Skip to content

Posts from the ‘Enterprise software’ Category

10 Ways Enterprises Are Getting Results From AI Strategies

10 Ways Enterprises Are Getting Results From AI Strategies

  • One in 10 enterprises now use 10 or more AI applications; chatbots, process optimization, and fraud analysis lead a recent survey’s top use cases according to MMC Ventures.
  • 83% of IT leaders say AI & ML is transforming customer engagement, and 69% say it is transforming their business according to Salesforce Research.
  • IDC predicts spending on AI systems will reach $97.9B in 2023.

AI pilots are progressing into production based on their combined contributions to improving customer experience, stabilizing and increasing revenues, and reducing costs. The most successful AI use cases contribute to all three areas and deliver measurable results. Of the many use cases where AI is delivering proven value in enterprises today, the ten areas discussed below are notable for the measurable results they are providing.

What each of these ten use cases has in common is the accuracy and efficiency they can analyze and recommend actions based on real-time monitoring of customer interactions, production, and service processes. Enterprises who get AI right the first time build the underlying data structures and frameworks to support the advanced analytics, machine learning, and AI techniques that show the best potential to deliver value. There are various frameworks available, with BMC’s Autonomous Digital Enterprise (ADE) encapsulating what enterprises need to scale out their AI pilots into production. What’s unique about BMC’s approach is its focus on delivering transcendent customer experiences by creating an ecosystem that uses technology to cater to every touchpoint on a customer’s journey, across any channel a customer chooses to interact with an enterprise on.

10 Areas Where AI Is Delivering Proven Value Today

Having progressed from pilot to production across many of the world’s leading enterprises, they’re great examples of where AI is delivering value today. The following are 10 areas where AI is delivering proven value in enterprises today

  • Customer feedback systems lead all implementations of AI-based self-service platforms. That’s consistent with the discussions I’ve had with manufacturing CEOs who are committed to Voice of the Customer (VoC) programs that also fuel their new product development plans. The best-run manufacturers are using AI to gain customer feedback better also to improve their configure-to-order product customization strategies as well. Mining contact center data while improving customer response times are working on AI platforms today. Source: Forrester study, AI-Infused Contact Centers Optimize Customer Experience Develop A Road Map Now For A Cognitive Contact Center.
  • McKinsey finds that AI is improving demand forecasting by reducing forecasting errors by 50% and reduce lost sales by 65% with better product availability. Supply chains are the lifeblood of any manufacturing business. McKinsey’s initial use case analysis is finding that AI can reduce costs related to transport and warehousing and supply chain administration by 5% to 10% and 25% to 40%, respectively. With AI, overall inventory reductions of 20% to 50% are possible. Source: Smartening up with Artificial Intelligence (AI) – What’s in it for Germany and its Industrial Sector? McKinsey & Company.

10 Ways Enterprises Are Getting Results From AI Strategies

  • The majority of CEOs and Chief Human Resource Officers (CHROs) globally plan to use more AI within three years, with the U.S. leading all other nations at 73%. Over 63% of all CEOs and CHROs interviewed say that new technologies have a positive impact overall on their operations. CEOs and CHROs introducing AI into their enterprises are doing an effective job at change management, as the majority of employees, 54%, are less concerned about AI now that they see its benefits. C-level executives who are upskilling their employees by enabling them to have stronger digital dexterity skills stand a better chance of winning the war for talent. Source: Harris Interactive, in collaboration with Eightfold Talent Intelligence And Management Report 2019-2020 Report.

10 Ways Enterprises Are Getting Results From AI Strategies

  • AI is the foundation of the next generation of logistics technologies, with the most significant gains being made with advanced resource scheduling systems. AI-based techniques are the foundation of a broad spectrum of next-generation logistics and supply chain technologies now under development. The most significant gains are being made where AI can contribute to solving complex constraints, cost, and delivery problems manufacturers are facing today. For example, AI is providing insights into where automation can deliver the most significant scale advantages. Source: McKinsey & Company, Automation in logistics: Big opportunity, bigger uncertainty, April 2019. By Ashutosh Dekhne, Greg Hastings, John Murnane, and Florian Neuhaus.

10 Ways Enterprises Are Getting Results From AI Strategies

  • AI sees the most significant adoption by marketers working in $500M to $1B companies, with conversational AI for customer service as the most dominant. Businesses with between $500M to $1B lead all other revenue categories in the number and depth of AI adoption use cases. Just over 52% of small businesses with sales of $25M or less are using AI for predictive analytics for customer insights. It’s interesting to note that small companies are the leaders in AI spending, at 38.1%, to improve marketing ROI by optimizing marketing content and timing. Source: The CMO Survey: Highlights and Insights Report, February 2019. Duke University, Deloitte, and American Marketing Association. (71 pp., PDF, free, no opt-in).
  • A semiconductor manufacturer is combining smart, connected machines with AI to improve yield rates by 30% or more, while also optimizing fab operations and streamlining the entire production process. They’ve also been able to reduce supply chain forecasting errors by 50% and lost sales by 65% by having more accurate product availability, both attributable to insights gained from AI. They’re also automating quality testing using machine learning, increasing defect detection rates up to 90%. These are the kind of measurable results manufacturers look for when deciding if a new technology is going to deliver results or not. These and many other findings from the semiconductor’s interviews with McKinsey are in the study, Smartening up with Artificial Intelligence (AI) – What’s in it for Germany and its Industrial Sector? . The following graphic from the study illustrates the many ways AI and machine learning are improving semiconductor manufacturing.

10 Ways Enterprises Are Getting Results From AI Strategies

  • AI is making it possible to create propensity models by persona, and they are invaluable for predicting which customers will act on a bundling or pricing offer. By definition, propensity models rely on predictive analytics including machine learning to predict the probability a given customer will act on a bundling or pricing offer, e-mail campaign or other call-to-action leading to a purchase, upsell or cross-sell. Propensity models have proven to be very effective at increasing customer retention and reducing churn. Every business excelling at omnichannel today rely on propensity models to better predict how customers’ preferences and past behavior will lead to future purchases. The following is a dashboard that shows how propensity models work. Source: customer propensities dashboard is from TIBCO.
  • AI is reducing logistics costs by finding patterns in track-and-trace data captured using IoT-enabled sensors, contributing to $6M in annual savings. BCG recently looked at how a decentralized supply chain using track-and-trace applications could improve performance and reduce costs. They found that in a 30-node configuration, when blockchain is used to share data in real-time across a supplier network, combined with better analytics insight, cost savings of $6M a year is achievable. Source: Boston Consulting Group, Pairing Blockchain with IoT to Cut Supply Chain Costs, December 18, 2018, by Zia Yusuf, Akash Bhatia, Usama Gill, Maciej Kranz, Michelle Fleury, and Anoop Nannra.
  • Detecting and acting on inconsistent supplier quality levels and deliveries using AI-based applications is reducing the cost of bad quality across electronic, high-tech, and discrete manufacturing. Based on conversations with North American-based mid-tier manufacturers, the second most significant growth barrier they’re facing today is suppliers’ lack of consistent quality and delivery performance. Using AI, manufacturers can discover quickly who their best and worst suppliers are, and which production centers are most accurate in catching errors. Manufacturers are using dashboards much like the one below for applying machine learning to supplier quality, delivery, and consistency challenges. Source: Microsoft, Supplier Quality Analysis sample for Power BI: Take a tour.

