of 10 things you can do today!</strong></p>
<p><strong>1. Define your diversity ethos. </strong>What do you stand for? How do you think about inclusion and enable ALL employees to create economic opportunity? Companies should use their resources like the company’s website or social media platforms to make a statement.</p>
<p><a href="https://www.apple.com/diversity/">Inclusion &amp; Diversity</a></p>
<p><strong>2. Assign an executive responsible for diversity, inclusion &amp; belonging.</strong> This person should be closely aligned with the executive team. Salesforce.com led the way a few years ago but creating a new role, Chief Equality Officer, that reports directly to CEO Marc Benioff.</p>
<p><a href="https://fortune.com/2016/09/16/salesforce-chief-equality-officer/">Salesforce Names First Chief Equality Officer Tony Prophet</a></p>
<p><strong>3. Make all promotions &amp; compensation structures equal.</strong> <a href="https://www.cnbc.com/video/2020/06/01/mellody-hobson-corporate-americas-responsibility-fight-inequality.html">Mellody Hobson suggests we set targets</a> and create incentives for change. In her words, “you get what you incent.” SHRM has some great content on <a href="https://www.shrm.org/resourcesandtools/tools-and-samples/toolkits/pages/managingpayequity.aspx">Managing Pay Equity</a>.</p>
<p><strong>4. Create mentorship programs that connect underprivileged employees with executives. </strong>Slack has developed a program called “Rising Tides”, a six-month sponsorship program to develop diverse emerging leaders.</p>
<figure><img src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/06/1btBJGH98-LxUv-DRkmUkJQ.png" alt="" /></figure>
<p><strong>5. Set a standard and goals for recruiting diversity.</strong> If the NFL can do it with The Rooney Rule, you can too!</p>
<p><a href="https://en.wikipedia.org/wiki/Rooney_Rule#:~:text=The%20Rooney%20Rule%20is%20a,minorities%2C%20only%20an%20interviewing%20quota.">Rooney Rule</a></p>
<p><strong>6. Make diversity training and unconscious bias education mandatory. </strong>Linkedin Learning has 2 dozen courses on diversity and inclusion including <a href="https://www.linkedin.com/learning/diversity-inclusion-and-belonging-2/dibs-an-introduction">a fantastic course by Pat Wadors</a>, Chief Talent Officer at ServiceNow.</p>
<p><a href="https://www.linkedin.com/learning/search?keywords=diversity%20inclusion%20and%20belonging">diversity inclusion and belonging: Online Courses, Training and Tutorials on LinkedIn Learning</a></p>
<p><strong>7. Encourage employee resource groups with executive sponsorship support. </strong>ERGs have the ability to empower employee voices and socialize topics of inclusion. Just today, Airbnb published an “Activism and Allyship Guide” published by the Black Employee Resource Group.</p>
<p><a href="https://medium.com/media/f40582975d4c3eb2b5045d071471b558/href">https://medium.com/media/f40582975d4c3eb2b5045d071471b558/href</a></p>
<p><strong>8. Share your progress.</strong> You can’t change what you don’t measure. I admire companies like <a href="https://slackhq.com/diversity-at-slack-2020">Slack</a>, <a href="https://www.servicenow.com/company/diversity-inclusion-belonging.html">ServiceNow</a> and <a href="https://www.atlassian.com/belonging">Atlassian</a> that transparently show their diversity metrics and progress over time.</p>
<p><a href="https://slackhq.com/diversity-at-slack-2020">Diversity at Slack &#8211; Several People Are Typing</a></p>
<p><strong>9. Create a diversity scorecard and measure frequently.</strong> Give your leaders the tools to make change. Salesforce.com provides a monthly diversity scorecard for all leaders that manage teams over 500 employees.</p>
<p><a href="https://business.linkedin.com/talent-solutions/blog/diversity/2019/why-salesforce-created-diversity-scorecard">How a Diversity Scorecard Helps Salesforce Keep Equality Top of Mind for Its Leaders</a></p>
<p><strong>10. Build a diverse executive team and board of directors.</strong> Nothing is more annoying that watching a company decry racism…</p>
<figure><img src="https://www.enterpriseirregulars.com/wp-content/uploads/2020/06/0x5SOAT1CgFsSAw59" alt="" /></figure>
<p>…and then showcase a lack of diversity within their executive team and board of directors.</p>
<p><a href="https://www.box.com/about-us/leadership">Box Leadership: Executive Team and Board of Directors</a></p>
<p>No company is perfect but, in this moment, business leaders must take a stand. We all have an opportunity to create long-lasting change now!</p>
