Skip to content

Posts from the ‘Enterprise software’ Category

Gartner Predicts Public Cloud Services Market Will Reach $397.4B by 2022

Gartner Predicts Public Cloud Services Market Will Reach $397.4B by 2022
  • Worldwide end-user spending on public cloud services is forecast to grow 23.1% in 2021 to total $332.3 billion, up from $270 billion in 2020.
  • Garter predicts worldwide end-user spending on public cloud services will jump from $242.6B in 2019 to $692.1B in 2025, attaining a 16.1% Compound Annual Growth Rate (CAGR).
  • Spending on SaaS cloud services is predicted to reach $122.6B this year, growing to $145.3B next year, attaining 19.3% growth between 2021 and 2022.  

These and many other insights are from Gartner Forecasts Worldwide Public Cloud End-User Spending to Grow 23% in 2021.  The pandemic created the immediate need for virtual workforces and cloud resources to support them at scale, accelerating public cloud adoption in 2020 with momentum continuing this year. Containerization, virtualization, and edge computing have quickly become more mainstream and are driving additional cloud spending. Gartner notes that CIOs face continued pressures to scale infrastructure that supports moving complex workloads to the cloud and the demands of a hybrid workforce.

Key insights from Gartner’s latest forecast of public cloud end-user spending include the following:

  • 36% of all public cloud services revenue is from SaaS applications and services this year, projected to reach $122.6B with CRM being the dominant application category. Customer Experience and Relationship Management (CRM) is the largest SaaS segment, growing from $44.7B in 2019 to $99.7B in 2025, attaining a 12.14% CAGR. SaaS-based Enterprise Resource Planning (ERP) systems are the second most popular type of SaaS application, generating $15.7B in revenue in 2019. Gartner predicts SaaS-based ERP sales will reach $35.8B in 2025, attaining a CAGR of 12.42%.
  • Desktop as a Service (DaaS) is predicted to grow 67% in 2021, followed by Infrastructure-as-a-Service (IaaS) with a 38.5% jump in revenue. Platform-as-a-Service (PaaS) is the third-fastest growing area of public cloud services, projected to see a 28.3% jump in revenue this year. SaaS, the largest segment of public cloud spending at 36.9% this year, is forecast to grow 19.3% this year. The following graphic compares the growth rates of public cloud services between 2020 and 2021.  
  • In 2021, SaaS end-user spending will grow by $19.8B, creating a $122.6B market this year. IaaS end-user spending will increase by $22.7B, the largest revenue gain by a cloud service in 2021. PaaS will follow, with end-user spending increasing $13.1B this year. CIOs and the IT teams they lead are investing in public cloud infrastructure to better scale operations and support virtual teams. CIOs from financial services and manufacturing firms I’ve recently spoken with are accelerating cloud spending for three reasons. First, create a more virtual organization that can scale; second, extend the legacy systems’ data value by integrating their databases with new SaaS apps; and third, an urgent need to improve cloud cybersecurity.

Conclusion

CIOs and the organizations they serve are prioritizing cloud infrastructure investment to better support virtual workforces, supply chains, partners, and service partners. The CIOs I’ve spoken with also focus on getting the most value out of legacy systems by integrating them with cloud infrastructure and apps. As a result, cloud infrastructure investment starting with IaaS is projected to see end-user spending increase from $82B this year to $223B in 2025, growing 38.5% this year alone. End-user spending on Database Management Systems is projected to lead all categories of PaaS through 2025, increasing from $31.2B this year to $84.8B in 2025. The following graphic compares cloud services forecasts and growth rates:

Which ERP Systems Are Most Popular With Their Users In 2021?

Which ERP Systems Are Most Popular With Their Users In 2021?
  • Sage Intacct, Oracle ERP Cloud, and Microsoft Dynamics 365 ERP are the three highest-rated ERP systems by their users.
  • 86% of Unit4 ERP users say their CRM system is the best of all vendors in the study. The survey-wide satisfaction rating for CRM is 73%, accentuating Unit4 ERP’s leadership in this area.
  • 85% of Ramco ERP Suite users say their ERP systems’ analytics and reporting is the best of all 22 vendors evaluated.

These and many other insights are from SoftwareReview’s latest customer rankings published recently in their Enterprise Data Quadrant Report, Enterprise Resource Planning, April 2021. The report is based entirely on attitudinal data captured from verified owners of each ERP system reviewed. 1,179 customer reviews were completed, evaluating 22 vendors. SoftwareReviews is a division of the world-class IT research and consulting firm Info-Tech Research Group. Their business model is based on providing research to enterprise buyers on subscription, alleviating the need to be dependent on vendor revenue, which helps them stay impartial in their many customer satisfaction studies. Key insights from the study include the following:

  • Sage Intacct, Oracle ERP Cloud, Microsoft Dynamics 365 ERP, Acumatica Cloud ERP, Unit4 ERP and FinancialForce ERP are most popular with their users.  SoftwareReview found that these six ERP systems have the highest Net Emotional Footprint scores across all ERP vendors included in the study. The Net Emotional Footprint measures high-level user sentiment. It aggregates emotional response ratings across 25 questions, creating an indicator of overall user feeling toward the vendor and product. The following quadrant charts the results of the survey:
  • 80% of Acumatica Cloud ERP users say their system helps create more business value, leading all vendors on this attribute. How effective an ERP system is at adapting to support new business and revenue models while providing greater cost visibility is the essence of how they deliver business value. The category average for this attribute is 75%. Of the 22 vendors profiled, 12 have scores at the average level or above, indicating many ERP vendors are focusing on these areas to improve the business case of adopting their systems.
Which ERP Systems Are Most Popular With Their Users In 2021?
  • 86% of Sage Intacct ERP users say their system excels at ease of implementation, leading all vendors in the comparison by a wide margin. Implementing a new ERP system can be a costly and time-consuming process as it involves extensive training, change management, and integration. Ease of Implementation received a category score of 75% across the 22 vendors, indicating ERP vendors are doubling down investments to improve this area. Just 11 of the 22 ERP vendors scored above the category average.
Which ERP Systems Are Most Popular With Their Users In 2021?

How The Pandemic Is Accelerating Endpoint Security’s Growth

  • 76% of enterprises increased their use of endpoint devices since the beginning of the COVID-19 pandemic, supporting their remote, work-from-home (WFH) and hybrid workforces globally.
  • 66% of enterprises believe securing their networks and infrastructure requires a more focused, proactive approach to endpoint resilience that doesn’t leave endpoint security to chance.
  • Cybersecurity leader’s top challenges today are maintaining compliance, enforcing security standards, and understanding the health of security controls on each endpoint.  
  • Just 38% of IT leaders can track the ROI of their cybersecurity investments, accentuating the need for more resilient, persistent endpoints that provide greater visibility and control.

These and many other fascinating insights are from Forrester Consulting’s latest study on endpoint security, Take Proactive Approach To Endpoint Security, completed in collaboration with Absolute Software. The study is noteworthy for its impartial, accurate view of the current state of endpoint security and the challenges IT teams face in creating greater endpoint resilience. The study’s methodology is based on 157 interviews with IT and security professionals located in the U.S. and Canada who are decision-makers in endpoint protection, with interviews completed in November and December 2020. 