10 Ways Enterprises Are Getting Results From AI Strategies

  • Optimizing Shop Floor Operations with Real-Time Monitoring and AI is in production at Hitachi today. Combining real-time monitoring and AI to optimize shop floor operations, providing insights into machine-level loads and production schedule performance, is now in production at Hitachi. Knowing in real-time how each machine’s load level impacts overall production schedule performance leads to better decisions managing each production run. Optimizing the best possible set of machines for a given production run is now possible using AI.  Source: Factories of the Future: How Symbiotic Production Systems, Real-Time Production Monitoring, Edge Analytics, and AI Are Making Factories Intelligent and Agile, Youichi Nonaka, Senior Chief Researcher, Hitachi R&D Group and Sudhanshu Gaur Director, Global Center for Social Innovation Hitachi America R&D.

10 Ways Enterprises Are Getting Results From AI Strategies

Additional reading:

15 examples of artificial intelligence in marketing, eConsultancy, February 28, 2019

4 Positive Effects of AI Use in Email Marketing, Statista, March 1, 2019

4 Ways Artificial Intelligence Can Improve Your Marketing (Plus 10 Provider Suggestions), Forbes, Kate Harrison, January 20, 2019

Artificial Intelligence: The Next Frontier? McKinsey Global Institute (PDF, 80 pp., no opt-in)

Artificial Intelligence: The Ultimate Technological Disruption Ascends, Woodside Capital Partners. (PDF,

DHL Trend Research, Logistics Trend Radar, Version 2018/2019 (PDF, 55 pp., no opt-in)

2018 (43 pp., PDF, free, no opt-in).

Digital/McKinsey, Smartening up with Artificial Intelligence (AI) – What’s in it for Germany and its Industrial Sector? (PDF, 52 pp., no opt-in)

How To Win Tomorrow’s Car Buyers – Artificial Intelligence in Marketing & Sales, McKinsey Center for Future Mobility, McKinsey & Company. February 2019. (44 pp., PDF, free, no opt-in)

How Top Marketers Use Artificial Intelligence On-Demand Webinar with Vala Afshar, Chief Digital Evangelist, Salesforce and Meghann York, Director, Product Marketing, Salesforce

In-depth: Artificial Intelligence 2019, Statista Digital Market Outlook, February 2019 (client access reqd).

bes Insights and Quantcast Study (17 pp., PDF, free, opt-in),

Marketing & Sales Big Data, Analytics, and the Future of Marketing & Sales, (PDF, 60 pp., no opt-in), McKinsey & Company.

McKinsey & Company, Automation in logistics: Big opportunity, bigger uncertainty, April 2019. By Ashutosh Dekhne, Greg Hastings, John Murnane, and Florian Neuhaus

McKinsey & Company, Notes from the AI frontier: Modeling the impact of AI on the world economy, September 2018 By Jacques Bughin, Jeongmin Seong, James Manyika, Michael Chui, and Raoul Joshi

Papadopoulos, T., Gunasekaran, A., Dubey, R., & Fosso Wamba, S. (2017). Big data and analytics in operations and supply chain management: managerial aspects and practical challenges. Production Planning & Control28(11/12), 873-876.

Powerful pricing: The next frontier in apparel and fashion advanced analytics, McKinsey & Company, December 2018

Winning tomorrow’s car buyers using artificial intelligence in marketing and sales, McKinsey & Company, February 2019

World Economic Forum, Impact of the Fourth Industrial Revolution on Supply Chains (PDF, 22 pgs., no opt-in)

World Economic Forum, Supply Chain 4.0 Global Practices, and Lessons Learned for Latin America and the Caribbean (PDF, 44 pp., no opt-in)

Worldwide Spending on Artificial Intelligence Systems Will Grow to Nearly $35.8 Billion in 2019, According to New IDC Spending Guide, IDC; March 11, 2019

 

How To Build A Business Case For Endpoint Security

How To Build a Business Case for Endpoint Security

Bottom Line:  Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach.

Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to provide access. For these reasons and more, endpoints are now the popular choice for hacking attempts. Ponemon Institute’s Third Annual Study on the State of Endpoint Security Risk published in January of this year found that 68% of organizations were victims of successful endpoint attacks in 2019 that compromised data assets and IT infrastructure. Since 2017, successful endpoint attacks have spiked by 26 percent. The Ponemon study also found that it takes the typical organization 97 days to test and deploy patches to each endpoint. When the average endpoint is three months behind on updates, it’s understandable why breaches are increasing. In 2019 the average endpoint breach inflicted $8.94M in losses. The following graphic compares the escalating number of breaches and economic losses for the last three years:

How To Build A Business Case For Endpoint Security

Exploring Endpoint Security’s Many Benefits

Think of building a business case for endpoint security as the checkup every company needs to examine and identify and every threat surface that can be improved. Just as all efforts to preserve every person’s health is priceless today, organizations can’t let their guard down when it comes to keeping endpoint security strong.

The economic fallout of COVID-19 is hitting IT budgets hard. That’s why now is the time to build a business case for endpoint security. CIOs and CISOs have to make budget cuts due to revenue shortfalls. One area no one wants to compromise on, however, is allowing endpoint agents to degrade over time. Absolute Software’s  Endpoint Security Trends Report found that the more complex and layered the endpoint protection, the greater the risk of a breach. Overloading every endpoint with multiple agents is counterproductive and leaves endpoints less secure than if fewer agents were installed.  Additionally, Absolute just launched a Remote Work and Distance Learning Insights Center, providing insights into the impact of COVID-19 on IT and security controls. An example of the dashboard shown below:

How To Build A Business Case For Endpoint Security

 

Business Case Benefits Need To Apply To  IT and Operations

Absolute and Ponemon’s studies suggest that autonomous endpoints are the future of endpoint security. Activating security at the endpoint and having an undeletable tether to every device solves many of the challenges every business’s IT and Operations teams face. And with the urgency to make IT and Operations as virtual as possible with budgets impacted by COVID-19’s economic fallout, team leaders in each area are focusing on the following shared challenges. COVID-19’s quarantine requirements make hybrid workforces instantly appear and make the budgets needed to support them vanish at the same time.  The following are the shared benefits for IT and Operations that need to anchor any endpoint security business case:

  • The most urgent need is for greater IT Help Desk efficiency. While this is primarily an IT metric, the lack of real-time availability of resources is slowing down remote Operations teams from getting their work done.
  • Both IT and Operations share asset utilization, loss reduction, and lifecycle optimization ownership in many organizations today. Having a persistent, undeletable tether to every device at the hardware level is proving to be an effective approach IT, and Operations teams are relying on to track and improve these metrics. The Absolute and Ponemon studies suggest that the more resilient the endpoint, the better the asset efficiency and lifecycle optimization. Autonomous endpoints can self-heal and regenerate themselves, further improving shared metric performance for IT and Operations.
  • The more autonomous endpoints an organization has, the quicker Operations and IT can work together to pivot into new business models that require virtual operations. Education, Healthcare, Financial Services, Government, and Professional Services are all moving to hybrid remote workplaces and virtual operations as fast as they can. Using the business case for endpoint security as a roadmap to see where threat surfaces need to be improved for new growth is key.

