SlideShare a Scribd company logo
1 of 1
Download to read offline
ARISEOFCITIZENAPPLICATIONDEVELOPERSPOSES
DATA, SECURITY AND INTEGRATION CHALLENGES
IT Leaders Reveal Concerns About Citizen Developers*
3 out of 4 IT Decision Makers Believe an Enterprise Low-Code Platform
is the Solution to Mitigate Risks
Agree it’s Necessary to Ensure
SECURE & SCALABLE
CITIZEN DEVELOPMENT
82%
73% 69% 58%
REPORT THEIR COMPANY
HAS EXPERIENCED
INTEGRATION ISSUES
DUE TO CITIZEN
DEVELOPED APPS
REPORT DATA
COMPROMISED SECURITY
DUE TO CITIZEN
DEVELOPERS
BELIEVE THAT CITIZEN
DEVELOPERS RISK
USING WRONG DATA
IN APPS
Required New
Platforms or Roles
TECHNOLOGY
Required from
the IT Dept
OVERSIGHT
Required Between
Biz Units and IT Dept
COLLABORATION
46% 45%
43%
MORE THAN 70% OF IT DECISION MAKERS ARE CONFIDENT WITH A LOW-CODE PLATFORM
Ensures Right Data in
Citizen-Developed Apps
77% Alleviates the Burden
on IT Departments
75% Manages Citizen
Developers
71%
Low-Code Platforms Power Citizen Developers to Realize Full Potential
Agree that Low-Code
Increases Productivity
Agree that Low-Code
Saves Money
79% 79%
* Employees outside of IT departments that create business applications for consumption by others.
Survey Methodology: A online omnibus survey was fielded among 508 Information Technology
DecisionMakers(ITDMs)inNovember2016tounderstandtheirpainpointsaboutcitizendevelopment
(e.g., data security, integration, scalability) and the need for a new technology platform to manage
citizen developers (i.e., a citizen integrator). ITDMs were identified as those working full-time, with sole
or a major influence on IT decision-making at a company with 20+ employees, as well as a balance of
companies with less than 250 employees and companies with more than 250. The omnibus survey was
fielded by YouGov.

More Related Content

What's hot

Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAMPing Identity
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Non-profit Tech Needs in Montenegro
Non-profit Tech Needs in MontenegroNon-profit Tech Needs in Montenegro
Non-profit Tech Needs in MontenegroCatalyst Balkans
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreVeracode
 
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...itnewsafrica
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Veracode
 
Nonprofit Tech Needs - Western Balkans
Nonprofit Tech Needs - Western BalkansNonprofit Tech Needs - Western Balkans
Nonprofit Tech Needs - Western BalkansCatalyst Balkans
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA
 
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...itnewsafrica
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?VMware
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsIBM Security
 
Retail Industry Application Security Survey Insights
Retail Industry Application Security Survey InsightsRetail Industry Application Security Survey Insights
Retail Industry Application Security Survey InsightsVeracode
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceBlueboxer2014
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationIBM Security
 
The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) Lori MacVittie
 

What's hot (20)

Digital Transformation and the Role of IAM
Digital Transformation and the Role of IAMDigital Transformation and the Role of IAM
Digital Transformation and the Role of IAM
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Non-profit Tech Needs in Montenegro
Non-profit Tech Needs in MontenegroNon-profit Tech Needs in Montenegro
Non-profit Tech Needs in Montenegro
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t Ignore
 
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
Nonprofit Tech Needs - Western Balkans
Nonprofit Tech Needs - Western BalkansNonprofit Tech Needs - Western Balkans
Nonprofit Tech Needs - Western Balkans
 
CompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security TrendsCompTIA 11th Annual Information Security Trends
CompTIA 11th Annual Information Security Trends
 
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?BYOD: Can Government Agencies Keep Up?
BYOD: Can Government Agencies Keep Up?
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
Retail Industry Application Security Survey Insights
Retail Industry Application Security Survey InsightsRetail Industry Application Security Survey Insights
Retail Industry Application Security Survey Insights
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
Tachyon_Flyer
Tachyon_FlyerTachyon_Flyer
Tachyon_Flyer
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change)
 