Key insights from the study include the following:

  • Security leaders are reprioritizing endpoint automation efforts with a strong focus on sensitive or at-risk data. In 2021 automation efforts will focus on sensitive or at-risk data (60%), geolocation (52%), security control health (48%), web-based application usage (36%), patch management (35%), and hardware inventory (32%).  Each of these technologies is integral to supporting remote workers. There’s also a significant shift from how automation strategies were prioritized before the pandemic, as the graphic from the study below illustrates:
  • Maintaining compliance, enforcing security standards, understanding security controls’ health, and measuring security investments are the top challenges to managing endpoint security today. The majority of enterprises, 59%, cannot maintain or prove compliance of endpoints at any given time. Lack of compliance drags down the efficiency of endpoint security efforts, making an entire network more vulnerable. Just over half of enterprises can’t enforce security standards across endpoints or don’t know today’s health.  The most surprising finding of the study: 62% of enterprises cannot measure the ROI of their security investments – with half (31%) – strongly disagreeing with how measurable security ROI spend is.   
  • Enterprises see four key areas where endpoint management could improve today. Forrester asked enterprise IT and security leaders which capabilities need to be added to endpoint management systems to make them more effective. The executives first focused on securing sensitive and at-risk data, a sure sign enterprises are moving to a more data-centric cybersecurity model in the future. That’s good news as cyber attackers want to penetrate software supply chains and take control of systems managing data assets. Managing devices remotely at scale is second, which is also a frequent challenge IT and security teams encounter when attempting to patch endpoints. Having an unbreakable digital tether to devices is solving the scale issue while also providing greater endpoint resiliency, visibility, and control.

Conclusion

The pandemic forced every business to become more innovative in supporting work-from-home and hybrid work environments, improving endpoint security an immediate priority. What’s needed is an unbreakable digital tether to all devices, capable of delivering complete visibility and control, enabling real-time insights into the state of those devices, and allowing them to repair security controls and productivity tools autonomously. Of the many solutions available for securing endpoints today, the ones that take a firmware-embedded approach to secure endpoints are proving the most reliable. The more integrated an endpoint is to firmware, the more likely self-healing agents will be reliable while also providing complete visibility across every device on or off the network. Absolute’s firmware-embedded approach is noteworthy in its track record of securing endpoints during the pandemic.  

What Enterprises Need To Plan For In 2021 When It Comes To Endpoint Security

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security

Bottom Line: Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021– which includes closely managing every stage of the device lifecycle, from deployment to decommission, and ensuring all sensitive data remains protected.

There’s a looming paradox facing nearly every organization today of how they’ll secure thousands of remote endpoints without having physical access to devices, and without disrupting worker productivity. Whether there’s the need to retire hardware as part of down-sizing or cost-cutting measures, or the need to equip virtual teams with newer equipment more suitable for long term work-from-home scenarios, this is one of the most pressing issues facing CISOs and CIOs today.

Wanting to learn more about how their customers are tackling their endpoint security challenges and how their companies are helping to solve it, I sat down (virtually) with Absolute Software’s President and CEO Christy Wyatt and Matthew Zielinski, President of North America Intelligent Devices Group at Lenovo. The following is my interview with both of them:

Louis Columbus: Christy and Matt, thanks so much for your time today. To get started, I would like each of you to share what you’re hearing from your customers regarding their plans to refresh laptops and other endpoint devices in 2021.

Christy Wyatt: We’re seeing a strong desire from organizations to ensure that every individual is digitally enabled, and has access to a screen. In some cases, that means refreshing the hardware they already have in the field, and in other cases, that means buying or adding devices. From the endpoint security standpoint, there’s been a shift in focus around which tools matter the most. When laptops were primarily being used on campus, there was a certain set of solutions to monitor those devices and ensure they remained secure. Now that 90% of devices are out of the building, an entirely different set of capabilities is required – and delivering those has been our focus.

Matt Zielinski: We are seeing historic levels of demand from consumers, as many are transitioning from having maybe one or two devices per household to at least one device per person. We’re also seeing the same levels of demand on both the education and enterprise side. The new dynamic of work-from-anywhere, learn-from-anywhere, collaborate-from-anywhere underscores that the device hardware and software need to be current in order to support both the productivity and security needs of hugely distributed workforces. That’s our highest priority.

Louis:  Where are CISOs in their understanding, evaluation, and adoption of endpoint security technologies?

Christy: The journey has been different for the education market than for the enterprise market. Most enterprise organizations were already on the digital path, with some percentage of their population already working remotely. And because of this, they typically have a more complex security stack to manage; our data shows that the total number of unique applications and versions installed on enterprise devices is nearly 1.5 million. What they’ve seen is a trifecta of vulnerabilities: employees taking data home with them, accessing it on unsecured connections, and not being aware of how their devices are protected beyond the WiFi connection and the network traffic.

In the education space, the challenges – and the amount of complexity – are completely different; they’re managing just a small fraction of that total number of apps and versions. That said, as the pandemic unfolded, education was hit harder because they were not yet at a point where every individual was digitally connected. There was a lot of reliance on being on campus, or being in a classroom. So, schools had to tackle digital and mobile transformation at the same time – and to their credit, they made multiple years of progress in a matter of weeks or months. This rapid rate of change will have a profound effect on how schools approach technology deployments going forward.

Matt: Whether in enterprise or education, our customers are looking to protect three things: their assets, their data, and their users’ productivity. It’s a daunting mission. But, the simplest way to accomplish it is to recognize the main control point has changed. It’s no longer the server sitting behind the firewall of your company’s or school’s IT environment. The vulnerability of the endpoint is that the network is now in the user’s hands; the edge is now the primary attack surface. I think CISOs realize this, and they are asking the right questions… I just don’t know if everyone understands the magnitude or the scale of the challenge. Because the problem is so critical, though, people are taking the time to make the right decisions and identify all the various components needed to be successful.

Louis:   It seems like completing a laptop refresh during the conditions of a pandemic could be especially challenging, given how entire IT teams are remote. What do you anticipate will be the most challenging aspects of completing a hardware refresh this year (2021)?

Matt:  The PC has always been a critical device for productivity. But now, without access to that technology, you are completely paralyzed; you can’t collaborate, you can’t engage, you can’t connect. Lenovo has always been focused on pushing intelligent transformation as far as possible to get the best devices into the hands of our customers. Beyond designing and building the device, we have the ability to distribute asset tags and to provide a 24/7 help desk for our customers whether you’re a consumer, a school, or a large institution. We can also decommission those devices at the end, so we’re able to support the entire journey or lifecycle.

The question has really become, how do you deliver secure devices to the masses? And, we’re fully equipped to do that. For example, every Lenovo X1 Carbon laptop comes out of the box with Lenovo Security Assurance, which is actually powered by Absolute; it is in our hardware. Our customers can open a Lenovo PC, and know that it is completely secure, right out of the box. Every one of our laptops is fortified with Absolute’s Persistence technology and self-healing capabilities that live in the BIOS. It’s that unbreakable, secure connection that makes it possible for us to serve our customers throughout the entire lifecycle of device ownership.