Endpoint Security Benefits 

The following are the benefits that need to be included in creating a business case for endpoint security:

  • Reduce and eventually eliminate IT Help Desk backlogs by keeping endpoints up-to-date. Reducing the call volume on IT Help Desks can potentially save over $45K a year, assuming a typical call takes 10 minutes and the cumulative time savings in 1,260 hours saved by the IT help desk annually.
  • Reduce Security Operations staff interruptions and emergency security projects that require IT’s time to run analytics reports and analyses. Solving complex endpoint security problems burns thousands of dollars and hours over a year between Security, IT, and Operations. Having a persistent, unbreakable connection to every endpoint provides the device visibility teams need to troubleshoot problems. Assuming the 2,520 hours IT Security teams alone spend on emergency endpoint security problems could be reduced, organizations could save approximately $130K a year. 
  • Autonomous endpoints with an undeletable tether improve compliance, control, and visibility and is a must-have in the new hybrid remote workplace. For endpoint security to scale across every threat surface, having an undeletable tether to every device is a must-have for scalable remote work and hybrid remote work programs in the enterprise. They also contribute to lowering compliance costs and improve every aspect of asset management from keeping applications current to ensuring autonomous endpoints can continue to self-heal.
  • Reducing IT asset loss, knowing asset utilization, and system-level software installed by every device can save a typical organization over $300K a year. Autonomous endpoints that can heal themselves and provide a constant hardware connection deliver the data in real-time to have accurate IT asset management and security data teams need to keep software configurations up to date. It’s invaluable for IT teams to have this level of data, as it averts having endpoint patches conflict with one another and leave an endpoint vulnerable to breach.
  • Accurate asset lifecycle planning based on solid data from every device becomes possible. Having autonomous endpoints based on a hardware connection delivers the data needed to increase the accuracy of asset life cycle planning and resource allocation, giving IT and Operations the visibility they need to the device level. IT and Operations teams look to see how they can extend the lifecycle of every device in the field. Cost savings vary by the number of devices in the field and their specific software configurations. The time savings alone is approximately $140K per year in a mid-size financial services firm.
  • The more autonomous and connected an endpoint is, the more automated audit and compliance reporting can become. A key part of staying in compliance is automating the audit process to save valuable time. The Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR), and the Payment Card Industry Data Security Standard (PCI DSS) all require ongoing audits. The time and cost savings of automating audits by organizations vary significantly. It’s a reasonable assumption to budget at least a $67K savings per year in audit preparation costs alone.

Evaluating Endpoint Security Costs

The following are the endpoint security costs that need to be included in the business case:

  • Annual, often multi-year endpoint security licensing costs. Endpoint security providers vary significantly in their pricing models, costs, and fees. Autonomous endpoint security platforms can range in licensing costs from $750K to over $1,2M, depending on the size of the organization and the number of devices.
  • Change management, implementation, and integration costs increase with the complexity of IT security, Operations, and IT Service Management (ITSM) integration. Expect to see an average price of between $40K to over $100K to integrate endpoint security platforms with existing ITSM and security information and event management (SIEM) systems.

Creating A Compelling Business Case For Endpoint Security

The best endpoint security business cases provide a 360-degree view of costs, benefits, and why taking action now is needed.

Knowing the initial software and services costs to acquire and integrate endpoint security across your organization, training and change management costs, and ongoing support costs are essential. Many include the following equation in their business cases to provide an ROI estimate. The Return on Investment (ROI) for endpoint security initiative is calculated as follows:

ROI on Endpoint Security (ES) = (ES Initiative Benefits – ES Initiative Costs)/ES Initiative Costs x 100.

A financial services company recently calculated their annual benefits of ES initiative will be $475,000, and the costs, $65,000, will yield a net return of $6.30 for every $1 invested.

Additional factors to keep in mind when building a business case for endpoint security:

  • The penalties for non-compliance to industry-specific laws can be quite steep, with repeated offenses leading to $1M or more in fines and long-term loss of customer trust and revenue. Building a business case for endpoint security needs to factor in the potential non-compliance fees, and penalties companies face for not having autonomous endpoint security. The Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR), Payment Card Industry Data Security Standard (PCI DSS), California Consumer Privacy Act (CCPA), and other laws require audit reporting based on accurate endpoint security data.
  • Endpoint Security ROI estimates fluctuate, and it’s best to get started with a pilot to capture live data with budgets available at the end of a quarter. Typically organizations will allocate the remaining amounts of IT security budgets at the end of a quarter to endpoint security initiatives.
  • Succinctly define the benefits and costs and gain C-level support to streamline the funding process. It’s often the CISOs who are the most driven to achieve greater endpoint security the quickest they can. Today with every business having their entire workforces virtual, there’s added urgency to get endpoint security accomplished.
  • Define and measure endpoint security initiatives’ progress using a digitally-enabled dashboard that can be shared across any device, anytime. Enabling everyone supporting and involved in endpoint security initiatives needs to know what success looks like. Having a digitally-enabled dashboard that clearly shows each goal or objective and the company’s progress toward them is critical to success.

Conclusion

The hard economic reset COVID-19 created has put many IT budgets into freefall at a time when CIOs and CISOs need more funding to protect proliferating hybrid remote workforces. Endpoint security business cases need to factor in how they can create an undeletable resilient defense for every device across their global fleets. And just as every nation on the planet isn’t letting its guard down against the COVID-19 virus, every IT and cybersecurity team can’t let theirs down either when it comes to protecting every endpoint.

Autonomous endpoints that can self-heal and regenerate operating systems and configurations are the future of endpoint security management. The race to be an entirely virtual enterprise is on, and the most autonomous endpoints can be, the more cost-effective and valuable they are. The best business cases bridge the gap between IT and Operations needs. CIOs need endpoint security solutions to be low-cost, low maintenance, reliable yet agile. Operations want an endpoint solution that has a low cost of support, minimal if any impact of IT Service Help Desks, and always-on monitoring. Building a business case for endpoint security gives IT and Operations the insights they need to protect the constantly changing parameters of their businesses.

