Smarter use of collaborative tools and tips for choosing the right ones
Collaborative tools have taken enterprise by storm, not only because of their innovative nature, but also because of the convenience they offer for the critical processes- client communication and data dissemination. Technology plays a huge part, but collaboration, by nature goes beyond that. Here is some ways on which your collaboration tools go beyond mere technological innovations. And these are the ways that collaboration can be used for giving that edge to the business.
Enables easier discussions and planning
With a collaborative platform that is free of geographical limits, remote working of teams has become a reality. This is a definitive edge, because while it may upset work life balance, certainly it supports teams to get together to share ideas, strategies and information that will create them. Getting the right people together, irrespective of the location, is what drives an efficient operation. In a medium sized organisation, this ability could be the game changer. Online collaboration tools also present the opportunity to create the virtual incubator, and this helps to get everyone on a single platform against boundaries of companies, colleges or even vendors.
Equipped with a file sharing and commenting system, audio as well as video collaboration allows employees and teams to work together real time. It will also save costs of travel, maybe real estate too. Having a clear task board is one of the things online collaboration tools can help you with. This helps to create and share a focussed goal, get roadmaps for everyone to follow and finally, ensure the project and strategy tracking is on the same board- pun intended. With good collaboration tools in place, there are jobs done far more efficiently from participants from across the world, than being in the same room.
The nature of the very basic of idea sharing β brainstorming- also can be changed with collaborative networking that has innovative techniques and tools to share information, ideas, and even record them.
They help shape best working practices
When teams work without spatial and communication inhibitions, it becomes easier to discuss the best practices, and far easier to adopt them. The companyβs objectives are much clearer, since everything is out THERE, clear and open for discussion. Time delays, trust issues and inability to move forward- all are created because of lack of free and real time communication. Collaboration helps to eliminate that!
Much more efficient resources management
Resources and skilled ones, specially, are a big cost for every enterprise. As the enterprise goes up the value chain, the resources will reduce and there will be an increasing need to do much more with much less. With collaboration, this is supported well. These tools help cut down on redundant and unnecessary communications, high cost means of communication like couriers, or even travel. There is much more that can be achieved with a small, faster, agile collaborative team, and that is the benefit of these tools. Any issues that crop up can also be quickly flagged, resolved and eliminated. Clear conversations that can be tagged from any location, and the ability for the management to follow them- add untold value to the process of strategising- and can be the building block of a very smart company.
Upping employee engagement and morale
Some industry leaders see the engagement advantage as the biggest reason why collaborative tools need to be adopted. This is a modern management outlook, where top-down form of running a company often backfires. Any leader who does not take inputs from employees, but prefers to fire instructions, is more likely to lose people and respect.
Collaboration tools put everyone on the same platform, affording equal visibility to everyone; ideas, making employees feel important, and critical to the company. Nothing makes them more efficient and interested than this realization β that they matter. The manager driven vision of issuing instructions is terribly detrimental to a companyβs growth, an increasingly people are realising that. Besides, there is the little matter of most young employees being better clued into the social market than the manager level ones. Getting their interest and commitment could be the smartest decision by way of resources managementβ¦and collaborative tools could be the best conduit for that.
Knowledge Management benefits
The same collaboration that helps sharing ideas and forming the most well informed strategies, will also enable collaborations for the knowledge repository within the organisation. Normally, most enterprises have a KM database, that no one really manages or knows about, hence very little utilisation happens. Data that is kept in some obscure corner of the server may be valuable but its real worth only issues when it is utilised for the companyβs benefit. With collaborative tools, it can be used by teams globally or at least enterprise wide, to create the best strategies, driving the companyβs growth. This pooling of data, information and insights could be the catalyst that your enterprise needs to get on the fast track!
Tips for Choosing the Right Collaboration Tool for Your organisation
Today any organisation needs effective and efficient Communication among their employees. We call this capability as collaboration tool which is in the form of software and hardware. This collaboration tool has many capabilities i.e. from simple instant messaging, to video or audio conferencing. Some applications may focus on a specific element while others try to incorporate more than one capability.