Louis: Why are the legacy approaches to decommissioning assets falling short / failing today? How would you redesign IT asset-decommissioning approaches to make them more automated, less dependent on centralized IT teams?

Christy: There have been a few very visible cases over the past year of highly regulated organizations, experiencing vulnerabilities because of how they decommissioned – or did not properly decommission – their assets. But, I don’t want anyone to believe that that this is a problem that is unique to regulated industries, like financial services. The move to the cloud has given many organizations a false sense of security, and it seems that the more data running in the cloud, the more pronounced this false sense of security becomes. It’s a mistaken assumption to think that when hardware goes missing, the security problem is solved by shutting down password access and that all the data is protected because it is stored in the cloud. That’s just not true. When devices aren’t calling in anymore, it’s a major vulnerability – and the longer the device sits without being properly wiped or decommissioned, the greater the opportunity for bad actors to take advantage of those assets.

The other piece that should be top of mind is that once a device is decommissioned, it’s often sold. We want to ensure that nothing on that device gets passed on to the next owner, especially if it’s going to a service or leasing program. So, we’ve concentrated on making asset decommissioning as precise as possible and something that can be done at scale, anytime and anywhere.

Matt:  Historically, reclaiming and decommissioning devices has required physical interaction. The pandemic has limited face-to-face encounters, so , we’re leveraging many different software solutions to give our customers the ability to wipe the device clean if they aren’t able to get the asset back in their possession, so that at least they know it is secure. Since we’re all now distributed, we’re looking at several different solutions that will help with decommissioning, several of which are promising and scale well given today’s constraints. Our goal is to provide our enterprise customers with decommissioning flexibility, from ten units to several thousand.

Louis:  Paradoxically, having everyone remote has made the business case for improving endpoint security more compelling too. What do you hear from enterprises about accelerating digital transformation initiatives that include the latest-generation endpoint devices?

Christy:  The same acceleration that I spoke about on the education side, we absolutely see on the enterprise side as well, and with rapid transformation comes increased complexity. There has been a lot of conversation about moving to Zero Trust, moving more services to the cloud and putting more controls on the endpoint – and not having these sort of layers in between. Our data tells us that the average enterprise device today has 96 unique applications, and at least 10 of them are security applications. That is a massive amount of complexity to manage. So, we don’t believe that adding more controls to the endpoint is the answer; we believe that what’s most important is knowing the security controls you have are actually working. And we need to help devices and applications become more intelligent, self-aware, and capable of fixing themselves. This concept of resiliency is the cornerstone of effective endpoint security, and a critical part of the shift to a more modern security architecture.

Matt: I think there are two major forcing functions: connection and security. Because we are all now remote, there’s a huge desire to feel connected to one another even though we aren’t sitting in the same room together. We’re modifying our products in real-time with the goal of removing shared pain points and optimizing for the new reality in which we’re all living and working. Things like microphone noise suppression and multiple far field microphones, so that if the dog barks or kids run into a room, the system will mute before you’ve even pressed the mute button. We’re improving camera technology from a processing standpoint to make things look better. Ultimately, our goal is to provide an immersive and connected experience.

Security, however, transcends specific features that deliver customer experiences – security is the experience. The features that make hardware more secure are those that lie beneath the operating system, in the firmware. That is why we have such a deep network of partners, including Absolute. Because you need to have a full ecosystem, and a program that takes advantage of all the best capabilities, in order to deliver the best security solution possible.

Louis: How is Absolute helping enterprise customers ensure greater endpoint security and resiliency in 2021 and beyond?

Christy: We spend a lot of time sitting with customers to understand their needs and how and where we can extend our endpoint security solutions to fit. We believe in taking a layered approach – which is the framework for defense in-depth, and an effective endpoint security strategy. The foundational piece, which we are able to deliver, is a permanent digital tether to every device; this is the lifeline. Not having an undeletable connection to every endpoint means you have a very large security gap, which must be closed fast. A layered, persistence-driven approach ensures our customers know their security controls are actually working and delivering business value. It enables our customers to pinpoint where a vulnerability is and take quick action to mitigate it.

Lenovo’s unique, high value-add approach to integrated security has both helped drive innovation at Absolute, while also providing Lenovo customers the strongest endpoint security possible. Their multilayer approach to their endpoint strategy capitalizes on Absolute’s many BIOS-level strengths to help their customers secure every endpoint they have. As our companies work together, we are both benefitting from a collaboration that seeks to strengthen and enrich all layers of endpoint security. Best of all, our shared customers are the benefactors of this collaboration and the results we are driving at the forefront of endpoint security.

Louis:  How has the heightened focus on enterprise cybersecurity in general, and endpoint security specifically, influenced Lenovo’s product strategy in 2021 and beyond?

Matt:  We have always been focused on our unique cybersecurity strengths from the device side and making sure we have all of the control points in manufacturing to ensure we build a secure platform. So, we’ve had to be open-minded about endpoint security, and diligent in envisioning how potential vulnerabilities and attack strategies can be thwarted before they impact our customers. Because of this mindset, we’re fortunate to have a very active partner community. We’re always scouring the earth for the next hot cybersecurity technology and potential partner with unique capabilities and the ability to scale with our model. This is a key reason we’ve standardized on Absolute for endpoint security, as it can accommodate a wide breadth of deployment scenarios. It’s a constant and very iterative process with a team of very smart people constantly looking at how we can excel at cybersecurity. It is this strategy that is driving us to fortify our Lenovo Security Assurance architecture over the long-term, while also seeking new ways of providing insights from existing and potentially new security applications.

Louis: What advice are you giving CISOs to strengthen endpoint security in 2021 and beyond?

Christy: One of our advisors is the former Global Head of Information Security at Citi Group, and former CISO of JP Morgan and Deutsche Bank. He talks a lot about his shared experiences of enabling business operations, while defending organizations from ever-evolving threats, and the question that more IT and security leaders need to be asking – which is, “Is it working?” Included in his expert opinion is that cybersecurity needs to be integral to business strategy – and endpoint security is essential for creating a broader secure ecosystem that can adapt as a company’s needs change.

I believe there needs to be more boardroom-level conversations around how compliance frameworks can be best used to achieve a balance between cybersecurity and business operations. A big part of that is identifying resiliency as a critical KPI for measuring the strength of endpoint controls.

 

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

  • 30% of US and UK remote workers say their organizations don’t require them to use a secure access tool, including VPN, to log into corporate databases and systems, according to Ivanti’s 2021 Secure Consumer Cyber Report.
  • Plus, 25% of remote workers in the US and UK aren’t required to have specific security software running on their devices to access certain applications while working remotely.
  • And one in four US remote workers use their work email and passwords to log in to consumer websites and apps.

Cybersecurity gaps have continued to widen during the pandemic. A noteworthy survey by Ivanti illustrates exactly how remote workers are putting organizations at risk and where enterprise security is falling short, making those cybersecurity gaps challenging for CISOs to close. Ivanti’s 2021 Secure Consumer Cyber Report outlines the challenges that cybersecurity and IT teams have faced when securing remote workers in what’s being described as the “Everywhere Workplace.” Based on interviews with more than 2,000 US and UK respondents working from home in November 2020, the survey shows that authentication and endpoint security needs to improve across all devices that employees use.