<p><img src="https://medium.com/_/stat?event=post.clientViewed&amp;referrerSource=full_rss&amp;postId=8034c42b878f" width="1" height="1" /></p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/158397/diversity-the-future-of-work%e2%80%8a-%e2%80%8awe-can-no-longer-sit-on-the-sidelines/">Diversity &amp; The Future of Work — We Can No Longer Sit on the Sidelines!</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/jason-corsello/">Jason Corsello</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/8F2r8k-ekkQ" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">158397</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/158397/diversity-the-future-of-work%e2%80%8a-%e2%80%8awe-can-no-longer-sit-on-the-sidelines/</feedburner:origLink></item>
		<item>
		<title>It’s all about the data</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/mzZiYGPvkUM/</link>
		<pubDate>Tue, 26 May 2020 09:35:28 +0000</pubDate>
		<dc:creator><![CDATA[Thomas Otter]]></dc:creator>
				<category><![CDATA[Technology / Software]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=156014</guid>
		<description><![CDATA[<p>We have heard from many analysts that this is HR’s moment to shine. For HRTECH  vendors too, this is an opportunity to prove that their stuff really works. eLearning consumption is way up, for instance, as is use of survey tools.  Processes like Kurzarbeit in Germany and furloughing in the UK mean that flexible and [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/156014/its-all-about-the-data/">It’s all about the data</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/thomas-otter/">Thomas Otter</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-full wp-image-70385" src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2014/01/data-pic-300x300.jpg" alt="" width="300" height="300" srcset="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2014/01/data-pic-300x300.jpg 300w, https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2014/01/data-pic-300x300-100x100.jpg 100w" sizes="(max-width: 300px) 100vw, 300px" />We have heard from many analysts that this is HR’s moment to shine. For HRTECH  vendors too, this is an opportunity to prove that their stuff really works. eLearning consumption is way up, for instance, as is use of survey tools.  Processes like Kurzarbeit in Germany and furloughing in the UK mean that flexible and well configured payroll and time management systems show their value. Organizations that have their administrative processes well organized are far more agile and flexible when it really matters.</p>
<p>I worry though, when the desire to ‘innovate’ exceeds the quality of the data that the organization has about their employees and workers. Let’s start with some basic ones.</p>
<ul>
<li>You would like to provide specific guidance to all line managers that manage contractors in their departments.</li>
<li>You have decided that independent contractors that have worked at least 20 hours a month for more than six months before the plant shut down will receive a hardship payment.</li>
<li>You would like your contractors to watch a new health and safety video before they return to work, and formally confirm that they have watched it.</li>
<li>You wish to model out alternative transport options for employees and contractors to get them to work when your main plant re-opens next week.</li>
<li>You would like to send several non-medical masks to all your workforce at home, so that when they return to the office it is easier for them follow safe guidelines.</li>
<li>You would like to send a gift to your retired employees.</li>
</ul>
<p>Before you start, check if you actually have an up to date home address that you can actually post something to for all your workers. The sad fact is that many organizations don’t.  No amount of fancy technology will help if your core master data is shoddy.  Do you even know who your independent contractors are?</p>
<p>Some of those same organizations that can’t track home addresses think that they can predict workforce churn through some AI magic, or worse, track and predict covid exposure in the workforce.</p>
<p>If the postal code is on-premise and wrong, it is wrong. If the postal code is in the cloud, and wrong, it is still wrong.</p>
<p>Before you post stuff to the wrong John Smith, insist on an accuracy audit of your core HR data, pull a 100  or so random records and have them checked (bearing in mind GDPR etc). But start closer to home, and look at your own record.  If your own key 30-40 data items aren’t spot on, it is very unlikely anyone else’s would be.  If you haven’t watched the health and safety video yourself, it would be tough to expect your workforce to be held to a higher standard.</p>
<p>&nbsp;</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/156014/its-all-about-the-data/">It’s all about the data</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/thomas-otter/">Thomas Otter</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/mzZiYGPvkUM" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">156014</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/156014/its-all-about-the-data/</feedburner:origLink></item>
		<item>
		<title>New Normal: A conversation with Aneel Bhusri, CEO of Workday</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/UJVgotWTo2w/</link>
		<pubDate>Tue, 26 May 2020 08:19:36 +0000</pubDate>
		<dc:creator><![CDATA[Vinnie Mirchandani]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Global and Vertical extensions]]></category>
		<category><![CDATA[Leadership during Crisis]]></category>
		<category><![CDATA[New Normal COVID-19]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=155895</guid>
		<description><![CDATA[<p>I have been doing video interviews with a number of CIOs, software executives and practitioners about acrobatics they have been seeing in various vertical sectors during the COVID-19 crisis and the "New normal" they can expect as the economy wakes...</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/155895/new-normal-a-conversation-with-aneel-bhusri-ceo-of-workday/">New Normal: A conversation with Aneel Bhusri, CEO of Workday</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/vinnie-mirchandani/">Vinnie Mirchandani</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p>I have been doing video interviews with a number of CIOs, software executives and practitioners about acrobatics they have been seeing in various vertical sectors during the COVID-19 crisis and the &#8220;New normal&#8221; they can expect as the economy wakes up.</p>
<p>This time it is Aneel Bhusri, CEO of Workday.</p>
<p>He talks about leadership during this crisis and likely changes in executive suites as healthcare becomes a major market opportunity and bigger HR challenge for every entity. He talks about conversations with fellow leaders on how best to re-open work places as the economy wakes up. He describes acrobatics in his customer base like running a million-person payroll and financial closes with nobody in the office. He also describes how cloud applications have scaled very well during the crisis and easily supported work-from-home efforts of customers.</p>
<p>Aneel is one of the nicest guys in the industry and while he credits his mentor and co-founder, Dave Duffield for that trait, his calmness comes across throughout the recording. Workday has done backflips for its employees and customers during the crisis &#8211; he describes some of each.</p>
<p>There is a definite feel-good, &#8220;be kind to each other&#8221;, &#8220;have fun&#8221; vibe during the conversation. It is a small detail in the conversation, but I particularly appreciated his generosity with the Zoom background of Giorgio&#8217;s Pizzeria, one of his favorite comfort-food places and his hope they survive the crisis.</p>
<p>I could almost hear &#8216;Peaceful, easy feeling&#8221; by the Eagles playing as I was talking to him. Enjoy.</p>
<p><iframe class='youtube-player' type='text/html' width='620' height='349' src='https://www.youtube.com/embed/2eFWn0hejxM?version=3&#038;rel=1&#038;fs=1&#038;autohide=2&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;wmode=transparent' allowfullscreen='true' style='border:0;'></iframe></p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/155895/new-normal-a-conversation-with-aneel-bhusri-ceo-of-workday/">New Normal: A conversation with Aneel Bhusri, CEO of Workday</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/vinnie-mirchandani/">Vinnie Mirchandani</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/UJVgotWTo2w" height="1" width="1" alt=""/>]]></content:encoded>
		<post-id xmlns="com-wordpress:feed-additions:1">155895</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/155895/new-normal-a-conversation-with-aneel-bhusri-ceo-of-workday/</feedburner:origLink></item>
		<item>
		<title>Pandemic, Future of Work &amp; the Current Fundraising Environment</title>
		<link>http://feedproxy.google.com/~r/EIblogs/~3/ZV0TS9FibFc/</link>
		<comments>https://www.enterpriseirregulars.com/155499/pandemic-future-of-work-the-current-fundraising-environment/#comments</comments>
		<pubDate>Tue, 26 May 2020 01:30:31 +0000</pubDate>
		<dc:creator><![CDATA[Jason Corsello]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured Posts]]></category>
		<category><![CDATA[future of work]]></category>
		<category><![CDATA[HR]]></category>
		<category><![CDATA[Venture Capital]]></category>

		<guid isPermaLink="false">https://www.enterpriseirregulars.com/?p=155499</guid>
		<description><![CDATA[<p>As a data-driven investor, we constantly track data. Fundraising data. Market data. Economic data. Over the last month, one question persists —how will COVID-19 affect venture capital fundraising particularly in the Future of Work? We decided to look at our data to understand VC fundraising over the last month and compare last month’s data with the [&#8230;]</p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/155499/pandemic-future-of-work-the-current-fundraising-environment/">Pandemic, Future of Work &amp; the Current Fundraising Environment</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/jason-corsello/">Jason Corsello</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
]]></description>
				<content:encoded><![CDATA[<p>As a data-driven investor, we constantly track data. Fundraising data. Market data. Economic data. Over the last month, one question persists —how will COVID-19 affect venture capital fundraising particularly in the Future of Work?</p>
<p>We decided to look at our data to understand VC fundraising over the last month and compare last month’s data with the same period last year. We also wanted to analyze a full year of data to compare year-over-year trends. The early indications suggest the fundraising environment has NOT changed as a result of the pandemic. In fact, as you see the data below, if you compare fundraising in Future of Work companies in April 2019 vs. April 2020, it was actually up 40% year over year.</p>
<figure><img src="https://cdn-images-1.medium.com/max/960/1*Ui4BcXwo66zX9wVXKg7Dyw.jpeg" alt="" /></figure>
<p>Please keep in mind a few considerations. First, the data is based on actual fundraising announcements so there may be a lagging affect from when the actual investments were made. Nonetheless, we believe a few things are happening…</p>
<ol>
<li>In the “follow the herd” mentality of Silicon Valley, remote work has become a broad-based theme across all stages of investors.</li>
<li>Highly competitive deals will still get funded quickly with little-to-no impact on timing or valuations.</li>
<li>The large household names — those that have raised outsized funds over the last 2 years — are taking advantage of the uncertainty and being very opportunistic to land deals previously not in market.</li>
</ol>
<p>That said, we also believe…</p>
<ol>
<li>Deals are still getting done but a “reset” is just starting to happen that will have a lagging effect on venture fundraising later this year.</li>
<li>Valuations are increasingly being scrutinized and deals will inevitable take more time to close with increased dilution for entrepreneurs.</li>
<li>Investor will be going to the edges, either early seed and later stage. We foresee many companies at risk in the mid-stages as a result of the “frothy” fundraising environment of the last few years. Many companies are “at risk” as a result of high burn rates, high valuations, increased concerns on churn, and stalled net new bookings.</li>
</ol>
<figure><img src="https://mk0enterpriseirdbne0.kinstacdn.com/wp-content/uploads/2020/05/1STuvUFrT_jYJasbt92VEUA.png" alt="" /></figure>
<p>I had a chance to share notes ideas with some fantastic investors focused on the future of work including Roy Bahat (Bloomberg Beta), Kara Nortman (Upfront Ventures), Naomi Ionita (Menlo Ventures), and Lan Xuezhao (Basis Set Ventures). I encourage you to <a href="https://bloombergbeta.zoom.us/rec/share/y8xnL7ff70VOepWR5G7SdaE9GLjDaaa813Uf-vUPy0mi7DUjGUxXvcw7YadwBKVu"><strong>watch a replay</strong></a> of the discussion (coming shortly). Even though I broke Roy’s “no predictions” format, it was a great discussion with wide-ranging topics on remote work, the impact of government, and the future of “shareholder capitalism”.</p>
<p><img src="https://medium.com/_/stat?event=post.clientViewed&amp;referrerSource=full_rss&amp;postId=824486483dac" width="1" height="1" /></p>
<p><small><i><a rel="nofollow" href="https://www.enterpriseirregulars.com/155499/pandemic-future-of-work-the-current-fundraising-environment/">Pandemic, Future of Work &amp; the Current Fundraising Environment</a> is copyrighted by <a rel="nofollow" href="https://www.enterpriseirregulars.com/author/jason-corsello/">Jason Corsello</a>.  If you are reading this outside your feed reader or email, you are likely witnessing illegal content theft. </p>
<p><a rel="nofollow" href="https://www.enterpriseirregulars.com">Enterprise Irregulars</a> is sponsored by  <a href="http://www.salesforce.com">Salesforce</a> and  <a href="http://www.zoho.com">Zoho.</a> </i></small></p>
<img src="http://feeds.feedburner.com/~r/EIblogs/~4/ZV0TS9FibFc" height="1" width="1" alt=""/>]]></content:encoded>
			<wfw:commentRss>https://www.enterpriseirregulars.com/155499/pandemic-future-of-work-the-current-fundraising-environment/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
	<post-id xmlns="com-wordpress:feed-additions:1">155499</post-id>	<feedburner:origLink>https://www.enterpriseirregulars.com/155499/pandemic-future-of-work-the-current-fundraising-environment/</feedburner:origLink></item>
	</channel>
</rss>
