Instant Messaging Tough Enough for Business

2,564 views

Published on

Slide deck on the subject of Enterprise Instant Messaging provided by Michael Osterman and commented extensively over here: http://blogs.ittoolbox.com/km/elsua/archives/instant-messaging-as-a-powerful-vehicle-for-instant-communications-with-the-enterprise-13106

Published in: Business, Technology
0 Comments
6 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,564
On SlideShare
0
From Embeds
0
Number of Embeds
64
Actions
Shares
0
Downloads
0
Comments
0
Likes
6
Embeds 0
No embeds

No notes for slide

Instant Messaging Tough Enough for Business

  1. 1. Poll #1 - What is your current position on Instant Messaging in your organization? <ul><li>We allow each user to choose the Consumer IM client of their choice. </li></ul><ul><li>We have standardized on one Consumer IM client. </li></ul><ul><li>We are investigating standardizing on an Enterprise IM solution in order to gain control. </li></ul><ul><li>We have standardized on an Enterprise IM platform. </li></ul><ul><li>We currently block all IM usage. </li></ul>
  2. 2. Instant Messaging Tough Enough for Business: No Server Required Michael D. Osterman Osterman Research, Inc. September 26, 2006
  3. 3. About Osterman Research, Inc. <ul><li>A market research and consulting firm focused on the messaging industry </li></ul><ul><li>Practice areas include email, instant messaging, presence, collaboration, security, archiving, voice-over-IP, outsourcing and related markets and technologies </li></ul><ul><li>Clients include vendors and end-user organizations </li></ul><ul><li>Based near Seattle </li></ul>
  4. 4. IM Use is Growing Rapidly
  5. 5. The Current State of IM in the Workplace <ul><li>Most IM use consists of consumer-grade clients </li></ul><ul><li>AIM, MSN Messenger and Yahoo! Messenger are the ‘Big Three’ in the consumer IM space </li></ul><ul><li>AIM, MSN Messenger and Yahoo! Messenger are also the ‘Big Three’ in the workplace </li></ul>
  6. 6. Consumer IM Still Dominates
  7. 7. Why Use IM? <ul><li>There are a variety of business benefits associated with IM: </li></ul><ul><ul><li>More efficient communications </li></ul></ul><ul><ul><li>Faster decision making </li></ul></ul><ul><ul><li>Better and faster responses to customer inquiries </li></ul></ul><ul><ul><li>Acceleration of information flows </li></ul></ul><ul><ul><li>Presence is key </li></ul></ul>
  8. 8. Poll #2 - What is your largest concern with allowing IM into your organization? <ul><li>Loss of productivity due to personal usage. </li></ul><ul><li>Lack of security of information and intellectual property loss. </li></ul><ul><li>Lack of protection against viruses, worms and SpIM </li></ul><ul><li>Compliance concerns over logging and auditing IM conversations. </li></ul><ul><li>All of the above are concerns. </li></ul>
  9. 9. The Problems with IM <ul><li>Most IM started with individuals, not IT </li></ul><ul><li>This can lead to a variety of problems: </li></ul><ul><ul><li>Lack of encryption and local routing can lead to serious data security issues </li></ul></ul><ul><ul><li>Worms and related threats </li></ul></ul><ul><ul><li>Lack of namespace control </li></ul></ul><ul><ul><li>No auditing or logging of IM conversations </li></ul></ul><ul><ul><li>Loss of intellectual property </li></ul></ul><ul><ul><li>Lack of corporate governance </li></ul></ul>
  10. 10. What Are Your Options? <ul><li>IM is used in your organization whether you know it or not </li></ul><ul><li>So, what are your options? </li></ul><ul><ul><li>Block it </li></ul></ul><ul><ul><li>Establish a policy against the use of IM </li></ul></ul><ul><ul><li>Manage it </li></ul></ul>
  11. 11. What You Should Do <ul><li>If you’re going to allow the use of IM (which you should), you will need to do five things: </li></ul><ul><ul><li>Establish an IM system that will allow your employees to securely communicate internally AND externally </li></ul></ul><ul><ul><li>IT is busy enough already: implement a system that is easy to manage </li></ul></ul><ul><ul><li>Deploy a capability that can be compliant with internal and external policies </li></ul></ul><ul><ul><li>Manage threats extremely well </li></ul></ul><ul><ul><li>Minimize user disruption to the greatest possible extent </li></ul></ul>
  12. 12. Key Elements of an IM Solution <ul><li>The solution should minimize IT’s involvement in evaluating, deploying and managing an IM system </li></ul><ul><li>It should be inexpensive to deploy and operate </li></ul><ul><li>It should be extremely reliable </li></ul><ul><li>It should be scalable </li></ul>
  13. 13. For More Information <ul><li>Osterman Research, Inc. </li></ul><ul><li>Tel: +1 253 630 5839 </li></ul><ul><li>Fax: +1 866 842 3274 </li></ul><ul><li>[email_address] </li></ul><ul><li>www.ostermanresearch.com </li></ul>

×