This application software designed to help people involved in a common task to achieve goals. A collaborative working environment supports people in their individual with collaborative work environment thus evolving into a new class of professionals, e-professionals, who can work together irrespective of their geographical location with many tools stich together. we define Online Collaboration Software as a software application, platform or tool that is delivered as Software-as-a-Service (SaaS), or cloud, or on premises having number of capabilities within one platform, either built directly in, or integrated with other applications.
Online collaboration is a valuable tool for any business that wants to be more efficient and effective and isnβt just for companies who had multiple offices located in different geographical locations alone.
Letβs discuss some capabilities of collaboration which is being expected by any organisation.
Some groups want their work done through Group Messaging. We should always look for Integrated messaging features. Collaboration on work doesnβt always mean two or more people are working simultaneously. At time some document which needs to be reviewed by other team members. This is when messaging can be helpful in moving the process on. Users who are viewing the files should be able to leave the message in the file/document. There should also be an option to share the message privately /personally or with a group. Support of Instant messaging IM should also be integrated in the online collaborative tool OR should be part of collaborative conference tool. Sending IM is efficient way to communicate.
There are many ways of doing online conferencing like WebEx, GoToMeeting, Spontania, video, skype, google hangouts etc. and if you are working on any collaboration tool then you should need to supplement your online collaboration software with one of these services. Also we need to see the number of participants in a single conference, normally many solutions are having 25 participants but again depends on the available bandwidth also. We should also see whether the same conference can work as video and audio both? How many continuous presences are available? Public & private chatting is available? Also we should check if connecting the tool with any hardware H.323/SIP video conferencing codecs is possible or not FROM LAPTOP and vice versa? Normally it needs some Gate way software licenses or hardware to connect H.323 /SIP Codecs. All these collaborative tools should also have capabilities for features like application sharing, desktop sharing, white boarding annotation etc.
Then one of the demands are whether you can record the conference on the host pc or on cloud?
Also we are talking about BYOD i.e. bring your own device be it iOS, android smart phones etc. should have the apps available to join the collaboration services from these smart devices as well.
Finally these collaborative tools appeal to the young
One thing for sure that the young generation, group of young people wonβt stay unless theyβre happy with the tools theyβre provided. Email isnβt enough anymore: they expect to communicate much more naturally, just as they do with their friends.
Fail to adapt to this change and youβll quickly be left behind. If your business isnβt open to collaborative software with latest communication techniques that suit your employees, you might find it hard to find talented employees to fill the gaps in your workforce.
5 Reasons why SMBs must seek out cloud solutions
Reasons why SMBs must seek out cloud solutions
Big is not necessarily better β and small businesses now are aware of just that. Small businesses are r now ready to take on any big competitor, thanks to technology and variety available in the market these days. Not just that, small enterprises can also provide competitive prices and high levels of customer satisfaction.
Growing comfort with the cloud concept encourages small businesses to move beyond hosted general applications and email service to more critical platforms. SMBs are also considering cloud-based solutions as a prime investment area.
Few reasons why SMBs must seek cloud solutions are:
- Flexibility and Scalability: Cloud based solutions are extremely flexible and adjustments to the system can be made quickly without the need of a major re-architecture of the Data Center; and hence prove the right choice for SMBs. One does not need to bother in case of a shifting of office/ headquarters or even the Data Center.
- Geographic benefits: Cloud solutions offer a unique opportunity of having geographically unnecessary online copies of each backup. This is especially useful should a calamity hit an entire region. Additionally data backed up in one region can easily be restored in another region on any side of the globe.
- Speed: In addition to performing updates in a much more timely manner, making the switch to cloud also allows an organization to work much more efficiently. For instance, in case of SMBs and startups, when one canβt afford IT staff, trying to perform updates oneself can end up being time-consuming; putting it in the hands of others means that time can be put to better use.
- Low maintenance: While conventional storage solutions require significant amount of architecture and technical work to setup and operate on a day-to-day basis, cloud technologies offer complete solutions that may not require in-house IT resources to maintain. Additionally cloud managed services provider can provide experts to monitor and maintain backups for your entire organization from a central location.
- Cost Effective: One would need to consider the cost of the hardware needed to backup data, software licenses, storage cost, electricity and cooling system cost, the cost of an offsite storage facility, a DR site in another location, and the cost of qualified technical persons to manage the backup and recovery and testing process. After analyzing all the costs, the low monthly fee of cloud based solutions quickly becomes attractive.