IT Organizations Need Help Closing Their Cybersecurity  Gaps

Of the many lessons learned from 2020, among the most valuable are how virtual workforces need self-diagnosing and self-remediating endpoints, while IT organizations need improved unified endpoint management (UEM) as part of a zero-trust strategy. Bad actors continue to target remote workers’ privileged access credentials to gain access and exfiltrate customer, financial and proprietary data, including intellectual property. Ivanti’s survey provides insights into where cybersecurity gaps need attention first:

  • The most challenging threat surface to protect is a person’s identity because it’s exposed across so many threat surfaces, including personal and work devices, consumer websites, and IoT devices in homes. The pandemic is proving identities are the new security perimeter. A person’s cell phone, personal tablet, and laptop is a real-time digital definition of a person’s identity. Nearly half (49%) of US remote workers use personal devices for their jobs, often without two-factor authentication enabled. The graphic below shows how organizations can close this cybersecurity gap by adopting UEM as part of their go-forward initiatives in 2021 and beyond:

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

  • Lack of consistent security software and password standards is a big contributor to US and UK organizations’ cybersecurity gaps today. One in four remote workers can access enterprise resources without any security software in place. An even more surprising finding is that 30% of remote workers in the US and UK can access corporate data without a secure access tool or VPN connection. If a remote worker’s identity is compromised, there’s a one in three chance that their organization will be breached, enabling cyberattackers to move laterally through the company’s systems:

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

  • Protecting remote workers’ identities & devices at scale requires Zero Trust. Automating as many tasks as possible while providing a continuous and seamless user experience is the surest way to close cybersecurity gaps. Getting rid of passwords and automating two-factor authentication using Zero Sign-On (ZSO), a core part of the Ivanti platform, is proving essential today. Zero Sign-On relies on proven biometrics, including Apple’s Face ID, as a secondary authentication factor to gain access to work email, unified communications and collaboration tools, and corporate-shared databases and resources. CISOs and their teams also need to consider how mobile threat defense can better secure personal devices against phishing, device, network, and malicious app threats. Late last year, MobileIron (now part of Ivanti) received its second mention in two years in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020. The Forrester Wave graphic is shown below:

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

  • In conclusion, enterprise cybersecurity gaps are widening due to a combination of risky consumer behavior and a lack of consistent security for mobile workforces. And these gaps will only increase as employees increasingly work from anywhere, using their personal devices to connect to corporate resources. To secure and enable the future of work, organizations need to start implementing and maturing an end-to-end zero trust security model today by leveraging new technologies and protecting their current security technology investments.

How To Digitally Transform Talent Management For The Better

How To Digitally Transform Talent Management For The Better

Bottom Line:  CHROs and the HR teams they lead need to commit to keep learning and adopting digital technologies that help improve how they hire, engage and retain talent if they’re going to stay competitive.

Driven by the urgency to keep connected with employees, customers and suppliers, McKinsey’s recent Covid-19 survey finds global organizations are now seven years ahead of schedule on digital transformation initiatives. HR’s role is proving indispensable in enabling the fast pace of digital adoption today. By providing Business Continuity Planning (BCP), HR’s contributions to digital transformation separate the organizations that thrive despite crises versus those left behind, according to McLean & Company’s 2021 HR Trends Report. The graphic below from the report shows how effective HR has been in supporting the rapid changes needed to keep employees communicating and engaged.

The McLean and Company Trends Report also shows that talent management’s major gaps need attention now before they grow wider. These areas include analyzing the employee skills gap (24%), developing employees on new competencies (24%), and training new employees in specific new skills (21%). Improving talent acquisition, retention, diversity and inclusion, and employee experiences by digitally transforming them with greater personalization at scale and visibility is key.  CHROs and the HR teams they lead need to close these gaps now.

How To Digitally Transform Talent Management For The Better

 

How To Get Started Digitally Transforming Talent Management

Start with the gaps in talent management you see in your organization. The largest gaps are often in the following four areas: recruiting and talent acquisition; retention of top talent and diverse talent; lack of visibility into employee capabilities; and workforce strategies not aligned to business strategies. Key challenges that need to drive digital transformation in these four areas include the following:

  • Legacy recruiting and Applicant Tracking Systems prioritize HR’s needs to capture thousands of resumes instead of delivering an excellent candidate experience. Attracting and recruiting the most qualified candidates in a virtual-first world is a daunting task. Organizations who are leaders in digital transformation quickly realized this and relied on automating the applicant experience so much it began to resemble the Amazon 1-Click Ordering experience. McKinsey’s recent Covid survey found that 75% of organizations digitally transforming their operations, including HR, were able to fill tech talent gaps during the crisis:

How To Digitally Transform Talent Management For The Better

Source: McKinsey & Company, 2020, How Covid-19 has pushed companies over the technology tipping point—and transformed business forever

 

  • Top talent retention is more of a problem than many organizations realize, with top performers receiving between five and ten recruiter calls a month or more. The average tenure of employees at companies has been decreasing for nearly two decades. And a primary driver is not for lack of opportunity, but because employees can’t find a career path internally as easily as they can find a growth opportunity at another company. It’s possible to retain the top talent by guiding employees to what’s next in their careers. Of the many approaches to providing employees a self-service option for personalized coaching guidance at scale, Eightfold’s Talent Intelligence Platform is delivering results at such notable companies as Air Asia, Micron, NetApp, and others. Eightfold found that 47% of top talent leave within two years, but most would happily stay if given the right opportunity. The following video explains how Eightfold helps its customers retain talent:

 

 

  • Employees often lack visibility into new internal opportunities, and both HR and business leaders lack visibility into employees’ unique capabilities. There’s often a 360-degree lack of visibility into new internal career positions from the employee’s side and a lack of awareness on the employer’s side of their employee’s innate capabilities. The lack of visibility from the employer side limits their ability to benchmark talent, create programmatic, scalable, and flexible career development opportunities and ultimately redeploy talent in an agile way that serves business strategies that are evolving rapidly in response to the impacts of the global pandemic.
  • Workforce strategies that don’t align and support business strategies waste opportunities to improve morale, productivity, and employees’ professional growth. While organizations have invested heavily in valuable infrastructure, including Learning Management Systems (LMS) and other employee experience and development tools, they often lack a unified platform to help deliver the right growth opportunities to the right person at the right time.

Achieving Greater Automation, Visibility And Personalization At Scale

Talent management is core to any digital business and the competitive outcomes each can produce today and in the future. To make greater contributions, Talent Management needs to deliver the following by relying on a unified platform:

  • Talent Management platforms need to combine ongoing business insights based on operations data, technology management data, and business transformation apps and tools to create new digitally-driven employee experiences quickly.
  • A key design goal of any Talent Management platform has to be delivering personalized candidate or prospect experiences at scale through every communications channel an organization relies on, both digital and human.
  • The best Talent Management platforms provide the apps, data, and contextual intelligence to drive task and mission ownership deep into an organization and reinforce accountability. What’s noteworthy about Eightfold’s Talent Intelligence Platform is that it has designed-in empathy and the ability to deliver quick, effective decisions that further reinforce team inclusion. Eightfold’s many customer wins in Talent Management illustrate how combining empathy, inclusion, and accountability in a platform’s design pays off.