Similar to A Rise of Citizen Application Developers

Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
Cloud Native Development
Cloud Native DevelopmentCloud Native Development
Cloud Native DevelopmentLCDF
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index Insight
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...SolarWinds
 
F5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdfF5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdfZeppos Galanos, MSc.
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodesciccone
 
Cloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutCloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutLuong Trung Thanh
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET Journal
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey ResultsTony Fish
 
CompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present DangerPing Identity
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report Bricata, Inc.
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyJennifer Walker
 

Similar to A Rise of Citizen Application Developers (20)

Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Cloud Native Development
Cloud Native DevelopmentCloud Native Development
Cloud Native Development
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017CompTIA IT Skills Gap 2017
CompTIA IT Skills Gap 2017
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
F5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdfF5 State of App Strategy Report 2023.pdf
F5 State of App Strategy Report 2023.pdf
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Cloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned AboutCloud Security - What you Should Be Concerned About
Cloud Security - What you Should Be Concerned About
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey Results
 
CompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in Review
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 
CompTIA International Trends in Cybersecurity
CompTIA International Trends in CybersecurityCompTIA International Trends in Cybersecurity
CompTIA International Trends in Cybersecurity
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility Survey
 

More from Appian

How to Transform Contact Centers into Profit Centers
How to Transform Contact Centers into Profit CentersHow to Transform Contact Centers into Profit Centers
How to Transform Contact Centers into Profit CentersAppian
 
Blockchain 101 for Financial Services
Blockchain 101 for Financial ServicesBlockchain 101 for Financial Services
Blockchain 101 for Financial ServicesAppian
 
Digital Transformation for Turnaround Processes
Digital Transformation for Turnaround ProcessesDigital Transformation for Turnaround Processes
Digital Transformation for Turnaround ProcessesAppian
 
The Next Generation of Contact Centers
The Next Generation of Contact CentersThe Next Generation of Contact Centers
The Next Generation of Contact CentersAppian
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkAppian
 
Modernize Your Acquisition Platform Through Digital Transformation
Modernize Your Acquisition Platform Through Digital TransformationModernize Your Acquisition Platform Through Digital Transformation
Modernize Your Acquisition Platform Through Digital TransformationAppian
 
How Manufacturers Can Drive Efficiency With Interconnected Processes
How Manufacturers Can Drive Efficiency With Interconnected ProcessesHow Manufacturers Can Drive Efficiency With Interconnected Processes
How Manufacturers Can Drive Efficiency With Interconnected ProcessesAppian
 
The Key to Successful Digital Transformation in Life Sciences
The Key to Successful Digital Transformation in Life SciencesThe Key to Successful Digital Transformation in Life Sciences
The Key to Successful Digital Transformation in Life SciencesAppian
 
Why Contact Center Operators Need to Take Advantage of Intelligent Automation
Why Contact Center Operators Need to Take Advantage of Intelligent AutomationWhy Contact Center Operators Need to Take Advantage of Intelligent Automation
Why Contact Center Operators Need to Take Advantage of Intelligent AutomationAppian
 
How Digital Will Impact the Federal Government this Year
How Digital Will Impact the Federal Government this YearHow Digital Will Impact the Federal Government this Year
How Digital Will Impact the Federal Government this YearAppian
 
The Top 5 Trends in Customer Centers
The Top 5 Trends in Customer CentersThe Top 5 Trends in Customer Centers
The Top 5 Trends in Customer CentersAppian
 
5 Questions Financial Institutions Should Ask About GDPR Readiness
5 Questions Financial Institutions Should Ask About GDPR Readiness5 Questions Financial Institutions Should Ask About GDPR Readiness
5 Questions Financial Institutions Should Ask About GDPR ReadinessAppian
 
Six Myths of Digital Transformation Debunked
Six Myths of Digital Transformation DebunkedSix Myths of Digital Transformation Debunked
Six Myths of Digital Transformation DebunkedAppian
 
COTS vs aPaaS: When 80% isn’t Good Enough
COTS vs aPaaS: When 80% isn’t Good EnoughCOTS vs aPaaS: When 80% isn’t Good Enough
COTS vs aPaaS: When 80% isn’t Good EnoughAppian
 
How to Simplify and Streamline Process Improvement with BPM
How to Simplify and Streamline Process Improvement with BPMHow to Simplify and Streamline Process Improvement with BPM
How to Simplify and Streamline Process Improvement with BPMAppian
 
Keeping the Banking Customer at the Center of the Transformation Journey
Keeping the Banking Customer at the Center of the Transformation JourneyKeeping the Banking Customer at the Center of the Transformation Journey
Keeping the Banking Customer at the Center of the Transformation JourneyAppian
 
Process Excellence Essential as Business Face Unrelenting Technological Change
Process Excellence Essential as Business Face Unrelenting Technological ChangeProcess Excellence Essential as Business Face Unrelenting Technological Change
Process Excellence Essential as Business Face Unrelenting Technological ChangeAppian
 
How Manufacturers Can Transform Around Digital
How Manufacturers Can Transform Around DigitalHow Manufacturers Can Transform Around Digital
How Manufacturers Can Transform Around DigitalAppian
 
Digital Transformation in Retail - How Brands are Preparing for the Holidays
Digital Transformation in Retail - How Brands are Preparing for the HolidaysDigital Transformation in Retail - How Brands are Preparing for the Holidays
Digital Transformation in Retail - How Brands are Preparing for the HolidaysAppian
 
Future Trends in Federal Grants Management
Future Trends in Federal Grants ManagementFuture Trends in Federal Grants Management
Future Trends in Federal Grants ManagementAppian
 

More from Appian (20)

How to Transform Contact Centers into Profit Centers
How to Transform Contact Centers into Profit CentersHow to Transform Contact Centers into Profit Centers
How to Transform Contact Centers into Profit Centers
 
Blockchain 101 for Financial Services
Blockchain 101 for Financial ServicesBlockchain 101 for Financial Services
Blockchain 101 for Financial Services
 
Digital Transformation for Turnaround Processes
Digital Transformation for Turnaround ProcessesDigital Transformation for Turnaround Processes
Digital Transformation for Turnaround Processes
 
The Next Generation of Contact Centers
The Next Generation of Contact CentersThe Next Generation of Contact Centers
The Next Generation of Contact Centers
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
Modernize Your Acquisition Platform Through Digital Transformation
Modernize Your Acquisition Platform Through Digital TransformationModernize Your Acquisition Platform Through Digital Transformation
Modernize Your Acquisition Platform Through Digital Transformation
 
How Manufacturers Can Drive Efficiency With Interconnected Processes
How Manufacturers Can Drive Efficiency With Interconnected ProcessesHow Manufacturers Can Drive Efficiency With Interconnected Processes
How Manufacturers Can Drive Efficiency With Interconnected Processes
 
The Key to Successful Digital Transformation in Life Sciences
The Key to Successful Digital Transformation in Life SciencesThe Key to Successful Digital Transformation in Life Sciences
The Key to Successful Digital Transformation in Life Sciences
 
Why Contact Center Operators Need to Take Advantage of Intelligent Automation
Why Contact Center Operators Need to Take Advantage of Intelligent AutomationWhy Contact Center Operators Need to Take Advantage of Intelligent Automation
Why Contact Center Operators Need to Take Advantage of Intelligent Automation
 
How Digital Will Impact the Federal Government this Year
How Digital Will Impact the Federal Government this YearHow Digital Will Impact the Federal Government this Year
How Digital Will Impact the Federal Government this Year
 
The Top 5 Trends in Customer Centers
The Top 5 Trends in Customer CentersThe Top 5 Trends in Customer Centers
The Top 5 Trends in Customer Centers
 
5 Questions Financial Institutions Should Ask About GDPR Readiness
5 Questions Financial Institutions Should Ask About GDPR Readiness5 Questions Financial Institutions Should Ask About GDPR Readiness
5 Questions Financial Institutions Should Ask About GDPR Readiness
 
Six Myths of Digital Transformation Debunked
Six Myths of Digital Transformation DebunkedSix Myths of Digital Transformation Debunked
Six Myths of Digital Transformation Debunked
 
COTS vs aPaaS: When 80% isn’t Good Enough
COTS vs aPaaS: When 80% isn’t Good EnoughCOTS vs aPaaS: When 80% isn’t Good Enough
COTS vs aPaaS: When 80% isn’t Good Enough
 
How to Simplify and Streamline Process Improvement with BPM
How to Simplify and Streamline Process Improvement with BPMHow to Simplify and Streamline Process Improvement with BPM
How to Simplify and Streamline Process Improvement with BPM
 
Keeping the Banking Customer at the Center of the Transformation Journey
Keeping the Banking Customer at the Center of the Transformation JourneyKeeping the Banking Customer at the Center of the Transformation Journey
Keeping the Banking Customer at the Center of the Transformation Journey
 
Process Excellence Essential as Business Face Unrelenting Technological Change
Process Excellence Essential as Business Face Unrelenting Technological ChangeProcess Excellence Essential as Business Face Unrelenting Technological Change
Process Excellence Essential as Business Face Unrelenting Technological Change
 
How Manufacturers Can Transform Around Digital
How Manufacturers Can Transform Around DigitalHow Manufacturers Can Transform Around Digital
How Manufacturers Can Transform Around Digital
 
Digital Transformation in Retail - How Brands are Preparing for the Holidays
Digital Transformation in Retail - How Brands are Preparing for the HolidaysDigital Transformation in Retail - How Brands are Preparing for the Holidays
Digital Transformation in Retail - How Brands are Preparing for the Holidays
 
Future Trends in Federal Grants Management
Future Trends in Federal Grants ManagementFuture Trends in Federal Grants Management
Future Trends in Federal Grants Management
 

Recently uploaded

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 

Recently uploaded (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 

A Rise of Citizen Application Developers

  • 1. ARISEOFCITIZENAPPLICATIONDEVELOPERSPOSES DATA, SECURITY AND INTEGRATION CHALLENGES IT Leaders Reveal Concerns About Citizen Developers* 3 out of 4 IT Decision Makers Believe an Enterprise Low-Code Platform is the Solution to Mitigate Risks Agree it’s Necessary to Ensure SECURE & SCALABLE CITIZEN DEVELOPMENT 82% 73% 69% 58% REPORT THEIR COMPANY HAS EXPERIENCED INTEGRATION ISSUES DUE TO CITIZEN DEVELOPED APPS REPORT DATA COMPROMISED SECURITY DUE TO CITIZEN DEVELOPERS BELIEVE THAT CITIZEN DEVELOPERS RISK USING WRONG DATA IN APPS Required New Platforms or Roles TECHNOLOGY Required from the IT Dept OVERSIGHT Required Between Biz Units and IT Dept COLLABORATION 46% 45% 43% MORE THAN 70% OF IT DECISION MAKERS ARE CONFIDENT WITH A LOW-CODE PLATFORM Ensures Right Data in Citizen-Developed Apps 77% Alleviates the Burden on IT Departments 75% Manages Citizen Developers 71% Low-Code Platforms Power Citizen Developers to Realize Full Potential Agree that Low-Code Increases Productivity Agree that Low-Code Saves Money 79% 79% * Employees outside of IT departments that create business applications for consumption by others. Survey Methodology: A online omnibus survey was fielded among 508 Information Technology DecisionMakers(ITDMs)inNovember2016tounderstandtheirpainpointsaboutcitizendevelopment (e.g., data security, integration, scalability) and the need for a new technology platform to manage citizen developers (i.e., a citizen integrator). ITDMs were identified as those working full-time, with sole or a major influence on IT decision-making at a company with 20+ employees, as well as a balance of companies with less than 250 employees and companies with more than 250. The omnibus survey was fielded by YouGov.