 

Protecting Privileged Identities In A Post-COVID-19 World

Protecting Privileged Identities In A Post-COVID-19 World

Bottom Line: Every organization needs to digitally reinvent their business, starting at the system level to safely sell and serve customers with minimal physical interaction.

The hard reset every business is going through creates a strong sense of urgency to increase the agility, speed, and scale of selling, as well as customer service options that protect the health of employees, customers, and partners. Customer experience needs to be the cornerstone of digital transformation, with the customers’ health and welfare being the highest priority. Businesses need to realize that digitally reinventing themselves is no longer optional. Every customer-facing system is going to need the best infrastructure, security, and stability for any business to survive and grow.

Securing Infrastructure Needs To Come First

COVID-19 was a wake-up call that companies need to operate as multi-channel players, allowing for physical but, more importantly, virtual presence. For instance, in retail, only those that will step up their efforts in building on-line ordering and associated nation-wide logistics networks will survive in the longer-term. If the cloud was considered an option in the past, it now is mandatory. In turn, the need for security has increased.

Starting with infrastructure, hybrid- and multi-cloud environments need to be augmented with additional system support, new apps, and greater security to support the always-on nature of competing in a virtual world. Providing self-service sales and support across any device at any time and keeping all systems synchronized is going to take more real-time integration, better security, more precise pricing, and so much more.

Consumer electronics manufacturers’ biggest challenge is reinventing their infrastructure while selling and serving customers at the same time. Part of their biggest challenge is protecting privileged access credentials that have become fragmented across hybrid- and multi-cloud environments. Everyone I’ve spoken with is balancing the urgent need for new revenue through new channels on the one hand with intensity to secure infrastructure and the most valuable security assets of all, privileged access credentials.

According to a 2019 study by Centrify among 1,000 IT decision-makers, 74% of respondents whose organizations have been breached acknowledged that it involved access to a privileged account. These are typically used by a small set of technical personnel to access the most critical systems in the IT estate, including modern technologies such as cloud, DevOps, microservices, and more. The CIO of a local financial services and insurance company, who is a former student and friend, told me that “it’s often said that privileged access credentials are the keys to the kingdom, and in these turbulent times they’re the keys to keeping any business running.”

CIOs, CISOs, and their teams are focusing on four key areas today while digitally reinventing themselves to provide more flexible options for customers:

  • Secure every new self-service selling and service channel from breaches.
  • Fast-track cloud projects to become 100% virtual and available.
  • Simplify infrastructure management by integrating IT and Operations Management across hybrid and multi-cloud environments.
  • Improve compliance reporting as well as reduce audit costs and associated fines.

Legacy Privileged Access Management (PAM) Can’t Scale For Today’s Threats

Sophisticated social engineering and breach attempts are succeeding in misdirecting human responses to cyber threats, gaining access to valuable privileged access credentials in the process. Legacy PAM systems based on vaulting away shared and root passwords aren’t designed to protect hybrid cloud and multi-cloud environments. These DevOps systems include containers and microservices, APIs, machines, or services. Furthermore, multi-cloud environments create additional challenges because access management tools used for one vendor cannot be used with another.

Switching from in-person to self-service selling and service creates new challenges and an entirely new series of requirements for identity and access management. These requirements include securing a continually-increasing number of workloads that cause the amount of data in the cloud to grow exponentially. There’s also the need to centralize identities for consistent access controls across hybrid and multi-cloud environments – all happening while a business is busy digitally reinventing itself. Compounding all of these challenges is the need to excel at delivering an excellent user experience without sacrificing security in an increasingly self-service, always-on, 24/7 world.

Securing Privileged Access In A Post-COVID-19 World

If you’re looking for a sure sign any business will be around and growing in twelve months, look at how fast they are digitally reinventing themselves at the infrastructure level and protecting privileged access credentials first. Digital-first businesses are taking a more adaptive approach to consistently controlling access to hybrid infrastructure for both on-premises and remote users now.

Centrify and others are making rapid progress in this area, with Centrify’s Identity-Centric PAM taking a “never trust, always verify, enforce least privilege” approach to securing privileged identities. Centrify’s approach to Identity-Centric PAM establishes per-machine trust so it can defend itself from illegitimate users – whether human or machine  – or those without the right entitlements. It then grants least privilege access just-in-time based on verifying who is requesting access, the context of the request, and the risk of the access environment as is illustrated in the graphic below:

Protecting Privileged Identities In A Post-COVID-19 World

Conclusion

Improving customer experiences needs to be at the center of any digital transformation effort. As every business digitally transforms itself to survive and grow in a post-COVID-19 world out of necessity, they must also improve how they secure access to their cloud and on-premises infrastructure. Legacy PAM was designed for a time when all privileged access was constrained to resources inside the network, accessed by humans, using shared/root accounts.

Legacy PAM was not designed for cloud environments, DevOps, containers, or microservices. Furthermore, privileged access requesters are no longer limited to just humans, but also include machines, services, and APIs.

Privileged access requesters need greater agility, adaptability, and speed to support DevOps’ growing roadmap of self-service and increasingly safer apps and platforms. While privileged identities must be protected, DevOps teams need as much agility and speed as possible to innovate at the rapidly changing pace of how customers choose to buy in a post-COVID-19 world.

Six Areas Where AI Is Improving Customer Experiences

Six Areas Where AI Is Improving Customer Experiences

Bottom Line: This year’s hard reset is amplifying how vital customer relationships are and how much potential AI has to find new ways to improve them.

  • 30% of customers will leave a brand and never come back because of a bad experience.
  • 27% of companies say improving their customer intelligence and data efforts are their highest priority when it comes to customer experience (CX).
  • By 2023, 30% of customer service organizations will deliver proactive customer services by using AI-enabled process orchestration and continuous intelligence, according to Gartner.
  • $13.9B was invested in CX-focused AI and $42.7B in CX-focused Big Data and analytics in 2019, with both expected to grow to $90B in 2022, according to IDC.

The hard reset every company is going through today is making senior management teams re-evaluate every line item and expense, especially in marketing. Spending on Customer Experience is getting re-evaluated as are supporting AI, analytics, business intelligence (BI), and machine learning projects and spending. Marketers able to quantify their contributions to revenue gains are succeeding the most at defending their budgets.

