Once upon a time, the boundaries of IT management were fairly straightforward. All your customers were inside the company and exchanging digital information with the outside world was highly controlled, if it happened at all. Not only that, but you sat down and figured out the business needs and then bought or developed the appropriate software which you then ran in-house. The users were obliged to take what they were given. Not quite easy-peasy, but close.
Nowadays, users have their own views. They want to collaborate electronically with each other and with the outside worlds of business partners, suppliers and customers. They want to hold webinars, share screens, instant message each other, maybe even work on wikis together and comment on each others’ blogs. You have to decide whether to allow these things to happen formally or informally. If formal, at least you have some control over what holes you allow in the firewall. If informal, you’ve probably given them web access and told them to behave themselves. Although the social media brigade will say, “Trust everyone,” only you will know if that’s going to work in your organisation.
If you do try to restrict what users can do, you’ll be surprised at how inventively they’ll sidestep your controls. Research suggests that if they can, they will. You are driven by the need to keep the enterprise system secure. They are driven, usually, by achieving results in the most effective way. These two drivers are not usually compatible.
Knowing that ’collaboration without travel’ is at the heart of their needs, you start looking around at what’s available. Broadly speaking, the bottom line is a choice between an externally hosted service and one you look after yourself. The externally hosted approach is a bit nerve-wracking because all your company’s digital collaborations will be stored on someone else’s servers. What if something goes wrong? The service provider could fold or you could simply fall out with it. Can you get all your records back? Will they be in a usable form? This is the stuff nightmares are made of. Some very major vendors are beginning to offer such hosted services. Perhaps you’d feel more comfortable entrusting your data to an IBM, a Citrix Online or a Microsoft, for example.
But the alternative, hosting it all yourself, brings its own problems. Scaling is one, but that’s probably fairly easy to address. What about your own users, who are now merrily collaborating with each other, being able to collaborate with external partners of various kinds? Your lock down could end up as a lock-out. And, in these days of close collaboration between organisations, this could be greatly to your detriment.
If partners, suppliers or customers are running different collaboration systems to you (as many will), be wary of the glib salesperson who assures you that interoperability is a piece of cake. Ask to talk to real users with similar needs to your own. Find out if your licence terms allow you to extend membership of your collaboration systems beyond the firewall. Ask a few of your business partners if they would be happy to work in this way. After all, they may be just as nervous about engaging beyond their own firewall.
It’s so easy to find private systems that satisfy internal collaboration and security needs. The danger lies in forgetting that, over time, the constituency you serve is increasingly likely to involve ever larger numbers of outsiders.
Through our research and insights, we help bridge the gap between technology buyers and sellers.
Have You Read This?
Generative AI Checkpoint
From Barcode Scanning to Smart Data Capture
Beyond the Barcode: Smart Data Capture
The Evolving Role of Converged Infrastructure in Modern IT
Evaluating the Potential of Hyper-Converged Storage
Kubernetes as an enterprise multi-cloud enabler
A CX perspective on the Contact Centre
Automation of SAP Master Data Management