This should be the holding slide at the beginning of the webinar, please insert presenter’s name and title
Initial Welcome by host.Any instructions on how you wish the audience to participate should be outlined here and shared with the audience at this stage.
Hello everyone, I’m speaker’s name. Thank you for taking the time to join our webinar today. Time is short and I do want to allow for any questions or comments you may have at the end, but I hope you will take some valuable insights from today’s session. On a daily basis at Novell, we talk to CIO’s and senior executives about the IT function, the market, and the current and emerging challenges and opportunities you face. We use this information to help shape our strategy, anticipate needs and develop innovative solutions which are both effective and reliable. But it occurred to us that this information isn’t just useful to us, it could also benefit you, our customers. So today I’m going to give you an overview of how we see the market evolving; how the role of the CIO, along with the IT function itself, is changing; what challenges and opportunities should be on your radar; and how we at Novell can partner you to achieve long term success.
Smart IT is about staying ahead of the curve. It’s not just about focusing on where the ball is now, but about knowing where it is headed.Everyone is talking about BYOD, social media, the cloud, big data etc…but let’s take a step back for a second, and look at the broader picture. The definition of enterprise IT is changing. And with it, so is the function of the CIO. CIO’s are moving to a more strategic role. It’s becoming less about direct control and more about collaboration and influence. Less about managing IT risk and more about mitigating enterprise risk. Less about minimising cost and more about generating revenue. If we take a look at a recent Harvey Nash survey of CIO’s, 62% said that their CEO expects them to prioritise projects that 'make' money over projects that 'save' money, that’s up 24% on the 2012 figure. So the expectations businesses have of their CIO’s are shifting rapidly.But is this expectation realistic? Well if you consider the C-suite, CIO’s are actually in a unique position to capitalise on the potential business benefits which the vast changes in the IT environment have created. They are the only ones who hold a clear vision of both the needs of the organisation and the technological possibilities; they can and must act as a catalyst to reshape their organisation in the new digital age. In effect, the drivers of the CIO agenda are not simply byod, social media, the cloud, big data etc…but rather what these and other developments can deliver of value to the business…i.e. a greater ability to facilitate easy collaboration across global teams, better access to and understanding of business critical knowledge held within the organisation, and all of this in a secure, controlled environment.
So let’s take a look at how this affects the CIO’s agenda.Increasingly the primary focus of the CIO has to be the impact of IT strategy on the bottom line. As I said earlier, CIO’s are now expected to look at ways not just to reduce cost, but to enhance revenue and ultimately drive competitive advantage. If we break it down, there are four main avenues open to you to achieve this: The first is to facilitate collaboration and enable an adaptable workforce. Creating an environment where the best combination of human capital available to your organisation can be assembled quickly into collaborative, virtual teams, regardless of geographic, cultural and organisational boundaries, means that your business can react much faster and more effectively to market demands.The second avenue to revenue enhancement open to the CIO is to foster workforce productivity. It might seem obvious but the more productive your workforce the better your returns. So the objective of the CIO, in terms of workforce productivity, has to be to increase the amount of time workers spend on revenue generating tasks by increasing and simplifying access to the tools and resources they require, wherever and whenever they need them.The third avenue is effective leverage of organizational knowledge. Capitalising on the knowledge base available to the business is about two things. You need to identify what knowledge is available to your organisation and what is its business value, then you must facilitate easy and secure access to that knowledge for your organisation.The final avenue to consider is to mitigate business risk. The CIO’s remit on risk management has extended in recent years beyond IT operational risk to include broader organisational risks; risks in the use and deployment of new technology; and most importantly strategic risk. Leveraging technology to enhance strategic risk taking is an area where CIO’s can bring substantial benefit to an organisation.Let’s now take a closer look at each of these areas and the challenges and opportunities they present.
First Facilitating collaboration and enabling an adaptable workforce.
According to Information Week’s Global CIO Survey 2012, 82% of global CIO’s either have implemented or have planned implementation of technology to improve employee collaborationAs corporations get bigger and more complex in their structure, it becomes increasingly difficult to take full advantage of the collaborative potential of their human resource. Capturing the knowledge and experience of your teams and leveraging it effectively is crucial to gaining competitive advantage. This is where IT strategy can play a crucial role.
So what are the challenges?The first challenge you will face in the introduction of a truly collaborative capability across your organisation will be user adoption. Users expect the same kind of collaborative technologies they experience at home, with the same ease of access and functionality. There can also be a need for a culture shift, employees need to be prepared to adopt new ways of working, to share information and collaborate virtually with people they may not have met in person. The second big challenge in terms of collaboration is security. Sharing and collaborating more widely introduces exposure on many levels. Everything is increasingly digitally captured, recorded and stored making it more vulnerable to loss or theft. On the flip side, there are increasingly strict regulations around data privacy and security which must be adhered to.
With the recently launched Novell Filr we have introduced secure adhoc sharing of enterprise data in a simple, user friendly and cost effective solution. Novell Filr avoids the risks of exposing corporate data to the potential security vulnerabilities of internet and cloud file sharing sites and it allows end users to access their home directories and network folders on any mobile device, as well as synchronize their files to their PC and Mac computers. You stay in control of file access, users are more productive, and security gaps with internet file sharing are plugged.Novell Vibe introduces sophisticated workflow and project management, supporting virtual teams across geographic, cultural and organisational boundaries.Novell Groupwise remains a reliable and secure core engine for email and calendar based standard collaboration and is one of the most cost effective solutions on the market, even when compared to the so called “free” cloud-based solutions.
And you don’t have to take our word for it that Novell collaboration tools offer the combination of features and value for money you need. ManuellaHarrand-Tittse, Information Management Consultant at the Municipality of Rijswijk in the Netherlands told us that they chose Novell Vibe because it has all of the collaborative features they were looking for, at a reasonable price, which is especially important for them as a government organisation.
The next CIO agenda item is fostering productivity. The advent of the mobile workforce has meant that the IT function’s ability to equip the employees to be productive wherever and whenever they need has a direct impact on productivity.
According to a survey of 4000 employees from June of last year, 77% of respondents require access to work documents outside of their office - especially those who work in financial services (89%), professional services (96%) and healthcare (70%).
According to another survey commissioned by Dell earlier this year, nearly three-quarters of organizations deploying user-focused BYOD report improvements in employee productivity, customer response times and work processes. And 3 out of 5 workers say they don't need to be in the office anymore to be productive.
But along with improvements in productivity the move to mobility brings its own set of challenges.That employee survey I mentioned earlier found that over half of employees use unauthorised consumer based file sharing apps at work, which is not good news from a security, data privacy and compliance standpoint. So how do you ensure that only those who should see your data have access to it, whilst at the same time making it easier for those with permission to get their jobs done? The answer is to offer an effective enterprise level solution which offers the security you want and the flexibility your users demand.To supply such a solution there are a number of angles you need to cover. The first is mobilizing enterprise applications. In order to be able to work on the move, users require flexible and secure access to their enterprise applications. Not only can implementation of mobile applications improve productivity and increase efficiencies, but it can also deliver on employee satisfaction and talent retention.The second angle is file synchronization and sharing. Employees need to be able to quickly and easily access and share their files in a secure mobile context.
In a report in February of this year Gartner advised that “organizations must deploy Enterprise File Synchronisation and Sharing services to secure enterprise information assets. Failure to provide these capabilities will subject organizations to information leakage threats caused by users who move data through uncontrolled personal cloud services.”
So now you’ve supplied the applications and the files, you need to ensure that the mobile devices themselves can be supported and securely managed. The model of dictating the mobile device choices of their workforce is quickly losing traction with businesses which have identified that personal choice of device can not only increase productivity for their individual workers, but it can also save the business in terms of capital equipment outlay. Gartner even predicts that by 2017, half of employers will require employees to supply their own device for work purposes, which means CIO’s need to be prepared for that conversation.Another market demand detail which needs to be on your radar is mobile print. According to a study commissioned by Technavio in December 2012, mobile printing is the most requested functionality from the mobile workforce. The final big consideration when it comes to fostering productivity is of course cost. Without a cost effective solution any gains achieved by implementing the strategy will be eroded.
How are we at Novell helping our customers to meet those challenges? Helping your business reap the rewards in productivity, whilst steering clear of the pitfalls, is a core focus for Novell.Novell ZENworks Application Virtualization helps you package and deploy applications quickly and easily, even during migrations.Novell Filr allows end users to securely access their home directories and network folders on any mobile device, as well as synchronize their files to their PC and Mac computers. IT stays in control of file access, users are more productive, and security gaps with internet file sharing are plugged.Novell ZENworks Mobile Management offers you device management that's secure, scalable and flexible enough to effectively support BYOD devices.Novell iPrint is a brand new solution which will be hitting the market this month. It allows you to set up a self-service printing environment where employees can print on demand. It brings “point and click” self-service print capabilities to users and gives you a single print solution to manage for every major platform—including Windows, Mac, Linux and most mobile devices.
But what do our customers have to say? Ben Shirley the ICT Infrastructure Team Leader for North Devon Council in England explains that in their organisation many employees need to be able to make calls and access email from any location. Using Novell ZENworks Mobile Management, they can manage mobile devices easily and enforce the same strict access and usage rules that apply to other council-owned equipment.
Now we’ve looked at helping our teams and our individuals work more effectively. Let’s take a look at how we can effectively leverage organizational knowledge.
There has been a lot of noise around the explosion of big data and the implications for enterprise IT in terms of coping with the sheer variety, velocity and volume of data being thrown at them. 90% of the world’s data was created in the last two years and 80% of this data is unstructured. The IDC predicts that by 2020 we will have hit 40 trillion gigabytes of data.
There is truth to the saying Knowledge is Power. And certainly getting to grips with the knowledge held by your organization is a definite route to competitive advantage. However, the first step in this process must be understanding what data pools you have available to you and being able to prioritise that data in terms of its value. An error repeatedly committed in the rush to exploit big data, is to spend resources on attempting to distill information from all of the data, when in fact only a minority of that information is of strategic use to the business. It is vitally important not to lose sight of the business need, big data management can be a huge drain on resources so trying to control all unstructured data is a mistake. Focus must be on quality data that is of value to the business decisions of the company.The other side of knowledge management, and something we touched on earlier, is the requirement to effectively share and offer access to that knowledge in a secure environment. Governance must be addressed in order to support the business in making good decisions and compliance must equally be addressed to ensure the company is insulated from any substantial risk.
So how can Novell help you leverage the business critical knowledge within your organization?Optimizing your network-stored data starts with knowing exactly what data you have. Novell® File Reporter inventories file systems and delivers detailed storage intelligence so you can optimize and secure your environment for cost savings and compliance.With Novell Storage Manager, you can remove the headache from provisioning and managing storage, significantly lower your storage management costs, and keep users productive and happy.Novell Dynamic File Services allows you to define the file policies you want to enforce and ensure that your most critical files are stored and backed up by your fastest, top-grade systems, while low-level files that don’t need “star treatment” sit on less-expensive equipment. Open Enterprise Server provides all the enterprise networking file and print services today’s organizations rely on and need.
CIO’s are no longer just concerned with IT operation risk, they are now expected to consider much broader organisational risks.
A recent article in the German newspaper Handelsblatt reported 4,644 incidents of Data security breaches already in 2011.As a result, Banks are including comprehensive technology- and information security risk assessments as a key criteria when determining the financial standing and credit rating of businesses
But what are the challenges CIO’s need to focus on?It’s essential to deliver a dynamically personalized working environment. Users should have easy access to those applications and files which they need and are authorized to use. But this needs to be secure and should be based upon user identity, profile and location.In terms of compliance it is vital to protect your company against security breaches by securing the data on all of your devices along with of course ensuring access to complete compliance reports at any time.
Paul Pedron, Senior System Specialist with the City of Fresno explains that “With more than 2.800 devices throughout the city, meeting all security- and compliance standards is a big challenge. With Novell ZENworks 11 we can realize all facets of secure endpoint mainagement, incl. Asset-, Configuration- and Patch Management and sometimes even Full Disk Encryption with one integrated set of tools.“
At Novell we take the security of your data seriously.Our suite of Zenworkssolutions allows you to protect and empower your workforce. Use Novell ZENworks Configuration Management to make sure users always have access to the resources they need regardless of where they work or what devices they useWith ZENworks Mobile Management you have mobile device management that's secure,scalable, and covers BYOD devices.ZENworks Endpoint Security Management offers Secure, identity-based protection for your endpoints.With ZENworks Full Disk Encryption you can protect the data on laptops and desktops at the push of a button.ZENworks Asset Management offers you a clear, accurate picture of all your hardware and software.And of course ZENworksPatch Management gives you the possibility of implementing a policy based approach to apply the right patches to the right system or device instantly.
At Novell we understand that successful IT strategy means striking the right balance between productivity and security. In developing all of our solutions we first consider the business priorities and budget realities of our customers. Our objective is to see our customers succeed and that means taking the time to understand the challenges and opportunities you face so that we can create the innovative, reliable and cost effective solutions you demand.
I would like to thank you for your time. I hope you have found our webinar productive and I welcome any questions.
Transcript of "Novell Strategy Update June 2013"
Find out what your peers
are talking about.
Insert Presenter’s Name (16pt)
Insert Presenter’s Title (14pt)