As McLean & Company’s 2021 HR Trends Report shows, taking a band-aid approach to solving Talent Management’s many challenges is effective in the short-term. Turning Talent Management into a solid contributor to business strategies for the long-term needs to start at the platform level, however. Eightfold’s approach to combining their Talent Management, Talent Insights and Talent Acquisition modules, all supported by their Talent Intelligence Platform, enables their customers to define their digital transformation goals and strategies and get results.

Source: McKinsey & Company, 2020, How Covid-19 has pushed companies over the technology tipping point—and transformed business forever

Conclusion

The Talent Management goal many organizations aspire to today is to digitally transform candidate or prospect experiences so well that people have an immediate affinity for the company they apply to, and the self-service options are so intuitive they rival Amazon’s 1-Click Ordering Experience. Across any industry, digital transformation succeeds when customers’ expectations are exceeded so far that a new category gets created. Uber’s contextual intelligence, rating system, and ability to optimize ride requests is an example. UberEats provides the same real-time visibility into every step of each order, creating greater trust. Domino’s Pizza Tracker app keeps customers informed of every phase of their orders. What’s common across all these examples is personalization at scale, real-time automation across service providers, and real-time visibility. Those same core values need to be at the center of any Talent Management digital transformation effort today.

10 Ways Cybersecurity Can Protect COVID-19 Vaccine Supply Chains

10 Ways Covid-19 Vaccine Supply Chains Need To Be Protected By Cybersecurity

  • The Pharma industry has lost $14 billion through Intellectual Property (IP) cyber theft worldwide, according to the United Kingdom Office of Cyber Security and Information Assurance.
  • 53% of pharmaceutical IP thefts and related breaches are carried out by someone with insider access, also according to the United Kingdom Office of Cyber Security and Information Assurance.
  • The pharma industry’s average total cost of a data breach is $5.06 million, with one of the highest costs of remediating the breach at $10.81 million across all industries, according to a recent ProofPoint study.
  • Over 93% of healthcare organizations experienced a data breach in the past three years, and 57% have had more than five data breaches, according to the Cybersecurity Ventures 2020 Healthcare Cybersecurity Report.
  • Gartner predicts the privileged access management (PAM) market will grow at a compound annual growth rate (CAGR) of 10.7% from 2020 through 2024, reaching $2.9 billion by 2024.

Bottom Line: Having developed COVID-19 vaccines in a fraction of the time it takes to create new treatments, pharmaceutical companies need to protect the priceless IP, supporting data, and supply chains from cyberattacks.

Showing how powerful global collaboration between pharmaceutical industry leaders can be, the world’s leading vaccine producers delivered new vaccines in record time. The IP behind COVID-19 vaccines and their supporting supply chains need state-of-the-art protection comprised of cybersecurity technologies and systems, as the vaccines’ IP is an asset that cyber attackers have already tried to obtain.

Pharmaceutical’s Growing Number of Threat Surfaces Make Cybersecurity a Priority 

In the race to create a COVID-19vaccine by collaborating across the industry, pharmaceutical companies have exposed more threat surfaces than existed before the pandemic. In R&D, Clinical Trials, Manufacturing, and Distribution, there’s a proliferation of new threat surfaces cyber attackers are targeting today, as evidenced by threat analysis reports from the U.S. Homeland Security Department’s Cybersecurity & Infrastructure Security Agency (CISA).

The report provides specifics about how cyber attackers could impersonate an executive from a Chinese biomedical company known for having end-to-end cold chain expertise, which is essential for delivering vaccines reliably. The cyber attackers conducted spear-phishing attacks against global companies who support the global cold chain needed for distributing vaccines. There were credential harvesting attempts against global organizations in at least six countries known today to access vaccine transport and distribution sensitive information.

Launching a phishing campaign with the goal of harvesting details on key executives and access credentials across the cold chain is just the beginning. According to Lookout’s Pharmaceutical Industry Threat Report, some of the most significant threat surfaces are the most problematic today, including the following:

Research & Development & Clinical Trials

  • Collaborative research teams across pharmaceutical manufacturers globally
  • Scientists creating initial compounds and completing primary research to define a vaccine.
  • Integration of study sites at the test device and reporting system level

Manufacturing and Distribution

  • Plant workers’ systems, including tablets with build instructions on them
  • Physician & Pharmacist Networks
  • Distribution Channels and their supporting IT systems

Cyber attackers are taking a more synchronized, multifaceted approach to attacking Covid-19 supply chains, reiterated in CISA’s report. There’s evidence that state-sponsored cyber attackers attempt to move laterally through networks and remain there in stealth, allowing them to conduct cyber espionage and collect additional confidential information from victim environments for future operations. Cyber attackers are initially focused on phishing, followed by malware distribution, registration of new Covid-specific domain names, and always looking for unprotected threat surfaces.

10 Ways Cybersecurity Can Protect COVID-19 Vaccine Supply Chains

By combining multiple cybersecurity best practices and strategies, pharmaceutical companies stand a better chance of protecting their valuable IP and vaccines. Presented below are ten ways the pharmaceutical industry needs to protect the COVID-19 vaccine supply chain today:

  1. Prioritize Privileged Access Management (PAM) across the vaccine supply chain, ensuring least privilege access to sensitive data starting with IP. CISA’s note finds that there have been multiple attempts at capturing privileged credentials, which often have broad access privileges and are frequently left standing open. PAM is needed immediately to institute greater controls around these privileged accounts across the supply chain and only grant just enough just-in-time access to sensitive IP, shipping and logistics data, vaccination schedules, and more. Leaders include Centrify, which is noteworthy for cloud-based PAM implementations at the enterprise and supply chain levels. Additional vendors in this area include BeyondTrust, CyberArk, Ivanti, Thycotic, Ping Identity, and Senhasegura.
  2. Assess every supplier’s security readiness in vaccine supply chains, defining minimum levels of compliance to security standards that include a single, unified security model across all companies. In creating a secured vaccine supply chain, it’s imperative to have every supplier network member on the same security model. Taking this step ensures accountability, greater clarity of roles and responsibilities, and a common definition of privileged roles and access privileges.  Leaders in this area include BeyondTrust, Centrify, CyberArk, Ivanti, and Thycotic.
  3. Taking a Zero Trust-based approach to secure every endpoint across the vaccine manufacturer’s R&D, Clinical Trials, Manufacturing, and Distribution networks is necessary to shut down cyber attackers taking advantage of legacy security weaknesses approaches. The pharmaceutical companies and myriad logistics providers see a much faster than the expected proliferation of endpoints today. Trusted and untrusted domains from legacy server operating systems are a time sink when it comes to securing endpoints – and proving unreliable despite the best efforts that Security Operations teams are putting into them. Worst of all, they leave vaccine supply chains vulnerable because they often take an outdated “trust but verify” cybersecurity approach. Leaders include Illumio, Ivanti (MobileIron), Cisco, Appgate, Palo Alto Networks, and Akamai Technologies.
  4. Extend the Zero Trust framework across the entire supply chain by implementing microsegmentation and endpoint security requirements across all phases of the vaccine’s development cycles. This will ensure cyber attackers don’t have the opportunity to embed code to activate later. The goal is to push Zero Trust principles to all related processes integrating with the vaccines’ pipeline, including all dependencies across the entire development lifecycle.
  5. Incorporating Multi-Factor Authentication (MFA) across every system in the vaccine supply chain is a given. Usernames and passwords alone are not enough, and MFA is low-hanging fruit to authenticate authorized users. MFA is based on two or more factors that can authenticate who you are based on something you know (passwords, PINs, code works), something you have (a smartphone, tokens devices that produce pins or pre-defined pins), or something you are (biometrics, facial recognition, fingerprints, iris, and face scans). For example, Google provides MFA as part of their account management to every account holder and has a thorough security check-up, which is useful for seeing how many times a given password has been reused.
  6. Alleviate the conflicts of who will pay for increasing cybersecurity measures by making supplier-level security a separate line item in any CISOs and CIO’s budget. Today certain pharma supply chain CISOs are expected to ramp up cybersecurity programs with the same budget before Covid-19. While there are slight increases in cybersecurity budget levels, it’s often not enough to cover the higher costs of securing a broader scope of supply chain operations. CISOs need to have greater control over cybersecurity budgets to protect vaccine IP and distribution. Relying on traditional IT budgets controlled by CIOs isn’t working. There needs to be a new level of financial commitment to securing vaccine supply chains.
  7. Consider using an AIOps platform adept at unifying diverse IT environments into a single, cohesive AI-based intelligence system that can identify anomalous network behavior in real-time and take action to avert breaches. Based on conversations with CIOs across the financial services industry, it is clear they’re leaning in the direction of AIOps platforms that provide real-time integration to cloud platforms combined with greater control over IT infrastructure. LogicMonitor’s prioritizing IT integration as a core strength of their platform shows, as they have over 2,000 integrations available out of the box. Relying on Collectors’ agentless system, LogicMonitor retrieves metrics such as cloud provider health and billing information. This collector then pulls metrics from different devices using various methods, including SNMP, WMI, perf Mon JMX, APIs, and scripts.
  8. Unified Endpoint Security (UES) needs to become a standard across all vaccine supply chains now. Vendors who can rapidly process large amounts of data to detect previously unknown threats are needed today to stop cyberattacks from capturing IP, shipment data, and valuable logistics information. Absolute Software’s approach to leveraging its unique persistence, resilience, and intelligence capabilities is worth watching. Their approach delivers unified endpoint security by relying on their Endpoint Resilience platform, which includes a permanent digital tether to every enterprise’s endpoint. Absolute is enabling self-healing, greater visibility, and control by having an undeletable digital thread to every device. Based on conversations with their customers in Education and Healthcare, Absolute’s unique approach gives IT complete visibility into where every device is at all times and what each device configuration looks like in real-time.
  9. Pharma supply chains need to have a strategy for achieving more consistent Unified Endpoint Management (UEM) across every device and threat surface of the vaccine supply chain. UEM’s many benefits, including streamlining continuous OS updates across multiple mobile platforms, enabling device management regardless of the connection, and having an architecture capable of supporting a wide range of devices and operating systems. Another major benefit enterprises mention is automating Internet-based patching, policy, configuration management. Ivanti is the global market leader in UEM, and their recent acquisition of Cherwell expands the reach of their Neurons platform, providing service and asset management from IT to lines of business and from every endpoint to the IoT edge. Neurons are Ivanti’s AI-based hyper-automation platform that connects Unified Endpoint Management, Security, and Enterprise Service Management. Ivanti is prioritizing its customers’ needs to autonomously self-heal and self-secure devices and self-service end-users.
  10. Track-and-traceability is essential in any vaccine supply chain, making the idea of cyber-physical passports that include serialization for vaccine batches more realistic given how complex supply chains are today. Passports are an advanced labeling technology that provides the benefits of virtual tracking, verification of specific compounds, and yield rates of key materials. Serialization is a must-have for ensuring greater traceability across vaccine supply chains proving effective in stopping counterfeiting. Having digital passports traceable electronically can further help thwart cyber attackers.

Conclusion

By closing the cybersecurity gaps in vaccine supply chains, the world’s nations can find new, leaner, more efficient processes to distribute vaccines and protect their citizens. It’s evident from the results achieved so far in the U.S. alone that relying on traditional supply chains and means of distribution isn’t getting the job done fast enough, and cyber attackers are already looking to take advantage. By combining multiple cybersecurity tactics, techniques, and procedures, the vaccine supply chain stands to improve and be more secure from threats.

How FinancialForce Is Using AI To Fight Revenue Leakage

How FinancialForce Is Using AI To Fight Revenue Leakage

Bottom Line: Using AI to measure and predict revenue, costs, and margin across all Professional Services (PS) channels leads to greater accuracy in predicting payment risks, project overruns, and service forecasts, reducing revenue leakage in the process.

Professional Services’ Revenue Challenges Are Complex

Turning time into revenue and profits is one of the greatest challenges of running a Professional Services (PS) business. What makes it such a challenge is incomplete time tracking data and how quickly revenue leaks spring up, drain margins, and continue unnoticed for months. Examples of revenue leaks across a customers’ life cycles include the following:

  • Billing errors are caused by the booking and contract process not being in sync with each other leading to valuable time being wasted.
  • When products are bundled with services, there’s often confusion over recognizing each revenue source, when, and by which PS metric.
  • Inconsistent, inaccurate project cost estimates and actual activity lead to inaccurate forecasting, delaying the project close and the potential for bad debt write-offs and high Days Sales Outstanding (DSO).
  • Revenue leakage gains momentum and drains margins when the following happens:
    • Un-forecasted delays and timescale creep
    • Reduced utilization rates across each key resource required for the project to be completed
    • Invoice and billing errors that result in invoice disputes that turn into high DSOs & write-offs
    • Incorrect pricing versus the costs of sales & service often leads to customer churn.
    • Revenue leakage gains momentum as each of these factors further drains margin

Adding up all these examples and many more can easily add up to 20-30% of actual lost solution and services margin. In many ways, it’s like death by a thousand small cuts. The following graphic provides examples across the customer lifecycle:

How FinancialForce Is Using AI To Fight Revenue Leakage

Why Professional Services Are Especially Vulnerable To Revenue Leakage 

Selling projects and the promise of their outcomes in the future create a unique series of challenges for PS organizations when it comes to controlling revenue leakage. It often starts with inaccurately scoping a project too aggressively to win the deal, only to determine the complexity of tasks originally budgeted for will take 10 – 30% longer or more. Disconnects on project scope are unfortunately too common, turning small revenue leaks into major ones and the potential of long Days Sales Outstanding (DSO) on invoices. When revenue leaks get ingrained in a project’s structure, they continue to cascade into each subsequent phase, growing and costing more than expected.

The SPI 2021 Professional Services Maturity™ Benchmark Service published by Services Performance Insight, LLC in February of this year provides insights into the hidden costs and prevalence of revenue leakage. The following table illustrates how organizations with high levels of revenue leakage also perform badly against other key metrics, including client referencability. The more revenue leakage an organization experiences, the more billable utilization drops, on-time project deliveries become worse, and executive real-time visibility becomes poorer.

How FinancialForce Is Using AI To Fight Revenue Leakage

How FinancialForce Is Using AI To Fight Revenue Leakage

It’s noteworthy that FinancialForce is now on its 12th consecutive product release that includes Salesforce Einstein, and many customers, including Five9, are using AI to manage revenue leakage across their PS business. Throughout the pandemic, the FinancialForce DevOps, product management, and software quality teams have been a machine, creating rich new releases on schedule and with improved AI functionality based on Einstein. The 12th release includes prebuilt data models, lenses, dashboards, and reports.

Andy Campbell, Solution Evangelist at FinancialForce, says that “FinancialForce customers have access to best practices to minimize revenue leakage by scoping and selling the right product and services mix to allocating the optimal range and amount of services personnel and finally billing, collecting and recognizing the right amount of revenue for services provided.” Andy continued, saying that recent dashboards have been built for resource managers to automate demand and capacity planning and service revenue forecasting and assist financial analysts in managing deferred revenue and revenue leakage.

By successfully integrating Einstein into their ERP system for PS organizations, FinancialForce helps clients find new ways to reduce revenue leakage and preserve margin. Relying on AI-based insights for each phase of a PS engagement delivered a 20% increase in Customer Lifetime Value according to a FinancialForce customer. And by combining FinancialForce and Salesforce, customers see an increased bid:win ratio of 10% or more. The following graphic illustrates how combining the capabilities of Einstein’s AI platform with FinancialForce delivers results.

How FinancialForce Is Using AI To Fight Revenue Leakage

Conclusion

FinancialForce’s model building in Einstein is based on ten years of structured and unstructured data, aggregated and anonymized, then used for in-tuning AI models. FinancialForce says these models are used as starting points or templates for AI-based products and workflows, including predict to pay.  Salesforce has also done the same for its Sales Cloud Analytics and Service Cloud Analytics. In both cases, Salesforce and FinancialForce customers benefit from best practices and recommendations based on decades of data, which should be particularly interesting considering the “black swan” nature of 2020 data for most of their customers.

10 Charts That Will Change Your Perspective Of Microsoft Azure’s Growth

  • Microsoft Azure revenue grew 50% year-over-year in fiscal Q2, 2021, contributing to a 26% increase in Server products and cloud services revenue.
  • According to the latest earnings call, more than 1,000 Microsoft customers now use Azure Arc to simplify hybrid management and run Azure services across on-premises, multi-cloud and at the edge.
  • Commercial cloud gross margins increased to 71% in the latest quarter, up from 67% a year earlier.
  • There are now over 60 Azure regions globally, strengthening Microsoft’s competitive global position versus Amazon Web Services.
  • Microsoft reported $43.08 billion in the second fiscal quarter ended Dec. 31, up from $36.91 billion a year earlier,

These and many other insights are from Microsoft’s Fiscal Year 2021 Second Quarter Earnings Conference Call and related research. Microsoft’s early decision to double down on expanding their cloud platform by accelerating new product and services development and Azure region expansion is paying off. Azure’s revenue growth shows Microsoft is an innovation machine when it comes to the cloud.  

In their latest fiscal quarter, Microsoft announced hundreds of new services and updates to Microsoft Azure alone. The most noteworthy are improvements to Microsoft Cloud for Healthcare, Azure Defender for SQL, Password spray detection in Azure AD Identity Protection, Azure Stack HCI, Azure Stack Edge, Azure Data Factory now being available in five new regions and many more. All Azure updates are available in an online index that provides options for finding those now available, in preview, or in development.  

The following ten charts will change your perspective of Microsoft Azure’s growth:

  • Intelligent Cloud delivered the highest operating income of all segments in the 2nd quarter at $6.4 billion or 36% of total consolidated operating income. This quarter, Microsoft’s success with indirect channel sales combined with more enterprise customers accelerating their cloud-first initiatives contributed to Intelligent Cloud leading all segments in operating income. The following is from the Q2, FY21 Earnings Call.
10 Charts That Will Change Your Perspective Of Microsoft Azure's Growth
  • Synergy Research Group’s latest cloud market analysis finds that Amazon and Microsoft are over 50% of the global cloud provider market, with Microsoft reaching 20% worldwide market share for the first time. Q4, 2020 enterprise spending on cloud infrastructure services was just over $37 billion, $4 billion higher than the previous quarter and up 35% from the fourth quarter of 2019. Synergy Research notes that it has taken just nine quarters for the market to double in size.
10 Charts That Will Change Your Perspective Of Microsoft Azure's Growth
  • 63% of enterprises are currently running apps on Microsoft Azure, second only to AWS.  Azure is narrowing the gap with AWS in both the percentage of enterprises using it and the number of virtual machines (VMs) enterprises are running on it. 6% of enterprises are spending at least $1.2 million annually on Microsoft Azure. Source: Statista and Flexera 2020 State of the Cloud Report, page 50.
10 Charts That Will Change Your Perspective Of Microsoft Azure's Growth
  • 2020 total cloud infrastructure services spending grew 33% to $142 billion from $107 billion in 2019, according to Canalys, with Microsoft’s indirect channel business fueling their 20% market share growth. Microsoft’s dominance of indirect selling channels is evident in the level of sales enablement, sales and technical support they provide resellers. Canalys’ Chief Analyst Alastair Edwards says that “organizations are turning to trusted business partners to advise, implement, support and manage their cloud journeys and articulate the real business value of cloud migration.”
10 Charts That Will Change Your Perspective Of Microsoft Azure's Growth
  • 19% of enterprises expect to invest significantly more on Microsoft Azure in 2021, leading all other cloud vendors this year. Microsoft Azure leads all vendors when compared to the percentage change in spending this year. It’s noteworthy that 61% of all enterprises interviewed expect to increase their investments in Microsoft Azure this year, second only to Microsoft SaaS software. Source: 2021 Flexera State of Tech Report, January 2021.
10 Charts That Will Change Your Perspective Of Microsoft Azure's Growth
  • Microsoft Azure Stack is the second most-used private cloud platform by enterprises, with 35% of them currently running apps today. Azure Stack also leads all others in experimentation, with one in five enterprises, or 21%, currently in that phase of deployment. 67% of all enterprises interviewed in the 2020 Flexera State of the Cloud Report are either running Azure apps or are considering it.
10 Charts That Will Change Your Perspective Of Microsoft Azure's Growth
  • Microsoft’s centerpiece for their intelligence investment is the Microsoft Intelligent Security Graph, which processes over 630 billion authentications across our cloud services each month. Microsoft relies on the Security Graph to gain insights into normal behavior, including sign-ins and authentications and abnormal behavior, including attempted bypasses to two-factor authentication. Microsoft blocks more than 5 billion distinct malware threats per month, providing a great deal of useful data to analyze endpoints across customers’ networks. Source: Microsoft CISO Workshop 1 – Cybersecurity Briefing.
10 Charts That Will Change Your Perspective Of Microsoft Azure's Growth
  • 44.5% of enterprises say Microsoft Azure is their preferred provider for Cloud Business Intelligence (BI). Azure is considered 27% more critical to an enterprises’ Cloud BI requirements and preferences than Amazon Web Services. It’s noteworthy that 96.5% of all enterprises have a preference for Microsoft Azure BI versus its main competitors, including Google Cloud, IBM BlueMix, or Alibaba.   
10 Charts That Will Change Your Perspective Of Microsoft Azure's Growth
  • Microsoft Azure is the leading IoT platform worldwide by end-to-end capabilities with a total score of 276 according to Counterpoint Research. According to the methodology Counterpoint used for ranking IoT platforms, Microsoft Azure is considered a global leader in edge data processing, an increasingly important feature of IoT platforms worldwide. The ability to deliver IoT capabilities from the cloud to the edge helped Microsoft’s platform rank high in this category. Source; Statista and CounterPointResearch.com.
10 Charts That Will Change Your Perspective Of Microsoft Azure's Growth
  •  Microsoft Azure is the foundation for a Digital Supply Chain Platform that integrates supply chain partner, corporate, data & advanced analytics platforms and supply chain core transaction systems.  The ongoing pandemic is putting continued pressure on supply chains. Most manufacturing executives say that employee safety, data security, remote worker access, supply chain visibility and insights visibility are high priorities. In response to these market needs, Microsoft Supply Chain (MSC) was created on the Azure platform. The diagram below explains how Azure is integral to the Digital Supply Chain platform.
10 Charts That Will Change Your Perspective Of Microsoft Azure's Growth

Top 10 Tech Job Skills Predicted To Grow The Fastest In 2021

Top 10 Tech Job Skills Predicted To Grow The Fastest In 2021
  • According to Burning Glass Technologies, the two tech job skills paying the highest salary premiums today and in 2021 are IT Automation ($24,969) and AI & Machine Learning ($14,175).
  • The average salary premiums for the most in-demand tech skills range from $4,204 to nearly $25,000.
  • Startups valued at $1 billion or more are 33% more likely to prioritize one or several top ten tech job skills in their new hire plans versus their legacy Fortune 100-based competitors or colleagues.

These and many other fascinating insights are from Skills of Mass Disruption: Pinpointing the 10 Most Disruptive Skills in Tech, Burning Glass Technologies’ latest research study published earlier this month. Their latest study provides pragmatic, useful insights for tech professionals interested in furthering their careers and earning potential. Burning Glass Technologies is a leading job market analytics provider that delivers job market analytics that empowers employers, workers and educators to make data-driven decisions. 

Using AI To Find The Most Valuable Job Skills

Using artificial intelligence-based technologies they’ve developed, Burning Glass Technologies analyzed over 17,000 unique skills demanded across their database of over one billion historical job listings. The study aggregates then define disruptive skill clusters as those skill groups projected to grow the fastest, are most undersupplied and provide the highest value. For additional details regarding their methodology, please see page 8 of the report.

The research study is noteworthy because it explains how essential acquiring skills is to translating new technologies’ benefits into business value. They’ve also taken their analysis a step further, providing technical professionals with additional insights they need to plan their personal development and careers.

Key takeaways from their analysis include the following:

  • IT Automation expertise can earn technical professionals a $24,969 salary premium, the most lucrative of all tech job skills to have in 2021. Burning Glass Technologies defines IT Automation as the skills related to automating and orchestrating digital processes and workflows. Six of the ten job skills are marketable enough to drive technical professionals’ salaries above $10,000 a year. At an average salary uplift of $8,851, proactive security (cybersecurity) job skills’ market value seems low. Future surveys in 2021 will most likely reflect the impact of the SolarWinds breach on demand for this skill set. The following graphic compares the average salary premium by tech job skill area.
Top 10 Tech Job Skills Predicted To Grow The Fastest In 2021
Skills of Mass Disruption: Pinpointing the 10 Most Disruptive Skills in Tech by Burning Glass Technologies
  • Software Dev. Methodologies (DevOps) expertise is the most marketable going into 2021, with 634,600 open positions available in North America based on Burning Glass Technologies’ analysis. Employers initiated 1,714,483 job postings requesting at least one disruptive skill area between December 2019 and November 2020. With each skill predicted to grow at least 17%, technical professionals have several lucrative options for their personal and professional development plans. The following graphic compares job openings by skill areas for the time frame of the study:
Top 10 Tech Job Skills Predicted To Grow The Fastest In 2021
Skills of Mass Disruption: Pinpointing the 10 Most Disruptive Skills in Tech by Burning Glass Technologies
  • Quantum Computing, Connected Technologies, Fintech and AI & Machine Learning expertise are predicted to be the fastest-growing tech job skills in 2021 and beyond. Demand for technical professionals skilled in building and optimizing quantum computers and their applications will be in high demand for the next five years based on the study’s findings. Connected Technologies refers to skills related to the Internet of Things and connected physical tools and the telecommunications infrastructure needed to enable them. Fintech skills are related to technologies, including blockchain and others, that make financial transactions more efficient and secure. The following graphic compares the top ten tech job skills predicted to grow the fastest in 2021.
Top 10 Tech Job Skills Predicted To Grow The Fastest In 2021
Skills of Mass Disruption: Pinpointing the 10 Most Disruptive Skills in Tech by Burning Glass Technologies
  • AI & Machine Learning, Cloud Technologies, Parallel Computing and Proactive Security (Cybersecurity) are the most distributed across industries, translating into more diverse job opportunities for technical professionals with these skills. Professional Services leads all industries in demand for nine of the ten tech job skills, except Parallel Computing, the most in-demand skill in Manufacturing. Factors contributing to Professional Services leading all industries in demand for technical job skills include the following factors. First, their business models need to continue pivoting fast to stabilize during the pandemic. Second, better risk and compliance controls of remote operations are urgently needed. Third, better visibility into services costs across all systems to ensure financial reporting accuracy is a must-have, according to the CFOs I spoke with regarding the survey results. The following graphic compares demand for tech skills by industry sector.
Top 10 Tech Job Skills Predicted To Grow The Fastest In 2021
Skills of Mass Disruption: Pinpointing the 10 Most Disruptive Skills in Tech by Burning Glass Technologies
  • Demand for AI and Machine Learning skills is growing at a 71% compound annual growth rate through 2025, with 197,810 open positions today. Technical professionals with job skills in this area see salary premiums of $14,175. Top positions include Data Scientist, Software Developer, Network Engineer, Network Architect, Data Engineer and Senior Data Scientist.
Top 10 Tech Job Skills Predicted To Grow The Fastest In 2021
Skills of Mass Disruption: Pinpointing the 10 Most Disruptive Skills in Tech by Burning Glass Technologies
  •  Positions requiring IT Automation job skills are predicted to grow 59% over the next five years and have 282,380 positions open today. Besides being the most lucrative job skillset to have, IT Automation job skills lead to positions including Software Developer, DevOps Engineer, Senior Software Developer, Systems Engineer and Java Developer or Engineer.
Top 10 Tech Job Skills Predicted To Grow The Fastest In 2021
Skills of Mass Disruption: Pinpointing the 10 Most Disruptive Skills in Tech by Burning Glass Technologies

%d bloggers like this: