The study explores how enterprises are responding to the opportunities and risks introduced by new technologies.This year, we surveyed over 1,200 IT and business decision makers to determine why, when, and how their organizations adopt four pivotal emerging technologies – mobile, analytics, cloud and social business technologies – that are rapidly reshaping how enterprises operate.
Are you in the lead, or is your organization falling behind? You can use the adoption and investment statistics we discovered to help you assess where your organizationstands:
Business Analytics and Mobile Computing are already quite mainstream, with over 50% of respondents deploying.Cloud Computing and Social Business represent a coming wave, with 40% either already piloting the technologies, or planning to adopt them within two years.Moreover, planned investment levels in the four technologies over the next two years indicate that all are moving full steam ahead: 55% or more of respondents plan to increase investment in Mobile, Cloud, and Business Analytics, and 43% plan to increase their investment in Social Business. You can click on the following infographic to take a deeper dive:
Despite the foothold of these technologies and the enthusiastic investment landscape, the report cites critical IT skill gaps that threaten to slam on the brakes just as organizations are hoping to leverage these technologies for their strategic advantage:
Across all four technology areas, only roughly 1 in 10 companies report having all the skills they need to be successful, and one-quarter of respondents report major skill gaps.
We also surveyed about 700 educators and students about these technology areas, and according to their responses, the skill gap is poised to get even worse:
About one-half of academic respondents report major gaps in their institution’s ability to meet the needs of the IT workforce.
Security also continues to be a major concern. In fact, Security is rated as the #1 barrier to adoption for mobile, cloud and social business, and the #2 barrier to adoption for business analytics.
What can you learn from those making the most progress applying these technologies for strategic advantage?
We asked respondents to rate the four emerging technologies’ importance to their businesses and also to rate their enterprises’ pace of adoption relative to competitors. We identified an elite group of Pacesetters who are forging ahead faster than others – despite the adoption hurdles – and who are using emerging technologies in more strategic ways.
If you want to get your organization onto the technology fast track (or keep it there), there are a number of interesting lessons you can take from the Pacesetters. We found that Pacesetters are more likely to exhibit three distinguishing traits that help them capitalize on the potential of mobile, analytics, cloud and social technologies. They are:
So, how are Pacesetters managing to stay ahead of the competition? As it turns out, they’re very experimental in their approach to developing IT skills. Rather than wait until there’s clear business demand for new skills, Pacesetters start building skills ahead of time: they are nine times more likely to experiment with technologies that don’t yet have a clear business application, and twice as likely to proactively develop skills to meet anticipated needs.
To learn more about the study results and how you can follow the pacesetters’ lead in technology adoption, you can check out the complete IBM 2012 Tech Trends report and a variety of other resources.
Don't miss the paper's list of concrete recommendations for becoming Pacesetters. We invite you to join in the discussion and let us know what you think about the study and its recommendations!
Senior Consultant, IBM Center for Applied Insights
Growing up, there was a very specific sandwich-making rule laid down by my dad. When making peanut butter and jelly sandwiches, you had to use the peanut butter before the jelly. Was this because of some principle which determined that the resulting sandwich held together better when the ingredients were applied in this order? No. It was because he hated the cross-contamination of jelly into the peanut butter jar which was inevitable when it was on the spreading knife first. He preferred jelly-free sandwiches, you see.
This memory of a long held rule, which still govern my actions today, came to me as I was reviewing the Center's current research into security related topics. We're talking with Chief Information Security Officers (CISOs) about their evolution and leading practices in the enterprise. We're discussing how they successfully bring security topics into the business world. Most importantly, we're examining how business priorities impact security choices.
In the realm of mobile and BYOD, you can hardly have a conversation without discussing security. It is a key inhibitor to mobile adoption and one reason companies are looking for managed security solutions rather than simply hoping for the best. Some security leaders argue for keeping personally owned devices out of the enterprise, simply due to the risk potential. Others, accepting that mobile is here to stay, fight to make its use as secure and safe as possible. It's only going to get worse and more and more connected devices enter the enterprise (see this recent Forbes article: "The Next Big Thing In Enterprise IT: Bring Your Own Wearable Tech?")
IBM's prior CISO, and current head of Security Services, Kris Lovejoy wrote about best practices for mobile implementations last year as part of our Security Essentials series:"Enabling mobility: their device, your data". For many, doing business means being mobile. As a security leader, it becomes your job to manage the risk - not just avoid it. Caleb Barlow extended these thoughts with an article this summer, "Yes, It’s Possible to Be Confident About Mobile Security", which focuses on four key ways to mitigate the risk of adding mobile to your secure enterprise:
Risk analysis - Organizations must understand what enterprise data is on employee devices, how it could be compromised and the potential impact of the comprise (i.e. What does it cost? What happens if the device is lost? Is the data incidental or crucial to business?).
