10 hard truths IT must learn to accept | Features | ChannelWorld.in

PARTNER HOTLINES

10 hard truths IT must learn to accept

By Dan Tynan

IT can deflect a big chunk of common issues like password resets with self-service, but it will always be more cost-effective to have humans handle the one-off and more complex issues

In a perfect world, your network would suffer no downtime and be locked down tight. You'd be in perfect compliance with all government regulations, and your users would all be self-supporting. The cloud would take care of nearly all your infrastructure needs, and there wouldn't be a single device accessing the network you didn't first approve of and control.

Good luck with all that. The gap between your dreams and cold hard reality just gets wider every day. That doesn't mean you should give up, but it does mean you need to get real about what you can change and what you must accept.

Here are 10 things IT must learn to live with.

IT concession No. 1: The iPhone revolution is here to stay.

More and more workplaces these days resemble a geeky party that's strictly BYOD (bring your own device). The problem-Many IT departments either never got an invitation or failed to RSVP.

May 2011 surveys by IDC and Unisys found that 95 percent of information workers used self-purchased technology at work or roughly twice as many as executives in those surveys estimated. IDC predicts use of employee-owned smart phones in the workplace will double by 2014.

Nathan Clevenger, Chief software architect at mobile device management firm ITR Mobility and author of "iPad in the Enterprise" (Wiley, 2011), says the iPhone and iPad are the catalysts for the consumerization of IT. Tech departments can either enable them to be used securely or risk the consequences.

"Unless IT supports the devices and technologies users demand, the users will simply go around IT and use personal tech for business purposes," Clevenger says. "That is a much more dangerous situation from a security standpoint than supporting the consumer devices in the first place."

Tech departments need to steer a middle course between attempting (and failing) to keep consumer technology out of the workplace, and allowing unfettered access to the network from any device, notes Raffi Tchakmakjian, vice president of product management at Trellia, a cloud-based mobile device management provider.

"BYOD is a scenario IT departments are learning to live with, but they struggle to manage them from a security, cost, and operations perspective," he says. "It becomes very difficult to ensure compliance to corporate standards and still meet business needs. They need a management solution that ensures corporate data security and allows them to manage costs with minimal impact on IT operations and infrastructure." (InfoWorld's "Mobile Management Deep Dive" PDF report shows how to do so.)

IT concession No. 2: You've lost control over how your company uses technology.

It's not just consumer devices invading the workplace. Today a business user with absolutely no tech acumen can spin up a third-party business cloud service with a phone call and a credit card or, in many cases, a Web form and a click of a button. IT has lost control over IT.

That's not necessarily a bad thing. The burgeoning universe of cloud and mobile apps can give frustrated business users access to tech resources they need without putting an additional burden on IT staff or budgets.

"For years, IT has controlled every device, application, and process around technology," says Jeff Stepp, managing director of Copperport Consulting. "But with business units getting more technically savvy and frustrated with IT, they have gained executive support to go off on their own to research, procure, and implement new apps and gadgets. These newly empowered business units are often successful in getting what they need implemented more quickly and cheaply than going through their own IT department."

Your job is no longer to provide top-down solutions; it's to enable business users to make the right decisions, says Scott Goldman, CEO of TextPower, maker of text-messaging platforms for business.

"Instead of struggling to regain control, tech departments should strive for something more valuable: influence," he says. "When IT departments treat their users as customers instead of complainers, they get more of the results they want. The days of the all-powerful IT department dictating methods and machines are gone. The sooner they realize it, the faster they'll actually regain some level of control.

IT concession No. 3: You'll always have downtime.

Eventually, even the best-maintained data centers will go down. Think you have redundancy up the wazoo? You're one of the lucky few.

In a September 2010 survey (PDF) of more than 450 data center managers, sponsored by Emerson Network Power and conducted by the Ponemon Institute, 95 percent reported suffering at least one unplanned shutdown during the previous 24 months. The average length of downtime: 107 minutes.

In a perfect world, all data centers would be built around highly redundant, dual-bus architectures where maximum load on either side never exceeds 50 percent, says Peter Panfil, a vice president for Liebert AC Power, a division of Emerson Network Power. They'd be able to handle peak loads even when critical systems fail and others are down for maintenance, with a separate recovery facility ready to come online in case of a region-wide disaster.

In the real world, however, 100 percent uptime is only possible if you're willing to pay for it, and most companies aren't, says Panfil. That forces data center managers into a game of "IT chicken," hoping outages don't occur when systems are beyond 50 percent capacity.

Organizations where uptime is essential to survival are segmenting their data centers, he adds, reserving high availability for their most critical systems and settling for less elsewhere. If their email goes down for half an hour, it's annoying but not fatal. If their real-time transactions system goes down, they're losing thousands of dollars a minute.

"It is always better to have the capacity and not need it than to need it and not have it," he says. "But the people who are signing the checks don't always make that choice."

IT concession No. 4: Your systems will never be fully compliant.

Like uptime, 100 percent compliance is a lofty goal that's more theoretical than practical. In many cases, focusing too much on compliance can hurt you in other ways.