Human errors is now the top threat for information security in organizations
A chain is only as strong as its weakest link. In an enterprise environment, it is often human errors that create the biggest risks. This fact is corroborated by many studies, and more than those, by many outages and episodes. Whether it is ignorance or wilful data theft, the risk that enterprises face from employees and disgruntled ex-employees is as big as (if not bigger than) external cyber threats or APTs. While ignorance has only one reprieve- training and policy enforcement, deliberate thefts can be more difficult to handle, and will need tools as well as stronger security infrastructure tools in place.
In January 2015, P&G USA filed a suit against 4 Gillette employees, for stealing and sharing corporate information with direct competitors. This is a classic case of people risks with sensitive corporate information. In another recent report on a study by Ponemon Institute, employee negligence was identified as the top threat for information security in healthcare organisations. How do CISOs identify a high risk behaviour employee? Also, how do IT organisations fight ignorance and negligence in employees to secure data, to the maximum possible lengths?
Here are some ideas on how to do itβ¦
1. Identify careless employees, increase risk awareness- Tighten up Policies
Simple carelessness on the part of an employee-like forgetting to close a portal when not using it, using weak passwords, allowing unauthorised access to information and the most common- forgetting a mobile in a cab- can cost a company millions in terms of revenue. It can also turn back years of hard work for a market reputation or creation of strategy.
The only solution is constant training and creation of awareness about the risk careless behaviour can carry. Making compliance stronger and more strictly enforceable could help here. Creating clear policies of what is mandatory, at any cost, also helps. Once clear cut guidelines are in place, screening is easier and even re-screening isnβt such a cumbersome task any more.
All access levels need to be defined, especially for business critical systems and data. Strong encryption tools need to be in place, and authentication needs to be a non-compromiseable exercise. Unwanted devices, sites and applications usage needs to be regulated as well. Constant training needs to be in place for cyber security awareness, so employee understand the impact of even a single wrong click that opens a malware laden site. Opening unauthenticated sites, sharing passwords, carrying sensitive information in an unencrypted form- everything needs to be regulated, and the employees made aware of the risk- over and over again!
2. Mobility Led Risks- The rights tools in place
While enterprise mobility cannot be avoided in almost all enterprises, it is one of the highest reasons of data theft and loss. Studies indicate that almost 68% of all global organisations have faced a security threat from employee owned mobile devices.
Every enterprise needs to have tools in place to prevent this risk from blowing into a full outage. Again, a clearly defined BYOD policy is a critical part of this plan. Monitoring personal owned devices, encrypting data before access, are some processes that should be strictly enforced. Security solutions for isolating corporate data and encrypting it are available, and should be used.
3. Disgruntled employees- screening and rescreening would help
While employee background screening is almost mandatory for every organisation, sometime it is just not enough. In many cases, crucial facts about an employee can be missed. In addition, a dissatisfied or frustrated employee is also a threat- and specially one who knows it will be easy to walk away without anyone identifying him or her as the cause of a breach. They will have the satisfaction of causing harm to the company!
For this kind of attitude, a single screening while hiring may not be enough- follow up screenings and re-screening is required. Companies that do not insist on rescreening at regular intervals, expose themselves to threats of all kinds. Having a regular follow up on every employeeβs background is an exercise that could probably detect a malignant element in the people strength of the company, which could be the fore-alarm, needed to step up security or deal with it right away.
4. Train and Update- Constantly
There are innovations in tools as well as applications for IT security, as with other technologies, on a rapidly growing basis. Every single threat is another step up for data on risk, and every time this should be documented and shared.
Every enterprise should keep abreast of these innovations, and ensure all employees are trained on a constant basis. By maintaining an updated list of risky behaviour, and the circumstances that lead to a breach, a training manual can be created. Employees need to be regularly trained for what to be cautious about and how to handle a threat. Clearly articulating the ground rules and elaborating on the consequences of the situation will certainly create a culture of security awareness in any enterprise.
Summary
While constantly evolving security technologies are creating updated tools to fight IT security, the single wrong action of an employee can undo the best of guards and checks. Every enterprise needs updated information on these tools, and needs to ensure every employee knows how to NOT be a risk. The education, training and awareness about risky behaviour are essential.