Securing the application - In the pre-mobile, personal computer era, simply securing the device and the user were sufficient. When it comes to mobile devices, we also need to think about securing the application itself. As a typical application is downloaded from a store, the end user really has no idea who built the application, what it actually does with your data or how secure it is. Corporate applications with sensitive data need to be secure in their own right.
Secure mobile access authentication - Since mobile devices are shared, it’s important to authenticate both the user and the device before granting access and to look at the context of the user requesting access based on factors like time, network, location, device characteristics, role, etc. If the context appears to be out of line with normal behavior, appropriate counter measures can be taken.
Encryption: Simply put, if the data is sensitive it needs to be encrypted both while at rest as well as while in motion on the network.
What stops you from fully adding mobile to your security strategy? Hopefully it is more than just a distaste for jelly in your peanut butter. This October we'll have more to share on mobile adoption challenges when we release this year's follow up to our 2012 CISO Assessment.
Senior Consultant, IBM Center for Applied Insights
When you are in the business of developing (hopefully) provocative, data-driven thought leadership, every topic or issue can seem like it is undergoing rapid, fundamental transformation. Things are faster. Things are more complex. Things are being disrupted. When setting out earlier this year to take a look at how the role of finance and the CFO is changing, I had to make sure that I wasn’t going to fall into that pattern without due cause.
There are plenty of articles, reports and other quips saying that CFOs can’t just keep the books anymore. Protecting the bottom line isn’t enough. The value that they provide needs to change. Finance leaders have to be more creative, more innovative, and more strategic, yet still maintain operational discipline and efficiency.
Is this true? Are there finance leaders who are doing things differently and succeeding because of their efforts? After research, analysis, study and conversation, I have to say that this is real, and it comes down to those who can manage three areas that are accelerating concurrently and reinforcing one another.
Accelerating technological change…
With economic uncertainty and tightening business and technology cycles it is hard to stay at the cusp of change, let alone get ahead of it. A recent article on the Forbes blog, “4 Ways Technology Is Transforming Business Strategy”, does a nice job explaining why technology is disrupting strategy. Since technology (mainly IT, but also in other areas) doesn’t change in a nice linear way, it’s dramatically reducing the shelf life of business models. The pace of change is out of whack, coming in fits and spurts, and making the job of finance executives, who like things nice and predictable, very difficult. But technology is not just a challenge; it’s also an opportunity to give CFOs and other finance practitioners new tools.
Accelerating strategic change…
Traditionally a functional role, finance has always been responsible for efficient financial operations, ensuring compliance, providing trusted information and managing cash and capital. However, things are getting harder and harder with stability and predictability becoming a thing of the past when it comes to markets, competition, and customers. What can CFOs do about this strategic shift?
In the article, “Think Functionally, Act Strategically”, the author discusses how functional roles, like finance, have to change to meet accelerating strategic change. They have to balance the basic business capabilities and competitive necessities of the past with differentiating capabilities of the future. It is not just about using the current capabilities and processes of the organization anymore – CFOs have to co-create the strategy, the tools, the processes and the implementation plans with the rest of the business.
By embracing and riding technology and strategic acceleration, CFOs can potentially unlock performance gains. We decided to go back and re-examine the results from IBM’s 2010 Global CFO Study, extend the work, and see how organizations were performing financially that were pushing their efficiency and analytical capabilities. You can read the approach and details in the report, but looking at financial measures like revenue and EBITDA, we found that those enterprises that are excelling at efficiency and insight are outperforming financially through all phases of the economic cycle. We hypothesize that this is opening them to new strategic possibilities – evolving into what we call “performance accelerators” (see graphic below).
CFOs and others in the finance function can help manage the acceleration of technology, strategy and performance. By using their current capabilities and developing new tools and processes, they can act as headlights, the gas, the breaks and the navigation system for their organization. We can’t analytically prove the existence of “performance accelerators” yet, but with further research we expect to show that strategic, growth-driven CFOs are seeing accelerating performance benefits.
This famous quote from U.S. Supreme Court Justice Louis Brandeis extols the virtues of openness and transparency – shedding light on peoples’ actions to avert wrongdoing. In our high-tech times, organizations would be wise to apply this thinking to address “shadow IT” – employees using software-as-a-service (SaaS) applications that are procured and deployed without going through established IT channels and policies. Let’s see why.
The SaaS train has left the station, and there’s no slowing it down: global spending on SaaS is forecasted to grow at a CAGR of 20.2% in 2012-2017, reaching US$45.6 billion by 2017.
The IBM Center for Applied Insights has just released a global study of 879 IT and line-of-business (LOB) SaaS decision-makers: Champions of Software as a Service: How SaaS is fueling powerful competitive advantage. The research reveals that application agility – the ability to quickly, easily, flexibly deploy applications and implement solutions – is the number two driver for adopting SaaS (following close on the heels of reducing total cost of ownership), so it’s easy to understand why businesses find SaaS so irresistible.
The temptation is great for employees to quickly and easily deploy SaaS applications without involving the IT department to approve, provision, and secure them – but these rogue deployments can expose the organization to security risks and other negative consequences.
So, what does “sunlight” have to do with SaaS? The IBM study grouped organizations based on their level of SaaS adoption and whether they’re reporting competitive advantage from SaaS. Pacesetters are the 19% of respondents reporting the highest level of SaaS adoption and gaining competitive advantage through their broad SaaS efforts. At the low end, Chasers are much slower to adopt SaaS and gain competitive advantage from it.
Rather than deploying SaaS on the sly, pacesetting enterprises actually cultivate a strong collaboration between LOB and IT on SaaS activities such as selection, deployment, and security.
In 71% of Pacesetter organizations, LOB and IT strongly collaborate on SaaS selection and deployment, whereas only 36% of Chasers report a strong collaboration. 70% of Pacesetters report that SaaS is strengthening the IT and LOB relationship, versus only 39% of Chasers.
A strong strategy is another significant differentiator of the Pacesetters’ approach to SaaS: Compared to Chasers, more than twice as many Pacesetters have a cohesive, enterprise-wide SaaS strategy (71% versus 31%), and Pacesetters are four times more likely to position SaaS as an integral part of their enterprise cloud strategy.
The dark alleys of “shadow IT” lose their danger once one shines a strong light on them. Fostering a well-defined SaaS strategy and encouraging strong IT/LOB collaboration around SaaS are the “sunlight” that leading SaaS enterprises use to combat shadow IT.
Senior Consultant, IBM Center for Applied Insights
Sometimes time and space conspire to create an opportunity that you weren’t expecting. That was the case for me last week. Near where I live, the University of Rhode Island (URI) hosted their third Cybersecurity Symposiumon education and workforce development. Speakers included the entire Rhode Island Congressional delegation, the director of the U.S. Defense Intelligence Agency, the CIO for the U.S. Department of Defense and a number of industry practitioners, including IBM’s VP for Cyber Security Innovation Marisa Viveros. Marisa was the co-author of the paper that we recently published on leading practices for cybersecurity education.
The symposium was open to the public and students, had over 400 attendees, and flew at a fairly high level. There were some excellent takeaways and parallels to IBM’s recent research with respect to cybersecurity skills and education. The Congressional delegation, which included Sen. Whitehouse, Sen. Reed, Rep. Langevin and Rep. Cicilline, each emphasized different areas of the cybersecurity challenge. This included improving public awareness, the national security implications of the rapidly changing cyber threat, the difficulties with law enforcement, and the need to protect our privacy, civil rights and liberties.
Lieutenant General Flynn of the U.S. Defense Intelligence Agency (and URI alum) was a very engaging speaker and talked about the “invisible war” that is currently being waged in cyberspace. He highlighted the profound transition U.S. security is currently going through – caused by population, economic and technology shifts – which require new ways of thinking. To fight this invisible war, he said that for every person currently working in cybersecurity today, we need a staggering twenty-eight more. He also repeatedly talked about the generational issues involved in cybersecurity and that real rules and discipline have yet to emerge on the international stage. He advocated something akin to the “law of the sea”, but for the cyber domain.
The business and industry panel included speakers from Google, IBM, Dell SecureWorks, CVS and Fidelity Investments and was much more open and conversational. They all brought their perspectives – whether providing information security or managing it for their organizations. There was a lot of discussion about how to break into the field of cybersecurity, what skills to have, what courses to take, and career paths. Stephan Somogyi, from Google, talked about the need to educate everyone on digital hygiene and focusing education on the basics of computer science. He said that you have to have a passion for security, it is a calling. If you have that, you can come from any field. Jeff Shilling, from Dell, talked about the incredible need for security technicians, those with hands-on skills. He has enough security managers, what he needs are those that can do the work (he agreed with Lt. Gen. Flynn’s assessment).
A lot of the themes from the day echoed what we recommended through our research. Local and national collaboration was evident with the diversity of speakers and the support from the entire university, the Congressional delegation, the military and industry. The importance of awareness was highlighted over and over. URI is working on innovative ways to provide hands-on experience for students through a low-cost Open Cyber Challenge Platform they are developing. The need for improving non-technical cybersecurity academic programs for business and policy leaders was highlighted in a new study from the Pell Center for International Relations and Public Policy.
This was a very valuable event, and I hope that it continues on an annual basis. Even though it was to raise local awareness and promote URI and its computer science program, it could stand to have increased global participation in the next iteration – which was one of our key findings.
For a summary of our recent research check out and share the Prezi presentation below:
Derek Franks Consultant, IBM Center for Applied Insights
As a former marketer myself, I know that marketing is often marginalized within enterprises, particularly those with strong scientific or development organizations. Marketing is often viewed as being responsible for the “soft stuff” that looks pretty but doesn’t have any real impact on the business. I’m here to tell you that this view is wrong, and if you don’t realize it quickly, your competitors will.
We recently surveyed 362 marketers from around the world, across more than 15 industries, and found that Leading Marketers’ enterprises had 40% greater Revenue growth and twice the Gross Profit growth over the past 3 years when compared to the rest.
What exactly is a Leading Marketer?I’m glad you asked. We identified 2 essential traits of effective marketers: “Effective Engagement” and “Intelligent Investment”. Essentially we defined Leading Marketers as those who had a high level of responsibility forengagingwith customers across channels as well as a sophisticated approach toinvestingmarketing resources.
We then looked at publicly available financial data and found that when we correlated that to our segmentation of leading marketers, a clear trend emerged: Leading Marketers’ enterprises performed better financially.
So how, exactly, do you develop a Leading Marketing organization within your enterprise? Like most things in today’s world the answer is complex but grounded in the principles of Marketing 101. It can be as simple as the 4P’s or as complicated as developing a collaborative relationship with other functional areas within the enterprise. I’ll be blogging more about this topic and other insights from our study over the coming weeks, but get a sneak preview by reading our executive report, How Leading Marketers Outperform: Effective Engagement and Intelligent Investment.
If there is a particular topic you’d like me to talk about, please login and leave me a comment, below.
In my previous blog post on How Leading Marketers Outperform, I discussed how Leading Marketers develop a system of engagement
that drives customer value at every touch.Today, I’m going to focus on the other side of that equation and dig a
bit deeper into what prevents many marketing organizations from becoming Leading
The first question you might ask is “why doesn’t everybody
just establish a system of engagement?”The short answer is because it’s not easy.A look at the barriers both Leading Marketers
and others face in implementing marketing technology is very telling.
To begin with there are a set of barriers we found that are
common to virtually any technology decision: cost, ROI, and organizational structure.
If we continue looking, the additional barriers for leading marketers are ease of
use and lack of appropriate user skills.Alternatively, we found that some others are more concerned with
alignment/collaboration within the organization – particularly with IT.In many cases, marketers may not even have
ownership of marketing technology decisions.
In short leading marketers are collaborating with IT to implement the technology framework that supports a system of engagement and are focused on issues that enable them to improve
the effectiveness and scale of their activities. The others are
struggling to coordinate effectively with IT and other functional areas within
the enterprise. They aren't at a point yet where ease of use or a lack of user skills could be a barrier.
This leads to the second question, “okay, how do
you collaborate more effectively with other functional areas (especially IT)?”This is complicated, but our data
suggests that Leading Marketers are able to collaborate effectively at least in
part because they’ve established credibility within the organization.
There are lots of ways to establish credibility, but a part
of it is being able to demonstrate the value that you bring to the table.To that end, our study found that 88% of
leading marketers attribute business results to marketing activities. They use a variety of different systems,
ranging from spreadsheets to complex software suites, but the common thread is
that they attribute results regardless of methodology.
And of that 88%, 93% of those leading marketers have a set
process in place for determining which marketing activity receives credit for
the business results.Again, the
specific methodology varies – first touch, last touch, results distributed
across multiple touches – but they have a set process in place.
This measurement allows leading marketers to invest resources intelligently.They know what works and what doesn’t, and this allows them to maximize
the impact they have on the business and focus only on the most effective
activities. This in turn builds credibility with the rest of the enterprise. Marketers can finally speak in the same financial language as the rest of the business.
So in summary, it’s very difficult
to become a leading marketer without measuring the results of marketing
activities.Measurement not only informs
operational spending decisions, but also impacts the role of marketing within
the organization. Leading marketers’ ability to attribute results helps them
not only invest intelligently but also build credibility and the financial justification needed to construct an
enterprise-wide system of engagement.
I'll be back next time with a discussion of the overall characteristics of leading marketers and how they illustrate a road-map forward for marketing organizations. In the meantime, if you have any questions, please feel free to leave a comment!
Senior consultant, IBM Center for Applied Insights
It’s easy to say that information security leaders have it tough. The security landscape is full of conflict, confusion and uncertainty, coming from a number of different directions. Leaders have a lot to handle. If it’s not a rapidly shifting threat, it’s new technology platforms to secure including mobile, cloud and social. Almost every article I see these days is focused on the growing challenges, with titles like the “Eye of the storm”, “Into the cloud, out of the fog” and “Converging waves of pain.”
Today, the IBM Center for Applied Insights releases the results of the 2012 IBM Chief Information Security Officer Assessment. This was our first foray into examining the role of information security leaders, and how they are evolving to meet the challenging landscape. While we understand and appreciate the fact that things are difficult on the technical front, we wanted to focus on the organizational and leadership aspects of information security.
We felt that information security leadership was in the process of undergoing a transformation and wanted to test whether the role was changing based on increasing security challenges and greater attention from business leaders.
We wanted to identify best practices that could be shared across the industry – and understand if organizations were moving toward a more holistic, risk-based approach to information security.
We also wanted to know what roles collaboration, innovation and integration are playing in security organizations.
What we discovered was that only 1 in 4 security leaders have made the shift to being recognized as having strategic impact on their enterprise. Based on a self-assessment of their organizational maturity and their ability to handle a security incident, three different types of leaders emerged.
Influencers (25%) – This group sees their security organizations as progressive, ranking themselves highly in both maturity and preparedness. These security leaders have business influence and authority – a strategic voice in the enterprise.
Protectors (47%) – These security leaders recognize the importance of information security as a strategic priority. However, they lack important measurement insight and the necessary budget authority to fully transform their enterprises’ security approach.
Responders (28%) – This group remains largely in response mode, working to protect the enterprise and comply with regulations and standards but struggling to make strategic headway. They may not yet have the resources or business influence to drive significant change.
We also discovered some significant differences between the groups that show how Influencers have developed their strategic voice. Compared to Responders, Influencers are:
2x more likely to have a dedicated CISO
2.5x more likely to have a security or risk committee
3x more likely to have information security as a board topic
2x more likely to use a standard set of security metrics to track their progress
4x more likely to be focused on improving enterprise-wide communication and collaboration over the next two years
2x more likely to be focused on providing education and security awareness over the next two years
This is just the beginning of our conversation around the role of information security leadership and its place within the enterprise. The full report goes into more detail on the security landscape, the different types of leaders and their characteristics, and a way forward for everyone.
David Jarvis Client Insights, Senior Consultant Center for Applied Insights
In 2012 we saw significant data breaches across multiple industries and governments impacting millions of users. Will 2013 bring more of the same? Is this an uncertain future we will have to live with? Can we accept degraded privacy and security and billions of dollars in lost revenue, damage, reduction in brand value and remediation costs?
Last year, a number of major security themes were part of this uncertainty – cloud, mobile, social media, big data, compliance, advanced persistent threats, physical infrastructure security, and the changing nature of information security leadership. None of these issues are going anywhere. In fact, into 2013 and beyond these issues are only going to become more important and will become the concern of more and more enterprise leaders.
All of these disparate issues come together in a new infographic from IBM. It knits together the pressures CEOs are feeling to deliver transformation with limited resources, the changing role of information security leaders, the threat landscape and the best practices to address that landscape. It connects enterprise priorities with information security practices, achieving innovation while dealing with risk.
In 2012, the IBM Center for Applied Insights released a series of security-related pieces that focused on a number of these important issues. We looked at the changing role of the CISO and other security leaders in our 2012 CISO Assessment. We also published a series of best practices for security leaders through our eight article Security Essentials series. In 2013 we will continue to provide insights on information security.
What does IBM think the future of security will look like? IBM security experts and leaders have developed lists of ideas for 2013 and beyond. Highlights include:
Enterprise security organizations will become more independent and work with the audit committee and risk officers more.
Data scientists will increasingly analyze and correlate security data as well as unstructured business data to reduce the risk of breaches.
Threat data will be shared more readily between the government and private sector, and amongst private sector companies.
Organizations will begin monitoring the information shared on social media back channels to detect threats earlier.
Compliance will remain a strong security driver and will be weighed against the rise of a risk-based approach to security.
Because of data, identity and monitoring technologies, cloud security will go from "mystery and hype" to "secure and move-on".
Mobile devices (the device, network and applications) will be significantly more secure – more than laptops are today.
The type of data collected and inspected to detect advanced threats will increase in variety and volume.
Keeping these ideas, trends and emerging issues in mind, information security leaders must rise to the challenge of creating a future that isn’t like today. By using their best practices to connect with and support enterprise-level goals they can create a better, more secure, future.
To download a copy of the infographic below, click HERE.
are bad to do by committee, creating a work of art, cooking dinner, closing a
baseball game – and sometimes committees are a necessity. Security and risk
committees are an essential part of any enterprise’s security and risk
management infrastructure. They are a sign of a mature organization. By
promoting collaboration across the enterprise and making security and the associated
risk discussions an integral part of senior leadership’s responsibilities, the
enterprise can be better protected. Yet, even though the benefits are clear,
not enough enterprises have one.
released last week by the Carnegie Mellon CyLab, looking at privacy and
security governance in the Forbes Global 2000, reported that boards and senior leadership
still are not exercising appropriate governance over the privacy and security
of their digital assets. The study stated that there is still a significant gap
in understanding around the fact that security, privacy and IT risk are all a
part of enterprise risk management.
The study did
note one encouraging sign – that more and more enterprises have
cross-functional privacy/security committees – 70% of 2012 respondents versus
17% in 2008. These committees can act as a bridge to boards and senior leadership
and elevate the discussion around security and risk, potentially closing the
findings line up very nicely with what we recently uncovered as part of our 2012
CISO Assessment. Overall, only
49% of the total sample reported that they had a security or risk committee.
When we delved deeper, 68% of the most mature group of organizations,
Influencers, had a security/risk committee. In comparison, only 26% of the
least confident and mature group, Responders, had one.
interesting was, regardless of the organization’s overall security maturity
level, if they had a security or risk committee they shared similar
characteristics. In general, leaders of the committees tended to be Senior IT
Executives (28%), CISOs (24%) or Senior Business Executives (22%). These
committees met on a fairly regular basis, with 48% meeting quarterly and 27%
security and risk committees also took a comprehensive, enterprise-wide
approach with both business and IT representation. From the business side, the
most represented functions included Compliance (80%), Legal (65%), Business
Executives (64%), Business Operations (64%), and Finance (59%). From the IT
side, IT Executives (91%), IT Operations (72%), Network Operations (60%), and Data
Governance (51%) were all a part of a majority of the committees.
part of the CISO Assessment we looked at the primary objectives of the
security/risk committees. Looking at the chart below we can see that, based on
their top two choices, most committees were primarily focused on developing
enterprise security strategy and developing action plans and recommendations.
So should committees only be focused on strategic policy and governance issues?
Is there more they could be doing?
At IBM, our
risk management team meets quarterly with a top advisory committee, including
senior vice presidents of all the business units, who report directly to the
CEO. These include the leaders of many functional areas including finance,
marketing, technology and others. Each of these executives must understand the
security risks to his or her unit and what controls are in place. Together,
they shape and decide strategy. Security, after all, is intimately tied not
only to their units, but to the future of the enterprise.
all this information, I think that enterprises are using security and risk
committees more and more and they are adopting best practices around the leaders,
members, operations, and goals of those committees. To make the next step:
Make sure your committee has both technical and business leadership representation and make sure it is connected to the highest levels of the enterprise and the board. The committee can be the gateway between the enterprise and the board with respect to information risk management.
Ensure your committee is broad and diverse. Compliance, legal, finance and IT operations representation is expected. Reach further, make sure business unit leaders are involved so new products and services are created in a secure fashion. Include human resources to help with employee education initiatives.
Set up a way to measure the progress of the committee. Using targeted metrics can help focus not only the committee, but the entire security organization for the enterprise. It will provide something to work towards and make it easier to communicate with the board.
Mobile money has progressed by leaps and bounds in the recent years and a lot of innovations are happening globally. The industry is undergoing a lot of changes and ecosystem participants are trying to learn from their successes and failures to innovate further. I have been an avid follower of the various developments happening in the industry. In this post, I will capture my thoughts on key segments of growth/developments which I would expect to happen this year. I believe these segments of growth/developments have the potential to bring further scale and innovation in this industry:
1. Development of ‘App Store’ – I expect that some of the major mobile money service providers may open up their platforms via an Application Programming Interface (APIs) that allows third parties to hook in and innovate. This development has the potential to replicate the success of the ‘Apple Appstore’ by providing an incentivized ecosystem to the developers. They would develop innovative and customized applications for specific markets which would address specific needs and in turn, attract more customers to the service. Thinking further, an ecosystem of these Apps stores from various service providers can provide further scale up and growth opportunities to them.
For example, a Kenyan MPesa customer on his visit to Ghana, can simply download an app to pay parking fees or make some quick purchases in a busy market in Ghana. Implementing platform level and customer level interoperability would be the foundation to build this big ecosystem.
2. Transformation of traditional model of B2B payments – Increasingly, mobile money is finding its application in the Retail industry for Point of Sale (PoS) transactions. Interestingly, I would expect more Business to Business (B2B) mobile money solutions to emerge for various industries. These solutions would focus on transforming the way payments are being made throughout the value chain. The aim would be to reduce risk of carrying cash, optimize liquidity, and provide delivery of goods and payments with security.
For example, Coca-Cola Sabco is looking at the use of mobile money as a way to shift the supply chain of its Manual Distribution Centers away from cash. In Papua New Guinea, IFC is looking at piloting mobile money to reduce the use of cash in the coffee supply chain.
3. Development of new business models – Traditionally a Mobile Network Operator (MNO) or a bank provides the mobile money services either individually or in collaboration. Of late, new business models are emerging as different industries are exploring mobile money based custom applications.
For example, Bharat Sanchar Nigam Limited (BSNL), a leading telecom service provider in India, has a mobile banking platform which will help mobile subscribers to send money orders electronically. The unique thing is that this SMS based service is done in association with India Post. Receiver will be able to encash the SMS at all post offices in the country. Starbucks, a leading coffee chain is already among the most successful early adopters of mobile payments, claiming to have processed USD26 million in mobile transactions in the US just 12 months after launching the service. Recently, it has forged a partnership with Square that will see the mobile payments company power in-store credit and debit card payments for Starbucks.
I expect that more of these innovative and interesting partnerships will emerge which would utilize mobile money to conduct business more efficiently and effectively.
I look forward to your comments and observations. Please click “Add a Comment” below or “More Actions” to share this with others.
In my previous post, I emphasized the importance of consumer focus for CPG companies. We, at the IBM Center for Applied Insights, have been working on a comprehensive global study* to gain more quantitative and qualitative insights about the increasing consumer focus of these CPG companies.
For the purpose of this study, we have segmented the market in terms of the degree of consumer focus and the use of analytics by the survey respondents. In this post, I would like to point out towards the most notable finding of the lot: existence of a “Leader” group amongst the survey respondents which enjoys much more clout with the retailers. In fact, they are nearly three times less concerned about needing a retailer’s approval to execute their plans, and 1.4 times less concerned about seeing their planning processes extended as a result of delays. They also exhibit superior financial performance over the rest. Between 2009 and 2012, the leading publicly quoted consumer products companies in our sample saw their stock prices rise 1.6 times faster than the rest (16 percent cumulative annual growth rate for Leaders compared to 10 percent cumulative annual growth rate for Others).
The companies in the Leader group use advanced analytics and collaborate extensively (both internally between functions and externally with retailers) to develop a high degree of consumer focus.
As shown in the figure 1 below, they comprise of about 15 percent of the total respondents.
The executive presentation will be delivered at the IBM Smarter Commerce event at Nashville this week.
For more details and insights on what exactly are these leaders doing differently than the rest and what steps can be taken to become one, revisit this space in a month. The Center and IBM DemandTec are authoring a complete paper on this topic, due out by the end of June.
I look forward to your comments and observations. Please click “Add a Comment” below or “More Actions” to share this with others.
Note - For the purpose of this study, we conducted telephone interviews with 356 senior sales executives at consumer products companies in Australia, Canada, India, the United Kingdom and United States, between February, 2013 to March, 2013. These respondents cover 10 product categories. Forty-six percent of them work for large enterprises (employing 1,000 or more people), while 54 percent work for medium-sized enterprises (employing 100-999 people).
Welcome! This is the first post in a series of articles I’ll be writing over the coming months that delve a bit deeper into some of the more interesting findings from our State of Smart research here at the IBM Center for Applied Insights. Today we’ll be discussing some of the interesting data points for the retail industry including some surprising findings about CRM.
If you’re not familiar with our State of Smart work, an overview of our research and findings can be found in our Executive Report. We surveyed over 1100 executives worldwide across 9 industries to determine their organizations’ information and analytics capabilities (we refer to these capabilities as “listen” and “anticipate”). We found that organizations with these capabilities significantly outperformed their peers: 1.6x revenue growth, 2x EBITDA growth, and 2.5x stock price appreciation over a five year period. Not bad, huh?
But this only tells part of the story. We also asked these enterprises about where they realize value from analytics and how they deploy “listen” and “anticipate” capabilities. So let’s dig into the retail data a bit deeper.
For our purposes, we’re going to refer to retailers in the top right quadrant as “Outperformers” and everybody else as “Others”. Only 29% of retailers are Outperformers. About 62% of retailers have a high level of “listen” capabilities while only 38% of retailers have a high level of “anticipate” capabilities.
What this tells us is that retailers are pretty good at “Listening” – i.e. capturing data. By and large, most retailers have done a good job of laying down an information foundation. However, a much smaller proportion of those retailers are then translating that data into actionable insights.
So we know that retailers have room to improve when it comes to leveraging the data that they capture. What other interesting insights did we uncover?
For starters, as you might expect from the high “listen” capabilities, retail Outperformers are very good at capturing different types of data. Specifically, 84% of Outperformers capture data at every customer interaction (this was the highest % across any industry we surveyed). The 'data at every customer interaction' spread between outperformers and others is 2.2x, the second highest gap among the nine industry categories.
Additionally, the 56% of the Outperformers captured unstructured data versus 35% of the Others. Essentially the Outperformers are looking beyond individual transaction data and are mining social media, weather patterns, etc to drive more robust information for applied decision making.
The Outperformers then leverage this information to drive actionable insights about their customers. For example, 84% of Outperformers (vs 38% of Others) use their information and analytics capabilities to recommend actions to customers. This can take the form of both customer facing recommendations, such as cross-selling or up-selling opportunities, or internal actions such as identifying next best actions to convert abandoned baskets or reactivate a dormant customer.
The holy grail of retailers has long been to develop deep insights about customers from a variety of data sources and then use these insights to drive actions that positively impact the customer experience and consequently improve their top and bottom line. Our data shows that the Outperformers are doing just that.
What we’ve talked about so far is fairly intuitive. However in the course of analyzing the State of Smart data we saw several things that intrigued us. For instance, found that only 36% of Outperformers vs 31% of Others realized value from customer relationship management. We expected the overall percentages to be higher and gap to be wider. The data suggest several things. First, the true value of CRM has likely not yet been realized by most retailers. Second, the outperformers haven’t yet found a way to drive the additional insights they’ve been generating into their CRM practices.
Hopefully you found this deep dive into our State of Smart retail industry data to be interesting and useful. If you're interested in calculating the potential impact that developing your "listen" and "anticipate" capabilities can have on your business, I suggest you take a quick look at our Smarter Merchandising and Smarter Shopping Experience toolsets. We've developed online calculators that let you quickly and easily get an idea of the potential economic benefits that leveraging analytics can have for your organization.
I’ll be posting more deep dive articles over the next few months. Check back next next week for a deep dive into the banking industry data. If you have any questions about this article or requests for future articles, please feel free to let me know.
Client Insights, Senior Consultant Center for Applied Insights
Platform as a service (PaaS) is at a critical stage in its life cycle – with promising business benefits offset by lingering reservations. PaaS promises increased flexibility, lower costs and higher quality IT services, while maintaining control over data and applications. It sits squarely between infrastructure as a service and software as a service, and could prove to be the most transformational of the three main types of cloud computing.
The IBM Center for Applied Insights wanted to explore attitudes around PaaS in order to identify leading practices in PaaS adoption and provide recommendations on how to exploit its potential. We interviewed over 1,500 IT decision makers in 18 countries and a wide range of industries so we could better understand their motivations, experiences and concerns relating to PaaS. This week, we released the results of our exploration in our latest paper “Exploring the frontiers of cloud computing – Insights from platform as a service pioneers”.
The report goes into more detail on the benefits and challenges surrounding PaaS, how to overcome the challenges and what an enterprise can do to start, or continue, their PaaS journey. For a view from cloud pioneers CLD Partners, check out their post on IBM’s Thoughts on Cloud blog. For more information about IBM’s SmartCloud Application Services launch and the study check out a recent article by ZDNet.
The Guardian's Media Network recently hosted a live chat around the topic of how CMOs can align and use digital marketing and data analytics - two areas we've taken a close look at since the inception of the IBM Center for Applied Insights.
The Guardian notes:
Big data (and analyzing that data) means that marketing professionals are now getting even closer to the customer – they know more about audiences than ever before, with pinpoint precision. At their fingertips a marketer now has detailed facts and figures about consumer browsing habits, their favorite brands, how they use social media. It means that campaigns can be targeted, analyzed and proved better than ever.
It becomes the job of marketers and CMOs to make sense of all that data and not get lost in the noise. Doing this, takes an analytical and curious approach to data. It's easy to find the "big numbers" but more challenging to find the "right numbers." As Surjit Chana, CMO of IBM Europe, has said, the core principles of marketing haven't changed. What has changed, dramatically, is how those principles come to life in today's marketing campaigns, customer experiences, and business results. In our paper, Marketing Science: From descriptive to prescriptive, we found that only 23% of marketing professionals use tested analytic approaches to understand the vast amount of data they have access to. More traditional marketers, using data to describe outcomes but not determine actions, consistently use data at face value - without applying data models or scientific thinking.
When technology and analytic skills don't exist in the marketing teams, it makes perfect sense to build partnerships with those who do. The closest partner in most organizations is IT. Thus, the renewed focus on CMO + CIO collaboration. We're continuing to watch, collaborate, and recommend approaches to our C-Suite colleagues. Check out "Understanding leading retailers" to see how the retail industry is collaborating with IT and partners to serve customers better.