Your level of compliance will vary depending on what industry you're in, says Mike Meikle, CEO of the Hawkthorne Group, a boutique management and information technology consulting firm. Organizations in heavily regulated fields like health or finance probably aren't in full compliance because of how often the rules change and the different ways they can be interpreted.

"It's safe to say that just as no network can be 100 percent secure, no organization can be sure it's 100 percent compliant," he says. "If a vendor is trying to sell you a product that ensures perfect compliance, they're lying."

Another danger area is falling into the compliance trap, where organizations expend too many resources trying to stay in sync with regulations while ignoring other, more vital parts of their operations, says Meikle.

"Organizations that strive for compliance with regulations often fall down in other areas," he says. "Being compliant with regulations doesn't necessarily mean you're doing what you need to do with your business. Compliance is really just a component of risk management, which is itself a component of corporate governance. It's an overarching business issue and needs to be addressed as such."

IT concession No. 5: The cloud will not fix everything.

Clouds are on the IT horizon. According to Gartner's 2011 CIO Agenda survey, more than 40 percent of CIOs expect to run the majority of their IT ops in the cloud by 2015.

But even the cloud is not the ultimate solution. Reliability, security, and data loss will continue to cause headaches for IT departments -- they'll just have less control over the stuff that's in the cloud.

"Data loss is inevitable within any organization and can still happen in the cloud," says Abhik Mitra, product manager for Kroll Ontrack, a consultancy specializing in information management and data recovery. "Businesses must prepare for the worst by working with their provider to plan for downtime, data recovery and migration, and catastrophic loss. Data security will always be a concern, though advances in cloud solutions make it less of a risk as time progresses."

The cloud also introduces a new problem: how organizations can accurately measure their IT spend, especially as business users spin up cloud services without IT supervision. Accounting for this form of "shadow IT" can cause headaches for enterprises and force tech departments to take a hard look at the value of the services they provide, says Chris Pick, chief marketing officer for Apptio, a provider of technology business management solutions.

"For the first time, business users have a choice between what services IT is offering and what users can requisition on their own," he says. "But until the CIO can get a firm grasp on what it costs to deliver IT, he or she won't be able extend meaningful choice back to business users. This will only serve to supply more oxygen to the fire of shadow IT."

 


Latest Features

  • Vendor Speak: Digital India—A Push for Economic Growth

    Vendor Speak: Digital India—A Push for Economic Growth

    Marking the launch of Digital India initiative, vendor companies conveyed their support to the Indian government and shared their upcoming plans and opportunities.

  • Social media sites still don't do enough to combat abuse

    Social media sites still don't do enough to combat abuse

    Every day, countless individuals and groups are victimized on social networks. The abusers, detached and cloaked in anonymity, often take on different personas as they shame, troll, incite and denigrate others with relative impunity. The ramifications can be devastating and, until recently, the majority of social media companies failed to acknowledge -- let alone confront -- the vulgarity and vicious threats that fly so freely on their platforms.
  • How to deploy tablets to your mobile workforce

    How to deploy tablets to your mobile workforce

    When Wakefield Canada, the exclusive distributor for Castrol in Canada, set out to replace the tablets used by their sales team, it went right to the source to figure out what to buy: The people who would be using them in the field.
Latest Videos

How We Deal With the Government Sector: Jaimin Patel, E-Connect Solutions

Perseverance, patience and endurance are key to succeed in the government sector, says Jaimin Patel, Director, E-Connect Solutions, who derives 70 percent of his revenue from the government sector.

Converged Security is the Next Big Thing for Channels: Ranjit Nambiar, HID Global

The blurring lines between physical and IT security in today's organizations will increase the business potential for channel partners, says Ranjit Nambiar, Director, IAM, India & SAARC, HID Global.

Our End-to-End Security Story Will Benefit Channels: Sunil Sharma, Cyberoam

A stronger R&D team, an enhanced portfolio and robust channel ecosystem will accelerate our continued growth in the security space, says Sunil Sharma, Vice President, Sales & Operations, India & SAARC, Cyberoam (a Sophos Company).

Cloud, Analytics Accelerating Storage Demand: Gurpreet Singh Bhatia, Arrow PC Network

New-age solutions like flash storage will be key drivers of growth, says Gurpreet Singh Bhatia, MD, Arrow PC Network.

EDITOR'S PICK

The real risks of moving to the cloud

Control over your data and its security are impaired when you pass it to a cloud provider, says Guy Betar.

6 mindsets of culture transformation

The culture of your organisation will determine its success. It's the environment that you create that is either supporting your vision, mission, goals, and purpose or it's the environment that you are fighting against while pursuing these.

The dirty secrets of project management revealed

For business systems, the project go-live date really does matter -- and project managers seem willing to sacrifice budget limits more often than they're willing to blow past a scheduled deadline. There are sound business reasons for doing this as bonuses, commissions and stock valuations depend upon the revenues and earnings for the quarter. So you don't want to make any changes that would mess up this quarter's results, but you do want to implement changes as early as possible next quarter.

SLIDESHOWS

The State of the Internet

Akamai's Q1 2015 state of the internet report provides insights into key global statistics including connection speeds, broadband adoption (fixed and mobile networks), and IPv4 exhaustion and IPv6 implementation.

India Software Market on an Upswing

According to IDC, the Indian software market has witnessed consistent growth of 10 percent since the second half of 2014, showing signs of growth and revival. 

7 Jobs Technology Has Replaced

Albert Einstein said once that it has become appallingly obvious that our technology has exceeded our humanity. With every invention of technology some poor soul becomes vulnerable to losing his or her job in some corner of the world. Here are few jobs that will cease to exist soon.

Changing Fortunes of Top Tech Companies

The tech sector has been led by these companies for a long time. But how have they fared over the quarters?

India's Leading VADs

Why Channels Want to Partner With Inflow Technologies

Inflow Technologies’ tie up with 39 vendor companies, an extensive tech portfolio, and a services play, are great value propositions for enterprise channels, says its President and CEO, Byju Pillai.

iValue Creates Real Value for Channels in India

Focused on niche vendor alliances around data, network and app management backed by a robust channel ecosystem marked iValue's success in 2014. What clicked for the seven-year-old VAD?

RAH Infotech Shows Channels the Way Ahead

Mutual trust and long lasting bond with vendor companies and channel partners helps VADs to evolve and succeed in today’s aggressively competitive market. Leveraging competent channel partners and forge niche vendor alliances marks RAH Infotech’s success in 2014.

How Satcom Infotech is Adapting to New Security Landscape

As a leading value added distributor, Satcom Infotech is emerging as an end-to-end security player, helping both customers and partners grow.

How ComGuard Shields Channel Partners

As emerging technologies introduce new threats to the enterprise landscape, they are making channel partners anxious. But VADs like ComGuard are putting their worries to rest. Here's how.

Tech Chat

Collaborating To Outcome Based World: Priyadarshi Mohapatra, Avaya

Priyadarshi Mohapatra, Managing Director, India and SAARC, Avaya, on how IT is transitioning from a keep-the-lights-on role to one that enables customers to deliver results.

The Dawn of the Digital Age: Akhilesh Tuteja, KPMG

The development of digital infrastructure will be a key growth driver for technology and solution providers. 

Paradigm Shift from End-Users to User-First : Parag Arora,Citrix

Parag Arora, Area Vice President and India Head, India Sub-continent, Citrix, says new technologies will force organizations to take a user-first approach in 2015.

Mobile and Cloud Are Gamechangers of the Future: Karan Bajwa, Microsoft

Karan Bajwa, Managing Director, Microsoft India, says, in  2015, organizations will adopt a mobile-first and cloud-first strategy to get ahead of competition.

A Network for the Internet of Everything : Dinesh Malkani,Cisco

Dinesh Malkani, President, India and SAARC, Cisco, talks about IoT and the significant technology transitions in the networking world.

Moving to the Third Platform: Jaideep Mehta, IDC

Cloud and mobility are the two technologies that will fuel the rapid adoption of the third platform in India.

Envisaging a Holistic Security Strategy For 2015: Sanjay Rohatgi,Symantec

Sanjay Rohatgi, President–Sales, Symantec India, says the company has a set of holistic solutions in place to secure organizations from security threats. 

Beating the Bad Guys: Sivarama Krishnan, PwC

Organizations will need to turn inwards to establish robust information security strategies.

Building Capabilities for a Digital Tomorrow: Alok Ohrie,Dell

Alok Ohrie, President and Managing Director, Dell India, on the company’s investments to build end-to-end solutions and delivery capabilities for a digital world.

FAST TRACK

Kamtron Systems

Transitioning towards a service-oriented company will boost our growth, believes Kavita Singhal, director, Kamtron Systems.

TIM Infratech

Delivering ‘best of breed’ technologies to enterprises is key to success, says Monish Chhabria, MD, TIM Infratech

Mudra Electronics

A vendor-agnostic strategy helped us sustain business, says Bharat Shetty, CMD, Mudra Electronics.

Systematix Technologies

Our USP is a customer-friendly approach backed by services, says Akhilesh Khandelwal, Director, Systematix Technologies.

CorporateServe Solutions

Our ability to turnaround complex ERP projects in record time is what gets us customer referral, says Vinay Vohra, Founder & CEO, CorporateServe Solutions.

KernelSphere Technologies

We are emerging as an end-to-end systems integrator, says Vinod Kumar, MD, KernelSphere Technologies.

Uniware Systems

We constantly validate emerging technologies for first-mover advantage, says Vergis K.R., CEO, Uniware Systems.

Astek Networking & Solutions

An innovative approach helps us stay successful, says Ashish Agarwal, CEO, Astek Networking & Solutions.

CSM Technologies

Our approach is backed by innovation and simplicity, says Priyadarshi Nanu Pany, CEO, CSM Technologies.

SOCIAL MEDIA @ CW India
SIGNUP FOR OUR NEWSLETTER

Signup for our newsletter and get regular updates.