Fundamentals of CX Economics

Knowing if and by how much CX initiatives and strategies are paying off has been elusive. Fortunately, there are a variety of benchmarks and supporting methodologies being developed that contextualize the contribution of CX. KPMG’s recent study, How Much Is Customer Experience Worth? provides guidance in the areas of CX and its supporting economics. The following table provides an overview of key financial measures’ interrelationships with CX. The table below summarizes their findings:

The KPMG study also found that failing to meet customer expectations is two times more destructive than exceeding them. That’s a powerful argument for having AI and machine learning ingrained into CX company-wide. The following graphic quantifies the economic value of improving CX:

Six Areas Where AI Is Improving Customer Experiences

 

Where AI Is Improving CX

For AI projects to make it through the budgeting crucible that the COVID-19 pandemic has created, they’re going to have to show a contribution to revenue, cost reduction, and improved customer experiences in a contactless world. Add in the need for any CX strategy to be on a resilient, proven platform and the future of marketing comes into focus. Examples of platforms and customer-centric digital transformation networks that can help re-center an organization on data- and AI-driven customer insights include BMC’s Autonomous Digital Enterprise (ADE) and others. The framework is differentiated from many others in how it is designed to capitalize on AI and Machine Learning’s core strengths to improve every aspect of the customer (CX) and  employee experience (EX). BMC believes that providing employees with the digital resources they need to excel at their jobs also delivers excellent customer experiences.

Having worked my way through college in customer service roles, I can attest to how valuable having the right digital resources are for serving customers What I like about their framework is how they’re trying to go beyond just satisfying customers, they’re wanting to delight them. BMC calls this delivering a transcendent customer experience. From my collegiate career doing customer service, I recall the e-mails delighted customers sent to my bosses that would be posted along a wall in our offices. In customer service and customer experience, you get what you give. Having customer service reps like my younger self on the front line able to get resources and support they need to deliver more authentic and responsive support is key. I see BMC’s ADE doing the same by ensuring a scalable CX strategy that retains its authenticity even as response times shrink and customer volume increases.

The following are six ways AI can improve customer experiences:

  • Improving contactless personalized customer care is considered one of the most valuable areas where AI is improving customer experiences. These “need to do” marketing areas have the highest complexity and highest benefit. Marketers haven’t been putting as much emphasis on the “must do” areas of high benefit and low complexity, according to Capgemini’s analysis. These application areas include Chatbots and virtual assistants, reducing revenue churn, facial recognition and product and services recommendations. Source:  Turning AI into concrete value: the successful implementers’ toolkit, Capgemini Consulting. (PDF, 28 pp).

Six Areas Where AI Is Improving Customer Experiences

  • Anticipating and predicting how each customers’ preferences of where, when, and what they will buy will change and removing roadblocks well ahead of time for them. Reducing the friction customers face when they’re attempting to buy within a channel they’ve never purchased through before can’t be left to chance. Using augmented, predictive analytics to generate insights in real-time to customize the marketing mix for every individual Customer improves sales funnels, preserves margins, and can increase sales velocity.
  • Knowing which customer touchpoints are the most and least effective in improving CX and driving repurchase rates. Successfully using AI to improve CX needs to be based on data from all trackable channels that prospects and customers interact with. Digital touchpoints, including mobile app usage, social media, and website visits, all need to be aggregated into data sets ML algorithms to use to learn more about every Customer continually and anticipate which touchpoint is the most valuable to them and why. Knowing how touchpoints stack up from a customer’s point of view immediately says which channels are doing well and which need improvement.
  • Recruiting new customer segments by using CX improvements to gain them as prospects and then convert them to customers. AI and ML have been used for customer segmentation for years. Online retailers are using AI to identify which CX enhancements on their mobile apps, websites, and customer care systems are the most likely to attract new customers.
  • Retailers are combining personalization, AI-based pattern matching, and product-based recommendation engines in their mobile apps enabling shoppers to try on garments they’re interested in buying virtually. Machine learning excels at pattern recognition, and AI is well-suited for fine-tuning recommendation engines, which are together leading to a new generation of shopping apps where customers can virtually try on any garment. The app learns what shoppers most prefer and also evaluates image quality in real-time, and then recommends either purchase online or in a store. Source: Capgemini, Building The Retail Superstar: How unleashing AI across functions offers a multi-billion dollar opportunity.

Six Areas Where AI Is Improving Customer Experiences

  • Relying on AI to best understand customers and redefine IT and Operations Management infrastructure to support them is a true test of how customer-centric a business is. Digital transformation networks need to support every touchpoint of the customer experience. They must have AI and ML designed to anticipate customer needs and deliver the goods and services required at the right time, via the Customer’s preferred channel. BMC’s Autonomous Digital Enterprise Framework is a case in point. Source: Cognizant, The 2020 Customer Experience.

Six Areas Where AI Is Improving Customer Experiences

Additional Resources

4 Ways to Use Machine Learning in Marketing Automation, Medium, March 30, 2017

84 percent of B2C marketing organizations are implementing or expanding AI in 2018. Infographic. Amplero.

AI, Machine Learning, and their Application for Growth, Adelyn Zhou. SlideShare/LinkedIn. Feb. 8, 2018.

AI: The Next Generation of Marketing Driving Competitive Advantage throughout the Customer Life Cycle (PDF, 10 pp., no opt-in), Forrester, February 2017.

Artificial Intelligence for Marketers 2018: Finding Value beyond the Hype, eMarketer. (PDF, 20 pp., no opt-in). October 2017

Artificial Intelligence: The Next Frontier? McKinsey Global Institute (PDF, 80 pp., no opt-in)

Artificial Intelligence: The Ultimate Technological Disruption Ascends, Woodside Capital Partners. (PDF, 111 pp., no opt-in). January 2017.

AWS Announces Amazon Machine Learning Solutions Lab, Marketing Technology Insights

B2B Predictive Marketing Analytics Platforms: A Marketer’s Guide, (PDF, 36 pp., no opt-in) Marketing Land Research Report.

Campbell, C., Sands, S., Ferraro, C., Tsao, H. Y. J., & Mavrommatis, A. (2020). From data to action: How marketers can leverage AI. Business Horizons, 63(2), 227-243.

David Simchi-Levi

Earley, S. (2017). The Problem of Personalization: AI-Driven Analytics at Scale. IT Professional, 19(6), 74-80.

Four Use Cases of Machine Learning in Marketing, June 28, 2018, Martech Advisor,

Gacanin, H., & Wagner, M. (2019). Artificial intelligence paradigm for customer experience management in next-generation networks: Challenges and perspectives. IEEE Network, 33(2), 188-194.

Hildebrand, C., & Bergner, A. (2019). AI-Driven Sales Automation: Using Chatbots to Boost Sales. NIM Marketing Intelligence Review11(2), 36-41.

How Machine Learning Helps Sales Success (PDF, 12 pp., no opt-in) Cognizant

Inside Salesforce Einstein Artificial Intelligence A Look at Salesforce Einstein Capabilities, Use Cases and Challenges, Doug Henschen, Constellation Research, February 15, 2017

Kaczmarek, J., & Ryżko, D. (2009). Quantifying and optimising user experience: Adapting AI methodologies for Customer Experience Management.

KPMG, Customer first. Customer obsessed. Global Customer Experience Excellence report, 2019 (92 pp., PDF)

Machine Learning for Marketers (PDF, 91 pp., no opt-in) iPullRank

Machine Learning Marketing – Expert Consensus of 51 Executives and Startups, TechEmergence.

Marketing & Sales Big Data, Analytics, and the Future of Marketing & Sales, (PDF, 60 pp., no opt-in), McKinsey & Company.

OpenText, AI in customer experience improves loyalty and retention (11 pp., PDF)

Sizing the prize – What’s the real value of AI for your business and how can you capitalize? (PDF, 32 pp., no opt-in) Pw

The New Frontier of Price Optimization, MIT Technology Review. September 07, 2017.

The Power Of Customer Context, Forrester (PDF, 20 pp., no opt-in) Carlton A. Doty, April 14, 2014. Provided courtesy of Pegasystems.

Turning AI into concrete value: the successful implementers’ toolkit, Capgemini Consulting

Using machine learning for insurance pricing optimization, Google Cloud Big Data and Machine Learning Blog,

What Marketers Can Expect from AI in 2018, Jacob Shama. Mintigo. January 16, 2018.

Machines Protecting Themselves Is The Future Of Cybersecurity

Machines Protecting Themselves Is The Future Of Cybersecurity

Bottom Line: Existing approaches to securing IT infrastructure are proving unreliable as social engineering and breach attempts succeed in misdirecting human responses to cyber threats, accentuating the need for machines to protect themselves.

Any nations’ digital infrastructure and the businesses it supports are its most vital technology resources, as the COVID-19 pandemic makes clear. Cybercriminal and advanced persistent threat (APT) groups are attempting to capitalize on the disruption that COVID-19 is creating to engage in malicious cyber activity. It’s become so severe that the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC) issued a joint alert, COVID-19 Exploited by Malicious Cyber Actors earlier this month.

“If you’re in the Department of Defense, your doctrine says land, sea, air, space, cyber. An entirely new domain of warfare, but fundamentally, an entirely new domain of human existence. That’s really disruptive,” said General Michael Hayden during his keynote at the 2017 Institute for Critical Infrastructure Technology (ICIT) Winter Summit. General Hayden’s comments are prescient of the world in 2020.

In the same keynote, he said that it’s essential that cyber-threats and the actors carrying them out be treated as invading armies and cyber-attacks be considered an act of war. “We self-organize and use business models to guide our self-organization,” General Hayden said. “We will have to rely on ourselves and the private sector in a way that we have not relied on ourselves for security.”

General Hayden’s’ comments are a call to action to the private sector to take the initiative and innovate quickly to secure the cyber-domain. Machines protecting themselves is an area noteworthy for its innovative technologies for securing IT infrastructures and the networks that comprise them.

Exploring An Approach to How Machines Protect Themselves

Wanting to learn more about how machines would be able to protect themselves automatically, I spoke with Centrify’s Chief Strategy Officer, David McNeely. He explained that one of the best ways is to have a client that is an integral part of any operating system act as an intermediary that establishes a trusted identity for each client system on a network. The client would then be able to authenticate every login attempt and request for resources by verifying each login through an authoritive security management platform such as Active Directory (AD).

McNeely explained how Centrify’s approach to having machines protect themselves using clients integrated with operating systems. “The client is designed to enable the computer to authenticate users. It must have a trusted relationship with the authoritative identity service in the organization that manages user accounts, this is usually Active Directory. The computer account and trust relationship is what enables strong authentication of user login requests” he said.

He continued, “Self-defending machines address the paradigm shift occurring in cybersecurity today where protection cannot be enforced at the network boundary. In the past, trusted networks were defined by administrators using network protection tools such as VLANs, firewalls and VPNs in order to protect a group of machines on that network. With self-defending machines, it’s possible to implement a true Zero Trust approach more fully where the network cannot be trusted.”

The following is a graphic of how Centrify is approaching machine-to-machine Zero Trust across distributed environments:

Machines Protecting Themselves Is The Future Of Cybersecurity

Centrify’s approach is based on servers protecting themselves by enforcing a policy defined by IT administrators as stored in Active Directory (AD) or Centrify’s Privileged Access Service. Clients then carry out the orders, enforcing centrally managed policies for each of the following scenarios:

  • Define who can login, making sure only authorized personnel are allowed access.
  • Whether clients should initiate the process of enforcing MFA or not, to make sure the login attempt isn’t a bot, fake ID, or incorrect human.
  • Whether audit is required or not of the login session and if so, what conditions define if it should be recorded or not.
  • Which privileges are granted to each user and for how long once they’ve gained access to systems.

Why The NIST 800-207 Standard Matters

The National Institute of Standards and Technology (NIST) has defined Zero Trust architecture as a set of guiding principles that organizations can use to improve their security posture. You can view the publication online here: NIST Zero Trust Special Publication 800-207, Zero Trust Architecture (PDF, 58 pp., no opt-in).

Organizations need to continually evaluate their existing cybersecurity defenses in light of the Tenets of Zero Trust in order to continually improve their security postures. The NIST standard underscores the importance of how security architecture matters. For example, defenses to protect assets need to be as close to the asset as possible, much like in a war. In this new era of cyberwarfare, soldiers will need their own body armor and tools to defend against an adversary. Similarly, it is important to arm each server with appropriate defenses to protect against cyberthreats.

Conclusion

General Hayden’s challenge to private industry to pick up the pace of innovation so the nations’ cyber-domain is secure resonates with every cybersecurity company I’ve spoken with. One of the most noteworthy is Centrify, who has devised an enterprise-ready approach for machines to protect themselves across infrastructure and network configurations. It’s Identity-Centric approach to authenticating every login attempt and request for resources by verifying each login – through Active Directory (AD) or the cloud-based, FedRAMP-authorized Centrify Privileged Access Service – differentiates its approach from other cybersecurity vendors attempting to empower machine self-defense.

 

Remote Recruiting In A Post COVID-19 World

Remote Recruiting In A Post COVID-19 World

Bottom Line: Virtual career fairs and events, fully-remote recruiting, more personalized career paths, and greater insights into candidate experiences are quickly becoming the new normal in a post-COVID-19 world.

The COVID-19 pandemic is quickly changing how every organization is attracting, recruiting, and retaining employees on their virtual teams, making remote work the new normal. Recruiting systems, Applicant Tracking Systems (ATS), and talent management systems were designed for one-on-one personal interactions, not virtual ones. Legacy Human Resource Management (HRM) systems are already showing signs of not being able to scale and meet the challenges of the brave, new post-COVID-19 world. The majority of legacy systems are built for transaction scale and can’t see candidate potential. Closing the gaps between legacy talent management systems and new virtual event recruiting and AI-based talent management platforms are changing that by putting candidate potential at the center of their architectures.

Closing The Virtual Event Recruiting Gap Needs To Happen First

Many organizations during this time of year prioritize recruiting the best and brightest college seniors they can attract during in-person interviews on campus. That’s no longer an option today. College recruiters are resorting to individual Skype or Zoom sessions with candidates while attempting to keep track of interviews the best they can with Excel, Google Sheets, and e-mail. Recruiters trying to recruit for mid-level and senior positions are under increasing pressure from hiring managers to arrange interviews with the highest quality candidates possible.

Seeing an opportunity to help organizations find, engage, and recruit using online events, Eightfold.ai has created and launched Virtual Event Recruiting. Eightfold.ai is best-known for its Talent Intelligence Platform™, the first AI-powered solution and most effective way for companies to identify promising candidates, reach diversity hiring goals, retain top performers, and engage talent. Eightfold.ai’s recent webinar How To Hold Virtual Recruiting Events is worth checking out if you’re interested in how Virtual Event Recruiting is evolving..

What Does Success Look Like In Virtual Event Recruiting?

The table stakes for any Virtual Event Recruiting solution need include support for students just starting their careers, veterans, return-to-work mothers, and experienced professionals. For a solution to be effective, it also needs to enable companies and job seekers to connect, giving companies greater scale than is possible for physical recruiting events. Ideally, any virtual event recruiting system needs to provide the following:

  • The ability to upload resume books and use AI to find the highest quality matches for open positions in real-time. Machine learning algorithms excel at pattern matching and can save recruiters thousands of hours of drudgery by immediately seeing the highest quality matches for open positions.
  • Provide a planning center that also serves a company’s specific talent community and provide tools to grow it by tailoring events to their specific interests while seeking the best-qualified candidates for open positions. Creating, launching, and tracking recruiting campaigns from the same dashboard that tracks invitations, registrations, and open positions being filled gives recruiters the end-to-end visibility they need to succeed with a virtual event. It’s important to have Assessments included in every virtual event to measure candidates’ experiences and see what’s going well and which areas need to improve. The following is an example of what Eightfold’s planning center looks like:

Remote Recruiting In a Post COVID-19 World

  • Rely on AI to match high-potential candidates with the best possible virtual events to increase opt-in and participation rates. For a virtual event recruiting solution to be effective, high-potential candidates need to be matched with positions they will most excel in. A first step to making this happen is using AI to understand every candidate’s strengths and inviting them to the virtual events that will help them the most in choosing the best position given their potential.

Remote Recruiting In a Post COVID-19 World

  • Guide candidates to the positions that best match their existing capabilities and future potential. Instead of relying on keyword matching from resumes alone, virtual event recruiting applications need to suggest those positions high-potential candidates have the greatest potential to excel at. Using AI to combine all available data on a candidate, so their existing capabilities and future potential are taken into account is key to making more successful hires. Integrating job recommendations with virtual event recruiting is a must-have for any organization looking to add staff in 2020 and beyond.

Remote Recruiting In a Post COVID-19 World

  • After the virtual event, all potential candidates for an open position need to be stacked-ranked so recruiters can prioritize who they contact. By providing personalization at scale to every candidate by providing them recommendations for the positions they are the strongest match for, recruiters will find following-up is easier to accomplish than cold-calling a candidate found on LinkedIn, for example. Stack ranking needs to include members of the existing talent community and organization is cultivating as well. An excellent example of how this could work is shown below:

Remote Recruiting In a Post COVID-19 World

Conclusion

University campuses need to consider partnering with Eightfold.ai to make it easier for their graduating students to find best available careers, perhaps across a much broader range of companies than ever visited any individual campus. And there is no reason this paradigm can’t be applied to other job fairs and recruiting events like Grace Hopper.

Improving event virtual recruiting needs to be the priority recruiters and HR professionals take action on first to stay competitive from a talent management standpoint. Organizations that will win the war for talent in this new remote, distributed workforce era are already looking at how to excel at virtual recruiting. Having a talent intelligence platform that can provide end-to-end visibility and personalization at scale is the future of talent management.

 

How To Reduce The Unemployment Gap With AI

How To Reduce The Unemployment Gap With AI

It’s time for AI startups to step up and use their formidable technology expertise in AI to help get more Americans back to work now.

Bottom Line: A.I.’s ability to predict and recommend job matches will help get more Americans back to work, helping to reduce the 22 million unemployed today.

One in ten Americans is out of work today based latest U.S. Department of Labor data. They’re primarily from the travel and hospitality, food services, and retail trade and manufacturing industries, with many other affected sectors. McKinsey & Company’s recent article, A new AI-powered network, is helping workers displaced by the coronavirus crisis provides context around the scope of challenges involved in closing the unemployment gap. McKinsey, Eightfold A.I., and the FMI – The Food Industry Association combined efforts to create the Talent Exchange, powered by Eightfold.ai in a matter of weeks. McKinsey insights across a broad base of industries to help Eightfold and FMI create the Talent Exchange in record time. “In talking with clients across the U.S., it became very clear that there is a huge labor mismatch, and individuals are being affected very differently—from retailers furloughing tens of thousands of workers to other organizations needing to hire more than 100,000 workers quickly. We’re excited to help bring a scalable offering to the market,” said McKinsey partner Andrew Davis. McKinsey and FMI collaborating with Eightfold speak volumes to how Americans are coming together to combat the COVID-19 fallout as a team.

And with the food & agriculture, transportation, and logistics industries considered essential, critical infrastructure by Cybersecurity and Infrastructure Security Agency (CISA), demand for workers is more urgent than ever. Eightfold’s Talent Exchange launched last weekend and already has more than 600,000 jobs uploaded that employers need to fill and is available in 15 languages. Eightfold is making the Talent Exchange available free of charge through the COVID-19 epidemic. The Talent Exchange is also being extended to other industries and eco-systems, illustrating how the Eightfold A.I. platform can provide transferability of skills across roles and industries.

Getting Americans Back To Work Using A.I.

Earlier this week Eightfold, FMI – The Food Industry Association and Josh Bersin, the noted global research analyst, public speaker, and writer on many aspects of human resources and talent management, hosted the webinar, COVID-19: Helping the food industry on the front lines with A.I. It’s available to watch here and includes a walk-through of the Eightfold Talent Exchange. The following graphic explains how the Talent Exchange addresses the needs of downsizing companies, impacted workers and hiring companies:

How To Reduce The Unemployment Gap With AI

Eightfold’s Talent Exchange Is A Model For How To Use A.I. For Good

Eightfold’s Talent Exchange uses A.I. algorithms to match candidates with available roles, based on each individual’s skills and previous experience.

Current employers who have to furlough or lay off employees can invite employees to participate in the program. Eightfold also designed in a useful feature that enables employers to add lists of impacted employees and send them a link to register for the Exchange. Employers can view their entire impacted workforce in a single dashboard and can filter by role, department, or location to see details about the talent needs from hiring companies and how their impacted employees are getting placed in new roles. The following is the Talent Exchange dashboard  for current employers showing progress in placing employees with furlough and outplacement partners, including the number of offers accepted by each:

How To Reduce The Unemployment Gap With AI

Employees impacted by a furlough or lay-off can create and update profiles free on the Talent Exchange, defining their job preferences, skills, and experience. That’s invaluable data for hiring companies relying on the platform to make offers and fill positions quickly.  How current employers handle furloughs and lay-offs today will be their identity for years to come, a point John Bersin made during the webinar saying “employers who thrive in the future are going to build long-term relationships with employees today.” Employees receive the following when their current employer adds their name to the Eightfold Talent Exchange. The fictional Company Travel Air is used for this example:

Hiring companies see candidate matches generated by the Exchange, so they can contact these prospects or immediately offer them new jobs. Eightfold’s A.I. engineering teams have automated and personalized this contact as well, expediting the process even further. Hiring companies can add onboarding instructions to allow new hires to start as soon as they are ready and have real-time views of their hiring dashboard shown below:

How To Reduce The Unemployment Gap With AI

Conclusion

Combining A.I.’s innate strengths with H.R. and talent management professionals’ expertise and insights is closing the unemployment gap today. Employers furloughing or laying off employees need to look out for them and get their profile data on the Talent Exchange, helping them find new jobs with hiring companies. As was so well-said by Josh Bersin during the webinar this week, “smart employers should think of their hourly workers as talent, not fungible, replaceable bodies.” For hiring companies in a war for proven employees with talent today, that mindset is more important than ever.

10 Most In-Demand Tech Jobs On Indeed In 2020

10 Most In-Demand Tech Jobs On Indeed In 2020

  • There has been a 73.6% increase in WordPress developer job postings on Indeed through the first three months of 2020.
  •  Demand for tech jobs is more resilient than the national average, with tech job listings down 5.8% from the same time last year compared to a 15.2% drop across all job listings.
  • The top ten most in-demand tech jobs’ open positions grew 30.2% through March 2020.

While job postings in the U.S. are 23.6% lower year-to-date compared to 2019, tech hiring is showing signs of being more resilient than average. Indeed’s economists looked at the tech job titles with the highest percentage increase in job postings per million from January 2020 to March 2020. They included average salary along with the % increase in job postings per million on Indeed during the same time period in 2019. Their analysis found the ten most in-demand technical jobs through the end of March have seen on average a 30% increase in job listings. WordPress Developers, Systems Integration Engineers, and SAS Programmers are the most in-demand, according to Indeed’s analysis.

According to Nick Bunker, Economist at Indeed: “Demand for tech workers has slowed considerably. The trend in job postings for software development job titles included in the analysis is down 18.5% from the same time last year, as of April 3. Compare that to the trend in overall postings in the U.S. which is down 23.6% from last year’s trend.” Demand for tech workers appears to be slowing down, but is doing relatively better than the overall labor market. Nick says that “the trend in job postings for software development jobs titles is down 5.8% from the same time last year, as of March 27st. Compare that to the trend in overall postings in the U.S. which is down 15.2% from last year’s trend.”  

The following are key insights from Indeed’s analysis of tech jobs most in-demand so far this year.

  • The average salary of the ten most in-demand tech jobs on Indeed through March 2020 is $113,855. SAP ABAP Developers are earning the highest salaries, with an average annual salary of $139,920. Indeed’s economists say professionals with skills in the area can make, on average, $69.96 per hour. SAP ABAP expertise is among the most lucrative skills to have in an economic downturn, paying $26,065 more than the average income level of the top ten tech jobs combined.

10 Most In-Demand Tech Jobs On Indeed In 2020

  • There has been a 30.25% growth in new job listings across the ten most in-demand jobs through March 2020, countering the downward trend in overall national hiring. The five fastest-growing positions’ job listings are growing at an aggregate 44% growth rate through the first three months of the year. Professionals with skills in WordPress Development, Systems Integration Engineering, SAS Programming, experience being a Senior Technical Lead, and SAP ABAP development have an excellent chance of finding work during this downtime.

10 Most In-Demand Tech Jobs On Indeed In 2020

  • There are just over 29,000 job listings across the ten most in-demand positions today. To get the number of open positions by title, I searched Indeed on each and entered the counts in the table below.

10 Most In-Demand Tech Jobs On Indeed In 2020

 

 

The Best Tech Companies For Remote Jobs In 2020 According To Glassdoor

The Best Tech Companies For Remote Jobs In 2020 According To Glassdoor

  • Modern Tribe, CloudBeds, Dataiku, PartnerCentric, GitLab, Hotjar, HubSpot, PowerToFly, Close.io, Fuse, Databricks, eightfold.ai, Fortinet, and SAP are most likely to be recommended by 93% or more of the employees who work for these companies in 2020.
  • Between LinkedIn, Glassdoor, and Indeed there are over 12,000 open remote-based software technical professional jobs available today. Companies with open positions on these sites include Aha!, AutoDesk, Calix, Cardinal Financial,  Chef Software, CoreLogic, Couchbase, Medidata Solutions, OutSystems, Qlik,  RedHat,  Riverbend, Salesforce, ServiceNow, Ultimate Software and many others.
  • Working Nomads has 10,127 open remote-based developer jobs listed, along with over 1,800 in tech marketing, 1,700 in management, and just over 1,000 in tech sales.

These and many other insights are from a comparison of the leading tech companies who offer remote, work-from-home job positions today and their Glassdoor scores. Tech companies with open remote positions are compared on two Glassdoor scores of the (%) of employees who would recommend this company to a friend and (%) of employees who approve of the CEO. Of the many companies include in the comparison, PowerToFly and GitLab stand out as exceptional in their ability to create strong virtual organizations. They’re defining the future of work today.

PowerToFly was launched by Milena Berry and Katharine Zaleski in 2014 to connect Fortune 500 companies and fast-growing startups with women who are looking to work for companies that value gender diversity and inclusion. PowerToFly is building the platform to propel diversity recruiting and hiring. PowerToFly’s job search engine currently has 994 open remote positions. Founders Milena Berry and Katharine Zaleski have created an excellent remote-based culture where 95% of employees would recommend working there to a friend, and 94% approve of them as CEOs.

GitLab has team members located in more than 65 countries around the world and provides a Guide to Remote Work. GitLab has over 100 open remote locations open, and you can find them here. Open positions are in Engineering, Marketing, Sales, Quality, Security, UX, and several other areas. GitLab knows how to excel at creating and growing a remote-based culture, reflected in 97% of employees willing to recommend the company to a friend and their CEO Sid Sijbrandij having a 97% approval rating based on 125 ratings. GitLab is one of several remote-only software companies defining the future of work.

The best tech companies for remote jobs in 2020 table is shown below. You can download the original Excel data set here. If the image below is not viewable in your browser, you can see the image here.

Where To Find Remote Tech Jobs Today

Originally posted on Forbes here. 

 

%d bloggers like this: