The enterprise cloud explosion over the past few years has produced a wide array of next generation business tools. Whether for collaboration, business intelligence, or CRM, these tools hold the potential to contribute to businesses’ bottom lines and increase productivity. Implementation, however, is never as simple as it seems. We can all attest to having abandoned a new software as “shelfware” or searching for an alternative solution to a sanctioned application. John Reichental, CIO of the city of Palo Alto, explains five challenges that slow the pace of technological adoption in enterprises. While cost can be an issue, companies can’t neglect the human factors.
My new blog post: 5 Reasons Enterprises Have Difficulty Implementing New Technologies: http://t.co/ODPGICVLqm
— Jonathan Reichental (@Reichental) May 21, 2015
The key to driving any IT initiative is winning over the hearts and minds of constituents – from business users to executives. Peter Kretzman reinforced the importance of securing multilateral buy-in during a recent Twitter chat on challenges for CIOs. His argument points to the need for an open dialogue between IT and end users, as well as a clear understanding of business objectives from the CIO on down.
A3. Get exec buy-in to the overall approach. The CIO and IT should not go it alone in terms of policy. #CIOChat
— Peter Kretzman (@PeterKretzman) May 21, 2015
Scotland Yard CIO Stephen Deakin brings up the hazard of the big data collection enabled by many of these same tools. The more customer information companies collect, the higher the stakes of protecting corporate data. Proposed EU Data Protection Regulations are a perfect example of new standards to which global companies will be held accountable.
Lots of interesting big data driving the need for better security and hopefully not more regulation #HNCIOsurvey
— Stephen Deakin (@StephenDeakin) May 21, 2015
It’s impossible to discuss the security considerations of the consumerization of IT without touching on the risks associated with shadow IT. Cloud sprawl in the enterprise can exacerbate the risks from vulnerabilities that prey on services with weak security policies. The LogJam vulnerability provides an example of the security challenges posed by widespread cloud adoption without discretion. Creative Artists Agency CIO Michael Keithley shared that the average company uses 71 services vulnerable to LogJam. Many of these services are small, consumer cloud service providers without the resources to promptly respond to vulnerabilities.
— Michael Keithley (@mkeithley) May 20, 2015
Of course, on the other end of the spectrum is the misconception that any cloud use is the source of a security liability. Christian McMahon shared a level-headed approach to cloud security, debunking the myth that cloud services are inherently insecure. On the contrary, enterprise-ready public cloud providers often have much larger investments in security than enterprises’ internally hosted systems. This is not to say that there are no risks to employees using cloud services, but rather that common conceptions of cloud security challenges are often misguided and based on perception rather than facts. As the article states, the first concern when it comes to cloud is a lack of visibility into cloud services and their security capabilities. This pain point highlights the need for cloud service registries, which can help organizations quickly vet cloud services and keep up with rapid new cloud services request from users.
— Christian McMahon (@ChristianMcM) May 21, 2015