Also essential is the policy to make this awareness mandatory, these rules completely enforceable and the training a part of the corporate culture. While technology and tools can provide the ammunition to prevent breaches, the human element needs enterprise focus as well!
Enterprise Policy Vs Technology β are your people the biggest security risk?
According to a study by Intel in September 2015, almost 43 % of all data breaches were due to insider breaches (half being intentional). Threats perpetuated by disgruntled employees form an overwhelming number in these, especially in the Asia pacific region, where it is the second largest cause of all security breaches.
But despite such staggering figures, very few organisations or IT employees take the insider threat seriously- as low as 20% in the US market. A recent report by Ponemon says that in 2015, while insider attacks werenβt the biggest cause of security breaches, they caused the most damage- about USD 144,000 per instance!
Why?
Globally, very few organisations seem to have a clearly written policy that ensures employee education or affirmation about maintaining security of organisation data. If nothing else, it would help in increasing awareness of what might be dangerous, and lay down the processes for the right way of handling sensitive data!
One of the things this policy needs to define is regulate the privileges that trusted operators have- because they most often have the opportunity to cause most damage. Since they have the privilege to perform any process on critical systems using critical data, they could also, inadvertently or deliberately, be the biggest threat!
Most organisations confuse trust with granting unauthorised access to data for any employee and that has cost many companies dear! A balance between empowering an employee, and access control needs to be in place. In a vast majority of cases the unauthorised access comes from inadvertent sharing or passwords or access to critical data. Whatβs needed is a strict control on access. But thatβs where the challenge lies- overlapping roles and inconsistent entitlements. But even more than that, is the poor governance process that keeps the backdoors open for security policy enforcement. The reason is, very often, that most organisations themselves are unaware of where their critical information is stored. It then becomes difficult to prevent inappropriate transmittal or access in the first place! And in most cases, a companyβs reaction to a breach is reactive. There is hardly any attempt for predictive responses. There is almost never any system or policy in place to identify at risk accesses or individuals, so an attack may be pre-emptive or predicted.
Any policy that is to regulate data access to insider threats needs to follow some definitive guidelines. Some permissions and capabilities of employees need to be clearly regulated. These could be:
Data Classification
In order to be able to protect critical data, it first needs to be classified as critical. Understanding the consequences of a leak, an organisation needs to classify information at various levels of criticality and then work on ensuring the various security policies that confirm to each level of protection it needs. The data could include customer data, financial or market data or systems information. Each of these will have a cost attached, and access policies need to be in place for all. In addition, the security algorithms need to be clear on who can access to what levels- read, delete, copy or use in any other manner.
Privileged Identity and Passwords Management policy- a Must
In most organisations, the security and IT admin teams have access to almost all data, but with passwords. In some orgs, leadership and stakeholders are also given access. Such privileges need to be monitored by technology tools as well as policy enforcements. Who gets to see and do what, or Privileged Identity Management, has to be clear and simple but non-compromisable. It should enable regulation of multiple accesses to critical data.
Often many leadership level stakeholders share passwords and authorisations that could compromise key data or systems of a company. A policy that lays down the terms of clear privileged Identity Management can control the risks associated with this multiple usage of passwords and thus, the risk.
RBAC
In most organisations, privileges accesses are all or nothing accesses, often allowing more privileges than a person needs. A regulatory policy should be able to change that, and reduce the unnecessary risk to key data and systems information. Policies governing user entitlements need to be a strict enforcement in every organisation.
Fraudulent Access Identification
In cases where an outsider exploits an insider to access data, the advanced authentication methods should be put in use. These would go beyond passwords, and into the contextual factors. Fraudulent access can be identified by simple ways- time zones- a person logging in from another place within minutes of logging from one- or some security questions answered wrongly- anything could trigger alarm bells and even identify a fraud authentication try. But these also need to be a part of the policy process.
Virtualisation Risks β Need of Security
With innovative technologies like virtualisation, the risks of insider leaks have increased- another layer of administrators for the hypervisor. With the ability of the tool to replicate or transmit data at a single click- the risks have gone up manifold. The solution usually is to embed traditional security apps in the hypervisor layer as well, but the entire virtual infrastructure too, needs to be secured. The security policy needs to have an option for emerging technologies and the risk they pose.
Summary
So, to control the problem of unauthorised access, there needs to be a strict security paradigm with automated processes that meet compliance audits and identity security policies. Whatβs critical here is the tighter incidence management timelines- that deliver a timely and stronger role based security foundation.
Data Centers 2.0 β What to Expect and What to Plan For
With enterprise rapidly becoming virtual β by way of the cloud and connecting with IoT, physical servers for Data Centers are on their way out. Whatever the storage capabilities, it is just not going to work for the enterprise of today, and definitely not for tomorrow. What then is the face of Data Centers 2.0?
The cloud has all but taken over the storage scenario if Gartnerβs figures are to be believed. In fact, in India, the revenue from cloud services has been projected at 33.2% between 2012 and 2017. So essentially, the cloud expenditure will grow at a higher rate than IT budgets in most organisations. Given this reality, and coupled with the rapid adoption and growth of virtualisation as an enterprise technology, the future of Data Centers is going to be vastly different from its present avatar.
Businesses are demanding a change. Virtualization is the enabling technology for a whole new wave of IT innovation. In addition to the technological prerogative, virtualisation is a technology that will drive efficiency and speed in enterprise in more ways than one, the primary one being business advantage. There will be soon no reason why any company would entertain the monolithic hardware based Data Centers that grab higher slice of the IT budget pie in just keeping it efficient and well managed.
The most obvious way the change will happen is the transformation from everything hardware to everything on a software platform. Beyond storage, even the Data Center networks! So SDDC is the way forward, definitely. According to a study byΒ MarketsandMarkets, the market for Software Defined Data Centers will be growing at a rate of 28.8% every year between 2015 and 2020, from USD 21.78 billion in 2015, touching USD 78 Billion in 2020. With the irresistible benefits of reduced IT infra cost that the automation provides, and the resultant efficiency of market response, SDDC is definitely the hero of the still evolving Data Center industry.
With software enabled systems, a multi layered control is the next easy step. A centralised Data Center management console is now a reality and this also allows the analytics and big data processes to get more space, visibility and hence, strategic leverage. These layers can control almost everything β from users, space, virtual machines and even manage policies. With higher visibility into every single aspect of the data that can be drawn, and more efficient process control, this will certainly be a part of the Data Center of the near future.
With software essentially taking over Data Centers, they will be completely infrastructure agnostic very soon. There will be very little consideration of which hypervisor, servers or platform is being used, since the layered management tools will make it so easy for administrators to scale and work on powerful platforms, in a much more fluid and seamless fashion. The Data Center of tomorrow will take ease of management to hitherto unknown levels. In the same flow, Data Center automation will ensure better workflow management and optimal efficiency management as well. Robotics will almost certainly be utilised to a greater extent in efficiently managing Data Centers of tomorrow. Many known brands are already developing smaller robots that will help in identifying the energy patterns and their efficacy in Data Centers, and this will only get better over the next few years as Robotics becomes a more enterprise oriented technology.
However, just acquiring a Software Defined Data Center may not be the end of enterprise planning; there are certain things to watch out for, while taking up this innovative plan. Firstly, SDDC is not an enterprise reality yet, and only those organisations that have a certain maturity levels in terms of I&O engineering, are best off installing it.
Secondly, and more importantly, adoption of a software defined Data Center should come from a business need for higher agility and scalability. The underlying technology and skill requirements will not be viable if this is a purely technology initiative. In any case, this is not an off the shelf product and any enterprise planning to install has to do its own due diligence. A SDDC initiative would need that the organizations identify a suitable vendor to do the job, and do it well. Then, there are discussions around the various components of the Data Center β which may not all come from the same vendor- hence the issue of integration and seamless interoperability will arise.
Till it becomes commonplace technology, the stakeholders need to work on various commercial aspects of the transaction β software lock- in will be a big issue for this particular decision, and could play a very strategic role in the financial planning.
All said, the SDDC will replace your Data Center eventually, over the next two to three years, but it may not be the smartest choice for every enterprise right away. However, enterprises need to be prepared for the change when it comes- because then it will be too late to start preparedness and planning.